Is there such a thing as "Gaming Addiction" and is there a cure?
Please note: This abstract is in English, but if there are no non-German speakers present, the talk may be held in German.Video Gaming addiction - buzzword, excuse for 400+ hours on Skyrim, mere symptom of depression or genuine psychological disorder? What even is there to become addicted to in gaming? Are there people more at risk than others and if yes, who? In what kind of ways are games engineered to make us become addicted? Where is the limit between normal gaming and a disorder? And if you are addicted, what helps? This talk aims to explore these questions and more, time for questions will be included as well!
Hands-on with Wi-Fi hacking
Want to learn how Wi-Fi hacking works, and go home with your own esp8266 Wi-Fi deauther? Come to the MysteryHack bonus session to learn how hackers can shut down any Wi-Fi network in seconds with a low-cost microcontroller. Kody Kinzie will explain how the most common Wi-Fi attacks work, focusing on using low-cost microcontrollers and Raspberry Pi computers to crack passwords and attack IoT devices like WI-Fi security cameras. PLEASE BRING A MICROUSB CABLE!
Geigerzähler– Hardwarebasteln mit LoRaWAN & WiFi Wir sind die Ecocurious-Initiative und haben einen LoRaWAN- und WiFi-fähigen Geigerzähler entwickelt. Diesen Low-Cost-Multigeiger mit gutem Zählrohr kannst Du bei uns löten, im Tausch gegen Materialkosten von 75 Euro mitnehmen und damit Teil unseres wunderbaren Messnetzes werden, das wir gerade aufbauen. Die Bauteile und unsere selbstentwickelte Platine bringen wir für Dich mit. Du findest uns in der Hardware Hacking Area, im Hamsterspace. Wir bieten 2 Workshop-Zeiten an: Am 29.12. von 14-17 Uhr und am 30.12. von 10-13 Uhr. Wir freuen uns auf Dich, mach mit!
Geigerzähler– Hardwarebasteln mit LoRaWAN & WiFiWir sind die Ecocurious-Initiative und haben einen LoRaWAN- und WiFi-fähigen Geigerzähler entwickelt. Diesen Low-Cost-Multigeiger mit gutem Zählrohr kannst Du bei uns löten, im Tausch gegen Materialkosten von 75 Euro mitnehmen und damit Teil unseres wunderbaren Messnetzes werden, das wir gerade aufbauen. Das Gerät ist die ultimative Beta-Version, Änderungswünsche und Ideen sind sehr willkommen.Wir bringen die Bauteile und unsere selbstentwickelte Platine für Dich mit. Du findest uns in der Hardware Hacking Area, im Hamsterspace.Wir bieten 2 Workshop-Zeiten an: Am 29.12. von 14-17 Uhr und am 30.12. von 10-13 Uhr.Wir freuen uns auf Dich, mach mit!
spielerisch und kreativ die Welt der Computer kennenlernen
Mit dem Calliope mini kannst du spielerisch und kreativ die Welt der Computer kennenlernen. calliope.ccAnzahl Teilnehmer*innen: 5-10Alter: 6+ JahreDauer: 30-60minAnmeldung erforderlich?: Nein
Let's make a game for the MAKERbuino!
[[File:MAKERbuino.jpg|800px]]More information [[MAKERbuino|can be found here]].
Learn about the open hardware pocket science lab
Join us for a self-guided exploratory workshop on Pocket Science Lab with your Android phone or laptop PC. Our goal is to develop an open source measuring device for electronics and sensors. In this exploratory open session you have the chance to install the app on an Android phone and test the Pocket Science Lab device with components and sensor kits.
10:15
We'll do some Yoga to calm our minds and move them bodies. Bring along comfortable clothes – and a towel to lie on ;-)
11:00
**Eine Reise zu den Fundamenten der digitalen Welt**.
Was ist eigentlich ein Rechenzentrum und wie funktioniert es? Welche Bedeutung haben Datacenter für das Internet und den ganzen digitalen Rest?
Strom, Kühlung und Sicherheit im Überblick. Was muss alles passieren, damit Server, Storages und Netzwerke immer laufen können.
Warum werden die Datacenter immer größer, wo doch die Elektronik immer kleiner wird? Welche Konsequenzen ergeben sich daraus?
Wieviel Strom verbraucht eine Suchanfrage oder ein Videostream und warum ist das relevant?
Ist Deutschland ein guter Standort für (neue) Rechenzentren und warum?
Und was hat das alles mit Klimawandel und Nachhaltigkeit zu tun?
Kann es GreenIT ohne "grüne" Datacenter geben? Wie sollten die aussehen? Was muss in den kommenden Jahren geändert werden, damit auch Rechenzentren ihrer Rolle beim globalen CO2-Ausstoß gerecht werden?
Überraschende Einblicke in Planung, Bau und Betrieb von großen Rechenzentren.
c3lingo tech meeting about improvements for next year
Workshop for c3lingo tech prep for 2020
This workshop is for everyone who wants to get an idea and some first look at the programming language Julia, which was originally designed for data analysis or scientific computing
In this introductory workshop you are invited to get a first look at the programming language Julia. Julia is comparatively recent (version 1.0 got released August last year) and was originally designed from scratch to provide a high-level language, which is also fast. As a result applications include scientific simulations, data science, machine learning and generally high-performance computing. Writing Julia feels a lot like writing a scripting language, but since code is automatically (and painlessly) compiled down to machine code before execution, a performance comparable to low-level languages like C or FORTRAN can be achieved.We will use examples and a few exercises to discuss the main concepts of Julia. The main purpose is to get you curious and give you an overview. Care is taken to provide rich lists of links with further information to continue to explore Julia on your own (if you wish to do so ...).
How a mathematical breakthrough made at the end of the 17th century is the workhorse of the artificial neural networks of today
Conventional computer algorithms are superior to the human intellect in many regards: for instance at multiplying large numbers or winning at chess by analyzing huge numbers of moves. But there are also many tasks which come naturally to us yet exceed the capabilities of algorithms by vast amounts: Rigid algorithms can't decipher human handwriting or drive cars.The recent breakthroughs in artificial intelligence circumvent these barriers by employing quite a different approach: They use artificial neural networks, which are inspired by the partially-understood way the human brain works.The unique feature of artificial neural nets is that they aren't rigid, but can <em>learn</em>. Human programmers specify their rough structure and supply training data, but don't write a single line of code governing their behavior.<strong>In the spirit of a good Unix command-line tool, this talk aspires to explain one thing and explain it well: How do artificial neural nets accomplish the feat of learning?</strong>We'll see that the answer is related to a mathematical breakthrough made at the end of the 17th century and discuss why deep learning only surged in the last few years, even though the basics of artificial neural nets were already understood in the 1980s. We'll also touch upon some of the biggest problems of neural nets, which emerge directly from the way neural nets learn.The talk doesn't require any advanced knowledge of mathematics. If you're already familiar with [http://neuralnetworksanddeeplearning.com/ Michael Nielsen's book], then don't expect to learn anything new and come to this talk only if you want to contribute interesting remarks.
Whatsapp, Instagram, Amazon, ... . Die meistgenutzten Plattformen genießen Monopolstatus - es führt kaum ein weg an ihnen vorbei. Dabei sammeln sie unsere Daten und bestimmen den Rahmen in dem wir kommunizieren.
Das muss nicht sein.
Gemeinsam können wir Lösungen und Technologien erarbeiten, die den Weg weg bereiten von Plattformen, dessen Existenzgrund deine Abhängigkeit zu ihnen ist.
Komm und diskutiere, konzipiere, kreiere!
Digitale Kommunikation und Social Media – ein Herzstück unserer alltäglichen Kommunikation im Netz – zentrieren sich heute auf wenige Plattformen. Dies spielt den Plattformbetreibern große Macht zu.
Technisch sind wir auf diese Plattformen nicht angewiesen, praktisch schon.
Wenn ich heute einer Freundin schreiben will, die nur Whatsapp nutzt, ich aber nicht, dann muss ich ihr entweder eine SMS (unverschlüsselt, kostenpflichtig) oder eine Email (unverschlüsselt) schicken. Whatsapp möchte ich nicht benutzen, da ich nicht will, das Facebook meine Daten sammelt. Warum kann ich mir nicht aussuchen nicht bei Facebook zu sein und trotzdem Menschen dort zu schreiben? Ich kann ja auch Mails and xyz@gmail.com verschicken ohne bei Google Nutzer zu sein. Oder jemanden, der bei der Telekom Kunde ist anrufen.
Genauso gut wären offene Protokolle denkbar. Mit denen könnte sich jede\*r aussuchen über welchen Kanal/Server er\*sie kommuniziert (fast so wie bei Emails).
Und überhaupt - warum bin ich so beschränkt in dem was ich mit Whatsapp tun kann? Keine Umfragen? Kein voting? Keine Untergruppen? Keine Live-Standorte? Warum lässt sich das nicht integrieren?
Kein Problem - beispielsweise mit einer Webanwendung problemlos realisierbar.
Unter anderem scheitern solche Versuche an den geschlossenen Schnittstellen der Plattformbetreiber. Für die untergraben solche Ansätze ihr Plattform-Monopol.
Nichtsdestotrotz führt kein Weg daran vorbei – wenn wir den Rahmen unserer Kommunkikation selber gestalten wollen, brauchen wir Technologien, die vielseitig nutzbar sind und Plattformunabhängigkeit bieten – also dezentraler funktionieren. Sie müssen so gut wie möglich zu vorhandenen Plattformen Schnittstellen bieten und den Weg von dort weg so einfach wie möglich gestalten. Wenn solche Technologien einmal vorhanden sind, erschweren sie neuen klassischen Plattformen das entstehen von Monopolen.
Solche Technologien müssen für Nutzer aller Kenntnislevel ohne Hürden (intuitiv) nutzbar sein, um Popularität zu erreichen.
Ebenso müssen sie flexibel genug sein um eine Vielzahl an Kommunikationsrahmen abdecken zu können.
Ich würde die (technischen) Anforderungen in vier Kategorien teilen:
- Flexibilität: Gestaltbarkeit der Kommunikationsstruktur (Forendiskussionen, Anzeigen, ...), soziale Strukturen und Diskurse abbilden (in Sicherheits-& Kompatibilitätstechnisch saubere Bahnen leitend)
- Sicherheit: Flexibilität darf Nutzerdaten/Sicherheit nicht kompromittieren; dezentral gespeicherte Daten, Kontrolle über diese
- Kompatibilität: open Interfaces, barrierefreie Interoperabilität mit anderen Diensten
- Nutzerfreundlichkeit: Übersichtlichkeit, Navigierbarkeit, (technisch) transparent, sauber gestaltbar
Diese müssen alle Hand in Hand miteinander funktionieren, damit sie auch gewährleistet sind. Wenn zum Beispiel die Flexibilität aus dem Ruder läuft, könnten inkompatibele Schnittstellen entstehen. Das würde wiederum die Nutzbarkeit und Sicherheitsprüfungen erschweren.
Ich stelle mir vor so etwas mithilfe von Plugins zu realisieren. Diese werden im Web gehostet (zum beispiel als JavaScript) und greifen auf die in der übertragenen Nachricht gespeicherten (Meta-)Daten zu. Implementierbar wäre so etwas mithilfe von [Solid](https://solidproject.org/).
Ich freue mich auf Anregungen und Diskussionen jeder Art!
Learn to Solder! A large variety of way cool kits are available, all designed for total beginners to complete successfully -- and intriguing enough for the total hardware geek.<br> <br> <span style="color:orange">'''''This ongoing workshop will be happening concurrently with lots of other way cool workshops at the Hardware Hacking Area! Throughout all of 36C3.'''''</span><br> <span style="color:red">'''''Please come by any time to learn to solder!'''''</span>
[[File:LearnToSolder.jpg|center|500px|Room full of happy hardware hackers at the Hardware Hacking Area at 30C3]]<br>'''What''': A place to get together to solder stuff!<br> Learn to Solder!<br> You can easily learn all of the skills you need in a short time.<br> Make a project, and take it home with you!<br> If you have your own project (advanced or simple),<br> bring it by, and if you would like help, you can get it!<br>'''When''':<span style="color:red"> '''''Any time!'''''</span> All day and all night -- Every day of 36C3<br> Most projects take about 1.5 to 2 hours<br> <span style="color:orange">'''''This ongoing workshop will be happening concurrently with lots of other way cool workshops at the Hardware Hacking Area!'''''</span><br> <span style="color:red">'''''Please come by any time to learn to solder!'''''</span><br> '''Where''': The '''Hardware Hacking Area''' -- West side of Exhibition Hall 2 -- [https://events.ccc.de/congress/2019/wiki/images/c/ce/HHA_map.png map]<br>'''Who''': You! All ages, all skill levels -- It is fun to make things in the<br> friendly community of the Hardware Hacking Area.<br> ''Come join us. Everyone is welcome.''<br>'''Cost''': Instruction is free! We ask that people pay only for the cost of<br> the parts used -- kit prices range from €10 to €30.<br> <span style="color:orange">''' -- No need to register -- just come on by,</span> <span style="color:red">any time!'''</span><br>Learn to solder! [[User:Maltman23|Mitch Altman]] and others will bring kits to make cool, practical, intriguing, hackable things that you can bring home after you make it. Of course, you can also bring your own projects to hack. And if you have anything to fix, bring it by!Plenty of cool kits are available to make, including:<br>* TV-B-Gone (turn off TVs in public places!)<br>* ArduTouch Music Synthesizer (make cool noise and music with this Arduino-comaptible kit!)<br>* Brain Machine (Meditate, Hallucinate, and Trip Out!)<br>* Trippy RGB Waves (interactive art blinky lights!)<br>* MiniPOV (write your message in the air!)<br>* MintyBoost (charge your USB enabled gadgets!)<br>* Hello My Name Is... badge (Geeky, blinky version of the sticker!)<br>* microcontroller programmers (program all your AVR family chips!)<br>* Arduino clones (make just about anything!)<br>* And many, more!<br>More info on these projects is available at:<br>[http://www.CornfieldElectronics.com Cornfield Electronics] (click on the "projects" tab)<br>[http://www.adafruit.com/ Adafruit]<br>[http://www.evilmadscientist.com/ Evil Mad Scientist]<br>[http://analogmachines.com Analog Machines]<br>Anyone can learn to solder! Even if you have never made anything in your life, you can learn this very useful and enjoyable skill. It really is fun! [[User:Maltman23|Mitch]] and has taught tens of thousands of people to solder all around the world, and he can teach you, too! Add yourself to the ever increasing community!<br><br><br>
Surface mount electronics for terrified beginners. Learn to assemble tiny parts on circuit boards by building an electronic touch-activated purring kitten. Anyone can do it. Yes, even you who never touched anything electronic before. 120mins, 20€/kit, avoid caffeine immediately before. Max 20 participants per session, there is a PAPER!!1! signup list in the hardware hacking area.
