{
    "schedule": {
        "version": "Voltron 3.1 2.1 1.5 MemoryRefreshV1.3 1.2.4", 
        "base_url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/", 
        "conference": {
            "acronym": "35c3", 
            "title": "35th Chaos Communication Congress", 
            "start": "2018-12-27", 
            "end": "2018-12-30", 
            "daysCount": 4, 
            "timeslot_duration": "00:10", 
            "days": [
                {
                    "index": 1, 
                    "date": "2018-12-27", 
                    "day_start": "2018-12-27T11:00:00+01:00", 
                    "day_end": "2018-12-28T03:00:00+01:00", 
                    "rooms": {
                        "Adams": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9985.html", 
                                "id": 9985, 
                                "guid": "15f4e5c5-40e1-4c73-8da0-4cc2a773ab13", 
                                "logo": null, 
                                "date": "2018-12-27T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "00:30", 
                                "room": "Adams", 
                                "slug": "35c3-9985-opening_event", 
                                "title": "Opening Event", 
                                "subtitle": "35C3: Refreshing Memories", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Hier geht es los.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8759, 
                                        "public_name": "rufus"
                                    }, 
                                    {
                                        "id": 5638, 
                                        "public_name": "rixx"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10021.html", 
                                "id": 10021, 
                                "guid": "9dde571b-4d49-4b44-8329-42e354bcc24b", 
                                "logo": null, 
                                "date": "2018-12-27T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-10021-the_precariat_a_disruptive_class_for_disruptive_times", 
                                "title": "The Precariat: A Disruptive Class for Disruptive Times.", 
                                "subtitle": "Why and How the Precariat will define the Global Transformation to save our planet.", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The combination of the ongoing technological revolution, globalisation and what are usually called 'neo-liberal' economic policies has generated a global system of rentier capitalism in which property rights have supplanted free market principles and in which a new global class structure has taken shape. The 20th century income distribution system has broken down irretrievably, and a new mass class, the precariat has been growing dramatically fast in every part of the world. What are the deeper reasons for these developments? How does an ecologically sustainable strategy look like? Is it possible to restore a balanced market economy in which inequalities and insecurities will lessen and in which the drift to populist and even neo-fascist politics will be reversed? This talk will try to provide answers.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8785, 
                                        "public_name": "Guy Standing"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9917.html", 
                                "id": 9917, 
                                "guid": "87083bf8-f1e8-433d-8b51-ffece756bbd7", 
                                "logo": null, 
                                "date": "2018-12-27T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9917-election_cybersecurity_progress_report", 
                                "title": "Election Cybersecurity Progress Report", 
                                "subtitle": "Will the U.S. be ready for 2020?", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Recent attacks against elections in the U.S. and Europe demonstrate that nation-state attackers are becoming more aggressive, even as campaigning and voting are becoming increasingly reliant on computers.  How much has changed since 2016, when the U.S. experienced unprecedented attacks on its election infrastructure?  What has to happen to ensure that the 2020 presidential election is secure?  In this talk, I'll give a progress report on election security in the U.S. and around the world, informed by results from my own research and my work with legislators and election officials over the past two years.  I'll also hold a mock election with a current U.S. voting machine to demonstrate how cyberattacks on election infrastructure could potentially change the results of national elections.  Finally, I'll explain what everyone can do to get involved and help safeguard the foundations of democracy.\r\n", 
                                "description": "Strengthening election cybersecurity is essential for safeguarding democracy. For over 15 years, I and other computer scientists have been warning about the vulnerable state of election security, but attacks against recent elections in the U.S. and Europe demonstrate that sophisticated attackers are becoming more aggressive, even as campaigning and voting become increasingly reliant on computers.\r\n \r\nSince 2016, I\u2019ve been working with election officials and members of congress to strengthen election cybersecurity.  In this talk, I\u2019ll give a progress report about what\u2019s happened since then and what still needs to happen to secure future elections.  While many U.S. states have made progress at securing some aspects of their election infrastructure, and Congress provided $380M in new funding to the strengthen elections, significant vulnerabilities remain that put the integrity of future elections at risk.  To demonstrate the ongoing threat, I\u2019ll hold a mock election on stage with a real U.S. voting machine still used in 18 states, and show how remote attacks could potentially affect the outcome of a close national contest.\r\n \r\nFinally, I\u2019ll explain how defenses developed by researchers over the past decade could provide practical and cost-effective safeguards.  Unfortunately, they have yet to be widely deployed due to a lack of resources and political leadership.  I\u2019ll describe legislative efforts in the U.S. and other countries that could, if successful, go a long way to making elections secure.  I\u2019ll also explain what technologists and other concerned humans can do to help secure elections at all levels.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4228, 
                                        "public_name": "J. Alex Halderman"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/653/original/Election_Cybersecurity_Progress_Report_%2835c5__December_2018%29.pdf?1545925095", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9647.html", 
                                "id": 9647, 
                                "guid": "9629fcf4-6810-48d7-bd17-d81f924e6b47", 
                                "logo": "/system/events/logos/000/009/647/large/rems_logo.png?1542841646", 
                                "date": "2018-12-27T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9647-taming_the_chaos_can_we_build_systems_that_actually_work", 
                                "title": "Taming the Chaos: Can we build systems that actually work?", 
                                "subtitle": "Possible paths from today's ghastly hackery to what computing should be", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "We rely on mainstream computer engineering every day, but it's insanely complex, poorly understood, unreliable, and, as CCC reminds us every year, chronically insecure.  This talk will explain some ways that we can do better: taming parts of this this chaos with precise understanding - illustrated with disturbing facts and clean models for current architectures and the C language, from the <a href=\"https://www.cl.cam.ac.uk/~pes20/rems/\">REMS</a> project, and principled but pragmatic new alternatives, that build in more hardware and software security protection,as developed in the <a href=\"https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/\">CHERI</a> project.", 
                                "description": "Computing has been massively successful, and we routinely trust computer systems with our personal, financial, medical, commercial, and governmental information. But at the same time, these systems are pervasively prone to security flaws and subject to malicious attacks.  We have to trust them, but they are not *trustworthy*.\r\n\r\nThere are two root causes. First, the pan-industry computing infrastructure, of processors, programming languages, and operating systems, is based on designs from a more forgiving time, with simpler systems and little incentive to design-in strong security protection. Second, the conventional engineering techniques we use (prose specifications, manually written tests, and test-and-debug development) are good enough to make systems work in common cases, but cannot exclude all errors - and a single coding error can lead to a devastating exploit.\r\n\r\nAre we doomed?  Perhaps not.  This talk will highlight the sorry state of the art and then draw on cutting-edge research, from the University of Cambridge, SRI International, ARM, and other partners, to show some ways we can do better.  First, we'll show how it's become possible to build and use rigorous models for key existing interfaces to improve engineering: for the ARMv8-A and RISC-V architectures, and the C language, in the <a href=\"https://www.cl.cam.ac.uk/~pes20/rems/\">REMS</a> project.  Then we'll describe a principled but pragmatic path to build in more hardware and software security protection to future systems, as developed in the <a href=\"https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/\">CHERI</a> project.  These are joint work by many people over the last 10 years.\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5247, 
                                        "public_name": "Peter Sewell"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.cl.cam.ac.uk/~pes20/rems/", 
                                        "title": "REMS"
                                    }, 
                                    {
                                        "url": "https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/", 
                                        "title": "CHERI"
                                    }, 
                                    {
                                        "url": "http://www.cl.cam.ac.uk/~pes20/sail/", 
                                        "title": "Sail ISA Description Language and Models"
                                    }, 
                                    {
                                        "url": "https://www.cl.cam.ac.uk/~pes20/cerberus/", 
                                        "title": "Cerberus C Semantics"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9491.html", 
                                "id": 9491, 
                                "guid": "51ede2da-0f9b-4984-bd58-659c556d20c9", 
                                "logo": "/system/events/logos/000/009/491/large/logo.svg.png?1538557991", 
                                "date": "2018-12-27T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9491-hunting_the_sigfox_wireless_iot_network_security", 
                                "title": "Hunting the Sigfox: Wireless IoT Network Security", 
                                "subtitle": "Dissecting the radio protocol of Sigfox, the global cellular network for the IoT you have probably never heard of", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "<a href=\"https://www.sigfox.com/\">Sigfox</a> is an emerging low-power wide-area network (LP-WAN) technology for IoT devices, comparable to <a href=\"https://lora-alliance.org/\">LoRa</a>.\r\n\r\nThis talk recounts my analysis of Sigfox's radio protocol and presents an open reference implementation of an alternative Sigfox protocol stack.\r\n\r\nIt confirms that while Sigfox ensures authenticity and integrity, transmitted payloads are not confidential.\r\n\r\nThis presentation is targeted at a technical audience with some basic knowledge of cryptography (security goals, AES), but <b>no</b> knowledge in RF technology (modulation, scrambling, error correction) is required.", 
                                "description": "<p>Sigfox can be compared to a cellular network, but for mostly battery-powered IoT devices that don't need to transmit much data. While <a href=\"https://www.etsi.org/deliver/etsi_gs/LTN/001_099/003/01.01.01_60/gs_LTN003v010101p.pdf\">some</a> <a href=\"https://www.sigfox.com/en/sigfox-iot-technology-overview\">sparse</a> <a href=\"https://tools.ietf.org/html/draft-zuniga-lpwan-sigfox-system-description-04\">details</a> on Sigfox's architecture and <a href=\"https://www.sigfox.com/sites/default/files/1701-SIGFOX-White_Paper_Security.pdf\">its security</a> have been published and <a href=\"https://www.disk91.com/2017/technology/sigfox/the-sigfox-radio-protocol/\">some basic reverse engineering has been carried out</a>, most of the protocol specifications remain proprietary and closed, so by now, no independent security audit was performed. Advertised use cases of Sigfox include air quality monitoring, weather stations, utilities metering and tracking farm animals. In this talk, I illustrate why these applications are fine, but why one might not want to track a money transporter with Sigfox or base a home alarm system on it.</p>\r\n\r\n<p>The Sigfox network is very atypical, with uplink and downlink based on different physical layers.\r\nAfter a short introduction, I begin the presentation by taking a deep dive into Sigfox's radio protocol with a focus on its Security. Basics of radio technology (SDRs, ultra-narrow band (UNB) modulation, SRD bands) and techniques for analyzing protocols are briefly summarized and the uplink's and downlink's frame structures are presented.</p>\r\n\r\n<p>Subsequently, I show how a radio sniffer that has captured Sigfox messages can extract the uplink's and downlink's contents. While the uplink's payload is already contained in plaintext, the downlink is scrambled, but I indicate how the downlink's pseudorandom whitening sequence used for scrambling can be generated or brute-forced by an eavesdropper. Moreover, I outline attacks that could even compromise Sigfox's authenticity checking.</p>\r\n\r\n<p>Finally, I provide some suggestions on how to improve Sigfox's security.</p>\r\n\r\n<p>The reference implementation of an alternative Sigfox protocol stack &quot;librenard&quot; that was created as part of this work as well as reconstructed protocol specifications detailing the uplink and significant portions of the downlink protocol will be published immediately after this talk.</p>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8179, 
                                        "public_name": "Florian Euchner (Jeija)"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9386.html", 
                                "id": 9386, 
                                "guid": "527b56af-8d56-4edb-9027-9ca60767c742", 
                                "logo": "/system/events/logos/000/009/386/large/i2DL.jpg?1544387802", 
                                "date": "2018-12-27T17:10:00+01:00", 
                                "start": "17:10", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9386-introduction_to_deep_learning", 
                                "title": "Introduction to Deep Learning", 
                                "subtitle": "", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "This talk will teach you the fundamentals of machine learning and give you a sneak peek into the internals of the mystical black box. You'll see how crazy powerful neural networks can be and understand why they sometimes fail horribly.", 
                                "description": "Computers that are able to learn on their own. It might have sounded like science-fiction just a decade ago, but we're getting closer and closer with recent advancements in Deep Learning. Or are we?\r\n\r\nIn this talk, I'll explain the fundamentals of machine-learning in an understandable and entertaining way. I'll also introduce the basic concepts of deep learning. With the current hype of deep learning and giant tech companies spending billions on research, understanding how those methods works, knowing the challenges and limitations is key to seeing the facts behind the often exaggerated headlines.\r\n\r\nOne of the most common applications of deep learning is the interpretation of images, a field that has been transformed significantly in recent years. Applying neural networks to image data helps visualising and understanding many of the faults as well as advantages of machine learning in general. As a research scientist in the field of automated analysis of bio-medical image data, I can give you some insights into these as well as some real-world applications.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8117, 
                                        "public_name": "teubi"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.nussschale-podcast.de", 
                                        "title": "Nussschale Podcast"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/647/original/i2DL_Slides.pdf?1545916065", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10011.html", 
                                "id": 10011, 
                                "guid": "686c1387-e761-4df6-b395-f9ddf92d46e7", 
                                "logo": null, 
                                "date": "2018-12-27T18:10:00+01:00", 
                                "start": "18:10", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-10011-hackerethik_-_eine_einfuhrung", 
                                "title": "Hackerethik - eine Einf\u00fchrung", 
                                "subtitle": "Verantwortung und Ethik beim sch\u00f6pferisch-kritischen Umgang mit Technologie", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Die Hackerethik ist die Grundlage f\u00fcr den Umgang mit den diversen ethischen Problemen, die sich beim sch\u00f6pferisch-kritischen Umgang mit Technologie (auch \"hacking\" genannt) stellen. ", 
                                "description": "Die Hackerethik ist die Grundlage f\u00fcr den Umgang mit den diversen ethischen Problemen, die sich beim sch\u00f6pferisch-kritischen Umgang mit Technologie (auch \"hacking\" genannt) stellen. Sie bietet Anhaltspunkte f\u00fcr die allt\u00e4glichen Fragestellungen und Probleme, die aufkommen, wenn man Technologie anders benutzt, als der Hersteller es sich gedacht hat, wenn man L\u00fccken in Systemen findet und ausnutzt oder \u00fcber Berge von pers\u00f6nlichen Daten stolpert. Dieser Talk gibt eine Einf\u00fchrung in die verschiedenen Aspekte der Hackerethik und regt zum Nachdenken \u00fcber die ethischen Fragen an, die sich Menschen mit speziellen F\u00e4higkeiten und Fertigkeiten stellen, wenn sie ihren Neigungen nachgehen. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 1633, 
                                        "public_name": "frank"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9545.html", 
                                "id": 9545, 
                                "guid": "ea7c532f-cc2d-4cb1-8f15-1933df7fd523", 
                                "logo": null, 
                                "date": "2018-12-27T19:10:00+01:00", 
                                "start": "19:10", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9545-venenerkennung_hacken", 
                                "title": "Venenerkennung hacken", 
                                "subtitle": "Vom Fall der letzten Bastion biometrischer Systeme", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Die Venenerkennung ist eine der letzten Bastionen biometrischer Systeme, die sich bisher der Eroberung durch Hacker widersetzt hat. Dabei ist sie ein lohnendes Ziel, sch\u00fctzt sie doch Bankautomaten und Hochsicherheitsbereiche. In diesem Talk machen wir die Verteidigungsanlagen dem Erdboden gleich.", 
                                "description": "Seit Jahrzehnten vor allem im asiatischen Raum eingesetzt sind bisher keine ernsthaften Versuche bekannt Venenerkennungssysteme zu \u00fceberwinden. Neben dem Mythos der Hochsicherheit sind vor allem die, unsichtbar im K\u00f6rper gelegenen Merkmale daf\u00fcr verantwortlich. In diesem Talk werden wir zeigen, mit welch geringem Aufwand man an die \"versteckten\" Venenbilder gelangen kann und wie, auf Grundlage dieser, Attrappen gebaut werden k\u00f6nnen, welche die Systeme der beider grosser Hersteller \u00fcberwinden.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 1623, 
                                        "public_name": "starbug"
                                    }, 
                                    {
                                        "id": 8381, 
                                        "public_name": "Julian"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/734/original/1812-congress.pdf?1546876965", 
                                        "title": "slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10016.html", 
                                "id": 10016, 
                                "guid": "f010dc03-13bc-413d-95ec-e8786626a2f1", 
                                "logo": null, 
                                "date": "2018-12-27T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-10016-g10_bnd-gesetz_und_der_effektive_schutz_vor_grundrechten", 
                                "title": "G10, BND-Gesetz und der effektive Schutz vor Grundrechten", 
                                "subtitle": "Die strategische Fernmelde\u00fcberwachung des BND vor dem Bundesverfassungsgericht", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Der Vortrag behandelt die Klage des Internetknotens DE-CIX gegen die strategische Fernmelde\u00fcberwachung des BND vor dem Bundesverwaltungsgericht in Leipzig, was wir aus dem Urteil \u00fcber den Rechtsschutz der B\u00fcrger lernen k\u00f6nnen und wieso der Fall nun das Bundesverfassungsgericht in Karlsruhe besch\u00e4ftigt.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 174, 
                                        "public_name": "Klaus Landefeld"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/713/original/Effektiver_Schutz_vor_Grundrechten_20181227.pdf?1546115285", 
                                        "title": "Pr\u00e4sentation"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9992.html", 
                                "id": 9992, 
                                "guid": "71bdcf60-c567-4cf6-94f4-5681b1d008b4", 
                                "logo": null, 
                                "date": "2018-12-27T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9992-all_your_gesundheitsakten_are_belong_to_us", 
                                "title": "All Your Gesundheitsakten Are Belong To Us", 
                                "subtitle": "\"So sicher wie beim Online-Banking\": Die elektronische Patientenakte kommt - f\u00fcr alle.", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Pl\u00f6tzlich geht alles ganz schnell: Online-Behandlungen und elektronische Gesundheitsakten sind dieses Jahr f\u00fcr Millionen Krankenversicherte Wirklichkeit geworden. Zu einem hohen Preis: Bereits einfache Angriffe lassen das Sicherheitskonzept der Apps und Plattformen zusammenbrechen. Warum das so ist, welche kritischen Fehler Vivy & Co. gemacht haben und wie das m\u00f6glicherweise verhindert werden kann, das soll dieser Vortrag zeigen - denn in sp\u00e4testens drei Jahren sollen auch die Gesundheitsdaten aller \u00fcbrigen Versicherten zentral gespeichert und online abrufbar sein.", 
                                "description": "Die elektronische Gesundheitskarte ist gescheitert. Stattdessen kommt jetzt die elektronische Patientenakte: In sp\u00e4testens drei Jahren sollen die Befunde, Diagnosen, R\u00f6ntgenbilder und Rezepte aller gesetzlich Krankenversicherten online und zentral gespeichert verf\u00fcgbar sein. Schon heute k\u00f6nnen Millionen Versicherte eine solche L\u00f6sung nutzen und, wie Gesundheitsminister Jens Spahn fordert, \"auch auf Tablets und Smartphones auf ihre elektronische Patientenakte zugreifen\". Zeitgleich zur elektronischen Patientenakte steht die Onlinebehandlung vor der T\u00fcr: Das Fernbehandlungsverbot wurde vor wenigen Monaten gekippt, und schon heute k\u00f6nnen sich Millionen Versicherte ausschlie\u00dflich online behandeln lassen.\r\n\r\nNach Jahren des Wartens geht dabei alles ganz schnell. \"Diese Ma\u00dfnahmen dulden keinen Aufschub\", sagt Spahn. Und macht uns alle damit zu Beta-Testern in Sachen Gesundheit. Mit fatalen Folgen: Unsere streng vertraulichen Gesundheitsdaten liegen f\u00fcr alle sichtbar im Netz.\r\n\r\nIn diesem Vortrag zeige ich an f\u00fcnf konkreten Beispielen, welche fahrl\u00e4ssigen Entscheidungen die Online-Plattformen und Apps der Anbieter aus dem Bereich Gesundheitsakte und Telemedizin so angreifbar machen und demonstriere, wie einfach der massenhafte Zugriff auf unsere vertraulichen Gesundheitsdaten gelang. Zur Debatte steht, was angesichts dieser neuen alten Erkenntnisse zu tun ist - und was wir besser bleiben lassen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7912, 
                                        "public_name": "Martin Tschirsich"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10015.html", 
                                "id": 10015, 
                                "guid": "1a28630d-985e-409b-be4a-b6679ecc83c3", 
                                "logo": "/system/events/logos/000/010/015/large/polizeiRun.jpg?1544462653", 
                                "date": "2018-12-27T23:30:00+01:00", 
                                "start": "23:30", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-10015-polizeigesetze", 
                                "title": "Polizeigesetze", 
                                "subtitle": "Endlich viele neue Gr\u00fcnde zu demonstrieren", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Heimatminister Horst Seehofer und seine Amtskollegen in den L\u00e4ndern erweitern die Rechte der Polizeien und planen ein \u201eMusterpolizeigesetz\u201c. Damit handelten sie sich die gr\u00f6\u00dften Proteste gegen \u00dcberwachungsvorhaben seit Jahren ein.", 
                                "description": "Wir geben nicht nur einen \u00dcberblick \u00fcber die zahlreichen Neuregelungen der Polizeigesetze in den Bundesl\u00e4ndern, sondern berichten auch aus den Anh\u00f6rungen in den Landtagen und von den Stellungnahmen. Wir erkl\u00e4ren, was in den neuen Gesetzen steht und welche rechtlichen und technischen Grenz\u00fcberschreitungen wir zu kritisieren haben.\r\n\r\nUnd wir haben ein paar Forderungen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8733, 
                                        "public_name": "Marie Br\u00f6ckling"
                                    }, 
                                    {
                                        "id": 1630, 
                                        "public_name": "Constanze Kurz"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://netzpolitik.org/tag/polizeigesetz/", 
                                        "title": "Berichterstattung zu den Polizeigesetzen bei netzpolitik.org"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9506.html", 
                                "id": 9506, 
                                "guid": "462f9320-3a0e-4785-82de-15343803c2ba", 
                                "logo": null, 
                                "date": "2018-12-28T00:40:00+01:00", 
                                "start": "00:40", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9506-freude_ist_nur_ein_mangel_an_information", 
                                "title": "Freude ist nur ein Mangel an Information", 
                                "subtitle": "Ein Demotivationsworkshop zur politischen Lage.", 
                                "track": "Entertainment", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Nico Semsrott hat in Zeiten des globalen Rechtsrucks den \u00fcberfl\u00fcssigsten Job der Welt: Er ist Demotivationstrainer. Mit Powerpointpr\u00e4sentationen und viel Pessimismus schafft er es, komplexe Themen zu vereinfachen, ohne dabei auf alternative Fakten zur\u00fcckgreifen zu m\u00fcssen.", 
                                "description": "Politisch gesehen ist zwar alles aussichtslos. Aber wenn man schon aufgibt, kann man man genauso gut auch das Resignieren aufgeben. Deswegen kandidiert Nico auf Platz 2 der Europaliste der Partei Die PARTEI. Um dann in Br\u00fcssel als Kommissionspr\u00e4sident die Demokratie in Europa einzuf\u00fchren. Notfalls gegen den Willen der B\u00fcrgerinnen und B\u00fcrger.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8748, 
                                        "public_name": "Nico Semsrott"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Borg": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9607.html", 
                                "id": 9607, 
                                "guid": "c0e4f528-92c7-4170-aff3-d4dd5cd74b2c", 
                                "logo": "/system/events/logos/000/009/607/large/500px-Move_protect.svg.png?1539423571", 
                                "date": "2018-12-27T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9607-the_rocky_road_to_tls_1_3_and_better_internet_encryption", 
                                "title": "The Rocky Road to TLS 1.3 and better Internet Encryption", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Since a few months we have a new version of TLS, the most important encryption protocol on the Internet. From the vulnerabilities that created the need of a new TLS version to the challenges of deploying it due to broken devices this talk will give an overview of the new TLS 1.3.", 
                                "description": "In August the new version 1.3 of the Transport Layer Security (TLS) protocol was released. It\u2018s the result of a process that started over four years ago when it became increasingly clear that previous TLS versions suffered from some major weaknesses.\r\n\r\nIn many ways TLS 1.3 is the biggest step ever done in the history of TLS and its predecessor SSL. While previous TLS versions always tried to retain compatibility and not change too many things, the new version radically removes problematic and insecure constructions like static RSA key exchanges, fragile CBC/HMAC constructions and broken hash functions like MD5 and SHA1.\r\n\r\nAs a bonus TLS 1.3 comes with a reworked handshake that reduces the number of round-trips and thus provides not just more security, but also better performance. If that sounds too good to be true: An optional, even faster mode of TLS 1.3 \u2013 the zero round trip or 0RTT mode \u2013 makes some security researchers worried, because they fear it introduces new security risks due to replay attacks.\r\n\r\nThough the road to TLS 1.3 was complicated. The Internet is a buggy place and particularly Enterprise devices of all kinds \u2013 middleboxes, TLS-terminating servers and TLS-interception devices \u2013 slowed down the deployment and finalization of the new encryption protocol. Also some banks thought that TLS 1.3 is too secure for them.\r\n\r\nThe talk will give an overview of the developments that led to TLS 1.3, the major changes it brings, the challenges it had to face and some practical advice for deployment.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 2462, 
                                        "public_name": "hanno"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.feistyduck.com/bulletproof-tls-newsletter/issue_44_tls_1_3_is_here", 
                                        "title": "TLS 1.3 is here"
                                    }, 
                                    {
                                        "url": "https://www.feistyduck.com/bulletproof-tls-newsletter/issue_33_why_tls_13_isnt_there_yet", 
                                        "title": "Why TLS 1.3 isn\u2019t there yet"
                                    }, 
                                    {
                                        "url": "https://www.golem.de/news/tls-1-3-die-zukunft-der-netzverschluesselung-1612-124724.html", 
                                        "title": "TLS 1.3: Die Zukunft der Netzverschl\u00fcsselung"
                                    }, 
                                    {
                                        "url": "https://int21.de/slides/35c3-tls13/", 
                                        "title": "The Rocky Road to TLS 1.3 - Slides"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/732/original/tls13.pdf?1546421079", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9904.html", 
                                "id": 9904, 
                                "guid": "d995955c-319f-4228-b3f4-080868bbfdf8", 
                                "logo": null, 
                                "date": "2018-12-27T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9904-the_social_credit_system", 
                                "title": "\"The\" Social Credit System", 
                                "subtitle": "Why It's Both Better and Worse Than We can Imagine", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The Chinese Social Credit System (SCS) has been discussed a lot in Western media. However, we do not know currently how the system that is supposed to take nationwide effect by 2020 will look like, as there are more than 70 pilot projects currently undertaken. These pilots rank from commercial royalty and rewards programs (Sesame Credit) to an Orwellian system, where each action has a predetermined associated score (Rongcheng). In-between, there\u2019s nebulous algorithmic systems that basically act as a Black Box (Honesty Shanghai). This talk, therefore, looks at some of these pilots and their implementation details, and through an agent-based modeling framework, discusses the likely effects of different implementations. In doing so, it shows that most of the systems currently being tested are prone to manipulation by leaders from all levels of government, and that the ostensible goal of allocating scarce resources more efficiently is unlikely to be served by the new system(s).", 
                                "description": "The author, Antonia Hmaidi, is a PhD candidate in East Asian Economics with a focus on China. She presented a talk on the impact of internet censorship at the 33C3. This talk\u2019s goal is to provide those interested with a technically-grounded understanding of \u201cthe\u201d Chinese social credit system and its possible impact on Chinese society and economy. In doing so, it seeks to provide a more nuanced picture than is usually presented in either Chinese or Western media. Working on data science and machine learning in her free time allows the author to better understand the algorithms comprising \u201cthe\u201d social credit system.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6990, 
                                        "public_name": "Toni"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9877.html", 
                                "id": 9877, 
                                "guid": "94b77e5a-c826-45a9-a8bd-bbb8e5e7c9ff", 
                                "logo": "/system/events/logos/000/009/877/large/cp.png?1539636113", 
                                "date": "2018-12-27T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9877-censored_planet_a_global_censorship_observatory", 
                                "title": "Censored Planet: a Global Censorship Observatory ", 
                                "subtitle": "", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Six years ago the idea behind CensoredPlanet started, that is now launched at censoredplanet.org. We had a simple (yet essential) guiding principle: measurements that may be politically sensitive should be done without volunteer participation. In this talk, besides a detailed scientific overview of the techniques and the current state of CensoredPlanet, I plan to talk about my experience in developing the project from the ground up.\r\n\r\nDespite the pervasive nature of Internet censorship and the continuous evolution of how and where censorship is applied, measurements of censorship remain comparatively sparse. Current censorship projects, including OONI, depend on participants within countries to help them collect measurements. While these projects are valuable, we have empirically seen that there are issues relating to continuity in terms of measurement, coverage of the geographical area, and ethical dilemmas when user participation is a requirement. Censored Planet use tens of thousands of *remote infrastructural and organizational vantage points* from over 170 countries to conduct it\u2019s measurements, thereby removing the need for user participation. This allows us to regularly measure Internet disruptions over a longer period of time in significantly more countries in a safer way. \r\n\r\nThe research we conduct at Censored Planet provides unique insights and data points on Internet disruptions. This information is extremely valuable to researchers in diverse fields from political science to computer science as well as to activists and journalists living and operating in countries where Internet disruptions are prevalent. By making our data easily accessible to the public, we aim to encourage future research in the field. Link to our data: https://censoredplanet.org/data/raw.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8385, 
                                        "public_name": "Roya Ensafi"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://censoredplanet.org", 
                                        "title": "Censored Planet: a Global Censorship Observatory "
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/654/original/35C3-CensoredPlanet-Ensafi.pdf?1545925229", 
                                        "title": "Presentation Slides"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10005.html", 
                                "id": 10005, 
                                "guid": "f0d70663-0769-4462-ad27-bc516d9cb141", 
                                "logo": null, 
                                "date": "2018-12-27T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-10005-how_does_the_internet_work", 
                                "title": "How does the Internet work?", 
                                "subtitle": "An explanation of Inter-Net and everyday protocols", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "This Foundations talk explains the systems and protocols that make up the Internet, starting from a laptop with a Wi-Fi connection. No particular technical knowledge required.", 
                                "description": "Many consider \"the Internet\" a utility similar to electricity - and that's a great attitude! - but for most, \"the Internet\" only means access to a few centralized services offered by mega-corporations \"for free\", around which people build their entire social and professional lives.\r\n\r\nCome along for a look behind the scenes of all those fancy websites, let's go through what the Internet actually is!\r\n\r\nKnowing the difference between the network and services reachable through the network is perhaps more important than ever, because if we implicitly give service providers all the power by never asking for a public, utility-like network then that's the end of the Internet as we know it. Key word: Net neutrality.\r\n\r\nSo in this talk we will discover the network. In simple terms and without too much technical detail we'll start out with the \"atom\" of networks <i>the packet</i>, then cover the fundamental <i>Internet Protocol</i> (IPv4-only for simplicity), we'll try to answer <i>what is a network?</i> - not obvious it turns out, we'll look at <i>where do IP addresses come from?</i> and then we'll move on to the Internet cornerstone that is <i>routing</i>. We'll approach routing from the perhaps most well-known router - the <i>wireless home router</i> - and then look at how similar or dissimilar <i>routers on the Internet</i> are to that home router, leading us to a look at the <i>routing protocol</i> which constantly determines how our packets flow throughout the world.\r\n\r\nThose are the basic building blocks of the Internet. Now for some delicious alphabet soup!\r\n\r\nWe'll take a step toward applications and compare <i>UDP</i>, <i>TCP</i> and <i>SCTP</i>, which are all used together with IP for most if not all end-user Internet communication.\r\n\r\nFinally, we'll arrive at the most common applications, looking into how <i>DNS</i> (domain names), <i>SMTP</i> (sending email) and <i>HTTP</i> (web) work.\r\n\r\nAll of this is actually surprisingly simple and surprisingly old. None of it was built to be secure.\r\n\r\nThe goal is that you will gain an understanding of the structure of the Internet, that you will be able \"see through\" the browser, email client and web service facades, because now you know what's going on behind the scenes, and everything that's <i>actually</i> possible with a public utility network - far more than centralized consumption/you-are-our-product services.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 2142, 
                                        "public_name": "Peter Stuge"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/677/original/35c3-internet.zip?1546003081", 
                                        "title": "Presentation slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9563.html", 
                                "id": 9563, 
                                "guid": "a42e5a4f-fd9b-4571-bf17-483978afecb3", 
                                "logo": "/system/events/logos/000/009/563/large/wallet.fail.png?1539543982", 
                                "date": "2018-12-27T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9563-wallet_fail", 
                                "title": "wallet.fail", 
                                "subtitle": "Hacking the most popular cryptocurrency hardware wallets", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "In this presentation we will take a look at how to break the most popular cryptocurrency hardware wallets. We will uncover architectural, physical, hardware, software and firmware vulnerabilities we found including issues that could allow a malicious attacker to gain access to the funds of the wallet. The attacks that we perform against the hardware wallets range from breaking the proprietary bootloader protection, to breaking the web interfaces used to interact with wallets, up to physical attacks including glitching to bypass the security implemented in the IC of the wallet. Our broad look into several wallets demonstrates systemic and recurring issues. We provide some insight into what needs to change to build more resilient hardware wallets.\r\n", 
                                "description": "Hardware wallets are becoming increasingly popular and are used to store a significant percentage of the world\u2019s cryptocurrency. Many traders, hedge funds, ICOs and blockchain projects store the entirety of their cryptocurrency on one or very few wallets. This means that users of hardware wallets store tens of millions of euros of cryptocurrency on small USB peripherals that costs only a few euros to manufacture. Moreover, many users that trade and speculate in cryptocurrency interact, update, and generate transactions using their hardware wallets on a daily basis.\r\n\r\nIn this talk we look at the good, the bad and the ugly of hardware wallet security: We will walk through the different architectures of the wallets, look at the different attack vectors and talk about the challenges of building secure hardware before diving in deep finding vulnerabilities in the different wallets.\r\n\r\nThe vulnerabilities we will present range from vulnerabilities that can be fixed in a firmware upgrade, to bugs that will require a new hardware revision, up to attacks on the microcontrollers themselves, requiring new silicon to be fixed.\r\n\r\nSome of the (most entertaining) vulnerabilities will be demonstrated live on stage.\r\n\r\n<h2>Classes of Vulnerabilities we will look at</h2>\r\n<b>Firmware Vulnerabilities</b>\r\nFirmware vulnerabilities are vulnerabilities affecting the software that runs on the hardware wallet. Since most wallets provide update mechanisms this class of bug can be patched in a future firmware release.\r\n\r\n<b>Software Vulnerabilities</b>\r\nSoftware vulnerabilities are vulnerabilities affecting the host software that runs on the PC or smartphone and communicates with the hardware wallet. Since most wallets provide update mechanisms this class of bug can be patched in a future release of the host software\r\n\r\n<b>Hardware Vulnerabilities</b>\r\nHardware vulnerabilities are vulnerabilities affecting the device hardware of the hardware wallet. Hardware vulnerabilities are generally incorrectly set configurations of the hardware either during manufacturing or by the firmware. If the configuration is set by firmware these vulnerabilities can be patched in a future firmware release. Otherwise, they are unlikely to be fixed by the vendor.\r\n\r\n<b>Physical Vulnerabilities</b>\r\nPhysical vulnerabilities are vulnerabilities affecting the hardware design of the hardware wallet. Once the device has been manufactured, hardware vulnerabilities cannot be mitigated and can only be fixed in a future hardware revision of the device. This class of vulnerabilities is unlikely to be fixed by the vendor.\r\n\r\n<b>Architectural Vulnerabilities</b>\r\nArchitectural vulnerabilities are vulnerabilities affecting the overall architecture of the hardware wallet. These are inherent design flaws in the device and can only be fixed in a major hardware revision, i.e. a new version of the device. This class of vulnerabilities is unlikely to be fixed by the vendor.\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7775, 
                                        "public_name": "Thomas Roth"
                                    }, 
                                    {
                                        "id": 3985, 
                                        "public_name": "Dmitry Nedospasov"
                                    }, 
                                    {
                                        "id": 4958, 
                                        "public_name": "Josh Datko"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://wallet.fail", 
                                        "title": "wallet.fail website"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9766.html", 
                                "id": 9766, 
                                "guid": "a12d17e9-3758-4fa0-b612-0c6ba22ea773", 
                                "logo": "/system/events/logos/000/009/766/large/logo-quadrat-vector.jpg?1539611939", 
                                "date": "2018-12-27T18:50:00+01:00", 
                                "start": "18:50", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9766-das_ist_mir_nicht_erinnerlich_der_nsu-komplex_heute", 
                                "title": "\"Das ist mir nicht erinnerlich.\" \u2212 Der NSU-Komplex heute", 
                                "subtitle": "F\u00fcnf Monate nach dem Urteil im ersten NSU-Prozess", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Sieben Jahre lang musste den Beh\u00f6rden jedes St\u00fcck der versprochenen Aufkl\u00e4rung des NSU-Komplexes abgerungen werden. Das Urteil im ersten NSU-Prozess zeigt: Deutschland ist nur sehr eingeschr\u00e4nkt bereit, rechtem Terror entgegenzutreten und ihn aufzuarbeiten, den Betroffenen, Gesch\u00e4digten und \u00dcberlebenden zuzuh\u00f6ren und ihnen Schutz zu garantieren. Das zu leisten ist unsere Aufgabe: die Aufgabe der Gesellschaft, die Aufgabe einer antifaschistischen und antirassistischen Linken. ", 
                                "description": "Am 4. November 2011 enttarnte sich der \u201eNationalsozialistische Untergrund\u201c (NSU) selbst. Fast sieben Jahre sp\u00e4ter, am 10. Juli 2018, wurde das Urteil im ersten NSU-Prozess  gesprochen. Heute, f\u00fcnf Monate nach der von Neonazis bejubelten m\u00fcndlichen Urteilsverk\u00fcndung, m\u00fcssen wir mit einem Urteil umgehen, in dem sich viele gebrochene Aufkl\u00e4rungsversprechen zuspitzen. Das Gericht geht von der These aus, der NSU sei ein weitgehend isoliertes \u201eTrio\u201c ohne Netzwerk und ohne Verstrickung der Beh\u00f6rden gewesen. Nach allem, was in den letzten Jahren \u2013 teilweise m\u00fchsam \u2013 \u00fcber den NSU-Komplex ans Licht gezerrt werden konnte, ist die \u201eTrio\u201c-These aber nicht haltbar. Zum NSU-Komplex geh\u00f6ren ein Neonazinetzwerk, der gesamtgesellschaftliche Rassismus und das Handeln der Polizei sowie des Verfassungsschutzes. \r\nGleichzeitig stellen sich die Angeh\u00f6rigen der vom NSU Ermordeten und die \u00dcberlebenden der Anschl\u00e4ge immer noch die gleichen Fragen wie 2011: Wer hat die Tatorte ausgew\u00e4hlt? Warum wurde gerade ihr Vater, Ehemann, Sohn, ihre Tochter ermordet? Wer ist Teil des Unterst\u00fctzungsnetzwerks des NSU? Was wusste der Verfassungsschutz und was machte er warum mit seinem Wissen (nicht)? \r\nKlar ist: Die gesellschaftlichen Verh\u00e4ltnisse, die den NSU hervorgebracht haben, m\u00fcssen abgeschafft werden. Das Urteil im ersten NSU-Prozess hat noch einmal unterstrichen: Deutschland ist nur in sehr eingeschr\u00e4nktem Ma\u00dfe bereit, rechtem Terror entgegenzutreten und ihn aufzuarbeiten, den Betroffenen, Gesch\u00e4digten und \u00dcberlebenden zuzuh\u00f6ren und ihnen Schutz zu garantieren. Das zu leisten ist unsere Aufgabe: die Aufgabe der Gesellschaft, die Aufgabe einer antifaschistischen und antirassistischen Linken. \r\n\r\nIm Vortrag soll der Stand der Aufkl\u00e4rung im NSU-Komplex umrissen werden und diskutiert werden, wie wir als Gesellschaft damit umgehen und was wir tun k\u00f6nnen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8543, 
                                        "public_name": "Caro Keller (NSU-Watch)"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "nsu-watch.info", 
                                        "title": "NSU-Watch"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9462.html", 
                                "id": 9462, 
                                "guid": "42650545-4394-4455-a5f5-9efad111fedc", 
                                "logo": null, 
                                "date": "2018-12-27T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "00:40", 
                                "room": "Borg", 
                                "slug": "35c3-9462-what_the_fax", 
                                "title": "What The Fax?!", 
                                "subtitle": "Hacking your network likes it's 1980 again", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "We all know what FAX is, and for some strange reason most of us need to use it from time to time. Hard to believe its 2018, right?\r\n\r\nBut can FAX be something more than a bureaucratic burden? Can it actually be a catastrophic security hole that may be used to compromise your entire network? Come watch our talk and find out \u2026", 
                                "description": "Unless you've been living under a rock for the past 30 years or so, you probably know what a fax machine is. For decades, fax machines were used worldwide as the main way of electronic document delivery. But this happened in the 1980s. Humanity has since developed far more advanced ways to send digital content, and fax machines are all in the past, right? After all, they should now be nothing more than a glorified museum item. Who on earth is still using fax machines?\r\n\r\nThe answer, to our great horror, is EVERYONE. State authorities, banks, service providers and many others are still using fax machines, despite their debatable quality and almost non-existent security. In fact, using fax machines is often mandatory and considered a solid and trustworthy method of delivering information. \r\n\r\nWhat the Fax?!\r\n\r\nWe embarked on a journey with the singular goal of disrupting this insane state of affairs. We went to work, determined to show that the common fax machine could be compromised via mere access to its fully exposed and unprotected telephone line \u2013 thus completely bypassing all perimeter security protections and shattering to pieces all modern-day security concepts.\r\n\r\nJoin us as we take you through the strange world of embedded operating systems, 30-year-old protocols, museum grade compression algorithms, weird extensions and undebuggable environments. See for yourself first-hand as we give a live demonstration of the first ever full fax exploitation, leading to complete control over the entire device as well as the network, using nothing but a standard telephone line.\r\n\r\nThis talk is intended to be the canary in the coal mine. The technology community cannot sit idly by while this ongoing madness is allowed to continue!\r\n\r\nThe world must stop using FAX!", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6000, 
                                        "public_name": "Yaniv Balmas"
                                    }, 
                                    {
                                        "id": 8269, 
                                        "public_name": "Eyal Itkin"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9838.html", 
                                "id": 9838, 
                                "guid": "5f5d8fd7-45a7-44e4-8d82-dfb8ee692f8b", 
                                "logo": "/system/events/logos/000/009/838/large/logo.png?1539632549", 
                                "date": "2018-12-27T21:50:00+01:00", 
                                "start": "21:50", 
                                "duration": "00:40", 
                                "room": "Borg", 
                                "slug": "35c3-9838-genom-editierung_mit_crispr_cas", 
                                "title": "Genom-Editierung mit CRISPR/Cas", 
                                "subtitle": "\u201cEine neue Hoffnung\u201d oder \u201cAngriff der Klonkrieger\u201d? ", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "CRISPR/Cas hat die Genforschung revolutioniert und k\u00f6nnte bald in gro\u00dfem Stil gentechnisch eingesetzt werden. Aber was ist CRISPR und wie funktioniert es? Kurz gesagt: Teile des adaptiven Immunsystems von Bakterien werden genutzt, um Gene zu ver\u00e4ndern. Und das funktioniert pr\u00e4ziser als mit jedem anderen Werkzeug zuvor und offenbar in allen Tier- und Pflanzenarten. Damit ist CRISPR anders als die herk\u00f6mmlichen Methoden der Gentechnik. Es ist einfach anzuwenden, preiswert, schnell, extrem vielseitig und damit in jedem Biologielabor erh\u00e4ltlich. Bio-Hacker haben sogar begonnen, CRISPR zu Hause zu nutzen. CRISPR wird bereits eingesetzt, um mehr \u00fcber Genfunktionen und -dysfunktionen zu erfahren. So k\u00f6nnte es realistischerweise zur Behandlung einiger Krankheiten eingesetzt werden. Aber welche H\u00fcrden gibt es noch und welche ethischen Fragen w\u00fcrden sie mit sich bringen? Wie kann (oder sollte?) CRISPR in der Landwirtschaft eingesetzt werden, wenn der Klimawandel die Ertr\u00e4ge verringert und die Biodiversit\u00e4t gef\u00e4hrdet? \r\nUnser Vortrag gibt einen \u00dcberblick dar\u00fcber, was mit dem CRISPR/Cas-System m\u00f6glich ist. Wir m\u00f6chten gen\u00fcgend Informationen liefern, um zwischen Pseudowissenschaften und dem, was tats\u00e4chlich m\u00f6glich ist, unterscheiden zu k\u00f6nnen.\r\n", 
                                "description": "Andr\u00e9 ist Physiker, Biochemiker und Wissenschaftskommunikator.\r\nKatrin studierte Biochemie, verpodcastete Wissenschaftsnachrichten und ber\u00e4t wissenschaftliche Softwareprojekte.\r\nAnna ist Biologin und hat w\u00e4hrend ihrer Doktorarbeit teilweise mit CRISPR gearbeitet.\r\nObwohl wir aus verschiedenen Bereichen der Wissenschaft kommen, haben wir eine gemeinsame Leidenschaft: Themen aus der Wissenschaft verst\u00e4ndlich darzustellen. Eine der vielversprechendsten neuen Technologien ist CRISPR/Cas. Dabei handelt es sich um eine Gentechnikmethode, die ein gro\u00dfes Potenzial f\u00fcr Mensch und Umwelt hat. Aber wie jedes Werkzeug kann CRISPR sowohl f\u00fcr Gutes als auch f\u00fcr B\u00f6ses eingesetzt werden - und es ist nicht immer einfach zu sagen, was was ist, besonders in biologischen und \u00f6kologischen Systemen. CRISPR hilft uns, Genfunktionen und Krankheiten besser erforschen zu k\u00f6nnen. Es k\u00f6nnte uns auch helfen, die Folgen des Klimawandels in vielerlei Hinsicht zu bek\u00e4mpfen - doch haben wir uns nicht genug in die Umwelt eingemischt? CRISPR k\u00f6nnte uns helfen, Krankheiten zu behandeln, vielleicht sogar bei Embryonen mit genetischen Krankheiten. Aber ist es ethisch vertretbar, die menschliche Keimbahn zu ver\u00e4ndern? Oder sollten wir sie bei Tieren ver\u00e4ndern, um h\u00f6here  Fleisch-, Milch- oder Eierertr\u00e4ge zu erzielen? Was k\u00f6nnten wir \u00e4ndern und was sollten wir besser in Ruhe lassen?\r\nWas mit CRISPR getan wird - dar\u00fcber sollte es einen breiten Dialog in der Gesellschaft geben. Wir wollen versuchen die wissenschaftliche Faktenlage darzustellen, und die M\u00f6glichkeiten und Grenzen von CRISPR zu beleuchten. \r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6979, 
                                        "public_name": "_Adora_Belle_"
                                    }, 
                                    {
                                        "id": 7027, 
                                        "public_name": "Andr\u00e9 Lampe"
                                    }, 
                                    {
                                        "id": 6574, 
                                        "public_name": "KaLeiMai"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://scienceblogs.de/diekleinendinge/", 
                                        "title": "Blog Andr\u00e9 Lampe / anderelampe"
                                    }, 
                                    {
                                        "url": "https://zellmedien.de/", 
                                        "title": "Anna M\u00fcllner / Adora Belle "
                                    }, 
                                    {
                                        "url": "https://wirkstoffradio.de", 
                                        "title": "Wirkstoffradio"
                                    }, 
                                    {
                                        "url": "https://fyyd.de/user/KonScience/curation/crispr-genomeditierung?page=0", 
                                        "title": "kuratierte Podcastepisoden \u00fcber CRISPR & Co."
