<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://staging.wiki.apps.attraktor.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Muelli</id>
	<title>Attraktor Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://staging.wiki.apps.attraktor.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Muelli"/>
	<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/Special:Contributions/Muelli"/>
	<updated>2026-04-24T07:09:07Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Kongress-Kino-28C3_Nr._46&amp;diff=13928</id>
		<title>Termin:Kongress-Kino-28C3 Nr. 46</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Kongress-Kino-28C3_Nr._46&amp;diff=13928"/>
		<updated>2012-11-20T10:40:10Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/11/21 20:30:00 PM |enddate=2012/11/21 22:00:00 PM |title=Kongress Kino Nr. 46 |visible=Yes }} Category:Chaotic-Congress-Cinema Category:Kongress-Kino...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/11/21 20:30:00 PM&lt;br /&gt;
|enddate=2012/11/21 22:00:00 PM&lt;br /&gt;
|title=Kongress Kino Nr. 46&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
[[Category:Kongress-Kino]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Kongress-Kino Kongress Kino].&lt;br /&gt;
&lt;br /&gt;
== NOC Review ==   &lt;br /&gt;
NOC Review about the Camp 2011 and 28C3&lt;br /&gt;
&lt;br /&gt;
A review about the camp and the congress network. Network layout,&lt;br /&gt;
planning, setup, operation and finally the teardown.&lt;br /&gt;
&lt;br /&gt;
This talk will review both the 28C3 and, due to popular demand, the&lt;br /&gt;
Camp network.&lt;br /&gt;
&lt;br /&gt;
First we would like to give you a review about our network at the&lt;br /&gt;
camp, where we built a mid-sized carrier network in a few weeks at a&lt;br /&gt;
camp ground with no infrastructure: Starting at the 4km fibre uplink&lt;br /&gt;
and the roll out of fibre over the whole campground, you will learn&lt;br /&gt;
how to build proper datenklos, deploy access switches and WLAN access&lt;br /&gt;
points in them and also how to convert a shipping container into a&lt;br /&gt;
sophisticated outdoor data center, in order to build a network that&lt;br /&gt;
can deliver pictures of cute little cats to over 3000 users. We had&lt;br /&gt;
some issues and challenging tasks, which we wish to report; we also&lt;br /&gt;
have some graphs, diagrams, photos and graphics which we want to share&lt;br /&gt;
with you.&lt;br /&gt;
&lt;br /&gt;
The second part will be about the network of the 28C3, which is more&lt;br /&gt;
or less the usual stuff like every year. You will see some graphs,&lt;br /&gt;
infrastructure, and hopefully no reports about big issues. ;)&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4927.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4927-en-noc_review_28c3_camp_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== KinectFusion ==   &lt;br /&gt;
Real-time 3D Reconstruction and Interaction Using a Moving Depth&lt;br /&gt;
Camera&lt;br /&gt;
&lt;br /&gt;
This project investigates techniques to track the 6DOF position of&lt;br /&gt;
handheld depth sensing cameras, such as Kinect, as they move through&lt;br /&gt;
space and perform high quality 3D surface reconstructions for&lt;br /&gt;
interaction.&lt;br /&gt;
&lt;br /&gt;
While depth cameras are not conceptually new, Kinect has made such&lt;br /&gt;
sensors accessible to all. The quality of the depth sensing, given the&lt;br /&gt;
low-cost and real-time nature of the device, is compelling, and has&lt;br /&gt;
made the sensor instantly popular with researchers and enthusiasts&lt;br /&gt;
alike. The Kinect camera uses a structured light technique to generate&lt;br /&gt;
real-time depth maps containing discrete range measurements of the&lt;br /&gt;
physical scene. This data can be reprojected as a set of discrete 3D&lt;br /&gt;
points (or point cloud). Even though the Kinect depth data is&lt;br /&gt;
compelling, particularly compared to other commercially available&lt;br /&gt;
depth cameras, it is still inherently noisy. Depth mea- surements&lt;br /&gt;
often fluctuate and depth maps contain numerous ‘holes’ where no&lt;br /&gt;
readings were obtained. To generate 3D models for use in applications&lt;br /&gt;
such as gaming, physics, or CAD, higher-level surface geometry needs&lt;br /&gt;
to be inferred from this noisy point-based data. One simple approach&lt;br /&gt;
makes strong assumptions about the connectivity of neighboring points&lt;br /&gt;
within the Kinect depth map to generate a mesh representation. This,&lt;br /&gt;
however, leads to noisy and low-quality meshes. As importantly, this&lt;br /&gt;
approach creates an incomplete mesh, from only a single, fixed&lt;br /&gt;
viewpoint. To create a complete (or even watertight) 3D model,&lt;br /&gt;
different viewpoints of the physical scene must be captured and fused&lt;br /&gt;
into a single representation. This talk presents a novel interactive&lt;br /&gt;
reconstruction system called KinectFusion). The system takes live&lt;br /&gt;
depth data from a moving Kinect camera and, in real- time, creates a&lt;br /&gt;
single high-quality, geometrically accurate, 3D model. A user holding&lt;br /&gt;
a standard Kinect camera can move within any indoor space, and&lt;br /&gt;
reconstruct a 3D model of the physical scene within seconds. The&lt;br /&gt;
system continuously tracks the 6 degrees-of-freedom (DOF) pose of the&lt;br /&gt;
camera and fuses new viewpoints of the scene into a global surface-&lt;br /&gt;
based representation. A novel GPU pipeline allows for accurate camera&lt;br /&gt;
tracking and surface reconstruction at interactive real-time rates. We&lt;br /&gt;
demonstrate core uses of KinectFusion as a low-cost handheld scanner,&lt;br /&gt;
and present novel interactive methods for segmenting physical objects&lt;br /&gt;
of interest from the reconstructed scene. We show how a real-time 3D&lt;br /&gt;
model can be leveraged for geometry-aware augmented reality (AR) and&lt;br /&gt;
physics- based interactions, where virtual worlds more realistically&lt;br /&gt;
merge and interact with the real. Placing such systems into an&lt;br /&gt;
interaction context, where users need to dynamically interact in front&lt;br /&gt;
of the sensor, reveals a fundamental challenge – no longer can we&lt;br /&gt;
assume a static scene for camera tracking or reconstruction. We&lt;br /&gt;
illustrate failure cases caused by a user moving in front of the&lt;br /&gt;
sensor. We describe new meth ods to overcome these limitations,&lt;br /&gt;
allowing camera tracking and reconstruction of a static background&lt;br /&gt;
scene, while simultaneously segmenting, reconstructing and tracking&lt;br /&gt;
foreground objects, including the user. We use this approach to&lt;br /&gt;
demonstrate real-time multi-touch inter actions anywhere, allowing a&lt;br /&gt;
user to appropriate any physical surface, be it planar or non-planar,&lt;br /&gt;
for touch.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4928.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4928-en-kinectfusion_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._42&amp;diff=11038</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 42</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._42&amp;diff=11038"/>
		<updated>2012-10-22T01:45:04Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/10/24 18:45:00 PM |enddate=2012/10/24 22:00:00 PM |title=Chaotic Congress Cinema Nr. 42 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/10/24 18:45:00 PM&lt;br /&gt;
|enddate=2012/10/24 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 42&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Changing techno-optimists by shaking up the bureaucrats ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meet the Netherlands: a nation filled with techno-optimists protecting&lt;br /&gt;
our freedom by puting in place restrictions on what you can do,&lt;br /&gt;
reducing our privacy and have technology as a solution for anything&lt;br /&gt;
and everything. When you make a trip we store your details for two&lt;br /&gt;
years, your airplane meal selection from two years earlier is good&lt;br /&gt;
data to test with and when migrating the government website we keep&lt;br /&gt;
the old website running in an unmaintained state. If you have nothing&lt;br /&gt;
to hide nothing can go wrong and there is nothing you can do.&lt;br /&gt;
&lt;br /&gt;
Well not quite. What would happen if you play the system? If you would&lt;br /&gt;
take the train and hack the card? What if you were to pick up the&lt;br /&gt;
resistance you face and use it in your advantage. No matter what the&lt;br /&gt;
costs would carry on? If you would take some data and show the&lt;br /&gt;
failures? Not just once but a full month long and call that month&lt;br /&gt;
Leaktober. What if you would publicly call the failures with our&lt;br /&gt;
personal data? Ultimately you make a difference. You change the law,&lt;br /&gt;
you changes the rules of the game and you really can raise the&lt;br /&gt;
question if storing all that data is really needed. Ultimately people&lt;br /&gt;
really start to doubt if this is the right way to go.&lt;br /&gt;
&lt;br /&gt;
This is a strategic and tactical story on how you can regain some&lt;br /&gt;
privacy and data protection. Even though for a journalist this should&lt;br /&gt;
be normal work, thanks to some people these things become very&lt;br /&gt;
personal. It ends in criminal prosecution, legal threats, insults, a&lt;br /&gt;
successful counter hack and ultimately a lot of benefits. But standing&lt;br /&gt;
up for a cause does work as long as you focus on the stories you want&lt;br /&gt;
to bring. My story is about hacking the system from the inside,&lt;br /&gt;
overcoming fear and showing bureaucrats that hackers are people too.&lt;br /&gt;
The talk is a lessons learnt how a few people can change a nation with&lt;br /&gt;
hacker beliefs if they really want to. A guideline on how to make a&lt;br /&gt;
difference by hacking the system you want to change. Where you can&lt;br /&gt;
even make huge mistakes, but with some luck you can win a world. How&lt;br /&gt;
you can make your critical voice be heard. Zillions of lessons learnt.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4903.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Lightning Talks Day 2 ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4905.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4905-en-lightning_talks_day_2_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Kongress-Kino-28C3_Nr._41&amp;diff=10595</id>
		<title>Termin:Kongress-Kino-28C3 Nr. 41</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Kongress-Kino-28C3_Nr._41&amp;diff=10595"/>
		<updated>2012-10-16T11:03:04Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/10/17 19:15:00 PM |enddate=2012/10/17 22:00:00 PM |title=Kongress Kino Nr. 41 |visible=Yes }} Category:Chaotic-Congress-Cinema Category:Kongress-Kino...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/10/17 19:15:00 PM&lt;br /&gt;
|enddate=2012/10/17 22:00:00 PM&lt;br /&gt;
|title=Kongress Kino Nr. 41&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
[[Category:Kongress-Kino]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Kongress-Kino Kongress Kino].&lt;br /&gt;
&lt;br /&gt;
== Closing Event ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4899.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4899-en-closing_event_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Der Staatstrojaner ==   &lt;br /&gt;
Vom braunen Briefumschlag bis zur Publikation&lt;br /&gt;
&lt;br /&gt;
0zapftis wird aus Sicht der Technik und unter juristischen&lt;br /&gt;
Gesichtspunkten analysiert.&lt;br /&gt;
&lt;br /&gt;
Der Staatstrojaner erregte die Gemüter. &amp;quot;Es kann nicht jeder&lt;br /&gt;
Programmierer ständig mit dem Grundgesetz unter dem Arm herumlaufen&amp;quot;,&lt;br /&gt;
findet Hartmut Pohl und mit ihm der Innenminister mitsamt den&lt;br /&gt;
Länderkollegen. Doch wer kontrolliert und überwacht die Überwacher und&lt;br /&gt;
ihre Überwachungssoftware, wenn sie in die ausgelagerten Gehirne&lt;br /&gt;
vordringen? Wer soll einschätzen, was der Staatstrojaner rechtlich&lt;br /&gt;
darf, wenn er nicht mal den Quellcode vorliegen hat? Was genau konnten&lt;br /&gt;
die analysierten Versionen des Staatstrojaners? Das und die Fragen der&lt;br /&gt;
Zukunft des Spähprogrammes werden im Vortrag Thema sein.&lt;br /&gt;
&lt;br /&gt;
Denn Abhilfe soll nun eine vom Staat selbst programmierte und&lt;br /&gt;
entwickelte Spionagesoftware, inklusive Zertifizierung, &amp;quot;technischem&lt;br /&gt;
Kompetenzaufbau&amp;quot; sowie einer zentralen Stelle&lt;br /&gt;
(Kompetenzkompetenzzentrum) bringen. Wir dürfen gespannt.&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `Chaos Computer Club analysiert Staatstrojaner&lt;br /&gt;
  &amp;lt;http://www.ccc.de/de/updates/2011/staatstrojaner&amp;gt;`__&lt;br /&gt;
+ `Chaos Computer Club analysiert aktuelle Version des Staatstrojaners&lt;br /&gt;
  &amp;lt;http://www.ccc.de/de/updates/2011/analysiert-aktueller-&lt;br /&gt;
  staatstrojaner&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4901.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Kongress-Kino-28C3_Nr._39&amp;diff=9350</id>
		<title>Termin:Kongress-Kino-28C3 Nr. 39</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Kongress-Kino-28C3_Nr._39&amp;diff=9350"/>
		<updated>2012-10-01T01:17:13Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/10/03 20:00:00 PM |enddate=2012/10/03 22:00:00 PM |title=Kongress Kino Nr. 39 |visible=Yes }} Category:Chaotic-Congress-Cinema Category:Kongress-Kino...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/10/03 20:00:00 PM&lt;br /&gt;
|enddate=2012/10/03 22:00:00 PM&lt;br /&gt;
|title=Kongress Kino Nr. 39&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
[[Category:Kongress-Kino]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Kongress-Kino Kongress Kino].&lt;br /&gt;
&lt;br /&gt;
== Hacking MFPs ==   &lt;br /&gt;
Part2 - PostScript: Um, you&#039;ve been hacked&lt;br /&gt;
&lt;br /&gt;
We have decided to continue our research onto PostScript realms - an&lt;br /&gt;
old, very powerful and nicely designed programming language, where (as&lt;br /&gt;
a coincidence or not, given it&#039;s numerous security flaws) Adobe owns&lt;br /&gt;
most PostScript interpreters instances.&lt;br /&gt;
&lt;br /&gt;
This time we demonstrate that PostScript language, given it&#039;s power,&lt;br /&gt;
elegance and Turing-completeness, can be used more than just for&lt;br /&gt;
drawing dots, lines and circles - and to a certain extent it can be a&lt;br /&gt;
hacker&#039;s sweet delight if fully mastered.&lt;br /&gt;
&lt;br /&gt;
We will be presenting a real-life implementation of unusual PostScript&lt;br /&gt;
APIs (along with it&#039;s dissection and reconstructed documentation) that&lt;br /&gt;
interact with various levels of OS and HW, implementation we have&lt;br /&gt;
found in a TOP10 printer vendor product line.&lt;br /&gt;
&lt;br /&gt;
Also, we will investigate whether a PostScript-based (hence platform-&lt;br /&gt;
independent) virus (18+ years after first proposals of such theory)&lt;br /&gt;
can be acomplished, thus giving theoretical hints and few building&lt;br /&gt;
blocks in this direction.&lt;br /&gt;
&lt;br /&gt;
We will also present some very constructive uses of the PostScript&lt;br /&gt;
language in the creative (i.e. non-destructive) hacking direction.&lt;br /&gt;
&lt;br /&gt;
In the end, we will try to summarize our conclusions and possible&lt;br /&gt;
solution for all parties involved (vendors, users, sysadmins, security&lt;br /&gt;
experts).&lt;br /&gt;
&lt;br /&gt;
With this research we hope we can prove that entire printer industry&lt;br /&gt;
(devices, printing software/drivers/subsystems, publishing and managed&lt;br /&gt;
services) have to be rethought security-wise, so that it can withstand&lt;br /&gt;
in the long run the current security landscape and threats.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Hacking MFPs (part2) - PostScript: Um, you&#039;ve been hacked&amp;quot;&lt;br /&gt;
&lt;br /&gt;
We started our research in early 2010 as a state-of-affairs&lt;br /&gt;
investigation of the general security related to printers and printing&lt;br /&gt;
protocols&amp;amp;subsystem.&lt;br /&gt;
&lt;br /&gt;
We have concluded and demonstrated that using malicious documents and&lt;br /&gt;
applets, it is possible using the PJL protocol to control certain&lt;br /&gt;
printer functionality, including malicious content upload/download on&lt;br /&gt;
printers&#039; storage.&lt;br /&gt;
&lt;br /&gt;
As a side effect of the research, several other directions in&lt;br /&gt;
printers&#039; industry shown prone to malicious attacks (XSS injection and&lt;br /&gt;
execution, auth-bypass, unauthorized functionality and content access,&lt;br /&gt;
etc.)&lt;br /&gt;
&lt;br /&gt;
Incidentally, very same period, Stuxnet abused printing subsystems to&lt;br /&gt;
spread itself and few other printer researches emerged in various&lt;br /&gt;
directions (PJL password and hard disk abuse, confidential/password&lt;br /&gt;
data harvesting, Linux-based firmware rev-eng).&lt;br /&gt;
&lt;br /&gt;
All these apparently separate events, just come to prove once again&lt;br /&gt;
that printers are not forgotten, they spark revived hacking interest&lt;br /&gt;
and their (mis)use can be harmful and have long-standing effects on&lt;br /&gt;
one&#039;s eneterprise security.&lt;br /&gt;
&lt;br /&gt;
============================================&lt;br /&gt;
&lt;br /&gt;
We have decided to continue our research onto PostScript realms - an&lt;br /&gt;
old, very powerful and nicely designed programming language, where (as&lt;br /&gt;
a coincidence or not, given it&#039;s numerous security flaws) Adobe owns&lt;br /&gt;
most PostScript interpreters instances.&lt;br /&gt;
&lt;br /&gt;
This time we demonstrate that PostScript language, given it&#039;s power,&lt;br /&gt;
elegance and Turing-completeness, can be used more than just for&lt;br /&gt;
drawing dots, lines and circles - and to a certain extent it can be a&lt;br /&gt;
hacker&#039;s sweet delight if fully mastered.&lt;br /&gt;
&lt;br /&gt;
We will be presenting a real-life implementation of unusual PostScript&lt;br /&gt;
APIs (along with it&#039;s dissection and reconstructed documentation) that&lt;br /&gt;
interact with various levels of OS and HW, implementation we have&lt;br /&gt;
found in a TOP10 printer vendor product line.&lt;br /&gt;
&lt;br /&gt;
Also, we will investigate whether a PostScript-based (hence platform-&lt;br /&gt;
independent) virus (18+ years after first proposals of such theory)&lt;br /&gt;
can be acomplished, thus giving theoretical hints and few building&lt;br /&gt;
blocks in this direction.&lt;br /&gt;
&lt;br /&gt;
We will also present some very constructive uses of the PostScript&lt;br /&gt;
language in the creative (i.e. non-destructive) hacking direction.&lt;br /&gt;
&lt;br /&gt;
In the end, we will try to summarize our conclusions and possible&lt;br /&gt;
solution for all parties involved (vendors, users, sysadmins, security&lt;br /&gt;
experts).&lt;br /&gt;
&lt;br /&gt;
With this research we hope we can prove that entire printer industry&lt;br /&gt;
(devices, printing software/drivers/subsystems, publishing and managed&lt;br /&gt;
services) have to be rethought security-wise, so that it can withstand&lt;br /&gt;
in the long run the current security landscape and threats.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4871.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4871-en-hacking_mfps_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sachsen dreht frei ==   &lt;br /&gt;
On- und Offline-berwachung: Weil sie es knnen&lt;br /&gt;
&lt;br /&gt;
Die Meldungen aus Sachsen in diesem Jahr wirkten für alle, die nicht&lt;br /&gt;
dort wohnen, ein bisschen, als kämen sie von einem sehr weit&lt;br /&gt;
entfernten Stern. In regelmäßigen Abständen werden Dinge bekannt, die&lt;br /&gt;
jeweils einzeln früher zum Rücktritt von Ministern geführt hätten.&lt;br /&gt;
Funkzellenabfrage, §129-Verfahren, die Durchsuchung eines Pfarrers,&lt;br /&gt;
Aberkennung der Immunität eines Fraktionsvorsitzenden wegen&lt;br /&gt;
Rädelführerschaft: umfassende Kriminalisierung von Protesten gegen&lt;br /&gt;
Nazis, und zwar weit bis in die &amp;quot;Mitte der Gesellschaft&amp;quot;. Offline-&lt;br /&gt;
Überwachung und -Drangsalierung sind in Sachsen Alltag. Der Talk gibt&lt;br /&gt;
einen Überblick über den Stand der Dinge und warnt davor, sich&lt;br /&gt;
(außerhalb Sachsens) gemütlich schaudernd zurückzulehnen. Denn: Wenn&lt;br /&gt;
Sachsen damit durchkommt, setzt das Maßstäbe für andere Bundesländer.&lt;br /&gt;
&lt;br /&gt;
Die Meldungen aus Sachsen in diesem Jahr wirkten für alle, die nicht&lt;br /&gt;
dort wohnen, ein bisschen, als kämen sie von einem weit entfernten&lt;br /&gt;
Stern. In regelmäßigen Abständen werden Dinge bekannt, die jeweils&lt;br /&gt;
einzeln früher zum Rücktritt von Ministern geführt hätten. Die&lt;br /&gt;
Funkzellenabfrage (&amp;quot;Handygate&amp;quot;), ein oder mehrere §129-Verfahren, die&lt;br /&gt;
Durchsuchung eines Pfarrers, Aberkennung der Immunität eines&lt;br /&gt;
Fraktionsvorsitzenden wegen Rädelführerschaft: umfassende&lt;br /&gt;
Kriminalisierung von Protesten gegen Nazis, und zwar weit bis in die&lt;br /&gt;
&amp;quot;Mitte der Gesellschaft&amp;quot;. Inzwischen gibt es Klagen von Betroffenen&lt;br /&gt;
gegen die Auswertung ihrer Handy-Daten, u.a. von JournalistInnen,&lt;br /&gt;
RechtsanwältInnen, Abgeordneten.&lt;br /&gt;
&lt;br /&gt;
Auf der Bundesebene wurden einzelne drastische Grundrechtseingriffe&lt;br /&gt;
vom Verfassungsgericht korrigiert mit dem Ergebnis, dass bei vielen&lt;br /&gt;
das beruhigende Gefühl blieb, dass irgendwie doch alles mit rechten&lt;br /&gt;
Dingen zugeht. Ob die sächsischen Gerichte denselben Weg gehen, wird&lt;br /&gt;
sich zeigen. Ganz offensichtlich ist jedenfalls, dass die sächsischen&lt;br /&gt;
Behörden sich von Kritik nicht beeindrucken lassen.&lt;br /&gt;
&lt;br /&gt;
Der Talk gibt einen Überblick über den Stand der Dinge und warnt&lt;br /&gt;
davor, sich (außerhalb Sachsens) gemütlich schaudernd zurückzulehnen.&lt;br /&gt;
Denn: Wenn Sachsen damit durchkommt, setzt das auch Maßstäbe für&lt;br /&gt;
andere Bundesländer.&lt;br /&gt;
&lt;br /&gt;
U.a. betroffen von der Ermittlungswut sächsischer Behörden ist der&lt;br /&gt;
Jenaer Pfarrer Lothar König. Wer für ihn spenden möchte, kann das hier&lt;br /&gt;
tun:&lt;br /&gt;
&lt;br /&gt;
JG-Stadtmitte Förderkreis Kontonummer: 80 25 320 Bankleitzahl: 520&lt;br /&gt;
60410 Evangelische Kreditgenossenschaft&lt;br /&gt;
&lt;br /&gt;
Das Spendenkonto für die sächsischen Betroffenen der §129-Verfahren:&lt;br /&gt;
&lt;br /&gt;
Rote Hilfe Dresden Konto: 609760434 BLZ 36010043, Postbank Essen&lt;br /&gt;
Stichwort: Verfahren 129 Verwendungszweck: “Prozesskostenhilfe”&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4876.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4876-de-die_spinnen_die_sachsen_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._38&amp;diff=9260</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 38</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._38&amp;diff=9260"/>
		<updated>2012-09-20T19:20:54Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/09/26 20:30:00 PM |enddate=2012/09/26 22:00:00 PM |title=Chaotic Congress Cinema Nr. 38 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/09/26 20:30:00 PM&lt;br /&gt;
|enddate=2012/09/26 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 38&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Fnord-Jahresrckblick ==   &lt;br /&gt;
von Atomendlager bis Zensus&lt;br /&gt;
&lt;br /&gt;
Auch dieses Jahr werden wir euch wieder mit den Fnords des Jahres zu&lt;br /&gt;
unterhalten suchen.&lt;br /&gt;
&lt;br /&gt;
Im Format einer lockeren Abendshow werden wir die Highlights des&lt;br /&gt;
Jahres präsentieren, die Meldungen zwischen den Meldungen, die&lt;br /&gt;
subtilen Sensationen hinter den Schlagzeilen. Kommen Sie, hören Sie,&lt;br /&gt;
sehen Sie! Lassen Sie sich mitreißen!&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4866.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4866-de-fnord_jahresrueckblick_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== TRESOR: Festplatten sicher verschlsseln ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Herkömmliche Festplattenverschlüsselungen legen notwendige Schlüssel&lt;br /&gt;
im RAM ab. Dadurch sind sie schutzlos Angriffen wie Cold-Boot Attacken&lt;br /&gt;
ausgeliefert, die auf den Arbeitsspeicher abzielen. TRESOR bietet&lt;br /&gt;
Schutz gegen solche Angriffe.&lt;br /&gt;
&lt;br /&gt;
Herkömmliche Festplattenverschlüsselungen legen notwendige Schlüssel&lt;br /&gt;
im RAM ab. Dadurch sind sie schutzlos Angriffen wie Cold-Boot Attacken&lt;br /&gt;
ausgeliefert, die auf den Arbeitsspeicher abzielen. TRESOR bietet&lt;br /&gt;
Schutz gegen solche Angriffe, indem es den Verschlüsselungsalgorithmus&lt;br /&gt;
AES ausschließlich auf dem Prozessor ausführt. Die Sicherheit wird&lt;br /&gt;
also dadurch erhöht, dass TRESOR den Schlüssel (sowie alle&lt;br /&gt;
Rundenschlüssel und Zwischenzustände von AES) niemals im RAM&lt;br /&gt;
hinterlegt, sondern nur in Registern der CPU. Während der gesamten&lt;br /&gt;
Betriebszeit gelangen somit keine kritischen Daten der Verschlüsselung&lt;br /&gt;
in den Arbeitsspeicher.&lt;br /&gt;
&lt;br /&gt;
TRESOR ist als Patch für den Linux Kernel umgesetzt und nutzt Intel&#039;s&lt;br /&gt;
AES-NI Instruktionen um die AES-Verschlüsselung zu beschleunigen. Zur&lt;br /&gt;
Speicherung des Schlüssels werden die Debugging-Register der x86-64&lt;br /&gt;
Architektur &amp;quot;zweckentfremdet&amp;quot;. TRESOR ist kompatibel mit allen Linux-&lt;br /&gt;
Distributionen und etwaige Performance-Einbußen sind vernachlässigbar.&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `TRESOR Runs Encryption Securely Outside RAM &amp;lt;http://www1.informatik&lt;br /&gt;
  .uni-erlangen.de/tresor&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4869.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4869-de-tresor_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._37&amp;diff=9233</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 37</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._37&amp;diff=9233"/>
		<updated>2012-09-18T21:52:03Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot;{{Termin |date=2012/09/19 20:00:00 PM |enddate=2012/09/19 22:00:00 PM |title=Chaotic Congress Cinema Nr. 37 |visible=Yes }} Category:Chaotic-Congress-Cinema   == The coming w...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Termin&lt;br /&gt;
|date=2012/09/19 20:00:00 PM&lt;br /&gt;
|enddate=2012/09/19 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 37&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The coming war on general computation ==   &lt;br /&gt;
The copyright war was just the beginning&lt;br /&gt;
&lt;br /&gt;
The last 20 years of Internet policy have been dominated by the&lt;br /&gt;
copyright war, but the war turns out only to have been a skirmish. The&lt;br /&gt;
coming century will be dominated by war against the general purpose&lt;br /&gt;
computer, and the stakes are the freedom, fortune and privacy of the&lt;br /&gt;
entire human race.&lt;br /&gt;
&lt;br /&gt;
The problem is twofold: first, there is no known general-purpose&lt;br /&gt;
computer that can execute all the programs we can think of except the&lt;br /&gt;
naughty ones; second, general-purpose computers have replaced every&lt;br /&gt;
other device in our world. There are no airplanes, only computers that&lt;br /&gt;
fly. There are no cars, only computers we sit in. There are no hearing&lt;br /&gt;
aids, only computers we put in our ears. There are no 3D printers,&lt;br /&gt;
only computers that drive peripherals. There are no radios, only&lt;br /&gt;
computers with fast ADCs and DACs and phased-array antennas.&lt;br /&gt;
Consequently anything you do to &amp;quot;secure&amp;quot; anything with a computer in&lt;br /&gt;
it ends up undermining the capabilities and security of every other&lt;br /&gt;
corner of modern human society.&lt;br /&gt;
&lt;br /&gt;
And general purpose computers *can* cause harm -- whether it&#039;s&lt;br /&gt;
printing out AR15 components, causing mid-air collisions, or snarling&lt;br /&gt;
traffic. So the number of parties with legitimate grievances against&lt;br /&gt;
computers are going to continue to multiply, as will the cries to&lt;br /&gt;
regulate PCs.&lt;br /&gt;
&lt;br /&gt;
The primary regulatory impulse is to use combinations of code-signing&lt;br /&gt;
and other &amp;quot;trust&amp;quot; mechanisms to create computers that run programs&lt;br /&gt;
that users can&#039;t inspect or terminate, that run without users&#039; consent&lt;br /&gt;
or knowledge, and that run even when users don&#039;t want them to.&lt;br /&gt;
&lt;br /&gt;
The upshot: a world of ubiquitous malware, where everything we do to&lt;br /&gt;
make things better only makes it worse, where the tools of liberation&lt;br /&gt;
become tools of oppression.&lt;br /&gt;
&lt;br /&gt;
Our duty and challenge is to devise systems for mitigating the harm of&lt;br /&gt;
general purpose computing without recourse to spyware, first to keep&lt;br /&gt;
ourselves safe, and second to keep computers safe from the regulatory&lt;br /&gt;
impulse.&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `Bio Cory Doctorow &amp;lt;http://craphound.com/bio.php&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4848.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4848-en-the_coming_war_on_general_computation_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The engineering part of social engineering ==   &lt;br /&gt;
Why just lying your way in won&#039;t get you anywhere&lt;br /&gt;
&lt;br /&gt;
All the talks i saw about SE so far just showed which good SE&#039;s the&lt;br /&gt;
speakers are. I try to do another approach, what if i get in and don&#039;t&lt;br /&gt;
know what to do then. The talk is about the reconn. before the&lt;br /&gt;
assessment, the different approaches of SE. Which techniques can one&lt;br /&gt;
use, how to do a proper intel. and what is useful. How things work and&lt;br /&gt;
more important why. Which skill set should one have before entering a&lt;br /&gt;
engagement. And last but not least how do one counter a SE attack.&lt;br /&gt;
&lt;br /&gt;
Preface:&lt;br /&gt;
&lt;br /&gt;
Needed Skillset:&lt;br /&gt;
&lt;br /&gt;
-physical (ie.NLP)&lt;br /&gt;
&lt;br /&gt;
-logical Customer Preparation:&lt;br /&gt;
&lt;br /&gt;
-theoretical models of attack&lt;br /&gt;
&lt;br /&gt;
-check customer needs by his business&lt;br /&gt;
&lt;br /&gt;
-Contract&lt;br /&gt;
&lt;br /&gt;
Preparation &amp;amp; Reconnaissance:&lt;br /&gt;
&lt;br /&gt;
-threat modeling&lt;br /&gt;
&lt;br /&gt;
-physical&lt;br /&gt;
&lt;br /&gt;
-logical&lt;br /&gt;
&lt;br /&gt;
Project Planing:&lt;br /&gt;
&lt;br /&gt;
-Storyboard&lt;br /&gt;
&lt;br /&gt;
-the target&lt;br /&gt;
&lt;br /&gt;
-infiltration&lt;br /&gt;
&lt;br /&gt;
-fetching data/reaching the target&lt;br /&gt;
&lt;br /&gt;
-exfiltrate&lt;br /&gt;
&lt;br /&gt;
-backup plans&lt;br /&gt;
&lt;br /&gt;
Infiltration:&lt;br /&gt;
&lt;br /&gt;
Find &amp;amp; fetch the data:&lt;br /&gt;
&lt;br /&gt;
Exfiltrate the data:&lt;br /&gt;
&lt;br /&gt;
Writing report:&lt;br /&gt;
&lt;br /&gt;
Business impact analyses:&lt;br /&gt;
&lt;br /&gt;
customer meeting:&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `the slide deck &amp;lt;http://www.slideshare.net/theAluc/28c3-version-of-&lt;br /&gt;
  the-engineering-part-of-social-engineering&amp;gt;`__&lt;br /&gt;
+ `http:// &amp;lt;http://&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4856.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4856-en-the_engineering_part_of_social_engineering_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._36&amp;diff=9090</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 36</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._36&amp;diff=9090"/>
		<updated>2012-09-07T23:08:16Z</updated>

