summaryrefslogtreecommitdiffstats
path: root/testdata/ccc/schedule-32c3.ics
diff options
context:
space:
mode:
Diffstat (limited to 'testdata/ccc/schedule-32c3.ics')
-rw-r--r--testdata/ccc/schedule-32c3.ics2557
1 files changed, 2557 insertions, 0 deletions
diff --git a/testdata/ccc/schedule-32c3.ics b/testdata/ccc/schedule-32c3.ics
new file mode 100644
index 0000000..2a3076e
--- /dev/null
+++ b/testdata/ccc/schedule-32c3.ics
@@ -0,0 +1,2557 @@
+BEGIN:VCALENDAR
+PRODID;X-RICAL-TZSOURCE=TZINFO:-//com.denhaven2/NONSGML ri_cal gem//EN
+CALSCALE:GREGORIAN
+VERSION:2.0
+BEGIN:VTIMEZONE
+TZID;X-RICAL-TZSOURCE=TZINFO:Europe/Berlin
+BEGIN:STANDARD
+DTSTART:20151025T030000
+RDATE:20151025T030000
+TZOFFSETFROM:+0200
+TZOFFSETTO:+0100
+TZNAME:CET
+END:STANDARD
+END:VTIMEZONE
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T171500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T164500
+DTSTAMP;VALUE=DATE-TIME:20160105T142042Z
+UID:012b9dea-7d42-4428-acd4-4f84fa41e729@frab.cccv.de
+DESCRIPTION:During this lecture presentation\, Boaz Levin and Vera Tollma
+ nn\,\nco-founders of the Research Center for Proxy Politics\, will devel
+ op the proxy as a figure of thought by spinning and testing it in differ
+ ent\ncontexts.\n
+URL://events.ccc.de/congress/2015/Fahrplan/events/7570.html
+SUMMARY: Plunge into Proxy Politics - Vera Tollmann\, Boaz Levin
+ORGANIZER:32c3
+LOCATION:Hall 6
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T150000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T140000
+DTSTAMP;VALUE=DATE-TIME:20160104T233339Z
+UID:cc9ede64-bad5-4ed0-92a3-4fbaf54eadec@frab.cccv.de
+DESCRIPTION:The Fluxus movement came about in the early 1960ies and the t
+ alk will discuss its strenghts\, dead-ends and promises for the creation
+ of works and community in our digital environment. International\, tran
+ sdisciplinary\, non-institutional\, anti-art and playful. After several
+ years of research and new art productions\, Leo Findeisen and Markus Zim
+ mermann will present their findings. \n
+URL://events.ccc.de/congress/2015/Fahrplan/events/7421.html
+SUMMARY:"Fluxus cannot save the world." - leomagnet\, Markus Zimmermann
+ORGANIZER:32c3
+LOCATION:Hall 6
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T123000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T113000
+DTSTAMP;VALUE=DATE-TIME:20160108T134615Z
+UID:7504eeb1-1665-47fd-b21a-601d2641c41c@frab.cccv.de
+DESCRIPTION:News reports and political speeches are currently replete wit
+ h references to hacking and hacktivism\, i.e.\, politically motivated ha
+ cking. They often portray hackers and hacktivists negatively and put the
+ m onto the same level with\, for example\, terrorists. This talk is base
+ d on a PhD research project examining the perception of self-identified
+ hackers and hacktivists on these (in)securitising developments. It inves
+ tigates how hackers and hacktivists understand themselves and their acti
+ vities\, explores how they articulate the effects of this (in)securitisa
+ tion\, and outlines the ways they resist these processes.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7207.html
+SUMMARY:“I feel like a criminal and I have to be god at the same time” -
+ Leonie Maria Tanczer
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T123000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T113000
+DTSTAMP;VALUE=DATE-TIME:20160104T194530Z
+UID:72ad2630-b736-4d4c-8ea1-d982076426bc@frab.cccv.de
+DESCRIPTION:In der politischen Rede sind immer wieder Floskeln zu beobach
+ ten\, zum Teil gibt es Moden\, wie im Zusammenhang mit dem so genannten
+ No-Spy-Abkommen\, wo Handlungen wiederholt mit „bestem Wissen und Gewiss
+ en“ gerechtfertigt wurden. Auch das „volle/vollste Vertrauen“ der Kanzle
+ rin ist auffällig. Der Vortrag vertritt die Hypothese\, dass solche Phra
+ sen nicht zufällig sind\, dass sie eine Funktion besitzen. Es wird erläu
+ tert\, was mit ihnen erreicht werden soll. Es wird außerdem der Frage na
+ chgegangen\, wie Floskeln sich durch häufigen Gebrauch in ihrer Bedeutun
+ g verändern bzw. verselbständigen und gegen den Sprecher wenden können.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7150.html
+SUMMARY:„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik - Mar
+ tin Haase/maha\, Kai Biermann
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T123000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T113000
+DTSTAMP;VALUE=DATE-TIME:20151230T190329Z
+UID:3f61827f-8b17-47b4-a43c-e0dce6532cbe@frab.cccv.de
+DESCRIPTION: Embedded systems are omnipresent in our everyday life and
+ are becoming \n increasingly present in many computing and networked
+ environments. For example\,\n they are at the core of various Common
+ -Off-The-Shelf (COTS) devices such as\n printers\, video surveillance
+ systems\, home routers and virtually anything we \n informally call
+ electronics. The emerging phenomenon of the Internet-of-Things\n (IoT
+ ) will make them even more widespread and interconnected. Cisco famously
+ \n predicted that there will be 50 billion connected embedded devices
+ by 2020.\n Given those estimations\, the heterogeneity of technology
+ and application fields\,\n and the current threat landscape\, the se
+ curity of all those devices becomes of\n paramount importance. In add
+ ition to this\, manual security analysis does not\n scale. Therefore\
+ , novel\, scalable and automated approaches are needed.\n In this tal
+ k\, we present several methods that make *the large scale\n security
+ analyses of embedded devices* a feasible task. We implemented \n thos
+ e techniques in a scalable framework that we tested on real world data.