                                    }, 
                                    {
                                        "url": "https://docs.google.com/presentation/d/1WMHsmgAln0tWvW5kd9MexENBBfdue4NXrXZiiJGkPxI/edit", 
                                        "title": "Google-Slides (zum Kommentieren)"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/662/original/CRISPR-Cas-Angriff-der-Klonkrieger-oder-Eine-Neue-Hoffnung-35c3.pdf?1545950437", 
                                        "title": "PDF"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9597.html", 
                                "id": 9597, 
                                "guid": "96d10915-cc4b-42ca-ad75-15205db70d0b", 
                                "logo": "/system/events/logos/000/009/597/large/bios.png?1539366432", 
                                "date": "2018-12-27T22:50:00+01:00", 
                                "start": "22:50", 
                                "duration": "00:40", 
                                "room": "Borg", 
                                "slug": "35c3-9597-modchips_of_the_state", 
                                "title": "Modchips of the State", 
                                "subtitle": "Hardware implants in the supply-chain", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Hardware implants and supply chain attacks have been in the news recently, but how feasible are they and what can we do about them? In this talk we'll examine the design of a proof of concept SPI bus hardware implant that has similar capabilities to those described in the Bloomberg/Supermicro article as well as some countermeasures that we can use to try to detect these \"modchips\" and increase our trust in our systems.", 
                                "description": "We don't know how much of the Bloomberg story about hardware implants installed in Supermicro servers shipped to Apple and Amazon is true, nor do we know the story behind the story and the reasons for the vehement denials by all the parties involved.\r\n\r\nHowever, a technical assessment of details of the describe implants reveals that a supply chain attack on the hardware is definitely possible, that the capabilities of the BMC can be used to bypass OS protections, and that there are means to access the BMC that would not necessarily generate readily identified network traffic.\r\n\r\nIn this talk we'll examine the design of a proof of concept SPI bus hardware implant that has similar capabilities to those described in the Bloomberg/Supermicro article as well as some countermeasures that we can use to try to detect these \"modchips\" and increase our trust in our systems.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4825, 
                                        "public_name": "Trammell Hudson"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9614.html", 
                                "id": 9614, 
                                "guid": "e8385c89-d33a-42d8-afb6-8ae28fe5c89d", 
                                "logo": null, 
                                "date": "2018-12-27T23:50:00+01:00", 
                                "start": "23:50", 
                                "duration": "00:40", 
                                "room": "Borg", 
                                "slug": "35c3-9614-inside_the_amd_microcode_rom", 
                                "title": "Inside the AMD Microcode ROM", 
                                "subtitle": "(Ab)Using AMD Microcode for fun and security", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Microcode runs in most modern CPUs and translates the outer instruction set (e.g. x86) into a simpler form (usually a RISC architecture). It is updatable to fix bugs in the silicon (see Meltdown/Spectre), but these updates are encrypted and signed, so no one knows how microcode works on conventional CPUs. We successfully reverse engineered part of the microde semantics of AMD CPUs and are able to write our own programs. We also recovered the mapping between the physical readout (electron microscope) and the \"virtual\" addresses used by microcode itself. In this talk we present background on microcode, our findings, our open source framework to write custom microcode and our custom defensive measures implemented in microcode.\r\n", 
                                "description": "We build on our results presented on 34C3 to provide more insight into how microcode works and more details of the microcode ROM itself.\r\n\r\ntl;dr diff to last talk:\r\n- Mapped physical readout to virtual addresses, we can now read the microcode implementation of specfic instructions\r\n- More microcode semantics known, more stable programs\r\n- Opensource framework for creating, diassembling and testing microcode on AMD CPUs\r\n- Simple hardware setup to develop microcode programs\r\n- More practical examples of what you can do with microcode, focused on defense instead of offense this time\r\n\r\nSince 34C3 we worked on recovering the microcode ROM completely and used that knowledge to implement constructive microcode programs that add to or enhance functionality of the CPU. We also worked on our now open source framework to create and diassemble microcode for AMD CPUs up to 2013. We will give a short intro into how to use it to create custom microcode programs and test them on real hardware. We also provide guidelines on how to construct the test setup we used, which is essentially any old AMD mainboard (native serial port required), a RaspberryPi with a serial adapter and some wiring including a few basic electronic components. Using this you can remotely and automatically test any number of microcode updates and it is integrated in our framework.\r\n\r\nOn the microcode program side we will show how to hijack microcoded instructions to replace them with new semantics, for example reviving the good-old BOUND x86 instruction. We also show how to roll your own microcode update verification scheme, so only trusted and signed updates can be loaded on vulnerable CPUs.\r\n\r\nAdditionally we will provide some implementation details found in the microcode ROM and show how it is used to implement complex functions like the instruction WRMSR, which among other functions is used to update the microcode.\r\n\r\nWe will start with a crash-course covering fundamentals related to instruction decoding, CPU architecture and microcode principles. We will then present our new insights and finish with a demo of how our framework works.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7652, 
                                        "public_name": "Benjamin Kollenda"
                                    }, 
                                    {
                                        "id": 7984, 
                                        "public_name": "Philipp Koppe"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://media.ccc.de/v/34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask", 
                                        "title": "Our 34C3 talk on microcode"
                                    }, 
                                    {
                                        "url": "https://www.syssec.rub.de/research/publications/constructive-microcode/", 
                                        "title": "Paper with our new insights, to-be-presented on CCS 2018"
                                    }, 
                                    {
                                        "url": "https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/koppe", 
                                        "title": "Original microcode paper and corresponding talk"
                                    }, 
                                    {
                                        "url": "https://github.com/RUB-SysSec/Microcode", 
                                        "title": "Github project - to be updated"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/674/original/Microcode35C3.pdf?1545996674", 
                                        "title": "Presentation Slides"
                                    }
                                ]
                            }
                        ], 
                        "Clarke": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9599.html", 
                                "id": 9599, 
                                "guid": "e9095f5f-a38a-48da-b3d7-20da141b8b14", 
                                "logo": "/system/events/logos/000/009/599/large/icon-new.png?1542635567", 
                                "date": "2018-12-27T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "00:40", 
                                "room": "Clarke", 
                                "slug": "35c3-9599-locked_up_science", 
                                "title": "Locked up science", 
                                "subtitle": "Tearing down paywalls in scholarly communication", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Restricting access to knowledge and science is not beneficial for society. So why are scientific results still locked up behind paywalls? Even though the answer to this question is enlightening, the story is quickly told. Much more important is the knowledge on how to change this.", 
                                "description": "Politics, research funders, libraries and scientists have to join forces and to push forward to flip scholarly communication from closed to open access. What has happened so far? What are the current developments? What can each of these parties contribute to the transformation of scholarly communication? Open access guidelines, repositories and the hashtag #ICanHazPDF are just a few examples of approaches that jointly undermine the paywalls. One that has been recognized even beyond the scientific community is Project DEAL which aims to achieve open access for scientific publications from German scientists with major academic publishers.\r\n\r\nThings are currently progressing very fast and a lot can happen in the weeks between now and the congress. The talk will start with a brief introduction to the most common way of scholarly communication, where science is still mainly locked up behind paywalls. In line with the most recent developments, the talk will then focus on different approaches to open up science and their political and practical consequences. Whatever happens, the transformation of scholarly communication is well underway and it will affect not only the scientific community but society as a whole. So let\u2019s join forces!", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8418, 
                                        "public_name": "Claudia Frick - @FuzzyLeapfrog"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://doi.org/10.5281/zenodo.1495601", 
                                        "title": "Slides (DOI)"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/639/original/35c3-FuzzyLeapfrog.pdf?1545913798", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9513.html", 
                                "id": 9513, 
                                "guid": "7177142b-6f15-4fac-af62-c45df7a377a9", 
                                "logo": null, 
                                "date": "2018-12-27T12:30:00+01:00", 
                                "start": "12:30", 
                                "duration": "00:40", 
                                "room": "Clarke", 
                                "slug": "35c3-9513-mind_the_trap_die_netzpolitik_der_afd_im_bundestag", 
                                "title": "Mind the Trap: Die Netzpolitik der AfD im Bundestag", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Die AfD-Bundestagsfraktion wird in der \u00d6ffentlichkeit vor allem mit ihren rassistischen Positionen wahrgenommen \u2013 mit ihren netzpolitischen Aktivit\u00e4ten bleibt sie zumeist unter dem Radar. Dieser Talk zeigt, wie die AfD-Fraktion die Netzpolitik dennoch als vermeintlich neutrales Thema nutzt, um f\u00fcr ihre rechtsextreme Partei eine parlamentarische und gesellschaftliche Normalisierung herzustellen. ", 
                                "description": "Als Mitarbeiterin einer Bundestagsabgeordneten von den Gr\u00fcnen verfolge ich t\u00e4glich das Verhalten der AfD in netzpolitischen Debatten im Bundestag: Im Plenarsaal, im Ausschuss Digitale Agenda, in der Enqu\u00eate-Kommission K\u00fcnstliche Intelligenz und bei Veranstaltungen und Diskussionen mit au\u00dferparlamentarischen Organisationen.\r\n\r\nDabei ist mir aufgefallen, dass die netzpolitischen AfD-Abgeordneten in ihrem Verhalten eher einem kooperationsorientierten statt einem krawallorientierten Parlamentariertyp innerhalb ihrer Fraktion zuzuordnen sind. Die inhaltliche Positionierung der AfD wiederum folgt bei verschiedenen netzpolitischen Debatten zumeist einer von drei verschiedenen Strategien: Konsensorientiert, anti-europ\u00e4isch oder Opfermythos-betonend. Diese Beobachtungen werden mit einer Reihe von Beispielen illustriert.\r\n\r\nBei den netzpolitischen Diskussionen im Bundestag finden die zentralen Auseinandersetzungen zwischen der Gro\u00dfen Koalition und den demokratischen Oppositionsparteien statt. Was die AfD-Fraktion dazu sagt, wird h\u00e4ufig kaum wahrgenommen.\r\n\r\nDieser Talk zeigt, wie die AfD-Fraktion die Netzpolitik dennoch als vermeintlich neutrales Thema nutzt, um f\u00fcr ihre rechtsextreme Partei eine parlamentarische und gesellschaftliche Normalisierung herzustellen. Er belegt dies anhand zahlreicher Beispiele aus dem parlamentarischen Alltag und zeigt auf, wo diese Strategie bereits aufgeht und wo nicht. Deswegen soll es auch darum gehen, wie zivilgesellschaftliche Organisationen und Akteure damit umgehen k\u00f6nnen, wenn AfD-Abgeordnete in der netzpolitischen Szene auftauchen und vermeintlich sinnvolle netzpolitische Positionen vertreten.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4918, 
                                        "public_name": "Noujoum"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://seyborg.de/", 
                                        "title": "Blog"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9561.html", 
                                "id": 9561, 
                                "guid": "4cc5cf9a-214f-4e7d-991f-199e9f0db8cc", 
                                "logo": null, 
                                "date": "2018-12-27T13:30:00+01:00", 
                                "start": "13:30", 
                                "duration": "00:40", 
                                "room": "Clarke", 
                                "slug": "35c3-9561-first_sednit_uefi_rootkit_unveiled", 
                                "title": "First Sednit UEFI Rootkit Unveiled", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "UEFI rootkits have been researched and discussed heavily in the past few years, but sparse evidence has been presented of real campaigns actively trying to compromise systems at this level. Our talk will reveal such a campaign successfully executed by the Sednit group. We will detail the full infection chain showing how Sednit was able to install their custom UEFI module on key targets' computers. Additionally, we will provide an in-depth analysis of their UEFI module and the associated trojanized LoJack agent.", 
                                "description": "UEFI rootkits have been researched and discussed heavily in the past few years, but sparse evidence has been presented of real campaigns actively trying to compromise systems at this level. Our talk will reveal such a campaign successfully executed by the Sednit group. This APT group, also known as Fancy Bear, Sofacy and APT28, has been linked to numerous high profile cyberattacks such as the 2016 Democratic National Committee email leak scandal.\r\n\r\nEarlier this year, there was a public report stating that the infamous Sednit/Sofacy/APT28 APT group successfully trojanized a userland LoJack agent and used it against their targets. LoJack, an embedded anti-theft application, was scrutinized by security researchers in the past because of its unusual persistence method: a module preinstalled in many computers' UEFI/BIOS software. Over the years, several security risks have been found in this product, but no significant in-the-wild activity was ever reported until the discovery of the Sednit group leveraging some of the vulnerabilities affecting the userland agent. However, through our research, we now know that Sednit did not stop there: they also tried to, and succeeded, in installing a custom UEFI module directly into a system's SPI flash memory.\r\n\r\nIn this talk, we will detail the full infection chain showing how Sednit was able to install their custom UEFI module on key targets' computers. Additionally, we will provide an in-depth analysis of their UEFI module and the associated trojanized LoJack agent.\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8388, 
                                        "public_name": "Fr\u00e9d\u00e9ric Vachon"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.welivesecurity.com/wp-content/uploads/2018/09/ESET-LoJax.pdf", 
                                        "title": "LOJAX: First UEFI rootkit found in the wild, courtesy of the Sednit group (white paper)"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/638/original/35C3-First-Sednit-UEFI-Rootkit-Unveiled.pdf?1545904527", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9809.html", 
                                "id": 9809, 
                                "guid": "1601bf3b-ce4a-44c9-993f-7d28fa65168d", 
                                "logo": null, 
                                "date": "2018-12-27T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "00:40", 
                                "room": "Clarke", 
                                "slug": "35c3-9809-datenschutz_fur_neulandburger", 
                                "title": "Datenschutz f\u00fcr Neulandb\u00fcrger", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Der Datenschutz ist als erst relativ frisch erk\u00e4mpftes Abwehrrecht von B\u00fcrgern gegen Firmen und Staat ein wichtiges, aber h\u00e4ufig missverstandenes Rechtsgebiet. Zuletzt ist es durch die Grundverordnung auf europ\u00e4ischer Ebene in den Blick der Netz\u00f6ffentlichkeit geraten.\r\n\r\nDieser Vortrag soll einen niedrigschwelligen Einstieg in den Datenschutz geben und aus Perspektive einer Datensch\u00fctzerin mit zehnj\u00e4hriger Erfahrung im Gebiet die aufregenden Aspekte und Herausforderungen aufzeigen, dem B\u00fcrgerrecht Leben einzuhauchen.", 
                                "description": "Ziele des Vortrags (wird noch zum Volltext ausgearbeitet)\r\n* Eingrenzen des Rechtsgebiets\r\n* Beleuchten der Geschichte, Kontrast zu anderen \"Geheimnis-Schutz\"-Rechten\r\n* positive Auswirkungen auf den B\u00fcrger seit Kodifizierung durch BVerfG und Hessischem Datenschutzgesetz\r\n(angebliche) negative Auswirkungen auf Sicherheit, Strafverfolgung und Wirtschaftlichkeit\r\n* j\u00fcngste Neuerungen seit DSGVO\r\n* tats\u00e4chliche Auswirkungen der DSGVO auf bestehende Infrastruktur (\"Blogsterben\", \"war vorher schon illegal\")\r\n* Mythos Datenschutzerkl\u00e4rung\r\n* Wie sieht unsere Lieblings-Datenschutzerkl\u00e4rung aus?\r\n* Ausblicke auf weitere Initiativen", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6784, 
                                        "public_name": "Beata Hubrig"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9923.html", 
                                "id": 9923, 
                                "guid": "5b947f86-8ba1-4b99-adbe-7c5030deea0c", 
                                "logo": null, 
                                "date": "2018-12-27T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9923-space_ops_101", 
                                "title": "Space Ops 101", 
                                "subtitle": "An introduction to Spacecraft Operations", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "After launching a spacecraft into orbit the actual work for mission control starts. Besides taking care of the position and speed of the spacecraft this includes e.g. detailed modeling of the power usage, planning of ground station contacts, payload operations and dealing with unexpected anomalies. In this talk we will see many examples of problems particular to space crafts and how they influence the way space craft mission operations works.", 
                                "description": "<p>Suppose you built your own satellite and somehow managed to launch it into space, what are you going to do next? Can you just ssh into your onboard computer and try out a couple of things to take a picture of earth and download the file? Did you just lose contact with your satellite due to an empty battery, because it heated up too much or because it rotated in the wrong direction? What are other issues you might forget to account for?</p>\r\n<p>After understanding why in spacecraft operations nothing works the way one expects we will have some answers to these questions. Also we will see how these problems are nowadays tackled by mission control centers all over the world, what happens in emergencies, what FDS, GDS, LEOP and TTC stand for and why spacecraft operators worry so much about weird particularities of time systems. Everything will be illustrated by real-life examples.</p>\r\n<p>The only prerequisite for this talk is that you know that earth is not flat!</p>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8640, 
                                        "public_name": "sven"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9508.html", 
                                "id": 9508, 
                                "guid": "385ac419-50f5-49b5-b571-701691d2734f", 
                                "logo": "/system/events/logos/000/009/508/large/Screenshot_2018-12-09_21-08-08.png?1544386150", 
                                "date": "2018-12-27T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9508-digital_airwaves", 
                                "title": "Digital Airwaves", 
                                "subtitle": "Software Defined Radio Basics and some Modulation Theory ", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Encoding or decoding random radio-waveforms doesn't need incredible expensive hardware anymore which offers new possibilities for building up over-the-air communication systems. There are Software Defined Radios providing affordable cellular radio to remote villages, Community Radios are using SDR to build up digital radio networks and other cool stuff.\r\n\r\nSome basic knowledge what is going on in SDR Hard/Software as the influence of the samplerate, I/Q-data of the math behind the waterfall-diagram is helpful to have fun with SDR. Some theory on modulation techniques helps you to decode or encode your waveforms. ", 
                                "description": "With a cheap DVB-T USB  receiver used with some SDR-Software you can already have a look whats going on in the airwaves around you at certain frequencies. But what happens between the antenna and your computer display showing or decoding the signal? The talk should give basic information and background about SDR and some modulation theory.\r\n\r\nThere will probably be a SDR Challenge at the Congress to practice you new skills. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5073, 
                                        "public_name": "Friederike"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9372.html", 
                                "id": 9372, 
                                "guid": "eff16504-08ce-4de0-bf44-d877d286aac9", 
                                "logo": "/system/events/logos/000/009/372/large/edri_logo.png?1536831004", 
                                "date": "2018-12-27T18:50:00+01:00", 
                                "start": "18:50", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9372-citzens_or_subjects_the_battle_to_control_our_bodies_speech_and_communications", 
                                "title": "Citzens or subjects? The battle to control our bodies, speech and communications", 
                                "subtitle": "A call to action to defend our ePrivacy and eliminate upload filters", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Technology is the solution: What is the problem? This seems to be the motto. Algorithms  may be about to control our free speech while  tracking technologies could control our bodies and communications. Will we react or stay quiet?", 
                                "description": "Technology is the solution: What is the problem? This seems to be the motto. Whether it is about preventing the dissemination of terrorist content or to prevent copyright infringements the solution from the legislator is upload filters. \r\n\r\nWhile content is controlled by algorithms, devices need to be under scrutiny. That is why confidentiality of communications needs to be secured now too.\r\n\r\nWe have little time to stop these threats from becoming a reality, but we have most citizens on our side and the EU elections near. We still can and have to win this battle. Otherwise, once filters are put for copyright or terrorist content, they will be used for anything else. And if software and hardware does not defend our privacy by design and by default, 24/7 surveillance will be the new \"normal\".", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8131, 
                                        "public_name": "Diego Naranjo (EDRi)"
                                    }, 
                                    {
                                        "id": 8770, 
                                        "public_name": "Andreea Belu (EDRi)"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://edri.org/press-release-eu-parliament-flip-flops-backwards-on-copyright/", 
                                        "title": "EDRi's analysis on the adoption of upload filters"
                                    }, 
                                    {
                                        "url": "https://www.eff.org/deeplinks/2018/09/today-europe-lost-internet-now-we-fight-back", 
                                        "title": "EFF analysis of upload filters in the EU"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9358.html", 
                                "id": 9358, 
                                "guid": "a9c0c28c-4f40-4d06-99da-d73fbb2655c4", 
                                "logo": "/system/events/logos/000/009/358/large/Wikipedia_ZDF.gif?1536738413", 
                                "date": "2018-12-27T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9358-chaos_im_fernsehrat", 
                                "title": "Chaos im Fernsehrat", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Seit Juli 2016 darf ich \u2013 nominiert unter anderem vom CCC \u2013 den Bereich \"Internet\" im Fernsehrat des ZDF vertreten. Nach gut zwei Jahren ist es Zeit f\u00fcr eine Zwischenbilanz: Was macht ein Fernsehrat, was machen \u00f6ffentlich-rechtliche Angebote im Netz, und was sollten sie eigentlich tun? ", 
                                "description": "<blockquote>Der Fernsehrat vertritt die Interessen der Allgemeinheit gegen\u00fcber dem ZDF. Deshalb ist er kein Expertengremium, sondern so vielf\u00e4ltig wie die Gesellschaft selbst. Seine Mitglieder werden von unterschiedlichen gesellschaftlichen Gruppen entsandt. Der Fernsehrat tagt \u00f6ffentlich. Sowohl die Tagesordnung als auch die Zusammenfassungen der wesentlichen Ergebnisse der Sitzungen werden im Internet ver\u00f6ffentlicht.</blockquote>\r\n\r\nSo beschreibt sich der ZDF-Fernsehrat auf seiner Webseite selbst. Nach einem Urteil des Bundesverfassungsgerichts im Jahr 2014 mussten die L\u00e4nder den ZDF-Staatsvertrag neu formulieren, der Fernsehrat ist deshalb seit Juli 2016 neu zusammengesetzt. Nur noch maximal 20 von 60 Mitgliedern d\u00fcrfen aktive Politiker sein, der Rest soll verschiedene gesellschaftliche Gruppen repr\u00e4sentieren. Neu hinzu kamen im Zuge der Neuordnung Vertreter, die von den L\u00e4ndern \u2013 in der Regel auf Vorschlag von Vereinen oder Verb\u00e4nden \u2013 f\u00fcr Bereiche wie Minderheiten, Menschen mit Behinderung, Digitales oder LGBTQI nominiert werden.\r\n\r\nW\u00e4hrend Bayern das Nominierungsrecht f\u00fcr den Bereich \"Digitales\" an den Branchenverband der Telekommunikationsindustrie BITKOM delegiert hat, wurde ich vom Land Berlin auf gemeinsamen Vorschlag der vier Vereine <a href=\"https://ccc.de/\">Chaos Computer Club (CCC)</a>, <a href=\"https://d-64.org/\">D64 \u2013 Zentrum f\u00fcr Digitalen Fortschritt e.\u00a0V.</a>, <a href=\"https://www.eco.de/\">eco \u2013 Verband der Internetwirtschaft</a> und <a href=\"http://www.medianet-bb.de/\">media.net berlinbrandenburg e.\u00a0V.</a> f\u00fcr den Bereich \"Internet\" nominiert. \r\n\r\nNach etwas mehr als der H\u00e4lfte meiner vierj\u00e4hrigen Periode m\u00f6chte ich im Rahmen des 35C3 von meinen Aktivit\u00e4ten als und im Fernsehrat berichten \u2013 zumindest soweit das \u00fcbertriebene Verschwiegenheitsklauseln zulassen \u2013 und skizzieren, welche (neuen) Aufgaben \u00f6ffentlich-rechtliche Medien gerade im Zeitalter digitaler Plattform\u00f6ffentlichkeiten haben. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4212, 
                                        "public_name": "Leonhard Dobusch"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://netzpolitik.org/neues-aus-dem-fernsehrat/", 
                                        "title": "Reihe \"Neues aus dem Fernsehrat\" bei netzpolitik.org"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/651/original/Dobusch-35C3-Chaos_im_Fernsehrat_FINAL.pdf?1545924504", 
                                        "title": "Slides \"Chaos im Fernsehrat\""
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9792.html", 
                                "id": 9792, 
                                "guid": "bf5019dc-499d-4c06-9ad0-35adbe01e7f3", 
                                "logo": null, 
                                "date": "2018-12-27T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9792-quantum_mechanics", 
                                "title": "Quantum Mechanics", 
                                "subtitle": "A Gentle Introduction", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "An (almost) self-contained introduction to the basic ideas of quantum mechanics. The theory and important experimental results will be discussed.", 
                                "description": "<p>Quantum mechanics is one of the two paradigm-changing physical theories of the early twentieth century (the other being special and general relativity). Suddenly, one of the most fundamental physical theories was no longer deterministic: Measurement is a probabilistic process in quantum mechanics. This caused a controversy on how to interpret this and whether quantum mechanics is a complete theory that continues until today.</p>\r\n<p>This talk tries to counter a trend: Most people know the fundamentals of special relativity, while few know quantum mechanics beyond the Bohr model of hydrogen. On reason is that the presentation of quantum mechanics in schoolbooks is often dated, inaccurate and incomplete, and, as a consequence, quantum mechanical concepts are often used as a magical component in fringe science and esoteric theories.</p>\r\n<p>The talk will shortly discuss some of the experimental results that have lead to the formulation of quantum mechanics and then formulate the theory. The parts of quantum mechanics that often show up in quack theories will be examined and dissected.</p>\r\n<p>Allergy advice: This talk may contain mathematics. Some prior knowledge of linear algebra will help to understand this talk.</p>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8587, 
                                        "public_name": "sri"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/665/original/talk.pdf?1545952876", 
                                        "title": "Presentation Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9951.html", 
                                "id": 9951, 
                                "guid": "07cbfcb7-08de-4965-b70f-f904d39f7c78", 
                                "logo": "/system/events/logos/000/009/951/large/mass-awareness-mass-surveillance-2.png?1539643035", 
                                "date": "2018-12-27T23:30:00+01:00", 
                                "start": "23:30", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9951-it_always_feels_like_the_five_eyes_are_watching_you", 
                                "title": "It Always Feels Like the Five Eyes Are Watching You", 
                                "subtitle": "Five Eyes\u2019 Quest For Security Has Given Us Widespread Insecurity", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "This talk will discuss all about the Five Eyes, the espionage alliance between Australia, Canada, New Zealand, the United Kingdom and the United States. It is one of the largest intelligence operations in the world, which monitors billions of communications around the globe in the name of security. Yet the Five Eyes propose to weaken security, privacy and eroded the possibility of secure systems.", 
                                "description": "This talk will go into details about the Five Eyes (FVEY), covering its origins in the aftermath of World War II, its expansion in the cold war, ECHELON, and further expansion in the the era of counter-terrorism, through today, where the Five Eyes have set their sights on enabling mass surveillance and stopping strong encryption.\r\n\r\nThe discussion will include:\r\n- The history and background of the Five Eyes\r\n\tOrigins\r\n\tCold War (ECHELON)\r\n\tTerrorism\r\n- How the FVEY spying and intelligence sharing works\r\n\t- Malware\r\n\t- Backdoors\r\n\t- Routers\r\n\t- Internet exchanges\r\n- Domestic sharing: when one member spies on another\u2019s citizens, and shares the information back to get around prohibitions on domestic surveillance.\r\n- More Eyes, More Problems.  Proposals to expand the number of eyes, including many within the EU\r\n- Whistleblowers: What the documents shared by Edward Snowden revealed about the Five Eyes\r\n- The Five Eyes latest fight: Against strong encryption. FVEY member claim to aim to \"thwart the encryption of terrorist messaging,\u201d and the UK and Australia have taken steps through legislation to weaken security.\r\n- Why this matters - the legal and policy framework for communications surveillance and the application of human rights principles for surveillance.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4020, 
                                        "public_name": "Kurt Opsahl"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Dijkstra": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9529.html", 
                                "id": 9529, 
                                "guid": "2912b643-f5a8-4bbd-8b24-74983bc55754", 
                                "logo": null, 
                                "date": "2018-12-27T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9529-artistic_pcb_design_and_fabrication", 
                                "title": "Artistic PCB Design and Fabrication", 
                                "subtitle": "From doodle to manufacture: how I make mechanically complicated PCBs.", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "When a electrical device needs to be a piece of art or used as a mechanical component, a printed circuit board is more than a piece of fiberglass with wires embedded in it. In chemical engineering applications internal holes which allow fluids to be transported through the PCB need to be placed in complex precise patterns. As art, holes can be used to create positive and negative space, allowing you to see a charlieplexed LED display as a snowflake. Creating complex shapes in PCB design software is difficult to impossible. However, it is easy in CAD software. In this talk I will present the project workflow I use to design and manufacture my PCBs. Additionally, I will discuss the problems I have run into during manufacturing and how these problems were resolved. ", 
                                "description": "<p>Making electrical-artistic and electrical-mechanical PCBs adds steps and complications to the usual PCB fabrication process. In this talk I will go over my project workflow and discuss how and why I do each step. I will also discuss problems I have run into during both the design and the manufacturing process.</p>\r\n<p>An overview of my workflow is as follows:<p>\r\n<ul>\r\n<li>Make a sketch of what the final PCB will look like and what it will do.\r\n<li>Make a schematic of the electronics (kicad).\r\n<li>Assign footprints to the electrical components (kicad).\r\n<li>Check the manufacturers webpage for the design criterion on internal cuts.\r\n<li>Create a CAD file of the PCB outline (no electrical connections) (fusion 360/solidworks etc).\r\n<li> (optional) Conduct multiphysics simulations of the PCB outline, to find an optimal design (comsol etc).\r\n<li>Make boxes to represent the footprints of the electrical components and place these where you want them to be on the final PCB (fusion 360/solidworks etc).\r\n<li>Think about how the boards will be panelized and insert mouse bites/tabs for V-cuts as needed (fusion 360/solidworks etc).\r\n<li>Export a 2D drawing of the PCB including the components.\r\n<li>Make a PCB file with all the components (kicad).\r\n<li>Import the 2D drawing of the PCB as the edge cuts in the PCB file (kicad).\r\n<li>Place electrical components in the correct location and delete the edge cuts which are just being used as markers (kicad).\r\n<li>Use a routing software to connect components or connect these manually.\r\n<li>(optional) Panelize the boards by making a new PCB file and importing the single PCB.\r\n<li>Export the gerber files.\r\n<li>Check that the outlines are correct in the gerber files and clean up machining code if necessary.\r\n<li>Upload files to manufacturers webpage and include an image of which places should be milled out.\r\n</ul>\r\n<p>Common problems have included:</p>\r\n<ul>\r\n<li>V-cuts on non-rectangular PCBs.\r\n<li>Keepout zones on internal edge-cuts.\r\n<li>Gerber file generation errors caused by internal edge cuts and pannelization.\r\n<li>Some manufacturers do not do internal edge cuts.\r\n<li>Boards are mechanically weakened by internal cuts.\r\n</ul>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8162, 
                                        "public_name": "hammes hacks"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://hammeshacks.com/", 
                                        "title": "Project Webpage"
                                    }, 
                                    {
                                        "url": "https://www.youtube.com/channel/UCuMGhT5u-Y6Ju8j4m7s8X2A", 
                                        "title": "Youtube Channel"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/507/original/IMG_20181008_181143.jpg?1539015548", 
                                        "title": "shamrock"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9720.html", 
                                "id": 9720, 
                                "guid": "c8b34953-b60f-4ed0-8784-dc20153e0725", 
                                "logo": null, 
                                "date": "2018-12-27T13:30:00+01:00", 
                                "start": "13:30", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9720-frontex_der_europaische_grenzgeheimdienst", 
                                "title": "Frontex: Der europ\u00e4ische Grenzgeheimdienst", 
                                "subtitle": "Das Grenz\u00fcberwachungssystem EUROSUR f\u00fchrt Aufkl\u00e4rungsdaten von Satelliten, Flugzeugen, Drohnen und bald auch Fesselballons zusammen", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Die EU-Grenzagentur Frontex nimmt eine Reihe neuer \u00dcberwachungsmethoden im Mittelmeer in Betrieb. Die F\u00e4higkeiten zur Beobachtung des sogenannten Grenzvorbereichs geh\u00f6ren zum Grenz\u00fcberwachungssystem EUROSUR, das die Europ\u00e4ische Union vor f\u00fcnf Jahren gestartet hat. ", 
                                "description": "EUROSUR vernetzt die Zentrale von Frontex in Warschau mit den Grenzbeh\u00f6rden der 28 Mitgliedstaaten. \u00dcber deren nationale Koordinierungszentren wird Frontex \u00fcber alle wichtigen Vorkommnisse an den Au\u00dfengrenzen der Europ\u00e4ischen Union unterrichtet. Kern des EUROSUR-Systems ist die Satellitenaufkl\u00e4rung, \u00fcber die Frontex auch selbst an den Grenzen beobachten kann. Die Bilder stammen von kommerziellen Satellitendiensten sowie von optischen und radarbasierten Satelliten des EU-Erdbeobachtungsprogramms \u201eCopernicus\u201c. Sie werden vom Satellitenzentrum der Europ\u00e4ischen Union (SatCen) erhoben, aufbereitet und an Frontex \u00fcbermittelt. Zu den Bildlieferanten geh\u00f6rt der R\u00fcstungskonzern Airbus, der Bilder seiner Radarsatelliten \u201eTerraSar-X\u201c und \u201eTanDEM-X\u201c mit einer Aufl\u00f6sung von 24 cm verkauft. F\u00fcr die schnelle Kommunikation mit den Satelliten nutzt \u201eCopernicus\u201c als erster Kunde die \u201eWeltraumdatenautobahn\u201c des Airbus-Konzerns. Die Nutzung der Daten f\u00fcr die einzelnen AnwenderInnen wurde erst k\u00fcrzlich mithilfe einer App vereinfacht, die ein Mitarbeiter der Abteilung \u201eInformationshoheit\u201c als eine Art Instagram f\u00fcr Sicherheitsanwendungen beschreibt.\r\nNun werden auch die technischen F\u00e4higkeiten von \u201eCopernicus\u201c ausgebaut. Das System soll \u201eUnregelm\u00e4\u00dfigkeiten im Schiffsverhalten\u201c erkennen und melden. Dabei werden Informationen zum Standort, der Schiffsbezeichnung und zum abweichenden Verhalten \u00fcbermittelt. Als verd\u00e4chtig kann etwa gelten, wenn ein Schiff keine gew\u00f6hnlichen Routen f\u00e4hrt oder die Geschwindigkeit verlangsamt. Frontex hat im vergangenen Jahr einen \u201eMehrzweck-Flugdienst\u201c gestartet. Von Flugzeugen \u00fcber dem Mittelmeer aufgenommene Videos werden in Echtzeit in ein Lagezentrum der EUROSUR-Zentrale nach Warschau gestreamt. Seit diesem Jahr erh\u00e4lt Frontex au\u00dferdem Bilder von Aufkl\u00e4rungsdrohnen, die von der Agentur f\u00fcr die Sicherheit des Seeverkehrs geflogen werden. Zun\u00e4chst handelt es sich dabei um ein Pilotprojekt f\u00fcr zwei verschieden gro\u00dfe Drohnen der MALE-Klasse. Demn\u00e4chst will Frontex au\u00dferdem Fesselballons zur \u201eGrenzraum\u00fcberwachung aus der Luft\u201c testen. \r\n\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4722, 
                                        "public_name": "Matthias Monroy"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/538/original/EUROSUR-Pilot.jpg?1539592021", 
                                        "title": " EUROSUR-Pilotprojekt von 2009. Damals kam die Gefahr f\u00fcr Frontex noch aus dem Osten."
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/650/original/35C3_Frontex.pdf?1545923568", 
                                        "title": "Pr\u00e4sentation"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9909.html", 
                                "id": 9909, 
                                "guid": "65563dfd-db48-41ea-85a9-e889dd673d09", 
                                "logo": "/system/events/logos/000/009/909/large/schrift_knoten.png?1539639051", 
                                "date": "2018-12-27T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9909-updates_von_der_europaischen_aussengrenze", 
                                "title": "Updates von der europ\u00e4ischen Au\u00dfengrenze", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Als Organisation f\u00fcr Menschenrechtsbeobachtungen geben wir Euch einen \u00dcberblick der aktuellen Entwicklungen an der EU-Au\u00dfengrenze auf dem Mittelmeer.", 
                                "description": "Mare Liberum betreibt ein Schiff auf dem Mittelmeer, um Menschenrechtsverletzungen zu dokumentieren. Dabei arbeiten wir zur Zeit in der \u00c4g\u00e4is, der Seegrenze zwischen der T\u00fcrkei und Griechenland. Hier fl\u00fcchten noch immer tausende Menschen auf der Suche nach Schutz und W\u00fcrde.\r\n\r\nSeit den Vortr\u00e4gen von Sea-Watch und der Iuventa-Crew ist viel Zeit vergangen. Die zivilen Seenotrettungsorganisationen fahren nicht mehr raus \u2013 sind alle gerettet?\r\n\r\nWie hat sich die Situation f\u00fcr die Fl\u00fcchtenden und Helfer ver\u00e4ndert?\r\n\r\nWie werden Euch einen \u00dcberblick der aktuellen Entwicklungen an der EU-Au\u00dfengrenze auf dem Mittelmeer geben.\r\n\r\nWarum schaffen es die europ\u00e4ischen Staaten nach f\u00fcnf Jahren Katastrophe im Mittelmeer nicht, das Sterben zu beenden? Was ist eigentlich deren Agenda?\r\n\r\nWarum wollen alle st\u00e4ndig eine neue Flagge?\r\n\r\nWie gut funktionert eigentlich der EU-T\u00fcrkei-Deal?\r\n\r\nWelche staatlichen Akteure gibt es auf dem Wasser und was machen sie?\r\n\r\nWarum ist die Rolle der Menschenrechtsbeobachter, selbst in Europa, so wichtig?", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8627, 
                                        "public_name": "Nico"
                                    }, 
                                    {
                                        "id": 8743, 
                                        "public_name": "Nina Gassmann"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://mare-liberum.org", 
                                        "title": "Mare Liberum e. V."