		<summary type="html">&lt;p&gt;Muelli: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Termin&lt;br /&gt;
|date=2012/09/12 20:00:00 PM&lt;br /&gt;
|enddate=2012/09/12 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 36&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== EU-Datenschutz und das Internet der Dinge ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Derzeit arbeitet die EU-Kommission an der Modernisierung der&lt;br /&gt;
Datenschutzrichtlinie. Dieser Beitrag informiert über den Stand der&lt;br /&gt;
Dinge.&lt;br /&gt;
&lt;br /&gt;
Derzeit arbeitet die EU-Kommission an der Aktualisierung der&lt;br /&gt;
Datenschutzrichtlinie, um den bestehenden Rechtsrahmen nach 15 Jahren&lt;br /&gt;
an die neuen technischen und gesellschaftlichen Gegebenheiten&lt;br /&gt;
anzupassen. Gleichzeitig werden in einer Expertengruppe der EU-&lt;br /&gt;
Kommission die Herausforderungen an den Datenschutz erörtert, die sich&lt;br /&gt;
im Zusammenhang mit dem Internet der Dinge ergeben.&lt;br /&gt;
&lt;br /&gt;
Dieser Beitrag informiert über den aktuellen Stand der Dinge auf&lt;br /&gt;
europäischer Ebene und diskutiert mit den TeilnehmerInnen die&lt;br /&gt;
Positionen, die European Digital Rights (EDRi) in diesen Bereichen&lt;br /&gt;
vertritt.&lt;br /&gt;
&lt;br /&gt;
(Nach Verfügbarkeit wird dieser Beitrag gemeinsam mit anderen EDRi-&lt;br /&gt;
AktivistInnen gestaltet; Arbeitssprache Englisch ist möglich.)&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4844.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4844-de-eu_datenschutz_internet_der_dinge_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering USB Devices ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While USB devices often use standard device classes, some do not. This&lt;br /&gt;
talk is about reverse engineering the protocols some of these devices&lt;br /&gt;
use, how the underlying USB protocol gives us some help, and some&lt;br /&gt;
interesting patterns to look for. I&#039;ll also detail the thought&lt;br /&gt;
processes that went into reverse engineering the Kinect&#039;s audio&lt;br /&gt;
protocol.&lt;br /&gt;
&lt;br /&gt;
This talk will narrate the process of reverse engineering the Kinect&lt;br /&gt;
audio protocol – analyzing a set of USB logs, finding patterns,&lt;br /&gt;
building understanding, developing hypotheses of message structure,&lt;br /&gt;
and eventually implementing a userspace driver.&lt;br /&gt;
&lt;br /&gt;
I&#039;ll also cover how the USB standard can help a reverse engineer out,&lt;br /&gt;
some common design ideas that I&#039;ve seen, and ideas for the sorts of&lt;br /&gt;
tools that could assist in completing this kind of task more&lt;br /&gt;
efficiently.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4847.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4847-en-reverse_engineering_usb_devices_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._36&amp;diff=9089</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 36</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._36&amp;diff=9089"/>
		<updated>2012-09-07T22:53:07Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot;== EU-Datenschutz und das Internet der Dinge ==      Derzeit arbeitet die EU-Kommission an der Modernisierung der Datenschutzrichtlinie. Dieser Beitrag informiert über den Stand...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== EU-Datenschutz und das Internet der Dinge ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Derzeit arbeitet die EU-Kommission an der Modernisierung der&lt;br /&gt;
Datenschutzrichtlinie. Dieser Beitrag informiert über den Stand der&lt;br /&gt;
Dinge.&lt;br /&gt;
&lt;br /&gt;
Derzeit arbeitet die EU-Kommission an der Aktualisierung der&lt;br /&gt;
Datenschutzrichtlinie, um den bestehenden Rechtsrahmen nach 15 Jahren&lt;br /&gt;
an die neuen technischen und gesellschaftlichen Gegebenheiten&lt;br /&gt;
anzupassen. Gleichzeitig werden in einer Expertengruppe der EU-&lt;br /&gt;
Kommission die Herausforderungen an den Datenschutz erörtert, die sich&lt;br /&gt;
im Zusammenhang mit dem Internet der Dinge ergeben.&lt;br /&gt;
&lt;br /&gt;
Dieser Beitrag informiert über den aktuellen Stand der Dinge auf&lt;br /&gt;
europäischer Ebene und diskutiert mit den TeilnehmerInnen die&lt;br /&gt;
Positionen, die European Digital Rights (EDRi) in diesen Bereichen&lt;br /&gt;
vertritt.&lt;br /&gt;
&lt;br /&gt;
(Nach Verfügbarkeit wird dieser Beitrag gemeinsam mit anderen EDRi-&lt;br /&gt;
AktivistInnen gestaltet; Arbeitssprache Englisch ist möglich.)&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4844.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4844-de-eu_datenschutz_internet_der_dinge_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reverse Engineering USB Devices ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While USB devices often use standard device classes, some do not. This&lt;br /&gt;
talk is about reverse engineering the protocols some of these devices&lt;br /&gt;
use, how the underlying USB protocol gives us some help, and some&lt;br /&gt;
interesting patterns to look for. I&#039;ll also detail the thought&lt;br /&gt;
processes that went into reverse engineering the Kinect&#039;s audio&lt;br /&gt;
protocol.&lt;br /&gt;
&lt;br /&gt;
This talk will narrate the process of reverse engineering the Kinect&lt;br /&gt;
audio protocol – analyzing a set of USB logs, finding patterns,&lt;br /&gt;
building understanding, developing hypotheses of message structure,&lt;br /&gt;
and eventually implementing a userspace driver.&lt;br /&gt;
&lt;br /&gt;
I&#039;ll also cover how the USB standard can help a reverse engineer out,&lt;br /&gt;
some common design ideas that I&#039;ve seen, and ideas for the sorts of&lt;br /&gt;
tools that could assist in completing this kind of task more&lt;br /&gt;
efficiently.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4847.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4847-en-reverse_engineering_usb_devices_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._24&amp;diff=6438</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 24</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._24&amp;diff=6438"/>
		<updated>2012-05-31T13:23:54Z</updated>

		<summary type="html">&lt;p&gt;Muelli: + Warnung an die potentiellen Teilnehmer&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Termin&lt;br /&gt;
|date=2012/06/20 20:30:00 PM&lt;br /&gt;
|enddate=2012/06/20 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 24&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Achtung: Der Projektor ist eingeschickt, die Teilnehmer muessen sich als eine Loesung zum Schauen der Videos engineeren (i.e. auf dem eigenen Laptop oder so).&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== 802.11 Packets in Packets ==   &lt;br /&gt;
A Standard-Compliant Exploit of Layer 1&lt;br /&gt;
&lt;br /&gt;
New to 2011, Packet-in-Packet exploits allow for injection of raw&lt;br /&gt;
radio frames into remote wireless networks. In these exploits, an&lt;br /&gt;
attacker crafts a string that when transmitted over the air creates&lt;br /&gt;
the symbols of a complete and valid radio packet. When radio&lt;br /&gt;
interference damages the beginning of the outer packet, the receiver&lt;br /&gt;
is tricked into seeing only the inner packet, allowing a frame to be&lt;br /&gt;
remotely injected. The attacker requires no radio, and injection&lt;br /&gt;
occurs without a software or hardware bug.&lt;br /&gt;
&lt;br /&gt;
This lecture presents the first implementation of Packet-in-Packet&lt;br /&gt;
injection for 802.11B, allowing malicious PHY-Layer frames to be&lt;br /&gt;
remotely injected. The attack is standards-compliant and compatible&lt;br /&gt;
with all vendors and drivers.&lt;br /&gt;
&lt;br /&gt;
Unlike the simpler implementations for 802.15.4 and 2FSK, 802.11B&lt;br /&gt;
presents a number of unique challenges to the PIP implementer. A&lt;br /&gt;
single packet can use up to three symbol sets and three data-rates,&lt;br /&gt;
switching rates once within the header and a second time for the&lt;br /&gt;
beginning of the body. Additionally, a 7-bit scrambler randomizes the&lt;br /&gt;
encoding of each packet, so the same string of text can be represented&lt;br /&gt;
128 different ways at the exact same rate and encoding.&lt;br /&gt;
&lt;br /&gt;
This lecture presents the first implementation of Packet-in-Packet&lt;br /&gt;
injection for 802.11B, allowing malicious PHY-Layer frames to be&lt;br /&gt;
remotely injected. The attack is standards-compliant and compatible&lt;br /&gt;
with all vendors and drivers.&lt;br /&gt;
&lt;br /&gt;
As a demo, we intend to present a malicious string which can be&lt;br /&gt;
embedded in any file with lots of slack space, such as an ISO image.&lt;br /&gt;
When this image is downloaded over HTTP on 802.11B, beacon frames will&lt;br /&gt;
be injected. For the demo, we will be injecting the SSID stack buffer&lt;br /&gt;
overflow frames from Uninformed Volume 6.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4766.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4766-en-802_11_packets_in_packets_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Log Visualization with a Correlation Engine ==   &lt;br /&gt;
What&#039;s inside your network?&lt;br /&gt;
&lt;br /&gt;
This brief session focuses on the visualization of actual security&lt;br /&gt;
incidents, network forensics and counter surveillance of covert&lt;br /&gt;
criminal communications utilizing large data sets from various&lt;br /&gt;
security logs and a very brief introduction to correlation engine&lt;br /&gt;
logic. Visually displaying security or network issues can express the&lt;br /&gt;
risk or urgency in a way a set of dry logs or other methods might not&lt;br /&gt;
be able to. Additionally, many organizations rely on a more singular&lt;br /&gt;
approach and react to security events, many times from a high false&lt;br /&gt;
positive rate source such as isolated intrusion prevention or firewall&lt;br /&gt;
alerts, or relying only on anti-virus alerts. Utilizing a correlation&lt;br /&gt;
engine (especially open source) or similar applications could offer a&lt;br /&gt;
method of discovering or in some cases proactively detecting issues.&lt;br /&gt;
The research discussed involves analysis and interrogation of&lt;br /&gt;
firewall, intrusion detection and prevention systems, web proxy logs&lt;br /&gt;
and available security research. What does a compromised server&lt;br /&gt;
infected with spam malware look like or cyber warfare?&lt;br /&gt;
&lt;br /&gt;
A 20 minute presentation of data visualization and investigation&lt;br /&gt;
scenarios of five actual issues discovered using various security logs&lt;br /&gt;
and a correlation engine. The lecturer will take you on a visual&lt;br /&gt;
journey from seemingly mundane entries in firewall logs through to&lt;br /&gt;
detecting covert communications between a corporate web server and a&lt;br /&gt;
cyber-criminal drop zone. Additional visualizations presented: a&lt;br /&gt;
United Kingdom based portion of the South Korean DNS Distributed&lt;br /&gt;
Denial of Service attacks of July/August 2008, what bypassing deep&lt;br /&gt;
packet inspection using HTTPS/SSL/TLS looks like, detecting a rouge&lt;br /&gt;
corporate email server, malicious DNS usage and more. Although the&lt;br /&gt;
presenter used a commercial correlation engine, the presentation will&lt;br /&gt;
conclude with the discussion of an open source correlation engine.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4767.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4767-en-security_log_visualization_with_a_correlation_engine_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._23&amp;diff=6437</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 23</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._23&amp;diff=6437"/>
		<updated>2012-05-31T13:23:40Z</updated>

		<summary type="html">&lt;p&gt;Muelli: + Warnung an die potentiellen Teilnehmer&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Termin&lt;br /&gt;
|date=2012/06/13 20:00:00 PM&lt;br /&gt;
|enddate=2012/06/13 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 23&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Achtung: Der Projektor ist eingeschickt, die Teilnehmer muessen sich als eine Loesung zum Schauen der Videos engineeren (i.e. auf dem eigenen Laptop oder so).&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== The Science of Insecurity ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Why is the overwhelming majority of common networked software still&lt;br /&gt;
not secure, despite all effort to the contrary? Why is it almost&lt;br /&gt;
certain to get exploited so long as attackers can craft its inputs?&lt;br /&gt;
Why is it the case that no amount of effort seems to be enough to fix&lt;br /&gt;
software that must speak certain protocols?&lt;br /&gt;
&lt;br /&gt;
The answer to these questions is that for many protocols and services&lt;br /&gt;
currently in use on the Internet, the problem of recognizing and&lt;br /&gt;
validating their &amp;quot;good&amp;quot;, expected inputs from bad ones is either not&lt;br /&gt;
well-posed or is undecidable (i. e., no algorithm can exist to solve&lt;br /&gt;
it in the general case), which means that their implementations cannot&lt;br /&gt;
even be comprehensively tested, let alone automatically checked for&lt;br /&gt;
weaknesses or correctness. The designers&#039; desire for more&lt;br /&gt;
functionality has made these protocols effectively unsecurable.&lt;br /&gt;
&lt;br /&gt;
In this talk we&#039;ll draw a direct connection between this ubiquitous&lt;br /&gt;
insecurity and basic computer science concepts of Turing completeness&lt;br /&gt;
and theory of languages. We will show how well-meant protocol designs&lt;br /&gt;
are doomed to their implementations becoming clusters of 0-days, and&lt;br /&gt;
will show where to look for these 0-days. We will also discuss simple&lt;br /&gt;
principles of how to avoid designing such protocols.&lt;br /&gt;
&lt;br /&gt;
In memory of Len Sassaman&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4763.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4763-en-the_science_of_insecurity_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Automatic Algorithm Invention with a GPU ==   &lt;br /&gt;
Hell Yeah, it&#039;s rocket science&lt;br /&gt;
&lt;br /&gt;
You write software. You test software. You know how to tell if the&lt;br /&gt;
software is working. Automate your software testing sufficiently and&lt;br /&gt;
you can let the computer do the writing for you! &amp;quot;Genetic&lt;br /&gt;
Programming&amp;quot;, especially &amp;quot;Cartesian Genetic Programming&amp;quot; (CGP), is a&lt;br /&gt;
powerful tool for creating software and designing physical objects.&lt;br /&gt;
See how to do CGP as we invent image filters for the Part Time&lt;br /&gt;
Scientists&#039; 3D cameras. Danger: Actual code will be shown!&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4764.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4764-en-automatic_algorithm_invention_with_a_gpu_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._22&amp;diff=6436</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 22</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._22&amp;diff=6436"/>
		<updated>2012-05-31T13:22:52Z</updated>