[[File:Catsplash.png|800px]]Takes about two hours. Basic workshop. No prior knowledge needed. Materials cost 20€ per kit.We are going to build an electronic kitten using tiny SMD parts. It will purr when you touch it right and hiss when you touch it wrong. It's going to work.For people afraid of surface mount assembly/rework. You know those tiny little components in modern electronic devices? It's both possible and easy to assemble those by hand. You can do it, and I'll teach you how!Think you don't have the tools? Think you can't manually place 0402s? Everything is possible with patience and practice. The equipment is minimal and you probably already have it. We'll learn the answer to THERE'S A SHORT ON A TINY PART OMG WHAT NOW? After this, you'll no longer need to be scared of SMD. Avoid caffeine immediately before the workshop, because shaky hands are a disadvantage.The workshop kit costs 20€. Please SIGN UP ON THE PAPER LIST at the Hardware Hacking Area. PLEASE BE ON TIME!
Open and trustworthy point of sale solution.
Im Rahmen der Session wollen wir euch unsere Idee vorstellen und diese mit euch diskutieren. Wie gehen wir mit den neuen Anforderungen an Kassensystemen um? Was fehlt sowieso schon an vorhandenen Lösungen?Wie würde die perfekte Lösung aussehen?
fast wie echtes Yoga
Jeden Morgen um 11:00, Fast wie echtes Yoga.Am zweiten Tag um 10:30 Uhr, direkt vor dem Haecksen-Frühstück.
Sport and Porridge
slowly getting into movement/ no gym yet but some easy reminder that we still have a body to use and enjoy. filling it with seeds and fruits which are provided by the megalomanic and perfectionist master of brei.
11:15
Collecting all the tools for all the things you can do with computers
'''''See https://totalism.org/hacker-tools !'''''...Real-time document collaboration ...Self-hosted maps ...Mailserver ... Knowledge management ...PDF annotation ...File deduplication ...Data visualization ... Personal and server backups ... Collaboratively organizing and tagging media (photos) ... OS distribution ... Graph data ... Voice and video chat ... Intermedia Art / VR ... CAD/architecture/3D/industrial design ... Machine embroidery ... news reading ...
11:30
Since the Snowden revelations the fear of stealthy hardware manipulations is no longer regarded as far fetched.
This fear is also reflected in the massive discussions sparked by last year's Bloomberg allegations on a supposed hardware spy implant on Supermicro serverboards or the recent USA ban on Huawei telecommunication equipment.
Hardware reverse engineering (HRE) is a promising method to detect such manipulations or hidden backdoors.
However, HRE is a highly complex and cumbersome task.
It takes months of work as well as expensive equipment to even obtain the netlist of a chip, the equivalent to the binary in software reverse engineering (SRE).
In contrast to SRE where various paid or open-source tools for binary analysis exist, e.g., IDA Pro or Ghidra, in HRE simply no tool for netlist analysis were available - neither commercial, nor free.
To close this gap, researchers from the Ruhr University Bochum developed HAL, the first open-source netlist analysis framework.
In this talk, we start with a basic introduction into the challenges of HRE.
Then, we demonstrate the capabilities of HAL before giving a brief overview on our current research with HAL.
Hardware reverse engineering (HRE) is an important technique for analysts to understand the internals of a physical system.
Use cases range from recovering interface specifications of old chips, over detection of malicious manipulations or patent infringements, to straight up counterfeiting.
However, HRE is a notably complex and cumbersome task which consists of two phases:
In the first phase the netlist, i.e., circuit description of a chip, has to be extracted from the physical device.
Such a netlist is equivalent to the binary in software reverse engineering (SRE).
In the second phase, the analyst then processes the netlist in order to understand (parts of) its functionality.
However, obtaining a netlist from a chip can take several months and requires professional and costly equipment as well as expertise.
Even with a recovered netlist, understanding its functionality is an enormously challenging task.
This is partly due to the lack of proper tools for netlist analysis:
While in SRE various commercial or open-source tools for binary analysis exist, e.g., IDA Pro or Ghidra, in HRE simply no tool for netlist analysis was available, neither commercial, nor free.
To close this gap, researchers from the Embedded Security group of the Horst-Görtz Institute for IT-Security at the Ruhr University Bochum developed HAL, the first open-source netlist analysis framework.
Inspired by the modularity of its SRE equivalents, HAL can be extended through optimized C++ plugins or directly used as a Python library, while at the same time offering a GUI for explorative and interactive analysis.
The project is supposed to give hardware analysts a common platform for the development of new algorithms with a portable design, ultimately aiding both professionals in their daily work as well as researchers in their efforts to publish reproducible results.
In this talk, we will first introduce the foundations and main challenges of HRE, before giving a live demonstration of HAL and some of its capabilities on selected case studies.
We conclude the talk with a glimpse at our associated research at the university that spans both, technical research as well as cross-disciplinary work with psychologists.
Our talk requires only minimum prior knowledge on digital hardware.
Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!
To get involved and learn more about what is happening please visit the Lightning Talks page in the 36C3 wiki.
A short introduction to the Lightning Talks Day 4 session
Electronic gadgets come not just with an ecological footprint, but also a human cost of bad working conditions and human rights violations. To support hardware makers who want to design fairer devices, we are building a software tool to easily discover social risk hotspots and identify measures for improvement.
The issue of human rights violations in the supply chains of electronics products is nowadays being broadly discussed. However, from the point of view of a hardware maker, it is difficult to exclude the possibiltiy of harm being done to workers in their supply chains due to their complexity and lack of transparency. At the same time, projects such as Fairphone and NagerIT demonstrate that improvements are, in fact, possible.
At FairLötet and the Fairtronics project, we try to support those who would like to improve the social impact of their products in taking the first step towards improvement. To this end, we are building a software tool which will provide a first estimate of the risks contained within a given design: circuit diagram in, analysis out.
The analysis shows the main social risks associated with the product, due to which components and materials they arise, and in what regions of the world the risks are located. This enables the user to understand where efforts towards sustainability should be concentrated, e.g. by making informed purchasing decisions or engaging with suppliers.
In this talk, you will learn about the risks associated with electronics, how they are estimated, and what data we gather to compute them. No deep background in sustainability or hardware is required.
- Andreas Fritsch
- xian
- tamdrx
In den gegenwärtigen Debatten um die Digitalisierung werden systemische und strukturelle Auswirkungen der Digitalisierung auf Entwicklungs- und Schwellenländer und damit verbundene potentielle Risiken und Herausforderungen bislang kaum betrachtet und diskutiert. Ein schwerwiegendes Versäumnis, hatte doch bereits die Weltbank, einer der größten Förderer von IKT in den Ländern des Globalen Südens, in ihrem Weltentwicklungsbericht ‚Digital Dividende‘ (2016) selbstkritische eingeräumt, der digitale Wandel bleibe nicht nur hintern, sondern verschärfe die soziale Ungleichheit.
Der Vortrag setzt sich mit der Frage auseinander, inwiefern die Digitalisierung zur Überwindung von Armut und sozialer Ungleichheit in den Ländern des Südens beitragen können. Erweitern sie die Chancen auf gesellschaftliche und ökonomische Teilhabe von benachteiligten Menschen oder verengen sie diese?
Schwerpunkt der Analyse bildet die Auseinandersetzung mit dem digitalen Handel. Fast unbemerkt hat sich in der Handelspolitik eine neue Dynamik entwickelt. Führende Tech-Konzerne, allen voran die aus dem Silicon Valley, instrumentalisieren zunehmend das Handelsrecht für ihre Interessen. Dabei geht es längst nicht mehr nur um die Reduzierung von Zöllen auf digitale Produkte wie Software oder einheitliche Standards für Telekommunikationsdienste. Patente auf Künstliche Intelligenz sowie die (Nicht)Regulierung von Datenflüssen sind inzwischen auch Bestandteil handelsrechtlicher Regelungen und Gegenstand kontroverser Debatten in der Welthandelsorganisation WTO. Für die Länder des Globalen Südens – aber nicht nur für sie – steht dabei viel auf dem Spiel, einschließlich der Gefahr eines neuen, digitalen Kolonialismus.
Im Vortrag zeigt zudem erste Ansätze zum Aufbau einer fairen und menschenwürdigen Digitalisierung auf.
Vom E-Commerce zum digitalen Handel
Vor 25 Jahren kaufte ein Internetnutzer aus Philadelphia, mit seiner Kreditkarte am Computer eine Audio-CD des Musikers Sting. Der elektronische Handel war geboren. Ein Jahr später ging Amazon mit seinem ersten Buch an den Start. Während in der Frühphase des E-Commerce vor allem materielle Güterverkauft wurde, kamen in der Folgezeit, aufgrund technischer Fortschritte, neue Produkte und Vermittlungswege hinzu. Eine Welt ohne digitale Dienstleistungen (wie der Fahrkartenkontrolle per App) und digital übermittelt Produkte (wie z. B. Video-Streaming) ist heutzutage nicht mehr vorstellbar. Mit der Verlagerung der gehandelten Güter von materiellen Produkten zu immateriellen wandelte sich auch die Begrifflichkeit. So verdrängte der Terminus des „digitalen Handels“ zunehmend den des „elektronischen Handels“.
Asymmetrische Einbindung des globalen Südens
Mit dem digitalen Handel und der Digitalwirtschaft werden häufig große Hoffnungen für den Globalen Süden verknüpft. Die Schaffung neuer, digitaler Märkte sei mit hohen Wachstumsraten verbunden, einhergehend mit einer Steigerung des Wohlstandes, behaupten nicht nur Tech-Konzerne, sondern auch Akteure aus der Entwicklungszusammenarbeit.
Ein Bericht der Vereinten Nationen kommt jedoch zu einem anderen Ergebnis. Demnach verteilt sich der Handel mit digitalen, immateriellen Gütern noch ungleicher, als beim traditionellen, analogen Handel. Auch beim Handel mit IT-Produkten, wie Laptops oder GPS-Geräten, geraten die Entwicklungsländer ins Hintertreffen. Die ökonomischen Folgen für die Länder des Südens sind schwerwiegend: Viele Entwicklungsländer leiden unter (1) Handelsbilanzdefiziten, (2) geringeren Staatseinnahmen und (3) erschwerten Bedingungen zum Aufbau einer eigenen, lokalen Digitalwirtschaft.
Daten – Der Zankapfel in neuen Handelsabkommen
Ein Anfang 2019 in Kraft getretenes Mega-regionales Handelsabkommen, dem elf Staaten angehören, darunter wichtige OECD-Länder (Japan, Kanada, Neuseeland, Australien, Chile, Mexiko), geht weit über bisherige Verträge zum digitalen Handel hinaus. Gleiches gilt für das von Trump vor drei Monaten abgeschlossene Handelsabkommen mit Japan. Beide verfolgen die Nicht-Regulierungsagenda des Silicon Valley, die seit 2000 zur offiziellen Handelspolitik der USA erklärt wurde. Demnach sollen in Handelsabkommen der USA folgenden Verbote hineinverhandelt werden:
• Verbot von Zöllen
• Verbot einer Digitalsteuer
• Verbot lokaler Datenspeicherung
• Verbot Quellcodes zu öffnen
Digitalisierung von Wertschöpfungsketten
Neben den hohen Wachstumsraten beim digitalen Handel, setzen viele Akteure aus der Entwicklungszusammenarbeit auch große Hoffnungen auf die Digitalisierung globaler Lieferketten. Sie versprechen sich davon gleich mehrere positive Impulse: Eine verbesserte Effizienz, mehr Produktivität und Transparenz sowie dem, aus entwicklungspolitischer Perspektive entscheidenden Faktor: Eine erhöhte Wertschöpfung für jene Menschen, die am Anfang der Lieferkette stehen, wie beispielsweise Kleinbauern in Kamerun
Erste Untersuchungen, u. a. am Beispiel ostafrikanischer Teeproduzenten, bestätigen diese Hoffnungen, allerdings nur zum Teil. Durch die Anbindung an das Internet hat sich die Kommunikation der Teepflücker mit anderen Akteuren aus der Lieferkette verbessert; auch können sie ihre Arbeit effizienter und transparenter gestalten. Trotz dieser Fortschritte hat sich jedoch die Einkommenssituation der Teepflücker*innen nicht verbessert, da die Anzahl potentieller Lieferant*innen mit gleichwertiger Qualitätsteigt an, wodurch diese verstärkt miteinander in Konkurrenz treten.
Faire Gestaltung der Digitalisierung
„There is no time to lose in taming the power of the digital. We can either surrender our digital future, or we can take ownership of it.” (‘Digital Justice Manifesto’, Just Net Coalition, November 2019).
Zum Schluss stell ich die einige Eckpfeiler für die Gestaltung einer Digitalisierung zugunsten der Menschen im Globalen Süden vor.
As every year, the CCC-CH (Chaos Computer Club Switzerland) holds its last Gettogether of the year at the congress. Everyone is welcome
Regelmässiges Gettogether des CCC Schweiz. Alle willkommen.
Learn about the open hardware pocket science lab
Join us for a self-guided exploratory workshop on Pocket Science Lab with your Android phone or laptop PC. Our goal is to develop an open source measuring device for electronics and sensors. In this exploratory open session you have the chance to install the app on an Android phone and test the Pocket Science Lab device with components and sensor kits.
After an introduction of the SUSI.AI project, discussion why open source personal assistants are important for our digital sovereignty and privacy we learn about the technology of SUSI.AI and get practical. We get started how do stuff with your real personal assistant and learn how to use it for creative work. You will learn how to create a simple bot and skills with SUSI.AI online and what you need to use it in your creative work, performance and even in theatre.
11:35
This talk focuses on how one could use a "feature" of google and trace the approximate location of a user even when his location services are blocked.
Even when the location services are blocked, google allows any third party to query their API and locate end users. The API utilizes an end point IP address to identify the user's location and pass it to the Third Party (even when the location services are off). Here I will show how close Google allows people to access your location even.