                                    }, 
                                    {
                                        "url": "https://mare-liberum.org/de/support", 
                                        "title": "Unterst\u00fctzung"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10027.html", 
                                "id": 10027, 
                                "guid": "4db8970f-bbfe-4541-90a8-31a05d599ffb", 
                                "logo": null, 
                                "date": "2018-12-27T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-10027-cyber-_stalking_wenn_grenzen_verschwimmen", 
                                "title": "(Cyber-)Stalking: Wenn Grenzen verschwimmen", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "<p>Von unerw\u00fcnschten Nachrichten \u00fcber Bedrohungen bis hin zum Intimizid. Allein im Jahr 2017 wurden rund 18.483 F\u00e4lle von Stalking polizeilich erfasst, die Dunkelziffer wird auf 600.000-800.000 Betroffene gesch\u00e4tzt. Unter dem Begriff Stalking wird allgemein das \u201ewiederholte, widerrechtliche Verfolgen und Bel\u00e4stigen eines Menschen, so dass dessen Sicherheit bedroht und er/sie in seiner/ihrer Lebensgestaltung schwerwiegend beeintr\u00e4chtig wird\u201c verstanden. Die Ausf\u00fchrungsformen und Intensit\u00e4t des Stalkings oder Cyberstalkings sind sehr heterogen, sodass sich oft die Frage nach der Grenze zur Strafbarkeit stellt.<\\p>", 
                                "description": "<p>Neben einer kurzen Einf\u00fchrung in den Ph\u00e4nomenbereich werden die Ursachen und Typologien des Stalkings skizziert, sowie Internventionsm\u00f6glichkeiten pr\u00e4sentiert: Welche psychotherapeutischen Unterst\u00fctzungsma\u00dfnahmen gibt es f\u00fcr Betroffene und Ausf\u00fchrende? Welche juristischen M\u00f6glichkeiten gibt es?  <\\p>\r\n<p>Da rund jeder zw\u00f6lfte Mensch in Deutschland in seinem Leben von Stalking betroffen ist und der/die Ausf\u00fchrende zumeist aus dem Nahbereich der/des Betroffenen stammt, kann sich auch im eigenen Freundeskreis die Frage stellen: Wie kann ich einer/m Stalking-Betroffen/m unterst\u00fctzen und helfen? Oder wie spreche ich eine/n vermutlichen Stalking-Ausf\u00fchrende/n auf sein/ihr Verhalten an?<\\p>\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8741, 
                                        "public_name": "Jan Kalbitzer"
                                    }, 
                                    {
                                        "id": 8740, 
                                        "public_name": "Korina Winter "
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10023.html", 
                                "id": 10023, 
                                "guid": "a5de31e6-0223-4b1f-953c-558e2fd39bd9", 
                                "logo": "/system/events/logos/000/010/023/large/Fliegenpilz_fly-agaric-2817723_640.jpg?1545772806", 
                                "date": "2018-12-27T17:10:00+01:00", 
                                "start": "17:10", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-10023-stalking_spy_apps_doxing_digitale_gewalt_gegen_frauen", 
                                "title": "Stalking, Spy Apps, Doxing: Digitale Gewalt gegen Frauen", 
                                "subtitle": "Die digitale Seite der h\u00e4uslichen Gewalt", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Digitale Formen von Gewalt gegen Frauen sind keine eigenst\u00e4ndigen Ph\u00e4nomene, sondern in der Regel Weiterf\u00fchrungen oder Erg\u00e4nzungen von anderen Gewaltformen. Stalking, Kontrolle, Bedrohung, Erpressung, Beleidigung, \u00dcberwachung sind altbekannte Aspekte h\u00e4uslicher Gewalt. F\u00fcr alle diese Ph\u00e4nomene gibt es digitale Entsprechungen, allerdings ist wenig dar\u00fcber bekannt, wie oft sie ausge\u00fcbt werden, wann und von wem. Das macht es f\u00fcr die Betroffenen schwer, sich zu wehren, auch weil Politik und Justiz hier genauso verst\u00e4ndnislos reagieren wie bei anderen digitalen Entwicklungen. ", 
                                "description": "Warum ist Kinderpornographie ein Kernthema der deutschen und europ\u00e4ischen Innenpolitik, aber kaum jemand redet \u00fcber Revenge-Porn?</br>\r\n</br>\r\nIn diesem Talk geht es um die verschiedenen Formen digitaler Gewalt und darum, wie oft sie vorkommen und wer davon betroffen ist.</br>\r\n</br>\r\nEs gibt kaum aussagekr\u00e4ftige Zahlen und wenig Hilfe f\u00fcr Betroffene. Warum wissen wir sowenig und was gibt es f\u00fcr M\u00f6glichkeiten, sich gegen die verschiedenen Formen digitaler Gewalt zu wehren? </br>\r\n\r\n\r\n\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 1864, 
                                        "public_name": "Anne Roth"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.aktiv-gegen-digitale-gewalt.de/de/", 
                                        "title": "bff Projekt 'Aktiv gegen digitale Gewalt'"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/628/original/KleineAnfrage_Digitale_Gewalt_19-6174.pdf?1545758999", 
                                        "title": "Kleine Anfrage Die Linke \"Digitale Gewalt gegen Frauen\""
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9383.html", 
                                "id": 9383, 
                                "guid": "8a3e490c-30a5-46a6-ab4f-45ef3b23b1a1", 
                                "logo": "/system/events/logos/000/009/383/large/Screen-Shot-2018-08-14-at-4.16.18-AM-1.png?1536981731", 
                                "date": "2018-12-27T18:10:00+01:00", 
                                "start": "18:10", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9383-compromising_online_accounts_by_cracking_voicemail_systems", 
                                "title": "Compromising online accounts by cracking voicemail systems", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Voicemail systems can be compromised by leveraging old weaknesses and top of current technology. The impact goes way beyond having your messages exposed.", 
                                "description": "Voicemail systems have been with us since the 80s. They played a big role in the earlier hacking scene and re-reading those zines, articles and tutorials paints an interesting picture. Not much has changed. Not in the technology nor in some of the attack vectors. Can we leverage the last 30 years innovations to compromise voicemail systems? And what is the real impact today of pwning these?\r\n\r\nIn this talk I will cover voicemail systems, it's security and how we can use oldskool techniques and new ones on top of current technology to compromise them. I will discuss the impact of gaining unauthorized access to voicemail systems and introduce a new tool that automates the process.\r\n\r\nCorrection: There is no default PIN on O2 anymore. Initial PINs are generated randomly as it is the case for Vodafone and Telekom.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7159, 
                                        "public_name": "Martin Vigo"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.martinvigo.com/demo_bruteforcing.mp4", 
                                        "title": "Bruteforcing a voicemail PIN with voicemailcracker"
                                    }, 
                                    {
                                        "url": "https://www.martinvigo.com/demo_whatsapp.mp4", 
                                        "title": "Compromising WhatsApp with voicemailcracker"
                                    }, 
                                    {
                                        "url": "https://www.martinvigo.com/demo_paypal.mp4", 
                                        "title": "Compromising Paypal with voicemailcracker"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/667/original/compromising_online_accounts_by_cracking_voicemail_systems.pdf?1545960801", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9675.html", 
                                "id": 9675, 
                                "guid": "ffdc92f3-1a39-4931-9409-f8bfabe9f628", 
                                "logo": null, 
                                "date": "2018-12-27T19:10:00+01:00", 
                                "start": "19:10", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9675-transmission_control_protocol", 
                                "title": "Transmission Control Protocol", 
                                "subtitle": "TCP/IP basics", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "TCP/IP is the most widely used protocol on the Internet for transmitting data. But how does it work in detail? This talk will explain the TCP protocol, from handshake over established to teardown in detail - and elaborate a bit on protocol adjustments over time and congestion control.", 
                                "description": "I will briefly explain how computers talk to each other via the Internet Protocol (IP), and explain the transport protocols UDP and TCP, and their interaction with ICMP (for error and control messages). UDP is the user datagram protocol, an unreliable packet-oriented protocol. TCP provides a reliable stream of data, and includes connection establishment, feature negotiation, window management, and teardown.\r\n\r\nOver the last years at University of Cambridge I contributed to a formal model of TCP/IP and the Unix sockets API, developed in HOL4. We validated our HOL4 model with the FreeBSD-12 stack using Dtrace (packets, system calls, internal TCP state). In this research, we formalised a more exact TCP state machine than in initial RFCs or common literature (Stevens).", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 1626, 
                                        "public_name": "Hannes Mehnert"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.cl.cam.ac.uk/~pes20/Netsem/paper3.pdf", 
                                        "title": "Engineering with Logic: Rigorous Test-Oracle Specification and Validation for TCP/IP and the Sockets API"
                                    }, 
                                    {
                                        "url": "https://github.com/rems-project/netsem", 
                                        "title": "Network Semantics repository"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9778.html", 
                                "id": 9778, 
                                "guid": "dbd61e6a-dbde-4dcd-9b2e-73ba7ad62861", 
                                "logo": "/system/events/logos/000/009/778/large/oscar_eckig.png?1545254350", 
                                "date": "2018-12-27T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9778-open_source_firmware", 
                                "title": "Open Source Firmware", 
                                "subtitle": "Eine Liebesgeschichte", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Open Source firmware ist ein Begriff seit 1999 wo LinuxBIOS (coreboot) und u-boot als Projekt starteten. Heute nach fast 20 Jahren ist endlich Open Source firmware bei den Herstellern von Hardware angekommen:\r\n\r\nGoogle Chromebooks - coreboot\r\nFacebook Open Compute Hardware - coreboot / LinuxBoot\r\nPurism Laptops - coreboot\r\nMicrosoft Olympus - TianoCore\r\nMicrosoft Surface - TianoCore\r\nIBM Power 9 - Hostboot / Skiboot\r\nARM Hardware - ARM Trusted Firmware\r\nIntel Minnowboard - TianoCore, coreboot\r\nA lot embedded hardware - u-boot\r\n\r\nIn diesem Vortrag werden wir uns den Weg der Open Source firmware  Entwicklung von der Vergangeheit bis in die Gegenwart anschauen. Dabei werden wir ein Schwerpunkt auf neue Technologien in der Firmware Entwicklung und eine Einf\u00fchrung in bestehende Konzepte legen. Teil des Vortrags werden auch Sicherheitstechnologien und Konzepte der Firmware sein. Zum Schluss werden wir einen Ausblick auf die Zukunft und damit verbundenen Ideen uns anschauen.\r\n\r\nDies ist ein Einsteiger Vortrag der dazu dienen soll mehr Menschen von der Open Source Firmware Entwicklung zu begeistern.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8332, 
                                        "public_name": "zaolin"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "www.coreboot.org", 
                                        "title": "coreboot"
                                    }, 
                                    {
                                        "url": "www.linuxboot.org", 
                                        "title": "LinuxBoot"
                                    }, 
                                    {
                                        "url": "www.denx.de/wiki/U-Boot", 
                                        "title": "U-Boot"
                                    }, 
                                    {
                                        "url": "www.tianocore.org", 
                                        "title": "TianoCore"
                                    }, 
                                    {
                                        "url": "www.trustedfirmware.org", 
                                        "title": "ARM Trusted Firmware"
                                    }, 
                                    {
                                        "url": "github.com/open-power/hostboot", 
                                        "title": "Hostboot"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/668/original/slides_open-source-firmware.zip?1545963349", 
                                        "title": "Talk slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9456.html", 
                                "id": 9456, 
                                "guid": "1dc4f8d0-e5f6-4e49-b647-1a5e0cabbb00", 
                                "logo": null, 
                                "date": "2018-12-27T23:30:00+01:00", 
                                "start": "23:30", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9456-hacking_ecology", 
                                "title": "Hacking Ecology", 
                                "subtitle": "How Data Scientists can help to avoid a sixth global extinction", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "As humans have a large negative impact on ecosystems all around the globe, we are approaching a major extinction event in which around 70% of all species will go extinct. This talk will give an introduction to a data-driven and system-based view of ecology.", 
                                "description": "Since life emerged on this planet around 3 billion years ago, five global extinction events took place, that are characterized by over 60% of all species disappearing within a geologically short time interval. The last decades of environmental research, however, made it evidently clear that anthropogenic impacts on the global ecology could lead to a sixth global extinction. Being caused by the destabilization of ecosystems due to climate change, poaching, fragmenting of habitats, species invasions, pollution and other human activities, this extinction event would be the first induced by a species and not by natural catastrophes.\r\n\r\nTwo general paths of action seem available to mitigate this threat or at least limit the damage: One consists of radically limiting anthropogenic influence on nature by restricting human habitats (to, as argued by E. O. Wilson among others, half of the earths surface), which, however, seems politically infeasible. A second strategy aims to effectively re-stabilize ecosystems by selective and specific intervention, but this would require a much deeper knowledge of ecosystem processes and how to modulate them. \r\n\r\nIn this talk, I will provide an overview of the declining quality of ecosystems worldwide and argue that data-driven approaches as well as a hacker mindset will be essential to tackle open questions. I will support this argument by examples from my own research, in which I aim to identify important interactions between microbes in lake ecosystems. Finally, I will try to start a discussion on how to create citizen science projects that will help us understand our natural environment.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8239, 
                                        "public_name": "Theodor Sperlea"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/656/original/Talk_35c3_169.pdf?1545927988", 
                                        "title": "Presentation slides"
                                    }
                                ]
                            }
                        ], 
                        "Eliza": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9913.html", 
                                "id": 9913, 
                                "guid": "bfdac26a-86bf-4a80-99c6-a9a0be15f003", 
                                "logo": null, 
                                "date": "2018-12-27T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9913-going_deep_underground_to_watch_the_stars", 
                                "title": "Going Deep Underground to Watch the Stars", 
                                "subtitle": "Neutrino Astronomy with Hyper-Kamiokande", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Neutrinos are \u201cghost-like\u201d elementary particles that can literally go through walls. They can bring information from places that are impossible to observe through other means.\r\nThis talk provides a glimpse behind the scenes of a next-generation neutrino detector called Hyper-Kamiokande \u2013 a cylindrical water tank the size of a high-rise building. I will describe some of the problems you encounter when planning a subterranean detector of this size, and explain how this detector helps us figure out why the sun shines and how giant stars explode.", 
                                "description": "Neutrinos are tiny elementary particles that do not interact through the electromagnetic force. Almost like ghosts, they can literally go through walls and escape places that are inaccessible by other means, giving us a unique way of observing the interior of stars or nuclear reactors.\r\n\r\nHyper-Kamiokande \u2013 a cylindrical water tank that is 62 m high and 76 m in diameter \u2013 is a next-generation neutrino detector, which will be built inside a mountain 250 km northwest of Tokyo starting in 2020. The talk will give an overview on the process of designing and building a subterranean detector of this size, starting from preparations for cavern construction and ending with the design of photodetectors, electronics and data analysis.\r\n\r\nIn addition, the talk will cover selected areas of the physics programme of this detector. It will be explained how detecting neutrinos from our sun lets us figure out why the sun shines and how we can measure the temperature at its core to a precision of about 1%. Finally, I will explain how such a neutrino detector can help us watch, millisecond by millisecond, how giant stars explode in a supernova, creating many of the chemical elements that are necessary for life and computers to exist.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6836, 
                                        "public_name": "Jost Migenda"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://www.hyperk.org", 
                                        "title": "Hyper-Kamiokande website"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/630/original/35C3_JostMigenda.pdf?1545850403", 
                                        "title": "Slides (pdf, 30MB)"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9410.html", 
                                "id": 9410, 
                                "guid": "9d8d4506-03b2-483d-aee5-d106f0a3eef5", 
                                "logo": "/system/events/logos/000/009/410/large/lsa.png?1537339912", 
                                "date": "2018-12-27T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9410-libresilicon", 
                                "title": "LibreSilicon", 
                                "subtitle": "Decentralizing semiconductor manufacturing", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "While a lot of projects are currently developing their own processors, mostly as open source in Verilog, VHDL or even Chisel, we miss the free process that actually manufactures these chips. So we're developing the \"Libre Silicon\" project, a portable semiconductor manufacturing process and technology, using only free and open source tools: We would like to introduce the project, who we are, what we are doing and where we are now.", 
                                "description": "The manufacturing is proprietary and has vendor lock-ins with triple NDAs \u2013 one for the <b>process development kit</b> (PDK), the technology itself; \u2013 one for the Standard Cell Library you can use to synthesize your RTL; \u2013 and even another one for the details of all purchase commitments.\r\n\r\nOur purpose is a free and open, community based silicon manufacturing process (<a href=\"https://github.com/libresilicon/process\">GitHub link</a>) without any NDAs, a Standard Cell Library (<a href=\"https://github.com/chipforge/StdCellLib\">GitHub link</a>) not only for that process as well as a suitable, refurbished, new-written open source tool chain QtFlow (<a href=\"https://github.com/leviathanch/qtflow\">GitHub link</a>).\r\n\r\nDuring the last couple of months we already developed the first free 1\u00b5m process and are now close to manufacturing a first test wafer (<a href=\"https://github.com/libresilicon/PearlRiver\">GitHub link</a>). Even though 1\u00b5m does not sounds very ambitious, this process node is still quite well documented in text books, robust and 5 Volt-tolerant.\r\n\r\nOnce we get a hang on this, the machinery park in the clean room allows us to shrink down to 500nm and less.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4618, 
                                        "public_name": "leviathan"
                                    }, 
                                    {
                                        "id": 1018, 
                                        "public_name": "hsank"
                                    }, 
                                    {
                                        "id": 8731, 
                                        "public_name": "Andreas Westerwick"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://github.com/leviathanch/qtflow", 
                                        "title": "QtFlow"
                                    }, 
                                    {
                                        "url": "https://github.com/chipforge/StdCellLib", 
                                        "title": "Standard Cell Lib"
                                    }, 
                                    {
                                        "url": "http://libresilicon.com/", 
                                        "title": "LibreSilicon project page"
                                    }, 
                                    {
                                        "url": "https://github.com/chipforge/PearlRiver", 
                                        "title": "PearlRiver test wafer"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/636/original/talk-20181227-35c3.pdf?1545900171", 
                                        "title": "talk-20181227-35c3.pdf"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9375.html", 
                                "id": 9375, 
                                "guid": "6a5007f4-e7d6-4c63-9a10-26dd48a6eb6c", 
                                "logo": "/system/events/logos/000/009/375/large/logo.png?1542061465", 
                                "date": "2018-12-27T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9375-silivaccine_north_korea_s_weapon_of_mass_detection", 
                                "title": "SiliVaccine: North Korea's Weapon of Mass Detection", 
                                "subtitle": "How I Learned to Stop Worrying and Love the Backdoor", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Meet SiliVaccine \u2013 North Korea's national Anti-Virus solution. SiliVaccine is deployed widely and exclusively in the DPRK, and has been continuously in development by dedicated government teams for over fifteen years. When we heard of this strange software, we were immediately driven to investigate it: it's not every day that you can catch a glimpse of the malware landscape inside the closed garden of the DPRK's intranet.\r\n\r\nIn this talk, we will describe how we were able to obtain a rare copy of SiliVaccine; how we reverse-engineered it, despite the hair-tearing obstacles; and what surprising discoveries we made about its program architecture \u2013 all the way down to the file scanning engine, the system level drivers, the user mode utilities, and the most bizarre and puzzling implementation details. As it turns out, there is plenty going on behind the scenes of this product, away from the public eye.\r\n\r\nHow was SiliVaccine created? Who created it? What was the game plan? We will try to shed light on these questions, and on the sheer effort that must have gone into developing this product. If there is anything we learned from this research, it's that DPRK state-sponsored software is a secretive industry underlied by incredibly shady practices, and that if Kim Jong-Un sends you a free trial of his latest security solution, the correct answer is \"thank you but no thank you\".\r\n\r\nDisclaimer: No significant knowledge in reverse engineering is required to understand the talk. We break down our thought process and methodology to its very basics, so that this talk can relate to both technical and non-technical audiences.\r\n\r\nAnother Disclaimer: We guarantee an entertaining talk. :) ", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8148, 
                                        "public_name": "Mark Lechtik"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://research.checkpoint.com/silivaccine-a-look-inside-north-koreas-anti-virus/", 
                                        "title": "Full technical publication of the research"
                                    }, 
                                    {
                                        "url": "https://recon.cx/2018/montreal/schedule/system/event_attachments/attachments/000/000/055/original/RECON-MTL-2018-silivaccine_weapon_of_mass_detection.pdf", 
                                        "title": "Slide deck of this talk, as presented in REcon Montreal 2018"
                                    }, 
                                    {
                                        "url": "https://www.forbes.com/sites/thomasbrewster/2018/05/01/north-korea-antivirus-has-mystery-code-from-trend-micro/", 
                                        "title": "A publication on the research from Forbes magazine (good non-technical summary)"
                                    }, 
                                    {
                                        "url": "https://www.theregister.co.uk/2018/05/02/north_korea_silivaccine_av_software_analysis/", 
                                        "title": "An even shorter summary from The Register"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9635.html", 
                                "id": 9635, 
                                "guid": "b34662ae-f1c6-4711-9270-b5865f6dd6c8", 
                                "logo": "/system/events/logos/000/009/635/large/hermies.png?1539503435", 
                                "date": "2018-12-27T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9635-scuttlebutt", 
                                "title": "Scuttlebutt", 
                                "subtitle": "The decentralized P2P gossip protocol", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "In this talk @zelf invites to the world of Scuttlebutt, the decentralized P2P gossiping protocol, and how it can be transformative for society through decentralization of data and enabling local community development. ", 
                                "description": "Scuttlebutt is a fast growing decentralized social network. As an alternative to the large corporate social networks it enables autonomy for the users and a free zone from big data harvesting. \r\n\r\nIt\u2019s based on a protocol (referred to as SSB) which connects the users via a blockchain styled base with each user functioning as a node. Since the information is collected via a 2 or 3 step social connection it\u2019s completely usable while offline and syncs when connected to a local network, a friend or wifi.\r\n\r\nScuttlebutt has a large community of users who together develop the protocol and platforms. Completely open-source there are many initiatives of projects, maintenance and explorations as part of the Scuttlebutt ecosystem. Some of these projects range from local community on-boarding by @luandro in Quilombola - Brazil, git-ssb by @cel, and even a chess interface!\r\n\r\nAs the Scuttlebutt interface is interchangeable, with the one most widely used being Patchwork, there is a possibility to utilize the same network with multiple applications. Perfect for local communities in rural areas or for environments which require offline workability or simply for user with integrity, the potentials are grand. As of today the estimate is that the user base is beyond 8000 individuals, yet there's no way to surely know.\r\n\r\nWe will explore the Scuttleverse and beyond. What is Scuttlebutt now, and and importantly, what can it enable society to become?", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6147, 
                                        "public_name": "Zenna / zelf"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.scuttlebutt.nz/", 
                                        "title": "Scuttlebutt"
                                    }, 
                                    {
                                        "url": "https://www.manyver.se/", 
                                        "title": "Manyverse - Mobile Client for Scuttlebutt "
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9734.html", 
                                "id": 9734, 
                                "guid": "ee26ac2f-4727-4f29-9d0f-a31669e2c0ed", 
                                "logo": "/system/events/logos/000/009/734/large/GroupLogo.png?1539599370", 
                                "date": "2018-12-27T17:10:00+01:00", 
                                "start": "17:10", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9734-information_biology_-_investigating_the_information_flow_in_living_systems", 
                                "title": "Information Biology - Investigating the information flow in living systems", 
                                "subtitle": "From cells to dynamic models of biochemical pathways and  information theory, and back.", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "How to apply Shannon's information theory to biology.", 
                                "description": "<p>Cells, from bacteria to human cells, constantly take up, store, retrieve, communicate and make decisions based on information. How they realise all this computation using very unreliable components is still largely an open question. Instead of transistors they have to employ proteins, but proteins constantly degenerate and are re-built making their numbers fluctuate. If cellular signalling is impaired severe diseases can be the result, for instance cancer or epilepsy.</p>\r\n\r\n<p>As cellular communication is so pervasive and essential, researchers start to look into this information flow in biological systems in more detail. My research group at the BioQuant centre, Heidelberg University, is also active in this area, an area which I would call Information Biology &mdash; the study of how biological systems deal with information.</p>\r\n\r\n<p>I will show you how you can apply Shannon's information theory to biological systems. For this we need three ingredients, namely dynamic models of biological pathways, stochastic simulation algorithms (that take into account intrinsic fluctuations in molecular numbers), and, of course, Shannon's theory of information.</p>\r\n\r\n<p>I will give brief and user-friendly introductions to these three ingredients. After that I am going to talk about a number of use cases, such as:</p>\r\n<ul>\r\n<li>How much memory does a bacterium have? And how long can it remember things?</li>\r\n<li>How many bits per second can a liver cell process via its calcium signalling pathway?</li>\r\n<li>How must signalling pathways be constructed, structurally and dynamically, for certain stimuli to be decoded?</li>\r\n<li>and others&hellip;</li>\r\n</ul>\r\n\r\n<p>I will also give links to (open source) software that is being developed in my group, which you can use to simulate and play around with biochemical pathways, and also to estimate information flows and do information biology.</p>\r\n\r\n<p>FYI: The research I am talking about here is part of a research area which is called Computational Systems Biology. Systems Biology is a field which studies biological systems not by reducing them to their constituent parts, such as single receptors, genes, molecular complexes etc., but by viewing them in the cellular or organismal context and, importantly, as (dynamic) systems. And Computational Systems Biology is Systems Biology done with the help of mathematical models and simulation/analysis algorithms.</p>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8521, 
                                        "public_name": "J\u00fcrgen Pahle"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://lab.pahle.org", 
                                        "title": "Research group homepage"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/676/original/2018-12-27_35C3JuergenPahle.pdf?1546000267", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10009.html", 
                                "id": 10009, 
                                "guid": "4dcbb9c4-8f93-40ed-85c0-90474f4ea623", 
                                "logo": "/system/events/logos/000/010/009/large/AFROROUTES__-_TEDx-_Praia_2018_%28Auszug%29.001.jpeg?1542300758", 
                                "date": "2018-12-27T18:10:00+01:00", 
                                "start": "18:10", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-10009-afroroutes_africa_elsewhere", 
                                "title": "Afroroutes: Africa Elsewhere", 
                                "subtitle": "VR experience \"Beyond Slavery\"", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Let's think \"Beyond Slavery\": Afroroutes is a one-of-a-kind VR experience conceived as a journey through 3 displaced African heritages, immersing users in Rituals and Ceremonies to experience that well-conserved memory form, but also to feel the power of Music as a strong anthropological tool. Connecting Afro-diasporic narratives: alterity and heritage transcendence within the digital era, Afroroutes is a trigger to open a crucial debate about diasporic identity.\r\n", 
                                "description": "Afroroutes is a VR experience taking you to some burning key destinations where African culture has been displaced through slavery and then, rooted again. From Salvador to Bahia to Gujarat through Tangier, there is a common history. Based on this VR Experience, the debate should be extended around \"Beyond Slavery\".\u2028\r\n\r\nWhat happened with the millions of displaced African men and women? Where are their descendants living today? Did their original culture and language disappear? How did their heritage contribute to building their new countries? How did the assimilation or rejection process go? How has this memory subsisted, and how is it lived and celebrated today?  But also, how to assimilate that chapter of history and transform it into a real global narrative - is there what we call a \"diasporic identity\"? And if it is the case, how to build this identity within a global, disrupted world? How can digital tools push this storytelling process?  \u2028\r\n\r\nThe medium \"Virtual Reality\" takes all its sense in this project, allowing an immersive and almost physical experience of those paths of slavery. This experience is triggered by music and sounds. Music is much more than a simple way of being together: it is the oral legacy of our intertwined culture. Music is such a powerful tool to explain and tackle the cultural dynamics of displaced heritage, but also as a most trustful narrative connector.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8728, 
                                        "public_name": "S\u00e9lim Harbi"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://vimeo.com/254095649", 
                                        "title": "Afroroutes trailer "
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9864.html", 
                                "id": 9864, 
                                "guid": "d7aa8828-4e06-4029-b962-1009815efa58", 
                                "logo": "/system/events/logos/000/009/864/large/pnxc_logo_bluemarine.png?1539635128", 
                                "date": "2018-12-27T19:10:00+01:00", 
                                "start": "19:10", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9864-a_routing_interregnum_internet_infrastructure_transition_in_crimea_after_russian_annexation", 
                                "title": "A Routing Interregnum: Internet infrastructure transition in Crimea after Russian annexation  ", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "This lecture tells the story of Internet infrastructure transformations in Crimea, the peninsula disputed between Russia and Ukraine between 2014 and 2018. It is based on an extensive year-long study involving network measurements and interviews with key players. Crimea has become a \"laboratory\" where we can observe, in just 4 years, a rapid and profound transition of infrastructure, that deeply impacted the Internet Service Provider market, routing trajectories, Internet censorship practices in the region. Annexation has transformed the way Crimea is plugged to the \"outer world\" - in terms of peering and transit relations between various autonomous systems, creating a much more centralized infrastructure and monopolized market. This, in its turn, had an important impact for Crimean end-users - in terms of quality, speed, price of Internet service, as well as in terms of Internet censorship and various traffic anomalies that they experience. Moreover, server-side geoblocking by online payment platforms, Google Play, Apple and other important services, is imposed on Crimean users, because of international sanctions that have a controversial impact, including a risk of overblocking, further isolation of Crimean civil society and reinforcing a more general trend towards \"balkanization\" of the Internet(s). [1]", 
                                "description": "This talk is based on a one-year long research conducted at Citizen Lab [2], using a mixed methods approach. On the one hand, we conducted network measurements with OONI probe [3], testing a set of URLs from Crimean vantage points, and comparing results with mainland Russia and Ukraine. We have done an analysis of BGP routing history, and AS neighbouring history, using data from RIPE and CAIDA in collaboration with researchers behind the \"Internet Health Report\" initiative [4] using the recently deployed methodology of \"AS Hegemony Index\" [5]. On the other hand, we conducted an extensive qualitative study, including interviews with Crimean ISPs, Ukrainian and Russian tech activists and representatives of RIPE and other Internet governance bodies; web-ethnography (analysis of professional chats and forums of Crimean / Ukrainian ISPs) and media analysis.\r\n\r\nWe will briefly introduce the context of annexation from the point of view of Internet infrastructure, show an interactive timeline of events that have impacted Crimean Internet ecosystem. Then we will focus on the case of \"Infrastructure interregnum\", where Ukrainian and Russian traffic co-existed for a while. We will share our infographics, including video animation that demonstrates progressive \"wiring\" of Crimea to \"Russian Internet\". On the case of several Ukrainian ISPs we will show how routing becomes matter of dispute. We will question the role of international sanctions and geoblocking by Google, Apple and other big players, on Crimean Internet. Finally, we will conclude with observations of the effects of this infrastructure transition on the end-users, especially activists and journalists working in the region, in terms of their security and the way they experience censorship.\r\n\r\n\r\nWe will also share our website [currently under final revisions, will be open to public by October 31, 2018] that presents results of our research in an accessible form for non-tech and non-academic audiences, but also contains longer reports and links for data and infographics that are open for downloading for further reusage, recycling and reading.\r\n\r\n\r\n[1] [Dalek et al., 2014] J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill, and R. J. Deibert. A method for identifying and confirming the use of URL filtering products for censorship. In 14th ACM Internet Measurement Conference (IMC), 2014.\r\n\r\n[2] Citizen Lab is an interdisciplinary research laboratory based at the University of Toronto, Canada. Citizen Lab studies information controls\u2014such as network surveillance and content filtering\u2014that impact the openness and security of the Internet.\r\n\r\n[3] https://ooni.torproject.org\r\n\r\n[4] https://ihr.iijlab.net/ihr/\r\n\r\n[5] Romain Fontugne, Anant Shah, and Emile Aben. 2017. AS Hegemony: A Robust Metric for AS Centrality. In Proceedings of SIGCOMM Posters and Demos \u201917, Los Angeles, CA, USA, August 22\u201324, 2017, 3 pages. https://doi.org/10.1145/3123878.3131982", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7340, 
                                        "public_name": "Xenia"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9654.html", 
                                "id": 9654, 
                                "guid": "6c44067f-a011-48ec-b302-fbaff1260b78", 
                                "logo": "/system/events/logos/000/009/654/large/ICA-London.jpg?1539525271", 
                                "date": "2018-12-27T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9654-a_la_recherche_de_l_information_perdue", 
                                "title": "A la recherche de l'information perdue", 
                                "subtitle": "some technofeminist reflections on Wikileaks", 
                                "track": "Art & Culture", 
                                "type": "performance", 
                                "language": "en", 
                                "abstract": "Performance lecture by Cornelia Sollfrank that makes a (techno-)feminist comment on the entanglements of gender, technology and information politics exemplified by the case of Julian Assange and Wikileaks. The artist takes us in her text assemblage on an adventurous trip into the realm of zeros and ones, of data and pure information, of ciphers, signifiers and figures. On the other side of reality we encounter suspected heroes, leaks and phreaks, engineers of escape who control our secret desires. Rape can be performed in many ways. In a state of total transparency: what shall we eat, when society feeds upon the repressed? Knowing yourself means knowing what to look for.", 
                                "description": "The performance is a technofeminist comment on the wikileaks case, in particular the fact that Julian Assange has spent more than five years in confinement following a rape accusation. Instead of making a moral judgement, however, the performance uses and combines sources from information science, psychoanalysis, cultural studies, feminist studies and activism to embed the case is a wide cultural landscape in which gendered structures becomes more than obvious. The performance is divided into 9 chapters with headers such as Information, Organisation, Zeroes&Ones, Binary Worlds, Pure Difference, Cyberfeminism, Gender&Technology, Naked Information and Transparency, and creates a captivating atmosphere by the use of sound and visuals.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8496, 
                                        "public_name": "Coco Sollfrank"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/526/original/ICA-London.jpg?1539525271", 
                                        "title": "Cornelia Sollfrank at ICA London"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10024.html", 
                                "id": 10024, 
                                "guid": "85ec8360-737b-4ee3-be2d-d8e050b1d117", 
                                "logo": "/system/events/logos/000/010/024/large/01.jpg?1542036118", 
                                "date": "2018-12-27T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-10024-tactical_embodiment", 
                                "title": "Tactical Embodiment", 
                                "subtitle": "Activism and Performance In Hostile Spaces Online", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "During her talk \u201cTactical Embodiment,\u201d artist and activist Angela Washko will present several different strategies for performing, participating in and transforming online environments that are especially hostile toward women. She will introduce her long-term performative intervention \u201cThe Council on Gender Sensitivity and Behavioral Awareness in World of Warcraft\u201d alongside several interventions, interviews, performances, written works and video games works she has created with the manosphere and online men\u2019s seduction communities.   In addition to walking the audience through her research, Washko will screen excerpts from her interview with a seduction coach who has been dubbed \u201cThe Web\u2019s Most Infamous Misogynist\u201d and highlight instructional DVDs, books, and hidden-camera videos created by a community of pick-up artists who teach men how to interact with and seduce women. The talk will close with an audience-participation based performative play-through of her most recent project \u201cThe Game: The Game,\u201d a dating simulator video game presenting the practices of several infamous pick-up artists.", 
                                "description": "During her talk \u201cTactical Embodiment,\u201d artist and activist Angela Washko will present several different strategies for performing, participating in and transforming online environments that are especially hostile toward women. She will introduce her long-term performative intervention \u201cThe Council on Gender Sensitivity and Behavioral Awareness in World of Warcraft\u201d alongside several interventions, interviews, performances, written works and video games works she has created with the manosphere and online men\u2019s seduction communities.   In addition to walking the audience through her research, Washko will screen excerpts from her interview with a seduction coach who has been dubbed \u201cThe Web\u2019s Most Infamous Misogynist\u201d and highlight instructional DVDs, books, and hidden-camera videos created by a community of pick-up artists who teach men how to interact with and seduce women. The talk will close with an audience-participation based performative play-through of her most recent project \u201cThe Game: The Game,\u201d a dating simulator video game presenting the practices of several infamous pick-up artists.\r\n\r\n\u201cThe Game: The Game\u201d is a video game presenting the practices of several prominent seduction coaches (aka pick-up artists) through the format of a dating simulator. In the game these pick-up gurus attempt to seduce the player using their signature techniques taken verbatim from their instructional books and video materials. The game sets up the opportunity for players to explore the complexity of the construction of social behaviors around dating as well as the experience of being a femme-presenting individual navigating this complicated terrain.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8734, 
                                        "public_name": "Angela Washko"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "www.angelawashko.com", 
                                        "title": "Artist Website"
                                    }, 
                                    {
                                        "url": "www.art.cmu.edu/people/angela-washko/", 
                                        "title": "Assistant Professor of Art, Carnegie Mellon University"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9446.html", 
                                "id": 9446, 
                                "guid": "c6790632-b9eb-49a2-87fe-30129fbcbce1", 
                                "logo": "/system/events/logos/000/009/446/large/sdwan.png?1539171047", 
                                "date": "2018-12-27T23:30:00+01:00", 
                                "start": "23:30", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9446-sd-wan_a_new_hop", 
                                "title": "SD-WAN a New Hop", 
                                "subtitle": "How to hack software defined network and keep your sanity?", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The software defined wide-area network is technology based on SDN approach applied to branch office connections in Enterprises. According to Gartner's predictions, more than 50% of routers will be replaced with SD-WAN Solutions by 2020.\r\n\r\nThe SD-WAN can have firewalls and other perimeter security features on board which makes them attractive targets for attackers. Vendors promise \"on-the-fly agility, security\" and many other benefits. But what does \"security\" really mean from a hand-on perspective? Most of SD-WAN solutions are distributed as Linux-based Virtual Appliances or a Cloud-centric service which can make them low-hanging fruit even for script kiddie. \r\n\r\nComplexity of SDN creates additional security issues and cybersecurity pro should address it before an attack occurs. This presentation will introduce practical analysis of different SD-WAN solutions from the attacker perspective. Attack surface, threat model and real-world vulnerabilities in SD-WAN solutions will be presented.", 
                                "description": "Detailed Outline:\r\n\r\n1.\tSD-WAN overview\r\n\r\na.       SD-WAN in a nutshell\r\nb.       Typical SD-WAN design overview\r\nc.       Cloud, on premise, hybrid architecture \r\nd.       Common technology stack (netconf, strongswan, DPDK, etc.)\r\ne.       Customization, vCPE and VNF\r\nf.       Security features\r\n\r\nBasic terminology, the essentials of SD-WAN architecture: declared advantages and implementation options. Customization approaches via tailored and 3rd party VNF and uCPE/vCPE. Overview of built-it and additional security features. \r\n\r\n\r\n2.       SD-WAN attack surface\r\na.       Management interfaces\r\nb.       Local shells and OS\r\nc.       Control plane and data plane separation\r\nd.       Analytics-Controller-vCPE/uCPE-VNF communications\r\ne.       Hypervisor and virtualization (VNF) separation\r\nf.        Routing, IPSec Overlay\r\ng.       Updates and Cloud features \r\n\r\nTechnical analysis of data and control flow between major components in typical SD-WAN architecture (Orchestration \u2013 Controller \u2013 vCPE \u2013 VNF [and back]). Attack vectors, vertical and horizontal (for multi-tenant/managed service) privilege escalation scenarios. \r\n\r\n3.       Security Assessment\r\n\r\na.       SD-WAN as a (virtual) appliance\r\nb.       Rooting the \"box\"\r\nc.       Old school *nix tricks\r\nd.       How I Learned to Stop Worrying and Love the Node.js\r\ne.       Built-in security features\r\nf.        Post-deploy \"Forensics\"\r\ng.       SD-WAN Managed Services\r\nh.       Top down, bottom up and lateral movement \r\n\r\nPractical SD-WAN security assessment cases, vulnerabilities (next summarized in \"SD-WAN vulnerabilities\" section), tips and tricks. \r\n\r\n4.       SD-WAN Offensive and Defensive toolkit \r\n\r\na.       Internet census \r\nb.       SD-WAN vulnerabilities\r\nc.       Attacks cases \r\nd.       SD-WAN threat model\r\ne.       Pentester and hardening checklists\r\nf.       Buyer guide\r\n\r\nSD-WAN Internet census, Google/Shodan SD-WAN Cheat Sheet. Issues with cloud deployment and support (AWS, Azure). Publically know attack cases. \r\nVulnerabilities in top 5 SD-WAN (depends on fixes, responsible disclosure in progress). \r\n\r\n5.       Conclusion/ Takeaways", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5824, 
                                        "public_name": "Sergey Gordeychik"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://www.scada.sl/search/label/sd-wan", 
                                        "title": "SD-WAN New Hope project blog"
                                    }, 
                                    {
                                        "url": "https://github.com/sdnewhop/sdwannewhope", 
                                        "title": "SD-WAN New Hope project Github"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/661/original/SD-WAN_-_35C3_-_publish.pdf?1545948392", 
                                        "title": "SD-WAN New Hop slides"
                                    }
                                ]
                            }
                        ], 
                        "Lecture room 11": [], 
                        "Seminar room 14-15": [], 
                        "Seminar room 13": [], 
                        "Lecture room M1": [], 
                        "Lecture room M2": [], 
                        "Lecture room M3": [], 
                        "Kidspace": [], 
                        "CCL Saal 3": [], 
                        "Chaos West B\u00fchne": [
                            {
                                "id": 167, 
                                "guid": "2184122e-03b0-5730-bedf-dc8015807a56", 
                                "logo": null, 
                                "date": "2018-12-27T10:45:00+01:00", 
                                "start": "10:45", 
                                "duration": "00:15", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "T3RMSP", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/T3RMSP", 
                                "title": "Opening der Chaos-West Stage", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "de", 
                                "abstract": "Opening der Chaos-West Stage", 
                                "description": "Opening der Chaos-West Stage", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 85, 
                                        "name": "Chaos-West", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 164, 
                                "guid": "fefd1797-166c-5d43-9582-f6b23fa8c225", 
                                "logo": null, 
                                "date": "2018-12-27T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "00:30", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "USG7KM", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/USG7KM", 
                                "title": "Opening [Streaming]", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Opening Streaming", 
                                "description": "Opening Streaming", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 82, 
                                        "name": "35C3", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 159, 
                                "guid": "0cd6c4d6-5260-53d1-8abe-111907e394a6", 
                                "logo": null, 
                                "date": "2018-12-27T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "7LRXLM", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/7LRXLM", 
                                "title": "Security Expedition in b0rkenLand - Watch out! There are dangerous Security Problems", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "en", 
                                "abstract": "2018 started really well for the internet regarding computer security. \r\nLet's take care of it and bring it to a good end. A small travel from broken metal chunks to \"undocumented user accounts\" and other security holes. There will be a recap of security problems from well known and also lesser known products presented.", 
                                "description": "IT resp. computer security is an interesting area. Not only for\r\ncriminals but also for scientists, programmers and users. We all should know that 100% security does not exist.  Therefore I would like to underpin this statement with this lecture.\r\n\r\n2018 was a blast in case of security disasters. B0rken processors, authentification bypasses all around, behind every corner a Remote Code Execution waiting for you and sometimes even some 0days jumps out of nowhere.\r\n\r\nI want to review together with the audience the best security disasters from 2018. Maybe we can reveal some trends that are happening in the disaster industry. Besides having an entertaining lecture I want also reflect on consequences of such security failures and what we can hopefully learn about it.\r\n\r\nIf the demo gods are not on holiday, I will present a live demo.\r\n\r\nYou will probably see your software and hardware differently after this lecture.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 71, 
                                        "name": "Hetti", 
                                        "biography": "Technical Computer Science student from Vienna with a passion for IT Security and geeky stuff.\r\n\r\nHe is one of the board members of the finest Viennese Hackspace [Metalab](https://metalab.at/) .\r\nIn his free time he enjoys travelling to community based IT Conferences.\r\nThe [Viennese Cryptoparty](https://cryptoparty.at/) is organized by him, where he also holds lectures and workshops about a broad range of IT Security & Privacy topics.\r\n\r\nYou can also find him at the [Chaos Computer Club Vienna (C3W)](https://c3w.at/) .\r\nOn some weekends he is hunting flags with the successful academic CTF Team [We_0wn_Y0u](https://w0y.at/) .", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 132, 
                                "guid": "2963ebe9-6499-5d17-9f2f-0c3f31db5738", 
                                "logo": null, 
                                "date": "2018-12-27T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "KDYQEB", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/KDYQEB", 
                                "title": "Toll of personal privacy in 2018", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "en", 
                                "abstract": "We are well into 21st century and the all-digital promise land is just around the corner. What will happen to those of us who choose to retain our privacy by not joining the digital revolution? And most importantly how do we shape the revolution in a way that we can both reap the benefits brought to us by new technologies, while still keeping our private lives undisturbed?", 
                                "description": "This talk is both scary and hilarious. \r\n\r\nIt's about author's personal privacy choices that they made in the past and how those affected their life financially, socially and otherwise. Author also covers some more extreme choices they opted not to make and discusses what generally motivates one to care about their privacy. You'll learn about the dawn of loyalty cards, biometric passports, banking services, CCTV and more... We'll try to find out how to work for a better future and what can we all do to make life with privacy more bearable.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 44, 
                                        "name": "Kirils Solovjovs", 
                                        "biography": "Mg. sc. comp. Kirils Solovjovs is the most visible white-hat hacker in Latvia having discovered and responsibly disclosed or reported multiple security vulnerabilities in information systems of both national and international significance. Kirils is one of the authors of the jailbreak tool for Mikrotik RouterOS. He has extensive experience in network flow analysis, reverse engineering, social engineering and penetration testing.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 129, 
                                "guid": "e1e7a102-8bc7-5ffc-b328-8ecc3aee0351", 
                                "logo": null, 
                                "date": "2018-12-27T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "NZSH79", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/NZSH79", 
                                "title": "Die eigene Stimme hacken", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Die eigene Stimme ist sehr wichtig daf\u00fcr wie eine Person von anderen am Telefon und im Alltag wahrgenommen wird. Das ist meist besonders f\u00fcr trans Personen wichtig die einen ungewollten Stimmbruch hinter sich haben. Der Vortrag orientiert sich daher an meinen eigenen Erfahrungen und versucht Grundlagen der Stimmbildung, der Stimmwahrnehmung und Ans\u00e4tze zum \u00dcben zu vermitteln. Der Inhalt des Vortrags orientiert sich besonders dran, eine femininer gelesene Stimme zu bekommen.", 
                                "description": "Die eigene Stimme ist sehr wichtig daf\u00fcr wie eine Person von anderen am Telefon und im Alltag wahrgenommen wird. Das ist meist besonders f\u00fcr trans Personen wichtig die einen ungewollten Stimmbruch hinter sich haben. Der Vortrag orientiert sich daher an meinen eigenen Erfahrungen aus den letzten anderthalb Jahren und versucht Grundlagen der Stimmbildung, der Stimmwahrnehmung und Ans\u00e4tze zum \u00dcben zu vermitteln. Der Inhalt des Vortrags orientiert sich besonders dran, eine femininer gelesene Stimme zu bekommen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 41, 
                                        "name": "Leah", 
                                        "biography": "Platzhalter.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 145, 
                                "guid": "3575514b-600c-5772-8b93-afc657e6fd2f", 
                                "logo": null, 
                                "date": "2018-12-27T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "HUCR9H", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/HUCR9H", 
                                "title": "GNUnet to the rescue!", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "en", 
                                "abstract": "GNUnet is a new network protocol stack for building secure, distributed, and privacy-preserving applications. You will learn which problems GNUnet can help to solve. This talk is a introductory talk to motivate you joining the workshops of the GNUnet assembly.", 
                                "description": "GNUnet is a metadata-preserving foundation for your application, covering areas from addressing, to reliable bidirectional Axolotl-encrypted channels, with advanced routing. You will hear about\r\n\r\n* GNS, \"a censorship-resistant, privacy-preserving and decentralized name system designed to provide a secure alternative to DNS, especially when censorship or manipulation is encountered.\"\r\n* CADET, \"a new algorithm for establishing robust end-to-end transport-layer connections in completely self-organized networks with-out a central authority.\"\r\n* secushare, an application for distributed, privacy preserving, \"real\" social networking.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 56, 
                                        "name": "t3sserakt", 