		<summary type="html">&lt;p&gt;Muelli: + Warnung an die potentiellen Teilnehmer&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Termin&lt;br /&gt;
|date=2012/06/06 20:30:00 PM&lt;br /&gt;
|enddate=2012/06/06 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 22&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Achtung: Der Projektor ist eingeschickt, die Teilnehmer muessen also Initiative ergreifen und sich eine Loesung zum Schauen der Videos engineeren (i.e. auf dem eigenen Laptop oder so).&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== ChokePointProject - Quis custodiet ipsos custodes? ==   &lt;br /&gt;
Aggregating and Visualizing (lack of) Transparancy Data in near-&lt;br /&gt;
realtime&lt;br /&gt;
&lt;br /&gt;
The object of the lecture is to present and discuss the&lt;br /&gt;
chokepointproject. How it (will) attempt(s) to aggregate and visualize&lt;br /&gt;
near-realtime global internetwork data and augment this visualisation&lt;br /&gt;
with legislative, commercial(ownership) and circumvention information.&lt;br /&gt;
&lt;br /&gt;
The goals of the project are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#. Provide a global early warning system against governmental or&lt;br /&gt;
   commercial abuse of internetworking systems in regards to civil and&lt;br /&gt;
   human rights.&lt;br /&gt;
#. Enforce transparency by aggregating commercial ownership&lt;br /&gt;
   information.&lt;br /&gt;
#. Enforce transparency by aggregating legislative information,&lt;br /&gt;
   including voting histories.&lt;br /&gt;
#. Enable lobbyist to influence legislators by providing reliable,&lt;br /&gt;
   verifiable data.&lt;br /&gt;
#. Provide a public database with near real-time network monitoring&lt;br /&gt;
   data for general use.&lt;br /&gt;
#. Provide up to date circumvention methodologies, their relative&lt;br /&gt;
   legal status and their potential risks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The chokepointproject currently consists of two elements :&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#. A frontend and public database,&lt;br /&gt;
#. An intended globally distributed network monitoring data collection&lt;br /&gt;
   system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The frontend intends to provide an easily understandable visualisation&lt;br /&gt;
of aggregated and processed data-sources. The data-sources intend to&lt;br /&gt;
provide the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#. A per country detailed description of: 1a. Network ownership (by IP&lt;br /&gt;
   block and route) 1b. Legislative information such as Which relevant&lt;br /&gt;
   laws are currently active. Who has voted for them (supposing voting&lt;br /&gt;
   was a part of the process). Which relevant laws are currently under&lt;br /&gt;
   review or being proposed. Who are proposing/drafting these laws. 1c.&lt;br /&gt;
   What circumvention methods are currently available for specific&lt;br /&gt;
   problems.&lt;br /&gt;
#. Near real-time network status vitalisations such as, but not&lt;br /&gt;
   restricted to 2a. Connectivity of geographic clusters, &amp;gt; 2b.&lt;br /&gt;
   Manipulation of connectivity such as: 2b.1. Traffic shaping, 2b.2.&lt;br /&gt;
   Content filtering, 2b.3. Blackouts.&amp;lt; p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The intended globally distributed network monitoring data collection&lt;br /&gt;
system would provide an independent and publicly available dataset. I&lt;br /&gt;
do not intend to discuss this in depth. The focus of this lecture is&lt;br /&gt;
supposed to be the front-end and the aggregation of already publicly&lt;br /&gt;
available data sources, and the supposed benefit to improving civil&lt;br /&gt;
rights everywhere and protecting them in those places where their&lt;br /&gt;
functional effectiveness is under threat.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4760.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4760-en-chokepointproject_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== New Ways I&#039;m Going to Hack Your Web App ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Writing secure code is hard. Even when people do it basically right&lt;br /&gt;
there are sometimes edge cases that can be exploited. Most the time&lt;br /&gt;
writing code that works isn’t even the hard part, it’s keeping up with&lt;br /&gt;
the changing attack techniques while still keeping an eye on all the&lt;br /&gt;
old issues that can come back to bite you, straddling the ancient&lt;br /&gt;
world of the 90’s RFCs and 2010’s HTML5 compatible browsers. A lot&lt;br /&gt;
like how Indiana Jones bridges the ancient and the modern... Except&lt;br /&gt;
for Indiana Jones 4. Let’s never talk about that again. Ever. Take&lt;br /&gt;
Facebook, Office 365, Wordpress, Exchange, and Live. These are&lt;br /&gt;
applications that had decent mitigations to standard threats, but they&lt;br /&gt;
all had edge cases. Using a mix of old and new ingredients, we’ll&lt;br /&gt;
provide a sampler plate of clickjacking protection bypasses, CSRF&lt;br /&gt;
mitigation bypasses, &amp;quot;non-exploitable&amp;quot; XSS attacks that are suddenly&lt;br /&gt;
exploitable and XML attacks where you can actually get a shell; and&lt;br /&gt;
we&#039;ll talk about how to defend against these attacks.&lt;br /&gt;
&lt;br /&gt;
The best description is probably via the slides linked below. We&#039;ve&lt;br /&gt;
put a lot of effort into these, and they have video clips making the&lt;br /&gt;
slide deck pretty big (why we&#039;re linking to it and not attaching it).&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4761.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4761-en-new_ways_im_going_to_hack_your_web_app_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._28&amp;diff=5217</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 28</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._28&amp;diff=5217"/>
		<updated>2012-04-11T17:47:10Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/07/18 20:00:00 PM |enddate=2012/07/18 22:00:00 PM |title=Chaotic Congress Cinema Nr. 28 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/07/18 20:00:00 PM&lt;br /&gt;
|enddate=2012/07/18 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 28&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Datenvieh oder Daten-Fee ==   &lt;br /&gt;
Welchen Wert haben Trackingdaten?&lt;br /&gt;
&lt;br /&gt;
Eine nüchterne Untersuchung der Verfahren zum Nutzertracking und des&lt;br /&gt;
wirtschaftlichen Wertes von Tracking- und Userdaten.&lt;br /&gt;
&lt;br /&gt;
Das Tracking von Nutzerinteraktionen ist heute das Rückrad eines&lt;br /&gt;
großen Teils der Online-Wirtschaft. Für Nutzer und Aussenstehende&lt;br /&gt;
findet diese Wertschöpfung im Verborgenen statt. Aus quantitativen&lt;br /&gt;
Daten werden mittels Datamining qualitative Daten aggregiert. Und die&lt;br /&gt;
Wirtschaft erdenkt ständig neue Methoden, die Erhebung zu verbessern&lt;br /&gt;
und Methoden, die Erhebung zu verschleiern.&lt;br /&gt;
&lt;br /&gt;
Der Vortrag fasst kurz die verschiedenen Möglichkeiten der Erhebung&lt;br /&gt;
zusammen und widmet sich dann ausführlich der Frage, welchen Wert die&lt;br /&gt;
einzelnen Interaktionen tatsächlich haben. Die beteiligten Branchen&lt;br /&gt;
werden dargestellt und es wird beschrieben, welchen Weg die Daten von&lt;br /&gt;
ihrem Ursprung zu welchen Abnehmern nehmen.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4788.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4788-de-datenvieh_oder_daten_fee_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sovereign Keys ==   &lt;br /&gt;
A proposal for fixing attacks on CAs and DNSSEC&lt;br /&gt;
&lt;br /&gt;
This talk will describe the Sovereign Key system, an EFF proposal for&lt;br /&gt;
improving the security of SSL/TLS connections against attacks that&lt;br /&gt;
involve Certificate Authorities (CAs) or portions of the DNSSEC&lt;br /&gt;
hierarchy.&lt;br /&gt;
&lt;br /&gt;
The design stores persistent name-to-key mappings in a semi-&lt;br /&gt;
centralised, append-only data structure. It allows domain owners to&lt;br /&gt;
deploy operational TLS keys without trusting any third parties&lt;br /&gt;
whatsoever, and gives clients a reliable way to verify those keys. The&lt;br /&gt;
design can also be used to automatically circumvent a large portion of&lt;br /&gt;
server impersonation and man-in-the-middle attacks, avoiding the need&lt;br /&gt;
for confusing certificate warnings, which users will often click&lt;br /&gt;
through even when they are under attack.&lt;br /&gt;
&lt;br /&gt;
The Sovereign Key design bootstraps from and reinforces either CA-&lt;br /&gt;
signed certificates or DANE/DNSSEC as a method of publishing and&lt;br /&gt;
verifying TLS servers&#039; public keys. Conceptually, it provides&lt;br /&gt;
functionality similar to what could be obtained if HTTPS servers could&lt;br /&gt;
publish special headers saying &amp;quot;in the future, all new public keys for&lt;br /&gt;
this domain will be cross-signed by this key: XXX&amp;quot;, but the design&lt;br /&gt;
includes a number of necessary additional features, including a secure&lt;br /&gt;
revocation mechanism, protection against false headers that an&lt;br /&gt;
attacker could publish after compromising an HTTPS server, and support&lt;br /&gt;
for protocols other than HTTPS (SMTPS, POP3S, IMAPS, XMPPS, etc).&lt;br /&gt;
&lt;br /&gt;
Sovereign Keys allow clients to detect server impersonation and man-&lt;br /&gt;
in-the-middle attacks even if the attack involves compromise or malice&lt;br /&gt;
by a CA or DNSSEC registry. But Sovereign Keys also allow for&lt;br /&gt;
automatic circumvention of these attacks via proxies, VPNs, or Tor&lt;br /&gt;
hidden services.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4798.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4798-en-sovereign_keys_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._27&amp;diff=5216</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 27</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._27&amp;diff=5216"/>
		<updated>2012-04-11T17:46:59Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/07/11 20:00:00 PM |enddate=2012/07/11 22:00:00 PM |title=Chaotic Congress Cinema Nr. 27 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/07/11 20:00:00 PM&lt;br /&gt;
|enddate=2012/07/11 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 27&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Print Me If You Dare ==   &lt;br /&gt;
Firmware Modification Attacks and the Rise of Printer Malware&lt;br /&gt;
&lt;br /&gt;
Network printers are ubiquitous fixtures within the modern IT&lt;br /&gt;
infrastructure. Residing within sensitive networks and lacking in&lt;br /&gt;
security, these devices represent high-value targets that can&lt;br /&gt;
theoretically be used not only to manipulate and exfiltrate the&lt;br /&gt;
sensitive information such as network credentials and sensitive&lt;br /&gt;
documents, but also as fully functional general-purpose bot-nodes&lt;br /&gt;
which give attackers a stealthy, persistent foothold inside the victim&lt;br /&gt;
network for further recognizance, exploitation and exfiltration.&lt;br /&gt;
&lt;br /&gt;
We first present several generic firmware modification attacks against&lt;br /&gt;
HP printers. Weaknesses within the firmware update process allows the&lt;br /&gt;
attacker to make arbitrary modifications to the NVRAM contents of the&lt;br /&gt;
device. The attacks we present exploit a functional vulnerability&lt;br /&gt;
common to all HP printers, and do not depend on any specific code&lt;br /&gt;
vulnerability. These attacks cannot be prevented by any authentication&lt;br /&gt;
mechanism on the printer, and can be delivered over the network,&lt;br /&gt;
either directly or through a print server (active attack) and as&lt;br /&gt;
hidden payloads within documents (reflexive attack).&lt;br /&gt;
&lt;br /&gt;
In order to demonstrate these firmware modification attacks, we&lt;br /&gt;
present a detailed description of several common HP firmware RFU&lt;br /&gt;
(remote firmware update) formats, including the general file format,&lt;br /&gt;
along with the compression and checksum algorithms used. Furthermore,&lt;br /&gt;
we will release a tool (HPacker), which can unpack existing RFUs and&lt;br /&gt;
create/pack arbitrary RFUs. This information was obtained by analysis&lt;br /&gt;
of publicly available RFUs as well as reverse engineering the SPI&lt;br /&gt;
BootRom contents of several printers.&lt;br /&gt;
&lt;br /&gt;
Next, we describe the design and operation a sophisticated piece of&lt;br /&gt;
malware for HP (P2050) printers. Essentially a VxWorks rootkit, this&lt;br /&gt;
malware is equipped with: port scanner, covert reverse-IP proxy,&lt;br /&gt;
print-job snooper that can monitor, intercept, manipulate and&lt;br /&gt;
exfiltrate incoming print-jobs, a live code update mechanism, and more&lt;br /&gt;
(see presentation outline below). Lastly, we will demonstrate a self-&lt;br /&gt;
propagation mechanism, turning this malware into a full-blown printer&lt;br /&gt;
worm.&lt;br /&gt;
&lt;br /&gt;
Using HPacker, we demonstrate the injection of our malware into&lt;br /&gt;
arbitrary P2050 RFUs, and show how similar malware can be created for&lt;br /&gt;
other popular HP printer types. Next, we demonstrate the delivery of&lt;br /&gt;
this modified firmware update over the network to a fully locked-down&lt;br /&gt;
printer.&lt;br /&gt;
&lt;br /&gt;
Lastly, we present an accurate distribution of all HP printers&lt;br /&gt;
vulnerable to our attack, as determined by our global embedded device&lt;br /&gt;
vulnerability scanner (see [1]). Our scan is still incomplete, but&lt;br /&gt;
extrapolating from available data, we estimate that there exist at&lt;br /&gt;
least 100,000 HP printers that can be compromised through an active&lt;br /&gt;
attack, and several million devices that can be compromised through&lt;br /&gt;
reflexive attacks. We will present a detailed breakdown of the&lt;br /&gt;
geographical and organizational distribution of observable vulnerable&lt;br /&gt;
printers in the world.&lt;br /&gt;
&lt;br /&gt;
*We have also unpacked several engine-control processor firmwares&lt;br /&gt;
(different from the main SoC) and are currently attempting to locate&lt;br /&gt;
code related to tracking dots. Perhaps we will have some results by&lt;br /&gt;
December. In any case, HPacker will help the community to do further&lt;br /&gt;
research in this direction, possibly allowing us to spoof / disable&lt;br /&gt;
these yellow dots of burden.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4780.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4780-en-print_me_if_you_dare_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deceiving Authorship Detection ==   &lt;br /&gt;
Tools to Maintain Anonymity Through Writing Style &amp;amp; Current Trends in&lt;br /&gt;
Adversarial Stylometry&lt;br /&gt;
&lt;br /&gt;
Stylometry is the art of detecting authorship of a document based on&lt;br /&gt;
the linguistic style present in the text. As authorship recognition&lt;br /&gt;
methods based on machine learning have improved, they have also&lt;br /&gt;
presented a threat to privacy and anonymity. We have developed two&lt;br /&gt;
open-source tools, Stylo and Anonymouth, which we will release at 28C3&lt;br /&gt;
and introduce in this talk. Anonymouth aids individuals in obfuscating&lt;br /&gt;
documents to protect identity from authorship analysis. Stylo is a&lt;br /&gt;
machine-learning based authorship detection research tool that&lt;br /&gt;
provides the basis for Anonymouth&#039;s decision making. We will also&lt;br /&gt;
review the problem of stylometry and the privacy implications and&lt;br /&gt;
present new research related to detecting writing style deception,&lt;br /&gt;
threats to anonymity in short message services like Twitter, examine&lt;br /&gt;
the implications for languages other than English, and release a large&lt;br /&gt;
adversarial stylometry corpus for linguistic and privacy research&lt;br /&gt;
purposes.&lt;br /&gt;
&lt;br /&gt;
Stylometry is the study of authorship recognition based on linguistic&lt;br /&gt;
style (word choice, punctuation, syntax, etc). Adversarial stylometry&lt;br /&gt;
examines authorship recognition in the context of privacy and&lt;br /&gt;
anonymity though attempts to circumvent stylometry with passages&lt;br /&gt;
intended to obfuscate or imitate identity.&lt;br /&gt;
&lt;br /&gt;
This talk will introduce the open source authorship recognition and&lt;br /&gt;
obfuscation projects Anonymouth and Stylo. Anonymouth aids individuals&lt;br /&gt;
in obfuscating their writing style in order to maintain anonymity&lt;br /&gt;
against multiple forms of machine learning based authorship&lt;br /&gt;
recognition techniques. The basis for this tool is Stylo, an&lt;br /&gt;
authorship recognition research tool that implements multiple forms of&lt;br /&gt;
state-of-the-art stylometry methods. Anonymouth uses Stylo to attempt&lt;br /&gt;
authorship recognition and suggest changes to a document that will&lt;br /&gt;
obfuscate the identity of the author to the known set of authorship&lt;br /&gt;
recognition techniques.&lt;br /&gt;
&lt;br /&gt;
We will also cover our recent work in the field of adversarial&lt;br /&gt;
authorship recognition in the two years since our 26C3 talk, &amp;quot;Privacy&lt;br /&gt;
&amp;amp; Stylometry: Practical Attacks Against Authorship Recognition&lt;br /&gt;
Techniques.&amp;quot; Our lab has new research on detecting deception in&lt;br /&gt;
writing style that may indicate a modified document, demonstrating up&lt;br /&gt;
to 86% accuracy in detecting the presence of deceptive writing styles.&lt;br /&gt;
Short messages have been difficult to assign authorship to but recent&lt;br /&gt;
work from our lab demonstrates the threat to anonymity present in&lt;br /&gt;
short message services like Twitter. We have found that while&lt;br /&gt;
difficult, it is possible to identify authors of tweets with success&lt;br /&gt;
rates significantly higher than random chance. We also have new&lt;br /&gt;
results that examine the ability of authorship recognition to succeed&lt;br /&gt;
across languages and the use of translation to thwart detection.&lt;br /&gt;
&lt;br /&gt;
This talk will also mark the release of an adversarial stylometry data&lt;br /&gt;
set that is many times larger than our previous release. This data&lt;br /&gt;
set, provided by volunteers, includes at least 6500 words per author&lt;br /&gt;
of unmodified writing as well as sample adversarial passages intended&lt;br /&gt;
to preserve the anonymity of the author and demographic information&lt;br /&gt;
for each author.&lt;br /&gt;
&lt;br /&gt;
The content of this talk will be relevant to those with interest in&lt;br /&gt;
novel issues in privacy and anonymity, forensics and anti-forensics,&lt;br /&gt;
and machine learning. All of the work presented here is from the&lt;br /&gt;
Privacy, Security and Automation Lab at Drexel University. Founded in&lt;br /&gt;
2008, our lab focuses on the use of machine learning to augment&lt;br /&gt;
privacy and security decision making.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4781.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4781-en-deceiving_authorship_detection_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._26&amp;diff=5215</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 26</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._26&amp;diff=5215"/>
		<updated>2012-04-11T17:46:52Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/07/04 19:00:00 PM |enddate=2012/07/04 22:00:00 PM |title=Chaotic Congress Cinema Nr. 26 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/07/04 19:00:00 PM&lt;br /&gt;
|enddate=2012/07/04 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 26&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Hacker Jeopardy ==   &lt;br /&gt;
Number guessing for geeks&lt;br /&gt;
&lt;br /&gt;
The Hacker Jeopardy is a quiz show.&lt;br /&gt;
&lt;br /&gt;
The well known reversed quiz format, but of course hacker style. It&lt;br /&gt;
once was entitled &amp;quot;number guessing for geeks&amp;quot; by a German publisher,&lt;br /&gt;
which of course is an unfair simplification. It&#039;s also guessing of&lt;br /&gt;
letters and special characters. ;)&lt;br /&gt;
&lt;br /&gt;
Three initial rounds will be played, the winners will compete with&lt;br /&gt;
each other in the final.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4775.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4775-de-hacker_jeopardy_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== r0ket++ ==   &lt;br /&gt;
The CCC-Badge&lt;br /&gt;
&lt;br /&gt;
Now you&#039;ve got that r0ket thing. What to do with it?&lt;br /&gt;
&lt;br /&gt;
If you have a r0ket, bring it to our talk! We will try to play a game&lt;br /&gt;
of pong with every participant. You need the l0dable r_game to join&lt;br /&gt;
the fun :) As we won&#039;t be using cryptokeys, you&#039;ll need the new 28c3&lt;br /&gt;
firmware so the l0dable will run and everything else works.&lt;br /&gt;
&lt;br /&gt;
For CCCamp 2011 we designed r0ket with team r0ket. Besides being a&lt;br /&gt;
shiny electronic name tag, the r0ket is an easy to use full featured&lt;br /&gt;
microcontroller development board. 3000 r0kets were given to the&lt;br /&gt;
participants, to be creative. At Camp we already told you about the&lt;br /&gt;
journey to getting everything ready.&lt;br /&gt;
&lt;br /&gt;
In r0ket++ we will tell you what happened since camp and what we&lt;br /&gt;
learned from moving the whole production of r0ket to China. You will&lt;br /&gt;
get more information about writing your own software for r0ket. And&lt;br /&gt;
finally you will find out, what your r0ket does at 28c3: Besides using&lt;br /&gt;
r0ket as a rem0te, you can participate in an openBeacon based&lt;br /&gt;
tracking.&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `r0ket wiki &amp;lt;http://r0ket.badge.events.ccc.de/&amp;gt;`__&lt;br /&gt;
+ `28c3 firmware, howto &amp;lt;http://r0ket.badge.events.ccc.de/init&amp;gt;`__&lt;br /&gt;
+ `r0ket soup &amp;lt;http://r0ket.soup.io/&amp;gt;`__&lt;br /&gt;
+ `cccamp11 r0ket talk&lt;br /&gt;
  &amp;lt;http://http://media.ccc.de/browse/conferences/camp2011/cccamp11-4564&lt;br /&gt;
  -r0ket-en.html&amp;gt;`__&lt;br /&gt;
+ `git &amp;lt;http://https://github.com/r0ket/r0ket&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4777.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4777-en-r0ket_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._25&amp;diff=5214</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 25</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._25&amp;diff=5214"/>
		<updated>2012-04-11T17:46:44Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/06/27 20:30:00 PM |enddate=2012/06/27 22:00:00 PM |title=Chaotic Congress Cinema Nr. 25 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/06/27 20:30:00 PM&lt;br /&gt;
|enddate=2012/06/27 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 25&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Eating in the Anthropocene ==   &lt;br /&gt;
Transgenic Fish, Mutagenic Grapefruits and Space Potatoes&lt;br /&gt;
&lt;br /&gt;
Over the last few years hackers have begun to take a larger interest&lt;br /&gt;
in food, gastronomy and agriculture. For many in the community the&lt;br /&gt;
ability to create DIY molecular gastronomy hardware and recipes is an&lt;br /&gt;
obvious entry point. This talk extends some of these early&lt;br /&gt;
investigations beyond the kitchen and the chemical properties of food&lt;br /&gt;
by looking at specific cultivars, food technology organizations, and&lt;br /&gt;
connections between food systems, ecosystems and planetary change.&lt;br /&gt;
&lt;br /&gt;
Part 1 of the talk explores some of the more bizarre and interesting&lt;br /&gt;
biotechnologies and genomes that make up the human food system on&lt;br /&gt;
planet earth, including Chinese Space Potatoes, Mutagenic Grapefruits&lt;br /&gt;
and Glowing Sushi.&lt;br /&gt;
&lt;br /&gt;
Pat 2 of the talk presents ideas of food system redesign particularly&lt;br /&gt;
relevant to hackers and food explorers: utopian cuisines, resilient&lt;br /&gt;
biotechnologies and eaters as agents of selection.&lt;br /&gt;
&lt;br /&gt;
In Part 3 we provide access to resources and propose interesting&lt;br /&gt;
projects for black hat food hackers, DIY BIO foodies, and prospective&lt;br /&gt;
food security researchers, such as mining the IAEA&#039;s database of&lt;br /&gt;
radiation breeding, eating things that weren&#039;t meant to be eaten and&lt;br /&gt;
defending agricultural biodiversity.&lt;br /&gt;
&lt;br /&gt;
By introducing less known stories from the history of food and&lt;br /&gt;
technology, and providing access to resources we hope to get more&lt;br /&gt;
hackers curious about exploring, questioning and redesigning our human&lt;br /&gt;
food systems.&lt;br /&gt;
&lt;br /&gt;
BIO: Zack Denfeld &amp;amp; Cathrine Kramer run the Center for Genomic&lt;br /&gt;
Gastronomy an independent research institute that studies the genomes&lt;br /&gt;
and biotechnologies that make up the human food systems on the planet.&lt;br /&gt;
They are currently in residence at Art Science Bangalore and a&lt;br /&gt;
curating a show on the future of food at the Science Gallery in Dublin&lt;br /&gt;
Ireland.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4768.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4768-en-eating_in_the_anthropocene_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Don&#039;t scan, just ask ==   &lt;br /&gt;
A new approach of identifying vulnerable web applications&lt;br /&gt;
&lt;br /&gt;
For years, we tried to identify vulnerable systems in company networks&lt;br /&gt;
by getting all the companies netblocks / ip addresses and scanning&lt;br /&gt;
them for vulnerable services. Then with the growing importance of web&lt;br /&gt;
applications and of course search engines, a new way of identifying&lt;br /&gt;
vulnerable systems was introduced: &amp;quot;Google hacking&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
However this approach of identifying and scanning companies ip&lt;br /&gt;
addresses as well as doing some Google hacking for the (known) URLs of&lt;br /&gt;
the company doesn&#039;t take all aspects into account and has some&lt;br /&gt;
limitations. At first we just check the systems which are obvious, the&lt;br /&gt;
ones that are in the companies netblocks, the IP addresses that were&lt;br /&gt;
provided by the company and the URLs that are known or can be resolved&lt;br /&gt;
using reverse DNS. However how about URLs and systems that aren&#039;t&lt;br /&gt;
obvious? Systems maybe even the company in focus forgot? Second, the&lt;br /&gt;
current techniques are pretty technical. They don&#039;t take the business&lt;br /&gt;
view into account at any point.&lt;br /&gt;
&lt;br /&gt;
Therefore we developed a new technique as well as framework to&lt;br /&gt;
identify companies’ web pages based on a scored keyword list. In other&lt;br /&gt;
words: From zero to owning all of a company’s existing web pages, even&lt;br /&gt;
the pages not hosted by the company itself, with just a scored keyword&lt;br /&gt;
list as input.&lt;br /&gt;
&lt;br /&gt;
Systems that are hosted by third parties, web pages that were just&lt;br /&gt;
released for a marketing campaign, maybe even by a third party&lt;br /&gt;
marketing company but within the name of the company we want to check?&lt;br /&gt;
Possibly not even the company does remember all the web applications&lt;br /&gt;
and domains that are running under his name. These&lt;br /&gt;
systems/applications won’t be detected using traditional techniques&lt;br /&gt;
and thus impose a potential security risk for the company. Second, the&lt;br /&gt;
current techniques are pretty technical. They don&#039;t take the business&lt;br /&gt;
view into account. That means, we try to identify certain applications&lt;br /&gt;
using technical information like version banner or the comapnies ip&lt;br /&gt;
addresses in order to identify his systems. But how about the other&lt;br /&gt;
way around, trying to identify applications and systems by using the&lt;br /&gt;
company’s business data (e.g. product names, company names, tax&lt;br /&gt;
identification numbers, contact persons, …) and then test the&lt;br /&gt;
identified systems and applications for vulnerabilities?&lt;br /&gt;
&lt;br /&gt;
That is what we did. The idea is to build up a scored keyword list for&lt;br /&gt;
the company in focus. This list contains general keywords like the&lt;br /&gt;
company name, product names, more detailed keywords like an address&lt;br /&gt;
contained in imprints and very specific keywords like the companies&lt;br /&gt;
tax number. Every keyword in that list is then rated by human&lt;br /&gt;
intelligence. Which means specific keywords do have a higher scoring&lt;br /&gt;
than general keywords. In the next step a spider uses these keywords&lt;br /&gt;
to query search engines like bing, google, etc. for the keywords and&lt;br /&gt;
stores all the web sites URLs identified in a database with their&lt;br /&gt;
scoring. If a web site that already is in the database is found for&lt;br /&gt;
another keyword, just the score of that entry is increased. At the&lt;br /&gt;
end, we get a list of websites that contained one or more of the&lt;br /&gt;
keywords, along with a scoring for each web site. Then the URL is&lt;br /&gt;
taken and checked whether it contains one of the keywords (e.g.&lt;br /&gt;
company name). If this is the case, the scoring of the page is&lt;br /&gt;
increased again. Then for each entry the FQDN as well as the ip is&lt;br /&gt;
resolved and a whois query is executed. If that whois record does&lt;br /&gt;
contain the company name, the scoring is increased again. Furthermore&lt;br /&gt;
the country codes are used to remove results which are not in the&lt;br /&gt;
target country.&lt;br /&gt;
&lt;br /&gt;
At the end of that process, we do have a list of URLs and FQDNs that&lt;br /&gt;
could be found using company specific key words. Furthermore that list&lt;br /&gt;
is scored. Since during that process you get (based on your keyword&lt;br /&gt;
list) hundred thousands of unique hits, you have to minimize that&lt;br /&gt;
list. Therefore we did some research on the results generated and&lt;br /&gt;
found a decent way to minimize the results to an amount that can be&lt;br /&gt;
checked manually by a human. Then those identified company web pages&lt;br /&gt;
are passed to a crawler that just extracts external links from those&lt;br /&gt;
pages, with the idea that correct company pages might link to other&lt;br /&gt;
company pages, and integrates them to the results list. Using these&lt;br /&gt;
technique in practice it is possible to identify a lot of web sites&lt;br /&gt;
hosted (even by third parties) for one company.&lt;br /&gt;
&lt;br /&gt;
During the crawling process not just external links are extracted but&lt;br /&gt;
all forms, HTTP parameters as well as certain parts of the web content&lt;br /&gt;
are stored. Thus besides a list, we do have a &amp;quot;mirror&amp;quot; of the web page&lt;br /&gt;
as well as the forms and dynamic functions that pose an attack&lt;br /&gt;
surface.&lt;br /&gt;
&lt;br /&gt;
The information collected can then be used as input to special&lt;br /&gt;
analysis modules. For some of our projects we integrated WAFP (Web&lt;br /&gt;
Application Finger Printer), SQLMap and other well known tools as well&lt;br /&gt;
as some other self written fuzzers and fingerprinters into that&lt;br /&gt;
process. This way the whole process, from identifying web pages&lt;br /&gt;
belonging to a certain company up to analyzing those for&lt;br /&gt;
vulnerabilities can be totally automated.&lt;br /&gt;
&lt;br /&gt;
In other words: From zero to owning all of a company’s existing web&lt;br /&gt;
pages, even the pages not hosted by the company itself, with just a&lt;br /&gt;
scored keyword list as input.&lt;br /&gt;
&lt;br /&gt;
During our talk we will present our idea as well as our approach of&lt;br /&gt;
identifying vulnerable web applications that belong to a certain&lt;br /&gt;
company, based on business data. Furthermore we will explain how our&lt;br /&gt;
framework is structured and how it does the searching as well as the&lt;br /&gt;
vulnerability assessment in an automated way. So everybody who is&lt;br /&gt;
interested will be able to implement his own version or adapt certain&lt;br /&gt;
ideas for his projects. Besides just telling you how it could work, we&lt;br /&gt;
will also present our framework that performs all of the steps&lt;br /&gt;
described above automatically in a demo.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4770.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4770-en-dont_scan_just_ask_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._24&amp;diff=5213</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 24</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._24&amp;diff=5213"/>
		<updated>2012-04-11T17:46:38Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/06/20 20:30:00 PM |enddate=2012/06/20 22:00:00 PM |title=Chaotic Congress Cinema Nr. 24 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/06/20 20:30:00 PM&lt;br /&gt;
|enddate=2012/06/20 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 24&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== 802.11 Packets in Packets ==   &lt;br /&gt;
A Standard-Compliant Exploit of Layer 1&lt;br /&gt;
&lt;br /&gt;
New to 2011, Packet-in-Packet exploits allow for injection of raw&lt;br /&gt;
radio frames into remote wireless networks. In these exploits, an&lt;br /&gt;
attacker crafts a string that when transmitted over the air creates&lt;br /&gt;
the symbols of a complete and valid radio packet. When radio&lt;br /&gt;
interference damages the beginning of the outer packet, the receiver&lt;br /&gt;
is tricked into seeing only the inner packet, allowing a frame to be&lt;br /&gt;
remotely injected. The attacker requires no radio, and injection&lt;br /&gt;
occurs without a software or hardware bug.&lt;br /&gt;
&lt;br /&gt;
This lecture presents the first implementation of Packet-in-Packet&lt;br /&gt;
injection for 802.11B, allowing malicious PHY-Layer frames to be&lt;br /&gt;
remotely injected. The attack is standards-compliant and compatible&lt;br /&gt;
with all vendors and drivers.&lt;br /&gt;
&lt;br /&gt;
Unlike the simpler implementations for 802.15.4 and 2FSK, 802.11B&lt;br /&gt;
presents a number of unique challenges to the PIP implementer. A&lt;br /&gt;
single packet can use up to three symbol sets and three data-rates,&lt;br /&gt;
switching rates once within the header and a second time for the&lt;br /&gt;
beginning of the body. Additionally, a 7-bit scrambler randomizes the&lt;br /&gt;
encoding of each packet, so the same string of text can be represented&lt;br /&gt;
128 different ways at the exact same rate and encoding.&lt;br /&gt;
&lt;br /&gt;
This lecture presents the first implementation of Packet-in-Packet&lt;br /&gt;
injection for 802.11B, allowing malicious PHY-Layer frames to be&lt;br /&gt;
remotely injected. The attack is standards-compliant and compatible&lt;br /&gt;
with all vendors and drivers.&lt;br /&gt;
&lt;br /&gt;
As a demo, we intend to present a malicious string which can be&lt;br /&gt;
embedded in any file with lots of slack space, such as an ISO image.&lt;br /&gt;
When this image is downloaded over HTTP on 802.11B, beacon frames will&lt;br /&gt;
be injected. For the demo, we will be injecting the SSID stack buffer&lt;br /&gt;
overflow frames from Uninformed Volume 6.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4766.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4766-en-802_11_packets_in_packets_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Security Log Visualization with a Correlation Engine ==   &lt;br /&gt;
What&#039;s inside your network?&lt;br /&gt;
&lt;br /&gt;
This brief session focuses on the visualization of actual security&lt;br /&gt;
incidents, network forensics and counter surveillance of covert&lt;br /&gt;
criminal communications utilizing large data sets from various&lt;br /&gt;
security logs and a very brief introduction to correlation engine&lt;br /&gt;
logic. Visually displaying security or network issues can express the&lt;br /&gt;
risk or urgency in a way a set of dry logs or other methods might not&lt;br /&gt;
be able to. Additionally, many organizations rely on a more singular&lt;br /&gt;
approach and react to security events, many times from a high false&lt;br /&gt;
positive rate source such as isolated intrusion prevention or firewall&lt;br /&gt;
alerts, or relying only on anti-virus alerts. Utilizing a correlation&lt;br /&gt;
engine (especially open source) or similar applications could offer a&lt;br /&gt;
method of discovering or in some cases proactively detecting issues.&lt;br /&gt;
The research discussed involves analysis and interrogation of&lt;br /&gt;
firewall, intrusion detection and prevention systems, web proxy logs&lt;br /&gt;
and available security research. What does a compromised server&lt;br /&gt;
infected with spam malware look like or cyber warfare?&lt;br /&gt;
&lt;br /&gt;
A 20 minute presentation of data visualization and investigation&lt;br /&gt;
scenarios of five actual issues discovered using various security logs&lt;br /&gt;
and a correlation engine. The lecturer will take you on a visual&lt;br /&gt;
journey from seemingly mundane entries in firewall logs through to&lt;br /&gt;
detecting covert communications between a corporate web server and a&lt;br /&gt;
cyber-criminal drop zone. Additional visualizations presented: a&lt;br /&gt;
United Kingdom based portion of the South Korean DNS Distributed&lt;br /&gt;
Denial of Service attacks of July/August 2008, what bypassing deep&lt;br /&gt;
packet inspection using HTTPS/SSL/TLS looks like, detecting a rouge&lt;br /&gt;
corporate email server, malicious DNS usage and more. Although the&lt;br /&gt;
presenter used a commercial correlation engine, the presentation will&lt;br /&gt;
conclude with the discussion of an open source correlation engine.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4767.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4767-en-security_log_visualization_with_a_correlation_engine_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._23&amp;diff=5212</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 23</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._23&amp;diff=5212"/>
		<updated>2012-04-11T17:46:30Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/06/13 20:00:00 PM |enddate=2012/06/13 22:00:00 PM |title=Chaotic Congress Cinema Nr. 23 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/06/13 20:00:00 PM&lt;br /&gt;
|enddate=2012/06/13 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 23&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== The Science of Insecurity ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Why is the overwhelming majority of common networked software still&lt;br /&gt;
not secure, despite all effort to the contrary? Why is it almost&lt;br /&gt;
certain to get exploited so long as attackers can craft its inputs?&lt;br /&gt;
Why is it the case that no amount of effort seems to be enough to fix&lt;br /&gt;
software that must speak certain protocols?&lt;br /&gt;
&lt;br /&gt;
The answer to these questions is that for many protocols and services&lt;br /&gt;
currently in use on the Internet, the problem of recognizing and&lt;br /&gt;
validating their &amp;quot;good&amp;quot;, expected inputs from bad ones is either not&lt;br /&gt;
well-posed or is undecidable (i. e., no algorithm can exist to solve&lt;br /&gt;
it in the general case), which means that their implementations cannot&lt;br /&gt;
even be comprehensively tested, let alone automatically checked for&lt;br /&gt;
weaknesses or correctness. The designers&#039; desire for more&lt;br /&gt;
functionality has made these protocols effectively unsecurable.&lt;br /&gt;
&lt;br /&gt;
In this talk we&#039;ll draw a direct connection between this ubiquitous&lt;br /&gt;
insecurity and basic computer science concepts of Turing completeness&lt;br /&gt;
and theory of languages. We will show how well-meant protocol designs&lt;br /&gt;
are doomed to their implementations becoming clusters of 0-days, and&lt;br /&gt;
will show where to look for these 0-days. We will also discuss simple&lt;br /&gt;
principles of how to avoid designing such protocols.&lt;br /&gt;
&lt;br /&gt;
In memory of Len Sassaman&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4763.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4763-en-the_science_of_insecurity_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Automatic Algorithm Invention with a GPU ==   &lt;br /&gt;
Hell Yeah, it&#039;s rocket science&lt;br /&gt;
&lt;br /&gt;
You write software. You test software. You know how to tell if the&lt;br /&gt;
software is working. Automate your software testing sufficiently and&lt;br /&gt;
you can let the computer do the writing for you! &amp;quot;Genetic&lt;br /&gt;
Programming&amp;quot;, especially &amp;quot;Cartesian Genetic Programming&amp;quot; (CGP), is a&lt;br /&gt;
powerful tool for creating software and designing physical objects.&lt;br /&gt;
See how to do CGP as we invent image filters for the Part Time&lt;br /&gt;
Scientists&#039; 3D cameras. Danger: Actual code will be shown!&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4764.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4764-en-automatic_algorithm_invention_with_a_gpu_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._22&amp;diff=5211</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 22</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._22&amp;diff=5211"/>
		<updated>2012-04-11T17:46:24Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/06/06 20:30:00 PM |enddate=2012/06/06 22:00:00 PM |title=Chaotic Congress Cinema Nr. 22 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/06/06 20:30:00 PM&lt;br /&gt;
|enddate=2012/06/06 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 22&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== ChokePointProject - Quis custodiet ipsos custodes? ==   &lt;br /&gt;
Aggregating and Visualizing (lack of) Transparancy Data in near-&lt;br /&gt;
realtime&lt;br /&gt;
&lt;br /&gt;
The object of the lecture is to present and discuss the&lt;br /&gt;
chokepointproject. How it (will) attempt(s) to aggregate and visualize&lt;br /&gt;
near-realtime global internetwork data and augment this visualisation&lt;br /&gt;
with legislative, commercial(ownership) and circumvention information.&lt;br /&gt;
&lt;br /&gt;
The goals of the project are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#. Provide a global early warning system against governmental or&lt;br /&gt;
   commercial abuse of internetworking systems in regards to civil and&lt;br /&gt;
   human rights.&lt;br /&gt;
#. Enforce transparency by aggregating commercial ownership&lt;br /&gt;
   information.&lt;br /&gt;
#. Enforce transparency by aggregating legislative information,&lt;br /&gt;
   including voting histories.&lt;br /&gt;
#. Enable lobbyist to influence legislators by providing reliable,&lt;br /&gt;
   verifiable data.&lt;br /&gt;
#. Provide a public database with near real-time network monitoring&lt;br /&gt;
   data for general use.&lt;br /&gt;
#. Provide up to date circumvention methodologies, their relative&lt;br /&gt;
   legal status and their potential risks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The chokepointproject currently consists of two elements :&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#. A frontend and public database,&lt;br /&gt;
#. An intended globally distributed network monitoring data collection&lt;br /&gt;
   system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The frontend intends to provide an easily understandable visualisation&lt;br /&gt;
of aggregated and processed data-sources. The data-sources intend to&lt;br /&gt;
provide the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#. A per country detailed description of: 1a. Network ownership (by IP&lt;br /&gt;
   block and route) 1b. Legislative information such as Which relevant&lt;br /&gt;
   laws are currently active. Who has voted for them (supposing voting&lt;br /&gt;
   was a part of the process). Which relevant laws are currently under&lt;br /&gt;
   review or being proposed. Who are proposing/drafting these laws. 1c.&lt;br /&gt;
   What circumvention methods are currently available for specific&lt;br /&gt;
   problems.&lt;br /&gt;
#. Near real-time network status vitalisations such as, but not&lt;br /&gt;
   restricted to 2a. Connectivity of geographic clusters, &amp;gt; 2b.&lt;br /&gt;
   Manipulation of connectivity such as: 2b.1. Traffic shaping, 2b.2.&lt;br /&gt;
   Content filtering, 2b.3. Blackouts.&amp;lt; p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The intended globally distributed network monitoring data collection&lt;br /&gt;
system would provide an independent and publicly available dataset. I&lt;br /&gt;
do not intend to discuss this in depth. The focus of this lecture is&lt;br /&gt;
supposed to be the front-end and the aggregation of already publicly&lt;br /&gt;
available data sources, and the supposed benefit to improving civil&lt;br /&gt;
rights everywhere and protecting them in those places where their&lt;br /&gt;
functional effectiveness is under threat.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4760.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4760-en-chokepointproject_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== New Ways I&#039;m Going to Hack Your Web App ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Writing secure code is hard. Even when people do it basically right&lt;br /&gt;
there are sometimes edge cases that can be exploited. Most the time&lt;br /&gt;
writing code that works isn’t even the hard part, it’s keeping up with&lt;br /&gt;
the changing attack techniques while still keeping an eye on all the&lt;br /&gt;
old issues that can come back to bite you, straddling the ancient&lt;br /&gt;
world of the 90’s RFCs and 2010’s HTML5 compatible browsers. A lot&lt;br /&gt;
like how Indiana Jones bridges the ancient and the modern... Except&lt;br /&gt;
for Indiana Jones 4. Let’s never talk about that again. Ever. Take&lt;br /&gt;
Facebook, Office 365, Wordpress, Exchange, and Live. These are&lt;br /&gt;
applications that had decent mitigations to standard threats, but they&lt;br /&gt;
all had edge cases. Using a mix of old and new ingredients, we’ll&lt;br /&gt;
provide a sampler plate of clickjacking protection bypasses, CSRF&lt;br /&gt;
mitigation bypasses, &amp;quot;non-exploitable&amp;quot; XSS attacks that are suddenly&lt;br /&gt;
exploitable and XML attacks where you can actually get a shell; and&lt;br /&gt;
we&#039;ll talk about how to defend against these attacks.&lt;br /&gt;
&lt;br /&gt;
The best description is probably via the slides linked below. We&#039;ve&lt;br /&gt;
put a lot of effort into these, and they have video clips making the&lt;br /&gt;
slide deck pretty big (why we&#039;re linking to it and not attaching it).&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4761.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4761-en-new_ways_im_going_to_hack_your_web_app_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._21&amp;diff=5210</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 21</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._21&amp;diff=5210"/>
		<updated>2012-04-11T17:46:17Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/05/30 20:30:00 PM |enddate=2012/05/30 22:00:00 PM |title=Chaotic Congress Cinema Nr. 21 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/05/30 20:30:00 PM&lt;br /&gt;
|enddate=2012/05/30 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 21&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Ein Mittelsmannangriff auf ein digitales Signiergert ==   &lt;br /&gt;
Bachelorarbeit Informatik Uni Kiel SS 2011&lt;br /&gt;
&lt;br /&gt;
In dieser Arbeit wird gezeigt, wie unter Ausnutzung einer&lt;br /&gt;
ungesicherten Verbindung zwischen einer sicheren&lt;br /&gt;
Signaturerstellungseinheit und einem Anwender-PC eine qualifizierte&lt;br /&gt;
elektronische Signatur gefälscht werden kann.&lt;br /&gt;
&lt;br /&gt;
In der zum Vortrag gehörenden Bachelorarbeit habe habe ich ein&lt;br /&gt;
Signaturset der Deutschen Post bestehend aus Chipkartenterminal,&lt;br /&gt;
Chipkarte und Anwendungssoftware analysiert - und angegriffen. Dazu&lt;br /&gt;
wurde ein Gerät gebaut, dass sich in die USB-Leitung einschleifen&lt;br /&gt;
lässt und sich dort so lange transparent verhält, wie ein Angreifer&lt;br /&gt;
keine Daten signieren will. Der Angreifer kann per Funk auf das&lt;br /&gt;
eingeschleuste Gerät zugreifen, Daten zum Signieren ablegen und&lt;br /&gt;
signierte Daten abholen. Das ganze nutzt eine ungesicherte USB-&lt;br /&gt;
Verbindung zwischen Anwender-PC und Chipkartenterminal. Da der&lt;br /&gt;
Signaturprozess mit einer PIN-Eingabe gesichert ist, muss dem&lt;br /&gt;
Angreifer bei Verwendung der einfachsten Karte der Post leider einmal&lt;br /&gt;
eine Fehlermeldung angezeigt werden, um ihn dazu zu bewegen, die PIN&lt;br /&gt;
erneut einzugeben. Wie genau das ganze umgesetzt ist erfahrt ihr hier.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4758.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Open source music: Tracking 2.0 ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tracking is so 1990s. Nowadays MP3 and other similar formats are&lt;br /&gt;
overwhelmingly more popular. But is this really a step forward? A&lt;br /&gt;
(very) brief history of computer music, where we are at now, and why I&lt;br /&gt;
think people are headed in the wrong direction. And what we can do&lt;br /&gt;
about it.&lt;br /&gt;
&lt;br /&gt;
Distributing music as recordings is terribly limiting to hackers and&lt;br /&gt;
tinkerers. Music as *source code* makes dissection, modification and&lt;br /&gt;
reuse easier. I will introduce a prototype next-generation tracker for&lt;br /&gt;
the web, with the ultimate aim of being a way to not just create but&lt;br /&gt;
also distribute music, and to collaborate on music creation: Github&lt;br /&gt;
for music, if you will.&lt;br /&gt;
&lt;br /&gt;
As a music creation tool, trackers have been displaced in popularity&lt;br /&gt;
because they are:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Balky (arcane command+parameter syntax, steep learning curve, have&lt;br /&gt;
  slowly grown by accretion without regard to comprehensibility)&lt;br /&gt;
+ Underpowered (many useful DSP effects are unavailable)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As a music distribution tool, tracked formats have been displaced in&lt;br /&gt;
popularity because they are:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Not ubiquitous (people may not have playback software)&lt;br /&gt;
+ Underspecified (hence behaviour differs across implementations)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I believe all of these problems are soluble, and I&#039;m going to talk&lt;br /&gt;
about how. &amp;quot;modplayjs&amp;quot; (a working title which may well change by&lt;br /&gt;
December) is a tracker written in javascript. While capable of playing&lt;br /&gt;
existing module formats, it is primarily a playground for&lt;br /&gt;
experimenting with shedding two decades of accumulated baggage, and is&lt;br /&gt;
currently under heavy development.&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `current bleeding-edge demo&lt;br /&gt;
  &amp;lt;http://sphere.chronosempire.org.uk/~HEx/modplayjs/&amp;gt;`__&lt;br /&gt;
+ `source repository &amp;lt;https://gitorious.org/html5toys/modplayjs&amp;gt;`__&lt;br /&gt;
+ `slides &amp;lt;http://sphere.chronosempire.org.uk/~HEx/28c3/&amp;gt;`__&lt;br /&gt;
+ `fooble home page &amp;lt;http://fooble.org&amp;gt;`__&lt;br /&gt;
+ `http:// &amp;lt;http://&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4759.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4759-en-open_source_music_tracking_2_0_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._20&amp;diff=5209</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 20</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._20&amp;diff=5209"/>
		<updated>2012-04-11T17:46:10Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/05/23 20:00:00 PM |enddate=2012/05/23 22:00:00 PM |title=Chaotic Congress Cinema Nr. 20 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/05/23 20:00:00 PM&lt;br /&gt;
|enddate=2012/05/23 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 20&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Counterlobbying EU institutions ==   &lt;br /&gt;
How to attempt to counter the influence of industry lobbyists and&lt;br /&gt;
political forces aiming towards increasing control over the Internet&lt;br /&gt;
&lt;br /&gt;
Return of experience about opposing #censorship #ACTA #censilia&lt;br /&gt;
#copywrong and promoting #openness and #netneutrality to the EU&lt;br /&gt;
institutions.&lt;br /&gt;
&lt;br /&gt;
Strategic and tactical perspectives by two old and tired activists.&lt;br /&gt;
&lt;br /&gt;
The talk will be about how European citizens can empower themselves to&lt;br /&gt;
change the course of Internet Policy Making&lt;br /&gt;
&lt;br /&gt;
Using recent political discussions as an example, Jérémie and&lt;br /&gt;
Christian will try to explain how to involve yourself with hacking the&lt;br /&gt;
democratic process on a European level.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4755.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4755-en-counterlobbying_eu_institutions_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quantified-Self and OpenBCI Neurofeedback Mind-Hacking ==   &lt;br /&gt;
Transhumanism, Self-Optimization and Neurofeedback for post-modern&lt;br /&gt;
hackers&lt;br /&gt;
&lt;br /&gt;
Hacking Mind and Body – self knowledge through numbers and mental&lt;br /&gt;
reprogramming&lt;br /&gt;
&lt;br /&gt;
Since ancient times humans were trying to improve themselves. Today we&lt;br /&gt;
have open-source computer technology that helps us.&lt;br /&gt;
&lt;br /&gt;
Can we use Neurofeedback to increase your intelligence? How do we go&lt;br /&gt;
about answering the question? Trust the experts... Outsource&lt;br /&gt;
responsibility?! Maybe not: We create beliefs ourselves without&lt;br /&gt;
relying on authorities. We gather empiric evidence about changes of&lt;br /&gt;
our intelligence.&lt;br /&gt;
&lt;br /&gt;
In this talk we will speak about our own experience on going that way.&lt;br /&gt;
We will also speak about the results of other people in the growing&lt;br /&gt;
Quantified Self movement.&lt;br /&gt;
&lt;br /&gt;
As hackers we look beyond the obvious and directly apparent, behind&lt;br /&gt;
the curtain of the rabbit hole we find power to change reality. Let&#039;s&lt;br /&gt;
turn the hacking mindset onto ourselves or shall we say our &amp;quot;Optimized&lt;br /&gt;
Self&amp;quot;. Get an overview of the latest trends in &amp;quot;Quantified Self&amp;quot; Self-&lt;br /&gt;
Optimization, and mental techniques to level-up the projection of your&lt;br /&gt;
digital self in the matrix.&lt;br /&gt;
&lt;br /&gt;
Using automated modern computer systems and electronic sensors, we can&lt;br /&gt;
track the functions and changes of our mind and body and look into the&lt;br /&gt;
&amp;quot;Mirror of the Digital Self&amp;quot;. Analyzing, and finally optimizing, the&lt;br /&gt;
patterns we find, a new and optimized self can be envisioned, and&lt;br /&gt;
gradually metamorphed into, using scientific method and data mining&lt;br /&gt;
statistics.&lt;br /&gt;
== &amp;gt; &amp;lt;p&amp;gt;Join us in this talk about:&amp;lt; ==p&amp;gt; &lt;br /&gt;
&amp;gt; IQ measurement and lung self-tracking (Christian Kleineidam)&lt;br /&gt;
&lt;br /&gt;
&amp;gt; open-source Bio-Feedback (MeTaVoLuti0N)&amp;gt; Neurofeedback MindHacking&lt;br /&gt;
(MeTaVoLuti0N)&lt;br /&gt;
&lt;br /&gt;
Record work, sleep, exercise, diet, mood, mind, iq, brainwave states&lt;br /&gt;
and changes, and find out when and how you can function best and&lt;br /&gt;
achieve your goals in post-modern times.&lt;br /&gt;
&lt;br /&gt;
in the second part of the talk MetaMind Evolution will give an&lt;br /&gt;
overview about the OpenBCI open source brain/body/bio computer-&lt;br /&gt;
interface project, and after the event will help with your Brain-&lt;br /&gt;
Computer-Interface project, during workshops in the evening in the&lt;br /&gt;
HardwareHackingArea.&lt;br /&gt;
== &amp;gt; &amp;lt;p&amp;gt;Event image is based on GNU and OpenEEG GPL images, and under&lt;br /&gt;
CC BY-NC-SA 3.0 license.&amp;lt; ==p&amp;gt;            &lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4756.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._19&amp;diff=5208</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 19</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._19&amp;diff=5208"/>
		<updated>2012-04-11T17:46:03Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/05/16 20:00:00 PM |enddate=2012/05/16 22:00:00 PM |title=Chaotic Congress Cinema Nr. 19 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/05/16 20:00:00 PM&lt;br /&gt;
|enddate=2012/05/16 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 19&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== The movements against state-controlled Internet in Turkey ==   &lt;br /&gt;
A short account of its history and future challenges&lt;br /&gt;
&lt;br /&gt;
We are members of Alternatif Bilişim Derneği (Alternative Informatics&lt;br /&gt;
Association)**, one of many organizations that oppose the ongoing&lt;br /&gt;
efforts for state-controlled Internet in Turkey. We see that the&lt;br /&gt;
problems with media control in Turkey and in Europe are increasingly&lt;br /&gt;
becoming part of a global problem. The governments are working on&lt;br /&gt;
their own view of a &#039;secure&#039; Internet, and we have to articulate and&lt;br /&gt;
suggest an alternative.&lt;br /&gt;
&lt;br /&gt;
In our talk we want to give an account of our anti-censorship movement&lt;br /&gt;
and the challenges we face in Turkey. We will first provide an&lt;br /&gt;
overview of the political events; sanctions, censorship regulations&lt;br /&gt;
and attempts of resistance in the country. Then, we will point out the&lt;br /&gt;
main problems we face in making use of laws and technology against&lt;br /&gt;
state control. We would also like to use our presentation as an&lt;br /&gt;
opportunity to meet people at the CCC with similar affinities and to&lt;br /&gt;
learn from their experience. We see a great need to create global&lt;br /&gt;
networks and communities to articulate an alternative message; the&lt;br /&gt;
Internet as the peoples’ media.&lt;br /&gt;
&lt;br /&gt;
Ali Rıza Keleş* arkeles@alternatifbilisim.org&lt;br /&gt;
&lt;br /&gt;
Ayşe Kaymak aysakaymak@gmail.com&lt;br /&gt;
&lt;br /&gt;
Işık Barış Fidaner fidaner@gmail.com&lt;br /&gt;
&lt;br /&gt;
Seda Gürses sguerses@esat.kuleuven.be&lt;br /&gt;
&lt;br /&gt;
We are members of Alternatif Bilişim Derneği (Alternative Informatics&lt;br /&gt;
Association)**, one of many organizations that oppose the ongoing&lt;br /&gt;
efforts for state-controlled Internet in Turkey. We see that the&lt;br /&gt;
problems with media control in Turkey and in Europe are increasingly&lt;br /&gt;
becoming part of a global problem. The governments are working on&lt;br /&gt;
their own view of a &#039;secure&#039; Internet, and we have to articulate and&lt;br /&gt;
suggest an alternative.&lt;br /&gt;
&lt;br /&gt;
In our talk we want to give an account of our anti-censorship movement&lt;br /&gt;
and the challenges we face in Turkey. We will first provide an&lt;br /&gt;
overview of the political events; sanctions, censorship regulations&lt;br /&gt;
and attempts of resistance in the country. Then, we will point out the&lt;br /&gt;
main problems we face in making use of laws and technology against&lt;br /&gt;
state control. We would also like to use our presentation as an&lt;br /&gt;
opportunity to meet people at the CCC with similar affinities and to&lt;br /&gt;
learn from their experience. We see a great need to create global&lt;br /&gt;
networks and communities to articulate an alternative message; the&lt;br /&gt;
Internet as the peoples’ media.&lt;br /&gt;
&lt;br /&gt;
A short history&lt;br /&gt;
&lt;br /&gt;
Despite its growing economy, democracy and fundamental rights have&lt;br /&gt;
always been disputed in Turkey, where the shadow of the 1980 coup and&lt;br /&gt;
still unresolved Kurdish problem is strongly felt, with the state&lt;br /&gt;
persistently denying Kurdish citizens’ rights and repressing real&lt;br /&gt;
political opposition to canalize the people’s consent to the&lt;br /&gt;
authorized ‘official’ parties in the parliament. The coup in 1980 was&lt;br /&gt;
mainly used to implement liberal policies, and this process is near&lt;br /&gt;
completion: most state enterprises have been privatized in the last&lt;br /&gt;
decade, including Türk Telekom, the phone company and the single ISP&lt;br /&gt;
that owns the ADSL infrastructure in Turkey. In the same decade, the&lt;br /&gt;
Internet use became widespread. Yet, the increasing popularity of the&lt;br /&gt;
Internet has been accompanied by attempts to control it through&lt;br /&gt;
criminal sanctions.&lt;br /&gt;
&lt;br /&gt;
Until 2007, tens of thousands of websites had been blocked by courts&lt;br /&gt;
as ‘precaution’, including sites like Wordpress and YouTube. After the&lt;br /&gt;
Law 5651 in 2007, even more websites were censored directly by&lt;br /&gt;
government administration. As a response to this law, Sansüre Karşı&lt;br /&gt;
Platform (Platform Against Censorship) was organized. In the first&lt;br /&gt;
anti-censorship rally in 17 July 2010, nearly 3000 people&lt;br /&gt;
participated, including Internet youth, political parties, trade&lt;br /&gt;
unions, etc.&lt;br /&gt;
&lt;br /&gt;
Not long after the events in Tunisia and Egypt; the state institution&lt;br /&gt;
for telecommunication, Bilgi Teknolojileri ve İletişim Kurumu (BTK)&lt;br /&gt;
made a decision to force ISPs to provide unpaid Internet filters under&lt;br /&gt;
the headings &#039;children&#039;, &#039;family&#039; etc. This move created an enormous&lt;br /&gt;
reaction, the culmination of which led to a nationwide Internet&lt;br /&gt;
freedom rally in 15 May 2011 that took place in tens of cities. Alone&lt;br /&gt;
in Istanbul 60 thousand people marched against the imposed censorship&lt;br /&gt;
measures. What followed was a smearing campaign by controlled media&lt;br /&gt;
(including state TV) against the protesters, and a pseudo-governance&lt;br /&gt;
meeting with NGOs by BTK. After the general elections in June, the war&lt;br /&gt;
with PKK escalated, suppressing the BTK decision out of media&lt;br /&gt;
attention. Currently, DNS or IP blocking is used mostly for &#039;obscene&#039;&lt;br /&gt;
and in some cases for political websites.&lt;br /&gt;
&lt;br /&gt;
National security has always functioned as an excuse for the Turkish&lt;br /&gt;
state to introduce exceptions to a rule or to make the exception the&lt;br /&gt;
rule itself. An example is &#039;Ulusal Kripto Yönetmeliği&#039; (National&lt;br /&gt;
Crypto By-law) that was put in order in 2010. This by-law necessitates&lt;br /&gt;
‘official authorization’ for any encrypted communication by any&lt;br /&gt;
citizen, and also requires the citizens to give away their encryption&lt;br /&gt;
mechanisms and private keys to BTK for ‘storage’.&lt;br /&gt;
&lt;br /&gt;
In conclusion, we have reasons to believe that the government is&lt;br /&gt;
currently developing infrastructure to utilize methods like deep&lt;br /&gt;
packet inspection (DPI) as weapons in a &#039;cyberwar&#039;, possibly against&lt;br /&gt;
its own people. These methods will include monitoring and labeling of&lt;br /&gt;
Internet users as well as blocking communication. We made use of our&lt;br /&gt;
&#039;right to information&#039; to inquire about the plans for employing DPI,&lt;br /&gt;
but were ‘informed’ that this is &#039;beyond the limits our right to&lt;br /&gt;
information&#039;.&lt;br /&gt;
&lt;br /&gt;
Problems in using laws &amp;amp; technology against state control&lt;br /&gt;
&lt;br /&gt;
The greatest problems with respect to guaranteeing fundamental rights&lt;br /&gt;
in technology deployment and use currently are with how laws are made&lt;br /&gt;
and how they are enforced. The lawmaking process is exclusionist, only&lt;br /&gt;
including a few NGOs that can better be called QUANGOs (quasi-&lt;br /&gt;
autonomous non-governmental organizations). There are several&lt;br /&gt;
political parties and trade unions, but even their peaceful protests&lt;br /&gt;
are occasionally declared ‘unauthorized’ and considered illegal.&lt;br /&gt;
People in general do not trust the judiciary system, but are simply&lt;br /&gt;
unorganized and do not believe in their power. The regime bases its&lt;br /&gt;
legitimacy on ideology and not on lawful justice.&lt;br /&gt;
&lt;br /&gt;
Türk Telekom (TT), privatized in 2005, monopolizes the ADSL&lt;br /&gt;
infrastructure, making Internet services expensive and prone to state&lt;br /&gt;
control. In 2007, a workers&#039; strike in TT had triggered debates on&lt;br /&gt;
this monopoly being protected by the government. The company also acts&lt;br /&gt;
as a service provider in several domains, creating questions about net&lt;br /&gt;
neutrality.&lt;br /&gt;
&lt;br /&gt;
Another problem is with the limitation of how people can relate to&lt;br /&gt;
technology. Computers, cellphones and other gadgets are aggressively&lt;br /&gt;
marketed and widely used throughout the country, but the marketed&lt;br /&gt;
forms of use mostly remain superficial, e.g., these gadgets are&lt;br /&gt;
depicted as entertainment or as status symbols. We argue that the&lt;br /&gt;
hegemony of these consumerist cultural connotations do hamper diverse&lt;br /&gt;
uses of these products for a variety of motivations.&lt;br /&gt;
&lt;br /&gt;
A small community of Linux promoters have emerged around universities.&lt;br /&gt;
These groups could promote alternative approaches to technology.&lt;br /&gt;
However, under the usual political fears, they only articulate their&lt;br /&gt;
positions professionally. Their statements usually target Microsoft or&lt;br /&gt;
other big proprietary software companies. This position is compatible&lt;br /&gt;
with the officially accepted national pride and national security&lt;br /&gt;
positions in Turkey, and hence is limited to politics of technology&lt;br /&gt;
only (see Pardus project).&lt;br /&gt;
&lt;br /&gt;
Leftist and Kurdish political organizations are in a position to&lt;br /&gt;
benefit most from digital communication technologies. However, they&lt;br /&gt;
still lack the capacity and enthusiasm to use it effectively.&lt;br /&gt;
Alternative political media initiatives online exist, but they are&lt;br /&gt;
mostly limited to standard uses and their technical quality reflect&lt;br /&gt;
the lack of developers in the political community.&lt;br /&gt;
&lt;br /&gt;
In Turkey, engineering education is praised and supported by families.&lt;br /&gt;
Families make up for the lack of a financially strong social system.&lt;br /&gt;
The society in general also praises technical knowledge. However, a&lt;br /&gt;
strong barrier separates the &#039;educated people&#039; who are supposed to&lt;br /&gt;
know it, from &#039;regular people&#039; who are only supposed to consume it.&lt;br /&gt;
Under economic pressure and feeling indebted to their families, most&lt;br /&gt;
white collar workers dedicate themselves to their work in private&lt;br /&gt;
companies. There is some space in some universities for shared work&lt;br /&gt;
and creativity, but such spaces are getting smaller as most&lt;br /&gt;
universities are being turned into technical schools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Ali Rıza Keleş, Işık Barış Fidaner are software developers, Ayşe&lt;br /&gt;
  Kaymak is a lawyer from Istanbul. Seda Gürses is an Internet&lt;br /&gt;
  researcher from Brussels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** Alternatif Bilişim is a social network that includes users,&lt;br /&gt;
developers and researchers of digital technologies, studying and&lt;br /&gt;
practicing alternative uses of technology. Ultimately, our objective&lt;br /&gt;
is to diminish the alienation of people to technical knowledge.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4753.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Smart Hacking For Privacy ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Advanced metering devices (aka smart meters) are nowadays being&lt;br /&gt;
installed throughout electric networks in Germany, in other parts of&lt;br /&gt;
Europe and in the United States. Due to a recent amendment especially&lt;br /&gt;
in Germany they become more and more popular and are obligatory for&lt;br /&gt;
new and refurbished buildings.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, smart meters are able to become surveillance devices&lt;br /&gt;
that monitor the behavior of the customers leading to unprecedented&lt;br /&gt;
invasions of consumer privacy. High-resolution energy consumption data&lt;br /&gt;
is transmitted to the utility company in principle allowing intrusive&lt;br /&gt;
identification and monitoring of equipment within consumers&#039; homes (e.&lt;br /&gt;
g., TV set, refrigerator, toaster, and oven) as was already shown in&lt;br /&gt;
different reports.&lt;br /&gt;
&lt;br /&gt;
This talk is about the Discovergy / EasyMeter smart meter used for&lt;br /&gt;
electricity metering in private homes in Germany. During our analysis&lt;br /&gt;
we found several security bugs that range from problems with the&lt;br /&gt;
certificate management of the website to missing security features for&lt;br /&gt;
the metering data in transit. For example (un)fortunately the metering&lt;br /&gt;
data is unsigned and unencrypted, although otherwise stated explicitly&lt;br /&gt;
on the manufacturer&#039;s homepage. It has to be pointed out that all&lt;br /&gt;
tests were performed on a sealed, fully functionally device.&lt;br /&gt;
&lt;br /&gt;
In our presentation we will mainly focus on two aspects which we&lt;br /&gt;
revealed during our analysis: first the privacy issues resulting in&lt;br /&gt;
even allowing to identify the TV program out of the metering data and&lt;br /&gt;
second the &amp;quot;problem&amp;quot; that one can easily alter data transmitted even&lt;br /&gt;
for a third party and thereby potentially fake the amount of consumed&lt;br /&gt;
power being billed.&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk we show that the analysis of the&lt;br /&gt;
household’s electricity usage profile can reveal what channel the TV&lt;br /&gt;
set in the household is displaying. We will also give some test-based&lt;br /&gt;
assessments whether it is possible to scan for copyright-protected&lt;br /&gt;
material in the data collected by the smart meter.&lt;br /&gt;
&lt;br /&gt;
In the second part we focus on the data being transmitted by the smart&lt;br /&gt;
meter via the Internet. We show to what extent the consumption data&lt;br /&gt;
can be altered and transmitted to the server and visualize this by&lt;br /&gt;
transmitting some kind of picture data to Discovergy’s consumption&lt;br /&gt;
data server in a way that the picture content will become visible in&lt;br /&gt;
the electricity profile. Moreover, we show what happens if the faked&lt;br /&gt;
power consumption data reflects unrealistic extreme high or negative&lt;br /&gt;
power consumptions and how that might influence the database and&lt;br /&gt;
service robustness.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4754.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4754-en-smart_hacking_for_privacy_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._18&amp;diff=5207</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 18</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._18&amp;diff=5207"/>
		<updated>2012-04-11T17:45:56Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/05/09 20:00:00 PM |enddate=2012/05/09 22:00:00 PM |title=Chaotic Congress Cinema Nr. 18 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/05/09 20:00:00 PM&lt;br /&gt;
|enddate=2012/05/09 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 18&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== The best of The oXcars ==   &lt;br /&gt;
the greatest free/Libre culture show of all times&lt;br /&gt;
&lt;br /&gt;
The Best of the oXcars!&lt;br /&gt;
&lt;br /&gt;
OXcars is fun. oXcars is empowering the people.&lt;br /&gt;
&lt;br /&gt;
Presentation and screening of the best of the oXcars 2011, 2010, 2009,&lt;br /&gt;
2008.&lt;br /&gt;
&lt;br /&gt;
Because their business is not our business. Every year, in Barcelona&lt;br /&gt;
1500 people gather for the biggest free/libre culture Show of all&lt;br /&gt;
times ;-). Artists and performers from all areas of Spanish and&lt;br /&gt;
international culture take part in a &amp;quot;Gala&amp;quot;;-) in which artists say&lt;br /&gt;
&amp;quot;Not in my name&amp;quot; to the commercialisation of culture, &amp;quot;Not in my name&amp;quot;&lt;br /&gt;
to limiting the potential of digital media and to criminalization of&lt;br /&gt;
the Internet. Civil society demands the &#039;lost profits&#039; of all the&lt;br /&gt;
knowledge that is being withheld and stolen from public use in the&lt;br /&gt;
name of private profits.&lt;br /&gt;
&lt;br /&gt;
http://oxcars11.whois--x.net/en/ http://oxcars10.whois--x.net/en/&lt;br /&gt;
http://oxcars09.whois--x.net/en/ http://whois--&lt;br /&gt;
x.net/proyectos/oxcars-08&lt;br /&gt;
&lt;br /&gt;
X.net (since 2008) - http://whois--x.net/ X.net (previously Exgae)&lt;br /&gt;
aims to provide citizens with creative and legal skills that they can&lt;br /&gt;
use to put an end to the monopoly and activities of the cultural&lt;br /&gt;
industries groups and their private goals. X.net fights alongside the&lt;br /&gt;
great majority of society for the growth of new forms of circulation&lt;br /&gt;
of culture. It&#039;s the first Spanish legal advisory service specialised&lt;br /&gt;
in protecting citizens from the abuses of cultural industries lobbies&lt;br /&gt;
and royalty management and collecting societies. X.net developments&lt;br /&gt;
and drafts proposals for intervention on legislation, organises&lt;br /&gt;
cultural events that aim to “normalise” free culture production and&lt;br /&gt;
diffusion practices and make them known to the general public; creates&lt;br /&gt;
viral campaigns and lobby groups from the civil society like the&lt;br /&gt;
FCForum (http://fcforum.net).&lt;br /&gt;
&lt;br /&gt;
One of X.net’s public activities is the annual oXcars event, the&lt;br /&gt;
world’s biggest free culture show ;-). The oXcars is a showcase for&lt;br /&gt;
artists and creators who have pioneered the changes in knowledge and&lt;br /&gt;
cultural production thanks to the potential of new technologies, and&lt;br /&gt;
seeks to defend society’s right to use them. The oXcars are also a way&lt;br /&gt;
to make the free culture movement mainstream, a bridge between free&lt;br /&gt;
culture works and artists and the general public. The oXcars inform,&lt;br /&gt;
make free culture visible and magnify it, and thus empower citizens.&lt;br /&gt;
&lt;br /&gt;
Each number that is presented in the show it is an excuse to explain a&lt;br /&gt;
topic: the right to quote, the right to share, net neutrality, P2P&lt;br /&gt;
networks, online free art, free beer :-) etc etc. We have prepared a&lt;br /&gt;
screening session to show you this amusing Show.&lt;br /&gt;
&lt;br /&gt;
http://oxcars11.whois--x.net/en/ http://oxcars10.whois--x.net/en/&lt;br /&gt;
http://oxcars09.whois--x.net/en/ http://whois--&lt;br /&gt;
x.net/proyectos/oxcars-08 http://whois--x.net/english/the-&lt;br /&gt;
oxcars/oxcars08&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `http://whois--x.net/ &amp;lt;http://whois--x.net/&amp;gt;`__&lt;br /&gt;
+ `http://oxcars11.whois--x.net/en/ &amp;lt;http://oxcars11.whois--&lt;br /&gt;
  x.net/en/&amp;gt;`__&lt;br /&gt;
+ `http://oxcars10.whois--x.net/en/ &amp;lt;http://oxcars10.whois--&lt;br /&gt;
  x.net/en/&amp;gt;`__&lt;br /&gt;
+ `http://oxcars09.whois--x.net/en/ &amp;lt;http://oxcars09.whois--&lt;br /&gt;
  x.net/en/&amp;gt;`__&lt;br /&gt;
+ `http://whois--x.net/proyectos/oxcars-08 &amp;lt;http://whois--&lt;br /&gt;
  x.net/proyectos/oxcars-08&amp;gt;`__&lt;br /&gt;
+ `http://fcforum.net &amp;lt;http://fcforum.net&amp;gt;`__&lt;br /&gt;
+ `http://2011.fcforum.net &amp;lt;http://2011.fcforum.net&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4748.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4748-en-the_best_of_the_oxcars_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Does Hacktivism Matter? ==   &lt;br /&gt;
How the Btx hack changed computer law-making in Germany&lt;br /&gt;
&lt;br /&gt;
Do you remember those days when hackers were “real men?” When hacking&lt;br /&gt;
was not yet a crime and the cyberspace an undiscovered land? Just&lt;br /&gt;
before anti-hacking laws were introduced in Germany? Back in these&lt;br /&gt;
days, the famous founding father of the CCC made the Bundespost&lt;br /&gt;
(Germany&#039;s Federal Mail Service) meet its Waterloo, when they hacked&lt;br /&gt;
Bildschirmtext (Btx)—the epitome of both technological utopias and&lt;br /&gt;
dystopias at that time. But soon, hackers suffered a setback: new laws&lt;br /&gt;
criminalized hacking in the name of fighting white-collar crimes.&lt;br /&gt;
Simultaneously to the laws, things were getting rougher in the media&lt;br /&gt;
and the public opinion. While being seen as a weird vanguard of&lt;br /&gt;
technology before, hackers soon became pranksters and outlaws.&lt;br /&gt;
Apparently hacktivism, the portmanteau word for hacking activism, had&lt;br /&gt;
failed to shape the policies in the dawning information society.&lt;br /&gt;
However, there are evidences that hacktivism had an impact on the new&lt;br /&gt;
computer crime legislation—not in terms of having more, but less&lt;br /&gt;
restrictions implemented in the law.&lt;br /&gt;
&lt;br /&gt;
In my talk, I take a historian&#039;s point of view. First, I will show in&lt;br /&gt;
which atmosphere of anxiety and excitement information technology&lt;br /&gt;
evolved in Germany in the early 1980s. Then, I will give a very short&lt;br /&gt;
description of the Btx hack, which is usually neglected in historical&lt;br /&gt;
science. After giving this background, I will reconstruct the debates&lt;br /&gt;
of white-collar crime law-making in context of the “2. WiKG” (Zweites&lt;br /&gt;
Wirtschaftskriminalitätsbekämpfungsgesetz) in 1984-86. I will show,&lt;br /&gt;
how different stakeholders demanded a strict law that penalized&lt;br /&gt;
virtually every aspect of hacking while the politicians—even those&lt;br /&gt;
from the conservative party—honored the guys who unveiled security&lt;br /&gt;
flaws in Btx. This had led to the invention of “good” and “bad”&lt;br /&gt;
hackers in juridical discourses. This distinction has been maintained&lt;br /&gt;
in law journals, but likewise neglected in most court decisions. My&lt;br /&gt;
talk will conclude by arguing that hacktivism matters in shaping&lt;br /&gt;
policies by indirectly changing mind-sets, even if it fails to win&lt;br /&gt;
every single battle. So, the impact of hacktivism is not part of a&lt;br /&gt;
rational debate, but of a more complex strategic situation in which&lt;br /&gt;
rational arguments only play a minor role.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4749.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4749-en-does_hacktivism_matter_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._17&amp;diff=5206</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 17</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._17&amp;diff=5206"/>
		<updated>2012-04-11T17:44:24Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/05/02 20:00:00 PM |enddate=2012/05/02 22:00:00 PM |title=Chaotic Congress Cinema Nr. 17 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/05/02 20:00:00 PM&lt;br /&gt;
|enddate=2012/05/02 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 17&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== From Press Freedom to the Freedom of information ==   &lt;br /&gt;
Why every citizen should be concerned&lt;br /&gt;
&lt;br /&gt;
This talk is about:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Information freedom and the issues for the citizens&lt;br /&gt;
+ RWB ressources: a “human network”&lt;br /&gt;
+ RWB needs: Get involved!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** Freedom of information and citizen issues&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Why defend media freedom, journalists and bloggers? Because without&lt;br /&gt;
  a free press, no cause can make its voice heard, no human rights&lt;br /&gt;
  violation can be reported.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specific examples of information vital to the public (links below): -&lt;br /&gt;
the tainted baby formula scandal in China exposed by the netizen Zhao&lt;br /&gt;
Lianhai, who was arrested as a result - Organized crime denounced by&lt;br /&gt;
netizens, some of whom have been killed. Rascatripas, the moderator of&lt;br /&gt;
the Nuevo Laredo en Vivo website, murdered on 9 November 2011 - RWB&lt;br /&gt;
sees how the media and methods of spreading news and information are&lt;br /&gt;
evolving, and is adapting to the changes - RWB helps all kinds of&lt;br /&gt;
“information producers” including professional journalists and&lt;br /&gt;
bloggers and takes positions on the problems specific to new media&lt;br /&gt;
WikiLeaks hounded - Capacity building and e-advocacy: RWB provides&lt;br /&gt;
bloggers, cyber-dissidents and journalists with the means to continue&lt;br /&gt;
reporting and circulating information. Provision of censorship&lt;br /&gt;
circumvention tools (including VPN) and online security training,&lt;br /&gt;
circulation of viral campaigns, awareness campaigns, information about&lt;br /&gt;
online risks.&lt;br /&gt;
&lt;br /&gt;
** RWB’s resources: a “human network”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ A human network: 150 correspondents worldwide + informal contacts&lt;br /&gt;
+ Strong lobbying capacity (European Parliament and Washington)&lt;br /&gt;
+ A legal committee&lt;br /&gt;
+ Handbook for Bloggers and Handbook for Journalists during Elections&lt;br /&gt;
+ Training (in Thailand, in Paris in February, in China and elsewhere&lt;br /&gt;
  in the future)&lt;br /&gt;
+ Virtual Shelter project: Creation of electronic safe and website for&lt;br /&gt;
  hosting censored content&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** RWB’s needs: Get involved!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Need for people whose technical skills can help us to evaluate a&lt;br /&gt;
  country’s Internet, by carrying out tests to determine the filters&lt;br /&gt;
  used, the presence of Deep Packet Inspection and so on.&lt;br /&gt;
+ Need for technicians who can tell us about the safety of the various&lt;br /&gt;
  communications methods used. Which governments monitor Skype, IRC,&lt;br /&gt;
  BBM, and Google Talk? Which email service or VoIP to use?&lt;br /&gt;
+ Need for the help of experts in viral marketing, search engine&lt;br /&gt;
  marketing and information monitoring.&lt;br /&gt;
+ Need for contacts in companies that cooperate with Internet&lt;br /&gt;
  censorship (or former employees)&lt;br /&gt;
+ Need for the help of jurists in different countries to analyze the&lt;br /&gt;
  growing number of laws that regulate the Internet&lt;br /&gt;
&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `Tainted baby formula scandal in China &amp;lt;http://en.rsf.org/china-&lt;br /&gt;
  authorities-refuse-to-register-26-10-2010,38663.html&amp;gt;`__&lt;br /&gt;
+ `Rascatripas, the moderator of the Nuevo Laredo en Vivo website,&lt;br /&gt;
  murdered on 9 November 2011 &amp;lt;http://en.rsf.org/mexique-fourth-netizen-&lt;br /&gt;
  murdered-in-two-14-11-2011,41385.html&amp;gt;`__&lt;br /&gt;
+ `RWB helps bloggers in Egypt &amp;lt;http://en.rsf.org/egypt-jailed-&lt;br /&gt;
  blogger-resumes-hunger-17-09-2011,41015.html&amp;gt;`__&lt;br /&gt;
+ `Problems specific to new media WikiLeaks hounded &amp;lt;http://en.rsf.org&lt;br /&gt;
  /wikileaks-hounded-04-12-2010,38958.html&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4742.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4742-en-from_press_freedom_to_the_freedom_of_information_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Bitcoin - An Analysis ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bitcoin is the first distributed, digital currency. It received a lot&lt;br /&gt;
of attention recently as it questions the state monopoly to issue&lt;br /&gt;
legal tender. It relies on distributed proof-of-work concepts to&lt;br /&gt;
ensure money-like characteristics.&lt;br /&gt;
&lt;br /&gt;
The existence and potential widespread use of such a distributed, non-&lt;br /&gt;
centralized, non-regulated currency questions the ability of&lt;br /&gt;
governments to control money supply, issue debt, and tax its populace.&lt;br /&gt;
&lt;br /&gt;
Transactions in bitcoin form a publicly accessible network of economic&lt;br /&gt;
relations, which can be extracted from the transaction history&lt;br /&gt;
available to all users in the P2P-network of bitcoin.&lt;br /&gt;
&lt;br /&gt;
Using re-identification algorithms it is possible to attack the&lt;br /&gt;
proposed anonymity of users. While this is already an interesting&lt;br /&gt;
security issue, the insight into a real-world economic experiment&lt;br /&gt;
allows for the first time the empirical test of community structures&lt;br /&gt;
in such social networks, which is definitely more substantial than the&lt;br /&gt;
&amp;quot;I-like&amp;quot;-network in facebook and the like.&lt;br /&gt;
&lt;br /&gt;
In this presentation, we show results on network analysis of the money&lt;br /&gt;
flow, the behavior of individuals, and the overall scalability of P2P-&lt;br /&gt;
currencies. At the same time we will discuss advanced &amp;quot;financial&lt;br /&gt;
instruments&amp;quot; that one might find in the transactions.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4746.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4746-en-bitcoin_an_analysis_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._16&amp;diff=5205</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 16</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._16&amp;diff=5205"/>
		<updated>2012-04-11T17:43:48Z</updated>