11:40
lernOS sees itself as an "operating system for lifelong learning". The talk gives an overview of the approach and available resources.
The rhythm of learning with years or semesters from school and university is lost with the entry into professional life. lernOS brings this rhythm back through regular, self-organized learning sprints (Scrum), focussed learning (OKR), efficient learning (GTD) and connected learning (WOL). The lernOS materials are available under open license Creative Commons Attribution International 4.0.
11:45
Presenting a simple gateway for using SMS with other means of communication.
Wir erzählen euch von den Aktionen unserer Initiative #wirsindderosten und wollen gemeinsam mit euch über Ideen sprechen, ein fortschrittliches und demokratisches Bild von Ostdeutschland zu pushen.
Mit #wirsindderosten machen wir Menschen in und aus Ostdeutschland sichtbar, die die Zukunft positiv gestalten. Damit Vorurteile abzubauen ist für uns nur der erste Schritt. Gemeinsam mit euch wollen wir 2020 weitergehen. Also, let’s hack the east!
- Melanie Stein
- Christian Bollert
Wir erzählen euch von den Aktionen unserer Initiative #wirsindderosten und wollen anschließend gemeinsam über Ideen sprechen, Ostdeutschland zu puschen.
Mit #wirsindderosten machen wir Menschen in und aus Ostdeutschland sichtbar, die die Zukunft positiv gestalten. So Vorurteile abzubauen ist nur der erste Schritt. Gemeinsam mit euch wollen wir weitergehen. So let’s hack the East!
11:50
Verifpal is new software for verifying the security of cryptographic protocols that is easy to use.
Verifpal is new software for verifying the security of cryptographic protocols. Building upon contemporary research in symbolic formal verification, Verifpal’s main aim is to appeal more to real-world practitioners, students and engineers without sacrificing comprehensive formal verification features.
In order to achieve this, Verifpal introduces a new, intuitive language for modeling protocols that is much easier to write and understand than the languages employed by existing tools.
11:55
CSR give integers in terms of 1 to 9 by using addition, subtraction, multiplication, division, exponentiation, parenthesis and/or digit concatenation.
Inder Taneja attempted to write the integers from 1 up to 11111 in terms of 1 to 9 by using addition, subtraction, multiplication, division, exponentiation, parenthesis and/or digit concatenation. For example:
9617 = 1+2^3*(45+(6+7)*89)
9618 = 1*(2+3+4+5)*(678+9)
9619 = 1+(2+3+4+5)*(678+9)
These are generally referred to as crazy sequential representations (CSR). Interestingly, within the 1 up to 11111 range, only one CSR remains to be identified, namely the CSR for 10958.
12:00
A short introduction about E-Residency and how to become an Estonian E-Resident.
Estonias is the most advanced country for E-Government, 99% can be done online. E-Residency allows digital access also for other international citizens.
I will show some facts and my personal experience becoming a digital E-Resident.
Sprache schafft Bewusstsein. Als ein Gegenpol zum rechten "Das wird man doch wohl noch sagen dürfen"-Narrativ soll es in diesem Vortrag um verbrannte Wörter gehen. Wörter, die durch die Nationalsozialisten derart negativ besetzt wurden, dass ihr Gebrauch wohl überlegt sein will. Dieser Vortrag wird den historischen Kontext zu bestimmten Worten oder Wendungen erklären, sei es zum Beispiel die "Aktion", "asozial", die "Überfremdung" oder "versifft".
Den Zuhörenden soll hier dabei geholfen werden, bestimmte nationalsozialistische Denkmuster durch ihre Sprache nicht aktiv zu reproduzieren und dabei helfen, eine geschichtsbewusstere Sprache zu etablieren. An einigen Stellen wird die Analyse von Worten oder Wendungen auch einen klaren Bezug zur Sprache der neuen Rechten in Deutschland enthalten.
Der Vortrag ist als Präsentation konzipiert und wird schrittweise verschiedene Worte genauer analysieren, der Vortrag kann dann im Abschluss aber gerne durch einen etwas längeren Fragenteil abgerundet werden.
We briefly discuss the range of cryptographic primitives being used by protocols that seek to make proof-of-work protocols obsolete. We shall focus primarily on these cryptographic building blocks themselves, not overly on the different protocols built form them.
There are a handful of protocols consuming enormous amounts of energy in proof-of-work schemes, which provide only rather tenuous security assurances. In practice, proof-of-work also invalidates these protocols original goal of being distributed.
There is also a zoo of protocols designs, both new and from the 80s, that provide far stronger security than proof-of-work at minimal cost. We shall discuss the distinctive cryptographic primitives used by these protocols, without examining any of these critters too closely.
In essence, our taxonomy splits as blind signatures vs. verifiable random functions (VRFs) vs. randomness beacons, with the latter consisting of publicly verifiable secret sharing (PVSS) and verifiable delay functions (VDFs). We only have time for a cursory look at the mathematics usable to build each of these, but this should explain some of their uses, strengths, and weaknesses.
DLF-Podcast: Computer und Kommunikation
DLF-Podcast: Computer und Kommunikation
What does Wikimedia do to modernize WIkipedia's user experience, and why does it take so long?
Editing Wikipedia feels like a blast from the past, and even just reading articles feels a bit dusty. Why is that? And how can it be fixed? And how can you help?
an opportunity to get involved and catch up with the hackerspaces.org community
Austausch zu alternativen Home Assistants
Home Assistants sind hilfreich - doch wer möchte sich schon ein Abhörgerät ins Haus stellen. Alternativen zu Google Home und Amazon Alexa sind schwer zu finden. Ziel der Session: Austausch mit Anderen die Alternativen kennen, dabei sind sich selbst etwas zu bauen oder einfach nur Interesse am Thema haben. - offene Diskussion -
This workshop covers the fundamentals of memory internals and then dive into hands-on analysis with volatility. Newbie or seasoned, professional or hobbyist, this session is for you!
Both theoretical and technical aspects of memory forensics will be covered: A theoretical approach of the basics of how memory in Windows systems works and hands-on dive to memory analysis.<br>The following topics will be discussed:<br>UPDATE: Download material for the workshop from : https://github.com/nov3mb3r/36c3-Workshop <br>* How memory works in Windows systems* Memory acquisition* Introduction to Volatility and its plugins* Hands-on analysis of machine hit by ransomwareLast 15 minutes will feature a general discussion and ideally will set the foundation of a C3 assembly dedicated to Digital ForensicsIt is a BYOD, so please have the latest version of volatility installed on your machine!<br>https://github.com/volatilityfoundation/volatility/wiki/Installation<br>The workshop will be all about how to use it, not install it! :)
Hackbases are several different types of hackerspaces where people can also live at. The 6th yearly self-org session will be a common presentation of the existing and planned bases, tools to organize new ones, etc. Come if you're interested in different ways of living and doing work.
'''''Location: M3 (see on [https://36c3.c3nav.de/l/mh-hall-m3/@-1,148.3,180.34,4.53 c3nav map])'''''_________________'''''Hackbases are hackerspaces/hacklabs, that people also live in.'''''If you have regular paid work, there is a worrying probability it advances the political flux surrounding you - neoliberal capitalism. The current variety of places to work in - at universities, at NGOs, at "ethical startups", or even big corporations, as well as playful free-time participation within the current hackerspaces, could be insufficient to bring radical change, so needed by the many.Hackbases are experiments in alternative lifestyles, that for example could help you to focus on working to hack the planet.Find existing info: * https://wiki.hackerspaces.org/Hackbase * join #hackbases on Freenode ! (IRC client, or in the browser maybe with [https://riot.im/app/#/room/#freenode_#hackbases:matrix.org riot.im]) * start your own hackbase, see [https://pad.land/hackbases pad.land/hackbases] ;) * more info: [https://pad.land/hackbases pad.land/hackbases] * projects: https://next.totalism.org, https://ecohackerfarm.org, [...]SOME INTERESTS: Self-sustainability, off-grid, autarky / resilience and temporary architecture research & alternative construction // Free software and free hardware development // Free Industry // Open data, workflow and organisational technology, Tektology //Digital nomadism // Critical theory // Sound studio, bands, Intermedia Art // Growing food // Renewable energy technologies // Nootropics // A nomad hacker lifestyle in a network of hacklabs // "Coliving" and "Coworking" // Hacker camp // Financial and temporal freedom // Autonomy'''(via https://totalism.org)'''
**Chaoszone Interne Session**
Wir planen den Abbau der Chaoszone
Wer sind wir? Anne fragt Ludger
Ludger antwortet und ist gespannt auf Annes Fragen.
Lasst uns mal schauen^Whören, wohin uns das Gespräch führen wird.
Stay tuned! :-)
''Learn to solder together a cool, powerful music synthesizer,<br> and learn to make cool music, sound, and noise!''<br> <br> ''(This is one of many cool things happening throughout 36C3 in the huge '''Hardware Hacking Area!)'''''<br> <br> This workshop will be given:<br> Day 4: 30-Dec, 12pm - 2pm<br>
10 Rechner zum Factorio spielen, Leute die das Spiel erklären
10 Rechner zum Factorio spielen, Leute die das Spiel erklärenAnzahl Teilnehmer*innen: ca 10-20 gleichzeitig (inkl. Zuschauer)Alter: 7-m JahreDauer bis zu ca.1.5hAnmeldung erforderlich? nein (wenn was frei ist)
Musik aus und mit modifizierten, selbstgebauten Klangerzeugern
Musik aus und mit modifizierten, selbstgebauten KlangerzeugernAnzahl Teilnehmer*innen: 3-7Alter: für Kinder von 5-99 JahrenAnmeldung erforderlich?: nein, kommt jederzeit vorbei (während der Workshopzeiten)Unkostenbeitrag: Freiwillige Spenden
print your own t-shirt, Bedruckt eure T-Shirts
Print your own t-shirt with screen printing.Bedruckt eure eigenen T-Shirts mit siebdruck.Anzahl Teilnehmer*innen: 4 / StundeAlter: > 6 JahreDauer 15 ~ 30 MinutenAnmeldung erforderlich? Wir werden Wartemarken ausgebenUnkostenbeitrag: freiwillig, 8~10€ je nach Verbrauch
Captain Sonar
Wir spielen das Spiel Captain Sonar.Bitte über https://www.schokoladensouffle.eu/captainsonar/ anmelden, maximal acht Teilnehmer, FCFSWir spielen bei der Gaderobe im Pseudoroom (CCL Gebäude ganz unten)DECT 3060 bei Rückfragenmehr Infos zum Spiel: https://de.wikipedia.org/wiki/Captain_Sonar
Voltage glitching for beginners, with fun and faults
'''Please drop by the Hardware Slackers assembly FIRST and complete the 5 minute Xbox controller fault injection challenge!'''We'll be doing some mini-workshops on voltage glitching (fault injection). We'll explain the basics, and then let people play around a bit with voltage fault injection setups themselves.We are very limited in space/resources so feel free to also drop by at a random time and see if we're around.
It's a combination of acupressure and breathing techniques. How much pain do you carry? Can you imagine to make yourself perceptible? Can you imagine potential behind pain?
Laura Pöhler, Pressesprecherin des Bündnisses gegen das neue bayerische Polizeiaufgabengesetz #noPAGTom Patzelt, Fridays for Future/ Jugend gegen Rechts LeipzigFranz Knoppe,Vorstand vom ASA-FF e.V.
12:05
This is a pitching, an Initiative for next year to create an assembly for projects like clustering, heterogeneous computing etc.
The point is to create a space where we can collectively build up small clusters and showcase our projects.
From using Raspberry's and android phones, to custom made boards using ARM, PIC, x86, ATMELs, FPGAs and more.
Use cases for such infrastructures or clusters could be red team tooling, honeypoting, password cracking (hashing) etc.
12:10
Wie kann man Security Awareness Kampagnen so gestalten, dass die Mitarbeiter nichts lernen und zusätzlich noch sauer auf die IT sind?
Angreifer nutzen immer Häufiger menschliche Schwachstellen anstatt der technischen. Um diese "Sicherheitslücke" zu schließen gibt es mehr und mehr Awareness Kampagnen. Hier lassen sich diverse Dinge falsch angehen, die nicht nur zu Unmut bei den Mitarbeitern führen, sondern im Endeffekt dafür sorgen, dass sich an der Sicherheitskultur nichts ändert. Mit diesem Vortrag möchte ich anreißen, wie man eine Kampagne durchführen kann, die garantiert keine positiven Effekte hat.
Mit #wirsindderosten wollen wir den Osten hacken. Wir erzählen euch von unseren bisherigen Aktionen und wollen mit euch über neue gemeinsame Ideen sprechen.
Hi, Wir wollen euch bei einem Lunch von #wirsindderosten erzählen, einer Initiative, die Menschen in und aus Ostdeutschland sichtbar macht, die die Zukunft positiv gestalten. Wir wollen das Potential des Ostens zeigen und nutzen - und wo ginge das besser als beim 36c3 in Leipzig! Lasst uns gemeinsam über Ideen sprechen!
12:15
Research presentation on the intersections of hacktivism and early 20th-century avant-garde art
One of the assumptions of my doctoral research on the art of hacking is the idea that the historical avant-garde of the 20th century may be interpreted as a main intellectual precondition of hacktivism. I demonstrate that the existing theoretical framework available to analyze the traditions of avant-garde art can provide valuable new aspects to understand hacktivism, as well as to highlight the analogies between the historical avant-garde’s revolutionary ethics and those of hacktivism.
12:30
Although tarnished, blockchain stuff should still interest hackers. This talk provides a positive if irreverent look at the space and its promises.
The talk will address how passenger name records (PNR) of flight passengers are currently used by law enforcement throughout the European Union to track and identify suspects of a variety of crimes, how this is likely to be only a first step by the security state to surveil our every movement. Two NGOs have joined forces to stop this new form of indiscriminate mass surveillance in the courts and build safeguards against future infringements of our fundamental right to privacy.
The PNR directive obliges all EU member states to process and save for five years all PNR data of passengers entering or exiting the European Union by plane. All member states have agreed to voluntarily extend this practice to all intra-EU flights as well. Subsequently, the data of hundreds of millions flight passengers are being checked against databases, generating vast amounts of false positives and futile infringements on passengers’ right to privacy. The data are also processed against “pre-determined criteria” which allows law enforcement to define “suspicious flight patterns”. The goal of this profiling of our travel movements is to find suspects among flight passengers that the authorities have never even heard of before. The system has no effective safeguards to prevent vast numbers of people from being falsely labeled as potential terrorists.