                                        "biography": "* secushare and GNUnet developer\r\n* privacy activist", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 127, 
                                "guid": "2cc78749-a8c0-5c48-83ac-ec0c40c1b41d", 
                                "logo": null, 
                                "date": "2018-12-27T16:30:00+01:00", 
                                "start": "16:30", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "JLPCPC", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/JLPCPC", 
                                "title": "Long range radio communication for everyone using LoRaWAN.", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "en", 
                                "abstract": "Having lots of ideas for wireless technical gadgets but your WLAN range is to short? Building a sensor network, but you are tired of wiring the sensors together? LoRaWAN could be the way out of those traps for your next project! Set up a single gateway, and you will be able to deploy a ton of devices in kilometres of range. And what is best, there is even a cooperative community about it. You will provide your neighbours with LoRaWAN, too!", 
                                "description": "LoRa is a low power long range radio data transmission technology. LoRaWAN is a wide area network protocol on top of LoRa, that makes it easy to hook up lots of wireless, battery powered devices to the internet or to your personal server. We will introduce you to LoRaWAN, tell you what it can be used for, and how it works.\r\n\r\nWith \u201cthe things network\u201d there exists an open source community that aims at creating a global network for LoRaWAN devices. You can use it to have your own technical creations reach your server at home from wherever there is a gateway. You can set up your own gateways to help build that network and share the coverage created by you with the community.\r\n\r\nWe are working with this technology on a daily basis at our jobs (at Lobaro GmbH [1], a small company creating industrial IoT solutions), and find that it has high potential in many geek/hobby/maker projects. With \"the things network\" [2] there exists a community based open source initiative for making it available (think \"freifunk\" for IoT), but still there is not much knowledge about it in the scene. It's a cool technology that people should know about!\r\n\r\nOur introductions will be centred around Arduino based hardware, which is what most are familiar with.\r\n\r\nWe will also have a LoRaWAN TTN Gateway at our assembly (which is Deep Cyber [3]) along with some LoRaWAN devices, so that people who get interested by the talk and want to try out how it feels to work with the technology can come to our assembly and have a go at it.\r\n\r\nWe are aware that there has been a talk about LoRa at 33C3 [4], but that had a totally different scope than ours. They focused on the modulation and how bits are physically transmitted. We want to talk about LoRaWAN, which is build on top of LoRa, and which provides an affordable and easy to use way of data transmission.\r\n\r\n[1]: https://www.lobaro.com/\r\n[2]: https://www.thethingsnetwork.org/\r\n[3]: https://www.deepcyber.de/\r\n[4]: https://media.ccc.de/v/33c3-7945-decoding_the_lora_phy", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 35, 
                                        "name": "Peer Springst\u00fcbe", 
                                        "biography": "I tried to get the most out of university by learning different aspects of computer science, with focus on embedded systems and machine learning, while also studying physics and philosophy. I'm currently working with industrial IoT, creating devices for existing problems instead of inventing problems to try and sell unnecessary solutions.\r\n\r\nHave an urge do create stuff with interesting technologies in my free time, so I try to keep some people around me, to do that together. Based in Hamburg.\r\n\r\nI'm heavily involved with the assembly Deep Cyber.", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 38, 
                                        "name": "Tobias Kaupat", 
                                        "biography": "Ich besch\u00e4ftige mich seit 2 Jahren im Umfeld Industrial IoT mit LoRa. Ich habe einen eigenen LoRaWAN Stack mit entwickelt und viel expertise \u00fcber LoRaWAN von der Hardware-Entwicklung bis zum Appserver.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 152, 
                                "guid": "ab8ff127-534d-5893-b807-a31188930798", 
                                "logo": null, 
                                "date": "2018-12-27T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "K39NLS", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/K39NLS", 
                                "title": "Wifi4EU - broken by technical specification", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "en", 
                                "abstract": "With the Wifi4EU programm the EU is planning to spend 100 million \u20ac by 2020 to subsidise a centralized surveillance infrastructure for centers of public life in the EU.\r\nThe talk will lay out how Wifi4EU is supposed to work both administratively and technically, where there are problems with the later and what is and can be done about it.\r\n\r\nSlides: https://zenodo.org/record/2527538#.XCUXplxKjIU", 
                                "description": "With the [Wifi4EU programm [1]](https://www.wifi4eu.eu/) the EU is planning to subsidies the installation of free Wi-Fi with 120 million \u20ac until 2020. The installations are planned to be \"... free of charge, free of advertising and free from commercial re-use of data. ...\" [[2]](http://europa.eu/rapid/press-release_IP-18-2065_en.htm) and aim \"... to equip every European village and every city with free wireless internet access around the main centres of public life. ...\" [[1]](https://www.wifi4eu.eu/) \r\n\r\nUnfortunately the technical specifications  implemented in the first call on the 7th - 9th  of November [[3]](https://ec.europa.eu/digital-single-market/en/news/preliminary-results-1st-wifi4eu-call) tell a different story. So far 42 Million \u20ac are planned to be spend in a flawed design.\r\n\r\nAmongst other problems they include:\r\n\r\n* requirements for a centralized authentification infrastructure - like eduroam [[4]](https://ec.europa.eu/digital-single-market/en/faq/wifi4eu-questions-and-answers) (FAQ 23),\r\n* inherent IT security  problems - embedded snippets in the captive portals [[4]](https://ec.europa.eu/digital-single-market/en/faq/wifi4eu-questions-and-answers) (FAQ 26)  and \r\n* proprietary standards  - hotspot 2.0.  [[4]](https://ec.europa.eu/digital-single-market/en/faq/wifi4eu-questions-and-answers) (FAQ 27)\r\n\r\nFollowing a talk at the wireless community weekend in May this year [[5]](https://www.youtube.com/watch?v=YbPpK8_X9Qg)  the talk will include:\r\n\r\n* a short introduction to the programm, \r\n* how it came to be, \r\n* what happend so far \r\n* the implications of the programm\r\n* what can be done to fix things. \r\n\r\nBesides contacting the european comission, several members of the european parlament and Klaus Landefeld of the eco [[6]](https://international.eco.de/people/klaus-landefeld/) we were able to get members of the german Bundestag to get interested in the issue [[7]](https://twitter.com/jimmyschulz/status/1060210780992356352). This led to a \"schriftliche Anfrage\" towards the Bundesregierung regarding the GDPR compliance of the authentification infrastructure, the situation is currently evolving. \r\n\r\nThe talk aims to inform about the current state of affairs and hoefully foster a discussion during the congress what can and should be done to prohibit the creation of yet another surveillance infrastructure and what a desirable public Wi-Fi infrastructure should look like.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 39, 
                                        "name": "Little Detritus", 
                                        "biography": "Freifunka aus Aachen der dar\u00fcber nachdenkt wie man sowas antiquiertes wie Privatsph\u00e4re behalten kann. Diskutiert gerade gerne dar\u00fcber wieso Wifi4EU - so wie gerade geplant - eine dumme Idee ist [1]. Man sich sonst Gedanken dar\u00fcber wie Kryptographie im Zeitalter von Quantencomputern aussehen kann [2]. Teilt Albernes und Ernstes auf Twitter unter @LittleDetritus\r\n\r\n[1] https://www.youtube.com/watch?v=YbPpK8_X9Qg\r\n[2] https://video.fsmpi.rwth-aachen.de/cccac/6131", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 136, 
                                "guid": "aedb122c-b6ce-5941-b4cf-f1fc3773d765", 
                                "logo": null, 
                                "date": "2018-12-27T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "02:00", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "JGDLDW", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/JGDLDW", 
                                "title": "Haecksen Happy Hour", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Klangteppich", 
                                "language": "de", 
                                "abstract": "Party at the haecksen's (https://www.haecksen.org)! We invite all beings at the congress to enjoy two hours of electronic, rock, jazz, pop and downtempo beats with dj shroombab (https://m.soundcloud.com/shroombab).", 
                                "description": "Party party!", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 49, 
                                        "name": "Haecksen", 
                                        "biography": "Die \"Haecksen\" sind der Zusammenschluss eines Teils der weiblichen* Mitglieder des Chaos Computer Clubs. Gegr\u00fcndet wurde die Gruppierung 1988 von Rena Tangens und Barbara Thoens. Die Haecksen treffen sich j\u00e4hrlich auf dem Chaos Communication Congress des CCC und veranstalten eigene Projekte. Da sie sich als virtueller Erfa-Kreis des CCC verstehen, ist ihr wichtigstes Kommunikationsmittel eine Mailingliste.\r\n\r\nDas Ziel der Haecksen ist es, zu zeigen, dass M\u00e4dchen* und Frauen* ganz selbstverst\u00e4ndlich kreativ mit Technik umgehen k\u00f6nnen und dass das Bild in den K\u00f6pfen der Menschen - dass Hacker m\u00e4nnlich sind - nicht stimmt.\r\n\r\nHierbei verstehen wir unter Haecksen eine Gruppe aus Hackerinnen, die sich als Frauen* identifizieren. Dies umfasst cis und trans Frauen sowie nicht-bin\u00e4re Menschen, die sich mit dem Label \"Frau\" wohlf\u00fchlen. Der Stern repr\u00e4sentiert nicht nur diese Personengruppen, sondern auch die Tatsache, dass Geschlecht ein soziales Konstrukt (und damit \u00fcberaus hackbar) ist. \r\n\r\nhttps://www.haecksen.org/mediawiki/index.php/Main_Page", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 114, 
                                "guid": "899041a1-b437-59aa-b752-03212d7d3c05", 
                                "logo": null, 
                                "date": "2018-12-27T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "AGSNQR", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/AGSNQR", 
                                "title": "Einfache Erkennung von fortschrittlichen Rootkits", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Ein Rootkit (englisch etwa: \u201eAdministratorenbausatz\u201c; root ist bei unix\u00e4hnlichen Betriebssystemen der Benutzer mit Administratorrechten) ist eine Sammlung von Softwarewerkzeugen, die nach dem Einbruch in ein Softwaresystem auf dem kompromittierten System installiert wird, um zuk\u00fcnftige Anmeldevorg\u00e4nge (Logins) des Eindringlings zu verbergen und Prozesse und Dateien zu verstecken.", 
                                "description": "Aufsp\u00fcren von Schadsoftware durch Analyse des Datenverkehrs\r\n\r\nIn unserem Talk beschreiben wir eine Methode, besonders gut getarnte (=virtualisierende) Rootkits sowie manipulierte Firmware (UEFI, BIOS, Netzwerkkarten- oder Grafikkarten-Firmware) zuverl\u00e4ssig zu entdecken. Hierzu wird ein Vergleich des erwarteten Datenverkehrs mit dem tats\u00e4chlichen Datenverkehr durchgef\u00fchrt, um die Schadsoftware durch den von ihr initiierten Datenverkehr zu erkennen.\r\n\r\nWir beschreiben, wie der Vergleich durchgef\u00fchrt wird und wie die Daten erfasst und verglichen werden. Zudem beschreiben wir die Vor- und Nachteile des verwendeten Ansatzes, der im Zuge einer Masterarbeit entwickelt wurde.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 79, 
                                        "name": "Jennifer Roller", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 80, 
                                        "name": "christian schmidt-janssen", 
                                        "biography": "christian schmidt-janssen", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 168, 
                                "guid": "9c7b5d1d-6f78-5935-9aa5-bf10bf26e54e", 
                                "logo": null, 
                                "date": "2018-12-27T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "YKLGHA", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/YKLGHA", 
                                "title": "Die Faxger\u00e4te im Zentrum der Macht", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Welche Bem\u00fchungen zur Digitalisierung des Bundestages gibt es, warum \"ein Pad und ein Wiki\" eben nicht ausreicht, was man noch so tun k\u00f6nnte und wof\u00fcr man eigentlich immer noch Faxger\u00e4te in der Politik braucht - dar\u00fcber diskutieren Julia (Bundestag, netzpolitik.org, cihr.eu), Ijon (Bundestag, LOAD e.V.) und Walter (Open Knowledge Foundation), moderiert von Noujoum.", 
                                "description": "In Fragen der Digitalisierung des Staates ist Deutschland weit hinter andere europ\u00e4ische L\u00e4nder zur\u00fcckgefallen, die Politik soll es jetzt (endlich) richten, ist aber selbst noch hoffnungslos analog.\r\n\r\nDie politischen Prozesse und b\u00fcrokratischen Abl\u00e4ufe im Bundestag sind den Politiknerds Ijon, Noujoum und Julia als Mitarbeitende von Abgeordneten im Bundestag im Detail vertraut.\r\n\r\nWelche Bem\u00fchungen es gibt, warum \"ein Pad und ein Wiki\" eben nicht ausreichen, was man noch so tun k\u00f6nnte und wof\u00fcr man eigentlich immer noch Faxger\u00e4te in der Politik braucht - dar\u00fcber diskutieren Julia (Bundestag, netzpolitik.org, cihr.eu), Ijon (Bundestag, LOAD e.V.) und Walter (Open Knowledge Foundation), moderiert von Noujoum.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 91, 
                                        "name": "ijon", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 92, 
                                        "name": "Julia Kr\u00fcger", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 120, 
                                "guid": "5e68df49-aed6-535b-b7e3-094f66b11c12", 
                                "logo": null, 
                                "date": "2018-12-27T23:00:00+01:00", 
                                "start": "23:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "GBVHJT", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/GBVHJT", 
                                "title": "Geschichten aus der Cobol Gruft", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Das fast 60 Jahre alte Cobol wird noch heute von sehr vielen Banken und Versicherungen eingesetzt.\r\nIch erz\u00e4hle aus meiner langj\u00e4hrigen, nicht selten schmerzhaften, Erfahrung als Cobol-Entwickler in der Gro\u00dfrechner-Umgebung, heute unter anderem mit Blick auf die Security.", 
                                "description": "Um auf die Sicherheitsaspekte eingehen zu k\u00f6nnen, stelle ich Cobol und die mir bekannte Gro\u00dfrechner-Umgebung kurz vor.\r\nWie alt ist die Sprache, wo sind ihre Schw\u00e4chen - hat sie St\u00e4rken? \r\nWarum nutzen Banken und Versicherungen bis heute Cobol und Gro\u00dfrechner-Umgebungen? \r\n\r\nIm zweiten Teil geht es um die Sicherheit der Sprache.\r\nWie lohnenswert ist der Angriff auf Cobol-basierte Systeme? Wie leicht das Spiel f\u00fcr Angreifer?\r\nWie l\u00e4uft die interne Fehlersuche der DV? Und die Fehlerbehebung? \r\nWie wird das Programmverhalten protokolliert?\r\nK\u00f6nnen Gro\u00dfrechner-Umgebungen gesch\u00fctzt werden? Und wird entsprechender Schutz genutzt? Warum nicht?\r\n\r\nAbschlie\u00dfend der kleine Hoffnungsschimmer: Immer mehr Banken und Versicherungen wollen von Cobol auf modernere Programmiersprachen umstellen und - gezwungenerma\u00dfen - den Gro\u00dfrechner abschaffen.\r\nIch berichte aus meiner Erfahrung, wie diese Umstellung in einer Versicherung l\u00e4uft und was m\u00f6gliche Probleme sind.\r\n\r\nTalk ist f\u00fcr Einsteiger mit Grundlagen in der Anwendungsentwicklung geeignet. Ihr m\u00fcsst und wollt Cobol daf\u00fcr nicht verstehen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 30, 
                                        "name": "Habrok", 
                                        "biography": "Ich bin Cobol-Entwickler in einer Gro\u00dfrechner-Umgebung - und als einer der j\u00fcngsten Spezialisten bei uns ist mein Job sicher... Solange Cobol und DB2 weiterhin nicht tot zu kriegen sind.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "ChaosZone": [
                            {
                                "id": 715, 
                                "guid": "ef2d214c-12a5-5162-b8f6-74dde79c7c09", 
                                "logo": null, 
                                "date": "2018-12-27T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "00:30", 
                                "room": "ChaosZone", 
                                "slug": "DALFMM", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/DALFMM", 
                                "title": "livestream - Opening Ceremony", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "Live stream of the 35C3 Opening Ceremony", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 20, 
                                        "name": "livestream", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 701, 
                                "guid": "52c50dc4-e473-5716-a4fc-6ef7e328902c", 
                                "logo": null, 
                                "date": "2018-12-27T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "00:30", 
                                "room": "ChaosZone", 
                                "slug": "KYND3Y", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/KYND3Y", 
                                "title": "ChaosZone opening ceremony", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "Welcome to ChaosZone at 35C3. Lets have a nice kickoff together. Learn and discuss about everything regarding ChaosZone at 35C3 and beyond.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 1, 
                                        "name": "nilo", 
                                        "biography": "", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 4, 
                                        "name": "bigalex", 
                                        "biography": "", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 707, 
                                "guid": "181cc8cd-d3f4-59b6-befa-3e4e8c8cd8c2", 
                                "logo": null, 
                                "date": "2018-12-27T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "PUCEB3", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/PUCEB3", 
                                "title": "Fr\u00fch \u00fcbt sich -- Junghacker am Eigenbaukombinat", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "Eine kurze Einf\u00fchrung in den Junghackertag am Eigenbaukombiant in Halle. Was machen wir dort? Was haben wir gemacht?", 
                                "description": "Seit circa 2 Jahren treffen wir uns an jedem\u00b9 4. Samstag im Monat, um Kindern und Jugendlichen den Spa\u00df am Umgang mit Elektronik, Bits und Bytes und Aspekte darum herum nahe zu bringen. In meiner kurzen Einf\u00fchrung m\u00f6chte ich davon berichten, was gut l\u00e4uft, wo wir Probleme sehen und wieso die Arbeit mit dem Nachwuchs nicht nur wichtig ist, sondern auch noch Spa\u00df macht.\r\n\r\n\u00b9 Ausnahmen, wenn wir uns nicht treffen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8, 
                                        "name": "frlan", 
                                        "biography": "Linux-Admin, Freie Software-Aktivist, Entwickler. Kurz gesagt: Klischee pur.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 720, 
                                "guid": "11077242-300d-582f-8060-d711bf9072a3", 
                                "logo": null, 
                                "date": "2018-12-27T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "GEBZBY", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/GEBZBY", 
                                "title": "Aenigma: The state-of-the-art, secure-by-default, one-touch-deployed XMPP server for everyone.", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "After a short dive into the current state of instant messaging, we'll see how to take back our communications with aenigma, a fully standard-compliant and secure out-of-the-box xmpp server automation project.", 
                                "description": "Follow us here:\r\n\r\nhttps://github.com/openspace42/aenigma\r\n\r\nContact me here:\r\n\r\nnz [at] os [dot] vu [mail | xmpp | matrix/riot.im]", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 25, 
                                        "name": "Nicolas North", 
                                        "biography": "Founder at openspace, the new hackerspace in Milano, Italia.\r\nsystems automation enthusiast and developer.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 703, 
                                "guid": "c1c12d9d-12bd-5bab-820f-c4cbac4dce86", 
                                "logo": null, 
                                "date": "2018-12-27T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "U8YM3N", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/U8YM3N", 
                                "title": "Makertools im Labor - \u00dcber Raketentriebwerke und Beschleunigung", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "Die M\u00f6glichkeiten moderner 3D-Drucker sind mannigfaltig. Komplexe Objekte lassen sich in kurzer Zeit von der digitalen Blaupause in die reale Welt bringen. Wir m\u00f6chten die M\u00f6glichkeiten moderner 3D-Drucker im wissenschaftlichen Laborumfeld aufzeigen. Wie w\u00e4re es hochempfindliche Sensoren und Raketenantriebe damit zu drucken? Und da alles noch besser mit einem LASER wird, bauen wir diesen auch gleich mit ein.", 
                                "description": "Raoul-Amadeus Lorbeer, Benjamin Ewers\r\nDeutsches Zentrum f\u00fcr Luft- und Raumfahrt, Institut f\u00fcr technische Physik, Stuttgart\r\n\r\nWir zeigen einen Laserantrieb f\u00fcr Satelliten aus dem 3D-Drucker. Dabei wird der Treibstoff durch intensive Laserimpulse beschleunigt und generiert pr\u00e4zisen Schub. Soll der Antrieb zudem noch in einen Cube-Sat passen wird eine kompakte Bauweise obligatorisch. Dies wurde mittels 3D-Druck verwirklicht. Gesteuert wird der Antrieb mittels Mikrokontroller. Und da alles noch besser mit einem USB-Anschluss wird, bauen wir diesen auch gleich mit ein.\r\nBeschleunigungssensoren arbeiten h\u00e4ufig mit einer federnd gelagerten Masse, dessen Verschiebung kontinuierlich gemessen wird. Verschiebungen lassen sich hervorragend mit optischen Interferometern messen. Wir zeigen einen pr\u00e4zisen interferometrischen Beschleunigungssensor aus dem 3D-Drucker, nat\u00fcrlich mit LASER. Und da alles noch besser mit einem SDR (Software Defined Radio) wird, bauen wir dieses auch gleich mit ein.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 11, 
                                        "name": "Benjamin Ewers, Raoul-Amadeus Lorbeer", 
                                        "biography": "", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 711, 
                                "guid": "7425b4d7-95f5-5551-b81b-2e7aca7fb400", 
                                "logo": null, 
                                "date": "2018-12-27T19:30:00+01:00", 
                                "start": "19:30", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "MZWAKF", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/MZWAKF", 
                                "title": "a home among the stars: Galina Balashova, architect of the soviet space programme", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "Galina Balashova was the main architect and designer for the soviet space programme. She designed the interieurs and visual identity of spacecrafts such as the Soyuz, Buran, and Mir.", 
                                "description": "\u00bbSpace stations are not only technical structures but architecture built amidst zero gravity.\u00ab\r\n\r\nGalina Balashova (b. 1931) is a self-described \"architect-engineer\" who spent almost 30 years working in the Soviet Space Programme. She designed the ergonomics, the colours & style and the typography of most soviet spacecrafts, including the Soyuz, the Salyut space stations, the Buran shuttle and the Mir space station.\r\nHer pioneering work in the field of zero-gravity architecture is still referenced today in the ISS and other spacecrafts.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 17, 
                                        "name": "aurora", 
                                        "biography": "", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 704, 
                                "guid": "3a86fe86-b951-5f20-a2f9-8d300e3f77e8", 
                                "logo": null, 
                                "date": "2018-12-27T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "SVLSXP", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/SVLSXP", 
                                "title": "Erinnerungen an Wau Holland", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "Erinnerungen an den Mitgr\u00fcnder des Chaos Computer Clubs, Wau Holland alias Herwart Holland Moritz", 
                                "description": "Bin gern bereit, einige Geschichten aus dem Leben von Wau Holland zu erz\u00e4hlen. Und ich w\u00fcrde mich freuen, wenn zu dieser Session noch andere Leute sich zugesellen w\u00fcrden, die Wau vor oder w\u00e4hrend der Gr\u00fcndung des CCC kennen und sch\u00e4tzen gelernt haben.  Und die meine Geschichten relativieren oder andere Geschichten beif\u00fcgen k\u00f6nnten.  \r\n\r\nWau oder Herwart Holland-Moritz ist nun seit 17 Jahren tot. Seit 15 Jahren gibt es die Wau Holland Stiftung, die ein Archiv seines Nachlasses der \u00d6ffentlichkeit zug\u00e4nglich machen soll und sein Lebenswerk weiter in Erinnerung bringen und vervollst\u00e4ndigen soll. \r\nIch m\u00f6chte meine pers\u00f6nlichen Erinnerungen an ihn teilen und Menschen treffen, die  auch ihre Erinnerungen an einen gro\u00dfartigen und innovatives intergalaktisches Wesen teilen m\u00f6chten.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 12, 
                                        "name": "Ursula Kooke", 
                                        "biography": "Na ja, \u00fcber mich gibt es nicht viel zu sagen. Ich habe Wau kennen gelernt, als ich 18 war und wir gemeinsam Mathematik und Politik in Marburg studiert haben. Er war \u00fcber lange Jahre bis zu seinem Tod mein bester Freund. Ich habe zeitweilig bei seinem Vater gelebt, der mich auch beauftragt, hat, Waus Nachlass zu verwalten, als Wau gestorben war. Und so habe ich gemeinsam mit Winfried Motzkus, Bernd Fix, Gerriet Hellwig und Mel Wahl auf der Beisetzungsfeier beschlossen, eine Stiftung zu gr\u00fcnden, habe als Stifterin diese errichtet und war die ersten Jahre auch Vorsitzende. Gab dann erst den Vorsitz und dann den Vorstandssitz 2007 ab. \r\n\r\n Ich bin Asperger Autistin und komme mit medizinischem Begleithund. Die Veranstaltung ist also nix f\u00fcr Hundehaarallergiker oder Paniker.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 721, 
                                "guid": "194f1218-3352-5884-8911-a75f1df92810", 
                                "logo": null, 
                                "date": "2018-12-27T22:30:00+01:00", 
                                "start": "22:30", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "GLMTRM", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/GLMTRM", 
                                "title": "Elektrogruselkabinett", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "ich zeige Bilder meiner Urlaube, wo ich elektrische Installationen fragw\u00fcrdiger Art fotografiert habe und erz\u00e4hle ein wenig dazu.", 
                                "description": "Im Prinzip dasselbe wie damals schon\r\n(https://log.koepferl.de/2017/12/29/34c3-elektrogruselkabinett/)\r\nEine Diashow mit Erz\u00e4hlungen von teilweise abenteuerlichen Elektrokonstuktionen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 26, 
                                        "name": "robert0k", 
                                        "biography": "Softwareentwickler, Informatiker und Mitglied des chch.it Chemnitz", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Vortrags-Arena": [
                            {
                                "id": 293, 
                                "guid": "0bb3bf25-818e-5503-ab16-e4f6625dcd41", 
                                "logo": "", 
                                "date": "2018-12-27T10:00:00+01:00", 
                                "start": "10:00", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "CJQCCB", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/CJQCCB/", 
                                "title": "Introduction for oio stage helpers", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "en", 
                                "abstract": "Come here if you want to help running the program on stage", 
                                "description": "how to record\r\nhow to use audio\r\nhow to control lights", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7, 
                                        "code": "USJAK9", 
                                        "public_name": "Andreas Br\u00e4u", 
                                        "biography": "Freifunker since 2006", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 305, 
                                "guid": "bb0127dd-fda6-5793-9237-bca7d0e3c31c", 
                                "logo": "", 
                                "date": "2018-12-27T10:55:00+01:00", 
                                "start": "10:55", 
                                "duration": "00:30", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "9ZHVHL", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/9ZHVHL/", 
                                "title": "OIO habour clean up  - Day 1", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "OIO Housekeeping", 
                                "language": "en", 
                                "abstract": "daily OIO habour clean up", 
                                "description": "daily OIO habour clean up", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 93, 
                                        "code": "HUQ9YA", 
                                        "public_name": "35c3oio@freifunk.space", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 283, 
                                "guid": "98550357-b645-5683-9e6b-af20295d8fb1", 
                                "logo": "", 
                                "date": "2018-12-27T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "01:30", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "WNDAXJ", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WNDAXJ/", 
                                "title": "Opening Session", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 80min total (etwa 30min  Q&A)", 
                                "language": "en", 
                                "abstract": "The official start of our orbit. With a keynote and a short introduction of all involved communities.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7, 
                                        "code": "USJAK9", 
                                        "public_name": "Andreas Br\u00e4u", 
                                        "biography": "Freifunker since 2006", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 229, 
                                "guid": "be0461ef-ad9f-51cb-be5a-f6dd3adf091e", 
                                "logo": "/media/35c3oio/images/DMQDTK/pic01-small.jpg", 
                                "date": "2018-12-27T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "DMQDTK", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/DMQDTK/", 
                                "title": "Freifunk IoT", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "de", 
                                "abstract": "Bei diesem Talk stellen wir das Freifunk-IoT Projekt sowie seine Module vor, und zeigen generelle M\u00f6glichkeiten auf, das Freifunk-Netz nicht nur als Transitnetz zu verwenden, sondern auch smarte Sensoren einzubinden.", 
                                "description": "Freifunk-IoT ist ein Projekt, welches ein Framework zum Einbinden von offenen Sensoren in Freifunk-Netze entwickelt und anbietet.\r\nEs gibt Ressourcen zu Hardware-Modulen wie Anleitungen und Platinenlayouts, und fertige Software f\u00fcr die Sensoren.\r\n\r\nZus\u00e4tzlich dazu stellt Freifunk-IoT ein serverseitiges Framework bereit, welches die Daten aggregiert, auswertet, visualisiert und wieder bereitstellt.\r\n\r\nIn diesem Talk wird der aktuelle Stand des Projektes vorgestellt, sowie im Anschluss eine Diskussion zur Weiterentwicklung angeregt.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 12, 
                                        "code": "SZWSUS", 
                                        "public_name": "margau", 
                                        "biography": "Student der Informationstechnik, Freifunk Stuttgart & begeisterter IoT-Bastler.", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 38, 
                                        "code": "JGZD9Q", 
                                        "public_name": "Hibas123", 
                                        "biography": "Hobby Entwickler, mit anscheinend zu viel Freizeit :)", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 92, 
                                        "code": "QFPHZF", 
                                        "public_name": "adnidor", 
                                        "biography": "Mastodon: @adnidor@chaos.social", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 270, 
                                "guid": "b1e00343-506c-51c4-92f5-6483562760d0", 
                                "logo": "/media/35c3oio/images/8GTXCY/DECT-612d-Eventphone-2000x1200.jpg", 
                                "date": "2018-12-27T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "8GTXCY", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/8GTXCY/", 
                                "title": "Eventphone: fr\u00fcher, heute, morgen.", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "de", 
                                "abstract": "Wir haben im letzten Jahr die Hard und Software des Phone Operation Center fast vollst\u00e4ndig ersetzt. Der gr\u00f6\u00dfte Schritt aus Benutzersicht war, die langen DECT Registrierungsschlangen gegen eine Selbst- oder Auto-Registrierungsfunktion zu tauschen. In einem Vortrag m\u00f6chten wir zeigen was wir gemacht haben, warum wir agil arbeiten, wie eigentlich ein Minimum Viable Product (MVP) geht, welche Fehler wir gemacht haben und im Nachgang eure Fragen beantworten.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 63, 
                                        "code": "D8M8QM", 
                                        "public_name": "ST Kambor-Wiesenberg", 
                                        "biography": "ST ist K\u00fcnstler. Er hat eine Ausbildung zum Energieelektroniker absolviert, Informatik, Physik, generalistisches Management sowie bildende Kunst studiert und arbeitet neben seinen Kunstprojekten als Agile Coach und Scrum Master.\r\n\r\nSeit 2000 treibt er sich im Umfeld des Chaos Computer Club und den entsprechenden Veranstaltungen herum. Er ist Mitgr\u00fcnder der BlinkenArea und seit 2003 Teil des Eventphone Teams.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 268, 
                                "guid": "ea041ba6-e43b-52ea-9310-f36a7872abf5", 
                                "logo": "/media/35c3oio/images/BRRGEK/end-to-end.png", 
                                "date": "2018-12-27T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "00:45", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "BRRGEK", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/BRRGEK/", 
                                "title": "End-to-end encryption for secure, zero-knowledge file sync & share", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "In this talk I'll detail the Nextcloud End-to-end Encryption design, going through the steps of creating the private/public key pair, encrypting and syncing it, encrypting files and uploading them, adding devices to the trusted circle and so on.", 
                                "description": "Nextcloud's E2EE is designed to protect user data from the server. The goal was to let users sync and share folders (and their contents) as easily as possible without the server ever having the ability to access the data. That rules out a web interface and has other limitations, but that's the price for knowing your server can't spy on you. It isn't and was never meant for ALL your data, as you should use a solution purely focused on E2EE instead! The nice features of Nextcloud, from online document editing to public sharing, will work on all your files except those you put in E2EE folders.\r\n\r\nThe talk is reasonably technical - it doesn't delve in to code or algorithms but sticks to the general design and flow of data: how do we create and share public keys, how do we get the private key on another device without the server being able to access it, how do we encrypt files and share them and so on.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 59, 
                                        "code": "KMKHUZ", 
                                        "public_name": "Jos Poortvliet", 
                                        "biography": "People person, technology enthusiast and all-things-open evangelist. Doing marketing at Nextcloud, previously Community Manager at ownCloud and SUSE, recovering business consultant with decade long involvement in the KDE community. Enjoys avoiding traffic and public transport on bike through Berlin, but only when the weather is good. Loves cooking for friends and family and playing with the dog.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 244, 
                                "guid": "760fa3e5-8307-5d44-9248-bc28b510bbe0", 
                                "logo": "/media/35c3oio/images/XCU9PD/voidcoin.svg.png", 
                                "date": "2018-12-27T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "XCU9PD", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/XCU9PD/", 
                                "title": "State Of The Void", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "en", 
                                "abstract": "Void Linux is a general purpose operating system based on the Linux Kernel. In this talk we'd like to give an introduction about Void, why we think our work matters and talk about the challenges that we were faced during the last year.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 43, 
                                        "code": "7UUC7W", 
                                        "public_name": "Enno Boland", 
                                        "biography": "An active member of the open source community since his teenage years. Former contributor of the Suckless project, then Node.js guy, now distribution maintainer.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 277, 
                                "guid": "6cfe5b4a-6517-5f03-acfd-254718f91f57", 
                                "logo": "", 
                                "date": "2018-12-27T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "BJMGW8", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/BJMGW8/", 
                                "title": "Detection of refugee boats on the Mediterranean with a drone by using FOSS", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "en", 
                                "abstract": "As NGOs continuing searching the Mediterranean by boat and a few planes, it would be good to find additional effective ways to find people in distress in the sea. To be able to search a huge area in the Mediterranean its good to get more eyes in the sky. For this purpose I want to show you and discuss computer-vision approaches to detect refugee boats which are able to run on basic minicomputers (like the RPI) which are cheap enough to put on a simple drone. All done by using free open source software. Furthermore I want to present a dataset and the current codebase which enables you to help searchwing/seawatch to work on the topic", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 86, 
                                        "code": "ZVA9RV", 
                                        "public_name": "Petrosilius", 
                                        "biography": "...", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Workshop-Domo": [
                            {
                                "id": 287, 
                                "guid": "589930fa-a993-54cc-93f9-b6eafdd97cc6", 
                                "logo": "", 
                                "date": "2018-12-27T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "01:20", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "KFCQED", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/KFCQED/", 
                                "title": "Freifunk-Workshop: Was tun gegen den Admin-Mangel", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 80min", 
                                "language": "de", 
                                "abstract": "Diskussionsrunde: Ein Teil der Freifunk-Krise seit 2016 in vielen Communities ist die Admin-Fluktuation. Was sind wirksame Modelle dagegen?", 
                                "description": "\"Wenn Freifunk performed, dann h\u00f6rt man nichts. Und wenn es nicht l\u00e4uft, dann gibt es Schimpfe\" ist ein oft geh\u00f6rtes Klagelied. \r\nDar\u00fcber hinaus: Solange es gut l\u00e4uft werden von den \"Routerverteilenden\" immer mehr Ger\u00e4te herausgestellt... bis es nimmer l\u00e4uft. Und dann sind wieder die Admins schuld. \r\nUmgekehrt haben sich viele Admins \u00fcber die Jahre ihre Standards so weit entwickelt, dass es f\u00fcr Dazukommende schwierig ist aufzuschlie\u00dfen, auch weil Dokumentation h\u00e4ufig allenfalls rudiment\u00e4r und/oder veraltet ist. \r\nWelche erfolgreichen Konzepte gibt es und was gilt es besser zu vermeiden?", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 6, 
                                        "code": "HFER8G", 
                                        "public_name": "Andreas Dorfer", 
                                        "biography": "https://forum.freifunk.net/u/adorfer/", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 297, 
                                "guid": "f185741b-3aaf-5b51-914e-6406c9df8e1c", 
                                "logo": "", 
                                "date": "2018-12-27T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "00:45", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "MLQWXT", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/MLQWXT/", 
                                "title": "nerds go humanitarian aid", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 45min", 
                                "language": "de", 
                                "abstract": "Ein Workshop um M\u00f6glichkeiten aufzuzeigen, wie und wo sich Bet\u00e4tigungsfelder f\u00fcr Nerds, Geeks und Specialists im humanit\u00e4ren Bereich ergeben...operativ werden statt nur Geld spenden.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 60, 
                                        "code": "PFDWBY", 
                                        "public_name": "Sebastian", 
                                        "biography": "CEO von CADUS e.V.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 300, 
                                "guid": "e3a587be-30ad-511c-a706-d24b48d1581a", 
                                "logo": "/media/35c3oio/images/VWQJGS/transparent_0_0.png", 
                                "date": "2018-12-27T20:30:00+01:00", 
                                "start": "20:30", 
                                "duration": "02:00", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "VWQJGS", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/VWQJGS/", 
                                "title": "GNUnet e. V. Mitgliederversammlung", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 80min", 
                                "language": "de", 
                                "abstract": "Mitglieder Versammlung des GNUnet e. V.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 79, 
                                        "code": "RHHMVL", 
                                        "public_name": "xrs", 
                                        "biography": "Mitglied des GNUnet e. V.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "WikiPakaWG Esszimmer": [
                            {
                                "id": 503, 
                                "guid": "3a8dd9e1-a581-516d-b3e4-19418371591a", 
                                "logo": "", 
                                "date": "2018-12-27T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:45", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "NSU8Y8", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/NSU8Y8/", 
                                "title": "Orgameeting Tag 1", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 4, 
                                        "code": "33UT8A", 
                                        "public_name": "WikiPaka Orga", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 509, 
                                "guid": "38b15b79-d1eb-5e6f-b50c-ce1ba2817305", 
                                "logo": "", 
                                "date": "2018-12-27T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "GWJR9B", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/GWJR9B/", 
                                "title": "Introduction to Wikidata and the Wikidata Query Service", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "en", 
                                "abstract": "Discover Wikidata, the free knowledge base from Wikimedia, and learn how to work with it.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6, 
                                        "code": "RE9MSE", 
                                        "public_name": "Lucas", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 7, 
                                        "code": "8GDPPA", 
                                        "public_name": "Amir", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 510, 
                                "guid": "22d77083-ceb3-50bd-b275-678ce3b22760", 
                                "logo": "", 
                                "date": "2018-12-27T15:00:00+01:00", 
                                "start": "15:00", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "RRCVBW", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/RRCVBW/", 
                                "title": "Datenpumpen-Hackathon #01", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop mit Gruppentischen", 
                                "language": "de", 
                                "abstract": "Explore the Data-Pump and build new Wikidata requests to visualise Free Knowledge and connected data.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8, 
                                        "code": "8XHJNS", 
                                        "public_name": "John", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 6, 
                                        "code": "RE9MSE", 
                                        "public_name": "Lucas", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 512, 
                                "guid": "f8c096cc-2785-5ce8-9b8d-5aeee71dafb4", 
                                "logo": "", 
                                "date": "2018-12-27T16:30:00+01:00", 
                                "start": "16:30", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "BEANCH", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/BEANCH/", 
                                "title": "Jugend hackt - Willkommen auf dem Congress!", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 5, 
                                        "code": "BWRH7E", 
                                        "public_name": "Daniel", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 9, 
                                        "code": "XN9PTD", 
                                        "public_name": "Paula", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 10, 
                                        "code": "VVLMZ9", 
                                        "public_name": "Robert", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 11, 
                                        "code": "B9E7PX", 
                                        "public_name": "Ilona", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 12, 
                                        "code": "E3QEBQ", 
                                        "public_name": "Basti", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 13, 
                                        "code": "9HQVHR", 
                                        "public_name": "Saadya", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 538, 
                                "guid": "8cfcba40-e656-5f5b-b46f-8a9f09913c85", 
                                "logo": "", 
                                "date": "2018-12-27T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "YWXE7F", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/YWXE7F/", 
                                "title": "Programmieren mit der Maus", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop mit Standard-Bestuhlung", 
                                "language": "de", 
                                "abstract": "Werkstattbericht: Wie kam es zu Programmieren mit der Maus? Wie geht es 2019 weiter und gibt es W\u00fcnsche f\u00fcr Programmieren mit dem Elefanten?", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 37, 
                                        "code": "NKKBZK", 
                                        "public_name": "P3nny", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 536, 
                                "guid": "fba5593d-a919-531d-833a-4af31897bc69", 
                                "logo": "", 
                                "date": "2018-12-27T19:45:00+01:00", 
                                "start": "19:45", 
                                "duration": "00:30", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "WH3E9B", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/WH3E9B/", 
                                "title": "Technikschulung Tag 2 f\u00fcr die WikipakaWG", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop mit Gruppentischen", 
                                "language": "de", 
                                "abstract": "-", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 3, 
                                        "code": "8KKP9X", 
                                        "public_name": "robbi5", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 515, 
                                "guid": "46774122-21b4-5f19-8b3f-eba958080a1c", 
                                "logo": "", 
                                "date": "2018-12-27T20:30:00+01:00", 
                                "start": "20:30", 
                                "duration": "02:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "ZAPYDL", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/ZAPYDL/", 
                                "title": "Community Treffen Code for Germany", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 16, 
                                        "code": "LZAHGJ", 
                                        "public_name": "Michael", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "WikiPakaWG K\u00fcche": [
                            {
                                "id": 511, 
                                "guid": "e62603e3-dcd9-53c9-b649-34ba70bc4ca7", 
                                "logo": "", 
                                "date": "2018-12-27T15:00:00+01:00", 
                                "start": "15:00", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "7FRCLS", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/7FRCLS/", 
                                "title": "Wikidata: help with queries", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "en", 
                                "abstract": "Additional space to address questions about Wikidata and the query service, if wanted.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 6, 
                                        "code": "RE9MSE", 
                                        "public_name": "Lucas", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 7, 
                                        "code": "8GDPPA", 
                                        "public_name": "Amir", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 513, 
                                "guid": "112730d8-6275-559e-8712-6233ffe59de0", 
                                "logo": "", 
                                "date": "2018-12-27T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "WGCR99", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/WGCR99/", 
                                "title": "The Things Network / LoRaWAN", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "Treffen der LoRaWAN / The Things Network Communities aus Deutschland. Kennenlernen, Erfahrungsaustausch, gemeinsame Projekte anschieben & Fachsimpeln.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 14, 
                                        "code": "GHKXRV", 
                                        "public_name": "Caspar", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "Discodrama": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10168.html", 
                                "id": 10168, 
                                "guid": "05e70735-b961-44d2-aaa1-2ee9a112ca83", 
                                "logo": null, 
                                "date": "2018-12-27T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "03:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10168-fairy_dust_-_day1", 
                                "title": "Fairy Dust - Day1", 
                                "subtitle": "Rocket Away", 
                                "track": "Music", 
                                "type": "other", 
                                "language": "en", 
                                "abstract": "Modify the Fairy Dust!", 
                                "description": "After standing in the cold rain and snow for too long, the Fairy Dust will find its place this time in the middle of the crowd at hall 5. A video installation will take place on the surface. This is a call for people, who can handle c4d files and have the bravery to put their vision on the symbol of the congress.\r\n\r\nThe file attached to this event contains all information about the object, as well the position and lenses of the 4 projectors. Fell free to develop whatever you like. Keep in mind that the surface is very glossy and actually eats the light away. Rendered video best with HAP or MP4.\r\n\r\nIn the hours between 2 pm and 5 pm on the days of the congress, there will be access to the video system, if you come around and have a device with HDMI out.  \r\n\r\nEnjoy!\r\n\r\nPowered by PENTAKLON und Rico Rose\r\n\r\nContact: privatlehrer[at]gmail[:]com", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/632/original/35C3-template-ROCKET.c4d?1545876425", 
                                        "title": "35C3-template-ROCKET.c4d"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10049.html", 
                                "id": 10049, 
                                "guid": "09e6fbc0-aca1-418a-862b-dedd2571b627", 
                                "logo": "/system/events/logos/000/010/049/large/sui.jpg?1545328482", 
                                "date": "2018-12-27T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10049-sui", 
                                "title": "SUI", 
                                "subtitle": "Diverse Music", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Sui likes the inconstancy of space affected by a diversity of sounds and people who drop in accidentally or with intent. All the emerging possibilities of such incidents are carefully sketched into a audible experience. This kind of soundvoyages evolving from slowly and fondly selected sounds and range from folklore to hiphop to field recordings to broken sounds. As she is not the best decision maker referring a genre, every sound that catches a curious ear and hits a heart needs to be played. A warm invitation to listen, hanging around lazily or to dance.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/sofieheinz", 
                                        "title": "https://soundcloud.com/sofieheinz"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10112.html", 
                                "id": 10112, 
                                "guid": "772c609d-c220-49fd-8e9a-671c6045304d", 
                                "logo": "/system/events/logos/000/010/112/large/1654341_593106100763608_757469119_n.jpg?1545404961", 
                                "date": "2018-12-27T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10112-das_weltweite_netzwerk_fur_ein_bedingungsloses_grundeinkommen", 
                                "title": "Das weltweite Netzwerk f\u00fcr ein bedingungsloses Grundeinkommen", 
                                "subtitle": "Experimental Pop", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "\u00bbDas weltweite Netzwerk fur ein bedingungsloses Grundeinkommen\u00ab steht gekleidet im Blaumann mit beiden Beinen fest auf einem leeren Bierkasten und zersingt altbekannte Popsongs. Es vervielfaltigt einf\u00e4ltige Ohrwurmer so lange, bis sie Schwarmintelligenz entwickeln. Es transformiert beil\u00e4ufges Nachgesumme in g\u00e4nsehauterregende Opernch\u00f6re und Unterhaltungsgedudel in antikapitalistische Klagelieder.", 
                                "description": "\u00bbDas weltweite Netzwerk f\u00fcr ein bedingungsloses Grundeinkommen\u00ab ist der bescheidene Name des Musikarbeiters und Medienk\u00fcnstlers Tommy Neuwirth, der ganz alleine mit den T\u00f6nen und ihrer Herkunft jongliert, dass einem das taube Dahinh\u00f6ren vergeht und die Ohren des Publikums ihre vielf\u00e4ltigen Verbindungen zu verschiedensten Hirnregionen, zu den Lachmuskeln, den Tr\u00e4nens\u00e4cken und den Tanzbeinen entdecken.\r\nNeuwirth g\u00f6nnt seinen Songs - oder soll man sagen: Musikkabarettnummern? - Nachdenkpausen, wenn die musikalische Konventionen sie voran peitschen wurden, er gebiert Melodien und \u00fcberl\u00e4sst sie sich selber und dem Publikum, wahrend er seine Aufmerksamkeit schon neuem Spielzeug widmet. Er trennt die Ger\u00e4usche, die er als Performer live auf der B\u00fchne hervorbringt magischerweise ab von den Bewegungen seines K\u00f6rpers und synchronisiert sich mit erstaunlichstem.\r\n\u00bbDas weltweite Netzwerk fur ein bedingungsloses Grundeinkommen\u00ab alias Tommy Neuwirth l\u00e4sst seinen skurrilen Humor seit 2012 in Form von Videos, Konzerten, Performances und Radio-Improvisationen auf die Menschen los.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "www.tommyneuwirth.de", 
                                        "title": "www.tommyneuwirth.de"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10045.html", 
                                "id": 10045, 
                                "guid": "749eb50d-d91f-4035-a7ef-eac5904cbefc", 
                                "logo": "/system/events/logos/000/010/045/large/954843_902544953129673_2577253257806048523_n.jpg?1545405145", 
                                "date": "2018-12-27T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10045-melted_moon", 
                                "title": "Melted Moon", 
                                "subtitle": "8 Bit Electro", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "A black text on green background, scrolling towards the middle of the screen. Di-Dinnng! Gameboy: the electronic soul of the past. It flows across the dance floor like a flash in the fog. We are the symbiosis of man and machine, the pulse drives us, heartbeats counted in BPM, we make sounds out of waves and waves out of sounds, we turn music into emotions and emotions into music, from minimum to maximum, from techno to dubstep. The whole spectrum is dancing. Penetrating sounds move you, electrify you, and the bass is massaging your soul. 8-bit power saves your life. Give yourself a chance. Experience Melted Moon\r\n\r\nMelted Moon started in 2006, when Mathias combined his two hobbies (music and gaming) by converting Gameboys into instruments. Back then, Melted Moon was merely a solo project, which slowly but perceptively gained popularity in Aschaffenburg. Later, in 2012, his friend Stefan joined him, followed by Fabian in 2013. Stefan was more technically savvy, while Fabian brought a lot of musical know-how, and it took just half a year to find a label and release the first album, \"Meltdown\".\r\n\r\nSince the label (Kompuphonik) is affiliated with the well-known band \"Welle:Erdball\", who also use retro computer hardware to create their music, they came in touch with each other and Melted Moon now regularly performs as a sidekick on many large Welle:Erdball concerts. Melted Moon even officially played at \"Rock am Ring\" in 2016 - the largest open air festival of Europe - and has performed on Nintendoom (the largest chiptune festival on the European mainland) twice.\r\n\r\nNot only is Melted Moon known in the music scene - of course Nintendo had to hear about them - not only because of Mathias' conspicuous Nintendo tattoos. And so it came that Melted Moon is also often invited to make some noise at the Gamescom (the largest video games convention of the world) on Nintendo's stage, but Melted Moon is also an integral part of the ROCCAT raffle shows - every year since 2013 - as well as their daily performances on the retro stage in the Gamescom's family area. Also, the city festival of Aschaffenburg features Melted Moon every year on the most central stage of the town - the \"5x4m ABh\u00f6rn-B\u00fchne\".\r\n\r\nMelted Moon uses only original Gameboy hardware to make music. The Gameboys are, of course, modified with a so-called \"pro sound mod\" (audio output directly from the soundchip to eliminate noise from the volume control), a backlight for the LCD screen, Bluetooth transceivers as a wireless link cable, and MIDI-Out for additional hardware (like SID synthesizers). The software used by Melted Moon is called \"Little Sound DJ\", or LSDJ for short, which runs on flashable third-party cartridges. LSDJ is a tracker program with a \"Live\" mode, where sections in the four individual channels can be played and looped selectively (additional to some live editing and effects).", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.meltedmoon.de/", 