		<summary type="html">&lt;p&gt;Muelli: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Termin&lt;br /&gt;
|date=2012/04/25 01:00:00 AM&lt;br /&gt;
|enddate=2012/04/25 01:00:00 AM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 16&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Frag den Staat ==   &lt;br /&gt;
Praktische Informationsfreiheit&lt;br /&gt;
&lt;br /&gt;
FragDenStaat.de startete am 1. August 2011 als Plattform zum Stellen&lt;br /&gt;
von Anfragen nach dem Informationsfreiheitsgesetz und veröffentlicht&lt;br /&gt;
dort die Korrespondenz mit den Behörden nach dem Vorbild von&lt;br /&gt;
whatdotheyknow.com and befreite-dokumente.de. Der Vortrag wird die&lt;br /&gt;
Plattform vorstellen, zeigen wie die Seite Antragssteller bei ihrem&lt;br /&gt;
Recht auf Akteneinsicht unterstützt und die interessantesten Vorfälle&lt;br /&gt;
genauer beleuchten.&lt;br /&gt;
&lt;br /&gt;
FragDenStaat.de ging als Projekt der Open Knowledge Foundation&lt;br /&gt;
Deutschland mit Unterstützung von u.a. Transparency International,&lt;br /&gt;
Mehr Demokratie und der Access Info am 1. August 2011 online. Ein&lt;br /&gt;
halbes Jahr später gibt es viel veröffentlichte Korrespondenz mit&lt;br /&gt;
Behörden zu begutachten, die einige spannende Geschichten enthalten&lt;br /&gt;
und interessante Fragen aufwerfen. Hat man Recht auf Akteneinsicht in&lt;br /&gt;
die Gutachten des Wissenschaftlichen Dienstes des Bundestags? Sind&lt;br /&gt;
Datenshops mit dem IFG vereinbar? Und wie muss man das&lt;br /&gt;
Informationsfreiheitsgesetz verbessern, damit es auch in Zeiten von&lt;br /&gt;
Open Data funktioniert? Im Vortrag möchte ich unter anderem auf diese&lt;br /&gt;
Fragen eingehen, Statistiken der Plattform präsentieren (welche&lt;br /&gt;
Behörde antwortet am schnellsten etc.), erklären welche Mittel und&lt;br /&gt;
Wege es gibt, um Informationen von staatlicher Stelle zu erlangen und&lt;br /&gt;
dazu aufrufen, diese Mittel auch aktiv zu nutzen.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4740.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4740-de-frag_den_staat_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resilience Towards Leaking or Why Julian Assange Might Be Wrong&lt;br /&gt;
After All ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In his now (in)famous pamphlet &amp;quot;Conspiracy as Governance&amp;quot; Julian&lt;br /&gt;
Assange (JA) argues about the need for leaking as an efficient way to&lt;br /&gt;
destroy &amp;quot;unjust&amp;quot; groups as the neo-feudalistic ones - luring the&lt;br /&gt;
conspiracy theory leaning hacker community into his belief system.&lt;br /&gt;
Eventually, JA used a biologistic argument on the benefits and&lt;br /&gt;
drawbacks that uncontrolled leaking might pose for &amp;quot;just&amp;quot; and &amp;quot;unjust&amp;quot;&lt;br /&gt;
systems, arriving at the conclusion that &amp;quot;unjust&amp;quot; systems are hurt&lt;br /&gt;
more and thus will be less viable, essentially being destroyed by more&lt;br /&gt;
&amp;quot;just&amp;quot; systems. While an innovative proposal, the underlying&lt;br /&gt;
assumptions on complexity, network theory, and especially the&lt;br /&gt;
evolutionary perspectives were never critically assessed. Some blogs&lt;br /&gt;
and media raised questions on details and potential threats to&lt;br /&gt;
innocent bystanders. Still, fundamental problems with the philosophy&lt;br /&gt;
were never addressed.&lt;br /&gt;
&lt;br /&gt;
This paper argues against the general validity of such theories. In&lt;br /&gt;
particular, we will refute some of the biologistic arguments.&lt;br /&gt;
Theoretical biology has long ago pointed out the hidden complexity in&lt;br /&gt;
evolutionary processes and as such the envisioned &amp;quot;leaking revolution&amp;quot;&lt;br /&gt;
might be a limited artifact: there might even arise situations where&lt;br /&gt;
the leaking envisioned and encouraged by Wikileaks and the like can&lt;br /&gt;
actually strengthen some &amp;quot;conspiracies&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
In this paper I will describe some research questions, that should be&lt;br /&gt;
answered before given the “leaking philosophy” an unconditioned&lt;br /&gt;
“thumbs-up”. Empirically, for example, a potential strengthening is&lt;br /&gt;
illustrated by the rise of a &#039;neo-feudalistic economy&#039;, which is&lt;br /&gt;
linked closely to the paradigm of &amp;quot;intellectual property&amp;quot; as it is to&lt;br /&gt;
the security-financial-political complex. The players have effectively&lt;br /&gt;
created a closed network or a &amp;quot;conspiracy&amp;quot; and might be resilient&lt;br /&gt;
towards Wikileaks-like attacks. The paper concludes with an&lt;br /&gt;
alternative to that proposal; in particular, a way to deal with the&lt;br /&gt;
&#039;conspiracy&#039; that might be coined the rise of the neo-feudalistic&lt;br /&gt;
society (which in itself is a self-sustainable, self-amplifying&lt;br /&gt;
feedback loop, not necessarily a conscious conspiracy).&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4741.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._16&amp;diff=5204</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 16</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._16&amp;diff=5204"/>
		<updated>2012-04-11T17:27:08Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/04/18 20:30:00 PM |enddate=2012/04/18 22:00:00 PM |title=Chaotic Congress Cinema Nr. 16 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/04/18 20:30:00 PM&lt;br /&gt;
|enddate=2012/04/18 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 16&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Frag den Staat ==   &lt;br /&gt;
Praktische Informationsfreiheit&lt;br /&gt;
&lt;br /&gt;
FragDenStaat.de startete am 1. August 2011 als Plattform zum Stellen&lt;br /&gt;
von Anfragen nach dem Informationsfreiheitsgesetz und veröffentlicht&lt;br /&gt;
dort die Korrespondenz mit den Behörden nach dem Vorbild von&lt;br /&gt;
whatdotheyknow.com and befreite-dokumente.de. Der Vortrag wird die&lt;br /&gt;
Plattform vorstellen, zeigen wie die Seite Antragssteller bei ihrem&lt;br /&gt;
Recht auf Akteneinsicht unterstützt und die interessantesten Vorfälle&lt;br /&gt;
genauer beleuchten.&lt;br /&gt;
&lt;br /&gt;
FragDenStaat.de ging als Projekt der Open Knowledge Foundation&lt;br /&gt;
Deutschland mit Unterstützung von u.a. Transparency International,&lt;br /&gt;
Mehr Demokratie und der Access Info am 1. August 2011 online. Ein&lt;br /&gt;
halbes Jahr später gibt es viel veröffentlichte Korrespondenz mit&lt;br /&gt;
Behörden zu begutachten, die einige spannende Geschichten enthalten&lt;br /&gt;
und interessante Fragen aufwerfen. Hat man Recht auf Akteneinsicht in&lt;br /&gt;
die Gutachten des Wissenschaftlichen Dienstes des Bundestags? Sind&lt;br /&gt;
Datenshops mit dem IFG vereinbar? Und wie muss man das&lt;br /&gt;
Informationsfreiheitsgesetz verbessern, damit es auch in Zeiten von&lt;br /&gt;
Open Data funktioniert? Im Vortrag möchte ich unter anderem auf diese&lt;br /&gt;
Fragen eingehen, Statistiken der Plattform präsentieren (welche&lt;br /&gt;
Behörde antwortet am schnellsten etc.), erklären welche Mittel und&lt;br /&gt;
Wege es gibt, um Informationen von staatlicher Stelle zu erlangen und&lt;br /&gt;
dazu aufrufen, diese Mittel auch aktiv zu nutzen.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4740.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4740-de-frag_den_staat_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Resilience Towards Leaking or Why Julian Assange Might Be Wrong&lt;br /&gt;
After All ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In his now (in)famous pamphlet &amp;quot;Conspiracy as Governance&amp;quot; Julian&lt;br /&gt;
Assange (JA) argues about the need for leaking as an efficient way to&lt;br /&gt;
destroy &amp;quot;unjust&amp;quot; groups as the neo-feudalistic ones - luring the&lt;br /&gt;
conspiracy theory leaning hacker community into his belief system.&lt;br /&gt;
Eventually, JA used a biologistic argument on the benefits and&lt;br /&gt;
drawbacks that uncontrolled leaking might pose for &amp;quot;just&amp;quot; and &amp;quot;unjust&amp;quot;&lt;br /&gt;
systems, arriving at the conclusion that &amp;quot;unjust&amp;quot; systems are hurt&lt;br /&gt;
more and thus will be less viable, essentially being destroyed by more&lt;br /&gt;
&amp;quot;just&amp;quot; systems. While an innovative proposal, the underlying&lt;br /&gt;
assumptions on complexity, network theory, and especially the&lt;br /&gt;
evolutionary perspectives were never critically assessed. Some blogs&lt;br /&gt;
and media raised questions on details and potential threats to&lt;br /&gt;
innocent bystanders. Still, fundamental problems with the philosophy&lt;br /&gt;
were never addressed.&lt;br /&gt;
&lt;br /&gt;
This paper argues against the general validity of such theories. In&lt;br /&gt;
particular, we will refute some of the biologistic arguments.&lt;br /&gt;
Theoretical biology has long ago pointed out the hidden complexity in&lt;br /&gt;
evolutionary processes and as such the envisioned &amp;quot;leaking revolution&amp;quot;&lt;br /&gt;
might be a limited artifact: there might even arise situations where&lt;br /&gt;
the leaking envisioned and encouraged by Wikileaks and the like can&lt;br /&gt;
actually strengthen some &amp;quot;conspiracies&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
In this paper I will describe some research questions, that should be&lt;br /&gt;
answered before given the “leaking philosophy” an unconditioned&lt;br /&gt;
“thumbs-up”. Empirically, for example, a potential strengthening is&lt;br /&gt;
illustrated by the rise of a &#039;neo-feudalistic economy&#039;, which is&lt;br /&gt;
linked closely to the paradigm of &amp;quot;intellectual property&amp;quot; as it is to&lt;br /&gt;
the security-financial-political complex. The players have effectively&lt;br /&gt;
created a closed network or a &amp;quot;conspiracy&amp;quot; and might be resilient&lt;br /&gt;
towards Wikileaks-like attacks. The paper concludes with an&lt;br /&gt;
alternative to that proposal; in particular, a way to deal with the&lt;br /&gt;
&#039;conspiracy&#039; that might be coined the rise of the neo-feudalistic&lt;br /&gt;
society (which in itself is a self-sustainable, self-amplifying&lt;br /&gt;
feedback loop, not necessarily a conscious conspiracy).&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4741.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Chaotic-Congress-Cinema&amp;diff=4159</id>
		<title>Chaotic-Congress-Cinema</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Chaotic-Congress-Cinema&amp;diff=4159"/>
		<updated>2012-02-25T22:43:27Z</updated>

		<summary type="html">&lt;p&gt;Muelli: learnt Mediawiki syntax to not embed the files themselves&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Chaotic Congress Cinema ==&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
==Logo==&lt;br /&gt;
&lt;br /&gt;
[[File:28CCCinema.png|border|link=http://wiki.attraktor.org/index.php/Chaotic-Congress-Cinema|none]]&lt;br /&gt;
(als [[:File:28CCCinema.pdf|PDF]], [[:File:28CCCinema.svg|SVG]] oder  [[:File:28CCCinema.eps|EPS]])&lt;br /&gt;
&lt;br /&gt;
== Planung ==&lt;br /&gt;
&lt;br /&gt;
Die Planung ist absichtlich super simpel gestaltet um den Busfaktor zu erhoehen. Die Chance ist gross, dass du einen Termin organisieren kannst, wenn du weisst, wie ein Computer und ein Beamer anzuschalten gehen.&lt;br /&gt;
&lt;br /&gt;
* Das nächste Video finden: Aufsteigend nach der Talk-ID. Siehe: http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/ bzw. http://events.ccc.de/congress/2011/Fahrplan/events/4581.en.html, bei dem 4581 die Talk-ID ist&lt;br /&gt;
* Termin im Wiki eintragen. Bei Schreibfaulheit kann auch auf [https://hg.cryptobitch.de/cccinema Software] zurueckgegriffen werden.&lt;br /&gt;
* Prüfen, ob genug Getränke und Knabberkram vorhanden ist. Chips sollten im Küchenschrank und Getränke im Kühlschrank oder Lager sein. Falls nicht, einfach bei [http://encyclopediadramatica.com/Krautchan#Bernd Bernd] melden&lt;br /&gt;
* Video auf dem Rechner, beim Beamer herunterladen:  wget http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/&lt;br /&gt;
&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Chaotic-Congress-Cinema&amp;diff=4139</id>
		<title>Chaotic-Congress-Cinema</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Chaotic-Congress-Cinema&amp;diff=4139"/>
		<updated>2012-02-24T18:31:41Z</updated>