+ \n First\, we collected a large number of firmware images from Intern
+ et \n repositories and then performed simple static analysis. \n S
+ econd\, since embedded devices often expose web interfaces for \n rem
+ ote administration\, therefore we developed techniques for large scale \
+ n static and dynamic analysis of such interfaces. \n Finally\, ide
+ ntifying and classifying the firmware files\, as well as \n fingerpri
+ nting and identifying embedded devices is difficult\, especially \n a
+ t large scale. \n Using these techniques\, we were able to discover a
+ large number of new \n vulnerabilities in dozens of firmware package
+ s\, affecting a great variety of vendors and\n device classes. We wer
+ e also able to achieve high accuracy in fingerprinting and\n classifi
+ cation of both firmware images and live devices.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7252.html
+SUMMARY:(In)Security of Embedded Devices' Firmware - Fast and Furious at
+ Large Scale - Andrei Costin
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T171500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T164500
+DTSTAMP;VALUE=DATE-TIME:20160110T194644Z
+UID:74515f8e-a752-4cbb-b407-3a70fca5b0b3@frab.cccv.de
+DESCRIPTION:Neue App-basierte TAN-Verfahren sollen die etablierten Verfah
+ ren ablösen und Onlinebanking komfortabler machen. Die Notwendigkeit von
+ dedizierter Hardware entfällt und Transaktionen können mit nur einem mo
+ bilen Endgerät durchgeführt werden. Was von den Kreditinstituten als Fea
+ ture beworben wird\, erweist sich in unserer Untersuchung als fatal. In
+ einem Proof-of-Concept-Angriff demonstrieren wir die Manipulation von Tr
+ ansaktionsdaten und zeigen die konzeptionelle Schwäche von App-basierten
+ TAN-Verfahren.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7360.html
+SUMMARY:(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking -
+ Vincent Haupert
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T000000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T233000
+DTSTAMP;VALUE=DATE-TIME:20160104T121653Z
+UID:f1c8f781-1ce7-451f-90e9-218ba94bc955@frab.cccv.de
+DESCRIPTION:On 17th December 2014\, the Government of India's Ministry of
+ Communications and Information Technology issued an order to all licens
+ ed Internet Service Providers (ISPs) in the country to block access to 3
+ 2 websites\, effective immediately. The basis of this was a claim that t
+ he targeted web services were being used for "Jihadi Propaganda" by "Ant
+ i-National groups". As a response to this\, a few technologists in Berli
+ n got together and thought it would be a good idea to do some research u
+ sing free and accessible tools and to look at how censorship has been im
+ plemented\, as well as the various techniques that could be used to circ
+ umvent this censorship. This talk will discuss our findings and make rec
+ ommendations about how ISPs can handle such censorship requests better\,
+ while being fair and transparent to their customers.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7263.html
+SUMMARY:#GOIBlocks - Technical observations about recent internet censors
+ hip in India - Kaustubh Srikanth
+ORGANIZER:32c3
+LOCATION:Hall 6
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T210000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T203000
+DTSTAMP;VALUE=DATE-TIME:20160109T012743Z
+UID:3b16ddc9-499b-44b1-9084-b3e328daea30@frab.cccv.de
+DESCRIPTION:20 OSCILLATORS IN 20 MINUTES is an experimental music perform
+ ance/technical challenge/standup comedy act where I attempt to build twe
+ nty sound generating square wave oscillators in twenty minutes. This inv
+ olves fabricating small electronic circuits with wires\, chips\, small c
+ omponents and nine-volt batteries under the pressure of limited time and
+ expectation. This is a test of my technical abilities and an experiment
+ in working with live troubleshooting as a method of musical improvisati
+ on.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7549.html
+SUMMARY:20 OSCILLATORS IN 20 MINUTES - Darsha
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T190000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T180000
+DTSTAMP;VALUE=DATE-TIME:20160109T013641Z
+UID:7bf4c7a5-779e-4591-8d9b-f5f38d3dc879@frab.cccv.de
+DESCRIPTION:The traditional review event with presentations from various
+ teams at congress. Learn how the 32C3 got Internet\, video streaming\,
+ power and maybe more!