                                        "title": "https://www.meltedmoon.de"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10091.html", 
                                "id": 10091, 
                                "guid": "b4a3ab2d-da99-40a6-acbc-6f18b234f292", 
                                "logo": null, 
                                "date": "2018-12-27T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10091-konflikt", 
                                "title": "Konflikt", 
                                "subtitle": "Techno/House", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/herr-koreander", 
                                        "title": "https://soundcloud.com/herr-koreander"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10086.html", 
                                "id": 10086, 
                                "guid": "b63863c1-8e67-4cf8-9a09-da058eb56900", 
                                "logo": "/system/events/logos/000/010/086/large/VRIL_2019.jpg?1545251026", 
                                "date": "2018-12-28T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10086-vril", 
                                "title": "Vril", 
                                "subtitle": "Techno Live Set", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Seemingly out of nothing, through dust and with no bang, VRIL appeared on the scene in 2010 with his debut on Giegling. His music made such beautiful noise that it instantly found his place on Marcel Dettmann\u2019s selection for his \u201cConducted\u201d CD. Also he was part of the Berghain05 Compilation in 2011. His sound is a search for the evergoing movement, exploring a never stopping energy. Once he catches you in his groove it will shine so bright you won\u2019t be able to escape it.\r\n", 
                                "description": "Tales of his harder sounding live sets being heard at DGTL, Awakenings, Fusion Festival, Berghain and all over the world. All sets share the same common feature that it was an as euphoric as energetic travel in sound.\r\nSince 2010 he was touring nonstop worldwide and had been to over 45 countries.\r\nThe warmer and more slower side of VRILs sound he shows in Podcasts that are released yearly on sites like Resident Advisor, Dekmantel, XLR8R, Inverted Audio, etc.\r\nVRIL is also quite active in doing Remixes.\r\nFor Percy X, Sterac, Suuns, Iori, HVOB to only name a few.\r\nHis highly anticipated debut album on Giegling named \u201cTorus\u201d (2014) contained a lot of great surprises soundwise.\r\nThe second Album \u201ePortal\u201c (2015) (which had more functional sound) and also the 12inch called \u201eVortekz\u201c (2014) was realeased on Delsin Records. The same label where his third LP \u201eanima mundi\u201c was released in late 2018.\r\nAll Releases in 2018:\r\nVRIL -Haus- (12 inch on Giegling)\r\nVRIL -Omniverse- (12 inch on Dystopian) VRIL -anima mundi- (LP on Delsin Records).", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/vril_01", 
                                        "title": "https://soundcloud.com/vril_01"
                                    }, 
                                    {
                                        "url": "https://vrildelsin.bandcamp.com", 
                                        "title": "https://vrildelsin.bandcamp.com"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10114.html", 
                                "id": 10114, 
                                "guid": "c79080c5-41d5-4159-b7ba-4d3d12efbbb5", 
                                "logo": "/system/events/logos/000/010/114/large/Steffen-Bennemann-1-by-Martin-Lovekosi_quad.jpg?1545310913", 
                                "date": "2018-12-28T01:00:00+01:00", 
                                "start": "01:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10114-steffen_bennemann", 
                                "title": "Steffen Bennemann", 
                                "subtitle": "Techno/House", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Curator of Nachtdigital Festival, Holger Records and many events in his home city of Leipzig - among them: Acid Haus (allnighters in a dark foggy basement), Sleep In (indoors & outdoors Ambient sleepovers), Idiots (parties in various off-locations).", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/steffenbennemann", 
                                        "title": "https://soundcloud.com/steffenbennemann"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10113.html", 
                                "id": 10113, 
                                "guid": "0a8eb550-c937-480a-909c-a0506c22cf7f", 
                                "logo": "/system/events/logos/000/010/113/large/Map.Ache-by-Thomas-Kru%CC%88ger-1068x527.png?1545310592", 
                                "date": "2018-12-28T03:00:00+01:00", 
                                "start": "03:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10113-map_ache", 
                                "title": "Map.ache", 
                                "subtitle": "House Live Set", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Map.ache is Jan Barich, a Leipzig-based DJ-producer most widely known for his releases on Giegling, as part of the DJ duo Manamana, and work with KANN, the acclaimed imprint he runs with Alex Neuschulz (a.k.a. Sevensol) and Dennis Knoof (a.k.a. Bender). Promoting what they call \"modern dance music,\" and with a discography that includes, among many other immensely talented artists, themselves, Traumprinz, and Falke, it's no surprise that the label is regarded so highly by deep house fans today.", 
                                "description": "Barich's story has been partly told before: growing up in Leipzig, he began playing the drums aged 14 and subsequently became involved in two band projects, namely Diario and The Hands Of The Wrong People\u2014the former of which was a real success. Steadily, throughout the mid-'90s, he became increasingly interested in electronica, in part down regular visits to Conne Island, an alternative youth cultural center that hosted a rich musical program ranging across the entire spectrum. \"It [Conne Island] certainly shaped my musical personality,\" Barich reflects.\r\n\r\nSoon, however, he began attending illegal techno parties around the city, held in abandoned spaces in the twilight hours after Conne Island's doors had been closed. DJing and production started soon thereafter. He learned to do the former around the age of 14, though only started playing out in the early 2000s; while he taught himself the latter in 2003, inspired by the music he was being exposed too. He was, he says, a \"shy bedroom producer\" who lacked the self-confidence to share his music with labels, leading him to set up KANN in 2008 as an outlet for his productions and those of his partners. The imprint, without question, has been a success, seeing a wide number of wonderful releases and serving as a platform for Map.ache to share his work elsewhere: since quitting his job at Conne Island in 2014, the Leipzig-based artist has released a beautiful collection of musical works. He's certainly an artist on the rise, so what better time to catch up with him to reflect on his journey to date and plans for the future.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/ache-map", 
                                        "title": "https://soundcloud.com/ache-map"
                                    }, 
                                    {
                                        "url": "https://kann-records.com", 
                                        "title": "https://kann-records.com"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10111.html", 
                                "id": 10111, 
                                "guid": "c39ca3be-da21-4910-b107-8de2a6e87dca", 
                                "logo": "/system/events/logos/000/010/111/large/avatars-000146613399-bud282-t500x500.jpg?1545404839", 
                                "date": "2018-12-28T04:00:00+01:00", 
                                "start": "04:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10111-rss_disco", 
                                "title": "RSS Disco", 
                                "subtitle": "Disco/House", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "RSS DISCO (originally RSS Music Summary; later, two competing approaches emerged, which used the backronyms Really Simple Seduction and Relatively Serious Sequence respectively) is a type of continuous music feed which allows users and robots to access updates to recorded content in a standardized, computer-readable format. This feed can, for example, allow a dancer to keep track of many different tracks in a single night. Any fun aggregator can periodically check RSS Disco for new content, allowing the content to be automatically passed from the turntable to the soundsystem. This passing of content is called DJing. \r\nAn RSS experience (called \u201cset\u201d, \u201cmix\u201d, or \"performance\") includes full frequencies, action and vibes.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/rss", 
                                        "title": "https://soundcloud.com/rss"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Shutter Island": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10164.html", 
                                "id": 10164, 
                                "guid": "a7735c0a-3bcb-46e3-b063-b2bb3b6a26cd", 
                                "logo": null, 
                                "date": "2018-12-27T10:00:00+01:00", 
                                "start": "10:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10164-start", 
                                "title": "Start", 
                                "subtitle": "Expected", 
                                "track": "Music", 
                                "type": "meeting", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "All creatures welcomes each.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10165.html", 
                                "id": 10165, 
                                "guid": "de0828fd-8129-476e-8ff7-d94ff88bba2c", 
                                "logo": null, 
                                "date": "2018-12-27T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10165-moe", 
                                "title": "Moe", 
                                "subtitle": "Mogreens", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "User:Mogreens", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10166.html", 
                                "id": 10166, 
                                "guid": "af719b79-4271-4313-8d0d-171b1883e7d9", 
                                "logo": null, 
                                "date": "2018-12-27T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10166-fussil_moe", 
                                "title": "Fussil & Moe", 
                                "subtitle": "Kick it. Get Punk*", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10167.html", 
                                "id": 10167, 
                                "guid": "04bf5d96-f119-42c8-a867-86094936b0df", 
                                "logo": null, 
                                "date": "2018-12-27T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10167-fussil", 
                                "title": "Fussil", 
                                "subtitle": "Fussel on the decks.", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "It is, what is it?", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10093.html", 
                                "id": 10093, 
                                "guid": "d6e5e3f9-8c16-4c07-a92d-11a1ceacd9df", 
                                "logo": null, 
                                "date": "2018-12-27T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "03:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10093-mike_lait", 
                                "title": "Mike Lait", 
                                "subtitle": "Music that feels like a warm blanket.", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Mike Lait baut schon seit Jahren Deko auf dem Congress.\r\nDas kann er gut. Auch wirklich gut kann er Musik auflegen, die sich wie eine warme Kuscheldecke anf\u00fchlt.\r\n\r\nMike Lait has been building deco at the congress for years. \r\nHe's good at that. He is also good at put on music that feels like a warm blanket.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/mikelait", 
                                        "title": "https://soundcloud.com/mikelait"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10094.html", 
                                "id": 10094, 
                                "guid": "eaf099e4-70e8-4f09-b078-732f74bc2116", 
                                "logo": null, 
                                "date": "2018-12-27T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10094-zuurb", 
                                "title": "zuurb", 
                                "subtitle": "Chillgoldmine", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "zuurb ist eine wandelnde Chillgoldmine. Ob vor internationalen Gr\u00f6\u00dfen Drum\u00b4n Bass Sets astrein abzuliefern oder stundenlang melanchonische Knusper-Piano-Flocken rieseln zu lassen, er kann es.\r\n\r\nzuurb is a walking chillgoldmine, whether to deliver drum\u00b4n bass sets in front of international stars or to let melanchonic crunchy piano flakes trickle for hours, he can do it.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/zuurb", 
                                        "title": "https://soundcloud.com/zuurb"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10095.html", 
                                "id": 10095, 
                                "guid": "d76f85a8-db2d-4a53-987e-281e3a98a746", 
                                "logo": null, 
                                "date": "2018-12-27T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10095-timo_minmon", 
                                "title": "Timo Minmon", 
                                "subtitle": "Minmon Kollektiv", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.minmon.de/", 
                                        "title": "https://www.minmon.de/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10096.html", 
                                "id": 10096, 
                                "guid": "5c8de34c-03e3-45f1-9f8d-bdb06eaa9a7a", 
                                "logo": null, 
                                "date": "2018-12-27T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10096-barbnerdy", 
                                "title": "barbnerdy", 
                                "subtitle": "Basic chillout", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "barbnerdy ist Teil der Congresschillabteilung - ja man streitet sich auch mal und dann schaut man nach vorne und h\u00f6rt gemeinsam gute Musik mit viel Bass, das ist n\u00e4mlich ihr Steckenpferd.\r\n---\r\nbarbnerdy is part of the congresschill department - yes argue happened sometimes and then we look forward and listen to good music together with a lot of bass, that's her hobbyhorse.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/barbnerdy/tracks", 
                                        "title": "https://soundcloud.com/barbnerdy/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10097.html", 
                                "id": 10097, 
                                "guid": "c7f4afa9-ea3f-48d3-b284-54ae24fd85e2", 
                                "logo": null, 
                                "date": "2018-12-27T23:00:00+01:00", 
                                "start": "23:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10097-mohammed_atari", 
                                "title": "Mohammed Atari", 
                                "subtitle": "Vinyl Spezialist", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Mohammed Atari spielte mal in Hamburg seine Lieblingsschallplatten, als ein junges M\u00e4dchen an das DJ Pult herantrat und laut rief: \u201cTolle Musik spielst du!\u201d. Er ist ein Mysterium und ja wir sind gespannt auf sein Set.\r\n---\r\nMohammed Atari was playing his beloved vinyls once in Hamburg when a young girl appeared and shouted \u201cyou play great music!\u201d. He is a man of mystery and yes we are curious to listen to his set.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://hearthis.at/mohammed-atari/", 
                                        "title": "https://hearthis.at/mohammed-atari/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10098.html", 
                                "id": 10098, 
                                "guid": "2a0d1f6a-5120-40cc-aded-e32fe0769c24", 
                                "logo": "/system/events/logos/000/010/098/large/warden.png?1545255045", 
                                "date": "2018-12-28T01:00:00+01:00", 
                                "start": "01:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10098-gregoa", 
                                "title": "Gregoa", 
                                "subtitle": "Mr. G. Music", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Gregoa - Verkorkster Endvierziger mit Hang zu melancholischer Musik zwischen geschmeidigen bis st\u00fcmperhaften \u00dcberg\u00e4ngen.\r\nBislang unentdeckt, doch vom Chaos wegen der doch recht speziellen Musikmischung gesch\u00e4tzt.\r\n---\r\nGregoa - Corked up in his late forties with a tendency towards melancholic music between smooth and unprofessional transitions.\r\nSo far undiscovered, but appreciated by the chaos because of the very special musical mixture.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://hearthis.at/gregoa/#tracks", 
                                        "title": "https://hearthis.at/gregoa/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10099.html", 
                                "id": 10099, 
                                "guid": "66d45141-41e4-4dcf-9eeb-e6ce201b4f0f", 
                                "logo": null, 
                                "date": "2018-12-28T03:00:00+01:00", 
                                "start": "03:00", 
                                "duration": "04:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10099-bidi_morelle", 
                                "title": "Bidi & Morelle", 
                                "subtitle": "Swiss Fondue und Hamburger Jung'", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Bidi - https://vannutt.ch/ ist direkt aus einem Casting einer italienisch-schweizerischen  Koproduktion \u00fcber psychidelische Aspekte n\u00e4chtelanger Chillkultur und derer Interaktion mit heruntergepitchen Schlagersongs entsprungen und wie immer lange und sp\u00e4t dran.\r\n\r\nMorelle entstammt einem alten Hamburger Geschlecht der Musikpudel und hat sich mit seinen gerne auch \u00fcber Stunden ziehenden Sets bei entsprechender Musikauswahl immer als einer der DJs erwiesen, der wei\u00df, wie es geht. Musik die wohltuend ins Ohr aber auch in die Beine geht.\r\n---\r\nBidi - https://vannutt.ch/ is the direct result of a casting of an Italian-Swiss co-production on psychedelic aspects of night-long chill culture and its interaction with down-pitched folksongs and, as always, long and late.\r\n\r\nMorelle comes from an old Hamburg family of music poodles and with his sets, which can last for hours, has always proved to be one of the DJs who knows how to do it. Music that goes pleasantly into the ear but also into the legs.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Compeiler": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10146.html", 
                                "id": 10146, 
                                "guid": "3e99eab9-bce3-4446-a635-74a26d538c5f", 
                                "logo": null, 
                                "date": "2018-12-27T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "02:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10146-rote_schule_music_workshop", 
                                "title": "Rote Schule Music Workshop", 
                                "subtitle": "Workshop/Performance", 
                                "track": "Music", 
                                "type": "workshop", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10120.html", 
                                "id": 10120, 
                                "guid": "e874417a-105a-4c49-a251-553f9aa5359a", 
                                "logo": "/system/events/logos/000/010/120/large/EselsAlptraum_1.jpg?1545595130", 
                                "date": "2018-12-27T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10120-esels_alptraum", 
                                "title": "Esels Alptraum", 
                                "subtitle": "Antifaschistisches Jodel Duo", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Love Yodel - Hate Fascism", 
                                "description": "\"Jodeln klingt f\u00fcr Viele nach Heimatkitsch & Konservatismus - Nicht mit uns! Als Jodel-Delegation des 1. anarchistischen Traditions- und Folklorevereins jodeln wir gegen die Beschissenheit des Systems und f\u00fcr das gute, sch\u00f6ne, lustvolle Leben.\"", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://www.eselsalptraum.de", 
                                        "title": "http://www.eselsalptraum.de"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10121.html", 
                                "id": 10121, 
                                "guid": "5ddc92a0-46b6-4a12-a529-71ba23699ad2", 
                                "logo": "/system/events/logos/000/010/121/large/1535626_619269164806791_1189704944_n.jpg?1545594520", 
                                "date": "2018-12-27T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10121-form", 
                                "title": "Form", 
                                "subtitle": "HipHop", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "form ist ein Gutmensch und macht Arschbombe in die Rapszene. Denn entgegen landl\u00e4ufiger Erwartungen muss man gar kein faschistoider, sexistischer Volltrottel sein, um zu rappen. HipHop ist very gut, vergesst das nicht! form ist ein sehr lebendiger Beweis daf\u00fcr. Drum reihet euch ein, um auf der Achterbahn der Gutmenschlichkeit durch die H\u00f6hen und Tiefen der menschlichen Existenz zu rasen. Es knallt, versprochen.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://www.fifaform.de", 
                                        "title": "http://www.fifaform.de"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10122.html", 
                                "id": 10122, 
                                "guid": "2fee9c9c-ce05-4a5e-91fe-92a971fc264a", 
                                "logo": "/system/events/logos/000/010/122/large/lena_bio.jpg?1545410988", 
                                "date": "2018-12-27T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10122-lena_stoehrfaktor", 
                                "title": "Lena Stoehrfaktor", 
                                "subtitle": "HipHop", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Lena Stoehrfaktor, rappende Underground-Gr\u00f6\u00dfe aus Berlin, bringt sich seit 2004 mit rotzigen Styles in die karge HipHop-Landschaft ein. Seitdem entstanden 4 eigene Alben sowie 3 Crewalben mit \"Conexion Musical\". Au\u00dferdem wirkt sie in verschiedenen musikalischen Projekten mit. Seit ihren Anf\u00e4ngen ist sich Lena Stoehrfaktor treu geblieben. Die Themen ihrer Texte werden aus dem realen Leben gegriffen und in feinster Art und Weise auf Beats gelegt, die die Stimmung der Inhalte unterstreichen.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.lenastoehrfaktor.de", 
                                        "title": "https://www.lenastoehrfaktor.de"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10123.html", 
                                "id": 10123, 
                                "guid": "cb9ed396-4cf9-4bec-8934-0bf97cf0f705", 
                                "logo": null, 
                                "date": "2018-12-27T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10123-koffer", 
                                "title": "Koffer", 
                                "subtitle": "Punk (19:30-20:30)", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Punk from Berlin", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10124.html", 
                                "id": 10124, 
                                "guid": "b73eed35-ced6-4fbf-8261-38bc8f8c252d", 
                                "logo": "/system/events/logos/000/010/124/large/0009954533_10.jpg?1545411278", 
                                "date": "2018-12-27T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10124-warm_swords", 
                                "title": "Warm Swords", 
                                "subtitle": "Garage Psy Rock (20:30-21:30)", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Warm Swords is the \"solo-project\" of Regal's very own Caelan O'Flaherty. Born in New Zealand, raised in France, lived in Belgium and now living in Leipzig Germany where he found his live band featuring two members of The Staches.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://warmswords.bandcamp.com", 
                                        "title": "https://warmswords.bandcamp.com"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10125.html", 
                                "id": 10125, 
                                "guid": "165a5f2a-c57d-4e86-81f4-de270b572434", 
                                "logo": "/system/events/logos/000/010/125/large/page18-1000-full.jpg?1545410749", 
                                "date": "2018-12-27T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10125-guts_pie_earshot", 
                                "title": "Guts Pie Earshot", 
                                "subtitle": "DancePunk vs. DubTech / Hardcore vs. Punk'n'Bass", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "GUTS PIE EARSHOT are surely one of the most unusual modern bands who music-wise vaguely have something to do with punk/hardcore and in the same time breakbeat/techno.", 
                                "description": "Their music is purely instrumental. This instrumentation may appear minimalist, only cello and drums are played, and yet the music conjures up entire new universes in the mind's eye - or ear.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://www.gutspieearshot.de", 
                                        "title": "http://www.gutspieearshot.de"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10126.html", 
                                "id": 10126, 
                                "guid": "3e91d529-95d8-41f6-b250-c529c0a94997", 
                                "logo": null, 
                                "date": "2018-12-28T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "02:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10126-hits_hits_hits", 
                                "title": "Hits Hits Hits", 
                                "subtitle": "HitsPunkTrash", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10127.html", 
                                "id": 10127, 
                                "guid": "749655f5-a19d-49ea-83a6-cb7c5d3fde75", 
                                "logo": null, 
                                "date": "2018-12-28T02:00:00+01:00", 
                                "start": "02:00", 
                                "duration": "02:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10127-miss_the_point", 
                                "title": "Miss the Point", 
                                "subtitle": "", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10128.html", 
                                "id": 10128, 
                                "guid": "0394f713-47fc-47eb-b759-d9835df2f8b3", 
                                "logo": null, 
                                "date": "2018-12-28T04:00:00+01:00", 
                                "start": "04:00", 
                                "duration": "02:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10128-monis_crew", 
                                "title": "Monis Crew", 
                                "subtitle": "", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Uptime Bar": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10074.html", 
                                "id": 10074, 
                                "guid": "e35d77cb-637c-4383-b0d9-a454d09383e1", 
                                "logo": "/system/events/logos/000/010/074/large/2018-08-25_20.52.00.jpg?1545576403", 
                                "date": "2018-12-27T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10074-otto_paul", 
                                "title": "otto/paul", 
                                "subtitle": "Breakbeats, Pop, Electronic, Ambient", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "otto/paul appeared at the event horizon of Sagittarius A* where he began his journey to planet earth. While travelling through space & time he happened to meet ancient astronauts, superintelligences and multi-dimensional entities and collected their most different types of music. Currently on earth, otto/paul blends breakbeats, pop, electronic, ambient, tribal and slow rhythim from allover the galaxy to satisfy and enlighten the ears of mankind.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.mixcloud.com/MartinOttoPaul/", 
                                        "title": "https://www.mixcloud.com/MartinOttoPaul/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10161.html", 
                                "id": 10161, 
                                "guid": "cae35aaf-b540-4343-a90b-6f0f147d46be", 
                                "logo": null, 
                                "date": "2018-12-27T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10161-parole_emil", 
                                "title": "Parole Emil!", 
                                "subtitle": "", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/emil-torp", 
                                        "title": "https://soundcloud.com/emil-torp"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10058.html", 
                                "id": 10058, 
                                "guid": "76278e10-8c1e-40df-9a70-618d7985cf8e", 
                                "logo": "/system/events/logos/000/010/058/large/avatars-000460064742-8nkpcj-t500x500.jpg?1545406404", 
                                "date": "2018-12-27T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10058-psychedelic_duct_tape", 
                                "title": "Psychedelic Duct Tape", 
                                "subtitle": "Ambient & more", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/user-956219626", 
                                        "title": "https://soundcloud.com/user-956219626"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10116.html", 
                                "id": 10116, 
                                "guid": "8c5b0d1c-b7f4-498b-b826-85ab8d2394d0", 
                                "logo": "/system/events/logos/000/010/116/large/adelakram.jpg?1545311240", 
                                "date": "2018-12-27T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10116-adel_akram", 
                                "title": "Adel Akram", 
                                "subtitle": "Diverse Electronic Music", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "With a background in shaping landscapes and creating permacultural environments, Adel became a multidimensional and interdisciplinary artist creating visuals whilst exploring waveforms and rooms. As well as providing visuals for Herrensauna and AnnaMelina\u2019s and Varg\u2019s Flora project at atonalFestival, his music appears in the upcoming movie M/M by DrewLint. By launching \u2018When Are We Now?\u2019 Adel Akram takes the idea of a label as an archive to document his surrounding and the process of examination with different media, arts and questions about our current position in time. ", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://timeandplace.net", 
                                        "title": "http://timeandplace.net"
                                    }, 
                                    {
                                        "url": "https://wawn.bandcamp.com", 
                                        "title": "https://wawn.bandcamp.com"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/adelakram", 
                                        "title": "https://soundcloud.com/adelakram"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10077.html", 
                                "id": 10077, 
                                "guid": "c36d4196-e932-43c3-8bd6-ef6651684a43", 
                                "logo": "/system/events/logos/000/010/077/large/123e-109b-4180-9a71-8c4a1880dba7.jpeg?1545406618", 
                                "date": "2018-12-27T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10077-alexeyan", 
                                "title": "Alexeyan", 
                                "subtitle": "D&B, Neurofunk", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "From the family...", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.mixcloud.com/Alexeyan/", 
                                        "title": "https://www.mixcloud.com/Alexeyan/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10085.html", 
                                "id": 10085, 
                                "guid": "3d8b7f78-1df5-4928-bd8f-766e940e0521", 
                                "logo": "/system/events/logos/000/010/085/large/avatars-000068578992-leteqv-t500x500.jpg?1545406859", 
                                "date": "2018-12-28T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10085-tasmo", 
                                "title": "Tasmo", 
                                "subtitle": "Bass&Drum", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "From the family...", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://tasmo.rocks/", 
                                        "title": "https://tasmo.rocks/"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/tasmo/", 
                                        "title": "https://soundcloud.com/tasmo/"
                                    }, 
                                    {
                                        "url": "https://twitter.com/_Tasmo", 
                                        "title": "https://twitter.com/_Tasmo"
                                    }, 
                                    {
                                        "url": "https://hearthis.at/tasmo/", 
                                        "title": "https://hearthis.at/tasmo/"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "OIO Thementisch 1": [
                            {
                                "id": 245, 
                                "guid": "f2444f75-7b94-5026-bb2e-d6c5a9ce7fa5", 
                                "logo": "", 
                                "date": "2018-12-27T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "12:00", 
                                "room": "OIO Thementisch 1", 
                                "slug": "Z98HRQ", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/Z98HRQ/", 
                                "title": "Freifunk IoT-Demo", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Pr\u00e4sentationsinsel (alle 3 Tage)", 
                                "language": "de", 
                                "abstract": "An dieser Pr\u00e4sentationsinsel wird das Konzept und verschiedene interaktive Ausstellungsst\u00fccke von Freifunk-IoT gezeigt.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 12, 
                                        "code": "SZWSUS", 
                                        "public_name": "margau", 
                                        "biography": "Student der Informationstechnik, Freifunk Stuttgart & begeisterter IoT-Bastler.", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 38, 
                                        "code": "JGZD9Q", 
                                        "public_name": "Hibas123", 
                                        "biography": "Hobby Entwickler, mit anscheinend zu viel Freizeit :)", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 92, 
                                        "code": "QFPHZF", 
                                        "public_name": "adnidor", 
                                        "biography": "Mastodon: @adnidor@chaos.social", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Thementisch 2": [
                            {
                                "id": 265, 
                                "guid": "0435ccb3-5d7c-5f90-a52d-88d964a6fedc", 
                                "logo": "", 
                                "date": "2018-12-27T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "12:00", 
                                "room": "OIO Thementisch 2", 
                                "slug": "Z37GSP", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/Z37GSP/", 
                                "title": "Seenotrettung", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Pr\u00e4sentationsinsel (alle 3 Tage)", 
                                "language": "de", 
                                "abstract": "Seenotrettungs-NGOs pr\u00e4sentieren ihre Arbeit, machen auf die Kriminalisierung von humanit\u00e4rer Hilfe aufmerksam und freuen sich auf Gespr\u00e4che und Austausch.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 55, 
                                        "code": "NFL8CT", 
                                        "public_name": "just humans", 
                                        "biography": "Wir sind eine Gruppe politischer und humanit\u00e4rer Aktivist*innen aus verschiedenen Organisationen.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Thementisch 3": [
                            {
                                "id": 261, 
                                "guid": "052afba9-6f2d-52c7-bb4b-7bd7e4753242", 
                                "logo": "", 
                                "date": "2018-12-27T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "12:00", 
                                "room": "OIO Thementisch 3", 
                                "slug": "HYJXWE", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/HYJXWE/", 
                                "title": "Lots of blinking stuff, Pixelflut and Intergalaktische Reisep\u00e4sse", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Pr\u00e4sentationsinsel (alle 3 Tage)", 
                                "language": "de", 
                                "abstract": "Lots of blinking stuff and Pixelflut. Selling Intergalaktische Reisep\u00e4sse", 
                                "description": "We will populate a  Presentation isle with blinking decoration and sculptures.\r\n\r\nAdditionally we will provide a 40 Gb/s Pixelflut server.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 52, 
                                        "code": "VHNKEG", 
                                        "public_name": "tsys", 
                                        "biography": "I'm a software developer/network administrator at Freifunk Kiel and active member of the Open Infrastructure Orbit Orga.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Thementisch 4": [
                            {
                                "id": 272, 
                                "guid": "cf0bd4d5-ecdb-5822-a45f-978f92bba358", 
                                "logo": "/media/35c3oio/images/NVXWSM/who_owns_your_data.png", 
                                "date": "2018-12-27T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "12:00", 
                                "room": "OIO Thementisch 4", 
                                "slug": "NVXWSM", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/NVXWSM/", 
                                "title": "Nextcloud", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Pr\u00e4sentationsinsel (alle 3 Tage)", 
                                "language": "en", 
                                "abstract": "We're the Nextcloud community (nextcloud.com/yourdata/) and we're here to meet people and chat about self-hosting, decentralization, federation, and many more topics! We can also show you Nextcloud demos, help you to get involved in our community, and of course, tell you everything about our new Nextcloud Include diversity program!", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 59, 
                                        "code": "KMKHUZ", 
                                        "public_name": "Jos Poortvliet", 
                                        "biography": "People person, technology enthusiast and all-things-open evangelist. Doing marketing at Nextcloud, previously Community Manager at ownCloud and SUSE, recovering business consultant with decade long involvement in the KDE community. Enjoys avoiding traffic and public transport on bike through Berlin, but only when the weather is good. Loves cooking for friends and family and playing with the dog.", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 68, 
                                        "code": "F3SR8V", 
                                        "public_name": "shiro", 
                                        "biography": "I'm shiro (shiromarieke.github.io) and I work on Nextcloud :)", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Thementisch 5": [
                            {
                                "id": 271, 
                                "guid": "51c9528c-1a01-5eea-abd3-3b762798bbe4", 
                                "logo": "", 
                                "date": "2018-12-27T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "12:00", 
                                "room": "OIO Thementisch 5", 
                                "slug": "NXGJRN", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/NXGJRN/", 
                                "title": "Global Innovation Gathering", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Pr\u00e4sentationsinsel (alle 3 Tage)", 
                                "language": "en", 
                                "abstract": "GIG, the global network of social and technological innovators is bringing its members and their projects to the Congress for a showcase and interactive workshops", 
                                "description": "- will follow -", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 64, 
                                        "code": "R8T8AG", 
                                        "public_name": "GIG \u2013\u00a0Global Innovation Gathering", 
                                        "biography": "tl;dr: GIG is the global network of social and technological innovators. #wearegig\r\n\r\nGlobal Innovation Gathering (GIG) is a vibrant, diverse community of innovation hubs, makerspaces, hackerspaces and other grassroot innovation community spaces and initiatives as well as individual innovators, makers, technologists and changemakers. GIG is pursuing a new vision for global cooperation based on equality, openness and sharing. We aim to enable more diversity in the production of technology, and global innovation processes and support open and sustainable solutions developed by grassroot innovators. With strong roots in the global south, we share, collaborate and work together globally. GIG provides a platform for meaningful exchange by fostering knowledge exchange and collaboration between its members.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Thementisch 6": [
                            {
                                "id": 264, 
                                "guid": "112c596e-4b94-559b-b00b-ef92a5de53ca", 
                                "logo": "/media/35c3oio/images/W9G9FB/IMG_20181128_2313400.jpg", 
                                "date": "2018-12-27T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "12:00", 
                                "room": "OIO Thementisch 6", 
                                "slug": "W9G9FB", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/W9G9FB/", 
                                "title": "Freifunk Event Installationen und autarke Installationen", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Pr\u00e4sentationsinsel (alle 3 Tage)", 
                                "language": "de", 
                                "abstract": "Freifunk tempor\u00e4r f\u00fcr kleine, mittlere und gro\u00dfe Veranstaltungen. Freifunk kabelungebunden autark betreiben.", 
                                "description": "Die Pr\u00e4sentation von Freifunk D\u00fcren zeigt zwei Dinge, einmal, wie Freifunk f\u00fcr Veranstaltungen angeboten werden kann und wie eine Versorgung ohne Kabelanbindung mit Strom und Mobilfunk m\u00f6glich ist. Freifunk D\u00fcren hat vier Jahre Erfahrungen dazu sammeln k\u00f6nnen, wie auf Events bis zu 300 Clients versorgt werden und wie praxisnah Sachen funktionieren oder nicht. Urspr\u00fcnglich war das Equipment gro\u00df und schwer. Wir zeigen, wie die Installationen so klein werden k\u00f6nnen, dass das Kisten schleppen entf\u00e4llt und der Stromverbrauch so niedrig wird, dass mit Solarzellen kleineren Ausma\u00dfes oder Powerbank der Betrieb funktioniert. Vom handlichen Freifunk2go mit LTE Stick f\u00fcr 30 Clients, um Freifunk in \u00f6ffentlichen Verkehrsmitteln oder im Park mobil zu realisieren, bis zu einem mobilen LTE Offloader f\u00fcr 300 Clients, werden wir unserer Ger\u00e4te zeigen. Auch die Aussicht, irgendwann Freifunk auf der Annakirmes anbieten zu k\u00f6nnen, einem Event in D\u00fcren mit bis zu 50.000 Menschen, die gleichzeitig auf dem Kirmesplatz sind, k\u00f6nnen wir berichten, was daf\u00fcr ben\u00f6tigt wird. Der Stadt D\u00fcren konnten schon erste Vorschl\u00e4ge gemacht werden, die Orientierung dazu ist das WLAN auf dem Congress.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 42, 
                                        "code": "JGBAWZ", 
                                        "public_name": "Matthias Schmidt", 
                                        "biography": "Seit September 2014 aktiv bei Freifunk D\u00fcren und Aachen.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ]
                    }
                }, 
                {
                    "index": 2, 
                    "date": "2018-12-28", 
                    "day_start": "2018-12-28T11:00:00+01:00", 
                    "day_end": "2018-12-29T03:00:00+01:00", 
                    "rooms": {
                        "Adams": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9744.html", 
                                "id": 9744, 
                                "guid": "6beabddc-2dd6-43d2-9936-618d41d42cde", 
                                "logo": null, 
                                "date": "2018-12-28T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9744-inside_the_fake_science_factories", 
                                "title": "Inside the Fake Science Factories", 
                                "subtitle": "", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "This talk investigates fake science factories; international twilight companies whose sole purpose is to give studies an air of scientific credibility while cashing in on millions of dollars in the process. We present the findings, outcomes and methodology from a team of investigative journalists, hackers and data scientists who delved into the parallel universe of fraudulent pseudo-academic conferences and journals. The story was published in Germany (ARD and S\u00fcddeutsche Zeitung Magazin) in mid of July and then went around the world. How did it begin? What did we learn in the process? And: What happened since the story got published?", 
                                "description": "Until recently, fake science factories have remained relatively under the radar, with few outside of academia aware of their presence; but the highly profitable industry has been growing significantly in the last five years and with it, so are the implications. To the public, fake science is often indistinguishable from legitimate science, which is facing similar accusations itself.\r\nWe expose the scale and value of two fake science operations: Well-known institutions and professors who abuse this route of publication for personal gain and the deadly consequences when the public believe in fake cures or weird discoveries that seem scientific at a very first glance. Beyond the pressure to publish, we find varying motivations from paid vacations and promotions to obtaining stipends and research grants.\r\nOur findings highlight the prevalence of the pseudo-academic conferences, journals and publications and the damage they can and are doing to society.\r\nFor 35C3 we did some extra analytics and will publish new numbers, how pseudo-academic publishing has dropped since the story got out in several countries in July 2018.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7209, 
                                        "public_name": "@sveckert"
                                    }, 
                                    {
                                        "id": 8756, 
                                        "public_name": "@tillkrause"
                                    }, 
                                    {
                                        "id": 8760, 
                                        "public_name": "Peter Hornung"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9975.html", 
                                "id": 9975, 
                                "guid": "f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12", 
                                "logo": "/system/events/logos/000/009/975/large/Jahresrueckblick18.png?1545577737", 
                                "date": "2018-12-28T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "02:20", 
                                "room": "Adams", 
                                "slug": "35c3-9975-jahresruckblick_des_ccc_2018", 
                                "title": "Jahresr\u00fcckblick des CCC 2018", 
                                "subtitle": "Refreshing Memories", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Biometrische Video\u00fcberwachung, Hausdurchsuchungen, Polizeiaufgabengesetze, Staatstrojaner und ganz viel Cyber: Wir geben einen \u00dcberblick \u00fcber die Themen, die den Chaos Computer Club 2018 besch\u00e4ftigt haben.", 
                                "description": "Neben der Zusammenfassung und der R\u00fcckschau auf das vergangene Jahr wollen wir aber auch \u00fcber zuk\u00fcnftige Projekte und anstehende Diskussionen reden.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 3995, 
                                        "public_name": "Linus Neumann"
                                    }, 
                                    {
                                        "id": 1630, 
                                        "public_name": "Constanze Kurz"
                                    }, 
                                    {
                                        "id": 1633, 
                                        "public_name": "frank"
                                    }, 
                                    {
                                        "id": 1544, 
                                        "public_name": "erdgeist"
                                    }, 
                                    {
                                        "id": 4395, 
                                        "public_name": "nexus"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9791.html", 
                                "id": 9791, 
                                "guid": "513a2aeb-79b0-4222-ba5e-09d1d9057122", 
                                "logo": null, 
                                "date": "2018-12-28T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9791-the_surveillance_state_limited_by_acts_of_courage_and_conscience", 
                                "title": "The Surveillance State limited by acts of courage and conscience", 
                                "subtitle": "An update on the fate of the Snowden Refugees  ", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "An update on the circumstances of the Snowden Refugees will be provided at the 35C3 event and venue in December 2018. ", 
                                "description": "There have been many significant events and incidents during 2018, and some of these will be disclosed at the talk.\r\n\r\nUpdates will provided on the Snowden Refugees appeals in Hong Kong and their refugee claims with Canada.\r\n\r\nThere will also be disclosures on continued surveillance and harassment by the Hong Kong authorities.   ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8588, 
                                        "public_name": "Robert Tibbo"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9723.html", 
                                "id": 9723, 
                                "guid": "f58a2b6d-bde0-483b-a8db-043ea9371cb6", 
                                "logo": "/system/events/logos/000/009/723/large/Element_2.png?1543960831", 
                                "date": "2018-12-28T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9723-smart_home_-_smart_hack", 
                                "title": "Smart Home - Smart Hack", 
                                "subtitle": "Wie der Weg ins digitale Zuhause zum Spaziergang wird", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "GERMAN:\r\nMehr als 10.000 unterschiedliche Device-Hersteller aus aller Welt verwenden die Basis-Plattform (WIFI-Modul, Cloud, App) eines einzigen Unternehmens zur technischen Umsetzung ihrer Smart-Home-Produkte.\r\nDie Analyse dieser Basis zeigt erhebliche Sicherheitsm\u00e4ngel auch konzeptioneller Natur und somit diverse Angriffspunkte, von denen mehrere Millionen Smart Devices betroffen sind.\r\nDer Vortrag stellt die Funktionsweise smarter Ger\u00e4te im Zusammenhang mit der genannten Basis-Plattform dar, zeigt das Ausma\u00df der Sicherheitsl\u00fccken anhand diverser Angriffsszenarien und bietet der Community eine L\u00f6sung f\u00fcr die sichere Nutzung der betroffenen Ger\u00e4te.\r\n\r\nENGLISH:\r\nMore than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.\r\nThe analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.\r\nThe lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.", 
                                "description": "GERMAN:\r\nF\u00fcr die dem Vortrag zu Grunde liegenden Tests wurden verschiedenste Gl\u00fchbirnen und Steckdosen verschiedener Hersteller bestellt und untersucht. Dabei fiel sofort auf, dass sehr oft ein ESP8266 (sehr kosteng\u00fcnstiger 32-Bit-Mikrocontroller mit integriertem 802.11 b/g/n Wi-Fi) der chinesischen Firma espressif verwendet wird.\r\nWeitere Untersuchungen zeigten, dass neben dem verwendeten WIFI-Modul, unabh\u00e4ngig vom aufgedruckten Hersteller der Smart-Devices, auch dieselbe Cloud, sowie die gleiche Basis-App eines chinesischen IoT-Modul-Herstellers verwendet wird. \r\nDiese Basis-Plattform erm\u00f6glicht somit jedem weltweit in k\u00fcrzester Zeit selbst zum Reseller von bereits fertigen Produkten, wie \u201eSmart Bulbs\u201c und \u201eSmart Plugs\u201c zu werden, oder seine ganz eigenen Smart-Devices auf den Markt zu bringen, auch ohne den Besitz tieferer technischer Kenntnisse bez\u00fcglich IoT oder IT-Sicherheit.\r\n\r\nDie Analyse der \"Smart\"-Devices, die diese Basis-Plattform verwenden, ist allgemein erschreckend. Einfachste Sicherheitsregeln werden nicht befolgt und es gibt gravierende systematische und konzeptionelle M\u00e4ngel, die stark zu Lasten der Sicherheit der Endanwender gehen. Aufgrund der einfachen M\u00f6glichkeit des Bezugs und Inverkehrbringens solcher Smart-Devices sind ganz neuartige kriminelle Konzepte denkbar, die auch ohne gro\u00dfes Experten-Hacker-Wissen in die Tat umgesetzt werden k\u00f6nnten.\r\n\r\nDer Vortrag stellt die Funktionsweise der untersuchten smarten Ger\u00e4te im Zusammenhang mit der verwendeten Basis-Plattform dar und zeigt das Ausma\u00df der Sicherheitsl\u00fccken anhand diverser Angriffsszenarien.\r\nAbschlie\u00dfend wird eine L\u00f6sung des Sicherheitsdilemmas bei der Verwendung betroffener Smart-Devices angeboten, welche die sichere Nutzung dieser Ger\u00e4te im eigenen Zuhause, auch f\u00fcr Nichtexperten, m\u00f6glich macht.\r\n\r\n\r\n\r\nENGLISH:\r\nFor the tests on which the lecture is based, various light bulbs and sockets from different manufacturers were ordered  and tested. It was immediately noticed that an ESP8266 (very cost-effective 32-bit microcontroller with integrated 802.11 b/g/n Wi-Fi) from the Chinese company espressif is very often used.\r\nFurther investigations showed that the same cloud and the same basic app from a Chinese IoT module manufacturer are used in addition to the WIFI module used, regardless of the printed manufacturer of the smart devices. \r\nThis basic platform gives anyone worldwide the possibility to become a reseller of already finished products, such as \"Smart Bulbs\" and \"Smart Plugs\", or to bring their own smart devices onto the market in the shortest possible time, even without having in-depth technical knowledge of IoT or IT security.\r\n\r\nThe analysis of the \"smart\" devices using this basic platform is generally frightening. The simplest security rules are not followed and there are serious systematic and conceptual shortcomings, which strongly affect the security of end users. Due to the simple possibility of obtaining and placing such smart devices on the market, completely new criminal concepts are conceivable that could be put into practice even without a great deal of expert hacker knowledge.\r\n\r\nThe talk presents the functionality of the examined smart devices in relation with the basic platform and shows the extent of the security gaps on the basis of various attack scenarios.\r\nFinally, a solution to the security dilemma of using affected smart devices is offered, which makes it possible for even non-experts to safely use these devices in their own homes.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8478, 
                                        "public_name": "Michael Steigerwald"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.vtrust.de/35c3", 
                                        "title": "Smart Home Smart Hack"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9999.html", 
                                "id": 9999, 
                                "guid": "520b7c92-8bd1-424e-acc4-7cf15dd168a4", 
                                "logo": "/system/events/logos/000/009/999/large/ID-Karim-2-2.jpg?1542118431", 
                                "date": "2018-12-28T18:50:00+01:00", 
                                "start": "18:50", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9999-the_enemy", 
                                "title": "The Enemy ", 
                                "subtitle": "War, Journalism, VR", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The Enemy brings you face-to-face with combatants from three conflict zones: with the Maras in Salvador, in the Democratic Republic of the Congo, and in Israel and Palestine. Their testimonies and confessions about their lives, experiences, and perspectives on war will allow you to better understand their motivations\u2026 and their humanity.", 
                                "description": "The Enemy by Karim Ben Khelifa, a groundbreaking interactive Virtual Reality (VR) exhibition, and immersive experience, makes its North American premiere at the MIT Museum. Through 360-degree imaging and recordings, participants will encounter combatants on opposite sides of conflicts in Israel/Palestine, the Congo, and El Salvador. In their own words, each will offer personal perspectives on war, including thoughts on motivations, suffering, freedom, and the future.\r\n\r\nThe exhibition incorporates concepts from artificial intelligence and cognitive science-based interaction models. Conceived by acclaimed photojournalist Karim Ben Khelifa, this ambitious project was further developed during a visiting artist residency at MIT hosted by MIT\u2019s Center for Art, Science & Technology (CAST) and in collaboration with MIT Professor D. Fox Harrell.\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7970, 
                                        "public_name": "Karim Ben Khelifa"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://theenemyishere.org/about", 
                                        "title": "The Enemy"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9463.html", 
                                "id": 9463, 
                                "guid": "c85de43e-107e-4247-b550-946f376e2ec4", 
                                "logo": "/system/events/logos/000/009/463/large/Bildschirmfoto_2018-09-28_um_09.53.44.png?1538121257", 
                                "date": "2018-12-28T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9463-attacking_end-to-end_email_encryption", 
                                "title": "Attacking end-to-end email encryption", 
                                "subtitle": "Efail, other attacks and lessons learned.", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "In this talk, I\u2019ll present several attacks that leak the plaintext of OpenPGP or S/MIME encrypted emails to an attacker. Some of the attacks are technically interesting, i.e. the two different efail attacks, some are somewhat silly, yet effective. Some abuse HTML emails, some also work with plain ASCII emails. Furthermore, I\u2019ll discuss our lessons learned and describe the efail-related changes to mail clients and the OpenPGP and S/MIME standards.", 
                                "description": "Email remains the least common denominator when two or more people communicate over the Internet. While many modern messengers use end-to-end (e2e) encryption by default, email relies on transport encryption among email servers, which offers a much weaker protection. \r\n\r\nOpenPGP and S/MIME are two competing standards that bring e2e encrypted communication to email. While S/MIME is mostly used in corporate environments and built into many of the widely used email clients, OpenPGP often requires that users install additional software and plugins. Both technologies never reached large deployment, mostly because both suffer from a range of usability issues. However, it is commonly assumed that if one manages to use OpenPGP or S/MIME to encrypt emails, it is very secure.\r\n\r\nIn this talk, I\u2019ll discuss several attacks that leak the plaintext of OpenPGP or S/MIME encrypted emails to an attacker. Some of the attacks are technically interesting, i.e. the two different efail attacks, some are somewhat silly, yet effective. Some abuse HTML emails, some also work with plain ASCII emails.\r\n\r\nThe disclosure of the efail vulnerabilities caused a lot of stir in the press and the community, which also led to confusion about how the vulnerabilities work, about the mitigations and about the consequences for the OpenPGP and S/MIME standards. I\u2019ll discuss our lessons learned and describe the efail-related changes to mail clients and the OpenPGP and S/MIME standards.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 3205, 
                                        "public_name": "Sebastian Schinzel"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://efail.de/", 
                                        "title": "The efail attacks."