		<summary type="html">&lt;p&gt;Muelli: /* Planung */ updated for this year.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Chaotic Congress Cinema ==&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
==Logo==&lt;br /&gt;
&lt;br /&gt;
[[File:28CCCinema.png|border|link=http://wiki.attraktor.org/index.php/Chaotic-Congress-Cinema|none]]&lt;br /&gt;
(als [[File:28CCCinema.pdf|PDF]], [[File:28CCCinema.svg|SVG]] oder  [[File:28CCCinema.eps|EPS]])&lt;br /&gt;
&lt;br /&gt;
== Planung ==&lt;br /&gt;
&lt;br /&gt;
Die Planung ist absichtlich super simpel gestaltet um den Busfaktor zu erhoehen. Die Chance ist gross, dass du einen Termin organisieren kannst, wenn du weisst, wie ein Computer und ein Beamer anzuschalten gehen.&lt;br /&gt;
&lt;br /&gt;
* Das nächste Video finden: Aufsteigend nach der Talk-ID. Siehe: http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/ bzw. http://events.ccc.de/congress/2011/Fahrplan/events/4581.en.html, bei dem 4581 die Talk-ID ist&lt;br /&gt;
* Termin im Wiki eintragen. Bei Schreibfaulheit kann auch auf [https://hg.cryptobitch.de/cccinema Software] zurueckgegriffen werden.&lt;br /&gt;
* Prüfen, ob genug Getränke und Knabberkram vorhanden ist. Chips sollten im Küchenschrank und Getränke im Kühlschrank oder Lager sein. Falls nicht, einfach bei [http://encyclopediadramatica.com/Krautchan#Bernd Bernd] melden&lt;br /&gt;
* Video auf dem Rechner, beim Beamer herunterladen:  wget http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/&lt;br /&gt;
&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Chaotic-Congress-Cinema&amp;diff=4138</id>
		<title>Chaotic-Congress-Cinema</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Chaotic-Congress-Cinema&amp;diff=4138"/>
		<updated>2012-02-24T18:23:18Z</updated>

		<summary type="html">&lt;p&gt;Muelli: /* Banner plus Snippet zum Einbinden */ removed section. Let&amp;#039;s hope people are smart enough to create img tags themselves.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Chaotic Congress Cinema ==&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
==Logo==&lt;br /&gt;
&lt;br /&gt;
[[File:28CCCinema.png|border|link=http://wiki.attraktor.org/index.php/Chaotic-Congress-Cinema|none]]&lt;br /&gt;
(als [[File:28CCCinema.pdf|PDF]], [[File:28CCCinema.svg|SVG]] oder  [[File:28CCCinema.eps|EPS]])&lt;br /&gt;
&lt;br /&gt;
== Planung ==&lt;br /&gt;
&lt;br /&gt;
* Das nächste Video finden: Aufsteigend nach der Talk-ID. Siehe: http://ftp.ccc.de/congress/27C3/mp4-h264-HQ/ bzw. http://events.ccc.de/congress/2010/Fahrplan/events/3952.en.html, bei dem 3952 die Talk-ID ist&lt;br /&gt;
* Termin im Wiki eintragen&lt;br /&gt;
* Prüfen, ob genug Getränke und Knabberkram vorhanden ist. Chips sollten im Küchenschrank und Getränke im Kühlschrank oder Lager sein. Falls nicht, einfach bei [http://encyclopediadramatica.com/Krautchan#Bernd Bernd] melden&lt;br /&gt;
* Video auf dem Rechner, beim Beamer herunterladen:  wget http://ftp.ccc.de/congress/27C3/mp4-h264-HQ/&lt;br /&gt;
&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Chaotic-Congress-Cinema&amp;diff=4137</id>
		<title>Chaotic-Congress-Cinema</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Chaotic-Congress-Cinema&amp;diff=4137"/>
		<updated>2012-02-24T18:21:45Z</updated>

		<summary type="html">&lt;p&gt;Muelli: /* Logo */ added new logos \o/&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Chaotic Congress Cinema ==&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
==Logo==&lt;br /&gt;
&lt;br /&gt;
[[File:28CCCinema.png|border|link=http://wiki.attraktor.org/index.php/Chaotic-Congress-Cinema|none]]&lt;br /&gt;
(als [[File:28CCCinema.pdf|PDF]], [[File:28CCCinema.svg|SVG]] oder  [[File:28CCCinema.eps|EPS]])&lt;br /&gt;
&lt;br /&gt;
==Banner plus Snippet zum Einbinden==&lt;br /&gt;
&lt;br /&gt;
[[File:Ccc-small.png|border|link=http://wiki.attraktor.org/index.php/Chaotic-Congress-Cinema|none]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;a href=&amp;quot;http://wiki.attraktor.org/index.php/Chaotic-Congress-Cinema&amp;quot;&amp;gt;&lt;br /&gt;
   &amp;lt;img src=&amp;quot;http://wiki.attraktor.org/images/7/7a/Ccc-small.png&amp;quot; alt=&amp;quot;Chaotic Congress Cinema&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/a&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Planung ==&lt;br /&gt;
&lt;br /&gt;
* Das nächste Video finden: Aufsteigend nach der Talk-ID. Siehe: http://ftp.ccc.de/congress/27C3/mp4-h264-HQ/ bzw. http://events.ccc.de/congress/2010/Fahrplan/events/3952.en.html, bei dem 3952 die Talk-ID ist&lt;br /&gt;
* Termin im Wiki eintragen&lt;br /&gt;
* Prüfen, ob genug Getränke und Knabberkram vorhanden ist. Chips sollten im Küchenschrank und Getränke im Kühlschrank oder Lager sein. Falls nicht, einfach bei [http://encyclopediadramatica.com/Krautchan#Bernd Bernd] melden&lt;br /&gt;
* Video auf dem Rechner, beim Beamer herunterladen:  wget http://ftp.ccc.de/congress/27C3/mp4-h264-HQ/&lt;br /&gt;
&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.eps&amp;diff=4136</id>
		<title>File:28CCCinema.eps</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.eps&amp;diff=4136"/>
		<updated>2012-02-24T18:20:56Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Category:Chaotic-Congress-Cinema&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Chaotic-Congress-Cinema]]&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.svg&amp;diff=4135</id>
		<title>File:28CCCinema.svg</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.svg&amp;diff=4135"/>
		<updated>2012-02-24T18:20:45Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Category:Chaotic-Congress-Cinema&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Chaotic-Congress-Cinema]]&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.png&amp;diff=4134</id>
		<title>File:28CCCinema.png</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.png&amp;diff=4134"/>
		<updated>2012-02-24T17:59:06Z</updated>

		<summary type="html">&lt;p&gt;Muelli: + Category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;28C3-Version von Nono \o/ Aus [[File:28CCCinema.pdf]] mit ImageMagick gerendert.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.pdf&amp;diff=4133</id>
		<title>File:28CCCinema.pdf</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.pdf&amp;diff=4133"/>
		<updated>2012-02-24T17:58:33Z</updated>

		<summary type="html">&lt;p&gt;Muelli: + Category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Neue Version fuer den 28C3 von Nono \o/ Mit Barcode der URL zum CCCinema Wiki-Eintrag.&lt;br /&gt;
&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.png&amp;diff=4132</id>
		<title>File:28CCCinema.png</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.png&amp;diff=4132"/>
		<updated>2012-02-24T17:54:43Z</updated>

		<summary type="html">&lt;p&gt;Muelli: 28C3-Version von Nono \o/ Aus File:28CCCinema.pdf mit ImageMagick gerendert.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;28C3-Version von Nono \o/ Aus [[File:28CCCinema.pdf]] mit ImageMagick gerendert.&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.pdf&amp;diff=4131</id>
		<title>File:28CCCinema.pdf</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=File:28CCCinema.pdf&amp;diff=4131"/>
		<updated>2012-02-24T17:54:01Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Neue Version fuer den 28C3 von Nono \o/ Mit Barcode der URL zum CCCinema Wiki-Eintrag.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Neue Version fuer den 28C3 von Nono \o/ Mit Barcode der URL zum CCCinema Wiki-Eintrag.&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Main_Page&amp;diff=4130</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Main_Page&amp;diff=4130"/>
		<updated>2012-02-24T17:47:18Z</updated>

