From c95c7c5b25b3255b674a234e125a3698dba953bf Mon Sep 17 00:00:00 2001 From: Matthias Beyer Date: Fri, 13 Dec 2019 19:42:26 +0100 Subject: Add testdata from the last few congresses Signed-off-by: Matthias Beyer --- testdata/ccc/schedule-31c3.ics | 2129 ++++++++++++++++++++++++++++ testdata/ccc/schedule-32c3.ics | 2557 ++++++++++++++++++++++++++++++++++ testdata/ccc/schedule-33c3.ics | 2429 ++++++++++++++++++++++++++++++++ testdata/ccc/schedule-34c3.ics | 2990 ++++++++++++++++++++++++++++++++++++++++ testdata/ccc/schedule-35c3.ics | 2974 +++++++++++++++++++++++++++++++++++++++ tests/ccc.rs | 5 + tests/congress31c3/mod.rs | 1 + tests/congress31c3/parsing.rs | 13 + tests/congress32c3/mod.rs | 1 + tests/congress32c3/parsing.rs | 13 + tests/congress33c3/mod.rs | 1 + tests/congress33c3/parsing.rs | 13 + tests/congress34c3/mod.rs | 1 + tests/congress34c3/parsing.rs | 13 + tests/congress35c3/mod.rs | 1 + tests/congress35c3/parsing.rs | 13 + 16 files changed, 13154 insertions(+) create mode 100644 testdata/ccc/schedule-31c3.ics create mode 100644 testdata/ccc/schedule-32c3.ics create mode 100644 testdata/ccc/schedule-33c3.ics create mode 100644 testdata/ccc/schedule-34c3.ics create mode 100644 testdata/ccc/schedule-35c3.ics create mode 100644 tests/ccc.rs create mode 100644 tests/congress31c3/mod.rs create mode 100644 tests/congress31c3/parsing.rs create mode 100644 tests/congress32c3/mod.rs create mode 100644 tests/congress32c3/parsing.rs create mode 100644 tests/congress33c3/mod.rs create mode 100644 tests/congress33c3/parsing.rs create mode 100644 tests/congress34c3/mod.rs create mode 100644 tests/congress34c3/parsing.rs create mode 100644 tests/congress35c3/mod.rs create mode 100644 tests/congress35c3/parsing.rs diff --git a/testdata/ccc/schedule-31c3.ics b/testdata/ccc/schedule-31c3.ics new file mode 100644 index 0000000..de43c01 --- /dev/null +++ b/testdata/ccc/schedule-31c3.ics @@ -0,0 +1,2129 @@ +BEGIN:VCALENDAR +PRODID;X-RICAL-TZSOURCE=TZINFO:-//com.denhaven2/NONSGML ri_cal gem//EN +CALSCALE:GREGORIAN +VERSION:2.0 +BEGIN:VTIMEZONE +TZID;X-RICAL-TZSOURCE=TZINFO:Europe/Berlin +BEGIN:STANDARD +DTSTART:20141026T030000 +RDATE:20141026T030000 +TZOFFSETFROM:+0200 +TZOFFSETTO:+0100 +TZNAME:CET +END:STANDARD +END:VTIMEZONE +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T000000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T233000 +DTSTAMP;VALUE=DATE-TIME:20150107T131845Z +UID:4aOXU9cdQYbirV0Q-k5usw@frab.cccv.de +DESCRIPTION:Two weeks after the Heartbleed bug was announced\, CloudFlare + patched the Heartbleed bug\, created a challenge to prove the bug could + be used to find private keys (uncovering a second bug in OpenSSL) and t + urned its entire network into a giant honeypot. This session will discus + s the specific steps taken to prevent early disclosure\, creating and sc + aling the first public vulnerability test\, how the CloudFlare Heartblee + d challenge showed that you can reveal private SSL keys (how a second bu + g in OpenSSL made this possible) the incredible impact of revoking over + 100\,000 certificates in a single day\, and the results of our honeypot + revealing the proportion of attack traffic versus research traffic. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6212.html +SUMMARY: Heartache and Heartbleed: The insider’s perspective on the after + math of Heartbleed +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T193000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T183000 +DTSTAMP;VALUE=DATE-TIME:20141231T012818Z +UID:0hwHwiTLCTkE94bpOBOcVg@frab.cccv.de +DESCRIPTION:3 theater projects that illustrate the false "California Ideo + logy" and ask us to look at our slip into neoliberalism through the back + door of technology and to consider the ethics in the protocol. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6547.html +SUMMARY:"Exploit" in theater +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T134500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T124500 +DTSTAMP;VALUE=DATE-TIME:20150118T104621Z +UID:HOqeNIb6G7M4hYFKFRkCmQ@frab.cccv.de +DESCRIPTION:Im Sommer 2014 wurde die sogenannte Digitale „Agenda“ vorgest + ellt\, die als „netzpolitisches Regierungsprogramm“ bezeichnet wurde. Au + s texttypologischer Sicht handelt es sich aber eher um einen PR-Text\, d + er so aussieht\, als sei er ein Auszug aus einer Wahlkampfbroschüre. Der + Vortrag analysiert den Text zunächst inhaltlich\, um zu zeigen\, worum + es im Einzelnen geht und wo Widersprüche auftauchen\, dann aus textkriti + scher und aus linguistischer Perspektive. Insbesondere werden bestimmte + Interessen der Bundesregierung und anderer Akteure deutlich\, die wenige + r offen thematisiert werden\, aber doch sprachlich zu Tage treten. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6264.html +SUMMARY:„Wir beteiligen uns aktiv an den Diskussionen“ +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T193000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T190000 +DTSTAMP;VALUE=DATE-TIME:20150108T132748Z +UID:defd3b01-c39d-433f-b3c4-dbea1ea2fe00@frab.cccv.de +DESCRIPTION:In general data is stored on technically sensitive systems an + d can easily be lost. At the same time files today appear often as indes + tructible once uploaded to the Internet. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6595.html +SUMMARY:»Hard Drive Punch« +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T224500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T214500 +DTSTAMP;VALUE=DATE-TIME:20150101T181335Z +UID:P27IBlfmjGfZIib1deB_xg@frab.cccv.de +DESCRIPTION:This talk presents a deep analysis of banking mobile apps ava + ilable in the world. Based on static and dynamic analysis as well as on + the analysis of the final source code we show that a vast majority of th + em are not respecting users' privacy and users' data protection. Worse a + few of them contains critical bugs +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6530.html +SUMMARY:(In)Security of Mobile Banking +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T193000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T183000 +DTSTAMP;VALUE=DATE-TIME:20150116T075714Z +UID:1hSKsR-r9B0BnpLfUvpDAg@frab.cccv.de +DESCRIPTION:Seit nun über 10 Jahren gibt es OpenStreetMap. Besonders in d + en letzten drei Jahren war die Entwicklung überwältigend\, sowohl was di + e Datenlage als auch das gesamte Ökosystem anbelangt. Wir wollen zeigen\ + , was möglich ist und was in der Zukunft (hoffentlich) passieren wird. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6255.html +SUMMARY:10 Jahre OpenStreetMap +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T193000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T183000 +DTSTAMP;VALUE=DATE-TIME:20150107T114336Z +UID:eddb2328-37c3-4e86-86cc-c8541d14b4d7@frab.cccv.de +DESCRIPTION: +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6562.html +SUMMARY:31C3 Closing Event +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T170000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T160000 +DTSTAMP;VALUE=DATE-TIME:20150105T144000Z +UID:e192e98a-90ca-44c8-9cfd-86b94a79f4d1@frab.cccv.de +DESCRIPTION: +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6557.html +SUMMARY:31C3 Infrastructure Review +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T123000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T113000 +DTSTAMP;VALUE=DATE-TIME:20150118T104044Z +UID:8c4e647f-813e-41ef-b05b-65469dd841c3@frab.cccv.de +DESCRIPTION:The 31C3 Keynote +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6571.html +SUMMARY:31C3 Keynote +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T113000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T110000 +DTSTAMP;VALUE=DATE-TIME:20150122T130014Z +UID:29aecfd7-2e44-4f49-ab86-29b5e0877325@frab.cccv.de +DESCRIPTION: +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6561.html +SUMMARY:31C3 Opening Event +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T134500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T124500 +DTSTAMP;VALUE=DATE-TIME:20150106T194847Z +UID:SXxWu-U4pNjjFZLl9XXDDA@frab.cccv.de +DESCRIPTION:We use microwaves to cast aluminum from 3D printed objects. T + his gives us the ability to cast high quality 6040 aluminum pieces using + a 3D printer and commercially available consumer microwaves. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6417.html +SUMMARY:3D Casting Aluminum +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T210000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T203000 +DTSTAMP;VALUE=DATE-TIME:20150104T154202Z +UID:lE9xGxC7-9DQGljZOWg_Sw@frab.cccv.de +DESCRIPTION:What do the arts and literature have to contribute to urgent + debates about the technization of food production? What can a play from + 1605 tell us about fairer distribution of natural resources today? Equal + ly\, how might a cyber thriller from 2011 help us debate contentious iss + ues such as gene-based technologies and utopian visions of knowledge-led + society? This talk considers agri-tech and food security across a wide + sweep of social and political terrain\, from the Arab Spring to the Euro + pean horsemeat scandal\, from Shakespeare to Daniel Suarez. It argues th + at the arts and sciences need to cooperate to deepen understanding about + \, and define actions on\, the big challenges facing a needy world. Fina + lly\, it suggests ways in which the arts and technology can assist us in + arriving at a model of society in which resources are distributed not o + nly more efficiently\, but also more equitably. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6135.html +SUMMARY:Agri-tech and the Arts: From Barns to D-Space +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T224500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T214500 +DTSTAMP;VALUE=DATE-TIME:20150105T095012Z +UID:_lVlmBO98KMg4M-n-_A3FA@frab.cccv.de +DESCRIPTION:You definitely should care. The aim of this talk is to provid + e insight to the security\, architecture and yes you guessed it\, vulne + rability of the AMD System Management Unit (SMU) firmware found in moder + n AMD x86 processors. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6103.html +SUMMARY:AMD x86 SMU firmware analysis +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T213000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T203000 +DTSTAMP;VALUE=DATE-TIME:20150104T183449Z +UID:T7aunKcOFBLl5b8IGVqJWQ@frab.cccv.de +DESCRIPTION:On modern Intel based computers there exists two powerful and + protected code regions: the UEFI firmware and System Management Mode (S + MM). UEFI is the replacement for conventional BIOS and has the responsib + ility of initializing the platform. SMM is a powerful mode of execution + on Intel CPUs that is even more privileged than a hypervisor. Because of + their powerful positions\, SMM and UEFI are protected by a variety of h + ardware mechanisms. In this talk\, Rafal Wojtczuk and Corey Kallenberg t + eam up to disclose several prevalent vulnerabilities that result in SMM + runtime breakin as well as arbitrary reflash of the UEFI firmware.\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6129.html +SUMMARY:Attacks on UEFI security\, inspired by Darth Venamis's misery and + Speed Racer +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T134500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T124500 +DTSTAMP;VALUE=DATE-TIME:20150104T004113Z +UID:aUcSuwZ2iMoJQMEL40opIw@frab.cccv.de +DESCRIPTION:Re-using works licensed under Creative Commons seems pretty s + imple\, but it can often be quite time consuming. One image might be oka + y\, but keeping track of the license and attribution of a thousand image + s in your mashup\, or when quoting from massively crowdsourced data sets + such as Wikipedia? Whoah! Don’t we have computers to do that for us!? W + e do – but there’s no widespread support for including licensing or aut + hor information when sharing or reusing digital works. This session will + discuss how this should work in the open knowledge environment. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6214.html +SUMMARY:Attribution revolution +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T223000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T220000 +DTSTAMP;VALUE=DATE-TIME:20150106T203948Z +UID:7dt2PzyGxZI8i0QQysCZ6Q@frab.cccv.de +DESCRIPTION:Transcribing a talk comes relatively easy to fast typists\, w + hereas turning a transcript into time-aligned subtitles for a video requ + ires a much larger human effort. In contrast\, speech recognition perfor + mance (especially for open-source-based solutions)\, is still poor on op + en-domain topics\, but speech technology is able to align a given text t + o the corresponding speech with high accuracy. Let's join forces to gene + rate superior subtitling with little effort\, and to improve future open + -source-based speech recognizers\, at the same time!\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6554.html +SUMMARY:Automatically Subtitling the C3 +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T210000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T203000 +DTSTAMP;VALUE=DATE-TIME:20150101T212246Z +UID:wyL8OVhv0Y6VczeYR3K_jQ@frab.cccv.de +DESCRIPTION:Axoloti is an integrated platform for digital audio: its grap + hical editor is an easy-to-use toolbox for creating sound synthesis or p + rocessing algorithms. The audio processing runs on a microcontroller boa + rd\, and runs standalone after editing. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6402.html +SUMMARY:Axoloti +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T134500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T124500 +DTSTAMP;VALUE=DATE-TIME:20150113T223549Z +UID:DvpNPWPGVgSqGcOI1WK45g@frab.cccv.de +DESCRIPTION:Ever wondered what the cryptic QNY27R on your ai + rline reservaton means? This talk explores typical computing environment + as seen in the air transport industry. Discover ancient software\, old + communication protocols and cryptic systems. What data are stored and ho + w they are exchanged to keep the air transport industry running. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6308.html +SUMMARY:Beyond PNR: Exploring airline systems +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T170000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T160000 +DTSTAMP;VALUE=DATE-TIME:20150106T093643Z +UID:5gpaE5FLmfxMjTlbSDJkWw@frab.cccv.de +DESCRIPTION:"Nearly all of the symmetric encryption modes you learned ab + out in school\, textbooks\, and Wikipedia are (potentially) insecure." - + - Matthew Green\n\nIn recent history\, we saw time and again (to some ex + tent catastrophic) failures of cryptographic constructions for authentic + ated encryption (AE) due to bad design choices\, implementation errors a + nd a lack of reliable standards. After an introduction providing some ba + ckground information on these topics\, we present CAESAR\, a new cryptog + raphic competition which aims to find solutions to the problems mentione + d above. In the second part of the talk\, we introduce NORX\, a new and + next-generation AE scheme and our candidate for CAESAR. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6137.html +SUMMARY:CAESAR and NORX +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T021500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T000000 +DTSTAMP;VALUE=DATE-TIME:20150109T224230Z +UID:77aea78c-f2d2-461a-92b3-82929a79d598@frab.cccv.de +DESCRIPTION:"Citizenfour" is Laura Poitras' documentary and a closeup vie + w about blowing the whistle on the spooks at the NSA. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6581.html +SUMMARY:Citizenfour +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T213000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T203000 +DTSTAMP;VALUE=DATE-TIME:20150114T205709Z +UID:n2DFvyl_lWjW-gm317vT3A@frab.cccv.de +DESCRIPTION:Programs are full of bugs\, leading to vulnerabilities. We'll + discuss power and limitations of code-pointer integrity (CPI)\, a stron + g but practical security policy that enforces memory safety for all code + pointers\, protecting against any form of control-flow hijack attack (e + . g.\, ROP or JOP).\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6050.html +SUMMARY:Code Pointer Integrity +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T214500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T211500 +DTSTAMP;VALUE=DATE-TIME:20150104T184108Z +UID:iU5CnqxotZz_KK2P-uVMsQ@frab.cccv.de +DESCRIPTION:This talk will reflect on teaching Computer Science in Pyongy + ang over the last two years\, and look at how technology has been integr + ated into civilian life in the DPRK. Remaining an extremely isolated cou + ntry\, many people would be surprised to hear that cellphones have becom + e commonplace within the capitol\, let alone that the country invests in + custom hardware and software. I'll talk through the current state of de + sktop and mobile technology in pyongyang\, and what's changing. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6253.html +SUMMARY:Computer Science in the DPRK +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T150000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T140000 +DTSTAMP;VALUE=DATE-TIME:20150105T182319Z +UID:P8L4krxqjXP7zHMZToU6CQ@frab.cccv.de +DESCRIPTION:After years of debate\, EU copyright law is finally being rev + isited. The Commission will present a proposal for reform within 4 month + s of 31c3. And it's high time: There has never been a bigger discrepancy + between the technical feasibility to share information and knowledge ac + ross all physical borders and the legal restrictions to actually do so. + This talk outlines the unique opportunity and the challenge to bring cop + yright into the 21st century that lies in front of us. Hackers ensured t + hat people were heard during last winter's public consultation. Can they + now also ensure a progressive outcome of the reform process? +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6350.html +SUMMARY:Correcting copywrongs +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T000000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T230000 +DTSTAMP;VALUE=DATE-TIME:20150109T224246Z +UID:MghFmvDBS-J7T2ZOkNXUKA@frab.cccv.de +DESCRIPTION:Julia Angwin\, Jack Gillum\, and Laura Poitras will tell us s + tories about how they use crypto and privacy-enhancing technologies as h + igh-profile journalists\, and rant in an entertaining way about how thes + e tools have failed or are horribly inadequate for their needs. They wil + l also talk about their rare crypto successes. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6154.html +SUMMARY:Crypto Tales from the Trenches +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T150000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T140000 +DTSTAMP;VALUE=DATE-TIME:20150107T131822Z +UID:ELK9-ZQeFcqKxBYW8eay8g@frab.cccv.de +DESCRIPTION:Reverse engineering is not all binaries and byte-code. The bl + ack art also extends to networks and unobtainable game servers. In this + talk we go into the gruesome details of how we dug through the graveyard + s of console binaries and mausoleums of forgotten network protocols in o + rder to stitch together the pieces necessary to bring our favorite game + Metal Gear Online back to life.\n\nWe will be examining the process of r + everse engineering the games custom network protocols in all angles from + packet logs to low level disassembly of client code. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/5956.html +SUMMARY:Cyber Necromancy +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T134500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T124500 +DTSTAMP;VALUE=DATE-TIME:20150106T214759Z +UID:SkWIxKKgQFunVQAJT_oagA@frab.cccv.de +DESCRIPTION:So you want to author a next Stuxnet (or even cooler than tha + t). Here is the success recipe: forget what you have known about cyber s + ecurity. When an attack transitions from control of a digital system to + control of a physical process\, physics and time become controlling fact + ors instead of the digital rules encoded into your microcontroller.\n\nT + he holly CIA trinity is meaningless in the physical world. The uncontrol + lable but still running process is not really available\; process dynami + cs does not stop simply because the controlling equipment is DoSed\; ele + ctronically segregated components can still communicate over physical me + dia (the process) and a physical phenomenon can be measured terribly wro + ngly (so that the wrong measurement will be proudly delivered to the di + gital application in a totally secure way). Where physics plays a govern + ing role\, IT security concepts are rendered useless. \n\nPlease welcome + a new arrival in the "damn"-frameworks series - Damn Vulnerable Chemica + l Process. Come to the lecture and learn what it takes to exploit a phys + ical process: how to find vulnerabilities and how to exploit them with m + inimal cost and maximum impact. Get astonished about the gazillion of un + certainties you will have to face on your way to disruptive goal and rea + lize that the TIME is ONLY what matters while designing your attack .\n\ + nMake sure to visit local library and refresh your knowledge on physics\ + , chemistry\, mechanics\, control theory\, signal processing and algorit + hms. The lecture will teach you how to apply this knowledge in the excit + ing world of cyber-physical exploitation.\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6463.html +SUMMARY:Damn Vulnerable Chemical Process +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T163000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T160000 +DTSTAMP;VALUE=DATE-TIME:20150106T201855Z +UID:66379bd1-4e68-4bcf-9d1e-0f4c38fbe78e@frab.cccv.de +DESCRIPTION:Im Vortrag wird die technische Umsetzung des Transparenzporta + ls Hamburg vorgestellt. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6582.html +SUMMARY:Das Transparenzportal Hamburg +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T170000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T160000 +DTSTAMP;VALUE=DATE-TIME:20150107T132226Z +UID:Rm1YndV-p_f5_NFEyPZMNA@frab.cccv.de +DESCRIPTION:Die Kritik am Freihandelsabkommen TTIP und CETA auf die Chlor + hühnchen zu beschränken\, greift viel zu kurz. Denn bei den beiden Abkom + men zwischen der EU und den USA und der EU und Kanada steht noch viel me + hr auf dem Spiel. Egal ob Datenschutz\, Demokratie oder Urheberrecht – A + bkommen\, an denen Konzerne unter Ausschluss der Öffentlichkeit mitschre + iben können\, sind selten eine gute Idee. Sitzungsdokumente mit “unverbi + ndlichen” Lobby-Vorschlägen und Leaks der Vertragstexte lassen wenig Gut + es erwarten. Datenschutzstandards laufen Gefahr zu Handelshemmnissen erk + lärt zu werden. Konzerne pochen darauf\, Staaten vor außerstaatlichen Sc + hiedsgerichten auf Schadensersatz verklagen zu können. Was die Bürger wo + llen\, wurde im ganzen Verhandlungsprozess der beiden Freihandelsabkomme + n nicht einmal gefragt. Doch “Klicktivismus” war gestern – neue Strategi + en und Tools halfen dabei\, eine Welle des dezentralen Protests loszutre + ten. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6342.html +SUMMARY:Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T134500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T124500 +DTSTAMP;VALUE=DATE-TIME:20150114T120158Z +UID:yN_BHtGEljjFHh2dl-Irug@frab.cccv.de +DESCRIPTION:The next revolution in data processing is Quantum computing.\ + nThis talk is an entertaining “tour de force” starting with a brief intr + oduction to the fascinating yet strange theories of quantum physics\, th + e concepts of using these in quantum computing and the latest results on + qubits in devices made out of real diamonds.\nIf you want to learn abou + t the machines that decrypt your passwords in the coming years and how y + ou can actually grow diamonds in your microwave oven (and who wouldn’t?) + this talk is for you!\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6157.html +SUMMARY:Diamonds are a quantum computer’s best friend +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T181500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T171500 +DTSTAMP;VALUE=DATE-TIME:20150111T210314Z +UID:L9rFWciMu_GVpHLIhPT9Qg@frab.cccv.de +DESCRIPTION:Im Rahmen meiner Forschungsarbeit "Das Bild im digitalen Wand + el" beschätige ich mich mit der Veränderung der Bilder im Rahmen der Ver + änderung der medialen Anwendung und Vermittlung von Bildern.\nDarüber wü + rde ich gerne sprechen. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6381.html +SUMMARY:Die Krise der Bilder ist die Krise der Politik +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T000000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T230000 +DTSTAMP;VALUE=DATE-TIME:20141231T145803Z +UID:xyADKdXtvEgJWo6eaTmUBQ@frab.cccv.de +DESCRIPTION:Whistleblowing is becoming a progressively popular topic and + ways to technically support anonymous submissions by journalistic source + s are being increasingly discussed and developed. However\, there is muc + h more to protecting sources than the technical side. There is currently + little discussion about the surrounding ethics\, operational security a + nd public protections of sources. Two women that have expertise in all a + reas of source protection\; from submission\, to publication\, to after- + care explain and discuss what source protection really means\, issues th + at have arisen in recent years\, often causing disastrous consequences\, + as well as the important lessons to learn from these and successful cas + es. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6291.html +SUMMARY:Doing right by sources\, done right +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T181500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T171500 +DTSTAMP;VALUE=DATE-TIME:20150114T211618Z +UID:dN7QONPJousa5xBD6XQxgg@frab.cccv.de +DESCRIPTION:In the wake of the Snowden revelations and the explicit targe + tting of address book and buddy list information\, social service provid + ers may wish to actively avoid learning which of its users are friends. + In this talk\, we will introduce the workings of a surprising technolog + y called private information retrieval\, or PIR. Then\, we will describe + its use in DP5\, a new suite of privacy-preserving presence protocols t + hat allow people to determine when their friends are online (and to esta + blish secure communications with them)\, without a centralized provider + ever learning who is friends with whom. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6140.html +SUMMARY:DP5: PIR for Privacy-preserving Presence +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T224500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T214500 +DTSTAMP;VALUE=DATE-TIME:20150113T073825Z +UID:7G4FQIXg2eb7D6F_jNwuxA@frab.cccv.de +DESCRIPTION:This talk will explain how to work with elliptic curves const + ructively to obtain secure and efficient implementations\, and will high + light pitfalls that must be avoided when implementing elliptic-curve cry + pto (ECC). The talk will also explain what all the buzz in curve choices + for TLS is about. This talk does not require any prior exposure to ECC. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6369.html +SUMMARY:ECCHacks +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T170000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T160000 +DTSTAMP;VALUE=DATE-TIME:20150104T183944Z +UID:_kPJG76FUvxbX7Z6h20Gcw@frab.cccv.de +DESCRIPTION:EMET (Enhanced Mitigation Experience Toolkit) is an applicati + on which can be used to further harden a Windows system by adding additi + onal security protections to running processes. These protections includ + e several ROP (Return-Oriented-Programming) checks\, shellcode detection + mechansims\, heap-spray mitigations and many more.\nThe talk covers tec + hniques to bypass EMET 5.1 (the current version) and shows the audience + how hard/easy it is for an attacker to accomplish this. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6161.html +SUMMARY:EMET 5.1 - Armor or Curtain? +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T193000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T183000 +DTSTAMP;VALUE=DATE-TIME:20150115T125208Z +UID:-fw4u4HgOtFUvdKnF7Xrbw@frab.cccv.de +DESCRIPTION:Eine Mietwohnung ist seit circa 20 Jahren verlassen\, ihr Bew + ohner nicht auffindbar. Unveränderte Möblierung\, Ausstattung und persön + liche Hinterlassenschaften sind jedoch noch vorhanden und unberührt.\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6124.html +SUMMARY:ES GIBT VIEL ZU TUN - HAU'N WIR AB. +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T214500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T211500 +DTSTAMP;VALUE=DATE-TIME:20150117T014418Z +UID:aowmh_BVhxN_YNmkQomweQ@frab.cccv.de +DESCRIPTION:The talk gives an overview about the emerging field of smart + glasses and how they can be used to augment our mind (e.g. how to improv + e our brain with technology). The talk will focus mostly on how to quant + ify cognitive tasks in real world environments. I also present a first a + pplication scenarios on how to use smart eyewear (e.g. google glass or J + INS MEME) for short term memory augmentation and cognitive activity reco + gnition.\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6460.html +SUMMARY:Eye Wear Computing +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T224500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T214500 +DTSTAMP;VALUE=DATE-TIME:20150105T100833Z +UID:gRbk7OprwZBqF3cv0NddMQ@frab.cccv.de +DESCRIPTION:We introduce Fernvale\, a reverse-engineered\, open hardware + and software platform based upon Mediatek's MT6260 value phone SoC. The + MT6260 is the chip that powers many of the $10 GSM feature phones produc + ed by the Shanzhai. \n\nFernvale is made available as open-licensed sche + matics\, board layouts\, and an RTOS based upon the BSD-licensed NuttX\, + as well as a suite of open tools for code development and firmware uplo + ad. We discuss our technical reverse engineering efforts\, as well as ou + r methodology to lawfully import IP from the Shanzhai ecosystem into the + Maker ecosystem. We hope to establish a repeatable\, if not labor-inten + sive\, model for opening up previously closed IP of interest\, thereby o + utlining a path to leveling the playing field for lawful Makers.