Member states are already planning to extend this practice to international buses, trains and ferries – even though the effectiveness of processing flight passengers’ PNR data has yet to be proven. By this logic, the next step would be to track rental cars, then all cars, then mobile phones, and finally getting rid of the criterion “international”, enabling the state to surveil our every movement and to identify those of us who seemingly move around in suspicious patterns.
But there is hope. The Court of Justice of the European Union (CJEU) has proven before to be critical of indiscriminate mass surveillance affecting people that are not even on the authorities’ radar yet. Therefore, the Gesellschaft für Freiheitsrechte, a German NGO focused on strategic litigation, and epicenter.works, an Austrian NGO focused on protecting human rights in the digital age, have started legal proceedings against the PNR directive, aiming to have German and/or Austrian courts ask the CJEU whether the PNR directive and national transposition laws violate the Charta of Fundamental Rights.
This talk will explain how law enforcement currently processes PNR data, how this violates fundamental rights, how these surveillance systems may soon extended to other means of transportation, and what strategy civil society is pursuing to stop this from happening.
- Walter Hötzendorfer
- Bijan Moini
<p>The <a href="https://ngi.eu">Next Generation Internet</a> initiative is the first concerted effort in Europe to put significant public funding to hands-on work to really fix the internet. The long term <a href="https://ngi.eu">vision</a> of the initiative is to make the internet what we need and expected it to be in the first place: <strong>Resilient</strong>. <strong>Trustworthy</strong>. <strong>Sustainable</strong>. The concrete mission of the Next Generation Internet initiative is to "re-imagine and re-engineer the Internet for the third millennium and beyond". With new projects starting all the time, the density of awesome open source, open hardware, new science and new standards in-the-making is already intense: about 200 projects are currently on their way. These range from encrypted synchronisation for calendars and address books to symbolical protocol verification, from an open hardware RISC-V SoC to removing binary seeds from operating systems, from ethical search to the Fediverse etc.
<p>NGI Zero offers funding to independent researchers and FOSS developers working on free and open projects in the area of privacy and trust enhancing technologies and on search, discovery and discoverability. It also offers an elaborate 'pipeline' of supporting activities that live up to high standards (sometimes called 'walk the talk') in terms of security, privacy, accessibility, open source licensing, standardisation, packaging, etc. The talk will provide an overview of the awesome R&D that is now in the pipeline, how the programme is organised and everything you need to know about the various opportunities to 'come and work for the internet'. </p>
<p><a href="https://nlnet.nl/discovery">NGI Zero Discovery</a> and <a href="https://nlnet.nl/PET">NGI Zero PET</a> are a significant effort and ambitious effort by a large group of organisations led by <a href='https://nlnet.nl/foundation' rel="me">NLnet foundation</a> (that was instrumental in <a href="https://nlnet.nl/foundation/history">pioneering the early internet in Europe</a>):
<ul>
<li><a href="https://accessibility.nl/english">Accessibility Foundation</a> - Center of expertise on accessibility of internet and other digital media for all people, including the elderly and people with disabilities</li>
<li><a href="https://apc.org">Association for Progressive Communications</a> - A global network and organisation that strives towards easy and affordable access to a free and open internet to improve the lives of people and create a more just world</li>
<li><a href="https://techcultivation.org/">Center for the Cultivation of Technology</a> - A charitable non-profit host organization for international Free Software projects</li>
<li><a href="https://commonscaretakers.com">Commons Caretakers</a> - A not-for-profit service provider for the development of Commons</li>
<li><a href="https://www.netsec.ethz.ch/">Network Security Group</a> of <a href="https://www.netsec.ethz.ch/">Eidgenössische Technische Hochschule Zürich</a> - Academic research institute focused on building secure and robust network systems</li>
<li><a href="https://fsfe.org">Free Software Foundation Europe</a> - Association charity that aims to empower users to control technology.</li>
<li><a href="http://www.ifross.org/" class="external" target="_blank">ifrOSS</a> - Provides not-for-profit legal services and studies in the context of free and open source software</li>
<li><a href="https://nixos.org/nixos/foundation.html">NixOS Foundation</a> - Foundation supporting development and use of purely functional configuration management tools, in particular NixOS and related projects</li>
<li><a href="https://nlnet.nl">NLnet Foundation (NL)</a> - Grantmaking public benefit organisation founded by pioneers of the early European internet</li>
<li><a href="https://ps.zoethical.com/">Petites Singularités</a> - Non profit organisation working with free sofware and focusing on collective practices</li>
<li><a href="https://radicallyopensecurity.com">Radically Open Security</a> - Not-for-profit open source security company</li>
<li><a href="http://securesoftware.nl" class="external" target="_blank">TIMIT</a> - Experts in secure software</li>
<li><a href="http://translatehouse.org/" class="external" target="_blank">Translate House</a> - Develops and implements open source localization solutions</li>
</ul>
<p>The budget for the effort is kindly provided by the European Commission.</p>
The talk explains and illustrates the procedural and technical details of the surveillance in and around the Ecuadorian embassy in London during the time Julian Assange stayed in there from June 2012 until April 2019.
In the aftermath of Assange's expel from the ecuadorian embassy in London and his arrest based on a US extradition warrant evidence appeared that the "Security" measures of the embassy had at some point switched from protecting Assange and the embassy to an extremely detailled surveillance operation both against Assange and his visitors. The Spanish company "Undercover Global" that has been in charge of the embassy between 2015 and April 2018 and its owner and CEO is under investigation for spying on behalf of the CIA. Material from the second company that has taken over the embassy "Security" in April 2018 has found its way into an attempted extortion and is also subject to a legal investigation.
The talk will contain material both documenting the surveillance measures installed as well as audio and video material obtained by the surveillance gear. It will also briefly touch on surveillance measures experienced elsewhere by friends, lawyers, media partners and associates of Assange and Wikileaks in the context of the ongoing man hunt.
This talk gives a leisurely introduction to the secret of the number five, which links SpongeBob's pineapple, approximations to π known to antiquity, the Mandelbrot fractal, and infinite continued fractions together. The talk is aimed at people who are interested in mathematical patterns, but no fancy math knowledge is needed to enjoy the talk. There will be pretty pictures.
We will use consequence scanning as a method to think through building tools against online harassment
12:35
For various reasons Medical data is becoming more and more centralized, but we have to way to decide who gets access to which parts of the data.
12:40
1.4 Work Resolution Formula R
unit-of-work = UOW
work-quantum WQ
0 <= UW - WQ = 0
To make our ecological and technological work effective and unique, many work-quanta should be developed in advance of any public offering. The unit-of-work is the minimum weekly shared computational processing required to sustain the network. A completed unit-of-work represents a proof-of-human-collaboration, the consensus algorithm for access to the action network.
In this talk we'll dive into the challenge of going fully FOSS. We'd like to introduce you to the principles behind our decision to choose FOSS. We'll explain the why and how, focusing on ethics as well as our tech stack. We'll share what daily trials and tribulations we had to overcome, how our organization coped with these changes, and what our day to day work now looks like. We'll give an honest review of the cost of choosing FOSS over proprietary software. We'll also detail our migration experience and talk about our efforts to build a global network of other non-profits using FOSS. Finally we'd like to talk about our relationship with the FOSS community. Our goal of sharing our FOSS adventure is to show other organizations that it is important and possible to choose ethical IT alternatives.
Imagine if you could banish all proprietary software out of your workplace and use only free and opensource software. Would it be possible? How would you build this? What technical skills do you need? Will your coworkers appreciate the change? Can you rely on free and opensource apps in a production environment without support? These were all questions we had to answers when we embarked on our FOSS adventure. In 2017 the Mama Cash foundation committed itself to building an entirely new IT environment with as much free and opensource software as possible. Through our activism we recognized the importance of FOSS for non-profits who can't rely on proprietary cloud solutions, for privacy, ethical or financial reasons. As we committed ourselves to the Feminist Principles of the Internet, we quickly realized that using FOSS was the preferred option. The FOSS community has been immensely successful in advocating the use of opensource alternatives. However, implementing these in a business settings is a whole different story. While many organizations would like to contribute to a GAFAM-less world, a combination of lack of experience, knowledge and support prevents them from doing so. Our objective is to show the world that it is possible to build an ethical IT environment that respects open standards, community building and data privacy.
In this talk we'll dive into the challenge of going fully FOSS. We'd like to introduce you to the principles behind our decision to choose FOSS. We'll explain the why and how, focusing on ethics as well as our tech stack. We'll share what daily trials and tribulations we had to overcome, how our organization coped with these changes, and what our day to day work now looks like. We'll give an honest review of the cost of choosing FOSS over proprietary software. We'll also detail our migration experience and talk about our efforts to build a global network of other non-profits using FOSS. Finally we'd like to talk about our relationship with the FOSS community. Our goal of sharing our FOSS adventure is to show other organizations that it is important and possible to choose ethical IT alternatives.
12:45
I'll demonstrate how you can filter dns packets from iptables with insanely great performance, and also why you should be wary about doing this.
Filtering DNS packets from iptables is possible, and the performance is awesome. However, if you don't pay attention, and you don't test thoroughly enough, you may also filter legit queries. The talk is about a bit of hardening, and mostly about a fail in production, and how I have achieved to drop about 2-3% of our users.
Lösungshinweise in Multiple-Choice-Fragen exploiten
# Wir exploiten unbeabsichtigte Lösungshinweise in Assessments.# Bei Interesse erstellen wir auf Moodle unsere eigenen Assessments.----* Erstelle Multiple-Choice-Fragen (MC) in deinem Kurs ([https://ilias.unibe.ch/goto_ilias3_unibe_cat_307859.html Veto] / [http://www.eassessment.uni-bremen.de/mc_leitfaden.php Tipps]).* Erweitere die Fragensammlung per Hand und / oder Import.** Verwende die Import-Formate [https://docs.moodle.org/en/Aiken_format Aiken] oder [https://docs.moodle.org/en/GIFT_format GIFT] (UTF-8).* Lege einen Test an, füge MC hinzu und führ ihn durch.** Tipp: Einfachere Fragen als Einstieg (Prüfungsstress reduzieren).** Tipp: Browservollbild (F11) und [https://safeexambrowser.org/ Safe Exam Browser (SEB)].* Bewerte einen Freitext, erstelle eine Notenformel und gib Einsicht.** Tipp: Freitext-Antwort-Umfang vorgeben, Bewertungsraster erstellen.* Optimiere die MC-Fragen statistisch für die nächste Durchführung.* Zum Abschluss zusammen die [https://die-agentur.ch/die-moodle-rallye/ Moodle-Rallye] absolvieren :-)
What rather simple failures and contradictions in the physics of the early 20th century made Einstein create General Relativity? What problems did he face and why? How to unify two theories - like electromagnetism - is crucial in modern physics. It's a problem we are facing again.
12:50
Reverse Engineering of integrated circuits is often seen as something only companies can do, as the equipment to image the chip is expensive, and the HR costs to hire enough reverse engineers to then understand the chip even more so. This talk gives a short introduction on the motivation behind understanding your own or someone else’s chip (as a chip manufacturing company), and why it might be important for the rest of us (not a chip manufacturing company). The focus is on understanding what millions of logical gates represent, rather than the physical aspect (delayering, imaging, image processing…), because everyone can do this at home. I will introduce some proposed countermeasures (like logic encryption) and explain if, how and why they fail.
The talk will give a general overview of the research field and explain why companies are interested in reverse engineering ICs (IP overproduction, Counterfeits, Hardware Trojans), as well as why it’s important for an end user (IC trust, chip failure). Then, I will very shortly introduce the reverse engineering workflow, from decapsulating, delayering, imaging, stitching, image processing and then come to the focus: netlist abstraction. The idea is to show some methods which are currently used in research to understand what netlists represent. Some theory will be explained (circuit design, formal verification of circuits, graph theory…), but I want to keep this to a minimum. Finally, I will show some current ideas on how to make reverse engineering difficult, as well as some attacks on these ideas. The talk does not give insights into how large companies do reverse engineering (i.e. throw money at the problem), but rather show the research side of things, with some of the methods published in the last couple of years, which is something everyone can do at home.
Drivers are usually written in boring and unsafe languages such as C. Did you know that you can actually use cool and safe languages as well?
We've got drivers in Rust, Go, Java, C#, Haskell, OCaml, Swift, Javascript, and Python. Check out [our GitHub page](https://github.com/ixy-languages/ixy-languages) for all implementations.
Long versions of this talk are available on media.ccc.de:
* [35C3, English, 45 minutes](https://media.ccc.de/v/35c3-9670-safe_and_secure_drivers_in_high-level_languages)
* [EH 19, German, 50 minutes](https://media.ccc.de/v/eh19-189-treiber-in-high-level-programmiersprachen)
12:55
Cycling around the globe for climate justice & social justice with thousands of people.
Aiming at education & networking for the 21st century.
Tour de Rebel – How dare you? We dare!
We dare to be a critical mass of thousands of people who are cycling together around the world for climate justice and social justice to spread the science regarding climate change and tell the truth. Further, sharing skills for the 21st century needed. Education & acting now and networking for the 21st century is a central part of the Tour de Rebel. We dare to build connections between and within organisations and movements while enjoying slow travelling
13:00
Short introduction of Listling, a free and open-source web app to make and edit lists collaboratively
Heat waves, wildfires and new movements like Fridays for Future and Extinction Rebellion have brought the climate crisis back into the news. If the world continues to emit greenhouse gases like today, the world will heat up by at least 3 degree celsius, potentially much more. Yet despite increased attention for the climate crisis no political action even remotely sufficient to tackle the problem is in sight.
The talk will give a brief overview of the state of the science of climate change, the politics and the scale of the challenge. It'll also give an overview of some - more or less scientific - worst case predictions that sometimes lead to claims that it's just "too late to do something", which may become a new form of justification for not doing anything.
CryptoParties are free and open for everyone, but especially those without prior knowledge, who haven't yet attended one. CryptoParty is a decentralized movement with events happening all over the world. The goal is to pass on knowledge about protecting yourself in the digital space. This can include encrypted communication, preventing being tracked while browsing the web, and general security advice regarding computers and smartphones. To try the tools and apps directly at the CryptoParty, bring your laptop or smartphone.