		<summary type="html">&lt;p&gt;Muelli: /* Und hier kommt Ihr ins Spiel */ fixed minor typos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;float:right; padding-left:1em;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #000; background:#67b8dc;color:#fff;padding: 0.1em 1em; font-size: 80%; &amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Location&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;border:1px solid #000000;border-top-width:0px; padding: 0px 0px; margin-bottom:0.5em;background:#ffffff;&amp;quot;&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Adresse:&#039;&#039;&#039; Mexikoring 21 (City Nord)&amp;lt;br/&amp;gt;22297 Hamburg&lt;br /&gt;
* &#039;&#039;&#039;Koordinaten:&#039;&#039;&#039; 53.602915, 10.022873&lt;br /&gt;
* &#039;&#039;&#039;OpenStreetMap:&#039;&#039;&#039; [http://www.openstreetmap.org/?lat=53.603016&amp;amp;lon=10.022952&amp;amp;zoom=18&amp;amp;layers=M Go]&lt;br /&gt;
* &#039;&#039;&#039;Google Maps:&#039;&#039;&#039; [http://maps.google.com/maps?f=d&amp;amp;source=s_d&amp;amp;saddr=53.602915,10.022873&amp;amp;daddr=&amp;amp;geocode=&amp;amp;hl=en&amp;amp;mra=dme&amp;amp;mrcr=0&amp;amp;mrsp=0&amp;amp;sz=19&amp;amp;sll=53.602983,10.022873&amp;amp;sspn=0.001372,0.00213&amp;amp;ie=UTF8&amp;amp;ll=53.603007,10.022691&amp;amp;spn=0.002744,0.004259&amp;amp;t=h&amp;amp;z=18 Go]&lt;br /&gt;
* Details: [[Mex | Wegbeschreibung]]&lt;br /&gt;
* Unsere Tür ist gerade:&amp;lt;br&amp;gt;{{DoorisStatus}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Attraktor e.V. Hamburg =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;attraktorbg center&amp;quot;&amp;gt;&lt;br /&gt;
Jede Technologie l&amp;amp;auml;&amp;amp;szlig;t Neues realisierbar werden - wenn man sie beherrscht.&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Wir wenden uns an alle, die danach streben, selbst zu durchschauen, kreativ zu werden und Technik nach eigenem Belieben auszusch&amp;amp;ouml;pfen. Jene, deren Antrieb sich in einer Frage wiederfindet: &amp;amp;quot;&amp;lt;em&amp;gt;Was geht noch?&amp;lt;/em&amp;gt;&amp;amp;quot;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div&amp;gt;Die nächsten [[Veranstaltungen]] im Attraktor:&lt;br /&gt;
&lt;br /&gt;
{{Calendar-Next10}}&lt;br /&gt;
&lt;br /&gt;
Liste der nächsten Veranstaltungen im [http://wiki.attraktor.org/calendar.ics VCS/ICS-Format]&amp;lt;!--{{Calendar-iCal}}--&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
[[Calendar|Vollständiger Kalender]], tragt dort bitte eure Termine und Veranstaltungen ein.&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Aktuelles ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;text-align:center; padding:10px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin:auto; width:800px; padding:3px; background-color:rgb(249,249,249); border:1px solid rgb(204,204,204);&amp;quot;&amp;gt;&lt;br /&gt;
[[File:Cacertbanner.png|left|link=//wiki.attraktor.org/Termin:CaCert_Assurer_Training2|800px|:CAcert Assurer Training am 14. Februar 2012]]&lt;br /&gt;
CAcert Assurer Training am 14. Februar 2012&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Mehr Raum für Kreativität ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;text-align:center; padding:10px;&amp;quot;&amp;gt;&lt;br /&gt;
[[File:Raum.png|border|none|link=]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
Einen Platz schaffen wo Menschen ihre Ideen, Visionen und Projekte umsetzen können, daß ist unser Ziel. An einem Ort mit inspirierenden Umfeld zu arbeiten, sich auszutauschen, oder einfach unter Gleichgesinnten zu sein.&lt;br /&gt;
Dafür haben wir einen über 300m2 großen Raum, der darauf wartet mit Leben gefüllt zu werden.&lt;br /&gt;
Der Vortragsbereich ist mit einem Beamer ausgestattet und bietet mehr als 70 Personen einen Sitzplatz. Wird er nicht für Vorträge benötigt, kann man ihn entweder als große Freifläche oder zum Arbeitsbereich mit Tischen umstellen. Nicht der Raum bestimmt den Zweck, sondern der Zweck den Raum. &lt;br /&gt;
Die Kickerecke, ein gemütlicher Bereich mit Sofas und die gerade entstehende Werkstatt runden die Möglichkeiten ab. Also kommt vorbei und schaut euch um!&lt;br /&gt;
&lt;br /&gt;
== Und hier kommt Ihr ins Spiel ==&lt;br /&gt;
&lt;br /&gt;
Vorträge, Workshops, Projekte, Treffen und Zusammenkünfte. Ob einmalige Events oder regelmäßige. Ein paar Stunden oder über mehrere Tage. All dies ist in den Räumen möglich. Was wir dazu brauchen seid Ihr!&lt;br /&gt;
Wenn Dich also interessiert was sich schon heute für Gruppen bei uns treffen, was für Veranstaltungen anstehen oder Du einen Platz für Dich und deine Gruppe suchst, sprich uns an oder besuche unsere Webseite. Wir freuen uns auf Dich.&lt;br /&gt;
&lt;br /&gt;
== Mitglied werden! ==&lt;br /&gt;
&lt;br /&gt;
Neue Mitglieder sind immer gerne gesehen. Wer Mitglied werden möchten, kann sich hier den [[Media:Attraktor-Mitgliedsantrag.pdf‎|Mitgliedsantrag]] im PDF-Format herunterladen.&lt;br /&gt;
&lt;br /&gt;
== Spenden ==&lt;br /&gt;
&lt;br /&gt;
Da die Unterhaltung der Räumlichkeiten, der Werkstatt, sowie die Durchführung von Projekten, Workshops und Vorträgen neben viel Zeit, eben, auch Geld kostet, freuen wir uns natürlich über Zuwendungen in Form von Geld- und Sachspenden. Mehr Informationen sind auf unserer [[Spenden|Spendenseite]] zu finden.&lt;br /&gt;
&lt;br /&gt;
== Wie komme ich mit dem Attraktor in Kontakt? ==&lt;br /&gt;
&lt;br /&gt;
Zum Beispiel über unsere [https://lists.attraktor.org/listinfo/attraktionen Mailingliste]. Dort gibt es Neuigkeiten und Diskussionen rund um den Attraktor. Oder Ihr schickt uns einfach eine [mailto:office@attraktor.org E-Mail].&lt;br /&gt;
&lt;br /&gt;
== Unsere Untermieter ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.ccc.de/ Chaos Computer Club e.V.]&lt;br /&gt;
* [http://www.hamburg.ccc.de/ CCC Hansestadt Hamburg e.V.]&lt;br /&gt;
* [http://www.ssdev.org/ Sportsfreunde der Sperrtechnik - Deutschland e.V.]&lt;br /&gt;
* [http://wiki.vorratsdatenspeicherung.de/Ortsgruppen/Hamburg Arbeitskreis Vorratsdatenspeicherung OG Hamburg]&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._15&amp;diff=3590</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 15</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._15&amp;diff=3590"/>
		<updated>2012-01-23T20:20:48Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/04/11 20:00:00 PM |enddate=2012/04/11 22:00:00 PM |title=Chaotic Congress Cinema Nr. 15 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/04/11 20:00:00 PM&lt;br /&gt;
|enddate=2012/04/11 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 15&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Defending mobile phones ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cell phone users face an increasing frequency and depth of privacy&lt;br /&gt;
intruding attacks. Defense knowledge has not scaled at the same speed&lt;br /&gt;
as attack capabilities. This talk intends to revert this imbalance.&lt;br /&gt;
&lt;br /&gt;
Most severe attack vectors on mobile phones are due to an outdated&lt;br /&gt;
technology base that lacks strong cryptographic authentication or&lt;br /&gt;
confidentiality. Given this discrepancy between protection need and&lt;br /&gt;
reality, a number of countermeasures were developed for networks and&lt;br /&gt;
phones to better protect their users.&lt;br /&gt;
&lt;br /&gt;
We explain the most important measures and track their deployment.&lt;br /&gt;
Furthermore, we will release tools to measure the level of&lt;br /&gt;
vulnerability of networks. Sharing the results of these measurements&lt;br /&gt;
will hopefully create problem awareness and demand for more security&lt;br /&gt;
by phone users around the world.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4736.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4736-en-defending_mobile_phones_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Echtes Netz ==   &lt;br /&gt;
Kampagne fr Netzneutralitt&lt;br /&gt;
&lt;br /&gt;
Anfang 2012 startet &amp;quot;Echtes Netz&amp;quot;, die Kampagne für Netzneutralität,&lt;br /&gt;
die vom Digitale Gesellschaft e.V. initiert und von der stiftung&lt;br /&gt;
bridge gefördert wird. Die Kampagne macht sich zur Aufgabe, das&lt;br /&gt;
Bewusstsein für den Wert eines echten Netzes zu steigern und mit&lt;br /&gt;
Offline- und Onlineaktionen für eine gesetzliche Verankerung der&lt;br /&gt;
Netzneutralität zu werben.&lt;br /&gt;
&lt;br /&gt;
Der Vortrag gibt einen Überblick auf die Debatte rund um die&lt;br /&gt;
Netzneutralität in Deutschland und der EU und einen einen Ausblick auf&lt;br /&gt;
die Kampagne.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4738.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4738-de-echtes_netz_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._14&amp;diff=3589</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 14</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._14&amp;diff=3589"/>
		<updated>2012-01-23T20:20:39Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/04/04 20:00:00 PM |enddate=2012/04/04 22:00:00 PM |title=Chaotic Congress Cinema Nr. 14 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/04/04 20:00:00 PM&lt;br /&gt;
|enddate=2012/04/04 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 14&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Datamining for Hackers ==   &lt;br /&gt;
Encrypted Traffic Mining&lt;br /&gt;
&lt;br /&gt;
This talk presents Traffic Mining (TM) particularly in regard to VoiP&lt;br /&gt;
applications such as Skype. TM is a method to digest and understand&lt;br /&gt;
large quantities of data.&lt;br /&gt;
&lt;br /&gt;
Voice over IP (VoIP) has experienced a tremendous growth over the last&lt;br /&gt;
few years and is now widely used among the population and for business&lt;br /&gt;
purposes. The security of such VoIP systems is often assumed, creating&lt;br /&gt;
a false sense of privacy. Stefan will present research into leakage of&lt;br /&gt;
information from Skype, a widely used and protected VoIP application.&lt;br /&gt;
Experiments have shown that isolated phonemes can be classified and&lt;br /&gt;
given sentences identified. By using the dynamic time warping (DTW)&lt;br /&gt;
algorithm, frequently used in speech processing, an accuracy of 60%&lt;br /&gt;
can be reached. The results can be further improved by choosing&lt;br /&gt;
specific training data and reach an accuracy of 83% under specific&lt;br /&gt;
conditions&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4732.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4732-en-datamining_for_hackers_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reverse-engineering a Qualcomm baseband ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Despite their wide presence in our lives, baseband chips are still&lt;br /&gt;
nowadays poorly known and understood from a system point of view. Some&lt;br /&gt;
presentations have hilighted vulnerabilities in GSM stacks across&lt;br /&gt;
various models of basebands (cf. 27c3: *All your baseband are belong&lt;br /&gt;
to us* by R-P. Weinmann). However none of them actually focused on the&lt;br /&gt;
details of how a baseband operating system really works. This is the&lt;br /&gt;
focus of our presentation. From the study of a simple 3G USB stick&lt;br /&gt;
equipped with a Qualcomm baseband, we will discuss how to dump the&lt;br /&gt;
volatile memory, reverse-engineer the proprietary RTOS, and ultimately&lt;br /&gt;
execute and debug code while trying to preserve the real-time system&lt;br /&gt;
constraints.&lt;br /&gt;
== Introduction == &lt;br /&gt;
The following work has resulted from a straightforward observation:&lt;br /&gt;
security in the baseband world is something hard to reach. Anyone&lt;br /&gt;
trying to get into it is confronted with two obstacles. At the network&lt;br /&gt;
level, one has to apprehend the extremely massive 3GPP specifications.&lt;br /&gt;
At the system level, basebands are just undocumented and closed-source&lt;br /&gt;
pieces of code running in embedded chips. Consequently, a baseband is&lt;br /&gt;
mostly seen as a blackbox running code for a terrifyingly complex&lt;br /&gt;
network stack.&lt;br /&gt;
&lt;br /&gt;
Given the complexity of the involved network protocols, and the fact&lt;br /&gt;
that telephony stacks are historically old pieces of code, it is&lt;br /&gt;
fairly acceptable to think that vulnerabilities can be found inside&lt;br /&gt;
basebands. Ralf-Philipp Weinmann has already demonstrated this claim&lt;br /&gt;
during the 27C3 event in 2010. Finding and triggering vulnerabilities&lt;br /&gt;
in basebands sound very appealing, but we have to remember that these&lt;br /&gt;
are only preliminary steps before the final exploitation. And for any&lt;br /&gt;
exploitation to succeed, one has to know the environment into which&lt;br /&gt;
the code is currently running. What is the architecture? What is the&lt;br /&gt;
operating system? What does the memory look like? How is structured&lt;br /&gt;
the heap? Can I safely return to some point and resume the execution?&lt;br /&gt;
&lt;br /&gt;
For those reasons and out of curiosity, I started exploring the core&lt;br /&gt;
of a Qualcomm baseband. The targeted device is the Icon 225 3G USB&lt;br /&gt;
stick. It embeds a MSM6280 Qualcomm baseband based on the ARMv5TEJ&lt;br /&gt;
architecture, plus two proprietary DSPs. No application processor is&lt;br /&gt;
present on those USB sticks. Qualcomm basebands are also notably&lt;br /&gt;
present on HTC phones.&lt;br /&gt;
== Dumping the device memory == &lt;br /&gt;
The first step for understanding the baseband code is to manage to get&lt;br /&gt;
a look at it. Plugging the USB stick fires up three serial ports over&lt;br /&gt;
the USB link. The first one is used to handle Hayes commands to&lt;br /&gt;
control the modem. The two other ones are unknown at first glance.&lt;br /&gt;
However I remarked that a little tool for SIM-unlocking a device made&lt;br /&gt;
use of one of those serial ports. After dumping the USB packets, it&lt;br /&gt;
appeared this serial link actually handles diagnostic commands for&lt;br /&gt;
Qualcomm. The protocol used is very simple and allows at least writing&lt;br /&gt;
and executing code into a small region of the memory.&lt;br /&gt;
&lt;br /&gt;
Injecting a custom payload allowed me to quickly dump the entire&lt;br /&gt;
contents of the memory (32MB). On the ARM architecture, the first&lt;br /&gt;
piece of code to be executed is a ROM located at 0xffff0000. Reverse-&lt;br /&gt;
engineering this primary bootloader (PBL) gives us the entry point to&lt;br /&gt;
the secondary bootloader (SBL). Then disassembling the RAM dump from&lt;br /&gt;
this address clearly indicates we have one-to-one physical to virtual&lt;br /&gt;
memory mapping.&lt;br /&gt;
== Reverse engineering the RTOS == &lt;br /&gt;
The embedded code inside the baseband is a proprietary operating&lt;br /&gt;
system from Qualcomm. The real-time microkernel seems to be called&lt;br /&gt;
REX, while the operating system itself is named AMSS.&lt;br /&gt;
&lt;br /&gt;
I have reverse-engineered most part of the microkernel primitives&lt;br /&gt;
including:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ the scheduler&lt;br /&gt;
+ the inter-tasks communication mechanism&lt;br /&gt;
+ the asynchronous/deferred procedure calls mechanism&lt;br /&gt;
+ the timers&lt;br /&gt;
+ the heap memory structure and allocation routines&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The kernel implements lightweight processes called tasks. All tasks&lt;br /&gt;
share the same virtual address space. MMU is set up at boot time with&lt;br /&gt;
a virtual to physical mapping and the first 12MB of memory are marked&lt;br /&gt;
read-only. NX is not enabled (thus everything is executable).&lt;br /&gt;
&lt;br /&gt;
Three tasks are created automatically at boot time:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ the idle task&lt;br /&gt;
+ the DPC task, responsible for dispatching deferred procedure calls&lt;br /&gt;
+ the main task, responsible for running all the other tasks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When fully started, AMSS is made up of approximatively 70 running&lt;br /&gt;
tasks. They are dedicated to hardware management (DSP, USB, USIM,&lt;br /&gt;
Vocoder, ...), network stacks management for each layer (GSM L1/L2/L3,&lt;br /&gt;
SMS, RRC, LLC, and so on), and miscellaneous features (in particular&lt;br /&gt;
the diagnostic task). Although the USB stick is only intended to be&lt;br /&gt;
used for data over 3G, the operating system is a full-blown baseband&lt;br /&gt;
supporting all kinds of telephony stacks and features.&lt;br /&gt;
&lt;br /&gt;
The tasks communicate with each other by the mean of signals and&lt;br /&gt;
buffer queues. A command buffer is pushed on a FIFO queue and a signal&lt;br /&gt;
is sent to the task for processing.&lt;br /&gt;
&lt;br /&gt;
Regarding the memory allocation management, the operating system&lt;br /&gt;
mainly uses two kinds of heaps. The first heap has a classical *free&lt;br /&gt;
blocks-tracking* structure where tasks can allocate arbitrary memory&lt;br /&gt;
blocks using the malloc/free functions. Another kind of heap is also&lt;br /&gt;
used on top of the former to represent the memory as a contiguous&lt;br /&gt;
stream of data that tasks can produce and consume (suited for network&lt;br /&gt;
data flow).&lt;br /&gt;
== Code execution and debugging == &lt;br /&gt;
Static analysis of the whole operating system is possible, but the&lt;br /&gt;
code is pretty massive and a lot of interactions between different&lt;br /&gt;
tasks are involved at run-time. Since code execution is possible on&lt;br /&gt;
the device, I investigated how to dynamically debug system code. I&lt;br /&gt;
present here the architecture of the debugger I am currently writing&lt;br /&gt;
(this is still a work in progress).&lt;br /&gt;
&lt;br /&gt;
The main point is to be able to debug the operating system with the&lt;br /&gt;
fewest possible side-effects. In a nutshell, the debugger has to be&lt;br /&gt;
real-time compliant as much as possible. For the communication with&lt;br /&gt;
the debugger, I decided to reuse the diagnostic task channel over USB&lt;br /&gt;
by implementing custom command handlers. The debugger then relies on&lt;br /&gt;
the GDB server protocol implemented over the diagnostic channel&lt;br /&gt;
protocol, itself being over USB.&lt;br /&gt;
&lt;br /&gt;
We have access to the interrupt vectors, and we can put BKPT&lt;br /&gt;
instructions anywhere as well (everything is running in ARM supervisor&lt;br /&gt;
mode and we can disable the MMU if necessary). If the exception&lt;br /&gt;
address is a watchpoint, we dump the state of registers and stack, and&lt;br /&gt;
set up a DPC to acknowledge the debugger of the event. Then execution&lt;br /&gt;
is immediately resumed. If the exception address is a breakpoint, then&lt;br /&gt;
we set up a DPC for the debugger and put the task into a wait state&lt;br /&gt;
allowing other tasks to be immediately scheduled. The execution for&lt;br /&gt;
the waiting task can be resumed by the debugger by sending it a&lt;br /&gt;
special signal.&lt;br /&gt;
&lt;br /&gt;
The debugger is making use of its own separated heap and queue at a&lt;br /&gt;
high address, not to interfere with other operating system tasks while&lt;br /&gt;
processing debug events.&lt;br /&gt;
&lt;br /&gt;
Of course some tasks will need to process code at timely events,&lt;br /&gt;
especially those at the lowest layers, so specific care has to be&lt;br /&gt;
taken not to put breakpoints that would possibly break the RF&lt;br /&gt;
processing.&lt;br /&gt;
&lt;br /&gt;
ARMv5 has no native support for single-stepping the code. Single-step&lt;br /&gt;
is implemented by predicting the next PC address and putting a&lt;br /&gt;
breakpoint at it.&lt;br /&gt;
== Notes and further thoughts == &lt;br /&gt;
Information about the code execution environment on basebands is&lt;br /&gt;
clearly lacking in the literature. On the contrary of previous&lt;br /&gt;
presentations on the same topic, this presentation focuses on the&lt;br /&gt;
details of a proprietary baseband operating system, in this case&lt;br /&gt;
Qualcomm&#039;s. I intend to do a demonstration of the debugger for the&lt;br /&gt;
presentation, and to release the source code later on.&lt;br /&gt;
&lt;br /&gt;
Future areas of work may include a study of the proprietary DSPs and&lt;br /&gt;
the possibility to locally *fuzz* the baseband without using a base&lt;br /&gt;
station.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4735.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4735-en-reverse_engineering_a_qualcomm_baseband_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._13&amp;diff=3588</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 13</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._13&amp;diff=3588"/>
		<updated>2012-01-23T20:20:23Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/03/28 20:00:00 PM |enddate=2012/03/28 22:00:00 PM |title=Chaotic Congress Cinema Nr. 13 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/03/28 20:00:00 PM&lt;br /&gt;
|enddate=2012/03/28 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 13&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== DC+, The Protocol ==   &lt;br /&gt;
Technical defense against data retention law&lt;br /&gt;
&lt;br /&gt;
The idea of Dining Cryptographers-Networks (DC) offers a much better&lt;br /&gt;
anonymity compared to MIX-Networks: Defined anonymity sets, no need to&lt;br /&gt;
trust in a central service, no possible attack for data retention.&lt;br /&gt;
&lt;br /&gt;
In this talk you will learn about DC-Networks, advanced key generation&lt;br /&gt;
methods (resulting in a DC+-Network) and a library to make DC-Networks&lt;br /&gt;
available to your programs.&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `A DC+-Server &amp;lt;https://github.com/klobs/erlang-DC&amp;gt;`__&lt;br /&gt;
+ `A DC+-Library &amp;lt;https://github.com/klobs/dc--&amp;gt;`__&lt;br /&gt;
+ `Multicast on top of DC-Networks&lt;br /&gt;
  &amp;lt;https://github.com/klobs/libmulticastDC&amp;gt;`__&lt;br /&gt;
+ `https://github.com/klobs/DCoffee&lt;br /&gt;
  &amp;lt;https://github.com/klobs/DCoffee&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4723.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4723-en-dc_plus_the_protocol_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Crowdsourcing Genome Wide Association Studies ==   &lt;br /&gt;
Freeing Genetic Data from Corporate Vaults&lt;br /&gt;
&lt;br /&gt;
It was only a couple of years ago that generating genetic information&lt;br /&gt;
about individuals was expensive and laborious work. Modern techniques&lt;br /&gt;
have drastically cut cost and time needed to get an insight into one&#039;s&lt;br /&gt;
genome and have ultimately led to the formation of personal genetics&lt;br /&gt;
companies – like 23andMe, deCODEme and others – that now offer direct-&lt;br /&gt;
to-customer genetic testing. With a price tag of those tests starting&lt;br /&gt;
at about 100 €, the number of people that do such tests is on the&lt;br /&gt;
rise. By now, 23andMe alone has over 100.000 paying customers, with&lt;br /&gt;
over 60.000 of them willing to donate their genetic data and to&lt;br /&gt;
actively participate in research projects by filling out surveys, e.g.&lt;br /&gt;
on their medical histories. This has resulted in a high-quality&lt;br /&gt;
dataset with genetic information of 60.000 individuals. The best part:&lt;br /&gt;
The data has already been paid for by the participants in the&lt;br /&gt;
research.&lt;br /&gt;
&lt;br /&gt;
Who would not love to get their hands on data like this?&lt;br /&gt;
Unfortunately, the data sits locked away in corporate vaults,&lt;br /&gt;
inaccessible to interested (citizen) scientists. But what if we could&lt;br /&gt;
change this?&lt;br /&gt;
&lt;br /&gt;
We&#039;ve created openSNP, a central, open source, free-to-use repository&lt;br /&gt;
which lets customers of genotyping companies upload their genotyping&lt;br /&gt;
data and annotate them with phenotypes. OpenSNP provides its users&lt;br /&gt;
with the latest scientific research on their genotypes and lets&lt;br /&gt;
scientists download annotated genotypes to make science more open.&lt;br /&gt;
&lt;br /&gt;
Companies that perform Direct-To-Customer (DTC) genetic tests have now&lt;br /&gt;
been around for about six years, with 23andMe – founded in 2006 – and&lt;br /&gt;
deCODEme being two of the oldest companies on the market. Their&lt;br /&gt;
customers receive a test tube via mail, spit into this tube and send&lt;br /&gt;
it back to their DTC company to get their genetic information&lt;br /&gt;
analyzed. The tests performed by DTC companies do not utilize the more&lt;br /&gt;
famous DNA sequencing, but rely on faster and cheaper DNA microarrays&lt;br /&gt;
instead.&lt;br /&gt;
&lt;br /&gt;
Microarrays screen for around 1 million genetic markers, called Single&lt;br /&gt;
Nucleotide Polymorphisms (SNPs). A SNP is a genomic variation, where a&lt;br /&gt;
single base is changed at one site between members of a population.&lt;br /&gt;
Usually a SNP has only two alleles (variants) and occurs with a&lt;br /&gt;
frequency of at least 1% in the population. Spread over the whole&lt;br /&gt;
human genome, each of us carries around 10 million variable sites,&lt;br /&gt;
where 10% are covered by DTC-companies. Because of their uniqueness,&lt;br /&gt;
SNPs can be used as markers associated with certain conditions. For&lt;br /&gt;
example, there are variations of SNPs that are associated with&lt;br /&gt;
elevated risks of developing breast cancer or Alzheimer’s. Other SNPs&lt;br /&gt;
can be used to predict how a person metabolizes chemicals or drugs.&lt;br /&gt;
&lt;br /&gt;
23andMe uses the results of consenting customers to perform their own&lt;br /&gt;
genome wide association studies (GWAS). Those studies check for&lt;br /&gt;
statistical differences between different groups. In a simple example&lt;br /&gt;
one could have a group that is known to have Alzheimer’s and a&lt;br /&gt;
control-group that does not have Alzheimer’s. Given enough&lt;br /&gt;
participants, one can then look for genetical variants that are over-&lt;br /&gt;
or underrepresented in one of the groups. The variants that are found&lt;br /&gt;
by this method can then be used as predictors for Alzheimer’s.&lt;br /&gt;
&lt;br /&gt;
We feel that research projects all over the world and science in&lt;br /&gt;
general would benefit from a rich, freely available source of linked,&lt;br /&gt;
genetic data. And although genome wide association studies need a&lt;br /&gt;
minimum number of participants to be able to find significant&lt;br /&gt;
variations, it is not necessary to have 30.000 participants in your&lt;br /&gt;
study. There are many publications with significant results with a&lt;br /&gt;
total number of participants of less than 5000 individuals. Given the&lt;br /&gt;
current number of 23andMe customers, one only needs 5 % of them to&lt;br /&gt;
participate in freely sharing their genetic information together with&lt;br /&gt;
basic information on some medical conditions or other variations to&lt;br /&gt;
reach the critical mass to be able to perform simple association&lt;br /&gt;
studies! While many people have already started to publish their&lt;br /&gt;
results on GitHub et al. and movements like DIYBio are starting to&lt;br /&gt;
take off, there are no real efforts to create a repository to&lt;br /&gt;
centrally collect this kind of data.&lt;br /&gt;
&lt;br /&gt;
But what if one could create an open platform to collect this kind of&lt;br /&gt;
linked data? Is it possible to perform crowd-sourced association&lt;br /&gt;
studies to create new knowledge about our genes? With the creation of&lt;br /&gt;
openSNP we have tried (and are still trying) to find out.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4730.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4730-en-crowdsourcing_genome_wide_association_studies_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._12&amp;diff=3587</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 12</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._12&amp;diff=3587"/>
		<updated>2012-01-23T20:20:12Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/03/21 20:00:00 PM |enddate=2012/03/21 22:00:00 PM |title=Chaotic Congress Cinema Nr. 12 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/03/21 20:00:00 PM&lt;br /&gt;
|enddate=2012/03/21 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 12&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Pentanews Game Show 2k11/3 ==   &lt;br /&gt;
42 new questions, new jokers, same concept, more fun than last year!&lt;br /&gt;
&lt;br /&gt;
The Penta News Game Show rehashes a collection of absurd, day-to-day&lt;br /&gt;
news items of 2011 to entertain the audience, let the Net participate,&lt;br /&gt;
and make it&#039;s winners heroes.&lt;br /&gt;
&lt;br /&gt;
The Penta News Game Show rehashes a collection of absurd, day-to-day&lt;br /&gt;
news items of 2011. The contestants will have to answer 42 questions&lt;br /&gt;
for your entertainment.&lt;br /&gt;
&lt;br /&gt;
If they can&#039;t answer you (Yes, you on the Internet.) can help out.&lt;br /&gt;
&amp;gt; Get your IRC clients ready. Further, a Web browser will be of great&lt;br /&gt;
help. &amp;lt; p&amp;gt;&lt;br /&gt;
If you have participated in last years show you will enjoy a few&lt;br /&gt;
adjustments and new jokers.&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `Questions and Answers &amp;lt;http://www.c3d2.de/news/28c3-pentanews-&lt;br /&gt;
  answers.html&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4721.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4721-en-pentanews_game_show_2k11_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NPC - Nerds Pissing Contest ==   &lt;br /&gt;
Mein Ruby ist besser als dein urxvt!&lt;br /&gt;
&lt;br /&gt;
Hier geht es um die Gretchenfrage: „Welches Tool ist das beste?“ Dabei&lt;br /&gt;
treten zwei Teams gegeneinander an und müssen live verschiedene&lt;br /&gt;
$RANDOM_NERD_TASK auf ihren eigenen Rechnern lösen. Wer dabei zeigt,&lt;br /&gt;
dass sein Tool das schnellere, schlankere, mächtigere, längere,&lt;br /&gt;
größere^w^w^w^wist, gewinnt. Durch das Programm führen Jan „git-zsh-&lt;br /&gt;
keynote-firefox“ Wulfes und Benjamin „bzr-fish-latexbeamer-chrome“&lt;br /&gt;
Kellermann.&lt;br /&gt;
&lt;br /&gt;
In dieser Ausgabe des NPCs geht es darum herauszufinden, welcher&lt;br /&gt;
Editor der beste ist. Zwei Teams (à 1-4 Teilnehmer) treten mit dem&lt;br /&gt;
Editor ihrer Wahl gegeneinander an, um diese religiöse Frage zu&lt;br /&gt;
beantworten.&lt;br /&gt;
&lt;br /&gt;
Nach einer dreiminütigen Laudatio zum Editor ihrer Wahl müssen sie in&lt;br /&gt;
der Pflicht vorgegebene Aufgaben vor den Augen des Publikums möglichst&lt;br /&gt;
schnell und elegant lösen. Hierzu dürfen die Teams ihre&lt;br /&gt;
Konfigurationsdateien verwenden.&lt;br /&gt;
&lt;br /&gt;
In der Kür muss jedes Team die Stärken seines Editors durch einen&lt;br /&gt;
kleinen Stunt präsentieren, welcher dann vom jeweils anderen Team&lt;br /&gt;
ebenfalls gestanden oder sogar getoppt werden muss.&lt;br /&gt;
&lt;br /&gt;
Publikum aufgepasst eure Skills sind gefragt, wir wollen Euch mit&lt;br /&gt;
einbeziehen: per Chat könnt Ihr dem Team auf der Bühne beim Lösen der&lt;br /&gt;
Aufgaben helfen.&lt;br /&gt;
&lt;br /&gt;
Bewerbungen für Teammitgliedschaften und Eure Fragen könnt Ihr vorab&lt;br /&gt;
an Email: `pissing28c3@c3d2.de &amp;lt;mailto:pissing28c3@c3d2.de&amp;gt;`__&lt;br /&gt;
richten.&lt;br /&gt;
&lt;br /&gt;
Ihr könnt Euch auf folgende Fragen unsererseits vorbereiten:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     `============8&amp;lt;============================&lt;br /&gt;
    Das Spiel wird grob folgende Dinge abfragen:&lt;br /&gt;
    &lt;br /&gt;
    • Ihr dürft Eure eigene Konfiguration mitbringen&lt;br /&gt;
    • Wir wollen zum Beispiel sehen, wie gut sich Euer Editor zum programmieren eignet.&lt;br /&gt;
        - Zeigt uns wie gut euer Syntax-Highlighting &amp;amp; automatische Code-Einrückung&lt;br /&gt;
            für verschiedenste Sprachen funktioniert.&lt;br /&gt;
        - Taugt Euer Editor als IDE? Dann zeigt uns, dass er die von uns&lt;br /&gt;
            vorgegebenen Refactoring-Aufgaben löst.&lt;br /&gt;
        - Jede gute IDE unterstützt die Programmierer mit Einbindung von&lt;br /&gt;
            Online-Doku. Wie kann das Euer Tool? Zeigt uns das in zwei von Euch&lt;br /&gt;
            vorbereiteten Programmiersprachen.&lt;br /&gt;
        - Wie gut ist Make/Compiler/Debugger integrierbar?&lt;br /&gt;
    • Wie gut unterstützt er Euch bei der Textproduktion?&lt;br /&gt;
        - Wir prüfen die Rechtschreibkontrolle.&lt;br /&gt;
        - Wir möchten sehen, ob Euer Editor die businessüblichen Formate&lt;br /&gt;
            verarbeiten kann.&lt;br /&gt;
        - Wie gut er Euch in langen Texten navigieren lässt.&lt;br /&gt;
        - Nette Features, wie parallele Bearbeitung durch mehrere Benutzer werden&lt;br /&gt;
            positiv bewertet.&lt;br /&gt;
    • Wissen heisst wissen wo es steht.&lt;br /&gt;
        - Wie gut ist Euer Editor dokumentiert?&lt;br /&gt;
        - Wie leicht findet man die passende Doku?&lt;br /&gt;
    • Konfigurierbarkeit&lt;br /&gt;
        - Wir möchten, dass Ihr ein kleines Syntax-Highlighting implementiert.&lt;br /&gt;
        - Euren Editor um eine kleine Funktion erweitert.&lt;br /&gt;
    `&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4722.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4722-de-dick_size_war_for_nerds_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._11&amp;diff=3586</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 11</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._11&amp;diff=3586"/>
		<updated>2012-01-23T20:20:05Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/03/14 20:00:00 PM |enddate=2012/03/14 22:00:00 PM |title=Chaotic Congress Cinema Nr. 11 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/03/14 20:00:00 PM&lt;br /&gt;
|enddate=2012/03/14 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 11&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Privacy Invasion or Innovative Science? ==   &lt;br /&gt;
Academia, social media data, and privacy&lt;br /&gt;
&lt;br /&gt;
A practical discussion of how potentially revolutionary, yet ethically&lt;br /&gt;
questionable data---such as that from facebook---is currently being&lt;br /&gt;
handled in academia.&lt;br /&gt;
&lt;br /&gt;
With every day that passes, the users of social media websites are&lt;br /&gt;
providing scientists with ever-richer, larger datasets on human&lt;br /&gt;
behavior. At the same time, machine-learning techniques allow us to&lt;br /&gt;
exploit this data to accurately predict who these users are and how&lt;br /&gt;
they will behave in the future. I begin this talk by outlining the&lt;br /&gt;
need for public datasets containing rich information on individuals&lt;br /&gt;
and their social relations. I then show how in practice, distribution&lt;br /&gt;
and use of such datasets by academics is awkward and confused. I&lt;br /&gt;
conclude with some consideration of how &amp;quot;enhancing&amp;quot; datasets by, for&lt;br /&gt;
example, inferring missing or hidden data using machine learning&lt;br /&gt;
classifiers, creates yet another ethical grey-zone.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4712.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4712-en-mining_your_geotags_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is in a name? ==   &lt;br /&gt;
Identity-Regimes from 1500 to the 2000s&lt;br /&gt;
&lt;br /&gt;
Starting with the history of birth-registration an overview on the&lt;br /&gt;
historical regimes of naming and identifying people from the 15th to&lt;br /&gt;
the 20th century is given. the talk will show examples of the&lt;br /&gt;
different identity media through time and their standardization with&lt;br /&gt;
the rise of the Westphalian nation state and the subsequent&lt;br /&gt;
developments after the French Revolution and during the 20th century.&lt;br /&gt;
The goal of the talk is to show the complexity of the phenomenon of&lt;br /&gt;
personal names and their media and the need for an informed debate on&lt;br /&gt;
who and how naming and identification in the digital age is achieved.&lt;br /&gt;
&lt;br /&gt;
In July 2011 Google opened the social network named Google+,&lt;br /&gt;
immediately spawning a fierce debate about its real-name policy&lt;br /&gt;
barring users from opening accounts with pseudonyms. Just a few days&lt;br /&gt;
later Facebooks Vice President Randi Zuckerberg echoed Google&#039;s&lt;br /&gt;
sentiment, asserting: “(…) anonymity on the Internet has to go away.”&lt;br /&gt;
Finally in early August Germanys minister of the interior demanded an&lt;br /&gt;
end of anonymity on the Internet.&lt;br /&gt;
&lt;br /&gt;
My proposed talk is not concerned with the relation of anonymity and&lt;br /&gt;
pseudonymity and free speech, discrimination and empowerment that&lt;br /&gt;
dominated the ‘real-name’ “nymwars” on the internet.&lt;br /&gt;
&lt;br /&gt;
Instead it seeks to de-familiarize the notion of the ‘real name’ by&lt;br /&gt;
exposing central aspects of the media-history of names, situating&lt;br /&gt;
personal names in relation to the development of statehood and&lt;br /&gt;
capitalism between the 1500 and the 2000s.&lt;br /&gt;
&lt;br /&gt;
I thus will outline the history and function of birth-registration as&lt;br /&gt;
introduced in the wake of the reformation in 1543 and its subsequent&lt;br /&gt;
secularization during the rise of the Westaphalian nation state.&lt;br /&gt;
&lt;br /&gt;
This includes an overview of the international standardization of both&lt;br /&gt;
identity papers and personal naming regimes during the 19th century in&lt;br /&gt;
the context of post-1789 development of statehood and colonization.&lt;br /&gt;
Moving to the 2oth century I will provide examples of the development&lt;br /&gt;
and standardization of the passport-system after WWI, and conclude my&lt;br /&gt;
talk with a synopsis of administrative digital identity vision of the&lt;br /&gt;
early nineties.&lt;br /&gt;
&lt;br /&gt;
The goal of the talk is first de-familiarize the notion of the&lt;br /&gt;
personal-name by showing its complex historical and material&lt;br /&gt;
background, secondly to contextualize the current developments of&lt;br /&gt;
digital identity regimes (Neuer Personalausweis, Google+, NSTIC etc)&lt;br /&gt;
within the larger and longer-term developments of statehood and&lt;br /&gt;
capitalist societies. Thirdly my talk will show that a name never was&lt;br /&gt;
ones own but always an intersection of administrative, media-technical&lt;br /&gt;
and personal interventions and as such is currently becoming a&lt;br /&gt;
contested phenomenon again, requiring an informed debate about what is&lt;br /&gt;
in a name.&lt;br /&gt;
&lt;br /&gt;
Duration 40 mins, presentation style will be slides and accompanying&lt;br /&gt;
talk, discussion afterwards.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Christoph Engemann studied psychology at the University of Bremen and&lt;br /&gt;
became a Ph.D fellow of the Bremen International Graduate School of&lt;br /&gt;
Social Sciences in 2002. Between 2003 and 2006 he was named a Non-&lt;br /&gt;
Residential-Fellow at the Center for Internet and Society Stanford Law&lt;br /&gt;
School.&lt;br /&gt;
&lt;br /&gt;
Christoph took part in the 2005 Doctoral Summer School of the Oxford&lt;br /&gt;
Internet Institute and was a lecturer at the Science, Technology and&lt;br /&gt;
Society Program at the University of Texas in 2007 and 2008. Since&lt;br /&gt;
February 2010 he works as researcher and lecturer at the&lt;br /&gt;
Internationales Kolleg für Kulturtechnikforschung und&lt;br /&gt;
Medienphilosophie at the Bauhaus University Weimar. In 2011 Christoph&lt;br /&gt;
was a faculty member at the Weimar-Princeton Summer School for Media&lt;br /&gt;
Studies on the topic of surveillance.&lt;br /&gt;
&lt;br /&gt;
Christoph is member of the DFG-research network &amp;quot;Digital Citizens and&lt;br /&gt;
their Identity&amp;quot;&lt;br /&gt;
&lt;br /&gt;
His main areas of research are Governmediality; Digital Identity/Media&lt;br /&gt;
of Identification and their History; Electronic Government; Genealogy&lt;br /&gt;
of the Transaction; Political Economy of Internet.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4713.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4713-en-what_is_in_a_name_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._10&amp;diff=3585</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 10</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._10&amp;diff=3585"/>
		<updated>2012-01-23T20:19:57Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/03/07 20:00:00 PM |enddate=2012/03/07 22:00:00 PM |title=Chaotic Congress Cinema Nr. 10 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/03/07 20:00:00 PM&lt;br /&gt;
|enddate=2012/03/07 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 10&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== The future of cryptology: which 3 letters algorithm(s) could be our&lt;br /&gt;
Titanic? ==   &lt;br /&gt;
RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete Logarithm,&lt;br /&gt;
Integer factorization, Conjectured hard problems&lt;br /&gt;
&lt;br /&gt;
The lessons and best practices of the titanic will be extracted. Are&lt;br /&gt;
we ready?&lt;br /&gt;
&lt;br /&gt;
This will be a co-presentation (Jean-Jacques Quisquater / David&lt;br /&gt;
Samyde) and occasional friendly exchange, with point and counter-point&lt;br /&gt;
of different contrasting views on the impact of solving integer&lt;br /&gt;
factorization and some other difficult problem in cryptography.&lt;br /&gt;
&lt;br /&gt;
The idea is to perform a provocative comparison between the&lt;br /&gt;
&#039;unbreakable&#039; RSA algorithm and the unsinkable Titanic.&lt;br /&gt;
&lt;br /&gt;
Receiving his RSA Conference Lifetime Achievement Award, Rivest said&lt;br /&gt;
that it has not been demonstrated mathematically that factorization&lt;br /&gt;
into primes is difficult. So “Factoring could turn out to be easy,”&lt;br /&gt;
and according to him “maybe someone here will find the method”.&lt;br /&gt;
&lt;br /&gt;
Since 1994 and Shor&#039;s algorithm, the danger of quantum computer is&lt;br /&gt;
known: breaking RSA in polynomial time. Factoring large numbers is&lt;br /&gt;
conjectured to be computationally infeasible on classic non quantum&lt;br /&gt;
computers. No efficient algorithm is known and the research in the&lt;br /&gt;
last 30 years did not show enormous progress.&lt;br /&gt;
&lt;br /&gt;
Iceberg existence is predicted but not shown yet.&lt;br /&gt;
&lt;br /&gt;
According to Rivest a variety of alternative schemes have been&lt;br /&gt;
developed in the decades since RSA was published, and a new system&lt;br /&gt;
could probably be adopted quickly.&lt;br /&gt;
&lt;br /&gt;
This relies on solving factorization only, but several other cases can&lt;br /&gt;
be considered, in some of them the action to replace RSA with a new&lt;br /&gt;
algorithm could require more work than initially planned (solution to&lt;br /&gt;
discrete logarithm).&lt;br /&gt;
&lt;br /&gt;
Managing the risk and the threat of the resolution of any major&lt;br /&gt;
problem used in cryptography is crucial. This presentation challenges&lt;br /&gt;
the conventional thinking using lessons learned from history.&lt;br /&gt;
&lt;br /&gt;
RSA users are everywhere so what could be the consequences of a break&lt;br /&gt;
in the real world? What were the errors made on the Titanic? Can the&lt;br /&gt;
best practices used be improved or just translated into a new scheme?&lt;br /&gt;
What would be the impact of solving the RSA assumption on&lt;br /&gt;
cryptography?&lt;br /&gt;
&lt;br /&gt;
The outline is: History of factorization Titanic primes and RSA keys&lt;br /&gt;
Complexity, classes of algorithms and practical costs Risk analysis&lt;br /&gt;
and Threat management Probability estimation and proactive monitoring&lt;br /&gt;
From best to worst case Best methods and lessons learned Multiple&lt;br /&gt;
scenari (Im)possibility of accurate prediction What to expect and how&lt;br /&gt;
to be ready Conclusion&lt;br /&gt;
&lt;br /&gt;
Andrew Grove, former CEO of Intel said &amp;quot;Only the paranoid survive&amp;quot;.&lt;br /&gt;
Forecasting the presence of a strategic inflection point is hard. What&lt;br /&gt;
to expect at the time of the next major cryptanalysis breakthrough?&lt;br /&gt;
What history teaches? What remains to be done? Are we ready?&lt;br /&gt;
&lt;br /&gt;
The format will be a co-presentation (Jean-Jacques Quisquater/David&lt;br /&gt;
Samyde) and occasional friendly debate or exchange, with point and&lt;br /&gt;
counter-point of different contrasting views on the impact of solving&lt;br /&gt;
integer factorization in Information Security.&lt;br /&gt;
&lt;br /&gt;
At the last RSA conference, Ronald Rivest, Adi Shamir and Leonard&lt;br /&gt;
Adleman received the RSA Conference Lifetime Achievement Award. They&lt;br /&gt;
were rewarded for the creation of the RSA cryptosystem and their&lt;br /&gt;
magnificient contribution to the field of cryptography. Rivest during&lt;br /&gt;
his speech said that it has not been demonstrated mathematically that&lt;br /&gt;
factorization into primes is difficult. So &amp;quot;Factoring could turn out&lt;br /&gt;
to be easy,&amp;quot; and according to him &amp;quot;maybe someone here will find the&lt;br /&gt;
method&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Since 1994 and Shor&#039;s algorithm, the cryptographic community is aware&lt;br /&gt;
of the danger of quantum computer for the the integer factorization&lt;br /&gt;
problem. With a sufficient number of qubits, Shor&#039;s algorithm can be&lt;br /&gt;
used to break RSA in polynomial time. Since last year RSA conference&lt;br /&gt;
the first commercially available quantum computer with 128-qubit chip&lt;br /&gt;
has been sold to an american company. But some criticism and a&lt;br /&gt;
controversy are present around the real potential of this solution.&lt;br /&gt;
&lt;br /&gt;
A well accepted assumption is that factoring large numbers is&lt;br /&gt;
computationally infeasible on classic non quantum computers. No&lt;br /&gt;
classical algorithm is known and the research in the last 30 years did&lt;br /&gt;
not show enormous progress even if the improvements to the field of&lt;br /&gt;
integer factorization are important since the existence of RSA.&lt;br /&gt;
&lt;br /&gt;
The consequences of solving integer factorization in polynomial time&lt;br /&gt;
would be to render the RSA scheme vulnerable. According to Ron Rivest&lt;br /&gt;
a variety of alternative schemes have been developed in the decades&lt;br /&gt;
since RSA was published, and a new system could probably be adopted&lt;br /&gt;
quickly.&lt;br /&gt;
&lt;br /&gt;
Some new encryption/signature schemes are available but they do not&lt;br /&gt;
all rely on some problems that can be proven to be very hard in all&lt;br /&gt;
cases and instances. The difference between a solid proof and a&lt;br /&gt;
conjecture is important but it is not because a problem is proven hard&lt;br /&gt;
that it is enough and sufficient to use it to build a secure&lt;br /&gt;
cryptosystem. The knapsack problem is NP-complete to solve exactly but&lt;br /&gt;
it can be difficult to create a secure cryptosystem from it. Leonard&lt;br /&gt;
Adleman broke the Ron Graham and Adi Shamir enhancement of the Merkle-&lt;br /&gt;
Hellman scheme and so did Serge Vaudenay who broke the Chor-Rivest&lt;br /&gt;
knapsack cryptosystem.&lt;br /&gt;
&lt;br /&gt;
Discrete logarithm, graph isomorphism and integer factorization are&lt;br /&gt;
NP-intermediate problems and they are not known to be to be P or NP-&lt;br /&gt;
complete. Solving the discrete logarithm problem brings a solution to&lt;br /&gt;
the integer factorization problem in a trivial manner. The lack of&lt;br /&gt;
recent progress on the resolution of the discrete logarithm helps and&lt;br /&gt;
supports integer factorization. But in general an advance in one of&lt;br /&gt;
them can be translated into the other one. This is not automatic,&lt;br /&gt;
however it can be expected.&lt;br /&gt;
&lt;br /&gt;
Cryptographic problems rely massively on the integer factorization and&lt;br /&gt;
discrete logarithm problems. Few other systems exist and amongst this&lt;br /&gt;
group some algorithms suffer from cryptanalysis methods, reducing&lt;br /&gt;
their usage to specific cases. The worldwide presence, acceptance and&lt;br /&gt;
usage, of RSA are huge therefore if the algorithm would be compromised&lt;br /&gt;
then a lot of companies would have no choice and would be forced to&lt;br /&gt;
switch to another encryption system.&lt;br /&gt;
&lt;br /&gt;
The quick and rapid adoption of a new system would play an important&lt;br /&gt;
part in maintaining a high level of trust in security. Because public&lt;br /&gt;
key cryptography secures Internet and ecommerce, banking and financial&lt;br /&gt;
transactions, governments communications and much more, the new&lt;br /&gt;
system(s) should be proven to be secure and quickly deployed.&lt;br /&gt;
&lt;br /&gt;
The assumption of Ron Rivest about the difficulty of integer&lt;br /&gt;
factorization relies on the fact that the solution to factorization&lt;br /&gt;
would not create more perturbations in the field of encryption&lt;br /&gt;
algorithms and would not enable new cryptanalytic methods on potential&lt;br /&gt;
replacement solutions. In such a case his statement about replacing&lt;br /&gt;
RSA with a new method is correct. However several other cases can be&lt;br /&gt;
considered, and in some of them the action to replace RSA with a new&lt;br /&gt;
algorithm could require more work than initially planned. In the same&lt;br /&gt;
manner big companies can not really afford (and not only on the&lt;br /&gt;
financial side) to replace one encryption algorithm by another one and&lt;br /&gt;
to experience a failure of the new system just after its deployment.&lt;br /&gt;
&lt;br /&gt;
This presentation challenges the conventional thinking, indeed&lt;br /&gt;
factorization is at the core of number theory and a limited number of&lt;br /&gt;
top researchers do really work and understand it. But a tremendous&lt;br /&gt;
amount of money and business is secured relying on the resistance of&lt;br /&gt;
this problem to years of attack by talented minds. The entire world&lt;br /&gt;
use the RSA algorithm and trusts its security. This is so true that&lt;br /&gt;
some scheme do not even plan a replacement plan and some certificates&lt;br /&gt;
never expire.&lt;br /&gt;
&lt;br /&gt;
In the greek mythology Cassandra received from Apollo the ability to&lt;br /&gt;
predict the future, but she could not provide any evidence data of her&lt;br /&gt;
predictions. She foresaw the destruction of Troy using the Trojan&lt;br /&gt;
Horse, the death of Agamemnon, and her own troubles but she could not&lt;br /&gt;
forestall these tragedies. Ron Rivest did not provide any new method&lt;br /&gt;
to solve factorization but he clarified the possible existence of a&lt;br /&gt;
solution. When the inventor of the system starts to consider that a&lt;br /&gt;
solution can exits it seems to be time to be open minded. If a&lt;br /&gt;
solution can be reached, so what?&lt;br /&gt;
&lt;br /&gt;
Andrew Grove, former CEO of a silicon manufacturer highlighted in his&lt;br /&gt;
book &amp;quot;Only the paranoid survive.&amp;quot; the importance of Cassandras in an&lt;br /&gt;
organization. According to Grove, they can help to predict a strategic&lt;br /&gt;
inflection point.&lt;br /&gt;
&lt;br /&gt;
Factorization in a practical manner would be a strategic inflection&lt;br /&gt;
point but could also not be limited to integer factorization only and&lt;br /&gt;
extend to other fields. A much more elegant method to the problem of&lt;br /&gt;
the decomposition of a composite in primes even inspired movie makers&lt;br /&gt;
and Hollywood (Sneakers by Phil Alden Robinson) or book writers&lt;br /&gt;
(Tetraktys by Ari Juels). What is the reality of such an assumption,&lt;br /&gt;
is this pure science or pure fiction. Are these people Cassandras or&lt;br /&gt;
is it simply impossible ? Through the usage of comparisons and&lt;br /&gt;
metaphors the authors deal with what would be the lessons to learn&lt;br /&gt;
from the resolution of factorization in different cases.&lt;br /&gt;
&lt;br /&gt;
It is difficult to make accurate predictions and cryptographers&lt;br /&gt;
learned with time that even the most brilliant of them and/or the&lt;br /&gt;
giants amongst the community can make bad predictions. The inventors&lt;br /&gt;
of RSA stated in Martin Gardner&#039;s column (August 1977) of Scientific&lt;br /&gt;
American that it would require 40 quadrillion years to factorize&lt;br /&gt;
RSA-129 (426 bits). Derek Atkins lead the work that proved them wrong&lt;br /&gt;
few years later.&lt;br /&gt;
&lt;br /&gt;
The recent history of cryptanalysis teaches us that some schemes are&lt;br /&gt;
weaker than expected and the general perception of the cryptologic&lt;br /&gt;
community can be modified very quickly. A good example is the lack of&lt;br /&gt;
collision resistance of the MD5 hash function designed by Ron Rivest.&lt;br /&gt;
&lt;br /&gt;
The co authors believe that any prediction about the time separating&lt;br /&gt;
us from the existence of an elegant solution to the integer&lt;br /&gt;
factorization problems makes no sense. The art of prediction is much&lt;br /&gt;
more difficult than doing simple comparisons.&lt;br /&gt;
&lt;br /&gt;
The existence of a practical solution to factorize would have the&lt;br /&gt;
effect of an earthquake to the world of cryptography and computer&lt;br /&gt;
security. Predicting earthquake is not really possible and the recent&lt;br /&gt;
past brings to our mind all the colateral effects that can be related&lt;br /&gt;
to an earthquake. In real life seismologists monitor many phenomena&lt;br /&gt;
that are considered to be possible precursors of earthquakes. This&lt;br /&gt;
presentation will develop a simple model based on common sense to&lt;br /&gt;
explain what could be the consequences of an improvement of integer&lt;br /&gt;
factorization according to the probability of its apparition.&lt;br /&gt;
&lt;br /&gt;
If the perception of the cryptologic community would be drastically&lt;br /&gt;
modified about factorization, what could be the consequences on&lt;br /&gt;
cryptography and security in the real world? Can the best practises&lt;br /&gt;
used with RSA be improved or even translated into a new scheme? What&lt;br /&gt;
would be the impact of solving the RSA assumption on numerous other&lt;br /&gt;
algorithm ?&lt;br /&gt;
&lt;br /&gt;
In the case of a resolution of the integer factorization problem,&lt;br /&gt;
several scenari are possible. They all have different implications and&lt;br /&gt;
conclusions. This presentation consider each main scenario according&lt;br /&gt;
to a level of relevance and details the impact and the consequences of&lt;br /&gt;
the new discovery on different fields including computer security,&lt;br /&gt;
governance, cloud security, cyberwar and cyber weapons and other&lt;br /&gt;
fields.&lt;br /&gt;
&lt;br /&gt;
Managing the risk of the creation of a solution to any major problem&lt;br /&gt;
used in cryptography is important for the whole industry. In general&lt;br /&gt;
cryptographers consider that non linear improvements in their field&lt;br /&gt;
take time and that all algorithm are deprecated before to be&lt;br /&gt;
absolutely broken. This presentation will challenge some of these&lt;br /&gt;
statements.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4710.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4710-en-the_future_of_cryptology_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The Atari 2600 Video Computer System: The Ultimate Talk ==   &lt;br /&gt;
The history, the hardware and how to write programs&lt;br /&gt;
&lt;br /&gt;
Going more retro than the Commodore C=64: The Atari 2600 VCS was the&lt;br /&gt;
breakthrough for video games in your own living room. This lecture&lt;br /&gt;
will cover a bit of the history on how it came to live, describes the&lt;br /&gt;
hardware used and shows how to write your own code for it.&lt;br /&gt;
&lt;br /&gt;
The Atari 2600 Video Computer System (VCS for short) was the first&lt;br /&gt;
wide-spread gaming console. It features 128 bytes of RAM, 4k bytes of&lt;br /&gt;
addressable ROM. This was enough to keep it in production for more&lt;br /&gt;
than 13 years.&lt;br /&gt;
&lt;br /&gt;
This lecture divides in three parts:&lt;br /&gt;
&lt;br /&gt;
The first part will cover the history on how it came to live. Learn&lt;br /&gt;
why the Atari 2600 is technically half a Commodore creation. Learn why&lt;br /&gt;
Motorola was really angry about that deal. Can you imagine on how the&lt;br /&gt;
software was created, since there were no PCs or workstations&lt;br /&gt;
available at this time? Get to view the probably first easter egg in&lt;br /&gt;
the history of video games.&lt;br /&gt;
&lt;br /&gt;
The second part will provide an intern view of the chips used in the&lt;br /&gt;
Atari 2600: the 6507 CPU, the 6532 RIOT (RAM-I/O-Timer) and the TIA&lt;br /&gt;
(Television Interface Adapter). It will also show why &amp;quot;racing the&lt;br /&gt;
beam&amp;quot; is so important.&lt;br /&gt;
&lt;br /&gt;
The third part will show how to write your own code. What registers&lt;br /&gt;
you have and how to use them. Using emulators, the Harmony cartridge&lt;br /&gt;
and a self-designed cart that will hopefully be finished by the time&lt;br /&gt;
of the talk.&lt;br /&gt;
&lt;br /&gt;
Still got questions? 2600vcs@svolli.dynxs.de&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4711.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._09&amp;diff=3584</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 09</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._09&amp;diff=3584"/>
		<updated>2012-01-23T20:19:51Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/02/29 20:00:00 PM |enddate=2012/02/29 22:00:00 PM |title=Chaotic Congress Cinema Nr. 9 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/02/29 20:00:00 PM&lt;br /&gt;
|enddate=2012/02/29 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 9&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Power gadgets with your own electricity ==   &lt;br /&gt;
escape the basement and make the sun work for you&lt;br /&gt;
&lt;br /&gt;
This talk, consisting of five distinct parts, is intended to show the&lt;br /&gt;
audience how to get electricity without needing a grid connection. It&lt;br /&gt;
will give information on&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Which energy sources to use&lt;br /&gt;
+ What to power with them&lt;br /&gt;
+ What equipment to get&lt;br /&gt;
+ How to wire it up&lt;br /&gt;
+ And some wishful thinking Participants should be able to assemble&lt;br /&gt;
  their own small-scale energy-generating systems after listening.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Renewable energy isn&#039;t for wealthy investors only. You can have it,&lt;br /&gt;
too.&lt;br /&gt;
&lt;br /&gt;
In this talk we&#039;ll show you how to power your own stuff from the sun,&lt;br /&gt;
wind and other sources of energy.&lt;br /&gt;
&lt;br /&gt;
The talk is divided into 5 different parts:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#. A really short introduction into the available power sources like&lt;br /&gt;
   sun, wind etc. We&#039;ll show some pipe-dreams where more hacking is&lt;br /&gt;
   needed to make it work like salt-gradient energy or damming the&lt;br /&gt;
   mediterranean sea.&lt;br /&gt;
#. We&#039;ll show you how much power you can expect from which source.&lt;br /&gt;
   We&#039;ll also show you what affects power output for various technologies&lt;br /&gt;
   (example: Sun needs to be shining for solar power. We&#039;ll show you how&lt;br /&gt;
   much sunshine you can expect at your place.)&lt;br /&gt;
#. As a follow-up to part 2 we&#039;ll show you the amount of power various&lt;br /&gt;
   things need. You can do the math yourself afterwards to see what you&lt;br /&gt;
   can power from your balcony.&lt;br /&gt;
#. Building the system, the easy and fully-legal way: Build your own&lt;br /&gt;
   independent grid with optional storage. We&#039;ll show what you need for a&lt;br /&gt;
   small-scale solar system independent of the power network. Works well&lt;br /&gt;
   for caravans, camping, gardens and allotments. There will be real&lt;br /&gt;
   solar panels on stage. You will see schematics, parts lists and&lt;br /&gt;
   instructions. We&#039;ll give some hints where to aquire the necessary&lt;br /&gt;
   stuff without paying too much.&lt;br /&gt;
#. The difficult way: Put your own power into the public grid. We&#039;ll&lt;br /&gt;
   show you what you need to do this. This can either make your purse&lt;br /&gt;
   fill up automatically (big installations earning feed-in tariffs) or&lt;br /&gt;
   it can (in theory) make your electricity meter go backwards - but&lt;br /&gt;
   that&#039;s not actually allowed. Once the electrical company recognizes&lt;br /&gt;
   what you are doing (and German law requires you to tell them)&lt;br /&gt;
   unfortunately they will install a digial meter. Digital meters will&lt;br /&gt;
   not count backwards like the Ferraris counters do now...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The speakers have built and are operating various small-scale power&lt;br /&gt;
systems and come from an engineering and commercial background.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4706.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4706-en-power_gadgets_with_your_own_electricity_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Your Disaster/Crisis/Revolution just got Pwned ==   &lt;br /&gt;
Telecomix and Geeks without Bounds on Security and Crisis Response&lt;br /&gt;
&lt;br /&gt;
Software is becoming more and more important in organizing response to&lt;br /&gt;
all kinds of crises, whether that means activists responding to an&lt;br /&gt;
unjust government or aid workers helping with the aftermath of a&lt;br /&gt;
disaster. Security often isn&#039;t the first thing people think about in&lt;br /&gt;
these situations -- they have work to get done, just like the rest of&lt;br /&gt;
us, and many of these tools are built in the heat of the moment. In a&lt;br /&gt;
crisis, a lack of security can make a small disaster into a big one.&lt;br /&gt;
In this talk, we&#039;ll look at real world experiences of the security and&lt;br /&gt;
privacy problems in the field, and how to fix them, at both large and&lt;br /&gt;
small levels.&lt;br /&gt;
&lt;br /&gt;
People are using technology to try to save the world, whether in the&lt;br /&gt;
disaster response world, or in activist or revolutionary work. Many of&lt;br /&gt;
the people involved are not technologists. Many of the people building&lt;br /&gt;
tools for these situations do not understand security. This is a&lt;br /&gt;
problem because: Privacy issues for disaster response Creepy uncle&lt;br /&gt;
Creepy government agency Gaming the aid process with crowdsourced&lt;br /&gt;
reports Activists and revolutionaries are subject to direct attack,&lt;br /&gt;
coercion, harrassment, etc. A few problems: People are using generic&lt;br /&gt;
tools that don&#039;t provide the guarantees they need People are writing&lt;br /&gt;
special-purpose tools without understanding the problem People are&lt;br /&gt;
writing tools which intentionally subvert their users People don&#039;t&lt;br /&gt;
understand the problems they&#039;re causing with how they use tools To fix&lt;br /&gt;
this: Build specialist tools with a deep understanding of the real&lt;br /&gt;
problems Get the help you need to make tools secure Ask for help Help&lt;br /&gt;
disaster/activist ICT projects if you know your security Build&lt;br /&gt;
security into generic tools, even if you&#039;re not planning on&lt;br /&gt;
revolutionaries using them, because you never know when you&#039;re going&lt;br /&gt;
to need to overthrow a government on twittter. Learn/teach about&lt;br /&gt;
security and what it takes to use existing tools well Build a security&lt;br /&gt;
culture in your organization&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `Telecomix &amp;lt;http://telecomix.org/&amp;gt;`__&lt;br /&gt;
+ `Geeks Without Bounds &amp;lt;http://gwob.org/bridging-the-gap-between-&lt;br /&gt;
  traditional-relief-and-new-vtc&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4707.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._08&amp;diff=3583</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 08</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._08&amp;diff=3583"/>
		<updated>2012-01-23T20:19:46Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/02/22 20:00:00 PM |enddate=2012/02/22 22:00:00 PM |title=Chaotic Congress Cinema Nr. 8 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/02/22 20:00:00 PM&lt;br /&gt;
|enddate=2012/02/22 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 8&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Building a Distributed Satellite Ground Station Network - A Call To&lt;br /&gt;
Arms ==   &lt;br /&gt;
Hackers need satellites. Hackers need internet over satellites.&lt;br /&gt;
Satellites require ground stations. Let&#039;s build them!&lt;br /&gt;
&lt;br /&gt;
As proposed by Nick Farr et al at CCCamp11, we - the hacker community&lt;br /&gt;
- are in desperate need for our own communication infrastructure. So&lt;br /&gt;
here we are, answering the call for the Hacker Space Program with our&lt;br /&gt;
proposal of a distributed satellite communications ground station&lt;br /&gt;
network. An affordable way to bring satellite communications to a&lt;br /&gt;
hackerspace near you. We&#039;re proposing a multi-step approach to work&lt;br /&gt;
towards this goal by setting up a distributed network of ground&lt;br /&gt;
stations which will ensure a 24/7 communication window - first&lt;br /&gt;
tracking, then communicating with satellites. The current state of a&lt;br /&gt;
proof of concept implementation will be presented.&lt;br /&gt;
&lt;br /&gt;
This is a project closely related to the academic femto-satellite&lt;br /&gt;
movement, ham radio, Constellation@Home.&lt;br /&gt;
&lt;br /&gt;
The area of small satellites (femto-satellite &amp;lt;0.1 kg up to mini-&lt;br /&gt;
satellite 100-500 kg) is currently pressed forward by Universities and&lt;br /&gt;
enables scientific research at a small budget. Gathered data, both&lt;br /&gt;
scientific and operational, requires communication between satellites&lt;br /&gt;
and ground stations as well as to the final recipients of the data.&lt;br /&gt;
One either has to establish own transmission stations or rent already&lt;br /&gt;
existing stations. The project “distributed ground station” is an&lt;br /&gt;
extension to the project which will offer, at its final expansion&lt;br /&gt;
state, the ability to receive data from satellites and relay them to&lt;br /&gt;
the final recepients. It is therefore proposed that a world-wide&lt;br /&gt;
distributed network of antennas is to be set up which will be&lt;br /&gt;
connected via the internet allowing the forwarding of received signals&lt;br /&gt;
to a central server which will in turn forward signals to further&lt;br /&gt;
recepients. Individual antennas will be set up by volunteers (Citizen&lt;br /&gt;
Scientists) and partner institutions (Universities, institutes,&lt;br /&gt;
companies). The core objective of the project is to develop an&lt;br /&gt;
affordable hardware platform (antenna and receiver) to be connected to&lt;br /&gt;
home computers as well as the required software. This platform should&lt;br /&gt;
enable everyone to receive signals from femto-satellites at a budget&lt;br /&gt;
and in doing so, eradicating black patches where there is currently no&lt;br /&gt;
ground station to receive signals of satellites passing over-head.&lt;br /&gt;
Emphasise is put on contributions by volunteers and ham radio&lt;br /&gt;
operators who can contribute both passively by setting up a receiver&lt;br /&gt;
station or actively by shaping the project making it a community&lt;br /&gt;
driven effort powered by open-source hardware and applications.&lt;br /&gt;
&lt;br /&gt;
Purposes The distributed ground stations will enable many different&lt;br /&gt;
uses. Using distributed ground stations one could receive beacon&lt;br /&gt;
signals of satellites and triangulate their position and trajectory.&lt;br /&gt;
It would therefore be possible to determine the kepler elements right&lt;br /&gt;
after launching of a new satellite without having to rely on official&lt;br /&gt;
reports made at low frequency. Beacon tracking is also not limited to&lt;br /&gt;
just satellites but can be used to track other objects like weather&lt;br /&gt;
balloons and areal drones and record their flight paths. Additionally,&lt;br /&gt;
beacon signals (sender ID, time, transmission power) could be&lt;br /&gt;
augmented with house-keeping data to allow troubleshooting in cases&lt;br /&gt;
where a main data feed is interrupted. Details regarding the protocol&lt;br /&gt;
and maximum data packet length are to be defined during the&lt;br /&gt;
feasibility study phase. Furthermore, distributed ground stations can&lt;br /&gt;
be used as &amp;quot;data dumping&amp;quot; receivers. This can be used to reduce load&lt;br /&gt;
on the main ground station as well as to more quickly distribute data&lt;br /&gt;
to final recipients. The FunCube project, an out-reach project to&lt;br /&gt;
schools, is already using a similar approach. Another expansion stage&lt;br /&gt;
would be increasing the bandwidth of the individual receivers. As a&lt;br /&gt;
side-effect, distributed ground station could also be used to analyse&lt;br /&gt;
meteorite scattering and study effects in the ionosphere by having a&lt;br /&gt;
ground-based sender with a known beacon signal to be reflected off&lt;br /&gt;
meteorites and/or the iononosphere and in turn received by the&lt;br /&gt;
distributed ground stations. Depending on the frequency used further&lt;br /&gt;
applications in the field of atmospheric research, eg. local and&lt;br /&gt;
regional properties of the air and storm clouds, can be imagined.&lt;br /&gt;
Depending on local laws and guidelines, antennas could also be used to&lt;br /&gt;
transmit signals. The concept suggests the following expansion stages:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#. Feasibility study for the individual expansion stages&lt;br /&gt;
#. Beacon-Tracking and sender triangulation&lt;br /&gt;
#. Low-bandwidth satellite-data receiver (up to 10 Kbit/s)&lt;br /&gt;
#. High-bandwidth satellite-data receiver (up to 10 Mbit/s)&lt;br /&gt;
#. Support for data transmission Each stage is again split up into&lt;br /&gt;
   sub-projects to deal with hardware and software design and develoment,&lt;br /&gt;
   prototyping, testing and batch/mass production, Network The networking&lt;br /&gt;
   concept demands that all distributed ground stations are to be&lt;br /&gt;
   connected via the internet. This can be achieved using the&lt;br /&gt;
   Constellation platform. Constellation is a distributed computing&lt;br /&gt;
   project used already for various simulations related to aerospace&lt;br /&gt;
   applications. The system is based on computation power donated by&lt;br /&gt;
   volunteers which is combined to effectively build a world-wide&lt;br /&gt;
   distributed super-computer. The software used to do this is BOINC&lt;br /&gt;
   (Berkeley Open Infrastructure for Network Computing) which also offers&lt;br /&gt;
   support for additional hardware to eg. establish a sensor network.&lt;br /&gt;
   Another BOINC-project is the Quake Quatcher Network which is using&lt;br /&gt;
   accelleration sensors built into laptops or custom USB-dongles to&lt;br /&gt;
   detected earthquakes. Constellation could be enhanced to allow use of&lt;br /&gt;
   the distributed ground station hardware. Constellation is an academic&lt;br /&gt;
   student group of the DGLR (german aerospace society) at Stuttgart&lt;br /&gt;
   University and is supported by Rechenkraft.net e.V and Selfnet e.V..&lt;br /&gt;
   Ham radio and volunteers Special consideration is given to the ham&lt;br /&gt;
   radio community. Femto-satellites make use of the ham radio bands in&lt;br /&gt;
   the UHF, VHF, and S-Band range. As a part of the ham radio community&lt;br /&gt;
   ham radio operators should be treated as part of the network. Ham&lt;br /&gt;
   radio operators hold all required knowledge about the technology&lt;br /&gt;
   required to operate radio equipment and are also well distributed&lt;br /&gt;
   world-wide. To also make the system attractive to volunteers, hardware&lt;br /&gt;
   should be designed in a way that allows manufacturing and distribution&lt;br /&gt;
   on a budget. All designs should also be made public to allow own and&lt;br /&gt;
   improved builds of the system by the community. The hardware should be&lt;br /&gt;
   designed to be simple to use correctly and hard to be used wrong.&lt;br /&gt;
   Supporters &amp;gt; [1] Constellation Plattform, aerospaceresearch.net&lt;br /&gt;
   constellation [2] shackspace Stuttgart, www.shackspace.de References&lt;br /&gt;
   [1] IRS Kleinsatelliten, Universität Stuttgart, kleinsatelliten.de [2]&lt;br /&gt;
   Constellation Plattform, aerospaceresearch.net/constellation [3]&lt;br /&gt;
   BOINC, Berkely University, boinc.edu [4] Quake Catcher Network,&lt;br /&gt;
   qcn.stanford.eu [5] DGLR Bezirksgruppe Stuttgart, stuttgart.dglr.de&lt;br /&gt;
   [6] Rechenkraft.net e.V., rechenkraft.net [7] Selfnet e.V., selfnet.de&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4699.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4699-en-building_a_distributed_satellite_ground_station_network_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is WhiteIT and what does it aim for? ==   &lt;br /&gt;
Why you probably want to be concerned about it and similiar alliances.&lt;br /&gt;
&lt;br /&gt;
This talk will be about the WhiteIT project, initiated by Mr&lt;br /&gt;
Schünemann, German Minister of Interior in the state of Lower Saxony.&lt;br /&gt;
&lt;br /&gt;
The WhiteIT project is concerned with combating the online-&lt;br /&gt;
distribution of child abuse material. WhiteIT tries to develop tools&lt;br /&gt;
and processes to cooperatively suppress the disemination and&lt;br /&gt;
(re-)distribution of said material.&lt;br /&gt;
&lt;br /&gt;
During the Talk the lecturer will try to encourage some open source&lt;br /&gt;
intelligence. So please consider bringing a laptop, netbook or tablet&lt;br /&gt;
with you to help gather and collect certain informations right away.&lt;br /&gt;
&lt;br /&gt;
Being involved with the WhiteIT project, the lecturer will use this&lt;br /&gt;
opportunity to speak freely about his concerns regarding certain&lt;br /&gt;
aspects of the endeavour. The talk will try to explain some of the&lt;br /&gt;
projects aims as well as technical tools and processes developed and&lt;br /&gt;
why he thinks this also concerns you as well.&lt;br /&gt;
&lt;br /&gt;
Although the talk will mainly be concerned with WhiteIT and its&lt;br /&gt;
members, it will also be of concern for other nationals as there are&lt;br /&gt;
some global players involved.&lt;br /&gt;
&lt;br /&gt;
The Talk will be somewhat interactive asking you to crowdsource&lt;br /&gt;
certain information that the lecturer could not get hold off, so&lt;br /&gt;
please bring a laptop, netbook or tablet with you to be able access a&lt;br /&gt;
wiki/etherpad.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4700.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4700-en-what_is_whiteit_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._07&amp;diff=3582</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 07</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._07&amp;diff=3582"/>
		<updated>2012-01-23T20:18:58Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/02/15 20:00:00 PM |enddate=2012/02/15 22:00:00 PM |title=Chaotic Congress Cinema Nr. 7 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/02/15 20:00:00 PM&lt;br /&gt;
|enddate=2012/02/15 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 7&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Implementation of MITM Attack on HDCP-Secured Links ==   &lt;br /&gt;
A non-copyright circumventing application of the HDCP master key&lt;br /&gt;
&lt;br /&gt;
A man-in-the-middle attack on HDCP-secured video links is&lt;br /&gt;
demonstrated. The attack is implemented on an embedded Linux platform,&lt;br /&gt;
with the help of a Spartan-6 FPGA, and is capable of operating real-&lt;br /&gt;
time on HD video links. It utilizes the HDCP master key to derive the&lt;br /&gt;
corresponding private keys of the video source and sink through&lt;br /&gt;
observation and computation upon the exchanged public keys. The man-&lt;br /&gt;
in-the-middle then genlocks its raster and cipher state to the&lt;br /&gt;
incoming video stream, enabling it to do pixel by pixel swapping of&lt;br /&gt;
encrypted data. Since the link does no CRC or hash verification of the&lt;br /&gt;
data, one is able to forge video using this method.&lt;br /&gt;
&lt;br /&gt;
Significantly, the attack enables forging of video data without&lt;br /&gt;
decrypting original video data, so executing the attack does not&lt;br /&gt;
constitute copyright circumvention. Therefore, this novel and&lt;br /&gt;
commercially useful application of the HDCP master key impairs&lt;br /&gt;
equating, in a legal sense, the master key with circumvention.&lt;br /&gt;
Finally, the embodiment of the exploit is entirely open-source,&lt;br /&gt;
including the hardware and the Verilog implementation of the FPGA.&lt;br /&gt;
&lt;br /&gt;
BACKGROUND &amp;amp; CONTEXT&lt;br /&gt;
&lt;br /&gt;
In September 2010, the HDCP master key was circulated via Pastebin.&lt;br /&gt;
Speculation ensued around the application of the master key to create&lt;br /&gt;
HDCP strippers, which would enable the circumvention of certain&lt;br /&gt;
copyright control mechanisms put in place around video links.&lt;br /&gt;
Unfortunately, this is a legally risky application, for a number of&lt;br /&gt;
reasons, including potential conflicts with DMCA legislation that&lt;br /&gt;
criminalizes the circumvention of copyright control mechanisms.&lt;br /&gt;
&lt;br /&gt;
This talk discloses a new use for the HDCP master key that side-steps&lt;br /&gt;
some of the potential legal issues. This hack never decrypts video;&lt;br /&gt;
without decryption, there is no circumvention, and as a result the&lt;br /&gt;
DMCA cannot apply to this hack. Significantly, by demonstrating a&lt;br /&gt;
bona-fide commercially significant purpose for the HDCP master key&lt;br /&gt;
that does not circumvent an access control measure, this hack impairs&lt;br /&gt;
the equating of trafficking or possession of the HDCP master key to&lt;br /&gt;
circumvention and/or circumvention-related crimes.&lt;br /&gt;
&lt;br /&gt;
The main purpose of this hack is to enable the overlay of video&lt;br /&gt;
content onto an HDCP encrypted stream. The simple fact that a trivial&lt;br /&gt;
video overlay becomes an interesting topic is illustrative of the&lt;br /&gt;
distortion of traditional rights and freedoms brought about by the&lt;br /&gt;
DMCA. While the creation of derivative works of video through dynamic&lt;br /&gt;
compositing and overlay (such as picture in picture) seems intuitively&lt;br /&gt;
legal and natural in a pre-HDCP world, the introduction of HDCP made&lt;br /&gt;
it difficult to build such in-line equipment. The putative purpose&lt;br /&gt;
role of HDCP in the digital video ecosystem is to patch the plaintext-&lt;br /&gt;
hole in the transmission of otherwise encrypted video from shiny disks&lt;br /&gt;
(DVDs, BDs) to the glass (LCD, CRT). Since the implementation of video&lt;br /&gt;
overlay would typically require manipulation of plaintext by&lt;br /&gt;
intermediate processing elements, or at least the buffering of a&lt;br /&gt;
plaintext frame where it can be vulnerable to readout, the creation of&lt;br /&gt;
such devices has generally been very difficult to get past the body&lt;br /&gt;
that controls the granting of HDCP keys, for fear that they can be&lt;br /&gt;
hacked and/or repurposed to build an HDCP stripper. Also, while a&lt;br /&gt;
manufacturer could implement such a feature without the controlling&lt;br /&gt;
body&#039;s blessing, they would have to live in constant fear that their&lt;br /&gt;
device keys would be revoked.&lt;br /&gt;
&lt;br /&gt;
While the applications of video overlay are numerous, the basic&lt;br /&gt;
scenario is that while you may be enjoying content X, you would also&lt;br /&gt;
like to be aware of content Y. To combine the two together would&lt;br /&gt;
require a video overlay mechanism. Since video overlay mechanisms are&lt;br /&gt;
effectively banned by the HDCP controlling organization, consumers are&lt;br /&gt;
slaves to the video producers and distribution networks, because&lt;br /&gt;
consumers have not been empowered to remix video at the consumption&lt;br /&gt;
point.&lt;br /&gt;
&lt;br /&gt;
The specific implementation of this hack enables the overlay of a&lt;br /&gt;
WebKit browser over any video feed; a concrete example of the&lt;br /&gt;
capability enabled by this technology is the overlay of twitter feeds&lt;br /&gt;
as &amp;quot;news crawlers&amp;quot; across a TV program, so that one may watch&lt;br /&gt;
community commentary in real-time on the same screen. While some TV&lt;br /&gt;
programs have attempted to incorporate twitter feeds into the show,&lt;br /&gt;
the incorporation has always been on the source side, and as such&lt;br /&gt;
users are unable to pick their hashtags. Now, with this hack, the same&lt;br /&gt;
broadcast program (say, a political debate) can have a very different&lt;br /&gt;
viewing experience based on which hashtag is keyed into the viewer&#039;s&lt;br /&gt;
twitter crawler.&lt;br /&gt;
&lt;br /&gt;
TECHNICAL IMPLEMENTATION&lt;br /&gt;
&lt;br /&gt;
A Spartan-6 FPGA was used to implement a TMDS-compatible source and&lt;br /&gt;
sink. TMDS is the signaling standard used by HDMI and DVI. The basic&lt;br /&gt;
pipeline within the FPGA deserializes incoming video and reserializes&lt;br /&gt;
it to the output. In this trivial mode, it is simply a signal&lt;br /&gt;
amplifier for the video.&lt;br /&gt;
&lt;br /&gt;
In order to enable the overlay of a WebKit browser, an 800 MHz ARM-&lt;br /&gt;
based Linux computer is connected to the FPGA. The Linux computer is&lt;br /&gt;
based upon the PXA168 by Marvell, and it features 128 MB of DDR2 and a&lt;br /&gt;
microSD card for firmware. The distribution is based upon Angstrom and&lt;br /&gt;
it is built using OpenEmbedded with the help of buildbot. The entire&lt;br /&gt;
build system for the Linux computer is available through a public EC2&lt;br /&gt;
cloud image that anyone can copy and rent from Amazon.&lt;br /&gt;
&lt;br /&gt;
From the Linux computer&#039;s standpoint, the FPGA emulates a parallel RGB&lt;br /&gt;
LCD, and thus from the programming standpoint looks simply like a&lt;br /&gt;
framebuffer at /dev/fb0. There is also a device management interface&lt;br /&gt;
revealed through I2C that is managed using the standard Linux I2C&lt;br /&gt;
driver. The I2C management interface handles routine status requests,&lt;br /&gt;
such as reading the video timing and PLL state, and also handles&lt;br /&gt;
reading out sections of snooping buffers, the significance of which&lt;br /&gt;
will be discussed later. The FPGA also has a chroma-key feature where&lt;br /&gt;
a magic color (240,0,240) is remapped to &amp;quot;transparent&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The FPGA itself is bootstrapped through a programming interface where&lt;br /&gt;
the device’s compiled bitstream is sent to the FPGA by writing to&lt;br /&gt;
/dev/fpga. There are also IOCTLs available on /dev/fpga that enable&lt;br /&gt;
other meta-level functions such as resetting the FPGA or querying its&lt;br /&gt;
configuration state.&lt;br /&gt;
&lt;br /&gt;
In addition to passing through the TMDS signal, the FPGA also has the&lt;br /&gt;
ability to listen to *and* manipulate the DDC. The DDC is an I2C link&lt;br /&gt;
found on HDMI cables that enables the reporting of monitor capability&lt;br /&gt;
records (EDIDs) and also is the medium upon which the key exchange&lt;br /&gt;
happens. Therefore, being able to listen to this passively is of great&lt;br /&gt;
importance to the hack. The FPGA implements a &amp;quot;shadow-RAM&amp;quot; which&lt;br /&gt;
records all reads and writes to specific addresses that fall within&lt;br /&gt;
the expected address ranges for EDID and HDCP transactions.&lt;br /&gt;
&lt;br /&gt;
The FPGA also implements a &amp;quot;squash-RAM&amp;quot; which is used to override bits&lt;br /&gt;
on the I2C bus. Since I2C is an open collector standard, overriding a&lt;br /&gt;
1 to a 0 is trivial; but, overriding a 0 to a 1 requires an active&lt;br /&gt;
pull-up. The hardware implements a beefy FET on the DDC to enable&lt;br /&gt;
overriding 0&#039;s to 1&#039;s. The DDC implementation uses a highly&lt;br /&gt;
oversampled I2C state machine. I2C itself only runs at 100 kHz, but&lt;br /&gt;
the state machine implementation runs at 26 MHz. This allows the state&lt;br /&gt;
machine to determine the next state of the I2C bus and decide to&lt;br /&gt;
override or allow the transaction on-the-fly. The &amp;quot;squash-RAM&amp;quot; feature&lt;br /&gt;
is used to override the EDID negotiation such that the video source is&lt;br /&gt;
only informed of modes that the FPGA implementation can handle. For&lt;br /&gt;
example, this implementation cannot handle 3D TV resolutions, so the&lt;br /&gt;
reporting of such capabilities from the TV is squashed before it can&lt;br /&gt;
get to the video source. This causes the source to automatically limit&lt;br /&gt;
its content to be within the hardware capabilities of the FPGA, and to&lt;br /&gt;
be within the resolutions that are supported by the WebKit UI.&lt;br /&gt;
&lt;br /&gt;
The key exchange on HDCP consists of three pieces of data being passed&lt;br /&gt;
back and forth: the source public key (Aksv), the sink public key&lt;br /&gt;
(Bksv), and a piece of shared state (An). The order in which these are&lt;br /&gt;
written is well-defined. The completion of the transfer of the final&lt;br /&gt;
byte of Aksv serves as a trigger to initialize the cipher states of&lt;br /&gt;
the source and the sink. During this time period, each device computes&lt;br /&gt;
the dot-product of the other device&#039;s KSV with their internal private&lt;br /&gt;
key (which is a table of forty 56-bit numbers) and derives a shared&lt;br /&gt;
secret, known as Km. This is basically an implementation of Blom&#039;s&lt;br /&gt;
Scheme.&lt;br /&gt;
&lt;br /&gt;
In order to implement the man-in-the-middle attack, the three pieces&lt;br /&gt;
of data are recorded, and the authentication trigger is passed from&lt;br /&gt;
the FPGA to the Linux computer through an udev event. udev triggers a&lt;br /&gt;
program that reads the KSVs from the snoop memory, and performs a&lt;br /&gt;
computation upon the HDCP master key and the KSVs to derive the&lt;br /&gt;
private keys that mirrors those found in each of the source and sink&lt;br /&gt;
devices. In a nutshell, the computation loops through the 40x40 matrix&lt;br /&gt;
of the HDCP master key, and based upon the KSV having a 1 at a&lt;br /&gt;
particular bit position it sums in the corresponding 40-entry row or&lt;br /&gt;
column of the master key to the 40-entry private key vector. The use&lt;br /&gt;
of a row or columns depends upon if the KSV belongs to a source or a&lt;br /&gt;
sink.&lt;br /&gt;
&lt;br /&gt;
Once the private keys vectors have been derived, they can be&lt;br /&gt;
multiplied in exactly the same fashion as would be found in the source&lt;br /&gt;
or sink to derive the shared secret, Km.&lt;br /&gt;
&lt;br /&gt;
This shared secret, Km, is then written into the FPGA&#039;s HDCP engine,&lt;br /&gt;
and the cipher state is ready to go. In practice, the entire&lt;br /&gt;
computation can happen in real-time, but some devices go faster or&lt;br /&gt;
slower than others, so it is hard to guarantee it always completes in&lt;br /&gt;
time, particularly with the variable interrupt latency of the udev&lt;br /&gt;
handler. As a result, the actual link negotiation caches the value of&lt;br /&gt;
Km from previous authentications, and the udev event primarily&lt;br /&gt;
verifies that Km hasn&#039;t changed (note that for each given source and&lt;br /&gt;
sink pair, Km is static and never changes, so unless users are pulling&lt;br /&gt;
cables out and swapping them between devices, Km is essentially&lt;br /&gt;
static). If the Km has changed, it updates the Km in the FPGA and&lt;br /&gt;
forces a 150ms hot plug event, which re-initiates the authentication,&lt;br /&gt;
thereby making the transaction fairly reliable yet effectively real-&lt;br /&gt;
time.&lt;br /&gt;
&lt;br /&gt;
Significantly, this system as implemented is incapable of operating&lt;br /&gt;
without having the public keys provided by both the source and the&lt;br /&gt;
sink. This means that it cannot &amp;quot;create&amp;quot; an HDCP link: this&lt;br /&gt;
implementation is not an operational HDCP engine on its own. Rather,&lt;br /&gt;
it requires the user of this overlay hack to &amp;quot;prove&amp;quot; it has previously&lt;br /&gt;
purchased a full HDCP link through evidence of valid public keys. This&lt;br /&gt;
“proof of purchase” exhausts the proprietary rights to the link&lt;br /&gt;
associated with first sale doctrine.&lt;br /&gt;
&lt;br /&gt;
Once the FPGA&#039;s HDCP cipher state is matched to the video source&#039;s&lt;br /&gt;
cipher state, one can now selectively encrypt different pixels to&lt;br /&gt;
replace original pixels, and the receiver will decrypt all without any&lt;br /&gt;
error condition. This is because encryption is done on a pixel by&lt;br /&gt;
pixel basis and the receiver does little in the way of verification.&lt;br /&gt;
The lack of link verification is in fact quite intentional and&lt;br /&gt;
necessary. The natural bit error rate of HD video links is atrocious;&lt;br /&gt;
but this is acceptable, because the human eye probably won&#039;t detect&lt;br /&gt;
bit errors even on the level of 1 in every 10,000 bits (at high error&lt;br /&gt;
rates, users see a “sparkle” or “snow” on the screen, but largely the&lt;br /&gt;
image is intact). Therefore, this latitude in allowing pixel-level&lt;br /&gt;
corruption is necessary to keep consumer costs low; otherwise, much&lt;br /&gt;
higher quality cables would be required along with FEC techniques to&lt;br /&gt;
achieve a bit error rate that is compatible with strict cryptographic&lt;br /&gt;
verification techniques such as full-frame hashing.&lt;br /&gt;
&lt;br /&gt;
The selection of which pixel to swap is done by observing the color of&lt;br /&gt;
the overlay&#039;s video. The overlay video is not encrypted and is&lt;br /&gt;
generated by the user, so there is no legal violation to look at the&lt;br /&gt;
color of the overlay video. Note that other pixel-combining methods,&lt;br /&gt;
such as alpha blending, would necessitate the decryption of video. If&lt;br /&gt;
the overlay video matches a certain chroma key color, the incoming&lt;br /&gt;
video is selected; otherwise, the overlay video is selected. This&lt;br /&gt;
allows for the creation of transparent &amp;quot;holes&amp;quot; in the UI. Since the UI&lt;br /&gt;
is rendered by a WebKit browser, chroma-key is implemented by simply&lt;br /&gt;
setting the background color in the CSS of the UI pages to magic-pink.&lt;br /&gt;
This makes the default state of a web page transparent, with all items&lt;br /&gt;
rendered on top of it opaque.&lt;br /&gt;
&lt;br /&gt;
Note that pixel-by-pixel manipulation of the incoming video feed is&lt;br /&gt;
done without any real buffering of the video. A TMDS pixel &amp;quot;lives&amp;quot;&lt;br /&gt;
inside the FPGA for less than a couple dozen clock cycles: the&lt;br /&gt;
lifetime of a pixel is simply the latency of the pipelines and the&lt;br /&gt;
elastic buffers required to deskew wire length differences between&lt;br /&gt;
differential pairs. This means that the overlay video from the Linux&lt;br /&gt;
computer must be strictly available at exactly the right time, or else&lt;br /&gt;
the user will see the overlay jitter and shake. In order to avoid such&lt;br /&gt;
artifacts, the time resolution requirement of the pixel&lt;br /&gt;
synchronization is stricter than the width of a pixclock period, which&lt;br /&gt;
can be as short as dozen nanoseconds.&lt;br /&gt;
&lt;br /&gt;
In order to accomplish this fine-grain synchronization, a genlock&lt;br /&gt;
mechanism was implemented where vertical retrace signals (which are&lt;br /&gt;
unencrypted) trigger an interrupt that initiates the readout of&lt;br /&gt;
/dev/fb0 to the FPGA. However, the interrupt jitter of a non-realtime&lt;br /&gt;
Linux is *much* larger than a single pixel time, so in order to absorb&lt;br /&gt;
this uncertainty, a dynamic genlock engine was implemented in the&lt;br /&gt;
FPGA. An 8-line overlay video FIFO is used to provide the timing&lt;br /&gt;
elasticity between the Linux computer and the primary video feed; and&lt;br /&gt;
the vertical sync interrupt-to-pixel-out latency of the Linux computer&lt;br /&gt;
is dynamically measured by the FPGA and pre-compensated. In effect,&lt;br /&gt;
the FPGA measures how slow the Linux box&#039;s reflexes are, and requests&lt;br /&gt;
for the frame to start coming in advance of when the data is needed.&lt;br /&gt;
These measures, along with a few lines of FIFO, ensure pixel&lt;br /&gt;
availability at the precise time when the pixel is needed.&lt;br /&gt;
&lt;br /&gt;
SUMMARY&lt;br /&gt;
&lt;br /&gt;
A system has been described that enables a man-in-the-middle attack&lt;br /&gt;
upon HDCP secured links. The attack enables the overlay of video upon&lt;br /&gt;
existing streams; an example of an application of the attack is the&lt;br /&gt;
overlay of a personalized twitter feed over video programs. The attack&lt;br /&gt;
relies upon the HDCP master key and a snooping mechanism implemented&lt;br /&gt;
using an FPGA. The implementation of the attack never decrypts&lt;br /&gt;
previously encrypted video, and it is incapable of operating without&lt;br /&gt;
an existing, valid HDCP link. It is thus an embodiment of a bona-fide,&lt;br /&gt;
non-infringing and commercially useful application of the HDCP master&lt;br /&gt;
key. This embodiment impairs the equating of the HDCP master key with&lt;br /&gt;
copyright circumvention purposes.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4686.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introducing Osmo-GMR ==   &lt;br /&gt;
Building a sniffer for the GMR satphones&lt;br /&gt;
&lt;br /&gt;
The latest member of the Osmocom-family projects, osmo-gmr focuses on&lt;br /&gt;
the GMR-1 (GEO Mobile Radio) air interface used in some satellite&lt;br /&gt;
Phones. This talk will shortly present the GMR protocol, the Thuraya&lt;br /&gt;
network that uses this protocol in the Eurasian/African and Australian&lt;br /&gt;
continents and finally details how you can capture samples and process&lt;br /&gt;
them for analysis using osmo-gmr.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4688.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4688-en-introducing_osmo_gmr_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._06&amp;diff=3581</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 06</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._06&amp;diff=3581"/>
		<updated>2012-01-23T20:02:29Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/02/08 20:00:00 PM |enddate=2012/02/08 22:00:00 PM |title=Chaotic Congress Cinema Nr. 6 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/02/08 20:00:00 PM&lt;br /&gt;
|enddate=2012/02/08 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 6&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Apple vs. Google Client Platforms ==   &lt;br /&gt;
How you end up being the Victim.&lt;br /&gt;
&lt;br /&gt;
We will discuss the two different approaches Apple and Google take for&lt;br /&gt;
the client platforms iPad and Chromebook, how they are similar and how&lt;br /&gt;
they are not.&lt;br /&gt;
&lt;br /&gt;
From the security architecture and integrity protection details to&lt;br /&gt;
your account and identity that links you firmly back to the respective&lt;br /&gt;
vendor, we will provide the big picture with occasional close-up&lt;br /&gt;
shots. Here is what powers the vendor has over you, or what powers he&lt;br /&gt;
gives to arbitrary unwashed attackers at conferences through fails in&lt;br /&gt;
logic, binary or HTML.&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `Recurity Labs &amp;lt;http://www.recurity-labs.com&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4676.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4676-en-apple_vs_google_client_platforms_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Effective Denial of Service attacks against web application&lt;br /&gt;
platforms ==   &lt;br /&gt;
We are the 99% (CPU usage)&lt;br /&gt;
&lt;br /&gt;
This talk will show how a common flaw in the implementation of most of&lt;br /&gt;
the popular web programming languages and platforms (including PHP,&lt;br /&gt;
ASP.NET, Java, etc.) can be (ab)used to force web application servers&lt;br /&gt;
to use 99% of CPU for several minutes to hours for a single HTTP&lt;br /&gt;
request.&lt;br /&gt;
&lt;br /&gt;
This attack is mostly independent of the underlying web application&lt;br /&gt;
and just relies on a common fact of how web application servers&lt;br /&gt;
typically work.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4680.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4680-en-effective_dos_attacks_against_web_application_platforms_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._05&amp;diff=3580</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 05</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._05&amp;diff=3580"/>
		<updated>2012-01-23T20:02:03Z</updated>