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/542/original/sec18-poddebniak.pdf?1539597057", 
                                        "title": "Efail paper (USENIX Security 2018)"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/683/original/35c3-schinzel-efail.pdf?1546025131", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10030.html", 
                                "id": 10030, 
                                "guid": "8943659a-536d-4afb-85de-f1b8b29a7902", 
                                "logo": null, 
                                "date": "2018-12-28T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-10030-the_ghost_in_the_machine", 
                                "title": "The Ghost in the Machine", 
                                "subtitle": "An Artificial Intelligence Perspective on the Soul", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Artificial Intelligence gives us a uniquely fascinating and clear perspective at the nature of our minds and our relationship to reality. We will discuss perception, mental representation, agency, consciousness, selfhood, and how they can arise in a computational system, like our brain.", 
                                "description": "Cognitive Science describes our mind by identifying it as a particular kind of machine, a generally intelligent computer built from a nervous system embedded into the body of a social primate. Intelligence can be understood as a system's ability to create models, usually in the service of regulating the interaction of this system with its environment. But how does such regulation give rise to a sense of self and conscious awareness?\r\n\r\nThis is the fifth installment on the series From Computation to Consciousness, which covers philosophy of mind, epistemology, the nature of consciousness, the emergence of social structure and the relationship between mind and universe using concepts from computer science and Artificial Intelligence.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4034, 
                                        "public_name": "Joscha"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10010.html", 
                                "id": 10010, 
                                "guid": "9a91d92b-0691-46b2-ba73-112bc598342f", 
                                "logo": null, 
                                "date": "2018-12-28T23:30:00+01:00", 
                                "start": "23:30", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-10010-die_eu_und_ihre_institutionen", 
                                "title": "Die EU und ihre Institutionen ", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Ein kurzer Grundlagenabriss \u00fcber die Institution der Europ\u00e4ischen Union, insbesondere zur Funktionsweise und Zusammenarbeit", 
                                "description": "Welche Institutionen gibt es? Welche Rollen haben sie? Wie sind die Machtverh\u00e4ltnisse? Was l\u00e4uft gut? Was l\u00e4uft schlecht? tbc", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8729, 
                                        "public_name": "Dustin Hoffmann"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10038.html", 
                                "id": 10038, 
                                "guid": "72c63924-b94d-4c83-b986-9e3e95ae91c0", 
                                "logo": null, 
                                "date": "2018-12-29T00:30:00+01:00", 
                                "start": "00:30", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-10038-meine_abenteuer_im_eu-parlament", 
                                "title": "Meine Abenteuer im EU-Parlament", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Bei der Europawahl 2014 wurde ich als Spitzenkandidat der Partei f\u00fcr Arbeit, Rechtsstaat, Tierschutz, Elitenf\u00f6rderung und basisdemokratische Initiative in das Europ\u00e4ische Parlament gew\u00e4hlt.", 
                                "description": "Seit Juli 2014 bin ich dort Mitglied im Ausschuss f\u00fcr Kultur und Bildung, in der Delegation f\u00fcr die Beziehungen zur Koreanischen Halbinsel und war stellvertretendes Mitglied im Haushaltskontrollausschuss bis Juni 2015.\r\n\r\nSeit Januar 2017 bin ich stellvertretendes Mitglied im Ausschuss f\u00fcr ausw\u00e4rtige Angelegenheiten.\r\n\r\nIn diesen Rollen erlebe ich so manches Abenteuer.", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 8780, 
                                        "public_name": "Martin Sonneborn"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Borg": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9566.html", 
                                "id": 9566, 
                                "guid": "e96ff77d-7247-48a8-839b-554ee37328d6", 
                                "logo": "/system/events/logos/000/009/566/large/yG2ahUfL_400x400.jpg?1543064858", 
                                "date": "2018-12-28T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "02:20", 
                                "room": "Borg", 
                                "slug": "35c3-9566-lightning_talks_day_2", 
                                "title": "Lightning Talks Day 2", 
                                "subtitle": "", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!", 
                                "description": "Did you think that the thrill of sharing your ideas in front of a huge audience at a C3 was something you'd never experience? Do you work on a cool project and want to get the word out? Was your talk one of the hundreds that got rejected? Did you come up with an awesome hack that you need to share? Go ahead and enter your Lightning Talk now!\r\n\r\nThe 35C3 Lightning Talks consist of three fast paced sessions which are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to get out to a global audience. Even if you don't have an awesome idea or project to share, a Lightning Talk is perfect for pitching your Assembly, your workshop or even a longer talk you'll give as a self-organized session. Your five minutes of fame!\r\n\r\nFor registration and schedule info, please check out https://c3lt.de/35c3", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5263, 
                                        "public_name": "gedsic"
                                    }, 
                                    {
                                        "id": 4601, 
                                        "public_name": "bigalex"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://c3lt.de/35c3", 
                                        "title": "Registration and schedule"
                                    }, 
                                    {
                                        "url": "https://events.ccc.de/congress/2018/wiki/index.php/Static:Lightning_Talks", 
                                        "title": "Congress Wiki Page"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9419.html", 
                                "id": 9419, 
                                "guid": "76417167-e13b-43cd-a089-841ff78266e8", 
                                "logo": null, 
                                "date": "2018-12-28T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9419-explaining_online_us_political_advertising", 
                                "title": "Explaining Online US Political Advertising", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Over the summer Facebook, Google, and Twitter have started making transparent United States political ads shown on their platforms. We have been collecting and analyzing these political ads to understand how candidates, elected officials, PACs, non-profits, for-profit companies, and individual citizens are disseminating U.S. political content using these advertising platforms.", 
                                "description": "Based on our analysis we will explain how major political sponsors are using online advertising system to send microtargeted messages to different audiences. We will also explain the messages, targetting, goals, spending, and impressions for major US political advertisers. As part of our project to improve the transparency of online political advertising, we have publically released our data and tools for others to analyze online political ads.\r\n\r\nThis will be a talk about improving the transparency of online political advertising.\r\n\r\nWe will start by describing the online political advertising transparency efforts that Facebook, Google, and Twitter have implemented.\r\n\r\nWe will next explain how we collected data from each of these efforts and are making it public.\r\n\r\nAfter this, we will explain some of the methodologies and tools we are building to help analyze and visualize this data. Next, we will present some of our findings on how online political ads are being targetted and the messages they are communicating with different target audiences.\r\n\r\nWe will also present some case studies on major online political advertisers such as Donald Trump, Beto O\u2019Rourke, the NRA, and Planned Parenthood. This will focus on how they are leveraging \u201emicro-targeted\u201c advertisements and the goals of their advertising.\r\n\r\nWe will finish by demonstrating some of the visualization tools are have deployed to enable people to better understand online political advertising.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8187, 
                                        "public_name": "Damon McCoy"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://online-pol-ads.github.io/", 
                                        "title": "Home page for our project"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/451/original/Facebooks-archive_%281%29.pdf?1537466442", 
                                        "title": "An Analysis of Facebook\u2019s Archive of Ads With Political Content"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10018.html", 
                                "id": 10018, 
                                "guid": "23e85d7a-9645-4ae2-9954-63b71abc08d4", 
                                "logo": "/system/events/logos/000/010/018/large/atomicBomb.jpg?1545003847", 
                                "date": "2018-12-28T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-10018-verhalten_bei_hausdurchsuchungen", 
                                "title": "Verhalten bei Hausdurchsuchungen", 
                                "subtitle": "Praktische Hinweise f\u00fcr den Kontakt mit der Staatsmacht", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Es ist 6 Uhr und ein Trupp uniformierter Polizisten steht vor deiner Wohnungst\u00fcr. Was solltest du bis dahin getan haben und was solltest du jetzt tun?", 
                                "description": "Eine Hausdurchsuchung ist etwas, was sich niemand ersehnt und vor dem wir m\u00f6glichst verschont bleiben wollen. Dennoch passiert es auch im Chaosumfeld immer wieder, dass Hackerinnen und Hacker Besuch von den Staatsorganen bekommen.\r\n\r\nDieses Jahr erwischte es unter anderem die Zwiebelfreunde, das OpenLab in Augsburg, den C3DO und evtl. andere. Daher solltet ihr euch gedanklich auf eine Durchsuchung vorbereiten und Schritte ergreifen.\r\n\r\nIm Vortrag erz\u00e4hlen euch Jens und Kristin, welche Ma\u00dfnahmen weit vor einer Durchsuchung sinnvoll sind. Weiterhin geben sie euch Empfehlungen, auf was ihr bei einer laufenden Durchsuchung achten solltet und wie es nach einer Hausdurchsuchung weitergeht.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 2402, 
                                        "public_name": "qbi"
                                    }, 
                                    {
                                        "id": 7771, 
                                        "public_name": "Kristin Pietrzyk"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9800.html", 
                                "id": 9800, 
                                "guid": "74b9c748-970f-4693-ac7e-46fcc733d2b4", 
                                "logo": null, 
                                "date": "2018-12-28T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9800-how_to_teach_programming_to_your_loved_ones", 
                                "title": "How to teach programming to your loved ones", 
                                "subtitle": "Enabling students over example-driven teaching", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Teaching beginners how to program is often <i>hard</i>.  We love building programs, and seeing our loved ones struggle with this is painful.  Showing them how to copy-paste a few example programs and change a few parameters is easy, but bridging from there to building substantial programs is a different game entirely.  This talk is about how to teach programming successfully, through comprehensible <i>design recipes</i>, which anyone can follow, using languages and tools designed for beginners.  This approach is probably different from how you learned how to program, or how you're used to teaching.  It is more effective, however, as it teaches more material successfully to a broader spectrum of people.  It is also more enjoyable.\r\n", 
                                "description": "The talk is based on many years of research by the <a href=\"https://programbydesign.org/\">Program by Design</a>, <a href=\"http://www.deinprogramm.de\">DeinProgramm</a>, and <a href=\"http://www.bootstrapworld.org/\">Bootstrap</a> educational projects, as well as over 30 years of personal teaching experience in school, university and industrial contexts.  A word of warning: The resulting approach is radically different from most teaching approaches used in universities and schools.  In particular, it avoids teaching purely through examples and expecting students to develop the skills to arrive at the solutions on their own.  Instead, it eaches explicit methodology that enables students to solve problems of surprising complexity on their own, whether they are 11 or 55, whether in a classroom, a training facility, or your home.  Extensive documentation, material, and software to support this methodology is available for free.\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7686, 
                                        "public_name": "Mike Sperber"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/679/original/teach-programming.pdf?1546010097", 
                                        "title": "teach-programming.pdf"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9658.html", 
                                "id": 9658, 
                                "guid": "6e25dd44-763f-494b-bae5-75b409dcf1d0", 
                                "logo": null, 
                                "date": "2018-12-28T18:50:00+01:00", 
                                "start": "18:50", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9658-computer_die_uber_asyl_mit_entscheiden", 
                                "title": "Computer, die \u00fcber Asyl (mit)entscheiden", 
                                "subtitle": "Wie das BAMF seine Probleme mit Technik l\u00f6sen wollte und scheitert", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Welchen Dialekt spricht eine Gefl\u00fcchtete aus Syrien? Was verr\u00e4t das Handy eines Asylsuchenden aus dem Irak dar\u00fcber, wo er herkommt? Und ist der Name Wasef eigentlich typisch f\u00fcr Afghanistan? \u00dcber diese Fragen entscheiden im Bundesamt f\u00fcr Migration und Fl\u00fcchtlinge (BAMF) zunehmend Computer. Sie spucken Wahrscheinlichkeiten f\u00fcr Herkunftsl\u00e4nder aus, die entscheidend daf\u00fcr sind, ob Gefl\u00fcchtete Asyl bekommen - oder nicht. Kurz: Menschliche Schicksale h\u00e4ngen von Maschinen ab. Diese Maschinen wissen nichts dar\u00fcber, ob einem Menschen in seiner alten Heimat Verfolgung, Folter und Tod drohen. Mitarbeiter des BAMF verlassen sich auf diese Ergebnisse, auch wenn sie falsch sein k\u00f6nnen. Recherchen und bisher unver\u00f6ffentlichte Dokumente zeigen, warum das schiefgehen muss und welche schweren Folgen f\u00fcr Schutzsuchende das haben kann.\r\n", 
                                "description": "Im Jahr 2015 stellte fast <a href=\"https://www.bmi.bund.de/SharedDocs/pressemitteilungen/DE/2016/01/asylantraege-dezember-2015.html\">eine halbe Million Menschen</a> einen Asylantrag in Deutschland. Das BAMF war \u00fcberfordert, immer mehr unbearbeitete Antr\u00e4ge sammelten sich an. Der vermeintliche Ausweg lautete Prozessoptimierung. Allein im Jahr 2016 wurden 25 Millionen Euro f\u00fcr Unternehmensberatungen wie McKinsey ausgegeben, die das Amt <a href=\"https://www.zeit.de/2017/14/bamf-unternehmensberater-geschwindigkeiten-folgen-fluechtlinge/komplettansicht\">zu einer Entscheidungsfabrik machen</a> sollten. Dass die Beh\u00f6rde \u00fcber das Schicksal von Menschen entscheidet, trat in den Hintergrund. Immer mehr Entscheidungen in immer k\u00fcrzerer Zeit, kaum ausgebildete Entscheider, schlechte \u00dcbersetzer, massive Datenschutzprobleme und viele falsche Ablehnungen, die im Nachhinein vor Gericht landeten und im Nachhinein revidiert werden mussten.\r\n\r\nEin Beitrag zur vermeintlichen Optimierung sollten IT-Systeme f\u00fcr ein \"Integriertes Identit\u00e4tsmanagement\" leisten, das aus vier Teilen besteht: Ein \"Transliterationsassistent\" soll Namen in arabischer Schrift einheitlich in lateinische Buchstaben \u00fcbertragen, um Verwechslungen zu vermeiden und gleichzeitig auswerten, ob der Name im angegebenen Herkunftsland des Gefl\u00fcchteten vorkommt. Aus einer automatischen Handyauswertung sollen sich Hinweise ergeben, welche Nationalit\u00e4t eine Person hat. Die Technik daf\u00fcr stammt von einer Firma, die auch f\u00fcr Milit\u00e4r und Geheimdienste arbeitet. Mittels stimmbiometrischer Verfahren sollen die Entscheider Hinweise darauf bekommen, ob ein Antragsteller eher \u00e4gyptisches Arabisch spricht oder vielleicht einen levantinischen Dialekt, der auf eine syrische Herkunft hindeutet. Nicht zuletzt sollen biometrische Fotos helfen festzustellen, ob jemand bereits in einer anderen Datenbank registriert wurde. Damit will das BAMF \"Vorreiter bei der Erschlie\u00dfung innovativer Technologien\" sein.\r\n\r\nDoch die neuen IT-Systeme, die kurz vor der Bundestagswahl 2017 vorgestellt wurden, l\u00f6sen die Probleme des BAMF nicht. Sie schaffen neue und entmenschlichen die Entscheidungen \u00fcber Schutzsuchende, indem sie die Illusion von Korrektheit und Objektivit\u00e4t erzeugen.\r\n\r\nDurch Recherchen und Gespr\u00e4che mit Betroffenen erh\u00e4rtete sich der Verdacht, dass das zum Scheitern verurteilt ist. Gefl\u00fcchtete erz\u00e4hlten davon, dass BAMF-Mitarbeiter die Systeme nicht richtig bedienen konnten. Ihre Asylakten zeigen, dass sie auch die Ergebnisse fahrl\u00e4ssig interpretiert haben. Sie vertrauten kaum aussagef\u00e4higen Prozentangaben aus intransparenten Computerprogrammen mehr als den Schilderungen und Dokumenten der Betroffenen. Bisher unver\u00f6ffentlichte Dokumente zeigen, dass es sich wohl nicht nur um Einzelf\u00e4lle handelt.\r\n\r\nNeben der Gefahr, dass Gefl\u00fcchtete auf Grundlage der automatisierten Auswertungen abgeschoben werden, hat die Digitalisierungsoffensive im BAMF weitere Auswirkungen: Datenschutzprobleme und massenhafte Datenweiterleitungen an den Verfassungsschutz zum Beispiel. Doch die Beh\u00f6rde hat bereits ein neues Projekt gestartet: die <a href=\"http://www.bamf.de/DE/DasBAMF/BAMFdigital/Blockchain/blockchain-node.html\">Blockchainisierung des Asylverfahrens</a>.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4465, 
                                        "public_name": "Anna Biselli"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://netzpolitik.org/2017/digitalisierte-migrationskontrolle-wenn-technik-ueber-asyl-entscheidet/", 
                                        "title": "Digitalisierte Migrationskontrolle: Wenn Technik \u00fcber Asyl entscheidet"
                                    }, 
                                    {
                                        "url": "https://motherboard.vice.com/de/article/a3q8wj/fluechtlinge-bamf-sprachanalyse-software-entscheidet-asyl", 
                                        "title": "Eine Software des BAMF bringt Menschen in Gefahr"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9629.html", 
                                "id": 9629, 
                                "guid": "8c84a37f-a8a5-4061-bfde-8da074ea8693", 
                                "logo": null, 
                                "date": "2018-12-28T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9629-snakes_and_rabbits_-_how_ccc_shaped_an_open_hardware_success", 
                                "title": "Snakes and Rabbits - How CCC shaped an open hardware success", 
                                "subtitle": "", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "<p>\r\nThis talk will present a historical narrative of the background behind how the <a href=\"https://kosagi.com/w/index.php/NeTV_Main_Page\">NeTV</a> + Milkymist inspire the <a href=\"hdmi2usb.tv\">HDMI2USB</a> then helped the <a href=\"https://www.crowdsupply.com/alphamax/netv2\">NeTV2</a> projects and how they all became interlinked through events like Congress! From the study of this history, we will attempt to distill a few core lessons learned that can hopefully be applied to other open hardware projects.\r\n</p>", 
                                "description": "<p>\r\nOpen hardware projects tend to evolve differently from open software projects. Even though it\u2019s very easy to fork an open software project, pull requests and merges help ensure the main branch of a project continues to improve. Furthermore, open software projects tend to evolve along with their tools, as evidenced by the concurrent maturation of Servo and Rust, or Linux and Git. In contrast, open hardware projects tend to fork and then fracture the community as they gain commercial success and go closed, as evidenced in the evolution of the 3D printer and drone communities. There are also few examples of hardware projects that co-evolve with their tools.\r\n</p><p>\r\nThe evolution of the <a href=\"https://kosagi.com/w/index.php/NeTV_Main_Page\">NeTV</a> + Milkymist to the <a href=\"hdmi2usb.tv\">HDMI2USB</a> to the <a href=\"https://www.crowdsupply.com/alphamax/netv2\">NeTV2</a>, along with the concurrent maturation and adoption of the <a href=\"https://m-labs.hk/migen/\">Migen</a> and <a href=\"http://www.enjoy-digital.fr/\">LiteX ecosystem</a>, is one of these rare examples.\r\n</p><p>\r\nThis talk will present a historical narrative of the background behind each of these projects and how they became interlinked. From the study of this history, we will attempt to distill a few core lessons learned that can hopefully be applied to other open hardware projects. \r\n</p><p>\r\nOne important lesson is that open anything takes time and patience, and so the project itself needs to be in a space where it can move at an appropriate pace to grow a healthy community while maintaining relevance against potentially better-funded closed-source options. \r\n</p><p>\r\nAnother lesson is the importance of crowdfunding as a mechanism to marshall community around a given release, as opposed to relying upon sources of financing that expect direct returns on investment (such as venture capital or loans). \r\n</p><p>\r\nA final example of a lesson we will discuss is the importance of picking the right tools to co-evolve with the project. While many open source options alternatives exist to closed-source tools, it\u2019s problematic if the design tools somehow limit the hardware implementation or introduces flaws in the design itself -- and hardware, unlike software, cannot be patched. Migen/LiteX are front-end tooling for describing FPGA designs (\u201cgateware\u201d), and their output being a bitstream means it can be in the hardware space while enjoying the privilege of easy patching and updates. Furthermore, Migen/LiteX offer critical features and performance metrics unavailable in the closed-source alternatives, meaning that these are not simply design tools, they are also core to enabling the competitiveness of the hardware itself.\r\n</p>\r\n<h3>Related previous Chaos Congress Talks</h3>\r\n<ul>\r\n <li><a href=\"https://media.ccc.de/v/cccamp11-4412-latest_developments_around_the_milkymist_system_on_chip-en\"> Latest developments around the Milkymist System-on-Chip - A roundup of one the most advanced open hardware projects</a></li>\r\n<ul>\r\n <li><a href=\"https://media.ccc.de/v/28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links\"> Implementation of MITM Attack on HDCP-Secured Links - A non-copyright circumventing application of the HDCP master key</a></li>\r\n <li><a href=\"https://media.ccc.de/v/33c3-8057-dissecting_hdmi\">Dissecting HDMI - Developing open, FPGA-based capture hardware for conference & user group recording</a></li>\r\n</ul>\r\n<h4>Presenters</h4>\r\n<ul>\r\n <li><a href=\"https://blog.mithis.net\">Tim 'mithro' Ansell</a> is the founder of <a href=\"http://code.timvideos.us\">TimVideos</a>. He is known for having to many projects including hardware like the <a href=\"https://hdmi2usb.tv\">HDMI2USB.tv</a>, <a href=\"https://tomu.im\">I'm Tomu</a> and many more!</li>\r\n <li><a href=\"https://www.bunniestudios.com/\">Andrew 'bunnie' Huang</a> is a hacker, activist and author who is known for many projects including hardware like the <a href=\u201dhttps://kosagi.com/w/index.php/NeTV_Main_Page\u201d>NeTV</a>, <a href=\u201dhttps://chibitronics.com\u201d>Chibitronics</a>, Novena, and Chumby. </li>\r\n</ul>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6660, 
                                        "public_name": "Tim 'mithro' Ansell"
                                    }, 
                                    {
                                        "id": 3155, 
                                        "public_name": "bunnie"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://hdmi2usb.tv", 
                                        "title": "HDMI2USB.tv"
                                    }, 
                                    {
                                        "url": "https://m-labs.hk/migen", 
                                        "title": "Migen (+Milkymist)"
                                    }, 
                                    {
                                        "url": "https://kosagi.com/w/index.php/NeTV_Main_Page", 
                                        "title": "NeTV"
                                    }, 
                                    {
                                        "url": "https://www.crowdsupply.com/alphamax/netv2", 
                                        "title": "NeTV2"
                                    }, 
                                    {
                                        "url": "http://www.enjoy-digital.fr/", 
                                        "title": "Enjoy Digital + LiteX"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9979.html", 
                                "id": 9979, 
                                "guid": "9f8b19eb-31cb-4250-80d4-5caf4e0b33dd", 
                                "logo": "/system/events/logos/000/009/979/large/gadget_500x500.png?1539718621", 
                                "date": "2018-12-28T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9979-the_layman_s_guide_to_zero-day_engineering", 
                                "title": "The Layman's Guide to Zero-Day Engineering", 
                                "subtitle": "A demystification of the exploit development lifecycle", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "There's a certain allure to zero-day exploits. At the apex of the security industry, these elusive technologies are engineered by a persistent few to open doors of software systems that were never meant to exist. We go behind-the-scenes to provide an inside look at the zero-day development lifecycle, breaking common misconceptions regarding this increasingly difficult tradecraft.", 
                                "description": "In this talk, we will discuss the engineering process behind a <a href=\u201dhttps://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/\u201d>zero-day</a> that was used to exploit Apple Safari at PWN2OWN 2018. Rather than placing an intense focus on the technical challenges required to weaponize this particular chain of vulnerabilities, we reflect on this experience as a case-study of the analytical approach we employ to attack unfamiliar software targets. In addition to these methods, we will contrast how this process differs from CTF/Wargame challenges, highlighting the path one can take to graduate from casual enthusiast to security professional.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8356, 
                                        "public_name": "Markus Gaasedelen"
                                    }, 
                                    {
                                        "id": 8682, 
                                        "public_name": "Amy (itszn)"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://ret2.io", 
                                        "title": "Ret2 Systems"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9617.html", 
                                "id": 9617, 
                                "guid": "2375222b-7dae-4bca-a5b0-aea227ab0d76", 
                                "logo": "/system/events/logos/000/009/617/large/l1.png?1539450734", 
                                "date": "2018-12-28T23:30:00+01:00", 
                                "start": "23:30", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9617-a_deep_dive_into_the_world_of_dos_viruses", 
                                "title": "A deep dive into the world of DOS viruses", 
                                "subtitle": "Explaining in detail just how those little COM files infected and played with us back in the day", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "It is now 27 years since MS-DOS 5.0 was released. During its day there was the threat of viruses breaking your system or making it act in unpredictable ways. Due to its age and near total lack of consumer use it is safe to assume that all of the viruses for MS-DOS have been written. Using community archives and modern analysis methods we can uncover how they worked and reflect on how things have changed.", 
                                "description": "Computers have come a long way in the last 27 years, and so has malware too. This talk will start off with some of the most famous and widely known payloads. A basic guide on how MS-DOS runs applications, and we will work up from there to analysing all 17k+ samples with that are in the archives using automatic tooling to pick out some of the most interesting ones.\r\n\r\nIf you don\u2019t have reverse engineering skills, don\u2019t be afraid! We will start off with the basics of how the IBM PC works, MS DOS execution, binary runtime, and how we automatically run/disassemble/trace/fuzz malware on mass.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7509, 
                                        "public_name": "Ben Cartwright-Cox"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9873.html", 
                                "id": 9873, 
                                "guid": "93c1500d-c639-4247-854e-6e51e167dbeb", 
                                "logo": "/system/events/logos/000/009/873/large/FairyBot_kl.jpg?1546016301", 
                                "date": "2018-12-29T00:30:00+01:00", 
                                "start": "00:30", 
                                "duration": "02:00", 
                                "room": "Borg", 
                                "slug": "35c3-9873-all_creatures_welcome", 
                                "title": "All Creatures Welcome", 
                                "subtitle": "a utopian documentary about the digital age", 
                                "track": "CCC", 
                                "type": "film", 
                                "language": "de", 
                                "abstract": "\"All Creatures Welcome sketches a utopian image of society in the digital era. Accompanied by the appeal to \u201cuse hacking as a mindset,\u201d the viewers immerse themselves, together with the filmmaker, in a documentary adventure game and explore the world of digital communities at the events held by the Chaos Computer Club; a real-world reflection of the virtual spectrum.\" \u2013 after the rough cut screening at the 34c3 we will show now the final version. \r\nJoin us and be part of the moment when we put the movie online and make it freely available under a creative commons license at the beginning of the screening!", 
                                "description": "Together with the filmmaker and the slogan\"use hacking as a mindset\" we immerse in a documentary adventure game and explore the world of Komputerfrieks, as they used to call themselves at the inaugural meeting of the Chaos Computer Club in 1981. We come upon an open, free-spirited society. The events of the CCC are a kind of utopian real-world reflection of the virtual spectrum. We encounter angels, activists, robots, coders and makers. We learn what a hack is, why lockpicking can be important, how a cellular system works. We dive into the game and become part of the community that is as inclusive as it is sophisticated. Still outside of this collective the challenges are immense in an era, in which political certainties and institutions increasingly erode. Models of governance, economics, social order, technology and science are being put into question 24/7. With the internet\u2019s rules of conduct, national laws are being repealed and transformed into global structures. While  the worldwide web would structurally actually allow a radical renewal of democracy, changing it from representation to participation, more and more states are drifting towards authoritarian societies in political reality. In the course of that process, en passant the largest surveillance machinery of human history has been created.\r\nWe see how the hacker culture meets these challenges and what inner contradictions it encounters. We learn that our lives are not determined by general, given truths but actually through the way we work, develop ourselves, suffer or dream. The events of the CCC become a possible blueprint of social upheaval. Self-organization, freedom of expression and critical discussion merge in a colorful, polyphonic chorus apart from social norms and capitalist constraints: \"Be excellent to each other!\u201c", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7785, 
                                        "public_name": "Sandra Trostel"
                                    }, 
                                    {
                                        "id": 8745, 
                                        "public_name": "Thies Mynther"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://www.allcreatureswelcome.net", 
                                        "title": "Movie Page"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/622/original/ACW_Poster_KI_Regenbogen_digital.jpg?1542289809", 
                                        "title": "Poster"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }
                                ]
                            }
                        ], 
                        "Clarke": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9852.html", 
                                "id": 9852, 
                                "guid": "30278963-3b07-49a8-96a7-2b24a8cf573b", 
                                "logo": null, 
                                "date": "2018-12-28T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9852-exploring_fraud_in_telephony_networks", 
                                "title": "Exploring fraud in telephony networks", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Telephone networks form the oldest large scale network that has grown to\r\ntouch over 7 billion people. Telephony is now merging many complex\r\ntechnologies (PSTN, cellular and IP networks) and enabling numerous\r\nservices that can be easily  monetized. However, security challenges for\r\ntelephony are often neither well understood, nor well addressed. As a\r\nresult, telephone networks attract a lot of fraud. In this talk, we will\r\nsystematically explore the fraud in telephone networks, focusing on\r\nvoice telephony. We will present a taxonomy of fraud, and analyze two\r\nprevalent fraud schemes in more detail: looking into the ecosystem of\r\nInternational Revenue Share Fraud (IRSF), and discussing a new\r\ncountermeasure to the well-known problem of voice spam.", 
                                "description": "This talk aims to improve the understanding of the fraud ecosystem in\r\ntelephony networks. We first provide a clear taxonomy that\r\ndifferentiates between the root causes, the vulnerabilities, the\r\nexploitation techniques, the fraud types and finally the way fraud\r\nbenefits fraudsters.\r\n\r\nAs concrete examples, we first look into International Revenue Share\r\nFraud (IRSF), where phone calls to certain destinations are hijacked by fraudulent operators and diverted to the so-called \u2018international premium rate services\u2019. This fraud often involves multiple parties who collect and share the call revenue, and is usually combined with other\r\ntechniques (such as voice scam, mobile malware, PBX hacking) to generate call traffic without payment. We will further explore the IRSF ecosystem by analyzing more than 1 million `premium rate' phone numbers that we collected from several online service providers over the past 3 years.\r\n\r\nIn the second part, we will look into voice spam, a prevalent fraud in\r\nmany countries. After giving an overview of various types of unwanted phone calls, we will focus on a recent countermeasure which involves connecting the phone spammer with a phone bot (\u201crobocallee\u201d) that mimics a real persona. Lenny is such a bot (a computer program) which plays a set of pre-recorded voice messages to interact with the spammers. We try to understand the effectiveness of this chatbot, by analyzing the recorded conversations of Lenny with various types of spammers. As we consider the \u2018benefits\u2019 as a fundamental part of our fraud definition, we believe that chatbots can be combined with the existing fraud detection and prevention mechanisms, as a supplementary way of slowing down voice spam campaigns.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7804, 
                                        "public_name": "Merve Sahin"
                                    }, 
                                    {
                                        "id": 8646, 
                                        "public_name": "Aur\u00e9lien Francillon"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://www.s3.eurecom.fr/docs/eurosp17_sahin.pdf", 
                                        "title": "SoK: Fraud in Telephony Networks"
                                    }, 
                                    {
                                        "url": "http://www.s3.eurecom.fr/docs/soups17_sahin.pdf", 
                                        "title": "Using chatbots against voice spam: Analyzing Lenny\u2019s effectiveness"
                                    }, 
                                    {
                                        "url": "https://www.ieee-security.org/TC/SP2018/poster-abstracts/oakland2018-paper31-poster-abstract.pdf", 
                                        "title": "IRSF"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9631.html", 
                                "id": 9631, 
                                "guid": "14281f92-873c-478c-a962-f1eb8b6c15d9", 
                                "logo": null, 
                                "date": "2018-12-28T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9631-symbiflow_-_finally_the_gcc_of_fpgas", 
                                "title": "SymbiFlow - Finally the GCC of FPGAs!", 
                                "subtitle": "A fully FOSS, Verilog to bitstream, timing driven, cross FPGA, usable toolchain.", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The <a href=\"http://symbiflow.github.io\">SymbiFlow project</a> aims to be the \"GCC of FPGAs\" - a fully open source toolchain supporting, multiple FPGAs from different vendors. Allowing compilation from Verilog to bitstream without touching vendor provided tools, it includes support for large modern FPGAs like the Lattice ECP5 and Xilinx 7 series. These FPGAs can be used for things previously out of reach of FOSS tools, things like high resolution video and many gigabit networking. We have also documented the FPGA bitstreams to allow other new tools and a process for replicating this effort on new types of FPGAs!", 
                                "description": "<p>\r\nThe <a href=\"http://symbiflow.github.io\">SymbiFlow project</a> aims to be the \"GCC of FPGAs\" - a fully open source toolchain supporting multiple FPGAs from multiple different vendors. FPGAs have been around since 1980s but most have previously require getting giant closed source proprietary black boxes from the FPGA vendor (10 gigabytes or more!). Thanks to SymbiFlow this is no longer the case! \r\n</p><p>\r\nLike the previous IceStorm efforts, SymbiFlow includes <b>both</b> documentation of FPGA bitstreams and a <b>working</b>toolchain for compiling Verilog into these bitstreams. Unlike previous efforts, this new toolchain supports industry standard timing driven place, and route and significantly larger designs. This makes SymbiFlow a <b>big</b> change over the previous Project IceStorm effort and enables support for large, modern FPGAs that can be used for things like high resolution video and many gigabit networking.\r\n</p><p>\r\nThis presentation will give you an update on the current status of the project. What currently works, the future roadmap and how you can help with the project and how to expand the number of supported FPGAs even further.\r\n</p><p>\r\nCurrently SymbiFlow is supporting the Lattice iCE40 plus two modern, capable and popular FPGAs architectures - the Lattice ECP5 and Xilinx 7 Series. The project has also gone to an effort to provide a well documented process for understanding FPGA bitstreams. This provides a clear pathway for new contributors to extend the tooling to support even more FPGAs!\r\n</p><p>\r\nCome find out about how a small group are changing the world of FPGA development!\r\n</p>\r\n\r\n<h3>About FPGAs</h3>\r\n<p>\r\nDue to their reconfigurable nature, FPGAs make hardware problems into software problems and enable anyone to building custom integrated circuits. This means you could create <b>your</b> ideal microcontroller, not what some manufacturer <b>thinks</b> you want. You can have the <b>exact</b> right set of peripherals including as many SPI, I2C or CAN as you want!\r\n</p><p>\r\nPreviously developing for FPGAs has require getting giant closed source proprietary black boxes from the FPGA vendor (10 gigabytes or more!). This has strongly hampered their adoption and reduced them to niche use cases. However, with the ending of Moore's law and things like <a href=\"https://riscv.org/\">RISC-V</a>, FPGAs have a strong role to play in enabling open source communities to participate in the explosion of new hardware design. They also enable us to apply the high speed of innovation and security we expect from an open source software.\r\n</p>\r\n\r\n<h3>Presenters</h3>\r\n<p>\r\n<a href=\"https://blog.mithis.net\">Tim 'mithro' Ansell</a> is the founder of <a href=\"http://code.timvideos.us\">TimVideos</a>.He is known for having to many projects including hardware like the <a href=\"https://hdmi2usb.tv\">HDMI2USB.tv</a>, <a href=\"https://tomu.im\">I'm Tomu</a> and many more! Through this frustration with FPGA toolchains while developing these projects he ended up being heavily involved with the development of the <a href=\"http://symbiflow.github.io\">SymbiFlow</a> project.\r\n</p>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6660, 
                                        "public_name": "Tim 'mithro' Ansell"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://symbiflow.github.io", 
                                        "title": "SymbiFlow Website"
                                    }, 
                                    {
                                        "url": "http://github.com/SymbiFlow", 
                                        "title": "SymbiFlow GitHub"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9612.html", 
                                "id": 9612, 
                                "guid": "a24c67d2-9cad-41a5-ada4-eff706d29920", 
                                "logo": null, 
                                "date": "2018-12-28T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9612-the_nextpnr_foss_fpga_place-and-route_tool", 
                                "title": "The nextpnr FOSS FPGA place-and-route tool", 
                                "subtitle": "the next step forward in open source FPGA tools", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Project IceStorm provides the first end-to-end open source FPGA toolchain, was originally presented at 32c3, and only targetted Lattice iCE40 FPGAs. nextpnr is the next big step for open source FPGA tools, providing a retargetable open source FPGA place-and-route tool that will enable open source flows for many different FPGAs from many different vendors.", 
                                "description": "nextpnr is a retargetable FOSS FPGA place-and-route tool that is replacing arachne-pnr as place-and-route tool in the IceStorm open source iCE40 flow. (I have originally presented IceStorm and arachne-pnr at 32c3.)\r\n\r\nnextpnr is retargetable, meaning it can be ported to other FPGA architectures easily, uses timing-driven algorithms, provides a python scripting API, supports complex placement and floorplanning constraints, and has a nice GUI. Python and GUI support are optional, which may be useful when deploying nextpnr on an embedded platform. In short: It is a big step forward for open source FPGA tools, attempting to close the gap to vendor tools in some aspects, and even setting new standards in other aspects.\r\n\r\nAs of now, iCE40 FPGAs (Project IceStorm) and ECP5 FPGAs (Project Trellis) are supported in nextpnr, but support for more architectures is expected to follow in short order.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5860, 
                                        "public_name": "Clifford Wolf"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9775.html", 
                                "id": 9775, 
                                "guid": "eb71c620-6102-4b08-8ac4-5f71b772a831", 
                                "logo": null, 
                                "date": "2018-12-28T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9775-how_medicine_discovered_sex", 
                                "title": "How medicine discovered sex", 
                                "subtitle": "Introduction to sex- and gender-sensitive medicine", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Men with osteoporosis or depression, women with heart attacks - these are examples of diseases where medicine still shows a gender bias. Assuming that men and women have the same bodies, except when it comes to the reproductive organs still causes maltreatment up to death. In the past few years sex- and gender-sensitive medicine has discovered that the assumption of the same body has lead to the unnecessary death of patients and needs to be challenged.\r\nThis is a brief introduction into the paradigm shifting realm of sex- and gender-sensitive medicine showing how and where the sexes differ, that there are actually more than two sexes and that your gender also plays a role in how you are being treated by medical professionals.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4092, 
                                        "public_name": "Sarah Hiltner"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/675/original/35c3-4-komprimiert.pdf?1545999934", 
                                        "title": "35c3-4-komprimiert.pdf"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9998.html", 
                                "id": 9998, 
                                "guid": "622c9585-e332-4915-a9ac-987a34da4d14", 
                                "logo": null, 
                                "date": "2018-12-28T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9998-the_good_the_strange_and_the_ugly_in_2018_art_tech", 
                                "title": "The good, the strange and the ugly in 2018 art &tech ", 
                                "subtitle": "On art, AI, hormones hacking and other prospects of a post-human world", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "What's been good, exciting, spooky and challenging in art and science/technology over this past year. With a short incursion into the ugly because even artists have the right to be awful.\r\n", 
                                "description": "Global warming, the threat of another economic crisis, the rise of far right discourses across Europe or the mass extinction of natural species, it might seem futile to invest time and attention to contemporary art. And yet, with their inquisitive mind, their skills in (ab)using new media and their provocative attitude, artists and critical designers can play a valuable role in creating richer narratives around issues that tend to polarize and/or dismay.  \r\n\r\nThe talk will look at the good, the strange and the exciting in art and science/technology over this past year. With a short incursion into the ugly because even artists have the right to be awful.\r\n\r\nSome of the topics explored might include the environmental and human cost of AI, hormones hacking, 'racism' behind innocent looking devices and other prospects of a post-human world.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8727, 
                                        "public_name": "R\u00e9gine Debatty"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9797.html", 
                                "id": 9797, 
                                "guid": "a9504e38-7f8e-4e2d-bf50-6cd69dbb60f9", 
                                "logo": null, 
                                "date": "2018-12-28T18:50:00+01:00", 
                                "start": "18:50", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9797-analyze_the_facebook_algorithm_and_reclaim_data_sovereignty", 
                                "title": "Analyze the Facebook algorithm and reclaim data sovereignty ", 
                                "subtitle": "Algorithms define your priorities. Who else besides you can know what you need?", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Facebook monopoly is an issue, but looking for replacements it is not enough. We want to develop critical judgment on algorithms, on why data politics matter and educate, raise awareness for a broad audience.  With <a href=\"https://facebook.tracking.exposed\">our tool</a>, we enable an individual to collect evidence and see how Facebook's algorithm truly shares their data. Not data about themselves, but the bias of facebook treats data, re-shares certain content over other content. Collectively we can analyze the algorithm, understand Facebooks agendas and show how little agency users have.", 
                                "description": "As algorithms define what our priorities are, they should be recognized as an extension of our will. We must be able to consciously build our own algorithms, change them whenever we want, and not have to delegate this decision to a commercial entity, with opaque functioning and objectives.\r\n\r\nThis is the goal of <a href=\"https://tracking.exposed\">tracking.exposed</a>, a goal that can only be achieved through education. We recognize that not everyone possesses the knowledge and skills to design their own algorithms, and therefore there is the need to create a support community, where algorithms can be shared, compared, improved and criticized. The algorithm is power; it can be a harmful cage or a helpful filter. Only autonomous and informed individuals can decide what is most appropriate for them at a given time.\r\n\r\nWe also worked on <a href=\"https://youtube.tracking.exposed\">analyzing YouTube algorithm</a>! And others platform should follow; the collaborative observation approach is replicable in every platform which personalizes the results. This talk wants to be accessible for ordinary social media users. We understand that many have to be on these platforms, but at least, we can try to use them without getting used!", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4912, 
                                        "public_name": "Claudio Agosti"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://facebook.tracking.exposed", 
                                        "title": "website"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9893.html", 
                                "id": 9893, 
                                "guid": "feb18113-3325-4053-93a0-76d4980b137c", 
                                "logo": "/system/events/logos/000/009/893/large/spectre.png?1539637629", 
                                "date": "2018-12-28T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9893-a_christmas_carol_-_the_spectres_of_the_past_present_and_future", 
                                "title": "A Christmas Carol - The Spectres of the Past, Present, and Future", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "With the beginning of last year, two major security vulnerabilities have been disclosed: Meltdown and Spectre. While mitigations in software and hardware have been rolled out right away, new variants have been continuously released in the following months. With all those confusing names, how can you possibly still have a clear overview of all those vulnerabilities (SpectreV1, SpectreV2, Meltdown, Spectre-NG, SpectreRSB, L1TF, Foreshadow, ...)? With this talk, we present a novel classification that will ease the naming complexity of the current jungle of variants. Along with all different attacks, we will give an overview of all proposed mitigations and show how an attacker still can mount an attack despite the presence of implemented countermeasures. Furthermore, we will present new variants of the Meltdown attack, exploiting different parts of the CPU.", 
                                "description": "Only a few days after the Chaos Communication Congress closed its doors last year, two major security vulnerabilities have been disclosed to the public.\r\nMeltdown and Spectre exploit critical vulnerabilities in modern processors, allowing attackers to read arbitrary data currently processed on the computer without any permissions or privileges.\r\nWhile mitigations in software and hardware have been proposed and rolled out right away, new variants of Spectre and Meltdown attacks have been published frequently in the following months.\r\n\r\nSpectre v1? Spectre v2? Meltdown? Spectre-NG? SpectreRSB? L1TF? Foreshadow? - With all those names and variants, how can you possibly have still a clear overview of those vulnerabilities?\r\nWith all those operating systems, compiler, and microcode updates, is my system really protected?\r\n\r\nIn our talk, we present a novel classification of Spectre and Meltdown attacks and propose a new naming scheme to ease the naming complexity of the current jungle of variants.\r\nFurthermore, we give an overview of all proposed mitigations and show that an attacker can still mount an attack despite the presence of implemented countermeasures.\r\nFinally, we show new variants of the Meltdown attack, exploiting different parts of the CPU.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6937, 
                                        "public_name": "Moritz Lipp"
                                    }, 
                                    {