+URL://events.ccc.de/congress/2015/Fahrplan/events/7555.html
+SUMMARY:32C3 Infrastructure Review - Leon
+ORGANIZER:32c3
+LOCATION:Hall 6
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T193000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T183000
+DTSTAMP;VALUE=DATE-TIME:20160109T023554Z
+UID:47da549d-fd5b-4210-a8e5-bbb057844c0d@frab.cccv.de
+DESCRIPTION:3D printers are almost everywhere\, but not on the moon yet.
+ We want to change that and this talk gives you a little insight into the
+ how and whys of 3D printing on the moon.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7336.html
+SUMMARY:3D printing on the moon - Karsten Becker
+ORGANIZER:32c3
+LOCATION:Hall 6
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T181500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T171500
+DTSTAMP;VALUE=DATE-TIME:20160109T033535Z
+UID:1cac5105-cfdc-42e9-9a87-0ee71fc2443c@frab.cccv.de
+DESCRIPTION:How we built an automatic exploitation system and qualified f
+ or the DARPA Cyber Grand Challenge.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7218.html
+SUMMARY:A Dozen Years of Shellphish - Antonio Bianchi\, Jacopo Corbetta\,
+ Andrew Dutcher
+ORGANIZER:32c3
+LOCATION:Hall 6
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T170000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T160000
+DTSTAMP;VALUE=DATE-TIME:20160107T202128Z
+UID:fca4934b-5f01-4680-8cda-03fa206aac17@frab.cccv.de
+DESCRIPTION:Yosys (Yosys Open Synthesis Suite) is an Open Source Verilog
+ synthesis and verification tool.\n\nProject IceStorm aims at reverse eng
+ ineering and documenting the bit-stream format of Lattice iCE40 FPGAs a
+ nd providing simple tools for analyzing and creating bit-stream files\,
+ including a tool that converts iCE40 bit-stream files into behavioral Ve
+ rilog. Currently the bitstream format for iCE40 HX1K and HX8K is fully d
+ ocumented and supported by the tools. \n\nArachne-PNR is an Open Source
+ place&route tool for iCE40 FPGAs based on the databases provided by Pro
+ ject IceStorm. It converts BLIF files into an ASCII file format that can
+ be turned into a bit-stream by IceStorm tools.\n\nThis three projects t
+ ogether implement a complete open source tool-chain for iCE40 FPGAs. It
+ is available now and it is feature complete (with the exception of timin
+ g analysis\, which is work in progress).
+URL://events.ccc.de/congress/2015/Fahrplan/events/7139.html
+SUMMARY:A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs
+ - Clifford
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T134500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T124500
+DTSTAMP;VALUE=DATE-TIME:20160109T055400Z
+UID:c50c5193-7389-4858-9352-14ea6d74b77a@frab.cccv.de
+DESCRIPTION:The leading social networks are the powerful new gatekeepers
+ of the digital age. Proprietary de facto standards of the dominant compa
+ nies have lead to the emergence of virtual “information silos” that can
+ barely communicate with one another. Has Diaspora really lost the war? O
+ r is there still a chance to succeed?