		<summary type="html">&lt;p&gt;Muelli: Created page with &amp;quot; {{Termin |date=2012/02/01 20:00:00 PM |enddate=2012/02/01 22:00:00 PM |title=Chaotic Congress Cinema Nr. 5 |visible=Yes }} Category:Chaotic-Congress-Cinema  Wir schauen uns ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Termin&lt;br /&gt;
|date=2012/02/01 20:00:00 PM&lt;br /&gt;
|enddate=2012/02/01 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 5&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Bionic Ears ==   &lt;br /&gt;
Introduction into State-of-the-Art Hearing Aid Technology&lt;br /&gt;
&lt;br /&gt;
In many social situations being hearing impaired is a serious&lt;br /&gt;
handicap, not only for elderly people. Today&#039;s hearing aids are tiny&lt;br /&gt;
computers that do a decent job in signal processing. During the last&lt;br /&gt;
years, the progress in this technology was significant, amongst other&lt;br /&gt;
things by switching from analog to digital devices. Since this field&lt;br /&gt;
becomes more and more related to computer technology, there is even&lt;br /&gt;
more improvement to be expected. In particular, it turns into a more&lt;br /&gt;
and more interesting playground for hackers.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, we are still quite far away from what was promised as&lt;br /&gt;
the future in that 70es TV series &amp;quot;The Bionic Woman&amp;quot; [1]. Starting&lt;br /&gt;
with a brief introduction about audiology, I will present current&lt;br /&gt;
technical solutions (and political non-solutions) for hearing aids.&lt;br /&gt;
Besides the hearing aids themselves, there exist a couple of&lt;br /&gt;
interesting peripheral solutions for specific situations such as using&lt;br /&gt;
the phone, listening to concerts and talks, or just consuming music&lt;br /&gt;
with an mp3 player. All these not only enhance the user&#039;s life, they&lt;br /&gt;
also open the door for creative hacks. Although the hearing-aid&lt;br /&gt;
hacking community is still rather small, I will present some current&lt;br /&gt;
projects and ideas for future ones.&lt;br /&gt;
&lt;br /&gt;
Infos about the talk including (sometime soon ;)) slides:&lt;br /&gt;
http://www.hackandhear.com&lt;br /&gt;
&lt;br /&gt;
[1] http://en.wikipedia.org/wiki/The *Bionic*Woman&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `hand and hear &amp;lt;http://hackandhear.com&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4669.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4669-en-bionic_ears_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Die Koalition setzt sich aber aktiv und ernsthaft dafr ein ==   &lt;br /&gt;
Sprachlicher Nebel in der Politik&lt;br /&gt;
&lt;br /&gt;
Aktuelle politische Texte (Reden, Interviews) werden auf Leerformeln,&lt;br /&gt;
Füllsel und Übertreibungen untersucht, die den Text entlarven, selbst&lt;br /&gt;
wenn der Autor versucht, die Hörer bzw. Leser einzulullen, bestimmte&lt;br /&gt;
sprachliche Mittel verraten, welche eigentlichen Meinungen sich im&lt;br /&gt;
Text verstecken. Auf diese Weise wird in den Texten sichtbar, was&lt;br /&gt;
Wilson und Shea als „Fnord“ bezeichnen.&lt;br /&gt;
&lt;br /&gt;
Der Sprachwissenschaftler Victor Klemperer hat festgestellt: „Was&lt;br /&gt;
jemand willentlich verbergen will, sei es vor anderen, sei es vor sich&lt;br /&gt;
selber, auch was er unbewusst in sich trägt: Die Sprache bringt es an&lt;br /&gt;
den Tag.“ Besonders deutlich wird das an Ausdrucksmitteln, die als&lt;br /&gt;
„Nebelsprech“ bezeichnet werden können: Es handelt sich dabei vor&lt;br /&gt;
allem um sprachliche Füllsel (Pleonasmen), die im jeweiligen Kontext&lt;br /&gt;
nichts zur Bedeutung eines Textes beitragen, sondern einer Aussage nur&lt;br /&gt;
Nachdruck verleihen sollen, den die Aussage gar nicht benötigen würde,&lt;br /&gt;
wenn sie ernstgemeint wäre. So heißt es im Koalitionskompromiss zum&lt;br /&gt;
Weiterbau der A100 in Berlin: „Das Projekt des 16. Bauabschnitts der&lt;br /&gt;
BAB 100 wird nicht grundsätzlich aufgegeben. Die Koalition setzt sich&lt;br /&gt;
aber aktiv und ernsthaft dafür ein, dass eine Umwidmung der&lt;br /&gt;
Bundesmittel ermöglicht wird.&amp;quot; Die Adverbien „aktiv“ und „ernsthaft“&lt;br /&gt;
haben hier eine entlarvende Wirkung, denn ein passiver und&lt;br /&gt;
scherzhafter Einsatz für eine Forderung ist ja gar nicht vorstellbar.&lt;br /&gt;
In der Rhetorik spricht man in diesem Zusammenhang von einer Hyperbel,&lt;br /&gt;
die allerdings im vorliegenden Fall misslungen ist, denn die&lt;br /&gt;
hyperbolische Steigerung legt nahe, dass mit Aktivitäten in diesem&lt;br /&gt;
Zusammenhang möglicherweise nicht zu rechnen ist. Auch wenn&lt;br /&gt;
„vorbehaltlos, rückhaltlos und umfassend analysiert“ wird (Merkel),&lt;br /&gt;
sollte man hellhörig werden, denn was „völlig ungefährlich“ und&lt;br /&gt;
„gänzlich unbedenklich“ ist, hat meist einen Haken.&lt;br /&gt;
&lt;br /&gt;
Analysiert werden Texte zum „Atomausstieg“, zur&lt;br /&gt;
Vorratsdatenspeicherung und zu weiteren aktuellen Themen, vor allem&lt;br /&gt;
aus der Netzpolitik.&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4675.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4675-de-politik_neusprech_2011_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._04&amp;diff=3579</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 04</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._04&amp;diff=3579"/>
		<updated>2012-01-23T20:01:30Z</updated>