                                        "id": 8665, 
                                        "public_name": "Michael Schwarz"
                                    }, 
                                    {
                                        "id": 6293, 
                                        "public_name": "Daniel Gruss"
                                    }, 
                                    {
                                        "id": 8700, 
                                        "public_name": "Claudio Canella"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9703.html", 
                                "id": 9703, 
                                "guid": "f76415ac-d07b-4c5a-bedf-460470711712", 
                                "logo": null, 
                                "date": "2018-12-28T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9703-supermuc-ng", 
                                "title": "SuperMUC-NG", 
                                "subtitle": "\u2026 und das Rennen um den schnellsten Computer der Welt", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Der nationale H\u00f6chstleistungsrechner SuperMUC-NG unterst\u00fctzt die \u00f6ffentliche Wissenschaft in Deutschland. Wie ist er aufgebaut, was kann man damit tun, und wo steht er im Vergleich mit den schnellsten Supercomputern der Welt?", 
                                "description": "Im September 2018 wurde nach einem Jahr f\u00fcr die \u00f6ffentliche Ausschreibung und Beschaffung sowie einem halben Jahr Bauzeit die Inbetriebnahme des bayerischen H\u00f6chstleistungsrechners SuperMUC-NG gestartet. Der Rechner am Leibniz-Rechenzentrum (LRZ) in Garching wird derzeit diversen Tests unterzogen und soll Anfang 2019 f\u00fcr die Wissenschaft in Deutschland zur Verf\u00fcgung stehen. In diesem Vortrag soll die Architektur von SuperMUC-NG vorgestellt und auf seine Besonderheiten eingegangen werden. Dazu z\u00e4hlt u. a. der Einsatz von herk\u00f6mmlichen Skylake-Prozessoren und der Verzicht auf Beschleuniger (GPGPUs), aber auch die spezielle Hei\u00dfwasserk\u00fchlung in Kombination mit Adsorptionsk\u00e4ltemaschinen. Anhand ausgew\u00e4hlter Anwendungsbeispiele aus der Astrophysik, den Erdwissenschaften, der Genomanalyse und der personalisierten Medizin wird gezeigt, wof\u00fcr diese Rechner gebaut werden. Nat\u00fcrlich ist SuperMUC-NG nicht der einzige derartige Rechner auf der Welt und mit der Top 500 Liste der Supercomputer gibt es zwei Mal j\u00e4hrlich ein \"Rennen\" um den schnellsten Computer der Welt. Wo steht Deutschlands derzeit schnellster akademischer Rechner im internationalen Vergleich, und warum ist dieser Vergleich genauso unwichtig wie ein Formel-1 Rennen f\u00fcr die Automobilbranche? ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8528, 
                                        "public_name": "Dieter Kranzlmueller"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://badw.de/die-akademie/presse/pressemitteilungen/pm-einzelartikel/detail/supermuc-ng-next-generation-hoechstleistungsrechner-am-leibniz-rechenzentrum.html", 
                                        "title": "Pressemitteilung zu SuperMUC-NG"
                                    }, 
                                    {
                                        "url": "https://www.lrz.de/services/compute/supermuc/supermuc-ng/", 
                                        "title": "Characteristics SuperMUC-NG"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/681/original/20181228_Leipzig_-_35C3_-_SuperMUC-NG_%E2%80%A6_und_das_Rennen_um_den_schnellsten_Computer_der_Welt.pdf?1546023818", 
                                        "title": "Slides:SuperMUC-NG"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9965.html", 
                                "id": 9965, 
                                "guid": "3e75c48f-3a58-4afe-bafb-0670dd2b15cc", 
                                "logo": "/system/events/logos/000/009/965/large/g62.png?1546009994", 
                                "date": "2018-12-28T23:30:00+01:00", 
                                "start": "23:30", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9965-what_is_good_technology", 
                                "title": "What is Good Technology?", 
                                "subtitle": "Answers & practical guidelines for engineers.", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The last years, we all have felt the impact of applying technologies like machine learning, social networks and data-driven decision making on a massive scale to our societies. Yet all that technology has been developed by engineers like us. It's become clear that we have to do more than chase the ever evolving technological challenges and start to assume responsibility for our creations - or we too will wake up one day to the realization that technology we helped develop has done more harm than good. \r\nWe want to present practical, every day guidelines and principles that can help engineers and organizations to build technology that not only serves the application and business purpose, but also minimizes negative long-term effects on society and the people that use it.", 
                                "description": "The Good Technology Collective was founded in December of 2017 in Berlin by a diverse group of experts from academia, government & the private sector with the goal to bring fresh wind into the discussions everybody seemed to have about the impact of modern technology in the wake of the full impact of fake news, algorithmic biases, filter bubbles & massive data breaches - without ever resulting in tangible action.\r\nThe GTC hosts and supports regular events to educate engineers, publishes articles to educate society through media partnerships, holds internal round tables and aims to work with policy makers long-term. As part of this years effort, we are releasing \"Ethical Engineering Guidelines\" that offer a practical way for engineers and organizations to responsibly develop new technology that takes ethics & societal impact more into account and can easily be applied to small and large projects alike. These guidelines have been developed throughout the year a parts of them presented at various events as they progressed, to collect feedback and further improve them.\r\nMembers of GTC range from (former) whistle blowers, activist MPs, Oxford professors in ethics, authors to entrepreneurs and technology makers in various areas. The GTC is fully independent and only accepts public donations that are not tied to a specific project.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8525, 
                                        "public_name": "Yann Leretaille"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://goodtechnologycollective.com", 
                                        "title": "Good Technology Collective Website"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/685/original/35C3-Dec_2018.pdf?1546070464", 
                                        "title": "Presentation Slides"
                                    }
                                ]
                            }
                        ], 
                        "Dijkstra": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9812.html", 
                                "id": 9812, 
                                "guid": "de977841-8510-4172-9622-dd0563c2cb82", 
                                "logo": null, 
                                "date": "2018-12-28T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9812-a_farewell_to_soul-crushing_code", 
                                "title": "A farewell to soul-crushing code", 
                                "subtitle": "Towards correct software that enriches our lives", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "A major part of software development is maintenance, i.e. tinkering with software that should already be completed but still somehow does not work as it should. Software developed by tinkering is the antithesis to resilient technology, and a growing threat to our profession and our lives. Working on this kind of software crushes the soul. Yet this is exactly how most IoT devices (and computers in general) are programmed these days. We need to replace the dead technology-oriented objects of the past with supple models enriching our domains and our souls. This talk shows how it is done.\r\n", 
                                "description": "So how do we gain autonomy over the software of the future, which is currently spiralling out of control? Not with object-oriented programming, as it turns out: Mutable state, the absence of uniform abstraction mechanisms and the complexity introduced by inheritance make it hard for humans to develop correct and robust software. While \"agile\" has given developers autonomy over the soul-crushing processes of the past, the prevalent technology - object-orientation - is a fundamental part of the problem, not of the solution. It is time to say goodbye; we must start to teach the principles of systematic construction of correct software instead. At the core of this revolution is the consistent application of functional programming, i.e. of immutable data structures, systematic abstraction and data modelling. The talk illustrates the problems of the programming techniques of the past, and shows how to build robust models that lead to useful software. \r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7686, 
                                        "public_name": "Mike Sperber"
                                    }, 
                                    {
                                        "id": 8613, 
                                        "public_name": "Nicole Rauch"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/658/original/farewell.pdf?1545930771", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9660.html", 
                                "id": 9660, 
                                "guid": "9777cea0-ac06-4274-85db-908c1e87e2f4", 
                                "logo": null, 
                                "date": "2018-12-28T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9660-modern_windows_userspace_exploitation", 
                                "title": "Modern Windows Userspace Exploitation", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "In this talk we will go through the different mitigations in Windows 10 and see how they affect modern userspace exploitation. We will explain the primary ones and the different ways to bypass them. Finally, we will demo a cool exploit that achieves code execution.", 
                                "description": "In the past few years, many new mitigation techniques were introduced both into Windows kernel and userspace. These are supposed to make exploitation of certain vulnerabilities significantly harder, reduce exploit reliability, and require dependency on multiple primitives. It impacts many of the core components of the OS and build stack, including the loader, front-end allocator, compiler, and memory management. With such investment and impact, how effective are these really, from the exploit developer\u2019s perspective?\r\nIn this talk, we\u2019ll explain the primary mitigations in Windows that hinder modern memory corruption exploitation in userspace. Using examples of real-world vulnerabilities, we will see how to achieve arbitrary code execution on different Windows versions, comparing their impact on exploits. On our journey to code execution, we will learn the motivation behind these mitigations, understand their design, scope, and implementation, and study their weaknesses.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8499, 
                                        "public_name": "Saar Amar"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9414.html", 
                                "id": 9414, 
                                "guid": "ef9c53e5-b01b-431a-b141-9218f79b6c5a", 
                                "logo": null, 
                                "date": "2018-12-28T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9414-sense_without_sight_a_crash_course_on_blindnavigation", 
                                "title": "Sense without sight: a crash course on #BlindNavigation", 
                                "subtitle": "", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Learn to see the world without your eyes. Wonder what it's like to navigate while blind? Want to learn to use your everyday senses in ways you don't know you don't know? In this talk, I hack <em>you</em> with permanently enhanced sensory perceptions. \r\n\r\nThis is very participatory, not just \"sit and listen\", and workshops are even more hands-on (blindfolded w/ cane in hand).\r\n\r\nWorkshop & volunteer signup: <a href=\"https://s.ai/ccc/ws\">https://s.ai/ccc/ws</a>\r\nTag plz: #BlindNavigation @saizai #35c3", 
                                "description": "<h2>Talk</h2>\r\n<p><b>This talk is <i>not</i> the same on video as in person. Come in person if you can.</b></p>\r\n<p>A few things I'll cover require a cane, but the vast majority are sensory input that you already have, and you simply don\u2019t realize or pay attention to.</p>\r\n<p>This will also (briefly) cover how and how not to interact with a blind person on the street, cognitive shifts from perceiving the world as a blind person, real vs myth difficulties, etc.</p>\r\n<p>This talk is specifically focused on navigation and sensory experience. It won't cover Braille, computers, general life skills, medical/legal issues, or the like.</p>\r\n<p>After you attend, I'd greatly appreciate your feedback: <a href=\"https://s.ai/ccc/fb\">https://s.ai/ccc/fb</a>. If you post about it, I'd appreciate if you use gender neutral pronouns for me, and tag me (saizai) or send me a link.</p>\r\n<h3>Participation</h3>\r\n<p>The talk is applied and participatory, not just abstract. I want you to actually experience what I discuss, so that you have a genuine qualitative sense of what it is like to navigate the world while blind.</p>\r\n<p>You will have a better experience if you are totally sober, don't have arms or head covered, & have used the toilet beforehand.\r\n<p>Some things you may be asked to do: <ul>\r\n<li>make a single synchronized clap, to generate a sonic ping of the room</li>\r\n<li>listen carefully to the timing differences of echos</li>\r\n<li>stand up / sit down</li>\r\n<li>feel air currents</li>\r\n<li>put the back of your hand near the face of the person sitting next to you (& vice versa), feeling for heat changes & air currents</li>\r\n<li>come up to the stage when asking questions, so that you can get on stage if that would be helpful for me to demonstrate an answer for you directly</li>\r\n</ul></p>\r\n<p>Participation in these is strictly optional. It's totally OK if you don't want to (e.g. comfort, disability, not wanting to be on camera, etc), and you don't need to justify it. I'll ask for indications of consent or opt-out. However, participating will very significantly improve your experience and how much you'll learn.</p>\r\n<h2>Workshops</h2>\r\n<p>The talk will try to cover as much as can be done without direct experience. However, there's a huge qualitative difference between simply hearing me talk about it and experiencing it for yourself. Therefore, I am also running hands-on, 1-hour workshops (approx. 2 per day, TBD).</p>\r\n<p>Workshop participants will be blindfolded, given a guide cane, and led through a crash course in how to use and perceive the cues that are discussed in the talk, and an additional Q&A / debriefing session afterwards. This starts from simply walking along a straight path, and quickly escalates to hearing corridors, feeling walls at a (short) distance, etc.</p>\r\n<p>Workshop observers are welcome. I also need several volunteers to make this happen, so if you can, please do.</p>\r\n<h3>Workshop & volunteer signup</h3>\r\n<p><a href=\"https://s.ai/ccc/ws\">https://s.ai/ccc/ws</a></p>\r\n<h2>Help wanted!</h2>\r\n<h3>People</h3>\r\n<p>I need volunteers:<ol>\r\n<li>on stage (general, e.g. as human obstacle, safety, slides-checker, demonstration partner, etc.)</li>\r\n<li>on stage (aikido uke)</li>\r\n<li>during talk, in audience (to walk and/or bike around the aisles to generate wind currents, hold an open cup of coffee / mate for smell, etc)</li>\r\n<li>workshop assistants (requires training, preferably before 35C3 day 0)</li>\r\n</ol></p>\r\n<p>If you can, please <a href=\"https://s.ai/ccc/ws\">volunteer</a>. I'll train you on what needs to be done.</p>\r\n<p>Please also <a href=\"https://s.ai/contact\">contact me</a> if you:<ul>\r\n<li>are blind / visually impaired and a cane or guide dog user going to 35C3; or</li>\r\n<li>would like to collaborate on blind navigation aids (e.g. cane-embedded compass).</li></ul></p>\r\n<h3>Stuff</h3>\r\n<p>If you have:<ul>\r\n<li>to give:\r\n<ul>\r\n<li>a working Northpaw anklet you can part with</li>\r\n<li>ability to make custom eyeglass frames with zero light leakage</li>\r\n</ul></li>\r\n<li>to borrow:<ul>\r\n<li>long white guide canes</li>\r\n<li>sections of tactile paving (bumps, grooves, etc used on the street for blind people)</li>\r\n<li>sections of any random paving, flooring, tiles, carpet, etc</li>\r\n<li>tatami (aikido floor safety style)</li>\r\n<li>tactile or audio street crossing indicators</li>\r\n<li>dry ice & a trough</li>\r\n<li>laser that can emit as a flat plane</li>\r\n<li>binaural audio recording equipment</li>\r\n<li>hands-free 360\u00b0 video recording equipment (& editing capability)</li>\r\n<li>\u2026 or anything similar</li>\r\n</ul></li>\r\n</ul>\r\n... please contact me: <a href=\"https://s.ai/contact\">https://s.ai/contact</a></p>\r\n<h3>Money</h3>\r\n<p>All workshops are free.</p>\r\n<p>Unfortunately, the equipment to run them is not (it costs a few hundred Euros), and I'm poor. If you can donate, it'd be appreciated: <a href=\"https://s.ai/donate\">https://s.ai/donate</a></p>\r\n<h2>About me</h2>\r\n<p>I do lots of things, e.g. conlanging (26C3), cognitive psychology (27C3), meditation (26C3 & 27C3), civil rights litigation, government transparency, meta-politics, meta-law research, etc. See my wesite. <a href=\"https://s.ai\">https://s.ai</a></p>\r\n<p>I'm part-time fully blind. See <a href=\"https://s.ai/essays/interaction\">https://s.ai/essays/interaction</a> for tips on how to interact with me & <a href=\"https://s.ai/essays/blindness\">https://s.ai/essays/blindness</a> for background info. In particular, please understand that blindness is not \"what I do\", and I'm going to hit my capacity for talking about it with the talk, Q&A, and workshops. I always welcome feedback, collaborations, fellow-travelers, and press. Other than that, if you see me around Congress, let's please talk about something other than my blindness.</p>\r\n<p><a href=\"https://s.ai/contact\">Contact info</a>:<ul>\r\n<li>Handle: saizai (Twitter/IRC/FB/G+/etc.)</li>\r\n<li>Email: ccc@s.ai</li>\r\n<li>DECT: 4724</li>\r\n<li>Signal/WhatsApp/Telegram +15103944724</li>\r\n</ul></p>\r\n<p>Gender neutral pronouns please.</p>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4696, 
                                        "public_name": "Sai"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://s.ai/ccc/ws", 
                                        "title": "Workshop signup"
                                    }, 
                                    {
                                        "url": "https://s.ai/ccc", 
                                        "title": "Notes & other links"
                                    }, 
                                    {
                                        "url": "https://s.ai/essays/interaction", 
                                        "title": "Interaction tips (from blind POV)"
                                    }, 
                                    {
                                        "url": "https://twitter.com/search?f=tweets&q=%23BlindNavigation", 
                                        "title": "Tweets about #BlindNavigation"
                                    }, 
                                    {
                                        "url": "https://s.ai/ccc/slides", 
                                        "title": "Slides PDF"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10039.html", 
                                "id": 10039, 
                                "guid": "663a4b68-bb0d-493d-826c-07c609883b86", 
                                "logo": null, 
                                "date": "2018-12-28T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-10039-theater_und_quantenzeitalter", 
                                "title": "Theater und Quantenzeitalter", 
                                "subtitle": "\u201eDie Parallelwelt\u201c- Das Schauspiel Dortmund und die Digitalit\u00e4t", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Seit 2010 ist die Sehnsucht des Schauspiel Dortmund, ein gegenw\u00e4rtiges und wagemutiges Schauspiel f\u00fcr ein Publikum des 21. Jahrhunderts zu schaffen, ein Volkstheater f\u00fcr die Digitale Moderne. Intendant Kay Voges, Videok\u00fcnstler Mario Simon und Engineer Lucas Ple\u00df berichten \u00fcber Dortmunder Theaterarbeiten zum Menschsein im Digitalen Zeitalter, speziell \u00fcber die St\u00fcckentwicklung \"Die Parallelwelt\", die im September 2018 am Berliner Ensemble und am Schauspiel Dortmund gleichzeitig Premiere hatte, sowie \u00fcber die \"Akademie f\u00fcr Digitalit\u00e4t und Theater\", die 2020 in Dortmund gegr\u00fcndet werden soll. ", 
                                "description": "Einen Theaterabend, der die R\u00e4nder des Erz\u00e4hlens auslotet und die Grenzen zwischen Theater, Film und Netz in Frage stellt: Im September 2018 hatte \u201eDie Parallelwelt\u201c simultan am Schauspiel Dortmund und am Berliner Ensemble Premiere. Regisseur Kay Voges, Videok\u00fcnstler Mario Simon und Software-Ingenieur Lucas Ple\u00df vom Schauspiel Dortmund berichten \u00fcber die Entwicklung eines Theaterabends, f\u00fcr den zwei B\u00fchnen und zwei Zuschauerr\u00e4ume in zwei St\u00e4dten in Echtzeit per Glasfaser verbunden sind. \u201eDie Parallelwelt\u201c spielt mit der Vervielf\u00e4ltigung von Identit\u00e4ten im Zusammenspiel mit dem Wandel von Bildern, die sich die menschliche Spezies zu dem Kosmos macht, dessen Teil sie ist \u2013 und mit Entgrenzung, Aufl\u00f6sungs-Alptraum und einer Neuzusammensetzung der Welt, wie wir sie kannten.\r\n\r\n\u201eDie Parallelwelt\u201c ist die neueste Produktion zum Thema Menschsein im Digitalen Zeitalter vom Dortmunder Team um Kay Voges, das seit 2010 inhaltlich und formal an den Grenzen von Theater und Installation, Performance, Coding, Game und neuer Medienkunst forscht. Die Sehnsucht von \u201eDeutschlands f\u00fchrendem Theaterlabor\u201c (DIE WELT): Ein gegenw\u00e4rtiges und wagemutiges Schauspiel f\u00fcr ein Publikum des 21. Jahrhunderts, ein Volkstheater f\u00fcr die Digitale Moderne. Diese Forschungsreise wird ab 2020 intensiviert werden, wenn in Dortmund die neue \u201eAkademie f\u00fcr Digitalit\u00e4t und Theater\u201c an den Start gehen soll.\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8813, 
                                        "public_name": "Kay Voges"
                                    }, 
                                    {
                                        "id": 8814, 
                                        "public_name": "Mario Simon"
                                    }, 
                                    {
                                        "id": 8793, 
                                        "public_name": "Lucas Ple\u00df"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.theaterdo.de/detail/event/die-parallelwelt/", 
                                        "title": "\"Parallelwelt\" in Dortmund"
                                    }, 
                                    {
                                        "url": "https://www.berliner-ensemble.de/inszenierung/die-parallelwelt", 
                                        "title": "Parallelwelt in Berlin"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9526.html", 
                                "id": 9526, 
                                "guid": "623e136b-1ac6-4ef3-8152-d55cfcc80268", 
                                "logo": "/system/events/logos/000/009/526/large/SOUNDCLOUD.jpg?1539001057", 
                                "date": "2018-12-28T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9526-never_forgetti", 
                                "title": "Never Forgetti", 
                                "subtitle": "a didactic live-gaming performance about dying women across video game history", 
                                "track": "Art & Culture", 
                                "type": "performance", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Never Forgetti <br>\r\nlecture performance, 2018 <br>\r\nmultiplatform game, <br>\r\n<a href=\"https://soundcloud.com/imdrivingfast/sets/never-forgetti-ost\"> soundtrack </a> & <a href=\"http://janberger.info/texts/nf_guide_web.pdf\"> strategy guide </a> <br> <br>\r\nNever Forgetti is a didactic live gaming lecture about the deaths of female video game characters and how their normative framing prevents them from developing agency to avert their fatal destiny. The performance investigates on power relationships between lecturer and audience to reflect on how models of subjugation are established in media and our current social realities. Taking on the persona of Jenny Vorfahrt, a mysterious character that exists both outside and inside the gaming realm, I provide attendees with showcase of gameplay and theoretical knowledge about life and death of popular heroines, as well as the symbolism of classical game design. In reality, however, Jenny is pursuing her own secretive agenda...", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8363, 
                                        "public_name": "JAN BERGER"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://www.janberger.info/nf.html", 
                                        "title": "website summary Never Forgetti"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10028.html", 
                                "id": 10028, 
                                "guid": "809b164e-a331-4005-a1d8-ebe55d61d64c", 
                                "logo": null, 
                                "date": "2018-12-28T18:30:00+01:00", 
                                "start": "18:30", 
                                "duration": "01:20", 
                                "room": "Dijkstra", 
                                "slug": "35c3-10028-feminist_perspectives", 
                                "title": " Feminist Perspectives", 
                                "subtitle": "Inclusive and Diverse Spaces and Communities", 
                                "track": "Ethics, Society & Politics", 
                                "type": "podium", 
                                "language": "en", 
                                "abstract": "A variety of initiatives aims at encouraging female engagement in the hacker and maker scene. We present there some promising approaches and key learnings in a joint panel discussion.", 
                                "description": "Hong Phuc grew up in a small town in the Mekong Delta, south of Vietnam, She could never imagine how her life went a completely different path than what she was told as a young girl.\r\n\r\nLe RESET is a French feminist hackerspace created in 2016 by a small group of queer & feminist hackers and hacktivists. The goal was to create a space at the intersection of communities that often remain apart.\r\n\r\nEm O'Sullivan is a former hackerspace and Maker Faire organiser. Currently, they are a PhD student researching ways to improve women and non-binary people's engagement with technology via makerspaces.\r\n\r\nReady to Code is a young project from Stuttgart that teaches girls and women how to code and stand up for themselves.\r\n\r\n\r\n\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 3874, 
                                        "public_name": "Geraldine de Bastion"
                                    }, 
                                    {
                                        "id": 8649, 
                                        "public_name": "Em O'Sullivan"
                                    }, 
                                    {
                                        "id": 8457, 
                                        "public_name": "Lena Mohr"
                                    }, 
                                    {
                                        "id": 2658, 
                                        "public_name": "Hong Phuc Dang"
                                    }, 
                                    {
                                        "id": 7813, 
                                        "public_name": "Le RESET, feminist hackerspace"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/672/original/35c3_Feminist_Perspectives_HongPhucDang.pdf?1545993234", 
                                        "title": "HongPhucDang"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/680/original/RTC_3C35.pdf?1546014737", 
                                        "title": "ReadyToCode-Lena"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9618.html", 
                                "id": 9618, 
                                "guid": "948fee49-de6f-42b1-82f8-045af2aa155e", 
                                "logo": null, 
                                "date": "2018-12-28T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9618-jailbreaking_ios", 
                                "title": "Jailbreaking iOS", 
                                "subtitle": "From past to present", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "This talk aims to give a general overview of iOS Jailbreaking by starting at what jailbreaking was back in the days and how it evolved up until today, while also taking a quick look at how it might evolve in future.\r\n \r\nTherefore the following topics are covered:\r\n- Jailbreaking goals (technical)\r\n- Types of jailbreak and it's origins (tethered, untethered, semi-tethered, semi-untethered)\r\n- Exploit mitigations (ASLR, iBoot-level AES, KPP, KTRR, PAC)\r\n- Kernel patches (h3lix)\r\n- Kppless jailbreaks\r\n\r\nThe goal is to give an insight into the jailbreak terminology, exploit mitigations and how these are dealt with in past and modern jailbreaks.", 
                                "description": "I will give an introduction in jailbreak terminology and walk through the jailbreak history, thus presenting how iOS devices have been hacked/jailbroken in the past while focusing on what mitigations Apple added over the years. \r\nTherefore i will discuss what effects these mitigations have on jailbreaking and how they were (and still are) dealt with.\r\n\r\nThis should be interesting for hackers new in the iOS game, as several technical aspects are covered, but also for people who jailbreak their devices and want to get a better understanding of what is happening under the hood of jailbreaks as well as what challenges hackers have to face and why things evoled the way they are right now.\r\n\r\nThis talk is structured somewhat similar to my previous talk 2 years ago \"iOS Downgrading - From past to present\".\r\nWatching my previous talk is not neccessary for understanding this one, but is suggested to get a better overall image of iOS hacking.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6749, 
                                        "public_name": "tihmstar"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9451.html", 
                                "id": 9451, 
                                "guid": "3d5774f7-7f42-40bb-a318-4a2c6357dd9b", 
                                "logo": "/system/events/logos/000/009/451/large/AWl49xgk_400x400.jpg?1537891971", 
                                "date": "2018-12-28T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9451-simulating_universes", 
                                "title": "Simulating Universes", 
                                "subtitle": "What Virtual Universes Can Tell Us About Our Own", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "In this talk I want to present the computational undertakings in the field of cosmological structure formation and galaxy formation. Here, sometimes gigantic simulations help us to unravel the processes that led to the Universe that we can see today. I will give a short overview of our current understanding of the evolution of the Universe, the history and techniques of the simulations and their current state and future.", 
                                "description": "Almost every field of human discovery has gained immensely from the invention of computers, astrophysics maybe more than most others. Experiments are not an option in astrophysics. We cannot form planets, stars, or galaxies in laboratories on earth, but only observe them in an uncontrolled fashion using telescopes. We therefore rely on mathematical models that predict observations which we can test in reality. As the range of analytically tractable problems is very limited we rely on computers to numerically help us to understand the cosmos.\r\n\r\nIn this talk I will concentrate on a specific branch of astrophysics and cosmology, the science of the evolution of the Universe as a whole: simulations of cosmological structure formation. These simulations follow dark matter in an expanding universe as it collapses under the influence of gravity into the structures which are the birthplaces of galaxies. We will see how these galaxies are glowing tracers on the highly complex, almost invisible structure of the cosmic web.\r\n\r\nThe largest of these simulations are immense computational undertakings and take tens of millions of core-hours to run on tens of thousand of cores while producing hundreds of tera- if not petabytes of output. Throughout their history they have pushed to the limits of technical feasibility and limits of computing power. They are so rich in information that teams of scientists can find new results in them years, sometimes even more than a decade, after they were run.\r\n\r\nAfter a quick overview of our current understanding of the development of the Universe I will give an introduction to simulations of the dynamics of dark matter with so-called N-body simulations and how these were developed in the 20th century. We will then explore how people follow the evolution of gas and galaxies in these simulations to fill the darkness with stars, supernovae, black holes and sometimes even light. Finally, I will show how these simulations are comparing against our observations and how they helped us to further our understanding of what the Universe is made of, before ending with a short outlook on how cosmological simulations might improve in the future to explain more phenomena and keep up with observations.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8101, 
                                        "public_name": "Philipp Busch"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9926.html", 
                                "id": 9926, 
                                "guid": "bc545b26-8319-43fb-abc2-f624ef414ee8", 
                                "logo": null, 
                                "date": "2018-12-28T23:30:00+01:00", 
                                "start": "23:30", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9926-the_year_in_post-quantum_crypto", 
                                "title": "The year in post-quantum crypto", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "  The world is finally catching on to the urgency\r\n  of deploying post-quantum cryptography:\r\n  cryptography designed to survive attacks by quantum computers.\r\n  NIST's post-quantum competition is in full swing,\r\n  and network protocols are exploring post-quantum extensions.\r\n  This talk will take the audience on a journey\r\n  through selected recent highlights\r\n  from the post-quantum world.", 
                                "description": "  Post-quantum cryptography has become one of the most active\r\n  areas in cryptography,\r\n  trying to address important questions from potential users.\r\n\r\n  Is post-quantum cryptography secure?\r\n  In the first ten months of this year\r\n  we have seen several serious breaks\r\n  of submissions to the NIST competition.\r\n  At this point, out of the original 69 submissions,\r\n  13 are broken and 8 are partially broken.\r\n  Are the remaining 48 submissions all secure?\r\n  Or is this competition a denial-of-service attack\r\n  against the cryptanalysis community?\r\n  NIST will select fewer candidates for the 2nd round,\r\n  but it is not clear whether there is an adequate basis\r\n  for judging security.\r\n\r\n  Does post-quantum cryptography provide\r\n  the functionality we expect from cryptography?\r\n  For example,\r\n  the original Diffie-Hellman system\r\n  provides not just encryption\r\n  but also more advanced features\r\n  such as non-interactive key exchange\r\n  (not provided by any NIST submissions)\r\n  and blinding.\r\n  The era of post-NIST post-quantum cryptography has begun\r\n  with the exciting new CSIDH proposal,\r\n  which has non-interactive key exchange\r\n  and is smaller than any NIST submission,\r\n  but uses more CPU time and needs much more study.\r\n\r\n  Is post-quantum cryptography small enough?\r\n  Even for network protocols that rely purely on encryption,\r\n  integration remains a major problem\r\n  because of the bandwidth requirements of most post-quantum systems,\r\n  especially the post-quantum systems\r\n  with the strongest security track records.\r\n  Experiments with integration of post-quantum cryptography into TLS\r\n  have focused on encryption without post-quantum authentication.\r\n  A new generation of network protocols\r\n  has been designed from the ground up for full post-quantum security.\r\n\r\n  Is post-quantum cryptographic software fast enough,\r\n  and is it safe to use?\r\n  Adding post-quantum cryptography\r\n  to the cryptographic software ecosystem\r\n  has produced a giant step backwards in software quality.\r\n  Major areas of current activity include\r\n  software speedups,\r\n  benchmarking,\r\n  bug fixes,\r\n  formal verification,\r\n  patent avoidance, and\r\n  development of post-quantum software libraries\r\n  such as Open Quantum Safe and libpqcrypto.\r\n\r\n  The talk will be given as a joint presentation\r\n  by Daniel J. Bernstein and Tanja Lange.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 3538, 
                                        "public_name": "djb"
                                    }, 
                                    {
                                        "id": 3714, 
                                        "public_name": "Tanja Lange"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/695/original/slides.pdf?1546088180", 
                                        "title": "Slides for presentation"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }
                                ]
                            }
                        ], 
                        "Eliza": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10026.html", 
                                "id": 10026, 
                                "guid": "a13bb3ac-fde1-4b82-833e-1fcf1f8f25dd", 
                                "logo": null, 
                                "date": "2018-12-28T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-10026-c2x_the_television_will_not_be_revolutionized", 
                                "title": " C2X: The television will not be revolutionized.", 
                                "subtitle": "From Cyberfeminism to XenoFeminism", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "From Cyberfeminism to XenoFeminism - a short history of radical appropriations of media. This discussion will question how media is made (for whom and for what) and how meaning is produced through different contexts. it will feature media hacks and productions spanning a century and three continents.", 
                                "description": "Sci-Hub, film excerpts, Red Planet and more will be referenced. It will also address how and where media matter, comparing different technologies, commenting on CCC projects and what is more/less relevant in different African and European contexts. We will also explore how media and technical developments are informed by their social, economic and political environments.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8778, 
                                        "public_name": "Rama Thiaw"
                                    }, 
                                    {
                                        "id": 8739, 
                                        "public_name": "dia"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9762.html", 
                                "id": 9762, 
                                "guid": "8cbe8908-4040-402f-93b5-5a4a64cf6f09", 
                                "logo": null, 
                                "date": "2018-12-28T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9762-the_urban_organism", 
                                "title": "The Urban Organism", 
                                "subtitle": "Hacking [in] Hong Kong", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "This talk will engage the practises and protocols of hacking in the context of Hong Kong, drawing parallels from the stigmergic responses of the city (consensus network organisation) and the peer-production (or attempt) of the hackerspace, Dim Sum Labs.\r\n\r\nPerspectives on this will also draw from the publication, The Field Guide to Hacking (_TFGTH), a collection of (project and essay) snapshots generated from the hackerspace and its surrounding community.", 
                                "description": "Part I: Culture + Society: Idiosyncrasies of the Metropolis\r\nI.i Political and economic structures from outside (the space) to the inside (the space).\r\nI.ii Cultural identities from the outside to the inside \r\nI.iii The resulting pastiche\r\n\r\nPart II: Dim Sum Labs and _TFGTH: Hong Kong's First and Only Hackerspace\r\nII.i Brief introduction to our space and activities \r\nII.ii Introduction of the book (_TFGTH)\r\nII.iii A few excerpts within \r\nII.iv Demonstration of the interactive cover of the book\r\n\r\nPart III: Peer Production: Collaborative Scenarios\r\nIII.i Meritocracy vs Democracy\r\nIII.ii How this applies in the space/\r\nIII.iii How this applied to the project (_TFGTH)\r\nIII.iv How this applies to the city\r\nIII.v Parallels between hacking and urbanism", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8253, 
                                        "public_name": "mp_ttaa"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10022.html", 
                                "id": 10022, 
                                "guid": "61176a8b-996d-42f4-b0b9-559902a59d52", 
                                "logo": null, 
                                "date": "2018-12-28T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-10022-reality_check_basel_lagos_in_virtual_reality", 
                                "title": "Reality Check! Basel/Lagos?? In virtual reality?", 
                                "subtitle": "An African tale of art, culture and technology", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "This talk will share the experience of a leading African extended reality lab - Imisi 3D. It will highlight this African journey to adopt augmented and virtual reality, the challenges and lessons learned and will then focus on some of the arts and culture use cases that have emerged so far. In particular we will explore the collaboration with the IAF Basel festival (organisers of the Contemporary Africa Photography prize) that resulted in Reality Check, a simultaneous virtual reality tour of Lagos and Basel.\r\n", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8735, 
                                        "public_name": "Judith Okonkwo"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9595.html", 
                                "id": 9595, 
                                "guid": "3ff227f1-93cc-4a1d-8f0e-68fc12aea2c9", 
                                "logo": "/system/events/logos/000/009/595/large/wind_v3-1.jpg?1539610776", 
                                "date": "2018-12-28T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9595-wind_off-grid_services_for_everyday_people", 
                                "title": "Wind: Off-Grid Services for Everyday People", 
                                "subtitle": "Integrating nearby and offline connectivity with the Internet", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The internet has become essential services, and offline methods of sharing data are rapidly disappearing.  Other possible networks are often better suited when connectivity is not available or affordable.  Radios, sensors, and computing are available in the cheapest of smartphones and routers.  Wind is integrating nearby/offline data exchange with the internet services that we all rely on.\r\n", 
                                "description": "We rely on the internet for so many things, from personal relationships to essential services.  As the internet has gotten stronger, the asynchronous and offline methods of sharing data are rapidly disappearing.  There has not been enough investment in the many other possible nets, even though they are often better suited for situations where connectivity is not available or affordable. The potential in radios, sensors and processing available in the cheapest of smartphones and routers are not fully utilized or realized.\r\n\r\nWind is a network designed for opportunistic communication and sharing of local knowledge. It is built on impermanence, movement, and spontaneity.  Wind is a direct counterpoint to the metaphor of the Web, a system built upon the concept of fixed physical nodes, centralized authorities and permanent links. It is rooted in the mindsets and needs of people and communities who face challenges communicating. Wind is shaped by the movements and density of people in time and space.\r\n\r\nThe Wind project began with giving F-Droid the ability to \"swap apps\" using only Bluetooth and local Wi-Fi connections.  We have enabled users with limited connectivity to gather and share media to archive.org via OpenArchive.  Added \"nearby\" data exchange to share sensitive or blocked news via Proofmode and Courier.  LibraryBoxen are integrated in as relay or source of data. \r\n\r\nGuardian Project always works in partnership with the people and organizations whose needs we are aiming to address.  Real world solutions do not exist in a bubble, so we always integrate with established free software projects, as well as develop design guidelines and document key concepts to spread all aspects of this research.  This work was undertaken in partnership with Tibetans facing internet shutdowns, Cubans working with their own separate networks, Latin Americans facing expensive data plans, and people all over the world who experience outages and unreliable connectivity.\r\n\r\nFor Wind, our development approach is to incrementally improve upon existing efforts, while also focusing on developing the new integration glue necessary to provide a smooth, usable and practical to deploy experience. We are not inventing a new stack or protocol from scratch, or envisioning a utopian silo in which our systems solves all of the potential problems end-to-end. The issue that we see is that there are many potential components, protocols or software libraries that exist today, but that they have not been unified into a cohesive, usable experience that promotes easy deployment, bootstrapping and adoption.\r\n\r\nThis work just won fourth prize in the Mozilla \"Wireless Innovation for a Networked Society\" Off-the-Grid Internet Challenge, providing us funding to take the next step in the development.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5330, 
                                        "public_name": "Hans-Christoph Steiner"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://guardianproject.info/wind/", 
                                        "title": "Guardian Project's Wind page"
                                    }, 
                                    {
                                        "url": "https://wirelesschallenge.mozilla.org/#grand-winners-1", 
                                        "title": "Mozilla \"Wireless Innovation for a Networked Society\" Off-the-Grid Internet Challenge"
                                    }, 
                                    {
                                        "url": "https://okthanks.com/blog/peronas-latin-america", 
                                        "title": "Latin American Personas for guiding design processes"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9915.html", 
                                "id": 9915, 
                                "guid": "765cb049-78f4-4997-8cc6-238283e241a8", 
                                "logo": null, 
                                "date": "2018-12-28T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9915-projekt_hannah", 
                                "title": "Projekt Hannah", 
                                "subtitle": "Ein open-source Hardware- und Software-Design f\u00fcr vierbeinige Laufroboter", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Um das Entwickeln von eigenen Laufrobotern zu erleichtern, brauchen wir offene Alternativen zu bestehenden Plattformen. Am Beispiel unseres Projektes \"Hannah\" stellen wir euch M\u00f6glichkeiten vor, wie Open Source in Robotik-Hardware praktisch eingesetzt werden kann.", 
                                "description": "Wir bauen einen vierbeinigen Laufroboter, der vollst\u00e4ndig open-source in Hard- und Software ist, denn Roboter werden f\u00fcr uns alle sicherer und n\u00fctzlicher sein, wenn wir ihre Funktionalit\u00e4t vollst\u00e4ndig verstehen und ihrer Hardware vertrauen k\u00f6nnen. Au\u00dferdem sind wir \u00fcberzeugt, dass zuk\u00fcnftige Robotik/KI-Systeme f\u00fcr die Menschheit allgemein f\u00f6rderlich sein werden, wenn die zugrundeliegende Technologie unabh\u00e4ngig von privaten Interessen und in den H\u00e4nden von Wissenschaftlern, Ingenieuren und Hackern weltweit ist.\r\n\r\nBei der Entwicklung von Laufrobotern ist die notwendige Hardware oft nicht erschwinglich, oder die Quellen f\u00fcr die Hardware-Designs oder die Software schwer zug\u00e4nglich. Einen Laufroboter von Grund auf zu entwickeln kann leicht mehrere Jahre dauern, was f\u00fcr Forscher und Hobbyisten viel Aufwand bedeutet und f\u00fcr Startups ein hohes Risiko darstellt.\r\n\r\nWir entwickeln ein v\u00f6llig freies quelloffenes Hardware- und Software-Design f\u00fcr einen Laufroboter, welches von allen verwendet, studiert, modifiziert und verteilt werden kann, und wollen damit einen Beitrag zur Demokratisierung des Bereichs der Laufroboter leisten. Das mechanische Design besteht aus 3D-gedruckten oder Laser-geschnitten Teilen, welche anderweitig zu teuer w\u00e4ren, bzw. aus Standardteilen, welche vielerorts g\u00fcnstig erworben werden k\u00f6nnen. Der Roboter kann somit leicht im lokalen Hackspace oder zu Hause nachgebaut werden. Das Motorsteuerungssystem ist eine ebenfalls quelloffene Elektronik- und Firmware-Eigenentwicklung zur einfachen Regelung von DC-Motoren inklusive eines flexiblen Bussystems zur Echtzeitkommunikation. Die Software umfasst die Low-Level Motorregelung und die Algorithmen zur Bewegungssteuerung f\u00fcr verschiedene Gangarten und Richtungen, welche durch Mikroprozessor-freundliche neuronale Regler erzeugt werden.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8657, 
                                        "public_name": "Matthias Kubisch"
                                    }, 
                                    {
                                        "id": 6677, 
                                        "public_name": "Felix Just"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://suprememachines.de/", 
                                        "title": "Supreme Machines Website"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/586/original/hannah_push_recovery.mp4?1539639211", 
                                        "title": "Kurzes Video vom Roboter"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/587/original/IMG_20180525_155412.jpg?1539639211", 
                                        "title": "Foto vom Roboter"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/588/original/IMG_20180609_183131.jpg?1539639211", 
                                        "title": "Noch ein Foto vom Roboter"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/678/original/slides_1.pdf?1546008239", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9733.html", 
                                "id": 9733, 
                                "guid": "2d71612c-7f40-484b-a939-10b809aedd80", 
                                "logo": "/system/events/logos/000/009/733/large/privacy.png?1539962563", 
                                "date": "2018-12-28T18:50:00+01:00", 
                                "start": "18:50", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9733-was_schutzt_eigentlich_der_datenschutz", 
                                "title": "Was sch\u00fctzt eigentlich der Datenschutz?", 
                                "subtitle": "Warum Datensch\u00fctzerInnen aufh\u00f6ren m\u00fcssen von individueller Privatheit zu sprechen.", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Beim Datenschutz geht es mitnichten um Privatsph\u00e4re, um das eigene Schlafzimmer oder um das Teilen privater Daten bei Facebook. Es geht gleicherma\u00dfen um den Erhalt einer demokratischen Gesellschaftsordnung wie um den Erhalt individueller Handlungsalternativen im digitalen Zeitalter. Wir d\u00fcrfen also nicht so sehr \u00fcber Einzelpersonen und ihre h\u00f6chst subjektiven Privatheitsw\u00fcnsche sprechen, sondern viel mehr von Machtasymmetrien, Durchsetzungsmacht, sowie \u201estarken\u201c und \u201eschwachen\u201c Akteuren.", 
                                "description": "Erst mit diesem strukturellen Blick k\u00f6nnen wir politischen Nebelkerzen wie \"Selbst-Datenschutz\", \"Dateneigentum\", \"individuelle Datensouver\u00e4nit\u00e4t\" oder etwa \"Algorithmen-Ethik\" etwas entgegensetzen, die zunehmend als L\u00f6sung f\u00fcr das Problem der Verdatung der Gesellschaft angeboten werden. Wir m\u00fcssen uns strukturell und auch theoretisch mit dem Problem der Informationsmacht gro\u00dfer Organisationen (Beh\u00f6rden, Firmen) besch\u00e4ftigen, wenn wir einer grundrechtsorientierten digitalen Gesellschaft leben wollen. Denn Datenreichtumsbef\u00fcrworter- und Datenschutzver\u00e4chterInnen, die derartige Probleme wie so oft dem Individuum aufb\u00fcrden wollen, haben n\u00e4mlich keinen theoretischen Unterbau.\r\n\r\nDieser Foundation-Talk vermittelt passioniert das R\u00fcstzeug und die n\u00f6tigen Grundlagen, um tats\u00e4chlich sinnvolle Datenschutzbebatten zu f\u00fchren.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 1642, 
                                        "public_name": "Rainer Rehak"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://media.ccc.de/v/35c3-9733-was_schutzt_eigentlich_der_datenschutz", 
                                        "title": "VIDEO"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/702/original/35C3-Datenschutz_v1.0.pdf?1546096877", 
                                        "title": "FOLIEN"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9590.html", 
                                "id": 9590, 
                                "guid": "c94fde2e-b5db-48f2-b94f-872ce7405875", 
                                "logo": "/system/events/logos/000/009/590/large/swiss-flag_001.jpg?1545082519", 