The meeting is to exchange ideas and opinions about the upcoming use of K8S in critical infrastructure
The organizer has audited and consulted on several projects of Kubernetes in critical infrastructure. Areas audited are traffic control, power grids and several health care projects. Some show very strict awareness of security, others have approached the topic totally naive.Let us exchange ideas about the bare necessities and no gos for microservices going critical.
The meeting is to exchange ideas and opinions about the upcoming use of K8S in critical infrastructure
The organizer has audited and consulted on several projects of Kubernetes in critical infrastructure. Areas audited are traffic control, power grids and several health care projects. Some show very strict awareness of security, others have approached the topic totally naive.Let us exchange ideas about the bare necessities and no gos for microservices going critical.
Wie soll es mit dem Freifunk weitergehen?
Admin-Mangel, zunehmende Finanzierungsprobleme, unerfüllte Erwartungen?
Auch wenn die c't-Aktion das Schlimmste im Jahr 2019 abgewendet hat, so ist es doch nur ein Jahr der Fortsetzung von 2018 gewesen: Community-Sterben, kein Lichtblick bei der Gemeinnützigkeit, immer weniger Bedarf/Verständnis für das was Freifunkende unter "freies Wlan" verstehen, umgekehrt immer größere Schere zwichen dem was Freifunk realistisch an Bandbreiten liefern und Verfügbarkeiten garantieren kann und dem was inzwischen von vielen Nutzenden erwartet wird. In Summe immer weniger Spass am Gerät für die verbliebenen Nutzenden.
Neben der Bestandsaufnahme "Was wir beobachten" und "warum das vermutlich so ist":
Können wir es ändern? Wollen wir es ändern? Wie kann man sich neu orientieren, wenn alle bisherigen Rezepte versagt haben. Oder wie fährt man Communties herunter, damit zumindest die Außendarstellung nicht völlig desaströs ist?
Dieser Workshop richtet sich an Menschen, die mehr als 1-2 Jahren schon Freifunk-Geschichte erlebt haben. Um Lösungsstrategien zu diskutieren. Ein ähnlich gelagerter Forenthread zur Einstimmung: https://forum.freifunk.net/t/rueckgang-von-communities-rettungsleine/21507/38
Internet-Router mit Linux, aktueller Software, aber kein OpenWRT oder IPFire? **fli4l** ist eine freie Router-Distribution für diverse Einsatzszenarios, jetzt auch ohne Disketten.
Vergesst Disketten und ISDN! Das fast 20 Jahre alte Linux-Router-Projekt [fli4l](http://www.fli4l.de/) läuft auf modernem Unterbau mit aktuellen Treibern auf (fast) beliebiger x86 Hardware. Ein fli4-Router routet IPv6, baut OpenVPN-Tunnel, kann mit multiplen Uplinks arbeiten, unterstützt Bridges, VLAN und Bonding. Er agiert als DNS- und DHCP-Server und natürlich auch als Paketfilter und Firewall, auch für mehr als ein Netz. Auch Funk mit UMTS, LTE und WLAN ist an Bord. Sogar ISDN wird noch unterstützt.
Im Vortrag geht es nur am Rande um die Geschichte von fli4l als Diskettenrouter. Gezeigt werden aktuelle Möglichkeiten und Einsatzszenarien, das moderne Buildroot, das flexible Circuit-System, aber auch die Ecken und Kanten an denen man die Geschichte der Distribution ablesen kann und wo sich interessierte Hacker bei der Modernisierung austoben können.
Gut dokumentiert und auf Basis von Linux und Freier Software ist fli4l eine Möglichkeit seine Routerfreiheit zu genießen. Keep it running!
Honigdachs ist der Bitcoinpodcast aus Leipzig
Wir wollen einen kleinen Jahresrückblick, eine 36c3-Zusammenfassung und einen Ausblick auf das kommende Bitcoinjahr machen. Sei dabei oder sei ein Ei!
In this on stage workshop we will install the SUSI.AI personal smart assistant on a Linux Desktop Computer and support participants to set it up on their distribution, e.g. Debian, Ubuntu, Linux Mint, Fedora, CentOS or others.
In this 2-3 hour workshop I teach you how to solder and program an Arduino!
Über kollektives Entscheiden und Handeln
Einführung und Panel: Karolina IwaGemeinsam sind wir mehr! Über kollektives Entscheiden und Handeln.Was brauchen wir um in Kollektiven in Aktion zu treten? Welche Strukturen und Prozessekönnen uns unterstützen gemeinsam die Welt (um) zu gestalten?Karolina Iwa und Sebastian Daniel Mall beschäftigen sich als das Leadership Festival- Kollektivs mit Ansätzen wie Ko-Kreation, der Theory U und zeitgemäßen Theories of Change. Sie sind Teil einer globalen Bewegung von Aktions-Forschern.Leadership Festival @ Roter Salon @ 36c3
Get a massage by professional therapists. In 20-Minutes-Slots you can reboot your head, shoulders and back.
Contact: Marko Mijokovic (01636934204)
In our reactor you will learn how to reprogram a body with Thai massage.
collecting ideas for the Vintage Computing Festival Berlin 2020
13:05
At the Freilab Freiburg e.V. we developed a new digital tally sheet that is easily deployable and fun to use.
In this talk I introduce the software design and hardware deployment of a cheap, yet intuitive to use solution for counting Mate consumption per user. It serves as an example of how simple both hardware and software setup of a digital tally sheet can really be without compromising on the user experience.
13:10
Despite many amazing (technical) results, NLP is facing both linguistic and ethical challenges. Given the rise of NLP, we are facing the consequences.
13:15
Let's build a system programming language for hackers! More control and possibly faster than C. No legacy - Just fun!
Let's build a system programming language for hackers! More control and possibly faster than C. No legacy - Just fun!
Link: https://github.com/rebuild-lang
The Toniebox plays songs or reads stories to your kids when they put a little figurine on top of it.
We show how to create a backup of it and use the ChameleonMini in place of it in case your kid ate it.
The Toniebox plays songs or reads stories to your kids when they put a little figurine on top of it.
We show how to create a backup of it and use the ChameleonMini in place of it in case your kid ate it.
Introduction to two properties of operating systems/programming languages/any software and their relationship
* Transparent persistence: Every variable in the programming language is persisted to disk automatically* Crash-only: Software needs to be prepared to crash at any point in time. Crashing takes the place of failing and shutting down.
Wir werden das Gutachten der Datenethikkommission aus einem praktischen Blickwinkel betrachten und diskutieren.
Die Datenethikkommission der Deutschen Bundesregierung hat im Oktober 2019 ein Gutachten herausgebracht. Im Januar 2020 treffen sich die Mitglieder der Datenethikkommission wieder - in München als Teil eines Seminars der Technischen Universität München. Ich bin Teil dieses Seminars und freue mich, euch das Gutachten vorzustellen und danach über seine Praktikabilität und Realitätsnähe zu diskutieren.Zu Beginn werde ich das Gutachten der Datenethikkommission kurz vorstellen und im Nachgang werden wir zusammen über die Resultate der Kommission diskutieren. Oftmals sind solche Dokumente recht oberflächlich gehalten und beschreiben selten realitätsnahe Situationen. Gemeinsam können wir hier Schwachstellen des Gutachtens finden und Vorschläge diskutieren.
Diego walks noobs and scrubs alike through Monero, what it is, what problems it solves, and what sets it apart from the rest of the blockchain space. Along the way, he'll teach the basics of blockchain as well, so super noobs are encouraged to attend.
13:20
Where to find large amounts of valuable open culture data and how to use them.
This lightning talk gives a brief introduction on where open cultural data is available and how it can be used to create new art and beauty.
13:25
What if you could play Minesweeper *against* the computer? I describe how I created a game that is always fair but will punish you for every mistake
Kaboom is a Minesweeper game that does not determine the mines beforehand, but makes them up as you play. While that sounds simple, it was surprisingly hard to get right and required me to do pretty interesting things, so I want to describe how I created the game.
You can play the game at https://pwmarcz.pl/kaboom.
13:30
At the center of Clemens Schöll's latest art project is the "Wohnungsbot" (flat-bot), which automates flat searching in Berlin. But it doesn't only try to search flats for everybody, it fundamentally questions power-relationships in (flat-searching) online platforms. Where are the utopias about public automation? Who should be able to automate what, and how?
<p>With increasing urbanization and financial speculation on the housing market the search for a flat in any big city has become an activity that consumes a lot of resources for people in need of housing: beyond the emotional load a significant share of your supposed leisure time is being consumed by repetitive tasks. Online platforms force us to refresh pages, scroll, click here, click there, look at a few pictures and eventually copy-paste our default text over and over again. If you're ambitious you maybe adjust the lessor's name or the street. But honestly, why do we do this? It could be so easily automated.</p>
<p>The 'automation drama in three acts' by media artist Clemens Schöll titled <i>"Von einem der auszog eine Wohnung in Berlin zu finden" (Of someone who went forth to find a flat in Berlin)</i> speculates about alternative strategies and narratives for both the housing market as well as automation itself. At the center of the multi-exhibition project stands the Wohnungsbot (literally: flat-bot), a free open source software to automate flat-searching and applications in Berlin, released to the public in June 2019.</p>
<p>But the Wohnungsbot is about much more than just rejecting the out-of-control housing situation. There are no technological fixes for social problems. By reclaiming de-facto working time a fundamental utopia of automation is opened once again. Who should be able to automate, what should they be able to automate, and how?<br/>
But even if these tools are publicly available – who is aware of them and who is able to use them?</p>
<p>Looking back in history we find that automation has always been accompanied with struggles of power and labor. How have we reached a state where only institutions, be it private companies (usually for-profit) and the state, are allowed or able to automate? Why has automation become a synonym to nightmares of many people, such as mass unemployment? If we're not asked for consent (or don't want to give it) to being dehumanized by automated processes, how can we oppose these practices?</p>
<p>Ultimately, we can look at ourselves (at Congress) and ask: where do we stand in this? With many of us being <i>"people who write code"</i> (title of a previous artistic research project by Clemens Schöll) we must reflect if and how we shape this tension with our work and existence.</p>
In diesem Vortrag nehmen wir euch mit auf eine Reise durch das Haecksenjahr 2019.
Wir streifen kurz die deutsche Statistik über Femizide in Deutschland, bei der Deutschland sechst-schlechtestes Land im europäischen Vergleich ist. Femizide führen direkt zur Hexenverbrennung um ca. 1550. Viele Belege weisen darauf hin, dass die Verfahren zur Unterdrückung von Aufständen in der Bevölkerung gedacht und nicht einfach Effekte von Massenhysterien waren. Dann schwenken wir auf die positive Seite unseres Jahres um.
Wir geben euch eine Führung durch unsere Kunstgalerie (Briefmarken, Postkarten Memorials und mehr), zeigen Einblicke in ein Haecksen-Geekend und wie wir unsere 100 neuen von 292 Haecksen insgesamt integrieren und aktivieren.
Außerdem verraten wir euch, in welchen Chaos-nahen Gruppen sich Haecksen-Gruppen befinden und was sie dort in 2019 gemacht haben. Zusätzlich dazu haben sich Haecksen dezentral zu den Themen Klimawandel und die Effekte von Bias in Trainigsdatensätzen zusammengeschlossen.
Wir schließen mit der Vorstellung von NIFTI http://nifti.org als der neue zentrale Knotenpunkt der Gemeinschaft aller FNIT-Gruppen mit Interesse an Technik.
Und wir werden dabei unser 30jähriges Jubiläum feiern.
A meeting of SSG devs
A followup meeting to the first one which was on 28/12/19
Gathering of people that use microG on their phone (or plan to do so)
Let us chat about microG, your usecase, issues when using it or whatever else is on your mind about it.
I was diagnosed with ADHD just two years ago. I want to share what I learned so far and provide a space to exchange stories, tools, strategies and support.
Über kollektives Entscheiden und Handeln
Im Gespräch und Aktion - Ein ErfahrungsaustauschModeration Karolina IwaMit ...*Sebastian vom Leadershipfestival* Uwe von Premium Cola Kollektiv* Julian vom Kollektiv Monis Rache* Anne vom Schöner Hausen Hausprojekt* Max vom Kollektiv Mensch Meier Gemeinsam sind wir mehr! Über kollektives Entscheiden und Handeln. Was brauchen wir um in Kollektiven in Aktion zu treten? Welche Strukturen und Prozesse können uns unterstützen gemeinsam die Welt (um) zu gestalten?Karolina Iwa und Sebastian Daniel Mall beschäftigen sich als das Leadership Festival- Kollektivs mit Ansätzen wie Ko-Kreation, der Theory U und zeitgemäßen Theories of Change. Sie sind Teil einer globalen Bewegung von Aktions-Forschern.Leadership Festival @ Roter Salon @ 36c3
A short introduction into Isomer and the Hackerfleet Operating System
A quick overview over Isomer - Hackerfleet's application framework for decentralized collaboration and science - and its first implemented project, the Hackerfleet Operating System for opensource-loving and sailing nerds.Since we prepared working Docker images, there might be a quick hands-on tutorial/workshop thingy after the lecture.
13:45
Some Initiatives are trying to provide internet access and VoIP dial-out in a user-owned (Commons Economy) or completely open infrastructure. We will present the state of affairs and invite to a discussion on the possible perspectives.
How to use modern web technologies to build a synthesizer (at the Social Dist0rtion Protocol assembly!)
We're gonna talk about building a synthesizer in WASM and C++. I'll be running you through the code.See the project here: https://events.ccc.de/congress/2019/wiki/index.php/Projects:WASM_SYNTHThis presentation is gonna happen at the Social Dist0rtion Protocol assembly and not on the CDC mainstage!Simply come to the back of the CDC. See you!
13:50
Wir müssen jetzt entscheiden, in welcher digitalen Welt wir leben wollen.
Im Bereich des Datenschutzes und der Informationsfreiheit werden schwer umkehrbare Weichenstellungen vorgenommen, die weitreichende Konsequenzen für unsere Zukunft haben.
Als Bundesdatenschutzbeauftragter setze ich mich mit der Durchsetzung der Datenschutz-Grundverordnung, der Regulierung von Verbraucher-Scoring und -Profiling und der Weiterentwicklung des europäischen Datenschutzrechts auseinander.
Besonders beschäftigen mich dabei auch die Debatten um digitale Überwachung und massiv ausgeweitete Befugnisse der Sicherheitsbehörden.