\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6156.html +SUMMARY:Fernvale: An Open Hardware and Software Platform\, Based on the ( + nominally) Closed-Source MT6260 SoC +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T171500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T164500 +DTSTAMP;VALUE=DATE-TIME:20150103T132617Z +UID:0T8GTXjwMVJLM_n5VEuE0A@frab.cccv.de +DESCRIPTION:Using the same stream cipher key twice is known to be a Very + Bad Idea\, but keystream-resuse vulnerabilities are still very much a th + ing of the present - both in legitimate software and in the malware land + scape. We describe a heuristic algorithm which can detect vulnerabilitie + s of this kind. We explain the inner workings of the algorithm and demon + strate a proof-of-concept attack on sevreral examples of vulnerable data + \, including files encrypted by the DirCrypt malware and encrypted traff + ic generated by malware such as variants of Zeus and Ramnit. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6144.html +SUMMARY:Finding the Weak Crypto Needle in a Byte Haystack +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T014500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T001500 +DTSTAMP;VALUE=DATE-TIME:20150113T131300Z +UID:Mw1wjnNzwxzSkM3Ip5Lg0g@frab.cccv.de +DESCRIPTION:Im Format einer lockeren Abendshow werden wir die Nachrichten + -Highlights des Jahres präsentieren\, die Meldungen zwischen den Meldung + en\, die subtilen Sensationen hinter den Schlagzeilen. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6109.html +SUMMARY:Fnord News Show +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T014500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T001500 +DTSTAMP;VALUE=DATE-TIME:20150106T215736Z +UID:74711c06-8813-4158-b102-36dbbe374d13@frab.cccv.de +DESCRIPTION:Im Format einer lockeren Abendshow werden wir die Nachrichten + -Highlights des Jahres präsentieren\, die Meldungen zwischen den Meldung + en\, die subtilen Sensationen hinter den Schlagzeilen. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6606.html +SUMMARY:Fnord News Show (Stream) +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T180000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T173000 +DTSTAMP;VALUE=DATE-TIME:20150110T133525Z +UID:UqfjLnUNKqc6-WzUjP6YQg@frab.cccv.de +DESCRIPTION:The presentation will cover the journey that we have taken to + develop the USB armory board from scratch\, explaining the lessons lear + ned and its prospected applications. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6541.html +SUMMARY:Forging the USB armory +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T123000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T113000 +DTSTAMP;VALUE=DATE-TIME:20150119T235034Z +UID:iWU6RrYVPk7Q-fLuBE-LoQ@frab.cccv.de +DESCRIPTION:For freedom in your own computer\, the software must be free. + \nFor freedom on the internet\, we must organize against\nsurveillance\, + censorship\, SaaSS and the war against sharing. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6123.html +SUMMARY:Freedom in your computer and in the net +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T123000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T113000 +DTSTAMP;VALUE=DATE-TIME:20150119T024906Z +UID:1116a02b-0312-4949-9921-d605148bfccb@frab.cccv.de +DESCRIPTION:How can the physical universe give rise to a mind? I suggest + to replace this confusing question by another one: what kind of informat + ion processing system is the mind\, and how is the mind computed? As we + will see\, even our ideas of the physical universe turn out to be comput + ational. Let us explore some fascinating scenery of the philosophy under + lying Artificial Intelligence. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6573.html +SUMMARY:From Computation to Consciousness +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T000000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T230000 +DTSTAMP;VALUE=DATE-TIME:20150103T141601Z +UID:AvAdq20cdc8iWoNubd6ABw@frab.cccv.de +DESCRIPTION:Maxwell's equations are four differential equations which fo + rm the foundation of classical electrodynamics\, classical optics\, and + electric circuits. This talk will take a look at the connection between + these equations\, wave propagation and antenna arrays.\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6361.html +SUMMARY:From Maxwell to antenna arrays +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T150000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T140000 +DTSTAMP;VALUE=DATE-TIME:20150122T184439Z +UID:H1GEe9l64eUbo1oZXtLkEg@frab.cccv.de +DESCRIPTION:Binary tricks to evade identification\, detection\, to exploi + t encryption and hash collisions. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/5930.html +SUMMARY:Funky File Formats +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T163000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T160000 +DTSTAMP;VALUE=DATE-TIME:20150114T210553Z +UID:1Xe2U3LqTfMTXAvI6hrgxg@frab.cccv.de +DESCRIPTION:Im Grunde sind GIFs Schnee von gestern. Es gibt zahlreiche Al + ternativen\, die das\, was ein GIF kann\, besser können. Und trotzdem ha + ben sich GIFs als Kulturtechnik durchgesetzt. Oder war es nur ein letzte + r Hype vor dem Tod? Wie kommt es\, dass ein Medium\, das schon in den 90 + ern veraltet war\, sich noch zwei Jahrzehnte später bester Beliebtheit e + rfreut? Und was können wir daraus über die Diskrepanz zwischen aktueller + technischer Entwicklung einerseits und der tatsächlichen Nutzung von Te + chnologie andererseits lernen? +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6325.html +SUMMARY:GIFs: Tod eines Mediums. Und sein Leben nach dem Tod. +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T181500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T171500 +DTSTAMP;VALUE=DATE-TIME:20150111T160518Z +UID:Bnz1quB2NHq9BEXoyNm5xQ@frab.cccv.de +DESCRIPTION:Despite claims of its obsolescence\, electrical glitching can + be a viable attack vector against some ICs. This presentation chronicle + s a quest to learn what types of electrical transients can be introduced + into an integrated circuit to cause a variety of circuit faults advanta + geous to an reverser. Several hardware platforms were constructed during + the quest to aid in research\, including old-skool & solderless breadbo + ards\, photo-etched & professional PCBs\, FPGAs\, and cheap & dirty home + made logic analyzers. The strengths and weaknesses of the various approa + ches will be discussed. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6499.html +SUMMARY:Glitching For n00bs +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T184500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T181500 +DTSTAMP;VALUE=DATE-TIME:20141130T192225Z +UID:KNu4tX4NRJCFiFCsIh-FxA@frab.cccv.de +DESCRIPTION:An update to our Reports from the Frontlines talk at OHM 2013 + \, we will provide the latest stories and figures from Access' digital s + ecurity helpline that provides security incident response and technical + support to civil society groups and human rights defenders around the wo + rld. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6399.html +SUMMARY:Global Civil Society Under Attack +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T021500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T001500 +DTSTAMP;VALUE=DATE-TIME:20150115T114811Z +UID:Ls3UZdXbRpTYhYncqSJN_w@frab.cccv.de +DESCRIPTION:Beim Googlequiz spielen max. 7 Teams mit je max. 7 Spielern g + egeneinander. Sie dürfen dabei nicht Google benutzen. Es ist eine recht + spaßorientierte Angelegenheit\, so dass auch Zuschauer willkommen sind. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6226.html +SUMMARY:Googlequiz – 2015er Edition +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T180000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T173000 +DTSTAMP;VALUE=DATE-TIME:20150102T210529Z +UID:n8k2uElFR872zYbrs7kycQ@frab.cccv.de +DESCRIPTION:Ethics in Computer Science is now finally gaining some well d + eserved attention. At the University of Amsterdam\, we have started an + ethical committee for the System and Network Engineering Master. In this + talk we describe how and why we started this committee\, and also look + back at our first results. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6071.html +SUMMARY:Hacking Ethics in Education +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T000000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T233000 +DTSTAMP;VALUE=DATE-TIME:20150105T002505Z +UID:V_yKfMGBUgnu6g90YF-iBA@frab.cccv.de +DESCRIPTION:Extending the common 3-space-to-2-space projections to 4D and + higher and how certain types of fractals can be presented using these e + xpansions. After that we'll have a closer look at Fractal Flames as used + in Electric Sheep. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6072.html +SUMMARY:Higher-Dimensional Geometry and Fractals +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T170000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T160000 +DTSTAMP;VALUE=DATE-TIME:20150106T195616Z +UID:0CpZm9-0S1ja92XDOICX0Q@frab.cccv.de +DESCRIPTION:An introduction to the Robot Operating System (ROS) for the h + ome/hackerspace roboticist (if it physically interacts with the world th + rough code\, call it robot). +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6077.html +SUMMARY:How I Learned to Stop Reinventing and Love the Wheels +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T213000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T203000 +DTSTAMP;VALUE=DATE-TIME:20150122T130128Z +UID:A8xVpIjX1oKQOQcWMt_49Q@frab.cccv.de +DESCRIPTION:Bei der Passworteingabe über die Schultern schauen? Die Matef + lasche klauen\, um an Fingerabdrücke zu kommen? Alles Technik von gester + n. Der Vortrag zeigt\, wie man heutzutage an Daten kommt\, um Authentifi + zierungsmethoden zu überwinden. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6450.html +SUMMARY:Ich sehe\, also bin ich ... Du +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T210000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T203000 +DTSTAMP;VALUE=DATE-TIME:20150106T203559Z +UID:Lt7ABZNFLzAgdiGcpHPHUQ@frab.cccv.de +DESCRIPTION:Die interessantesten IFG-Geschichten des Jahres mit Anfragen + und Ablehnungen\, Klagen und Kampagnen. Außerdem: wie wir mit Hilfe des + Journalismus der Informationsfreiheit neuen Antrieb geben werden! +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6366.html +SUMMARY:IFG – Mit freundlichen Grüßen +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T000000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T233000 +DTSTAMP;VALUE=DATE-TIME:20150107T132045Z +UID:rSiFVNguzdBmx13Lb-gobg@frab.cccv.de +DESCRIPTION:This speech about how the hacker scene is failing its own ide + als and what questions must be addressed to make a real difference. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6205.html +SUMMARY:Infocalypse now: P0wning stuff is not enough +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T180000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T173000 +DTSTAMP;VALUE=DATE-TIME:20150102T214512Z +UID:lWgvj2btOjK-_XxUtIs-qw@frab.cccv.de +DESCRIPTION:Simple access to social media and cell phone has widely been + accepted as a positive tool for citizens to voice dissatisfaction with t + heir government and coordinate protest. But why would rulers permit thes + e tools if they merely pose a threat to their own survival? This talk wi + ll investigate how a government’s ability to censor and limit the flow o + f information feeds into its choice of violent responses to protest. I w + ill talk about the conditions under which a government is likely to bene + fit more from surveilling the free flow of information\, and under which + conditions it is more likely to benefit from censorship. \n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6358.html +SUMMARY:Information Control and Strategic Violence +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T224500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T214500 +DTSTAMP;VALUE=DATE-TIME:20150122T130643Z +UID:78e2d419-0adc-43ff-989e-95a78ac9ddd4@frab.cccv.de +DESCRIPTION:Of all the NSA's Cold War listening posts\, their intelligenc + e facility on top of Berlin's Teufelsberg was their most secretive. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6585.html +SUMMARY:Inside Field Station Berlin Teufelsberg +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T193000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T190000 +DTSTAMP;VALUE=DATE-TIME:20150112T224316Z +UID:qRQclNxyOV7ZYPwbrXrw1Q@frab.cccv.de +DESCRIPTION:A toilet is a toilet is a toilet ... was a toilet. Nowadays h + ackers discover a larger interest in doing more with toilets then just w + hat they were designed for in the first place. Within the "Internet of t + hings" scene the sanitarian sphere claims a place of its own. This talk + will present current projects\, technologies used and research published + . +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6370.html +SUMMARY:Internet of toilets +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T171500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T164500 +DTSTAMP;VALUE=DATE-TIME:20150107T131618Z +UID:rHjqtfbslD_ucUr8kW5wcQ@frab.cccv.de +DESCRIPTION:The chronicles of reversing the Iridium pager system. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6236.html +SUMMARY:Iridium Pager Hacking +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T150000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T124500 +DTSTAMP;VALUE=DATE-TIME:20150112T160813Z +UID:7bdbb7a1-63f2-400f-97a1-d7abfc455f73@frab.cccv.de +DESCRIPTION:Auch das Jahr 2014 geht irgendwann vorbei. Deshalb werfen wir + einen Blick zurück auf die für uns besonders relevanten Themen und vers + uchen abzuschätzen\, was im Jahr 2015 auf uns zukommen könnte. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6583.html +SUMMARY:Jahresrückblick des CCC +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T193000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T183000 +DTSTAMP;VALUE=DATE-TIME:20150110T000627Z +UID:0a06acd5-709e-4bba-9444-e71f78cd2094@frab.cccv.de +DESCRIPTION:Im September 2014 fand die Veranstaltung Jugend hackt statt: + Ein Wochenende Hacken\, Basteln und Programmieren mit 120 computerbegeis + terten Jugendlichen. Wir als Organisatorinnen und Teilnehmer wollen von + dem Event erzählen und unsere Erfahrungen teilen. Der Talk richtet sich + gleichermaßen an Jugendliche\, die sich für's Hacken begeistern\, als au + ch an alle\, die sich für Code Literacy\, Medienpädagogik oder den IT-Na + chwuchs interessieren. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6559.html +SUMMARY:Jugend hackt +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T171500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T164500 +DTSTAMP;VALUE=DATE-TIME:20150110T215253Z +UID:oBQMMNfX5t-5TBIk3z6pOg@frab.cccv.de +DESCRIPTION:(K)ein kleiner Rant über Elliptische Kurven\, Quantencomputer + \, Bitcoins und die NSA et al. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6295.html +SUMMARY:Krypto für die Zukunft +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T134500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T124500 +DTSTAMP;VALUE=DATE-TIME:20150105T101046Z +UID:_jFN0YWHACogrN4ddVWK0Q@frab.cccv.de +DESCRIPTION:I will explain why quantum computing is interesting\, how it + works and what you actually need to build a working quantum computer. I + will use the superconducting two-qubit quantum processor I built during + my PhD as an example to explain its basic building blocks. I will show h + ow we used this processor to achieve so-called quantum speed-up for a se + arch algorithm that we ran on it. Finally\, I will give a short overview + of the current state of superconducting quantum computing and Google's + recently announced effort to build a working quantum computer in coopera + tion with one of the leading research groups in this field. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6261.html +SUMMARY:Let's build a quantum computer! +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T150000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T140000 +DTSTAMP;VALUE=DATE-TIME:20150114T205836Z +UID:4_Q4s48yg8FV08kvf9lbpQ@frab.cccv.de +DESCRIPTION:As we've called for widespread use of HTTPS\, the cost and co + mplexity of the certificate system has been an obstacle. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6397.html +SUMMARY:Let's Encrypt +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T150000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T140000 +DTSTAMP;VALUE=DATE-TIME:20150104T182812Z +UID:BhRiQWa_rOqEw5k-l4GRXg@frab.cccv.de +DESCRIPTION:The talk is about our project to develop software and hardwar + e tools for a fair and environment friendly garment and textile producti + on and how we break down the locks that exists on every level in the ind + ustry from design\, to software\, machines and distribution. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6447.html +SUMMARY:Let’s build our own personalized open textile production line +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T150000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T124500 +DTSTAMP;VALUE=DATE-TIME:20150102T121746Z +UID:c3efec0b-cfb1-4e59-88fd-f519dd31d9a6@frab.cccv.de +DESCRIPTION:Lightning Talks are short lectures (almost) any congress part + icipant may give! Bring your infectious enthusiasm to an audience with a + short attention span! Discuss a program\, system or technique! Pitch yo + ur projects and ideas or try to rally a crew of people to your party or + assembly! Whatever you bring\, make it quick! +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6563.html +SUMMARY:Lightning Talks Day 2 +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T150000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T124500 +DTSTAMP;VALUE=DATE-TIME:20141231T084320Z +UID:e46101e6-3114-4d5a-a09a-c70d4bfb4fec@frab.cccv.de +DESCRIPTION:Lightning Talks are short lectures (almost) any congress part + icipant may give! Bring your infectious enthusiasm to an audience with a + short attention span! Discuss a program\, system or technique! Pitch yo + ur projects and ideas or try to rally a crew of people to your party or + assembly! Whatever you bring\, make it quick! +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6579.html +SUMMARY:Lightning Talks Day 3 +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T150000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T124500 +DTSTAMP;VALUE=DATE-TIME:20141231T084141Z +UID:f69efb76-d030-4371-83e1-d7b2b8d408b9@frab.cccv.de +DESCRIPTION:Lightning Talks are short lectures (almost) any congress part + icipant may give! Bring your infectious enthusiasm to an audience with a + short attention span! Discuss a program\, system or technique! Pitch yo + ur projects and ideas or try to rally a crew of people to your party or + assembly! Whatever you bring\, make it quick! +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6580.html +SUMMARY:Lightning Talks Day 4 +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T210000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T203000 +DTSTAMP;VALUE=DATE-TIME:20150106T200642Z +UID:4f9TGtkPJafH9LU7RqsZnw@frab.cccv.de +DESCRIPTION:During World War I\, homing pigeons were used to carry messag + es and take photographs over enemy territory. Today\, experiments are be + ing conducted to remote-control insects for similar purposes.\nThis talk + intends to give an overview of 100 years of living drones\, speculate o + n future developments in the field\, and question the ethical implicatio + ns of the practice. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6275.html +SUMMARY:Living Drones +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T171500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T164500 +DTSTAMP;VALUE=DATE-TIME:20150102T203131Z +UID:oN5AzdecYPpDFbE3nkJZFg@frab.cccv.de +DESCRIPTION:Referring to the seminal talk Dymaxion gave at the closing of + the NoisySquare at OHM in 2013. This talk will explore what has happene + d and what has not in the mean time on the "battle ground". An overview + will be presented on the technical\, legal\, political and social battle + s going on and will provide pointers to further tactics. Finally we will + look at how to make sure we keep ourselves safe and sane. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6406.html +SUMMARY:Long war tactics +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T123000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T113000 +DTSTAMP;VALUE=DATE-TIME:20150107T132349Z +UID:uJGVeWdNzwr_8AvAXa2DKA@frab.cccv.de +DESCRIPTION:Capturing the splash of a water balloon\, the snap of a mouse + trap or the impact of a bullet results in exciting pictures. Best of al + l\, it doesn't require expensive equipment. This talk covers the theory + of high speed photography\, the required hardware\, microcontroller hack + ing and setting up an improvised studio in the shower. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/5943.html +SUMMARY:Low Cost High Speed Photography +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T231500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T224500 +DTSTAMP;VALUE=DATE-TIME:20150104T220122Z +UID:ejFaY7sUr4WTs1tajM9JOQ@frab.cccv.de +DESCRIPTION:How do garage gate remotes work?\nIt turns out the ones from + MegaCode simply send a individual fixed code.\nAnd with little efforts i + f was possibly to clone them\, send arbitrary codes\, and record them al + l. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6462.html +SUMMARY:MegaCode to facility gates +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T181500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T171500 +DTSTAMP;VALUE=DATE-TIME:20150108T034730Z +UID:sAZoeOc6Qu4bMPxrU8yEpw@frab.cccv.de +DESCRIPTION:Der Vortrag bietet eine sprachwissenschaftlich informierte Pe + rspektive auf den Informationskrieg mit Fokus auf operative Kommunikatio + n in sozialen Medien. Am Beispiel eines selbst entwickelten Bots werden + wir linguistische Prozeduren zur Manipulation von Kommunikation mit dem + Ziel der Beeinflussung von Wissen\, Werten\, Gefühlen und Handlungsdispo + sitionen vorstellen. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6184.html +SUMMARY:Mein Bot\, der Kombattant +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T213500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T203500 +DTSTAMP;VALUE=DATE-TIME:20150119T195528Z +UID:xvPazrSLJdMwzpnphpOEIQ@frab.cccv.de +DESCRIPTION:While graph databases are primarily known as the backbone of + the modern dating world\, this nerd has found a much more interesting ap + plication for them: program analysis. This talk aims to demonstrate that + graph databases and the typical program representations developed in co + mpiler construction are a match made in heaven\, allowing large code bas + es to be mined for vulnerabilities using complex bug descriptions encode + d in simple\, and not so simple graph database\nqueries. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6534.html +SUMMARY:Mining for Bugs with Graph Database Queries +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T150000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T140000 +DTSTAMP;VALUE=DATE-TIME:20150122T130043Z +UID:419d4f7e-7506-4d46-8700-e47e164a8e32@frab.cccv.de +DESCRIPTION:Ein Mahnmal gegen die Vereinten Nationen\, 25.000 Euro Kopfge + ld auf eine\ndeutsche Waffenhändlerfamilie\, eine falsche Kampagne für d + as\nFamilienministerium oder die Flucht der "Mauerkreuze" vom Reichstags + ufer\nan die EU-Außengrenzen: wenn das Zentrum für Politische Schönheit + (ZPS)\ndas Kriegsbeil ausgräbt\, ist eine kontroverse Debatte garantiert + . +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6584.html +SUMMARY:Mit Kunst die Gesellschaft hacken +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T193000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T183000 +DTSTAMP;VALUE=DATE-TIME:20150118T105006Z +UID:szHEwO2pazLIG7w8wQTa1w@frab.cccv.de +DESCRIPTION:We know that mobile networks can — and do — attack us on many + fronts. As this talk will show\, even 3G is attackable. It’s high time + that we upgrade from complaining to self-defense. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6122.html +SUMMARY:Mobile self-defense +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T180000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T173000 +DTSTAMP;VALUE=DATE-TIME:20150106T200843Z +UID:8283fa4f-a6eb-4296-a6a8-20c3f9d80a4c@frab.cccv.de +DESCRIPTION:Mr Beam was started as a hobby project aiming to get more exp + erience in 3D printing. For fun we put it on Kickstarter and ended up in + kind of a roller coaster. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6589.html +SUMMARY:Mr Beam goes Kickstarter +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T224500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T214500 +DTSTAMP;VALUE=DATE-TIME:20150103T223719Z +UID:1lKbMS92kS0J0pQAAO6XZA@frab.cccv.de +DESCRIPTION:Our talk will highlight the current debates surrounding net n + eutrality in Europe\, the United States and other parts of the world. We + will look at the results of the Sa + veTheInternet.eu campaign which was lunched a year ago on 30c3. We w + ill discuss various legal protections for net neutrality\, look closer a + t the experience of the Netherlands and we will give an overview of all + important open ends of the debate. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6170.html +SUMMARY:net neutrality: days of future past? +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T170000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T160000 +DTSTAMP;VALUE=DATE-TIME:20150103T143335Z +UID:87b8f1ba-1f05-46c2-93ac-b575bbc9fb4f@frab.cccv.de +DESCRIPTION:When the Internet was designed\, it was thought to be meadows + full of daisies. As we now know\, it's a dark place\, where communicati + on is monitored and subverted. This session presents both developments i + n known solutions\, as well as novel suggestions\, to liberally apply cr + ypto to improve the foundations of Internet communications. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6597.html +SUMMARY:Now I sprinkle thee with crypto dust +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T123000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T113000 +DTSTAMP;VALUE=DATE-TIME:20150111T231804Z +UID:Z4htibNZxLewwCmPKSdeqA@frab.cccv.de +DESCRIPTION: - Station VIENNA in der US-Botschaft 1090 Wien\n- VIENNA A + NNEX beim UNO-Sitz in Wien 1220\n- Legacy Standort „NSA-Villa“ Wien 118 + 0 \n- Relaystation Exelberg\,Breitbandnetz von NSA/SCS über Wien \n- E + quipment und Funktion der FORNSAT-Station Königswarte. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6430.html +SUMMARY:NSA Points of Presence in AT +LOCATION:Saal 2 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T185500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T181500 +DTSTAMP;VALUE=DATE-TIME:20150104T183410Z +UID:1J0sEDUwTplMXgNU2Q7hrw@frab.cccv.de +DESCRIPTION:leading hackers and researchers\nfrom the worldwide hackerspa + ce\, \nuniversitiy\, and DIY artist community\, \nexplain current techno + logical \npossibilites in BCI\, \n\nand show ways\nto use open source \n + hardware and software \nfor hackers\, makers\, artists\, \npersonal deve + lopment\, citizen science\, \n\nproviding a framework\nfor alternative c + ulture and free expression \nbalancing the soon coming commercial expans + ion \nin "Neurogaming"\, "Neuromarketing" and "eHealth" \n\ntalk will il + lustrate \nthe mutually beneficial relationship \nbetween "hacking" and + science\, \nwith the example of hacking BCIs\, \n\nas well as an overvie + w into the new field\nof "BCI Mind-Hacking"\, such as exploiting \nremot + e consumer Neuroheadsets\, \nand Data-Mining the human-brain \nfor sensi + tive data during casual use.\n\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6148.html +SUMMARY:Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T170000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T160000 +DTSTAMP;VALUE=DATE-TIME:20150102T193056Z +UID:E95sP8WH8tLiiJj2SBAA1A@frab.cccv.de +DESCRIPTION:At 28C3 we introduced the very first steps of the osmo-gmr pr + ojects. During this talk\, we will present the various advances that hav + e been made in this project on various aspects (voice codec\, crypto alg + orithm\, ...) +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6267.html +SUMMARY:osmo-gmr: What's up with sat-phones ? +LOCATION:Saal G +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T170000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T160000 +DTSTAMP;VALUE=DATE-TIME:20150116T195509Z +UID:TvC3Zh1wVU8NotOjslV57Q@frab.cccv.de +DESCRIPTION:We are the PayPal 14. For the last several years we've been r + estricted in what we could or couldn't say about our court case. Our sen + tencing is on December 4th\, ending the legal restrictions on what we ca + n share about our story. +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6377.html +SUMMARY:Paypals War on Terror +LOCATION:Saal 1 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T134500 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T124500 +DTSTAMP;VALUE=DATE-TIME:20150111T231708Z +UID:NjtxGgpt76NkFb1Q4LLjvg@frab.cccv.de +DESCRIPTION:In the post-NSA world it is important to understand the magni + tude of our online activities in order to take informative decisions on + our ubiquitous shared lives.\n\nPersonal Tracking Devices is the result + of a two years long study on tracking technologies and the inherent natu + re of the web and telecommunication networks in general.\n\nThe study\, + conducted as part of Ph.D. research in privacy and security at UPC Barce + lona Tech\, collected a large amount of metadata to raise awareness on t + he footprints left by users on the web and through mobile apps.\n +URL:http://events.ccc.de/congress/2014/Fahrplan/events/6100.html +SUMMARY:Personal Tracking Devices and Online Identity +LOCATION:Saal 6 +END:VEVENT +BEGIN:VEVENT +DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T170000 +DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T160000 +DTSTAMP;VALUE=DATE-TIME:20150107T131615Z +UID:J9UXjl3ggsIGnkIJSxSxmw@frab.cccv.de +DES