+URL://events.ccc.de/congress/2015/Fahrplan/events/7403.html
+SUMMARY:A New Kid on the Block - Katharina Nocun
+ORGANIZER:32c3
+LOCATION:Hall 6
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T180000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T173000
+DTSTAMP;VALUE=DATE-TIME:20160111T005407Z
+UID:17259b49-65ef-4726-ae03-a0b90e45806a@frab.cccv.de
+DESCRIPTION:"Signal level is high but throughput is low" is a common expe
+ rience in WLAN networks without central management. That causes a lot of
+ frustration\, mainly because there is no easy way for users to OBSERVE
+ the presence of interference at all. \n\nIn order to improve this situat
+ ion we developed a patch for OpenWRT which makes interference from other
+ sources visible and is able to display the current utilization-ratio (c
+ hannel load). No additional hardware is required and no interruption of
+ normal operation is necessary - because recent chipsets maintain interna
+ l counters for channel load tracking.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7314.html
+SUMMARY:All Our Shared Spectrum Are Belong to Us - Paul Fuxjaeger
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T171500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T164500
+DTSTAMP;VALUE=DATE-TIME:20160106T092525Z
+UID:b9b2c371-417c-45c4-a47f-faf7eeb11fbf@frab.cccv.de
+DESCRIPTION:AXIOM is the first professional\, extendable\, affordable and
+ modular cinema camera platform based on Free ("libre") Software\, Open
+ Design\, Open Hardware\, transparent development processes and extensive
+ documentation. The community project establishes an ecosystem that offe
+ rs a sustainable basis for a broad spectrum of imaging applications and
+ empowers enthusiasts\, videographers as well as developers in the techno
+ logy and creative industry sectors.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7355.html
+SUMMARY:apertus° AXIOM - Matthias Tarasiewicz (parasew)
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T000000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T230000
+DTSTAMP;VALUE=DATE-TIME:20160107T202423Z
+UID:56e8d345-8c04-4281-9811-d4ed9da8603e@frab.cccv.de
+DESCRIPTION:With the advancement of defensive security and the constant r
+ elease of research papers into their toolsets\, advanced threat actors h
+ ave had to adapt with new operational security practices\, as well as wi
+ th new technology.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7260.html
+SUMMARY:APT Reports and OPSEC Evolution\, or: These are not the APT repo
+ rts you are looking for - Inbar Raz\, Gadi Evron
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T134500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T124500
+DTSTAMP;VALUE=DATE-TIME:20160106T170845Z
+UID:a30bcf2c-1abf-4b7b-9554-a6dacbaeba52@frab.cccv.de
+DESCRIPTION:In recent years\, NGOs have been struggling to defend civil r
+ ights in Brussels. As human rights defenders\, it is part of our job to
+ detect failures in the EU’s digital policy-making. But we rarely have th
+ e opportunity to explore the underlying reasons and to debug Europe’s ke
+ rnel package.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7227.html
+SUMMARY:Avoiding kernel panic: Europe’s biggest fails in digital policy-m
+ aking - Kirst3nF\, Walter van Holst
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T123000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T113000
+DTSTAMP;VALUE=DATE-TIME:20160107T203047Z
+UID:b5d1079a-7d72-45b1-8328-e5c3e60944c1@frab.cccv.de
+DESCRIPTION:In 2011\, Joanna Rutkowska unveiled an easy-to-use tool for m
+ itigating many attacks on system boot chains by using the TPM - the Anti
+ Evil Maid. Unfortunately the implementation was difficult to incorporat
+ e into normal system boot in a secure manner - anybody able to observe a
+ user could recreate the secret. This presentation describes a method to
+ allow systems to prove their identity to the user without making it tri
+ vial for attackers to mimic a secure boot and extract secrets from the u
+ ser\, and why the state of modern hardware means this may still not be e
+ nough.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7343.html
+SUMMARY:Beyond Anti Evil Maid - Matthew Garrett
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T193000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T183000
+DTSTAMP;VALUE=DATE-TIME:20160108T170123Z
+UID:9ab1407a-126f-48d9-898d-eae7974324e9@frab.cccv.de
+DESCRIPTION:Did you ever want to have access to a few hundred thousand ne
+ twork end points? Or a few hundred thousand phone numbers? A short look
+ behind the curtains of how not to do network security.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7133.html
+SUMMARY:Beyond your cable modem - Alexander Graf
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T170000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T160000
+DTSTAMP;VALUE=DATE-TIME:20160107T203923Z
+UID:c87fa147-d1f4-4353-82db-c3e5b646884b@frab.cccv.de
+DESCRIPTION:We will detect\, bypass\, and abuse honeypot technologies and
+ solutions\, turning them against the defender. We will also release a g
+ lobal map of honeypot deployments\, honeypot detection vulnerabilities\,
+ and supporting code.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7277.html
+SUMMARY:Breaking Honeypots for Fun and Profit - DeanSysman\, Gadi Evron\,
+ Itamar Sher
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T134500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T131500
+DTSTAMP;VALUE=DATE-TIME:20160110T200004Z
+UID:c3731bcd-04a8-49ba-a472-d1180944c106@frab.cccv.de
+DESCRIPTION:Buffering sucks! Why we see regular buffering when watching o
+ nline video. What internet service providers could do to reduce bufferin
+ g and why big players refuse to act. An attempt of calculating the econo
+ mic cost of buffering.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7530.html
+SUMMARY:Buffering sucks! - Fredy Kuenzler
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T231500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T224500
+DTSTAMP;VALUE=DATE-TIME:20160107T022858Z
+UID:60ba43d2-a9c8-42ab-a434-8772cb182675@frab.cccv.de
+DESCRIPTION:This talk gives an overview on state-of-the-art wireless secu
+ rity concepts: How can we analyze wireless protocols? How can we build m
+ echanisms that are secure even when the attacker has unlimited computati
+ onal power? Can we exploit wireless transmission for more?