Der Talk wird eine wilde Fahrt, vorbei an umfallenden Rollern, etwas Kunst mit Sharing-Daten, einer Shoppingtour aus Recherchegründen auf asiatischen Großhandelsplattformen, Sicherheitslücken in Fahrradschlössern, welche einen deutschen Bikesharer dazu bringen, seine 6000 Räder weltweit wieder einzusammeln, der Analyse von risikokapitalgetriebenen Sharingsystemen bis hin zum Gegenentwurf: Wie angewandte Lobbyarbeit für mehr offene Mobilitätsdaten aussieht. Und wie man es selbst in die Hand nehmen kann.
Der Markt der Mobilitätsangebote ist in den letzten Jahren immer schneller immer größer geworden.
Von einfachen Bikesharing-Rädern über E-Bikes, Lastenrädern hin zu Scootern bekommen wir in Großstädten immer mehr Möglichkeiten, ohne eigenes Gefährt trotzdem mobil zu sein.
Aber warum nur in Großstädten? Wie nachhaltig ist das? Warum brauche ich immer noch 20 Apps für jede Stadt? Wie sehen diese Sharingsysteme eigentlich technisch aus? Was passiert mit den Daten und was lässt sich mit ihnen anfangen? Und warum sollten wir Mobilität eigentlich risikokapitalgetriebenen Technologieunternehmen überlassen?
Daher bauen wir ein Open Source Bikesharingsystem: nicht profitorientiert und offen für alle, erprobt auf dem CCCamp19.
Aadhaar is India's national biometric identity database, with over one billion records comprising fingerprints, iris scans and basic demographic information. It is presented as identity technology, allowing an individual to identify themselves, but also as an identification technology, allowing the state to see an individual, identify fraudulent welfare beneficiaries, and thus realise savings. These claims are not complementary. They are in fact contradictory, compromising each other. If one must be true, the other must somehow be false, and this is the reality of Aadhaar.
This talk will demonstrate how Aadhaar's attempt to be a cure for all kinds of ailments has in fact resulted in large scale exclusion and fraud. We will look at a series of design assumptions in Aadhaar's architecture, the gaps in them, and then examples of how these gaps were exploited, from public news reports.
Aadhaar is often touted as a revolutionary technology that has simultaneously given identity to billions and realised substantial savings from fraud for the government. These utopian visions are finding buyers around the world. Jamaica, Morocco and Kenya have all adopted projects inspired by Aadhaar, and more countries are following suit.
Unfortunately, Aadhaar is not magic, and there is now an urgent need for a sober understanding to be taken worldwide.
The Kaarana project began in 2017 as a collaboration between programmers and lawyers, to document architectural assumptions and their impact on human rights. The project's findings were presented as evidence to the Supreme Court of India in 2018, and are acknowledged in a scathing dissent by Justice Chandrachud (September 2018). This dissent was in turn cited by the Supreme Court of Jamaica to shut down a biometric identity program in that country (April 2019). In September 2019, Kaarana member Anand Venkatanarayanan also appeared as a witness in the Supreme Court of Kenya in a petition against Huduma Namba, the Kenyan biometric identity program.
We hope that this presentation at CCC will help public interest technologists from around the world prepare for a critical examination of similar programs in their countries.
14:00
Während Marketingabteilungen mit Buzzwords wie "KI", "IoT" und "Blockchain" um sich werfen, schütteln die meisten hier den Kopf. Und womit? Mit Recht. Vielen Anwender*innen und politischen Entscheidungsträger*innen fehlt es schlicht an technischer Kompetenz, um Probleme wie Stalkerware, politische Einflussnahme durch soziale Medien und Algorithmen(ethik) im Kern zu begreifen.
Aber wie können wir die Erfahrungen und das Wissen in dieses Draußen vermitteln, um den Menschen eine Chance zu geben, nicht bei jeder kleinsten Gelegenheit auf die Dummschwätzer reinzufallen? Wie können wir positiv Einfluss nehmen auf die Gesellschaft, damit informierte Entscheidungen überhaupt möglich sind? Wie kriegen wir vermittelt, was technisch bereits alles möglich ist und was (noch) nicht?
In vier Jahren PrivacyWeek haben wir die Themenbreite der "Digitalisierung" (BINGO!) mehrfach durchgearbeitet und gemeinsam mit den Vortragenden kommen wir immer wieder zum selben Schluss: Es braucht mehr Aufklärung und technische Kompetenz in der Bevölkerung, um die Probleme, die die weltweite Vernetzung mit sich bringt, überhaupt zu begreifen und ihnen begegnen zu können. Und letztlich bleibt die Frage, wo wollen wir als CCC letztlich hin? Wie können wir einen Informationstransfer forcieren, der über einige im eigenen Saft kochenden Initiativen hinausgehnt? Und wollen wir das überhaupt?
Eine Zusammenstellung der inhaltlichen Learnings von vier Jahren PrivacyWeek.
DLF-Podcast: Computer und Kommunikation
DLF-Podcast: Computer und Kommunikation
A meetup for Fairphoners and an occasion to see the modular Fairphone models
[[File:Fairphone.svg|thumb]]This is a meeting slot for all Fairphoners and for those who would like to know more about it.What's a Fairphone? It's a smartphone that does things a little differently than the rest of the industry. Yours to open, yours to keep.Check out [https://www.fairphone.com/en/story/?ref=header Fairphone's philosophy here!]We are going to look at the Fairphones 1 (2013), Fairphone 2 (2015) and Fairphone 3 (2019), disassemble and reassemble them, discuss pros and cons and much more.
First aid lesson for kinky people
'''Important:''' In the previous years, we regularly had way too many people trying to get in (rooms are objects of finite size), with waiting lines all across the hallway. This year, we want to avoid the crowd control issues that come with such scenarios. That's why you now need to pre-register for the workshop at https://ticket.kinkygeeks.de. Our website will give you a free ticket, which you need to provide at the workshop door to gain access.First Aid is good, useful and quite generic. Let's close the gap between the overall topic and the kinky specifics.During the workshop we will not skip the thought, that something might go wrong. Instead, we talk about how to handle these situations.Please note, that the workshop is in german language only.Erste Hilfe ist gut, nützlich und ziemlich allgemein. Lasst uns über die Dinge zwischen dem Allgemeinen und den Kinky Besonderheiten sprechen.Dabei weichen wir dem Gedanken nicht aus, dass mal etwas schiefgehen kann, sondern überlegen uns, wie wir mit solchen Situationen umgehen können.
General Angel meeting day 4 / Teardown info
Last time to get the T-Shirt hour count live.And lots of info on teardown. And a surprise.
I love to hear music. And I love to hear what it sounds like when two tracks start singing together, when they like each other. It's their way of making babies. Immediately after a first kiss between their parents, these children come to life on a cosy dance floor, surrounded by a warm and friendly twilight. Sometimes protected by concrete in the urban jungle. Sometimes hiding behind trees in the deep forests of mother earth.
we meet to talk about experiences in self-organised (telegram) groups in different cities on the topic of freifahren aka being the special guest in public transports.
- several people of 1komona I guess
Calling all amateur translators of fiction films, documentaries, talks and citizen video-journalist clips. Come by and share your experiences. Perhaps we still have time to organise a little Aegisub workshop for absolute beginners.
A POW WOW is a meeting of Indian chiefs to discuss politics in broken English as per the extremely awful Hollywood Westerns of the 1950s and 60s. Any resemblance with how pre-colonial peoples actually spoke at any point in time is purely coincidental.
we explain what c3sustainability orga group does and how to become involved
anyone with interest in making ccc events more sustainable, has time and energy to volunteer before and during the events is welcome to join our team :-)
Was der Titel sagt: in diesem Podcast kommen Menschen zu Wort die das aller erste Mal auf dem Chaos Communication Congress sind!
In diesem Podcast möchte MacSnider mit Menschen sprechen die das erste Mal auf dem Congress sind über ihre Erwartungen und Erfahrungen, wie sie zum Congress gekommen sind und fragt natürlich auch Leute die das zweite Mal dabei sind wie es war. Diese Podcastrunde findet schon seit ein paar Jahren statt und dabei finden sich auch immer ein paar alte CCC-Hasen ein!
Musikerin Silvia Seitz präsentiert ihre CD „Absolute Sicherheit? - Gesänge zur Stärkung der digitalen Kampfmoral“
Über das digitale Zeitalter ist viel geschrieben und noch mehr gesagt worden. Lange Texte bejubeln die Segnungen des Internets oder beschwören die Überwachungsapokalypse herauf. Das mag alles stimmen, aber muss es dabei immer so steif zugehen? Vielleicht steuern wir wirklich auf den großen Knall zu, aber spätestens dann brauchen wir Lieder zur Stärkung der Kampfmoral. Silvia Seitz hat sich dieses Problems angenommen, es so lange besungen, bis es sich hinten reimte und Dieter Markmann bewarf es so lange mit Tönen, bis sich das geneigte Auditorium sagt: „Wenn die Revolution so klingt, will ich gern dabei sein.“ (J. Selzer)Silvia Seitz wird live ihre Songs präsentieren.
an invitation to join c3sus orga team
anyone with interest in making ccc events more sustainable, has time and energy to volunteer before and during the events is welcome to join our team :-)
Trickfilme selber machen, make your own stop-motions
TRICKMISCH.de und TRIXMIX.tv sind wieder auf dem Congress, um mit Euch Trickfilme und Animationssequenzen digital am Rechner oder analog am Leuchttisch zu erstellen. Kommt vorbei, zeichnet und animiert Eure eigenen Sequenzen oder wählt Material und Figuren aus unserer umfangreichen Sammlung aus!Es besteht keine Altersbeschränkung und alles was ihr wissen müsst zeigen und erklären wir Euch.English TextTRICKMISCH.de and TRIXMIX.tv will be at the Congress again to create stop-motions and animation-sequences with you. Digitally on the computer or analogue at the lighttable. Come along!There is no age limit and everything you need to know will be shown and explained.
Wer spielt mit eine Runde Schach, oder die Kartenspiele Wizard oder Halt mal kurz?
Eine kleine Spielrunde. Mit Schach, Halt mal kurz oder Wizard.Halt mal kurz ist ein lustiges Kartenspiel, bei dem man Nazis auf den Kopf hauen darf, Wizard ein spannendes Kartenspiel für angehende Zauberer.Für Kinder und Erwachsene!
Peacefully blocking coal infrastructure – a tutorial
This discussion round will give a short overview over Ende Gelände, peaceful non-violent non-damaging direct actions in which coal infrastructure (coal mines, coal rails) is blocked for one day.We will touch on the following points:* What is the point of Ende Gelände?* What are legal repercussions of joining a peaceful mass event of civil disobedience?* Which strategies are used in actions by Ende Gelände?* What is the action concensus of Ende Gelände?* Practical exercises
We explain how to run a do-ocracy and the lessons we learned from 6 years of hacking our own community.
We explain how to run a do-ocracy and the lessons we learned from 6 years of hacking our own community.* How do you solve internal conflict?* How do you stop people from exploiting loopholes in the rules of your community?* How do you create a culture and shared values?* How do you keep directors from burning out?* How do give people creative freedom?'''History'''Hackerspace.Gent was on the brink of collapse because of internal conflict. Instead of giving up, we decided to hack the hackerspace itself; find a system where internal conflict actually gets solved. We did an number of workshops to figure out how to do this, we wrote everything down, and got to work. Six years later, the disorganized workshop notes turned into an actual booklet: the hackerspace blueprint. We hope you can use this to solve issues in your organization.
We choose your partner at random and tape you together at the wrist.
This workshop starts at the origasmi assembly in outer komona. After being taped together you will continue the rest of the day being codependent. The marriage can be broken off at any time by removing the tape.
14:05
I would like to share my work on reducing the energy consumption of PoW without sacrificing security. My new type of algorithm is called PoLW, inspired by the recent work of Itay, Alexander, and Ittay. For a practical system where mining is profitable, PoLW might actually improve network security.
14:15
The current social media situation is catastrophic. A single megacorporation controls the entire digital life of large parts of the world's population. Together with the rapidly improving methods for processing this data, a power that not only concerns experts is being bundled here. And Facebook's monopoly secures itself. On the one hand, users cannot leave Facebook(/ Instagram/WhatsApp) without being cut off from the social life of their friends. On the other hand, alternatives fail because they can't reach a critical mass. It seems impossible that a single application will ever replace Facebook. The freedom of the Internet is fundamentally threatened. Breaking the power of Facebook is probably one of the greatest challenges of our time. And in order to solve this task, we did come up with a detailed concept that we want to present to the public for the first time at 36c3.
SNAC - Social Network Application Cluster - is the name of the protocol used to standardise data exchange between different social media applications. Just as email protocols enable users to choose their provider freely, this protocol should also enable greater diversity in this area. It is easy to see that a single application isn't able to satisfy the needs of every single user. With SNAC we enable a decentralized structure, where each user can choose his server, but also his client application, from a broad spectrum. By developing our pilot application Open Source, we make it easy for other developers to integrate their own applications into the network.
But the decentralized Open Source dream alone is not enough to revolutionize the social media world. In order for the new applications emerging in SNAC to be able to run, an appropriate economic environment is needed to cover the operating costs. If the user accesses many different servers while surfing through the decentralized network, the question arises who is responsible for the access costs caused. There is a lack of a corresponding micropayment service with which it is possible to pay very small amounts easy and securely. At first glance, this seems like a project of its own, but it is closely linked to the operation of a decentralised social network. And there are several advantages emerging by linking social networks with a micropayment system. For example, users can donate a few cents to the creators of content they value, which then adds up to a fair reward for the creators. And this is done directly, independently and without forced ads for the users. But the mental alarm bell of data security rightly rings here when one tries to link financial and private communication data. Therefore, it is all the more important to hand over data sovereignty to the user when planning the protocols and to leave the server operators only the task for which they are fairly paid - the operation of the servers.
We are currently putting this concept into protocols that enable secure transactions and protect the user's data. The aim is to create an environment where everyone has the chance to honestly and transparently pay the costs they incur instead of filling the pockets of corporations with their data.
Our project is quite daring, that is clear to us. And yet we are sure that this is exactly what we want to do in the coming years. Because there is a chance that we will find 15 crazy people who want to develop this utopia together with us. There's a chance we'll find 50,000 people supporting us with an average of 1€ a month to feed our 15 crazy developers. There's a chance that we can create an environment where many small subnets with cool innovative applications can trigger a movement that's going to be so big it will overcome Facebook's monopoly. And above all, we can create an environment where technology benefits people again, rather than the other way around.