		<summary type="html">&lt;p&gt;Muelli: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Termin&lt;br /&gt;
|date=2012/02/01 20:00:00 PM&lt;br /&gt;
|enddate=2012/02/01 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 4&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Cellular protocol stacks for Internet ==   &lt;br /&gt;
GPRS, EDGE, UMTS, HSPA demystified&lt;br /&gt;
&lt;br /&gt;
Almost everyone uses the packet oriented transmission modes of&lt;br /&gt;
cellular networks. However, unlike TCP/IP, Ethernet and Wifi, not many&lt;br /&gt;
members of the hacker commnunity are familiar with the actual protocol&lt;br /&gt;
stack for those services.&lt;br /&gt;
&lt;br /&gt;
This talk is aimed to give an in-depth explanation how the lower layer&lt;br /&gt;
protocols on the air and wired interfaces for packet data services in&lt;br /&gt;
cellular networks are structured.&lt;br /&gt;
&lt;br /&gt;
For 2.5/2.75G, this includes RLC/MAC, NS, BSSGP, LLC, SNDCP, GTP For&lt;br /&gt;
3G/3.5G, this includes RRC, RLC, PDCP, NBAP, RANAP&lt;br /&gt;
=== Links ===&lt;br /&gt;
&lt;br /&gt;
OpenBSC project (includes OsmoSGSN)  &amp;lt;http://openbsc.osmocom.org/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4663.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4663-en-cellular_protocol_stacks_for_internet_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Electronic money: The road to Bitcoin and a glimpse forward ==   &lt;br /&gt;
How the e-money systems can be made better&lt;br /&gt;
&lt;br /&gt;
The proposed talk provides a definition of the problem of creating&lt;br /&gt;
e-money and after a review of the state of the art points out possible&lt;br /&gt;
solutions and proposes questions for discussion for the properties of&lt;br /&gt;
electronic money system.&lt;br /&gt;
=== Electronic money: The road to Bitcoin and a glimpse ahead ===&lt;br /&gt;
Abstract : *The proposed talk provides a definition of the problem of&lt;br /&gt;
creating e-money and after a review of the state of the art points out&lt;br /&gt;
possible solutions and proposes questions for discussion for the&lt;br /&gt;
properties of electronic money system.*&lt;br /&gt;
=== 1. What is electronic money and different means of currency ===&lt;br /&gt;
Definition of electronic money and distinction from similar means of&lt;br /&gt;
exchange.&lt;br /&gt;
&lt;br /&gt;
Electronic money is defined as monetary value which is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ stored on an electronic device;&lt;br /&gt;
+ issued on receipt of funds; and&lt;br /&gt;
+ accepted as a means of payment by persons other than the issuer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Working e-money examples: PayPal and MoneyBookers&lt;br /&gt;
&lt;br /&gt;
Other means of exchange, similar to e-money:&lt;br /&gt;
Alternative/Social/Timeshare/Community currencies; Loyalty and Voucher&lt;br /&gt;
systems.&lt;br /&gt;
&amp;gt; Working examples: WIR and Ven currencies (Bitcoin)&amp;lt; p&amp;gt;&lt;br /&gt;
What makes them different from e-money? (convertible only one-way, not&lt;br /&gt;
a legal tender, mostly backed by trust only, etc)&lt;br /&gt;
&lt;br /&gt;
*Optional*: Pros and cons of the abovementioned means of exchange.&lt;br /&gt;
=== 2. Defining the e-money problem: What electronic money should do? ===&lt;br /&gt;
Risks and requirements to the solution for electronic money from&lt;br /&gt;
technical, legal and business standpoint. The basic human problem of&lt;br /&gt;
reaching a consensus and trust in a group.&lt;br /&gt;
=== General system risks: ===&lt;br /&gt;
&lt;br /&gt;
+ Credit Liability&lt;br /&gt;
+ Credit Abuse&lt;br /&gt;
+ Counterfeiting&lt;br /&gt;
+ Unauthorized Withdrawal&lt;br /&gt;
+ Purchase Order Modification&lt;br /&gt;
+ Double Spending&lt;br /&gt;
+ Failure to Credit Payment&lt;br /&gt;
+ Denial of Service&lt;br /&gt;
+ Repudiation&lt;br /&gt;
+ Failure to deliver&lt;br /&gt;
+ Framing&lt;br /&gt;
+ Secrecy&lt;br /&gt;
&lt;br /&gt;
=== Legal and accounting: ===&lt;br /&gt;
&lt;br /&gt;
+ Dispute resolution&lt;br /&gt;
+ Money laundering and finance of terrorism&lt;br /&gt;
+ Tax evasion prevention&lt;br /&gt;
+ Consumer protection requirements&lt;br /&gt;
+ Ways to negotiate and conclude a contract&lt;br /&gt;
+ Auditability&lt;br /&gt;
+ Reverse and chargeback transactions&lt;br /&gt;
+ How the burden of proof is distributed&lt;br /&gt;
&lt;br /&gt;
=== Business: ===&lt;br /&gt;
Costs for:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Registration&lt;br /&gt;
+ Operation&lt;br /&gt;
+ Support&lt;br /&gt;
+ Marketing&lt;br /&gt;
+ Customer and merchant negotiation&lt;br /&gt;
&lt;br /&gt;
=== Accent on the most important human problems: ===&lt;br /&gt;
&lt;br /&gt;
+ Identification and authorization (which is the required minimum?)&lt;br /&gt;
+ Achieving consensus and easy dispute resolution in a group.&lt;br /&gt;
+ Determine the state of the system at any given moment&lt;br /&gt;
+ Trust (between the peer users or trust in the central authority)&lt;br /&gt;
&lt;br /&gt;
=== 3. How the risks and requirements have been traditionally addressed? ===&lt;br /&gt;
Review of the cryptographic, legal and procedural methods from the&lt;br /&gt;
existing e-money protocols. Еmphasis on anonymity and privacy&lt;br /&gt;
problems.&lt;br /&gt;
&lt;br /&gt;
The review of the existing systems will be a distinction between:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Online and offline systems &amp;gt; Example: PayPal and Blind signature&lt;br /&gt;
  PayWord based systems&lt;br /&gt;
+ Centralized and decentralized systems &amp;gt; Example: Liberty Reserve and&lt;br /&gt;
  Ripple BitCoin&lt;br /&gt;
+ Hard and Soft systems &amp;gt; Example: BitCoin and Credit card based money&lt;br /&gt;
  and payment protocols&amp;lt; li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do they solve the problems of trust and consensus in a certain&lt;br /&gt;
group?&lt;br /&gt;
&lt;br /&gt;
How they provide anonymous transactions and keep user privacy? Are&lt;br /&gt;
independent jurisdictions a (contribution to) the solution?&lt;br /&gt;
&lt;br /&gt;
Calculated risk, insurance and responsibility/role delegation as&lt;br /&gt;
patches to the existing problems.&lt;br /&gt;
&lt;br /&gt;
Which of the above systems may be deemed &amp;quot;legal&amp;quot;? (what do the central&lt;br /&gt;
banks think)&lt;br /&gt;
&lt;br /&gt;
*Optional*: Few words for Blind signature and PayWord techniques and&lt;br /&gt;
the protocols around them&lt;br /&gt;
=== 4. The great step forward. The contribution of Bitcoin ===&lt;br /&gt;
Emphasis on decentralization and (relative) anonymity features of&lt;br /&gt;
Bitcoin. How the combination of a way to create(mint) coins and to&lt;br /&gt;
timestamp the state of their distribtion created the first working&lt;br /&gt;
non-centralised currency. What, in my opinion, contributed for the&lt;br /&gt;
Bitcoin popularity.&lt;br /&gt;
&lt;br /&gt;
=== 5. The problems of Bitcoin ===&lt;br /&gt;
What Bitcoin doesn&#039;t provide or doesn&#039;t provide in an effective&lt;br /&gt;
manner:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Cost of creating money&lt;br /&gt;
+ Method of reaching a consensus, based on computing power&lt;br /&gt;
+ No &amp;quot;real value&amp;quot; to back it&lt;br /&gt;
+ Settlement risk not covered&lt;br /&gt;
+ Scalability issues&lt;br /&gt;
+ All the lacking features of a &amp;quot;soft&amp;quot; currency&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Is it decentralized or distributed system? (having in mind the&lt;br /&gt;
introduction of &amp;quot;trust points&amp;quot;)&lt;br /&gt;
=== 6. A Glimpse forward ===&lt;br /&gt;
How can anonymous e-money be made better (more effective and&lt;br /&gt;
accessible). Proposal (and discussion) of the possible enchancements.&lt;br /&gt;
=== How to issue e-money in more effective manner? ===&lt;br /&gt;
Possible solutions are to issue money based on:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Exchange for FIAT money or back by any other valuable stock (gold, land, silver);&lt;br /&gt;
+ IOU credit/debit principle from the community currencies;&lt;br /&gt;
+ Some fair distribution as an alternative to:&lt;br /&gt;
+ Solving a math problem (as Bitcoin does)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do these solution relate to the speed the new money are accepted and used?&lt;br /&gt;
=== How to reach a consensus in a group in a more effective manner? ===&lt;br /&gt;
&lt;br /&gt;
+ Is practical byzantine tolerance more effective than distributed  timestamping?&lt;br /&gt;
+ Can and should we consider any centralized authority?&lt;br /&gt;
+ Should we consider decentralized money impossible and settle for  distributed money?&lt;br /&gt;
+ Can a Webtrust (OpenPGP alike) scheme of trust be applied? What  social identification (friend of a friend) can contribute?&lt;br /&gt;
+ Can we use/rely on public/official timestamping services and how  this can be used as a better proof?&lt;br /&gt;
+ How triple accounting techniques may help?&lt;br /&gt;
&lt;br /&gt;
=== How to achieve anonimity and preserve privacy? ===&lt;br /&gt;
&lt;br /&gt;
+ Is complete anonymity possible? What are the achievable levels of  anonymity?&lt;br /&gt;
+ Can the user set a &amp;quot;mode&amp;quot; of a transaction, sacrificing some  protection?&lt;br /&gt;
+ To what extend the existing bank secrecy will suffice?&lt;br /&gt;
+ Jurisdictional independence as a possible solution / significant  contributor.&lt;br /&gt;
+ What anonymizing technical methods are possible?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More general question: Should a good e-money currency be made&lt;br /&gt;
according to the legal requirements of the EU directive and made legal&lt;br /&gt;
tender?&lt;br /&gt;
&lt;br /&gt;
If not are features like: consumer protection (reverse and refund&lt;br /&gt;
transactions), auditability and settlement risk coverage need to be&lt;br /&gt;
implemented and at what cost?&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4668.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4668-en-electronic_money_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._04&amp;diff=3578</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 04</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._04&amp;diff=3578"/>
		<updated>2012-01-23T20:00:51Z</updated>

		<summary type="html">&lt;p&gt;Muelli: /* How to issue e-money in more effective manner? */ more markup&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Termin&lt;br /&gt;
|date=2012/02/01 20:00:00 PM&lt;br /&gt;
|enddate=2012/02/01 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 4&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Cellular protocol stacks for Internet ==   &lt;br /&gt;
GPRS, EDGE, UMTS, HSPA demystified&lt;br /&gt;
&lt;br /&gt;
Almost everyone uses the packet oriented transmission modes of&lt;br /&gt;
cellular networks. However, unlike TCP/IP, Ethernet and Wifi, not many&lt;br /&gt;
members of the hacker commnunity are familiar with the actual protocol&lt;br /&gt;
stack for those services.&lt;br /&gt;
&lt;br /&gt;
This talk is aimed to give an in-depth explanation how the lower layer&lt;br /&gt;
protocols on the air and wired interfaces for packet data services in&lt;br /&gt;
cellular networks are structured.&lt;br /&gt;
&lt;br /&gt;
For 2.5/2.75G, this includes RLC/MAC, NS, BSSGP, LLC, SNDCP, GTP For&lt;br /&gt;
3G/3.5G, this includes RRC, RLC, PDCP, NBAP, RANAP&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `OpenBSC project (includes OsmoSGSN)&lt;br /&gt;
  &amp;lt;http://openbsc.osmocom.org/&amp;gt;`__&lt;br /&gt;
+ `http:// &amp;lt;http://&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4663.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4663-en-cellular_protocol_stacks_for_internet_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Electronic money: The road to Bitcoin and a glimpse forward ==   &lt;br /&gt;
How the e-money systems can be made better&lt;br /&gt;
&lt;br /&gt;
The proposed talk provides a definition of the problem of creating&lt;br /&gt;
e-money and after a review of the state of the art points out possible&lt;br /&gt;
solutions and proposes questions for discussion for the properties of&lt;br /&gt;
electronic money system.&lt;br /&gt;
=== Electronic money: The road to Bitcoin and a glimpse ahead ===&lt;br /&gt;
Abstract : *The proposed talk provides a definition of the problem of&lt;br /&gt;
creating e-money and after a review of the state of the art points out&lt;br /&gt;
possible solutions and proposes questions for discussion for the&lt;br /&gt;
properties of electronic money system.*&lt;br /&gt;
=== 1. What is electronic money and different means of currency ===&lt;br /&gt;
Definition of electronic money and distinction from similar means of&lt;br /&gt;
exchange.&lt;br /&gt;
&lt;br /&gt;
Electronic money is defined as monetary value which is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ stored on an electronic device;&lt;br /&gt;
+ issued on receipt of funds; and&lt;br /&gt;
+ accepted as a means of payment by persons other than the issuer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Working e-money examples: PayPal and MoneyBookers&lt;br /&gt;
&lt;br /&gt;
Other means of exchange, similar to e-money:&lt;br /&gt;
Alternative/Social/Timeshare/Community currencies; Loyalty and Voucher&lt;br /&gt;
systems.&lt;br /&gt;
&amp;gt; Working examples: WIR and Ven currencies (Bitcoin)&amp;lt; p&amp;gt;&lt;br /&gt;
What makes them different from e-money? (convertible only one-way, not&lt;br /&gt;
a legal tender, mostly backed by trust only, etc)&lt;br /&gt;
&lt;br /&gt;
*Optional*: Pros and cons of the abovementioned means of exchange.&lt;br /&gt;
=== 2. Defining the e-money problem: What electronic money should do? ===&lt;br /&gt;
Risks and requirements to the solution for electronic money from&lt;br /&gt;
technical, legal and business standpoint. The basic human problem of&lt;br /&gt;
reaching a consensus and trust in a group.&lt;br /&gt;
=== General system risks: ===&lt;br /&gt;
&lt;br /&gt;
+ Credit Liability&lt;br /&gt;
+ Credit Abuse&lt;br /&gt;
+ Counterfeiting&lt;br /&gt;
+ Unauthorized Withdrawal&lt;br /&gt;
+ Purchase Order Modification&lt;br /&gt;
+ Double Spending&lt;br /&gt;
+ Failure to Credit Payment&lt;br /&gt;
+ Denial of Service&lt;br /&gt;
+ Repudiation&lt;br /&gt;
+ Failure to deliver&lt;br /&gt;
+ Framing&lt;br /&gt;
+ Secrecy&lt;br /&gt;
&lt;br /&gt;
=== Legal and accounting: ===&lt;br /&gt;
&lt;br /&gt;
+ Dispute resolution&lt;br /&gt;
+ Money laundering and finance of terrorism&lt;br /&gt;
+ Tax evasion prevention&lt;br /&gt;
+ Consumer protection requirements&lt;br /&gt;
+ Ways to negotiate and conclude a contract&lt;br /&gt;
+ Auditability&lt;br /&gt;
+ Reverse and chargeback transactions&lt;br /&gt;
+ How the burden of proof is distributed&lt;br /&gt;
&lt;br /&gt;
=== Business: ===&lt;br /&gt;
Costs for:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Registration&lt;br /&gt;
+ Operation&lt;br /&gt;
+ Support&lt;br /&gt;
+ Marketing&lt;br /&gt;
+ Customer and merchant negotiation&lt;br /&gt;
&lt;br /&gt;
=== Accent on the most important human problems: ===&lt;br /&gt;
&lt;br /&gt;
+ Identification and authorization (which is the required minimum?)&lt;br /&gt;
+ Achieving consensus and easy dispute resolution in a group.&lt;br /&gt;
+ Determine the state of the system at any given moment&lt;br /&gt;
+ Trust (between the peer users or trust in the central authority)&lt;br /&gt;
&lt;br /&gt;
=== 3. How the risks and requirements have been traditionally addressed? ===&lt;br /&gt;
Review of the cryptographic, legal and procedural methods from the&lt;br /&gt;
existing e-money protocols. Еmphasis on anonymity and privacy&lt;br /&gt;
problems.&lt;br /&gt;
&lt;br /&gt;
The review of the existing systems will be a distinction between:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Online and offline systems &amp;gt; Example: PayPal and Blind signature&lt;br /&gt;
  PayWord based systems&lt;br /&gt;
+ Centralized and decentralized systems &amp;gt; Example: Liberty Reserve and&lt;br /&gt;
  Ripple BitCoin&lt;br /&gt;
+ Hard and Soft systems &amp;gt; Example: BitCoin and Credit card based money&lt;br /&gt;
  and payment protocols&amp;lt; li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do they solve the problems of trust and consensus in a certain&lt;br /&gt;
group?&lt;br /&gt;
&lt;br /&gt;
How they provide anonymous transactions and keep user privacy? Are&lt;br /&gt;
independent jurisdictions a (contribution to) the solution?&lt;br /&gt;
&lt;br /&gt;
Calculated risk, insurance and responsibility/role delegation as&lt;br /&gt;
patches to the existing problems.&lt;br /&gt;
&lt;br /&gt;
Which of the above systems may be deemed &amp;quot;legal&amp;quot;? (what do the central&lt;br /&gt;
banks think)&lt;br /&gt;
&lt;br /&gt;
*Optional*: Few words for Blind signature and PayWord techniques and&lt;br /&gt;
the protocols around them&lt;br /&gt;
=== 4. The great step forward. The contribution of Bitcoin ===&lt;br /&gt;
Emphasis on decentralization and (relative) anonymity features of&lt;br /&gt;
Bitcoin. How the combination of a way to create(mint) coins and to&lt;br /&gt;
timestamp the state of their distribtion created the first working&lt;br /&gt;
non-centralised currency. What, in my opinion, contributed for the&lt;br /&gt;
Bitcoin popularity.&lt;br /&gt;
&lt;br /&gt;
=== 5. The problems of Bitcoin ===&lt;br /&gt;
What Bitcoin doesn&#039;t provide or doesn&#039;t provide in an effective&lt;br /&gt;
manner:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Cost of creating money&lt;br /&gt;
+ Method of reaching a consensus, based on computing power&lt;br /&gt;
+ No &amp;quot;real value&amp;quot; to back it&lt;br /&gt;
+ Settlement risk not covered&lt;br /&gt;
+ Scalability issues&lt;br /&gt;
+ All the lacking features of a &amp;quot;soft&amp;quot; currency&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Is it decentralized or distributed system? (having in mind the&lt;br /&gt;
introduction of &amp;quot;trust points&amp;quot;)&lt;br /&gt;
=== 6. A Glimpse forward ===&lt;br /&gt;
How can anonymous e-money be made better (more effective and&lt;br /&gt;
accessible). Proposal (and discussion) of the possible enchancements.&lt;br /&gt;
=== How to issue e-money in more effective manner? ===&lt;br /&gt;
Possible solutions are to issue money based on:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Exchange for FIAT money or back by any other valuable stock (gold, land, silver);&lt;br /&gt;
+ IOU credit/debit principle from the community currencies;&lt;br /&gt;
+ Some fair distribution as an alternative to:&lt;br /&gt;
+ Solving a math problem (as Bitcoin does)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do these solution relate to the speed the new money are accepted and used?&lt;br /&gt;
=== How to reach a consensus in a group in a more effective manner? ===&lt;br /&gt;
&lt;br /&gt;
+ Is practical byzantine tolerance more effective than distributed  timestamping?&lt;br /&gt;
+ Can and should we consider any centralized authority?&lt;br /&gt;
+ Should we consider decentralized money impossible and settle for  distributed money?&lt;br /&gt;
+ Can a Webtrust (OpenPGP alike) scheme of trust be applied? What  social identification (friend of a friend) can contribute?&lt;br /&gt;
+ Can we use/rely on public/official timestamping services and how  this can be used as a better proof?&lt;br /&gt;
+ How triple accounting techniques may help?&lt;br /&gt;
&lt;br /&gt;
=== How to achieve anonimity and preserve privacy? ===&lt;br /&gt;
&lt;br /&gt;
+ Is complete anonymity possible? What are the achievable levels of  anonymity?&lt;br /&gt;
+ Can the user set a &amp;quot;mode&amp;quot; of a transaction, sacrificing some  protection?&lt;br /&gt;
+ To what extend the existing bank secrecy will suffice?&lt;br /&gt;
+ Jurisdictional independence as a possible solution / significant  contributor.&lt;br /&gt;
+ What anonymizing technical methods are possible?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More general question: Should a good e-money currency be made&lt;br /&gt;
according to the legal requirements of the EU directive and made legal&lt;br /&gt;
tender?&lt;br /&gt;
&lt;br /&gt;
If not are features like: consumer protection (reverse and refund&lt;br /&gt;
transactions), auditability and settlement risk coverage need to be&lt;br /&gt;
implemented and at what cost?&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4668.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4668-en-electronic_money_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
	<entry>
		<id>https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._04&amp;diff=3577</id>
		<title>Termin:Chaotic-Congress-Cinema-28C3 Nr. 04</title>
		<link rel="alternate" type="text/html" href="https://staging.wiki.apps.attraktor.org/index.php?title=Termin:Chaotic-Congress-Cinema-28C3_Nr._04&amp;diff=3577"/>
		<updated>2012-01-23T19:59:51Z</updated>

		<summary type="html">&lt;p&gt;Muelli: some markup fixed&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Termin&lt;br /&gt;
|date=2012/02/01 20:00:00 PM&lt;br /&gt;
|enddate=2012/02/01 22:00:00 PM&lt;br /&gt;
|title=Chaotic Congress Cinema Nr. 4&lt;br /&gt;
|visible=Yes&lt;br /&gt;
}}&lt;br /&gt;
[[Category:Chaotic-Congress-Cinema]]&lt;br /&gt;
&lt;br /&gt;
Wir schauen uns die Aufzeichnung von Congress-Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke  und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)&lt;br /&gt;
&lt;br /&gt;
Weitere Informationen unter [http://wiki.attraktor.org/index.php/Category:Chaotic-Congress-Cinema Chaotic Congress Cinema].&lt;br /&gt;
&lt;br /&gt;
== Cellular protocol stacks for Internet ==   &lt;br /&gt;
GPRS, EDGE, UMTS, HSPA demystified&lt;br /&gt;
&lt;br /&gt;
Almost everyone uses the packet oriented transmission modes of&lt;br /&gt;
cellular networks. However, unlike TCP/IP, Ethernet and Wifi, not many&lt;br /&gt;
members of the hacker commnunity are familiar with the actual protocol&lt;br /&gt;
stack for those services.&lt;br /&gt;
&lt;br /&gt;
This talk is aimed to give an in-depth explanation how the lower layer&lt;br /&gt;
protocols on the air and wired interfaces for packet data services in&lt;br /&gt;
cellular networks are structured.&lt;br /&gt;
&lt;br /&gt;
For 2.5/2.75G, this includes RLC/MAC, NS, BSSGP, LLC, SNDCP, GTP For&lt;br /&gt;
3G/3.5G, this includes RRC, RLC, PDCP, NBAP, RANAP&lt;br /&gt;
== Links ==     &lt;br /&gt;
&lt;br /&gt;
+ `OpenBSC project (includes OsmoSGSN)&lt;br /&gt;
  &amp;lt;http://openbsc.osmocom.org/&amp;gt;`__&lt;br /&gt;
+ `http:// &amp;lt;http://&amp;gt;`__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4663.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4663-en-cellular_protocol_stacks_for_internet_h264.mp4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Electronic money: The road to Bitcoin and a glimpse forward ==   &lt;br /&gt;
How the e-money systems can be made better&lt;br /&gt;
&lt;br /&gt;
The proposed talk provides a definition of the problem of creating&lt;br /&gt;
e-money and after a review of the state of the art points out possible&lt;br /&gt;
solutions and proposes questions for discussion for the properties of&lt;br /&gt;
electronic money system.&lt;br /&gt;
=== Electronic money: The road to Bitcoin and a glimpse ahead ===&lt;br /&gt;
Abstract : *The proposed talk provides a definition of the problem of&lt;br /&gt;
creating e-money and after a review of the state of the art points out&lt;br /&gt;
possible solutions and proposes questions for discussion for the&lt;br /&gt;
properties of electronic money system.*&lt;br /&gt;
=== 1. What is electronic money and different means of currency ===&lt;br /&gt;
Definition of electronic money and distinction from similar means of&lt;br /&gt;
exchange.&lt;br /&gt;
&lt;br /&gt;
Electronic money is defined as monetary value which is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ stored on an electronic device;&lt;br /&gt;
+ issued on receipt of funds; and&lt;br /&gt;
+ accepted as a means of payment by persons other than the issuer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Working e-money examples: PayPal and MoneyBookers&lt;br /&gt;
&lt;br /&gt;
Other means of exchange, similar to e-money:&lt;br /&gt;
Alternative/Social/Timeshare/Community currencies; Loyalty and Voucher&lt;br /&gt;
systems.&lt;br /&gt;
&amp;gt; Working examples: WIR and Ven currencies (Bitcoin)&amp;lt; p&amp;gt;&lt;br /&gt;
What makes them different from e-money? (convertible only one-way, not&lt;br /&gt;
a legal tender, mostly backed by trust only, etc)&lt;br /&gt;
&lt;br /&gt;
*Optional*: Pros and cons of the abovementioned means of exchange.&lt;br /&gt;
=== 2. Defining the e-money problem: What electronic money should do? ===&lt;br /&gt;
Risks and requirements to the solution for electronic money from&lt;br /&gt;
technical, legal and business standpoint. The basic human problem of&lt;br /&gt;
reaching a consensus and trust in a group.&lt;br /&gt;
=== General system risks: ===&lt;br /&gt;
&lt;br /&gt;
+ Credit Liability&lt;br /&gt;
+ Credit Abuse&lt;br /&gt;
+ Counterfeiting&lt;br /&gt;
+ Unauthorized Withdrawal&lt;br /&gt;
+ Purchase Order Modification&lt;br /&gt;
+ Double Spending&lt;br /&gt;
+ Failure to Credit Payment&lt;br /&gt;
+ Denial of Service&lt;br /&gt;
+ Repudiation&lt;br /&gt;
+ Failure to deliver&lt;br /&gt;
+ Framing&lt;br /&gt;
+ Secrecy&lt;br /&gt;
&lt;br /&gt;
=== Legal and accounting: ===&lt;br /&gt;
&lt;br /&gt;
+ Dispute resolution&lt;br /&gt;
+ Money laundering and finance of terrorism&lt;br /&gt;
+ Tax evasion prevention&lt;br /&gt;
+ Consumer protection requirements&lt;br /&gt;
+ Ways to negotiate and conclude a contract&lt;br /&gt;
+ Auditability&lt;br /&gt;
+ Reverse and chargeback transactions&lt;br /&gt;
+ How the burden of proof is distributed&lt;br /&gt;
&lt;br /&gt;
=== Business: ===&lt;br /&gt;
Costs for:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Registration&lt;br /&gt;
+ Operation&lt;br /&gt;
+ Support&lt;br /&gt;
+ Marketing&lt;br /&gt;
+ Customer and merchant negotiation&lt;br /&gt;
&lt;br /&gt;
=== Accent on the most important human problems: ===&lt;br /&gt;
&lt;br /&gt;
+ Identification and authorization (which is the required minimum?)&lt;br /&gt;
+ Achieving consensus and easy dispute resolution in a group.&lt;br /&gt;
+ Determine the state of the system at any given moment&lt;br /&gt;
+ Trust (between the peer users or trust in the central authority)&lt;br /&gt;
&lt;br /&gt;
=== 3. How the risks and requirements have been traditionally addressed? ===&lt;br /&gt;
Review of the cryptographic, legal and procedural methods from the&lt;br /&gt;
existing e-money protocols. Еmphasis on anonymity and privacy&lt;br /&gt;
problems.&lt;br /&gt;
&lt;br /&gt;
The review of the existing systems will be a distinction between:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Online and offline systems &amp;gt; Example: PayPal and Blind signature&lt;br /&gt;
  PayWord based systems&lt;br /&gt;
+ Centralized and decentralized systems &amp;gt; Example: Liberty Reserve and&lt;br /&gt;
  Ripple BitCoin&lt;br /&gt;
+ Hard and Soft systems &amp;gt; Example: BitCoin and Credit card based money&lt;br /&gt;
  and payment protocols&amp;lt; li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do they solve the problems of trust and consensus in a certain&lt;br /&gt;
group?&lt;br /&gt;
&lt;br /&gt;
How they provide anonymous transactions and keep user privacy? Are&lt;br /&gt;
independent jurisdictions a (contribution to) the solution?&lt;br /&gt;
&lt;br /&gt;
Calculated risk, insurance and responsibility/role delegation as&lt;br /&gt;
patches to the existing problems.&lt;br /&gt;
&lt;br /&gt;
Which of the above systems may be deemed &amp;quot;legal&amp;quot;? (what do the central&lt;br /&gt;
banks think)&lt;br /&gt;
&lt;br /&gt;
*Optional*: Few words for Blind signature and PayWord techniques and&lt;br /&gt;
the protocols around them&lt;br /&gt;
=== 4. The great step forward. The contribution of Bitcoin ===&lt;br /&gt;
Emphasis on decentralization and (relative) anonymity features of&lt;br /&gt;
Bitcoin. How the combination of a way to create(mint) coins and to&lt;br /&gt;
timestamp the state of their distribtion created the first working&lt;br /&gt;
non-centralised currency. What, in my opinion, contributed for the&lt;br /&gt;
Bitcoin popularity.&lt;br /&gt;
&lt;br /&gt;
=== 5. The problems of Bitcoin ===&lt;br /&gt;
What Bitcoin doesn&#039;t provide or doesn&#039;t provide in an effective&lt;br /&gt;
manner:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Cost of creating money&lt;br /&gt;
+ Method of reaching a consensus, based on computing power&lt;br /&gt;
+ No &amp;quot;real value&amp;quot; to back it&lt;br /&gt;
+ Settlement risk not covered&lt;br /&gt;
+ Scalability issues&lt;br /&gt;
+ All the lacking features of a &amp;quot;soft&amp;quot; currency&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Is it decentralized or distributed system? (having in mind the&lt;br /&gt;
introduction of &amp;quot;trust points&amp;quot;)&lt;br /&gt;
=== 6. A Glimpse forward ===&lt;br /&gt;
How can anonymous e-money be made better (more effective and&lt;br /&gt;
accessible). Proposal (and discussion) of the possible enchancements.&lt;br /&gt;
== How to issue e-money in more effective manner? == &lt;br /&gt;
Possible solutions are to issue money based on:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
+ Exchange for FIAT money or back by any other valuable stock (gold,&lt;br /&gt;
  land, silver);&lt;br /&gt;
+ IOU credit/debit principle from the community currencies;&lt;br /&gt;
+ Some fair distribution as an alternative to:&lt;br /&gt;
+ Solving a math problem (as Bitcoin does)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How do these solution relate to the speed the new money are accepted&lt;br /&gt;
and used?&lt;br /&gt;
=== How to reach a consensus in a group in a more effective manner? ===&lt;br /&gt;
&lt;br /&gt;
+ Is practical byzantine tolerance more effective than distributed&lt;br /&gt;
  timestamping?&lt;br /&gt;
+ Can and should we consider any centralized authority?&lt;br /&gt;
+ Should we consider decentralized money impossible and settle for&lt;br /&gt;
  distributed money?&lt;br /&gt;
+ Can a Webtrust (OpenPGP alike) scheme of trust be applied? What&lt;br /&gt;
  social identification (friend of a friend) can contribute?&lt;br /&gt;
+ Can we use/rely on public/official timestamping services and how&lt;br /&gt;
  this can be used as a better proof?&lt;br /&gt;
+ How triple accounting techniques may help?&lt;br /&gt;
&lt;br /&gt;
=== How to achieve anonimity and preserve privacy? ===&lt;br /&gt;
&lt;br /&gt;
+ Is complete anonymity possible? What are the achievable levels of&lt;br /&gt;
  anonymity?&lt;br /&gt;
+ Can the user set a &amp;quot;mode&amp;quot; of a transaction, sacrificing some&lt;br /&gt;
  protection?&lt;br /&gt;
+ To what extend the existing bank secrecy will suffice?&lt;br /&gt;
+ Jurisdictional independence as a possible solution / significant&lt;br /&gt;
  contributor.&lt;br /&gt;
+ What anonymizing technical methods are possible?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More general question: Should a good e-money currency be made&lt;br /&gt;
according to the legal requirements of the EU directive and made legal&lt;br /&gt;
tender?&lt;br /&gt;
&lt;br /&gt;
If not are features like: consumer protection (reverse and refund&lt;br /&gt;
transactions), auditability and settlement risk coverage need to be&lt;br /&gt;
implemented and at what cost?&lt;br /&gt;
&lt;br /&gt;
* Pentabarf: &amp;lt;http://events.ccc.de/congress/2011/Fahrplan/events/4668.en.html&amp;gt;&lt;br /&gt;
* Video:     &amp;lt;http://ftp.ccc.de/congress/28C3/mp4-h264-HQ/28c3-4668-en-electronic_money_h264.mp4&amp;gt;&lt;/div&gt;</summary>
		<author><name>Muelli</name></author>
	</entry>
</feed>