+URL://events.ccc.de/congress/2015/Fahrplan/events/7119.html
+SUMMARY:Building and Breaking Wireless Security - jiska
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T170000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T160000
+DTSTAMP;VALUE=DATE-TIME:20160106T224410Z
+UID:b7327513-182a-455a-932e-aab4791f5331@frab.cccv.de
+DESCRIPTION:After defensive programming techniques and before attack meth
+ od mitigations\, the least privilege principle is our strongest weapon a
+ gainst exploitation. Much of the focus has been on how the admin can san
+ dbox processes away.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7284.html
+SUMMARY:Check your privileges! - Fefe
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T170000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T160000
+DTSTAMP;VALUE=DATE-TIME:20160109T082021Z
+UID:48219ef6-24b8-41ca-8cc0-ec309e4148e6@frab.cccv.de
+DESCRIPTION:Since my move to China in 2012 I have actively engaged in the
+ local art scenes of Beijing and Shanghai\, focusing on collaborating wi
+ th artists interested in technology and the internet. My own personal in
+ dependent research of the Chinese internet and the popular Chinese socia
+ l app\, WeChat 微信\, has contributed to an ongoing massive archive I bega
+ n in 2014 called The Chinternet Archive. To date\, I have over 15\,000 p
+ ieces of content (and growing) documenting localized trends\, memes\, ve
+ rnacular photography\, online personas\, .gif animations\, videos\, self
+ ies\, propaganda\, retail\, family/work life\, and other such digital ar
+ tifacts of online Chinese culture. This archive directly influenced my a
+ rtistic and curatorial practice\, resulting in an online art collection
+ called Netize.net\, or its Chinese name of 网友网 [wǎngyǒuwǎng] “Internet F
+ riend Network”\, which collaborates with emerging Chinese and internatio
+ nal artists who are exploring or deconstructing East/West dichotomies\,
+ engaging in Sino-centric Web aesthetics\, or investigating the East onli
+ ne. The goal of this talk is to explore through my Chinternet Archive an
+ d Netize.net collections\, forms of creativity found in China in relatio
+ nship to it’s early internet history\, interactions with technology\, lo
+ calized networks and restrictions.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7216.html
+SUMMARY:CHINTERNET ART - Michelle Proksell
+ORGANIZER:32c3
+LOCATION:Hall 6
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T200000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T190000
+DTSTAMP;VALUE=DATE-TIME:20160109T191441Z
+UID:5c8d1a32-d9ce-49cb-b058-846fa58663d8@frab.cccv.de
+DESCRIPTION:
+URL://events.ccc.de/congress/2015/Fahrplan/events/7551.html
+SUMMARY:Closing Event - Carina Haupt\, Linus Neumann
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T134500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T124500
+DTSTAMP;VALUE=DATE-TIME:20160109T180343Z
+UID:08843e46-b813-49a4-93ad-ab6e7b3e4a17@frab.cccv.de
+DESCRIPTION:CloudABI is an alternative runtime environment for UNIX-like
+ operating systems that is purely based on the principle of capability-ba
+ sed security. This makes it possible to create applications that are str
+ ongly sandboxed\, easier to test and easier to maintain.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7231.html
+SUMMARY:CloudABI - Ed Schouten
+ORGANIZER:32c3
+LOCATION:Hall 6
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T190000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T180000
+DTSTAMP;VALUE=DATE-TIME:20160111T105539Z
+UID:9b641e3f-6d6e-4850-bddd-ced7d67af5c6@frab.cccv.de
+DESCRIPTION:Governments post reports and data about their operations. Jou
+ rnalists publish documents from whistleblowers. But there is a third typ
+ e of open data that is often overlooked- the information people and comp
+ anies post about themselves. People need jobs. Companies need to hire pe
+ ople. Secret prisons do not build themselves. \n\nBy making it feasible
+ for anyone to collect public data online in bulk and exploring ways to
+ effectively use this data for concrete objectives\, we can build an inde
+ pendent\, distributed system of accountability.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7340.html
+SUMMARY:Collect It All: Open Source Intelligence (OSINT) for Everyone - M
+ . C. McGrath
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T174500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T171500
+DTSTAMP;VALUE=DATE-TIME:20160103T215158Z
+UID:269e7320-2133-4981-9238-e5fc8305a3e4@frab.cccv.de
+DESCRIPTION:Wie lassen sich Konstantenfaltung und ein Registerallokator f
+ ür einen Forth-Compiler implementieren\, der in einem Mikrocontroller lä
+ uft ?
+URL://events.ccc.de/congress/2015/Fahrplan/events/7520.html
+SUMMARY:Compileroptimierungen für Forth im Microcontroller - Matthias Koc
+ h
+ORGANIZER:32c3
+LOCATION:Hall 6
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T134500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T124500
+DTSTAMP;VALUE=DATE-TIME:20160107T210542Z
+UID:fb537cde-7f1d-484b-971b-1d30a543ecfb@frab.cccv.de
+DESCRIPTION:Computational theories of the mind seem to be ideally suited
+ to explain rationality. But how can computations be subverted by meaning
+ \, emotion and love?