If 36c3 isn't the right place for a project like this, what else is? We will give a talk in which we will discuss a better world and the difficulties that lie on the path there. We want to encourage listeners to think and participate, but above all we are also there to initiate a discussion. We want to hear all the concerns and mistakes that we overlook and we need the expertise from all the different angles that only the CCC brings together.
Hi! We're offeringa bit of a different talk, where we want to present a project that might bring a renaissance to the independence and freedom of the internet. We want to dream together of a better world, but then also talk about the concrete steps that need to be done to get there.
14:30
I will explore the ways in which music is influenced by making and hacking, including a whistle-stop tour of some key points in music hacking history.
This starts with 1940s Musique Concrete and Daphne Oram’s work on early electronic music at the BBC, and blossoms into the strange and wonderful projects coming out of the modern music hacker scenes in London and Berlin, including a pipe organ made of Furbies, a sound art marble run, robotic music machines, gesture controlled moon cellos, and singing circuit sculptures. I'll also be sharing some of own work, plus my favourite new ways to make embedded instruments, including plenty of amazing Open Source hardware and software.
Ausgehend von den behördlichen Messnetz für Stickoxide soll der Aufbau einer preisgünstigen Open Source Messstation für Stickstoffdioxid, inklusive Kalibrierung und der behandlung von Störenden einflüssen behandelt werden. Zusätzlich soll eine Webanwendung vorgestellt werden welche die Daten aus einem Messnetz der NO2-Messstationen sammelt, auf Karten visualisiert und somit dem Citizen Science Ansatz Rechnung trägt.
Spätestens seit dem Abgasskandal (Dieselgate) und den daraus resultierenden Fahrverboten für Dieselfahrzeuge ist eine öffentliche Debatte um Stickoxide (insbesondere Stickstoffdioxid (NO2)) als Luftschadstoff entstanden. Die Stickstoffdioxidbelastung in Städten und Gemeinden verunsichert viele Bürgerinnen und Bürger, denn einerseits ist der Schadstoff nicht wahrnehmbar und andererseits kann Stickstoffdioxid eine erhebliche Gefahr für die Gesundheit darstellen. In Deutschland existieren derzeit nur ca. 350 offizielle Messstationen für Stickstoffdioxid, so dass ortsspezifische oder sogar flächendeckende Angaben zur Luftschadstoffbelastung nicht möglich sind. Ein flächendeckendes Messnetz ist laut Gesetz auch nicht vorgesehen. Folglich können politische oder gerichtlich durchgesetzte Maßnahmen zur Verbesserung der Luftqualität auch nur dort stattfinden, wo Messwerte existieren. Da es gegenwärtig keine Bestrebungen gibt das öffentliche Netz an Messstationen auszuweiten, möchten wir mit diesem Vortrag einen Vorstoß unternehmen, die technischen Grundlagen zur Errichtung eines bürgerschaftlichen Messnetzes zu eruieren und für diesen Zweck konkrete Bauanleitungen und Informationsdienste vorstellen. Im Gegensatz zu den mehrere tausend Euro teuren und eignungsgeprüften Messstationen zeigen wir eine hinreichend akkurate und preisgünstige (<50 Euro) Alternative auf.
In dem Vortrag erklären wir euch zunächst wie Stickstoffdioxid durch offizielle Stellen gemessen wird und wie die Grenzwerte definiert sind. Anhand des Status Quo der Datenerhebung erläutern wir bestehende Defizite und Potentiale für eine genauere und flächendeckendere Messung von Luftschadstoffen wie Stickstoffdioxid.
Im zweiten Teil des Vortrags beschreiben wir den Aufbau einer preisgünstigen Open Source Messstation für Stickstoffdioxid. Dabei werden Kriterien für die Auswahl von Komponenten und die Durchführung einer Vergleichsuntersuchung mit einem eignungsgeprüften Messgerät vorgestellt. Außerdem werden Kalibrierungsmethoden und die Behandlung von störenden Einflüssen durch Luftfeuchtigkeit und Temperaturschwankungen thematisiert.
Im dritten Teil des Vortrags wird eine Web-Anwendung vorgestellt, die Daten aus einem Messnetz der NO2-Messstationen sammelt, auf Karten visualisiert und somit dem Citizen Science Ansatz Rechnung trägt. Dabei diskutieren wir auch Vor- und Nachteile unterschiedlicher kartenbasierten Darstellungsformen von Luftschadstoffmesswerten.
Wir senden "Forschung Aktuell" live vom 36c3
Wir senden "Forschung Aktuell" live vom 36c3
Hast du dich schonmal gefragt, was Bambuszahnbürsten überhaupt bringen, wenn sie über die ganze Welt zu uns fliegen?
Was macht Bambus aus? Ist er auch so Hygienisch wie Plastik? Und viele weiter Fragen möchte ich in meinen Talk mit euch klären.
Deep Learning and AI is one of the current hot topics. Countless people either talk about either how this infallible technology will solve all our problems or how useless and dangerous it is. In this talk Felix Schneider, a research associate who works in the deep learning field, will talk about how this stuff actually works, what it's really good for and about its limits and dangers. Afterwards there will be time to discuss various aspects of this technology, be it on a technical or societal level.
Continuous Integration was a big buzzword with software projects already years ago and it is standard today. In projects such as Pocket Science Lab we took the idea of Development Operations a step further and apply these concepts to hardware. The increased speed of development and the possibility to produce different prototypes with a click almost feels as if we deploy software automatically. What would happen if the industry would be able to change in the same way? How could we shorten the time from prototype to production and market? What is missing to build complex and really big machines? How can standardization and machine readable requirements documents help us to create sustainable hardware and solve the problems of our time? These are some of the questions we will explore in this session based on our research within the EU Horizon 2020 project on collaborative product creation.
Sammeln und evaluieren von Vorschlägen für konkretes individuelles Handeln mit dem Ziel der Veröffentlichung
Ever tried. Ever failed. No matter. Try again. Fail again. Fail better.
Scheitern als Chance"Ever tried. Ever failed. No matter. Try again. Fail again. Fail better." Samuel BeckettAus Fehlern wird man klug, heißt es. Doch in Wahrheit schätzt niemand Situationen, in denen die Dinge schiefgehen und man auf die Nase fällt. Niemand gesteht sich gern ein, eine falsche Entscheidung getroffen zu haben, an einer Aufgabe gescheitert zu sein oder gar ein ganzes Projekt in den Sand gesetzt zu haben. Ein Ziel zu verfehlen ist ärgerlich und schmerzhaft. Dennoch sind solche Erfahrungen unausweichlich – und oft lehrreich. Nicht selten führen erst viele Fehlschüsse zu großen Entdeckungen. Aber: Damit wir an Niederlagen wachsen können, müssen wir richtig mit ihnen umgehen. Wir brauchen ein neues Bewusstsein für unsere Schwächen.Marco Weicholdt von FuckUp Night Leipzigund Jakob Turtur vom Jonny Knüppel im Gespräch mit Zarah Roth über Gelegenheiten, verpasste Chancen, Risiken, falsche und richtige Entscheidungen, Lerneffekte und einer lausigen Fehlerkultur
15:00
Daily Meetup for A/V Angels
Daily A/V Angel Meeting. More information can be obtained from our news in the angel system
Haskell is the language of choice of our assembly. It is also weird. In this session, experience a quick guided tour through some of Haskell's features.
Target audience: People who have some familiarity with programming and who might have heard of Haskell, but don't know any Haskell.
- Iblech
- MatthiasHu
- MichaelStruwe
The c3lingo team meets twice a day. Join us to help us doing live interpretations of all talks.
This meeting is used for the distribution of shifts for the Translation team.
Researched for next car, ended up with velomobile.
Individual mobilityWhy electric cars are not the solution.Why E-Bike? Experiences with an E-Bike.(from the perspective of an unathletic lazy long term car driver)What is a Velomobile?Why Velomobile? Experiences with a Velomobile.Other vehicles similar to velomobiles.The talk is rather short, so we have time for a Q&A session.The Q&A shall be focussed on (mostly) human-powered vehicles (not: cars, not: public transport).Talk / Slides will be in English.Questions/Answers may be in English or German.
Workshop for improving rationality skills
Telegram group: https://t.me/joinchat/AQyfUhHcTKJjmDm9h-s2EQEtherPad: https://pad.riseup.net/p/lwccc
We want to explore the perspectives and plan future action on internet access and VoIP dial-out in a user-owned (Commons Economy) or completely open infrastructure. See the related talk for an introduction to the state of affairs.
The Tinkerings now yearly rallying to start open sourcing enough (architectural) technology to start to build our own congress building. #0c3
The Tinkering To Come's now yearly rallying to start open sourcing enough (architectural) technology to start to build our own congress building. #0c3Das nun jährliche Meetup für alle, die gerne anfangen möchten genug (Architektur-)Technologie zu opensourcen um unseren eigenen Kongress zu bauen.https://basteibastelei.wordpress.com/2018/12/29/the-futurology-of-the-congress-a-story/
We present cool ideas and projects to each other
Ähnlich wie bei den Lightningtalks auf den Hauptbühnen geht es darum, innerhalb von etwa 5min ein Thema, eine Idee oder ein Projekt zu präsentieren. Wir machen das in kleinerer, gemütlicherer Runde.Similar to the lightningtalks on the main stage this is an opportunity to present a topic of your choice in about 5min.
When is your time to breathe? Inhale. What makes you breathless? Exhale. Stop. Inhale. More. And more. What do you feel? Let go. Overcome your limits. Breathe.
15:10
Mit immer neuen Gesetzen gewinnt die Exekutive in Deutschland an Macht und Ressourcen. Die öffentliche Kontrolle von Ministerien und Geheimdienste gerät ins Hintertreffen. Wir sprechen darüber, warum dank Anfragen und Klagen nach dem Informationsfreiheitsfreiheitsgesetz in diesem Jahr der Kampf noch nicht verloren ist, wie wir gegen den BND vor Gericht gewonnen haben und wann das Zensurheberrecht endlich abgeschafft wird. Plus: Das Beste aus 100.000 Anfragen über FragDenStaat in diesem Jahr.
Error 451
Weltweit verlaufen die Entwicklungstrends des Markthochlaufs der Elektromobilität und die Weiterentwicklung relevanter Batteriefertigungs- und Recyclingtechnologien hoch dynamisch. Maßgebliche Faktoren für die Entstehung eines industriellen Batterierecycling-Marktes nehmen dabei erst langsam Gestalt an, der regulatorische Rahmen ist noch modellierbar. Zugleich ist der Technologiepfad Elektromobilität als eingeschlagen zu begreifen - die Notwendigkeit einer Verkehrswende zur Reduzierung des CO2-Ausstoßes begründet Umbrüche in der Automobilbranche, die mittelfristig zu steigenden Verkehrsanteilen von Fahrzeugen mit rein elektrischem oder hybridem Antrieb an den PKW-Neuzulassungen führen werden. Damit steigt der Bedarf an geeigneten Traktionsbatterien und die Nachfrage nach den zu ihrer Herstellung erforderlichen, endlichen Rohstoffen.
Im Energiesektor stellt der Beschluss zum Kohleausstieg 2038 eine Zäsur dar: Mit der Zielstellung, die Lausitz – bislang Braunkohlerevier - als Energieregion zu erhalten und die Angleichung der Lebensverhältnisse in der strukturschwachen Region zu schaffen, gehen wir der Frage nach, ob durch die Errichtung einer Recyclingstrecke für Traktionsbatterien der Elektro-Mobilität ein Beitrag zur Gestaltung einer „Energieregion der Zukunft“ geleistet werden kann. Dies einerseits im Hinblick auf die Schaffung von Beschäftigung, um die im Kontext des Braunkohleausstiegs drohenden Verluste von Industriearbeitsplätzen zu kompensieren. Andererseits unter Maßgabe der Etablierung einer nachhaltigen, regional verankerten Kreislaufwirtschaft.
Um nachhaltige Entwicklungschancen für die Lausitz im Zuge des Aufschwungs der Elektro-Mobilität abzuleiten, werden
• die endogenen Potentiale der Region analysiert,
• das zukünftige Altbatterie-Aufkommen und der technologische Entwicklungsstand des Li-Io-Batterierecycling aufgezeigt sowie
• die regulatorischen Rahmenbedingungen auf den Prüfstand gestellt.
Wir zeigen die offenen Flanken der Lithium-Ionen-„Batterierevolution“ auf, indem wir auch ihre Risiken diskutieren: Das Recycling der Lithium-Ionen-Batterien stellt sich demnach zukünftig als dringliche Notwendigkeit dar, denn
• die zu ihrer Herstellung erforderlichen Rohstoffe sind endlich,
• sie werden zum Teil unter Menschen unwürdigen Arbeitsbedingungen und mit erheblichen ökologischen Folgeschäden abgebaut,
• es ist eine sichere und verantwortungsvolle Entsorgung bzw. Wiederverwertung der Batterien, die hochgiftige Substanzen enthalten, zu gewährleisten.
Schließlich werden Handlungsempfehlungen für ein integriertes Entwicklungskonzept formuliert, die auf die Etablierung einer Kreislaufwirtschaft und Bottom-up Partizipation der Bevölkerung abstellen. Sie vermitteln Ideen, wie sich die Ansiedlung einer Zukunftstechnologie – wie des industriellen Batterierecycling - in „Regionen mit hohen Zukunftsrisiken“ unterstützen lässt und wie sich Strukturwandel so gestalten lässt, dass ökologische und soziale nicht gegen ökonomische Interessen ausgespielt werden.
15:15
How does a full peer-to-peer stack change how we organise and present user interfaces? If the PC was a 1970s desk for single-player computing, what's the right way to think of the way we actually use networks: communally? Matilde Park presents some findings from working on Urbit, an open source project tackling a peer-to-peer internet from scratch.
When we talk about decentralisation as a movement, we often focus on the principles of cypherpunks and hackers; we describe it as a movement away from central command structures with imbalanced power dynamics; freely and totally owning your hardware, sharing what you know with others, constructing the world in a direct and transparent way.
However, I think it has even more power than that. I think it can completely change how we use computers and where we fit them into our lives. I’d like to posit that decentralisation necessitates rethinking a lot of the ways people interact with computers -- and that the interfaces we use everyday are themselves relics of a creeping, inevitable centralisation in place since the 1970s.
As I work on Urbit as a userspace developer, I've found that we've come to some conclusions about how to discuss peer-to-peer operating systems — in ways that are agnostic to any stack that designs itself for seamless transitions between participating in peer swarms, and everyday, individual computing.