+URL://events.ccc.de/congress/2015/Fahrplan/events/7483.html
+SUMMARY:Computational Meta-Psychology - Joscha
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T000000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T230000
+DTSTAMP;VALUE=DATE-TIME:20160105T023100Z
+UID:9f2e9ff0-1555-470b-8743-9f07f54e9097@frab.cccv.de
+DESCRIPTION:In 2011 the Nintendo 3DS was released. Today it is the most p
+ opular current-gen handheld console\, having sold more than 50 million u
+ nits worldwide. The 3DS features a completely redesigned architecture fr
+ om its predecessors the DS and the DSi. This talk will focus on the secu
+ rity features of the 3DS\, and how we got around them.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7240.html
+SUMMARY:Console Hacking - plutoo\, derrek\, smea
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T223000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T220000
+DTSTAMP;VALUE=DATE-TIME:20160102T023511Z
+UID:5f5cdb89-f599-40a6-84eb-d588eeed0250@frab.cccv.de
+DESCRIPTION:Hacking receives growing attention among social scientists du
+ ring the last five years. Researchers particularly in the fields of Huma
+ n-Computer Interaction (HCI) and Computer-Supported Collaborative Work (
+ CSCW) but also in the social sciences generally have begun to study hack
+ ing empirically—investigating hacking as a practice and as cultural phen
+ omenon. The talk offers a glimpse of the spectrum of research about hack
+ ing in HCI\, CSCW\, and adjacent fields. Researchers in these fields por
+ tray hacking very differently. The spectrum ranges from “transgressive c
+ raft” to “innovative leisure practice\,” from skilled craftsmanship to a
+ d hoc kludging\, from an individualist pursuit to a community mission\,
+ from an expression of liberalism to an exclusive practice of cultural di
+ stinction. Some researchers see hacking as an illustration of how to def
+ y technological determinism\, i.e.\, the conviction that the technologic
+ al determines the social\, a position that social scientists typically f
+ ight ferociously. Other researchers see it as the future of “end-user in
+ novation.” This talks discusses these notions and describes the value---
+ economic\, pedagogical\, cultural\, conceptual---that different research
+ perspectives perceive in hacking.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7114.html
+SUMMARY:Craft\, leisure\, and end-user innovation - Susann Wagenknecht
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T223000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T220000
+DTSTAMP;VALUE=DATE-TIME:20160104T233437Z
+UID:ba780105-8cc1-4e6e-8552-5e3bc150b9ff@frab.cccv.de
+DESCRIPTION:Die Landesverrat-Affäre um netzpolitik.org hat gezeigt\, wie
+ wichtig es ist\, nicht nur aus staatlichen Dokumenten zu zitieren\, sond
+ ern sie im Original zu veröffentlichen. Ideales Werkzeug dafür ist das I
+ nformationsfreiheitsgesetz (IFG). Wir geben einen Überblick über die Ent
+ wicklungen dieses Jahr rund um das IFG.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7102.html
+SUMMARY:Crypto ist Abwehr\, IFG ist Angriff! - Arne Semsrott
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T134500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T124500
+DTSTAMP;VALUE=DATE-TIME:20160110T002705Z
+UID:31331405-a243-48ba-9536-83285542400a@frab.cccv.de
+DESCRIPTION:Governments around the world are seeking to put a stop to sec
+ ure end-to-end encryption\, from the UK’s Data Retention and Investigato
+ ry Powers Act\, to Australia’s Defence Trade Controls Act\, to India’s d
+ raft proposal to require plain text copies of all secure messages\, to t
+ he United States’ Federal Bureau of Investigation’s public pressure on g
+ lobal companies like Apple and Google to weaken their security and provi
+ de law enforcement access to plain text content.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7386.html
+SUMMARY:Crypto Wars Part II - Kurt Opsahl
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T150000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T140000
+DTSTAMP;VALUE=DATE-TIME:20160105T204958Z
+UID:8b3cba12-3928-4fb9-b727-ee4bc9e56f51@frab.cccv.de
+DESCRIPTION:Transposition of the Wassenaar Arrangement\, which now also c
+ overs export controls on exploits and surveillance technology\, into Eur
+ opean law is upon us. This panel discusses this\, both on process and su
+ bstance.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7280.html
+SUMMARY:Cyber all the Wassenaars - Walter van Holst\, Nate Cardozo\, mlp\
+ , Richard Tynan
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T213000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T203000
+DTSTAMP;VALUE=DATE-TIME:20160109T082206Z
+UID:47c13b4a-a50b-4158-9a71-f4a2f24ace64@frab.cccv.de
+DESCRIPTION:Kommentierendes im Internet ist neuerdings bedroht. Der unflä
+ tige Kommentierer hat den Pedonazi als Schrecken des Netzes abgelöst\, a
+ ls Strohmann für mehr Kontrolle über das Netz kann er auf breitere Gefol
+ gschaft rechnen. Es “muss etwas geschehen” gegen den “Hass im Netz”\, “P
+ utintrolle” und Wutnetzbürger. Twitter\, Mark Zuckerberg\, Politiker\, a
+ lle sollen mehr tun - aber was denn eigentlich\, mehr Zensur und Moderat
+ ion\, andere Ausgestaltungen von Kommentarsystemen?
+URL://events.ccc.de/congress/2015/Fahrplan/events/7249.html
+SUMMARY:Das Zahnrad aus Fleisch - agonarch\, @fraufeli
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T213000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T203000
+DTSTAMP;VALUE=DATE-TIME:20160109T082400Z
+UID:28891a0d-98d9-484a-bd59-ccea80852b12@frab.cccv.de
+DESCRIPTION:Datahavens have long been discussed as a solution to user sec
+ urity and privacy needs. Instinctively\, the idea of physical locations
+ where servers for communications\, financial privacy\, and other servic
+ es can work is easily understood and seems appealing. As a founder of t
+ he HavenCo datahaven on Sealand in 2000\, I saw firsthand the potential
+ and the pitfalls of this approach.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7432.html
+SUMMARY:Datahavens from HavenCo to Today - Ryan Lackey
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T150000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T140000
+DTSTAMP;VALUE=DATE-TIME:20160111T105713Z
+UID:2e3d2878-e8b0-44cd-aea8-baf52be25ecf@frab.cccv.de
+DESCRIPTION:For the past 3 years I have been delivering a custom-tailored
+ DDoS attacks for organizations that wanted to test out their DDoS defen
+ se systems.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7523.html
+SUMMARY:DDoS mitigation EPIC FAIL collection - dalmoz
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T181500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T171500
+DTSTAMP;VALUE=DATE-TIME:20160111T104150Z
+UID:371063d0-da9d-4d9f-bbe9-f5739eba2f30@frab.cccv.de
+DESCRIPTION:Last year I presented research showing how to de-anonymize pr
+ ogrammers based on their coding style. This is of immediate concern to o
+ pen source software developers who would like to remain anonymous. On th
+ e other hand\, being able to de-anonymize programmers can help in forens
+ ic investigations\, or in resolving plagiarism claims or copyright dispu
+ tes. \n\nI will report on our new research findings in the past year. We
+ were able to increase the scale and accuracy of our methods dramaticall
+ y and can now handle 1\,600 programmers\, reaching 94% de-anonymization
+ accuracy. In ongoing research\, we are tackling the much harder problem
+ of de-anonymizing programmers from binaries of compiled code. This can h
+ elp identify the author of a suspicious executable file and can potentia
+ lly aid malware forensics. We demonstrate the efficacy of our techniques
+ using a dataset collected from GitHub.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7491.html
+SUMMARY:De-anonymizing Programmers - Aylin
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T014500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T001500
+DTSTAMP;VALUE=DATE-TIME:20160110T002249Z
+UID:ffa37241-83fe-40ca-9a5a-7c886d5879c0@frab.cccv.de
+DESCRIPTION:Die ASYL-DIALOGE erzählen von Begegnungen\, die Menschen verä
+ ndern\, von gemeinsamen Kämpfen in unerwarteten Momenten – eine dieser G
+ eschichten spielt in Osnabrück\, wo seit März 2014 ein breites Bündnis s
+ olidarischer Menschen bereits 37 Abschiebungen verhindern konnte und som
+ it für viele bundesweit zum Vorbild wurde...
+URL://events.ccc.de/congress/2015/Fahrplan/events/7566.html
+SUMMARY:Die Asyl-Dialoge / The Asylum Dialogues - Bühne für Menschenrecht
+ e
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T224500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T214500
+DTSTAMP;VALUE=DATE-TIME:20160111T111040Z
+UID:9f89d94f-07fd-47f4-9ad0-c8dda94de175@frab.cccv.de
+DESCRIPTION:Newly adopted VoLTE requires changes in all associated partie
+ s\, such as 3GPP standard\, device\, operating system\, and cellular cor
+ e networks. Therefore\, it is not too surprising that it has security pr
+ oblems. However\, it turns out that it has way too many problems. In thi
+ s talk\, we introduce how you can freely send data in the cellular netwo
+ rk\, and how an attacker can perform caller spoofing and denial of servi
+ ce attacks on calls to disable the target’s calling. Furthermore\, we ex
+ plain how small implementation glitch on VoLTE may lead to break the who
+ le cellular network down.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7502.html
+SUMMARY:Dissecting VoLTE - Dongkwan\, Hongil Kim
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T193000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T190000
+DTSTAMP;VALUE=DATE-TIME:20160109T082724Z
+UID:62290f8e-f515-416f-9c4a-b403474e94e6@frab.cccv.de
+DESCRIPTION:The Ecuadorian government received international visibility w
+ hen in 2012 it agreed to grant Wikileaks founder Julian Assange politica
+ l asylum and host him in Ecuador's London embassy. Ecuador has since bee
+ n widely praised for standing up to the United States to defend the free
+ dom of the press and freedom of expression.\n\nHowever\, the reality is