15:20
Galina Balashova was the main architect and designer for the soviet space programme. She designed the interieurs and visual identity of spacecrafts such as the Soyuz, Buran, and Mir.
»Space stations are not only technical structures but architecture built amidst zero gravity.«
Galina Balashova (b. 1931) is a self-described "architect-engineer" who spent almost 30 years working in the Soviet Space Programme. She designed the ergonomics, the colours & style and the typography of most soviet spacecrafts, including the Soyuz, the Salyut space stations, the Buran shuttle and the Mir space station.
Her pioneering work in the field of zero-gravity architecture is still referenced today in the ISS and other spacecrafts.
15:30
After the successful 'Behaviour Changing meetup' I offer to talk about some really sophisticated methods from a workshop I attended this year on how to change your behaviour effectively.
In March 2019 i attended the mainline workshop of the center for applied rationality. I'm happy to help you understand what their workshops offer and give you a speedrun through their methods on how to be more productive and change your behaviour effectively. Here a text from their website www.rationality.org
CFAR exists to try to make headway in this domain—the domain of understanding how human cognition already works, in practice, such that we can then start the process of making useful changes, such that we will be better positioned to solve the problems that really matter. We are neither about pure research nor pure execution, but about applied rationality—the middle ground where the rubber hits the road, where one’s models meet reality, and where one’s ideas and plans either pay off (or they don’t). By looking in-depth at individual case studies, advances in cogsci research, and the data and insights from our thousand-plus workshop alumni, we’re slowly building a robust set of tools for truth-seeking, introspection, self-improvement, and navigating intellectual disagreement—and we’re turning that toolkit on itself with each iteration, to try to catch our own flawed assumptions and uncover our own blindspots and mistakes.
Offene Bühne für Wissenstransfer / Bandenbildung / AktionenOhne Anleitung und Moderation. Wir sind da. Einfach vorbei kommen und machen.Für alle Menschen, die Lust haben vorbei zu kommen, sich zu vernetzen und zu überlegen wie wir und weitere interessierte Menschen zusammen oder einzeln weiter machen können. Willkommen. Zusammen sind wir mehr.
16:00
Lithium-Ion batteries are everywhere and are here to stay. They're wonderful to bring mechanical and electronic creations to life, but can also be dangerous if one is not careful with them. Many come with dedicated protection features or at least claim to do so, while others rely on different features to make them safe. Due to how the materials are sourced and which materials are used the environmental and geopolitical factor of them also can’t be neglected.
This talk is for you if you're someone tinkering with electronics or if you're just curious and want to know more about the strange creatures batteries are.
This is an introduction and overview, covering the essentials of:
- Safety, or how to not burn your house down
- Chemistries and why some can perfectly cope at -40°C and others won't
- Failure is optional and why some just don't burn or explode
- The major do's and dont's
- Charging, Discharging and why is it empty it said 20% left
- Recycling and when you can and when you shouldn't reuse old batteries
- Ethics and politics
- What does the future hold?
Bewegte Emotionen im Rahmen vom Improtheater
Kommt gerne zu uns um gemeinsam ein freies und entspannten Einstieg ins Improtheater zubekommen.
Let’s discuss the power of habits and what it takes to change behaviour.
A free discussion about behavioural change and its methods (Cognitive behavioral therapy, motivational interviewing etc.), the power of habits and how to change them.I'd also like to discuss how healthy lifestyle changes can prevent diabetes type 2 and other chronic diseases.----We'll continue the discussion tomorrow (December 30). The slides will also follow on that day (December 30).P.S. The introduction to CFAR content will happen at the LessWrong Rationality Workshop :)
Pyra handheld
The Dragonbox Pyra handheld exists, will soon be mass produced, could possibly be used as a phone, and paints a brighter picture for a future of being able to purchase devices that already work, and are repairable. Small talk, Q/A, try it.Bonus: Ar from the Warsaw hackerspace will be bringing a Gemini - Cosmic communicator (keyboard phone) to show.
Your daily basic hacking learning lesson.
""WARNING: External room for the last session on day 4: Please come to Lecture Room M1.""'''---> README: There will be sessions from days 1 to 4. The daily session times will be announced in the evening before. <---'''We offer instructions for "Damn Vulnerable Web Application" ( http://www.dvwa.co.uk/ / https://github.com/ethicalhack3r/DVWA ) daily. At least for 2 to 4 people. Join us if you would like to learn about security gaps in web programming (e.g. bad passwords, SQL injection, cross-site requests forgery). You will learn how to hack systems and how to reset them afterwards. It's recommended to bring your own device (laptop) with an working ethernet port. We have a single Ethernet-to-USB adapter available for devices lacking an Ethernet port such as Apple Macbooks.'''-->LIESMICH: Es wird jeden Tag Sessions geben. Wann die täglichen Sessions genau starten, wird immer am Vorabend eingetragen. <---'''Wir bieten täglich „Damn Vulnerable Web Application“ ( http://www.dvwa.co.uk/ / https://github.com/ethicalhack3r/DVWA ) unter Anleitung an, für mindestens 2 bis 4 Personen. Inhaltlich geht es dabei um klassische Sicherheitslücken der Webprogrammierung (z.B. schlechte Passwörter, SQL-Injection, Cross-Site-Request-Forgery). Hier lernst du Systeme zu hacken und wiederherzustellen. Bringt am besten euren eigenen Computer mit einem funktionierenden Ethernet-Port mit. Wir haben einen Ethernet-zu-USB-Adapter, damit ihr auch Geräte ohne integrierten Ethernet-Anschluss (wie z.B. Apple Macbooks) nutzen könnt.
Write a simple kernel driver, debug and trace it remotely with gdb.
In this hands-on workshop, you have a chance to learn some cool tricks working with Linux kernel code. KGDB, the kernel debugger, allows you to debug a kernel running on a different architecture, remotely, just like you would debug a program running in userspace. A powerful trace infrastructure makes it easier to spot issues in time-sensitive systems, when setting a breakpoint is not an option.
Who's afraid of a planet of producers? Musical computation by necessity was once restricted to advanced laboratories. But electronic noise has come in cycles of democratization, liberation, and creative misuse.
A new wave of tools makes powerful sonic capabilities available in free and open source platforms for software and hardware. Here's an overview of the state of some of those tools. We'll focus in particular on VCV Rack, the software recreation of modular synthesizers, which is both open to developers and still provides a pathway for software and hardware makers to earn a living for their products. We'll try a brief hands-on to see how this makes modular synthesis concepts accessible, via free software on Mac/Windows/Linux. Then, we'll zoom out to the larger landscape of tools and how they could reshape music production and instrument making.
Rather than see technology alone as a faceless cultural force, these tools - and techno as genre - demonstrate the potential of participatory technology. The communities around them can become more powerful as they grow, rather than extractive or limited, sharing information and developing audiences and makers in parallel.
your favourite asthmatic from Mannheim, Germany!
What started with producing techno music a few years back has now come to the next step of evolution!
But not with focus on straight thundering techno - electro & breaks, sometimes house is what DJ Asthma is all about.
"Motto":
Sie rufen an - ich lege auf
Komonistas meeting
Paralelní Polis' mission is to bring alternatives and tools for preventing authoritarian tendencies in society. Hackatoshi’s Flying Circuit is an intervention of cypherpunks into both virtual and physical public space to concentrate inspiration and knowledge to address sick parts of the system and fix them with solutions resulting from privacy and decentralized principles.
Weekend-long hacking competition focused on privacy, individual freedom, decentralization and viable system exploits. Each track will have three winning teams awarded with prize money (cryptocurrency) & sw from the sponsors. Code submissions have to be open sourced.
Hackers Congress Paralelni Polis (HCPP) has been successful in gathering great minds and thinkers from the Cypherpunk and Cryptoanarchist space. Yet all of the topics and ideas discussed during the congress are only as good as they can be applied, performed or achieved. Hackatoshis's Flying Circuit should motivate hackers, makers and developers to take their tools and skills into practice. The key goal of the hackathon is to prototype new concepts that will help people to protect their digital identity or exploit existing systems that were built to constrain personal freedom.
16:10
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Was werden die nächsten Buzzwords sein und welche neuen Trends sind schon heute absehbar?
Wie immer wagen wir den IT-Security-Alptraum-Ausblick auf das Jahr 2020 und darüber hinaus. Denn was wir wirklich wissen wollen, ist ja schließlich: Wer hat sich letztes Jahr mit seiner AI gestritten? Und wie entwickelt sich das Berufsbild des Blockchain-Exorzisten weiter? Gibt es bald IT-Sicherheits-Wettervorhersagen im Fernsehen?
36C3 is run by teams of volunteers. In this event, they will provide some insight into the challenges they faced while building the GSM, DECT and IP networks, running video streams, or organizing ticket sales. All graphs will be pointing up and to the right.
16:20
16:45
Libre software translation
Talk concerning what are the things to consider when translating software or making a project available for translation?Come learn tricks, what considerations to make, and plan ahead in discussion afterwards.For developers, prospective translators and current contributors alike.
17:10
17:20
17:30
Verabschiedung und Details zum Abbau
18:00
OS/X.Y. is NSDOS and Aerodynamika, the co-founders of EightOS. In this set we will explore the
notion of non-equilibrium stability and variability in music in relation to movement. We are also
opening our process up for a jam session, so in case you want to contribute to our source code,
please, join the day before at M3.
puppetry
**There will be individual shows from 5 to 10 minutes for 1 spectator at a time of the following pieces:**
BLODEUWEDD (Blod-day-weth) Experience the story of a mystical woman made of flowers, told for you alone with handmade miniature puppets. Part of an ancient legend from Wales, Blodeuwedd is a tale of identity, hardship and free will.
With: Owain Griffiths, Hannah Morris
---
Dideldum: We are full of memories. Memories of sounds, songs, voices, faces, events, smells and people. Memories pile up, branch out and yet they belong together. All these memories define us, define who we were and who we actually are. But what happens when forgetting threatens us, when our everyday life suddenly seems alien to us, when our minds flutter away and we cannot think clearly anymore? What remains of us?
With: Eva-Maria Schneider
www.eva-mariaschneider.de
---
The Abyss: A small glimpse into an archive of fear and nightmares. Within their participative installations “Private Dreams & Public Nightmares” Jan Jedenak and Jonas Klinkenberg invite their audience to get in touch with different forms of fear and reflect on nightmares, their own fears and the fears within our society. During different experiments those things are documented. This Lambe, built by Jonas Klinkenberg, allows a glimpse into the archive of fear – with a small touch of Poe and Lovecraft and bits of an old radio feature. Open your eyes and dive into the depth of nightmares and get to know different perspectives on what scares us. Look into the abyss.
With: Jonas Klinkenberg, Jan Jedenak
---
Anasyrma Temple: Come, get rid of your sorrows, leave all your worries behind. Dive into the universe of Anasyrma Temple and be healed!
With: Dana Sinaida Ersing
18:15
Stagemanagement Feedback Gathering
This is a feedback session for the Stagemanagement Team. Optional for team members.
20:00
PETER KIRN fuels his love of techno and dancefloors with a deep background in experimental music and machines. He's released his own music on Detroit Underground, Snork Enterprises, Instruments of Discipline, and his imprint Establishment, as well as engaging collaborations from architecture and spatial sound to modern dance. As an organizer of open collaborative performance labs, he's worked with CTM, MUTEK.mx, STUK, and Nusasonic/WSK festivals. He writes and speaks about music making and creative technologies, including running the daily site CDM (cdm.link) and co-producing the MeeBlip synthesizer hardware line.
21:00
DJ Internet Offline
Ich bin jetzt bei SoundCloud - link in bio
23:00
irq7 is a so called "chiptune-artist" who spend a lot of time using old computer-hardware like Gameboys, Commodore-computers and other gadgets to produce a new kind of music.
Cheesy melody's and bumping beats are building dance-tracks, which are not only interesting for fans of retro-sounds.
The songs are somewhere between Electro, Breaks, Drum & Bass and oldschool Chiptunes.
He is playing regularly live-shows since 2006 at many locations supporting international acts (Vienna, New York, Cologne, Frankfurt...).
The first full length album was released in spring 2010 and called "Revenge of the Calm". It was produced one with just one Gameboy.
A few month later, the "It's not me EP" was released which contains cover-versions of his favorite songs coming from old computers like the Commodore-C64 and the Amiga.
In 2011 the "Girls & Gameboys EP" was released and well received. The latest release is from 2018 and called "Large Chiptune Collider" and distributed on audio-tape only.
Beside Gameboy-music, irq7 is focusing on tiny music-instruments and gadgets. All activities are under the umbrella-term "Noizebox",
and can be found at http://irq7.blogspot.com. "Noizebox" is not just the name of the blog - in fact it is a battery-powered speaker
build from various recycled electronic components. You can simple sit on the Noizebox and play with various electronic devices (e.g. Gameboy, Keyboards, Synth's etc.)
irq7 is also organizing a annual chiptune-festival in Nuremberg called "CHIP HITS THE FAN" featuring international Artist, Workshops and an Open-Stage.
00:00
Born and raised in Gera in Germany, Dana Ruh soon found her way to the capital city of Berlin. Since then, she ha been on a constantly evolving musical journey. In the early years, her sound was rooted in techno and landed most often on the label Brouqade Records, which she established in 2007. The label is still running too, and celebrated its 10th Year Birthday Celebration entitled 'Past/Present/Future' that emphatically encapsulated all that's great about the label.
Aside from Brouqade, Dana's music has also featured on the liked of Autoreply, Work Them Records, Howl and Underground Quality. It was Jus Ed's label where she released her stunning debut album. 'Naturally' in 2014, an LP that introduced Dana to a whole new audience and showcased her pure house sound with some distinctions. In 2017 she started her new Label 'Cave Recordings' that showcased her wide musical range mainly rooted in House with old school flavor.
When she isn't busy in the studio crafting textured tracks, Dana is a fine DJ who holds down resident duties at top Berlin space, Club der Visionaere. It is there that she lays down seductive tracks from the worlds of house and techno as well as gems in between. Aside from her beloved CDV, Dana has played in some of the globe's foremost house and techno nightclubs, often alongside some of the scene's prime movers and shakers.
Despite working in such an over saturated and competitive field, Dana Ruh manages to speak louder and more coherently that most, and for that reason she deserves all the love she gets.
02:00
03:00