+ not consistent with this image Ecuador seeks to project. Journalists ins
+ ide the country face oppressive laws\, huge fines and lawsuits for repor
+ ting on government corruption. Digital and physical surveillance of jour
+ nalists and activists is in fact getting worse.\n\nWe will analyze some
+ of the existing leaks that prove such activities. We will also give a fi
+ rst-hand account from someone who had to literally run away from Ecuador
+ for publishing leaked materials proving illegal espionage against journ
+ alists and citizens.\n\nIs Ecuador really interested in free speech? We
+ don't think so and we will tell you why.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7134.html
+SUMMARY:Ecuador: how an authoritarian government is fooling the entire wo
+ rld - Pedro Noel\, Bethany Horne
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T163000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T160000
+DTSTAMP;VALUE=DATE-TIME:20160110T022230Z
+UID:527d5a8e-841d-48ad-89d9-b62fbee741b8@frab.cccv.de
+DESCRIPTION:Im Sommer kam heraus\, dass der Generalbundesanwalt Ermittlun
+ gen gegen zwei Journalisten von netzpolitik.org in Gang gesetzt hatte. D
+ as geschah\, weil sich das Bundesamt für Verfassungsschutz dadurch auf d
+ en Schlips getreten fühlte\, dass Auszüge aus ihren Haushaltsplänen der
+ allgemeinen Bevölkerung bei netzpolitik.org zugänglich gemacht wurden.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7135.html
+SUMMARY:Ein Abgrund von Landesverrat - Markus Beckedahl
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T163000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T160000
+DTSTAMP;VALUE=DATE-TIME:20160106T092402Z
+UID:52706f90-a2f9-48be-a4c3-786257fce233@frab.cccv.de
+DESCRIPTION:This talk is a brief recap into EEG / BCI for hackers\, maker
+ s\, researchers\, and artists. It will give an overview of current consu
+ mer devices and their flaws\, and subquently present fully open-source\,
+ high-quality hardware and software. Finally implications for the future
+ of modern society are outlined\, especially how commercial EEG consumer
+ devices or services may be exploited by corporations to cloudsource mar
+ ket research\, or spy on health conditions\, brain states or even leak p
+ rivate information. Strategies to circumvent these risks and secure brai
+ n wave experience are being discussed.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7416.html
+SUMMARY:Evolution of Brain-Computer Interfaces - fractalfox
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T011500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T001500
+DTSTAMP;VALUE=DATE-TIME:20160106T215515Z
+UID:0bdbef2d-1594-4582-b315-7ee5da5505bf@frab.cccv.de
+DESCRIPTION:Wir helfen euch\, die Fnords zu sehen\, wenn nach einem klare
+ n Fall von Selbstmord der Zensor pinkeln war und die Stahlbälle den maxi
+ malen Realitätsabstand eingenommen haben.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7282.html
+SUMMARY:Fnord-Jahresrückblick - Fefe\, frank
+ORGANIZER:32c3
+LOCATION:Hall 1
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T214500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T211500
+DTSTAMP;VALUE=DATE-TIME:20160111T025133Z
+UID:153f9b5f-16a6-4c0c-b8d5-ca62ae23dea0@frab.cccv.de
+DESCRIPTION:Free software and hardware are essential to sovereignty among
+ developing nations\, and can be used to secure infrastructure and infor
+ mation against sophisticated adversaries. Underdeveloped nations are lev
+ eraging Free software for these purposes\, including Gaza and the Palest
+ inian territories. This lecture discusses the Palestinian use of Free so
+ ftware and hardware to claim a kind of sovereignty\, focusing on the hea
+ lth sector as one example where speaker Dr. Tarek Loubani has experience
+ d and participated in efforts to incorporate Free culture.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7246.html
+SUMMARY:Free Software and Hardware bring National Sovereignty - Tarek Lou
+ bani
+ORGANIZER:32c3
+LOCATION:Hall G
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T184500
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T181500
+DTSTAMP;VALUE=DATE-TIME:20160105T003854Z
+UID:e34fb384-4da9-44c4-9096-1660d5d57962@frab.cccv.de
+DESCRIPTION:„Never ever say no\, act your first thought and learn to love
+ mistakes“ – these are the basic rules of improv theatre. I will show ho
+ w this can be adopted for everyday life.
+URL://events.ccc.de/congress/2015/Fahrplan/events/7138.html
+SUMMARY:G’scheitern - Gregor Ruttner
+ORGANIZER:32c3
+LOCATION:Hall 2
+END:VEVENT
+BEGIN:VEVENT
+DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T170000
+DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T160000
+DTSTAMP;VALUE=DATE-TIME:20160109T083052Z
+UID:018148c1-62c9-4796-8443-2a8c8b8e3a01@frab.cccv.de
+DESCRIPTION:DGAs (Domain Generation Algorithms) have become a trusty fall
<