                                "date": "2018-12-28T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9590-schweiz_netzpolitik_zwischen_bodensee_und_matterhorn", 
                                "title": "Schweiz: Netzpolitik zwischen Bodensee und Matterhorn", 
                                "subtitle": "Massen\u00fcberwachung, Netzsperren und andere netzpolitische Schaupl\u00e4tze in der Schweiz", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Datenreichtum, E-Voting, Massen\u00fcberwachung und andere netzpolitische Schaupl\u00e4tze in der Schweiz", 
                                "description": "Der Kampf um die Freiheit im digitalen Raum wird auch in der Schweiz intensiver. Wir blicken auf das netzpolitische Jahr 2018 in der Schweiz zwischen Bodensee und Matterhorn zur\u00fcck. Wir behandeln jene Themen, die relevant waren und relevant bleiben. Weiter zeigen wir, was von der Digitalen Gesellschaft in der Schweiz im neuen Jahr zu erwarten ist.\r\n\r\n<strong>Themen sind unter anderem:</strong>\r\n\r\n<strong>Massen\u00fcberwachung:</strong> Kabelaufkl\u00e4rung und Vorratsdatenspeicherung sowie die Beschwerden, welche die Digitale Gesellschaft in der Schweiz f\u00fchrt.\r\n\r\n<strong>E-Voting:</strong> Abstimmungen und Wahlen im Internet sowie der Kampf f\u00fcr das Vertrauen in die Direkte Demokratie in der Schweiz.\r\n\r\n<strong>Netzsperren:</strong> Die Zensur im schweizerischen Internet begann mit \u00abDenkt denn niemand an die Kinder?\u00bb und geht nun mit Geldspielen im Internet weiter \u2026\r\n\r\n<strong>Urheberrecht:</strong> Wie die USA im \u00abPiratenstaat\u00bb Schweiz ihre Forderungen durchsetzen, unter anderem mit Massenabmahnungen gegen Filesharing.\r\n\r\n<strong>Datenschutz:</strong> Wo war in der Schweiz besonders viel \u00abDatenreichtum\u00bb zu beobachten?\r\n\r\n<strong>Digitale Gesellschaft in der Schweiz:</strong> Razzia am \u00abHort der Linksextremen\u00bb, Winterkongress und andere Aktivit\u00e4ten.\r\n\r\nNach dem Vortrag sind alle interessierten Personen eingeladen, die Diskussion an einem Workshop der Digitalen Gesellschaft fortzusetzen. Es werden Aktivisten von verschiedenen aktiven Organisationen der Netzpolitik in der Schweiz anwesend sein (Digitale Gesellschaft, CCC-CH, CCCZH, Piratenpartei Schweiz, Digitale Allmend).\r\n\r\n<a href=\"https://events.ccc.de/congress/2018/wiki/index.php/Session:Follow-up_meeting_to_the_Netzpolitik_in_der_Schweiz_talk\">https://events.ccc.de/congress/2018/wiki/index.php/Session:Follow-up_meeting_to_the_Netzpolitik_in_der_Schweiz_talk</a>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8033, 
                                        "public_name": "Martin Steiger"
                                    }, 
                                    {
                                        "id": 6351, 
                                        "public_name": "Patrick \"packi\" St\u00e4hlin"
                                    }, 
                                    {
                                        "id": 7723, 
                                        "public_name": "Kire"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.digitale-gesellschaft.ch", 
                                        "title": "Digitale Gesellschaft in der Schweiz"
                                    }, 
                                    {
                                        "url": "https://martinsteiger.ch/sharing/35c3/35c3_digitale-gesellschaft_netzpolitik-schweiz.pdf", 
                                        "title": "Folien / Slides"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9492.html", 
                                "id": 9492, 
                                "guid": "86b96f3f-a6b5-49c0-a189-69912c016916", 
                                "logo": "/system/events/logos/000/009/492/large/alice_bob.png?1545322020", 
                                "date": "2018-12-28T21:50:00+01:00", 
                                "start": "21:50", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9492-wallet_security", 
                                "title": "Wallet Security", 
                                "subtitle": "How (not) to protect private keys", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "There are multiple different ways to store cryptocurrency secret keys. This talk will investigate advantages and disadvantages of different methods with regards to cryptographic backdoors known as kleptograms.", 
                                "description": "With the increasing popularity of cryptocurrencies such as Bitcoin, there is now a variety of different wallet solutions and products available. Wallet in this context refers to any device or piece of software which store secret keys. Those secret keys are typically used to create and sign transactions (payments, smart contracts, etc.) using ECDSA.\r\n\r\nWallet implementations range from simple open-source software to hardware tokens. Some solutions store the keys in files (possibly encrypted with a passphrase), while others use hardware-based cryptography modules. Hardware-based key storage comes with a lot of advantages. The chips are designed to make it hard to extract keys.\r\n\r\nWhat is often overlooked is that it is hard to verify that the wallet actually does what the manufacturer claims it does. One obvious solution is to not connect the wallet to a computer with Internet access in order to avoid exposure of secrets. However, there are possible cryptographic backdoors called kleptograms that can hide the secret information within the published signatures in a way that is provably undetectable.\r\n\r\nThe kleptographic attacks were first discovered by Adam Young and Moti Yung in 1997 for classic DSA. The author of this talk has investigated the relevance of this attack for ECDSA in the context of Bitcoin. Note that this attack is not limited to Bitcoin and might be relevant for other ECDSA-based protocols as well.\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8297, 
                                        "public_name": "Stephan Verb\u00fccheln"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://arxiv.org/abs/1501.00447", 
                                        "title": " How Perfect Offline Wallets Can Still Leak Bitcoin Private Keys"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/727/original/35c3_wallet_security.pdf?1546275895", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9939.html", 
                                "id": 9939, 
                                "guid": "2536bba3-b95f-4cec-9a95-7aa756db7edb", 
                                "logo": "/system/events/logos/000/009/939/large/ccc_talk4.jpg?1545941976", 
                                "date": "2018-12-28T22:50:00+01:00", 
                                "start": "22:50", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9939-disnovation_org", 
                                "title": "DISNOVATION.ORG", 
                                "subtitle": "Disobedient Innovation", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Through the hacking of surveillance techniques, machine learning, and big-data analytics, DISNOVATION.ORG\u2019s trilogy of internet bots is uncovering and repurposing some of the influential and opaque operating systems of our online environment. ", 
                                "description": "Started in 2012 with The Pirate Cinema (exposing the dynamics of peer-to-peer media sharing and its materiality), followed by Predictive Art Bot (a disruption of the normative effects of social media on creativity), and continued with Computational Propaganda (a \u2018system test\u2019 of the online political influence apparatus), this series explores black box technologies and the algorithmic governance of our aspirations, decisions, and political views. These three artworks aim to reveal emergent algorithmic imaginaries, expose the inner workings of these systems, and stimulate critical debate.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8671, 
                                        "public_name": "DISNOVATION.ORG"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://disnovation.org", 
                                        "title": "DISNOVATION.ORG Art Collective"
                                    }, 
                                    {
                                        "url": "http://predictiveartbot.com", 
                                        "title": "Predictive Art Bot"
                                    }, 
                                    {
                                        "url": "https://thepiratecinema.com", 
                                        "title": "The Pirate Cinema"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/595/original/pab_v4_web.jpg?1539643475", 
                                        "title": "Predictive Art Bot | Online artwork view"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/596/original/pab_02_1920.jpg?1539643475", 
                                        "title": "Predictive Art Bot | Installation view"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10036.html", 
                                "id": 10036, 
                                "guid": "1cff41a8-455e-42a6-ab08-d6cb166e7d3b", 
                                "logo": "/system/events/logos/000/010/036/large/photo_2017-12-25_16-24-33.jpg?1545927390", 
                                "date": "2018-12-28T23:50:00+01:00", 
                                "start": "23:50", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-10036-mondnacht", 
                                "title": "Mondnacht", 
                                "subtitle": "Lesung", 
                                "track": "Art & Culture", 
                                "type": "performance", 
                                "language": "de", 
                                "abstract": "\"Mondnacht\" von Stanislav Lem. Das ber\u00fchmte SF Rundfunk-H\u00f6rspiel als Lesung mit analogen und digitalen Mitteln. ", 
                                "description": "Drei SchauspielerInnen lassen die letzte Mondnacht einer Raumfahrtbesatzung aufleben. Der Mond sieht still zu, wie sich in der beengten Atmosph\u00e4re der Raumstation ein verheerendes Spiel des Misstrauens entfaltet. \r\nMit analogen und digitalen Soundeffekten werden die Zuh\u00f6rer in die Hemisphere entf\u00fchrt. Ein besonderes Ereignis mit dem genialen Text des Meisters der SF Literatur. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8771, 
                                        "public_name": "Jule Torhorst"
                                    }, 
                                    {
                                        "id": 8784, 
                                        "public_name": "Tammo Messow"
                                    }, 
                                    {
                                        "id": 8786, 
                                        "public_name": "Ted Siegert"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Lecture room 11": [], 
                        "Seminar room 14-15": [], 
                        "Seminar room 13": [], 
                        "Lecture room M1": [], 
                        "Lecture room M2": [], 
                        "Lecture room M3": [], 
                        "Kidspace": [], 
                        "CCL Saal 3": [], 
                        "Chaos West B\u00fchne": [
                            {
                                "id": 157, 
                                "guid": "c557a9ec-5f07-50fd-997f-f6cc568d66c9", 
                                "logo": null, 
                                "date": "2018-12-28T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "02:00", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "X8P8VN", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/X8P8VN", 
                                "title": "Tech-House Set ft. VJ Moritz Hilscher", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Klangteppich", 
                                "language": "de", 
                                "abstract": "Ein DJ Set, gemixed von avocadoom, mit viel Tech-House, mit bekannteren und unbekannteren Tracks, relativ ausgewogen und vielseitig. \u201eEs ist Zeit, den Klangteppich mit 4 on the floor mal ein bisschen auszuklopfen.\u201c.\r\n+ VJ Moritz Hilscher", 
                                "description": "Hey, ich bin Thilo (avocadoom) vom CCC-Darmstadt und neben dem ganzen gehacke lege ich ab und zu hobbym\u00e4\u00dfig House auf. Ich w\u00fcrde dieses Jahr gerne in die Welt des Klangteppichs eintauchen und euch ein bisschen House auf die Ohren geben.\r\n\r\nDas Set soll relativ ausgeglichen werden, nicht zu aufgeregt, nicht zu ruhig. Um das ein bisschen zu konkretisieren, hier ein paar Beispiele:\r\n\r\n- \"La Luna\" - Jude & Frank\r\n- \"Crowd Control\" - FISHER\r\n- \"The Jam\" - Guz, Simun", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 70, 
                                        "name": "avocadoom", 
                                        "biography": "Student, Member@CCCDA, Schlagzeuger, Hobby-DJ", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 58, 
                                        "name": "Moritz Hilscher", 
                                        "biography": "Lorem Ipsum.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 141, 
                                "guid": "1ad87e0f-30be-52be-b939-5e7c0050e59a", 
                                "logo": null, 
                                "date": "2018-12-28T02:00:00+01:00", 
                                "start": "02:00", 
                                "duration": "02:00", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "BCXFBN", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/BCXFBN", 
                                "title": "DJ robelix", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Klangteppich", 
                                "language": "de", 
                                "abstract": "\u00bbAch, wenn ich alleine rumfahre, h\u00f6re ich meistens Industrial\u00ab, sagt das Auto.\r\n(aus Qualityland, Marc Uwe Kling)\r\n\r\nDJ-set - nicht nur f\u00fcr selbstfahrende Autos.\r\nVon melodischem Futurepop, Darkwave, Synthwave \u00fcber stampfenden Industrial Dance, EBM bis krachendem Rhythm'n'Noise, IDM.", 
                                "description": "\u00bbAch, wenn ich alleine rumfahre, h\u00f6re ich meistens Industrial\u00ab, sagt das Auto.\r\n(aus Qualityland, Marc Uwe Kling)\r\n\r\nDJ-set - nicht nur f\u00fcr selbstfahrende Autos.\r\nVon melodischem Futurepop, Darkwave, Synthwave \u00fcber stampfenden Industrial Dance, EBM bis krachendem Rhythm'n'Noise, IDM, gespickt mit etwas Chiptunes.", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 53, 
                                        "name": "robelix", 
                                        "biography": "Hacker, Linuxer, Admin, DJ, Vampir aus Innsbruck\r\nhttps://www.robelix.com/", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 148, 
                                "guid": "1cc2086d-bfd7-53fd-8ae2-25efc204bcdf", 
                                "logo": null, 
                                "date": "2018-12-28T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "UZXL7T", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/UZXL7T", 
                                "title": "Wie aus einer Wette ein Kiosk System f\u00fcr den Raspi wurde", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "de", 
                                "abstract": "Evaluierung  welches Betriebssystem am wenigsten Ressourcen verbraucht  und welcher Browser am Besten geeignet ist. Installation und Konfiguration des OS auf dem RASPI sowie Konfiguration des Kiosk Modus im Browser.", 
                                "description": "Der eingebaute Browser unserer Fernseher in der IT-Abteilung hatte Probleme, Nagios /Check MK richtig darzustellen.\r\nMein Chef wollte einen Tiny PC Mit Windows 10  (Lenovo M920 ca. 1.000,--\u20ac)) einsetzten ,\r\nIch wollte Geld sparen und habe den RASPI vorschlagen, daraus wurde eine Wette !\r\nDas haupts\u00e4chliche Problem war eine Distri zu finden, die auch auf dem Raspberry PI eine brauchbare Performance erzielt . Es musste aber auch sichergestellt werden, das wir in unserem Windows Umfeld einen Linux PC auch administrieren k\u00f6nnen (VNC, SSH)", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 62, 
                                        "name": "B@lu", 
                                        "biography": "Fachinformatiker f\u00fcr Systemintegration \r\nSeit mehr als 40 Jahren setze ich mich intensiv mit den Entwicklungen der IT auseinander.\r\n2021 - 2004  w\u00e4hrend des Studiums, Arbeit als First Level Hotliner bei einer Software Firma im Siegerland\r\nSeit 2016 Arbeit als Second und Third Level, Verantwortlicher bei einem mittelst\u00e4ndischen Unternehmen am Niederrhein mit insgesamt  6 Werken auch im europ\u00e4ischen Ausland", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 140, 
                                "guid": "80664626-4764-53b5-8ca3-17014e213f1c", 
                                "logo": null, 
                                "date": "2018-12-28T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "TMPXSJ", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/TMPXSJ", 
                                "title": "Exploiting PS4 Video Apps", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Video Apps auf der PS4 sind etwas Herrliches. In diesem Talk zeige ich wie man sie Ausnutzen kann um eigenen unsignierten Code auszuf\u00fchren (unabh\u00e4ngig von der installierten Firmwareversion). Schritt f\u00fcr Schritt zeige ich dabei vor was f\u00fcr Probleme ich am Anfang meines Einstieges in die PS4 Szene stand und wie ich diese, um ans Ziel zu gelangen, gel\u00f6st habe.", 
                                "description": "Vor knapp drei Jahren hat meine Frau mir eine PS4 zum Geburtstag geschenkt. Sie konnte ja nicht ahnen das ich mit der Konsole alles tun w\u00fcrde, nur nicht zocken. In diesem Talk wird es um das Projekt gehen mit dem ich Fu\u00df in der PS4 Untergrundszene gefasst habe. Schritt f\u00fcr Schritt werden wir sehen was n\u00f6tig war um auf einem fremden/unbekannten System unsignierten Code ausf\u00fchren zu k\u00f6nnen. Ich werde den Exploit und seine Schritte so detailliert wie m\u00f6glich erkl\u00e4ren und somit zeigen das Software-Exploits keine Magie, sondern eine Folge logischer Abl\u00e4ufe sind.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 55, 
                                        "name": "m0rph3us1987", 
                                        "biography": "Reverse engineering fetischist mit einer Vorliebe f\u00fcr Spielekonsolen.\r\n\r\nTwitter: @m0rph3us1987", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 150, 
                                "guid": "41e36295-68d2-5c2b-add5-d6b6b58df605", 
                                "logo": null, 
                                "date": "2018-12-28T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "WY9DSX", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/WY9DSX", 
                                "title": "Neusprech Crashkurs", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Der Vortrag gibt einen Einblick in das Thema Neusprech. In drei Teilen wird eine Definition im Historischen Kontext erarbeitet, anhand von konkreten Beispielen Neusprech unterschiedlicher Absender betrachtet und schlie\u00dflich wird die Wirkungsweise von Neusprech anhand von Framing aufgezeigt. \r\nTeile das Vortrags basieren auf Arbeiten und Talks von Martin Haase.", 
                                "description": "In der \u00f6ffentlichen Diskussion wird oft die Verwendung von Neusprech angesprochen, doch was ist Neusprech genau? Im \u201eNeusprech Crashkurs\u201c m\u00f6chte ich anhand umfangreicher Beispiele aufzeigen, was Neusprech f\u00fcr Orwell war, was unter heutigem Neusprech zu verstehen ist und welche Strategien dabei eingesetzt werden. Dabei m\u00f6chte ich mich nicht nur auf politischen Neusprech beschr\u00e4nken, sondern auch Aspekte wie die Public Relation und soziokulturelle Einfl\u00fcsse beleuchten. Zuletzt m\u00f6chte ich aufzeigen, was kontinuierlicher Neusprech in unseren K\u00f6pfen macht. Dabei m\u00f6chte ich nicht nur auf Definition und trockene Theorie beschr\u00e4nken, sondern auch die emotionalen Wirkungen aufzeigen, die durch kontinuierliche Wiederholung auch unsere Gedanken ver\u00e4ndern kann. \r\n\r\nAktuelle Folien des Vortrags:\r\nhttp://www.NerdGirl.de/Download/Neusprech.zip (17,3 MB | .odp-Format)", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7, 
                                        "name": "MissInformation", 
                                        "biography": "Warpzone hackerspace M\u00fcnster", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 154, 
                                "guid": "83645964-46e8-5f9e-bcbf-14544af3145a", 
                                "logo": null, 
                                "date": "2018-12-28T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "CHEGRS", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/CHEGRS", 
                                "title": "Frauen* + NIT Gruppen im Umfeld des CCC: Wo, warum und was sind unsere Projekte", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Das Panel besteht aus Vertreter\\*innen der F(NIT)-Gruppen aus mehreren St\u00e4dten sowie dem Mz\\* Baltazar\u2019s Lab (Wien) und den Haecksen. Angedacht ist es, den Bogen von Feminismus im Generellen zur Planung und Umsetzung eines eigenen Spaces oder einer Gruppe zu schlagen. Dabei sollen Probleme, positive Erlebnisse, Strategien und Tipps f\u00fcr eine Neugr\u00fcndung gesammelt werden.", 
                                "description": "Geplanter Verlauf:\r\n\r\n- Welche Probleme in unserer Gesellschaft aus feministischer Sicht seht ihr?\r\n\r\n- Was hat euch geholfen, euch zu gr\u00fcnden?\r\n\r\n- Welche Probleme gab es, im Space, generell, warum habt ihr euch keinem Space angeschlossen?\r\n\r\n- Wie seit ihr gegen diese angegangen, konnten diese gel\u00f6st werden?\r\n\r\n- Welche Unterst\u00fctzung br\u00e4uchtet ihr, um noch offene Probleme anzugehen in eurem Space?\r\n\r\n- Welche Unterst\u00fctzung br\u00e4uchte Mensch, um offene Probleme allgemein anzugehen?\r\n\r\n- Gibt es Dinge, Situationen, die euch positiv \u00fcberrascht haben?\r\n\r\n- Was w\u00fcrdet ihr anders, genau so wieder machen um eure Gruppe entstehen zu lassen?\r\n\r\n- Welche Tipps habt ihr f\u00fcr Menschen, die eine lokale Gruppe in dieser oder \u00e4hnlicher Form gr\u00fcnden m\u00f6chten?", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 66, 
                                        "name": "Haecksen", 
                                        "biography": "haecksen.org", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 147, 
                                "guid": "bf490104-3595-5d88-a4b1-f39899e768f7", 
                                "logo": null, 
                                "date": "2018-12-28T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "ANCPJM", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/ANCPJM", 
                                "title": "Stack Buffer Overflow Exploits - Wie ein \"harmloses\" Dokument einen Rechner infizieren kann", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Dieser Vortrag ist der Versuch, nicht-Fachleuten anhand eines Stack Buffer Overflows anschaulich zu erkl\u00e4ren und zu demonstrieren, warum und wie ein vermeintlich harmloses Dokument wie bspw. ein PDF einen Rechner mit einem Virus oder Wurm infizieren kann.", 
                                "description": "Hast Du dich schon mal gefragt, wie es eigentlich m\u00f6glich ist, dass ein PDF, ein Office Dokument oder eine Email einen Rechner lahm legt? In diesem Vortrag gehen wir dieser Frage auf den Grund.\r\nHierbei wird versucht, unwichtige Details weg zu lassen, nur die n\u00f6tigsten Fachw\u00f6rter zu verwenden und diese auch zu erkl\u00e4ren. An einigen technischen Details kommen wir leider nicht vorbei, diese werden aber vereinfacht dargestellt, um m\u00f6glichst viele erreichen und mitnehmen zu k\u00f6nnen. Als Beispiel dient ein klassischer Stack Buffer Overflow wie im ber\u00fchmten Artikel \"Smashing the Stack for Fun and Profit\" beschrieben.\r\nWenn die Demo-G\u00f6tter gut gelaunt sind, \"infiziert\" der Vortragende am Ende live seinen eigenen Rechner mit dem vorgestellten Verfahren.\r\n\r\nZielgruppe: Alle au\u00dfer ITSec ExpertInnen und anderen Menschen, die bereits wissen, wie ein Buffer Overflow funktioniert. :-)  \r\nQuellcode von Folien und Demo: https://gitlab.com/chaos-siegen/oektion/vortrag/buffer_overflow", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 63, 
                                        "name": "haggl", 
                                        "biography": "* Diplom-Informatiker und Meister der Wissenschaft\r\n* Anh\u00e4nger des Hackspace und Chaostreffs Siegen\r\n* Organisator und Betreuer von CmS in Siegen\r\n* Lehrkraft f\u00fcr analoge und digitale Selbstverteidigung", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 103, 
                                "guid": "a8605e7e-438f-5fb2-9b16-a054469fba8e", 
                                "logo": null, 
                                "date": "2018-12-28T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "B9JQG9", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/B9JQG9", 
                                "title": "Der Strom kommt aus der Steckdose, oder?", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Dieser Talk gibt einen \u00dcberblick dar\u00fcber, wie das deutsche Stromnetz aufgebaut ist und wo die Reise hingeht. Wo stehen die gro\u00dfen Kraftwerke? Was passiert, wenn diese durch dezentrale Erneuerbare Energiequellen ersetzt werden und f\u00fchrt die Energiewende wirklich zu einer dezentraleren Energieversorgung?", 
                                "description": "Wie ist das Stromnetz in Deutschland aufgebaut? Warum verwendet man Hochspannung? Wieso bauen Netzbetreiber lieber Freileitungen, als ein Kabel in den Boden zu legen? Die Energiewende ver\u00e4ndert derzeit das elektrische Netz ungemein. Erneuerbare Energien \u00fcbernehmen immer mehr die Aufgaben von Gro\u00dfkraftwerken und bringen dadurch v\u00f6llig neue Herausforderungen mit sich. Pl\u00f6tzlich gibt es zu einigen Zeiten \u00dcberkapazit\u00e4ten, die nicht nur zu absurden Effekten an der Stromb\u00f6rse in Leipzig f\u00fchren, sondern auch gef\u00e4hrlich f\u00fcr die Netzstabilit\u00e4t werden k\u00f6nnen. Dann gibt es wiederum Tage, an denen die Erneuerbaren Energien fast nichts zum Strommix beitragen und der Gro\u00dfteil der elektrischen Energie aus Kohle-, Gas- und (noch) Kernkraftwerken kommt. Wir gehen den Fragen nach, ob die neuen dezentralen Energiequellen wirklich so dezentral sind, wie es hei\u00df, ob neue Leitungen wirklich nur wegen der Energiewende gebaut werden oder nicht doch auch aus Profitgr\u00fcnden und warum Kabel oft nicht die bessere Alternative zu Freileitungen sind. Nat\u00fcrlich kommen am Anfang auch nicht die Grundlagen zu kurz.\r\nAll das versucht dieser Vortrag verst\u00e4ndlich zu erkl\u00e4ren. Vorwissen wird nicht ben\u00f6tigt!", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5, 
                                        "name": "bodems", 
                                        "biography": "Bodems ist Freifunka, Infrastructuralist und hat mal bei so einem Netzbetreiber gearbeitet. Heute sorgt er daf\u00fcr, dass Elektrofahrzeuge sich mit dem Netz vertragen und therapiert manchmal Katzen.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 125, 
                                "guid": "f42631ca-d3ec-5baf-8642-85c0b1cadc89", 
                                "logo": null, 
                                "date": "2018-12-28T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "NZ38DR", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/NZ38DR", 
                                "title": "Track me, if you \u2026 oh.", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Sammeln und Verkauf von Bewegungsdaten abseits von Mobilfunk und Smartphone.\r\nDer Mobilfunkanbieter wei\u00df, wo Du Dich bewegst - no news here. Aber wie steht es mit den Dutzenden anderen Firmen, Marketing Agenturen, Kaufh\u00e4usern oder Netzwekausr\u00fcstern, die Deine Bewegungsdaten selbst ohne Smartphone-App erfassen und das, ohne dass Du es wissen kannst?", 
                                "description": "Feature Phones, Smartphones, Laptops, Smartwatches, Bluetooth Kopfh\u00f6hrer - sie alle haben eines gemeinsam: sie k\u00f6nnen Funktechnologien wie WLAN oder Bluetooth. In den letzten Jahren hat sich eine ganze Marktsparte an Firmen entwickelt, deren Gesch\u00e4ftsmodell es ist, die Metadaten dieser Technologien zu erfassen, zu korrelieren und zu verwerten. Dabei ist es unerheblich, ob Du z.B. das \u00f6ffentliche WLAN dieser Firmen nutzt oder nicht. Die Pr\u00e4senz Deiner Ger\u00e4te reicht aus, um sie (wieder)zuerkennen. Und eine automatische Macadressen-Randomisierung hilft nur begrenzt.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 34, 
                                        "name": "Clemens Hopfer", 
                                        "biography": "Elektroniker mit Kommandozeilen-Hintergrund. Busybox alchemist, embedded firmware wrangler. OE1RFC.\r\nClemens arbeitet seit \u00fcber 10 Jahren mit embedded linux systems besch\u00e4ftigt sich seit einigen Jahren st\u00e4rker mit dem Thema Datenschutz.", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 37, 
                                        "name": "jinxx", 
                                        "biography": "Autorin, Podcasterin, Dinge mit Datenschutz", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 153, 
                                "guid": "b873392d-f0e7-50ee-a918-770f104efeae", 
                                "logo": null, 
                                "date": "2018-12-28T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "PV98T9", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/PV98T9", 
                                "title": "Wertsch\u00e4tzend kommunizieren - durch vier Schritte \"in Kontakt kommen\"", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "[Rosenberg](https://de.wikipedia.org/wiki/Marshall_B._Rosenberg) hat in der [gewaltfreien Kommunikation (GFK)](https://de.wikipedia.org/wiki/Gewaltfreie_Kommunikation) vier konkrete Schritte formuliert, die jede/n besser kommunizieren lassen sollen. Im Slot werden diese vorgestellt und durch praktische \u00dcbungen begleitet.\r\nMehr als eine kurze Einf\u00fchrung in die GFK kann der Slot in der knappen Zeit nicht bieten.\r\n\r\nAber Achtung: It's simple, but not easy! :-)", 
                                "description": "Die GFK ist eine \"Erfindung\" des amerikanischen Psychologen [M. B. Rosenberg](https://de.wikipedia.org/wiki/Marshall_B._Rosenberg). Er hat verschiedene Ans\u00e4tze und Ideen zusammengetragen und in ein praktisch anwendbare Handlungsempfehlung gegossen. Seine Ans\u00e4tze sind nicht neu oder revolution\u00e4r, sie betonen nur gewisse Dinge und legen einen Schwerpunkt auf Empathie, Bed\u00fcrfnisse und Gef\u00fchle.\r\n\r\nRosenberg hat die GFK Mitte der 60er Jahre entwickelt. Vor der Jahrtausendwende hat GFK in Deutschland weite Verbreitung gefunden. Mittlerweile gibt es in vielen Regionen Deutschlands lokale Gruppen, die sich der Verbreitung und der praktischen Aus\u00fcbung der GFK verschrieben haben.\r\n\r\nIm Slot werden wir die vier Schritte der GFK kennenlernen und (in kleineren Gruppen) praktisch \u00fcben bzw. erfahren. Besondere Voraussetzungen: keine: Offenheit und Neugierde auf Neues und die Auseinandersetzung mit den eigenen Gef\u00fchlen sind hilfreich. ;-)", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 67, 
                                        "name": "Ludger", 
                                        "biography": "Ich arbeite in der IT-Branche, liebe Podcasts und habe vor einigen Jahren Basis-Kurse in gewaltfreier Kommunikation besucht. Durch eigenes Erleben wei\u00df ich (f\u00fcr mich), dass GFK ein sinnvoller Weg ist \"besser\" zu kommunizieren.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 122, 
                                "guid": "600ea8de-65d9-540d-abb1-a4f956e6143f", 
                                "logo": null, 
                                "date": "2018-12-28T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "33CNRG", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/33CNRG", 
                                "title": "Network monitoring via SSH und ELK", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "de", 
                                "abstract": "Wenn SNMP nicht will, wie kann man Netzwerk Hardware mit SSH \u00fcberwachen. Welche Tools gibt es, wie kann man diese Tools verbinden und was f\u00fcr Informationen erh\u00e4lt man (plus welche Informationen wirft man besser direkt weg)", 
                                "description": "Wenn die Netzwerkhardware bestimmte Dinge nicht \u00fcber SNMP ausgeben will, aber man Daten via SSH erhalten kann zeigt dieser Vortrag wie man die Daten am besten nutzen kann. Es wird zus\u00e4tzlich eine kurze \u00dcbersicht \u00fcber python paramiko, splunk/ELK Stacks und was im Network Monitoring m\u00f6glich ist geben, wenn SNMP keine Option ist. Dieser Vortrag ist auch f\u00fcr Personen interessant, die grundlegende Erfahrung sammeln wollen, wie man Python verwenden kann um Netzwerk Hardware zu verwalten.\r\nDie in den Beispielen verwendeten Quelltexte sind auf Github verf\u00fcgbar.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 32, 
                                        "name": "Heiko Borchers", 
                                        "biography": "Ehemaliger Azubi an der Heinrich-Heine Universit\u00e4t D\u00fcsseldorf. Inzwischen mache ich Dinge mit Wolken", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 160, 
                                "guid": "7ebee226-66bc-558f-b76f-435a8ce91543", 
                                "logo": null, 
                                "date": "2018-12-28T21:30:00+01:00", 
                                "start": "21:30", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "K8ABSC", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/K8ABSC", 
                                "title": "Die Geschichte vom Biegeradius", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "de", 
                                "abstract": "Was passiert mit einer Faser die 10x um einen Bleistift gewickelt wird?\r\nWas hat es mit dieser D\u00e4mpfung auf sich, und warum macht sie mein\r\nInternet langsam?\r\nWas ist der unterschied zwischen 1310nm & 1550nm und warum gibt es beides?\r\nDiese und andere Fragen beantworten wir auf der B\u00fchne.", 
                                "description": "Was passiert mit einer Faser die 10x um einen Bleistift gewickelt wird?\r\nWas hat es mit dieser D\u00e4mpfung auf sich, und warum macht sie mein\r\nInternet langsam?\r\nWas ist der unterschied zwischen 1310nm & 1550nm und warum gibt es beides?\r\nDiese und andere Fragen beantworten wir auf der B\u00fchne.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 72, 
                                        "name": "Thies Mueller (td00)", 
                                        "biography": ".", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 104, 
                                "guid": "0989e077-2c8d-53b4-bc3a-f8323ad38de1", 
                                "logo": null, 
                                "date": "2018-12-28T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "02:00", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "9VD3XJ", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/9VD3XJ", 
                                "title": "Chaos-Familien-Duell", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Die chaotische Variante des Familien-Duells, gleiches Spielprinzip nur Chaotischer.\r\nGespielt wird in Teams, welche sich vorzugsweise aus Hackerspaces und \u00e4hnlichen Gruppierungen bilden. Am Ende ziehen zwei Teams ins Finale ein und haben die Chance auf \"tolle Preise\".", 
                                "description": "Dieses Spiel soll sich stark an der Fernseh-Show \"Familien-Duell\" orientieren, nur mit anderen Fragen.\r\nVor dem Spiel werde ich mich darum k\u00fcmmern, dass sich Teams aus einzelnen Hackerspaces und anderen Hacker-Familien bilden die dann antreten k\u00f6nnen. Zudem werden die Antworten auf die Fragen die das Spiel voraussetzt aus Chaos-West gesammelt.\r\n\r\nEs wird zwei Spiele mit jeweils zwei Teams geben. Aus jedem dieser Spiele wird ein Team siegreich hervorgehen und dieses wird dann im Finale gegen das andere antreten. Das Team, dass im Finale gewinnt wird einige Preise erhalten, was das sein wird steht nat\u00fcrlich noch nicht fest. \r\n\r\nDieses Spiel soll zum einen f\u00fcr ein wenig Entspannung nach Talks und Arbeit auf dem Congress dienen, zum anderen soll durch ein solches Spiel die Kommunikation zwischen einzelnen Hacksen, Hackern und Hackspaces f\u00f6rdern.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8, 
                                        "name": "olel", 
                                        "biography": "Hackt in M\u00fcnster, alles ist mit seinem Namen beschriftet.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "ChaosZone": [
                            {
                                "id": 719, 
                                "guid": "d1903628-4268-5647-9e46-6515297f53e7", 
                                "logo": null, 
                                "date": "2018-12-28T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "QX9NBX", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/QX9NBX", 
                                "title": "Datenguide: Hacking the statistics office!", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "With our project [Datenguide](https://datengui.de), we work on making official statistics data more accessible to normal people. In this session we'll explain why and how we do it.", 
                                "description": "Official statistics are statistics published by government agencies and other public bodies, usually about economic, environmental, and societal topics. They are commonly used by policy makers and public administrators but are also an important tool for journalists and civil society initiatives. Official statistics can be used for political reporting, for debunking misinformation and \"fake news\", and for lobbying for social change.\r\n\r\nThe good news is that official statistics are open data, so at least in theory anyone can download and use them for whatever they like. The bad news is that official statistics are usually made and published by bureaucrats for other bureaucrats. German official statistics are hidden in ancient data portal software and are notorious for being hard to use and to understand. \r\n\r\n[Datenguide](https://datengui.de) is a civic tech initiative that aims to make German official statistics accessible to everyone. We work on [Python and JavaScript tools](https://github.com/datenguide/datenguide) for freeing official statistics data and organize events to help people use them. In this talk, we'll give an overview of the technology we are building, explain the problems we are facing, and talk about ways to contribute to the project.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 24, 
                                        "name": "Simon Jockers", 
                                        "biography": "", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 710, 
                                "guid": "45c95b37-47c3-5a75-b6ef-85d6356e2063", 
                                "logo": null, 
                                "date": "2018-12-28T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "7JWW8Q", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/7JWW8Q", 
                                "title": "WikiTech", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "How does Wikimedia serve a hundred thousand Wikipedia pages second?", 
                                "description": "An overview of the technical side of running Wikipedia & Co, from code review and the server farm to the deployment process and scaling storage infrastructure.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 15, 
                                        "name": "brightbyte", 
                                        "biography": "Been here. Done that. Got all the t-shirts.", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 16, 
                                        "name": "\u00e1\u010d", 
                                        "biography": "", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 702, 
                                "guid": "64da27c8-9346-59c0-94a5-844d47514384", 
                                "logo": null, 
                                "date": "2018-12-28T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "PHHS7L", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/PHHS7L", 
                                "title": "Reversing Industrial Protocols \u2013 Real World Use Cases", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "Most PLC protocols are old (older than the entire Ethernet protocol) and by their very nature insecure. I will not be discussing the \u201cknown\u201d industrial protocols, such as S7com, TwinCAT and modbusTCP etc \u2026 in large detail, but rather the lesser known variants that are used to actually control and/or configure these devices.", 
                                "description": "Almost every single use case and demonstration during this session are actually zero days and will remain zero days. Since it is a \u201cnormal\u201d use of the (unauthenticated protocols) and these devices remain untouched for 20 to 30 years, it is practically impossible to \u201cupdate the protocols\u201d without closing down a million dollar factory for like a year or so.\r\n\r\nWe will demonstrate vulnerabilities on Siemens and Beckhoff PLC's. Both patched and non patched (as part of the protocol).", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7, 
                                        "name": "Tijl Deneut", 
                                        "biography": "", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 706, 
                                "guid": "74cf6b9d-8228-5fa7-be7a-a5cda7f69fd8", 
                                "logo": null, 
                                "date": "2018-12-28T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "3L8XYN", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/3L8XYN", 
                                "title": "Polizei Gesetz in Sachsen", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "Nein zum neuen saechsichen Polizeigesetz!", 
                                "description": "Der Referent*innen Entwurf f\u00fcr das neue s\u00e4chsische Polizeigesetz (S\u00e4chsisches Polizeivollzugsdienstgesetz \u2013 S\u00e4chsPVDG) wurde geleaked: download\r\n\r\nEinf\u00fchrung\r\n\r\nWenn es nach der s\u00e4chsischen Polizei geht, sind wir zuk\u00fcnftig alle verd\u00e4chtig. Wir alle sind eine potenzielle Bedrohung und m\u00fcssen mit Kameras, Maschinenpistolen und \u00dcberwachungstechnik in Schach gehalten werden. Der Staat scheint sich vor uns sch\u00fctzen zu wollen aber wie sch\u00fctzen wir uns eigentlich vor dem Staat?\r\n\r\nIm s\u00e4chsischen Landtag wird derzeit \u00fcber ein neues Polizeigesetz verhandelt. In Bayern soll ein \u00e4hnliches Gesetz verabschiedet werden und st\u00f6\u00dft auf viel Widerstand.\r\nNicht umsonst wird der (bayerische) Entwurf als \u201esch\u00e4rfstes Polizeigesetz seit 1945\u201c bezeichnet: Die Polizei soll umfangreiche neue Befugnisse erhalten, selbstst\u00e4ndig Grundrechte einschr\u00e4nken und uns alle \u00fcberwachen und bespitzeln d\u00fcrfen. Gleichzeitig werden die Einheiten milit\u00e4risch aufger\u00fcstet und bewaffnet. Hier werden Freiheitsrechte und die Unschuldsvermutung mit F\u00fc\u00dfen getreten. Es wird verst\u00e4rkt ein Klima der Angst und des gegenseitigen Misstrauens geschaffen. Der Rechtsstaat ver\u00e4ndert sich immer mehr hin zu einem autorit\u00e4ren Polizeistaat. Diese Entwicklung betrifft uns alle!\r\n\r\nAngriff auf Grundrechte\r\n\r\nDas Gesetz gibt der Polizei Befugnisse bei einer \u201edrohenden Gefahr\u201c und gegen\u00fcber sogenannten Gef\u00e4hrdern. Die s\u00e4chsische Polizei k\u00f6nnte dann bei blo\u00dfen Vermutungen ermitteln, ohne dass \u00fcberhaupt ein Verbrechen begangen wurde oder ein begr\u00fcndeter Verdacht vorliegt. Das bedeutet: Die Polizei kann quasi gegen jede/n ermitteln. So w\u00fcrde das Polizeigesetz die Unschuldsvermutung au\u00dfer Kraft setzen.\r\nEine Art Hausarrest (Aufenthaltsgebot \u00a721) bis zu drei Monaten kann die Polizei verh\u00e4ngen, auch ohne richterlichen Beschluss. Dies kann sie mittels elektronischer Fu\u00dffesseln durchsetzten. Jede Privatsph\u00e4re von Betroffenen kann ohne konkreten Vorwurf ausgehebelt werden. Auch Verd\u00e4chtige und Verurteilte haben Grundrechte. Das unterscheidet einen Rechtsstaat vom Polizeistaat.\r\nMit dem neuen Polizeigesetz soll auch der besondere Schutz f\u00fcr Journalist/Innen und Beratungsstellen aufgehoben werden. Die Polizei darf diese dann auch nach eigenem Ermessen abh\u00f6ren und \u00fcberwachen. Das ist ein drastischer Eingriff in die Pressefreiheit und gef\u00e4hrdet das Vertrauen in diese Institutionen.\r\nDas neue Polizeigesetz r\u00fcttelt an der k\u00f6rperlichen Unversehrtheit, der pers\u00f6nlichen Freiheit, dem Recht auf informationelle Selbstbestimmung, dem Briefgeheimnis, der Unverletztlichkeit der Wohnung. Das Gesetz ist ein Angriff auf unsere Grundrechte und die Grundfesten des Zusammenlebens. Das k\u00f6nnen wir nicht hinnehmen!\r\n\r\nRassismus und Abschottung\r\n\r\nViele der Ma\u00dfnahmen, die im Gesetz vorgesehen sind, richten sich offensiv gegen Gefl\u00fcchtete und Menschen, die nicht in Deutschland geboren sind. Die Einstufung von Refugee-Unterk\u00fcnften als sogenannte \u201egef\u00e4hrliche Orte\u201c stellt alle dort Lebenden unter Generalverdacht und l\u00e4sst zu sie jederzeit zu kontrollieren. Hausarrest und technische \u00dcberwachung erleichtern es, Menschen jederzeit orten und abschieben zu k\u00f6nnen.\r\nSt\u00e4rkere Grenzkontrollen mithilfe von Video\u00fcberwachung und Gesichtserkennung dienen nicht der allgemeinen Sicherheit sondern der Abschottung nach au\u00dfen.\r\nDer Staat nimmt sich hier das Recht, Menschen als Kriminelle zu behandeln, sie zu bevormunden und zu schikanieren und das ausschlie\u00dflich auf Grund ihrer Hautfarbe und Herkunft. Das ist keine Sicherheitspolitik, das ist rassistische Ausgrenzung. Flucht ist kein Verbrechen \u2013 Bewegungsfreiheit ist Menschenrecht!\r\n\r\n\u00dcberwachung um jeden Preis\r\n\r\nDas neue Gesetz w\u00fcrde die Video\u00fcberwachung noch mehr ausweiten: Auch die Polizeibeh\u00f6rden, also die Kommunen, sollen k\u00fcnftig mit Kameras \u00fcberwachen d\u00fcrfen. Kennzeichen, Ort, Zeit und Fahrtrichtung von Autos soll die Polizei zu bestimmten Anl\u00e4ssen automatisch erfassen d\u00fcrfen. In grenznahen Gebieten soll sogar automatische Gesichtserkennung erm\u00f6glicht werden.\r\nDer \u00d6ffentliche Raum wird so immer mehr \u00fcberwacht. Der Staat soll \u00fcberall zuschauen.\r\nZusammen mit den vielen digitalen \u00dcberwachungsprogrammen f\u00fchrt das zum \u201egl\u00e4sernen Menschen\u201c. Wir lassen uns nicht belauschen und \u00fcberwachen. Wir haben ein Recht auf Privatsph\u00e4re!\r\n\r\nGrungrechte statt Polizeisonderrechte\r\n\r\nAuch Polizeibeamt*innen im Dienst begehen Straftaten. Es kommt jedoch selten zu Prozessen gegen sie und sie werden praktisch nie verurteilt, obwohl Betroffene Anzeige erstatten. . Wir fordern dagegen, auch Polizist*innen zur Verantwortung zu ziehen: Mit einer Kennzeichnungspflicht k\u00f6nnten Beamt*innen nach Straftaten juristisch verfolgt werden. Eine Beschwerdestelle k\u00f6nnte ein Beginn sein, Polizei zu kontrollieren und Missst\u00e4nden entgegenzuwirken \u2013 wenn sie unabh\u00e4ngig ist. Das w\u00fcrde die Grundrechte Aller st\u00e4rken.\r\nStattdessen bleiben diese wiederholten Forderungen unbeachtet, Polizist*innen \u201ekontrollieren\u201c sich gegenseitig und interne Ermittlungen enden weiterhin an einer Mauer des Schweigens. Keine andere Berufs- oder Bev\u00f6lkerungsgruppe hat solche Sonderrechte.\r\n\r\nParagraphen\r\n\r\nMilitarisierung, Bewaffnung (\u00a740)\r\n\r\nEinige Polizeieinheiten tragen k\u00fcnftig Handgranaten, Maschinengewehre und anderes milit\u00e4risches Equitment.\r\n\r\nHausarrest & Fu\u00dffesseln (\u00a721)\r\n\r\nDie Polizei kann dir zuk\u00fcnft verbieten dich an bestimmten Orten aufzuhalten, dir den Kontakt zu bestimmten Menschen untersagen, dich zwingen einen festen Bereich nicht zu verlassen oder dich unter Hausarrest stellen. Dazu darf sie dich auch zwingen eine elektronische Fu\u00dffessel zu tragen.\r\n\r\nVideo\u00fcberwachung, Gesichtserkennung (\u00a7 15, \u00a7 58 sowie \u00a7 30 PVB)\r\n\r\nZuk\u00fcnftig dar der \u00f6ffentliche Raum noch st\u00e4rker video\u00fcberwacht werden. Dazu darf auch Gesichtserkennungstechnik und Kennzeichenerfassung eingesetzt werden. Es kann dadurch genau erfasst werden, wann du dich wo in diesen Bereichen aufgehalten hast. Auch das Ordnungsamt und die Kommunen d\u00fcrfen diese Technik einsetzen. Sie ist nicht auf konkrete Ermittlungen beschr\u00e4nkt.\r\n\r\nTelefon- und Handy\u00fcberwachung (\u00a7\u00a7 66-70)\r\n\r\nZuk\u00fcnftig d\u00fcrfen Polizeibeamte nicht nur Telefonate abh\u00f6ren, sondern sie auch unterbrechen. Das gilt auch f\u00fcr ganze Funkmasten. Der Handyempfang kann so etwa in ganzen Gebieten (etwa bei Demos) unterbrochen werden. Au\u00dferdem d\u00fcrfen auch die Bestandsdaten eines Mobiltelefons ausgelesen werden. Also: Name, Adresse, Kontodaten, PIN & PUK Nummer, gespeicherte Passw\u00f6rter, alles Accountzug\u00e4nge auf dem Telefon, Mailaccounts und gespeicherte Bilder und Kontakte.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 13, 
                                        "name": "Anarchist Black Cross Dresden", 
                                        "biography": "Anarchist Black Cross Dresden ist ein Kollektiv von Menschen das sich zum Ziel gesetzt hat Ideen \u00fcber Anarchismus und Solidarit\u00e4t zu verbreiten. Wir organisieren gemeinsame Abende um Briefe an Gefangene zu schreiben, Spendenaktionen und Vort\u00e4ge, die \u00fcber verschiedene Orte der Welt informieren. Durch das Verbreiten von Informationen \u00fcber Gefangene und Repression gegen soziale Bewegungen, hoffen wir Menschen in Dresden Mechanismen von Repression aufzuzeigen, um diese besser bek\u00e4mpfen zu k\u00f6nnen und eine Kultur der Solidarit\u00e4t in der Gesellschaft zu entwickeln.\r\n\r\nABC Dresden unterst\u00fctzt anarchistische und antiauthorit\u00e4re Aktivist*innen, deren Ideen anarchistische Grunds\u00e4tze nicht wiedersprechen. Wir unterst\u00fctzen auch Menschen, die w\u00e4hrend ihrere Zeit im Gef\u00e4ngnis Anarchist*innen werden.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 713, 
                                "guid": "8e6aecc6-acbb-52bb-87be-2d06f0ff0640", 
                                "logo": null, 
                                "date": "2018-12-28T20:30:00+01:00", 
                                "start": "20:30", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "EQPXLK", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/EQPXLK", 
                                "title": "M.A.R.V.I.N.", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "In Chemnitz wurde seit Fr\u00fchjahr 2016 eine \u00dcberwachung der Innenstadt geplant und zum 1. Oktober 2018 umgesetzt. In einem kurzen Abriss werden die Ereignisse zusammengefasst, die eingesetzte Technik vorgestellt und anschlie\u00dfend die parallele Entstehung einer Antwort vorgestellt.", 
                                "description": "Als es hie\u00df, dass  Chemnitz im gro\u00dfen Stil video\u00fcberwacht werden soll, sa\u00dfen wir in Chemnitz zusammen und haben \u00fcber eine Antwort nachgedacht. Langsam entstand die Idee, die \u00dcberwacher zu \u00fcberwachen. In reichlich einem Jahr ist MARVIN entstanden, w\u00e4hrend parallel immer neue Meldungen und Erkl\u00e4rungen der Stadt zur die Presse geisterten. Am 1. Oktober war es so weit, ein Gro\u00dfteil der Kameras ging online. P\u00fcnktlich hatte auch MARVIN seinen Auftritt und rief erste Reaktionen auf den Plan. Eine fernsteuerbare Drohne mit Kamera auf Augenh\u00f6he f\u00fchr und f\u00e4hrt nun durch die Stadt und soll die \u00dcberwachung ins Blickfeld zur\u00fcckholen. Die Geschichte um die Kameras in der chemnitzer Innenstadt soll aber noch nicht abgeschlossen sein, da Sie nun auch den s\u00e4chsischen Landtag besch\u00e4ftigen", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 18, 
                                        "name": "DaTa", 
                                        "biography": "Seit ca. 5 Jahren im Chaostreff Chemnitz aktiv, versuche ich Kunst, Kultur und Technik in einer Stadt mit vielen Potentialen unter einen Hut zu bringen.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 716, 
                                "guid": "0935bbb5-3f02-54f0-ad72-d204de35fbd6", 
                                "logo": null, 
                                "date": "2018-12-28T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "V9T9UR", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/V9T9UR", 
                                "title": "livestream - The Ghost in the Machine (Joscha)", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "Livestream from Room Adams", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 20, 
                                        "name": "livestream", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Vortrags-Arena": [
                            {
                                "id": 303, 
                                "guid": "ae80ba34-8a38-566f-bf6e-506a525f7a96", 
                                "logo": "", 
                                "date": "2018-12-28T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "00:30", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "ZJ99EX", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/ZJ99EX/", 
                                "title": "OIO habour clean up", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "OIO Housekeeping", 
                                "language": "en", 
                                "abstract": "daily habour clean up @ OIO", 
                                "description": "daily habour clean up @ OIO", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 93, 
                                        "code": "HUQ9YA", 
                                        "public_name": "35c3oio@freifunk.space", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 280, 
                                "guid": "a6bf60a6-dc23-5df1-9eea-eedbe8650994", 
                                "logo": "", 
                                "date": "2018-12-28T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "FCADXP", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/FCADXP/", 
                                "title": "OIO Daily Standup day 2", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "Let's start into day 2", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6, 
                                        "code": "HFER8G", 
                                        "public_name": "Andreas Dorfer", 
                                        "biography": "https://forum.freifunk.net/u/adorfer/", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 278, 
                                "guid": "a5cd48d1-6d8c-5be9-a17b-f229db0e3689", 
                                "logo": "", 
                                "date": "2018-12-28T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "V8RTSW", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/V8RTSW/", 
                                "title": "Open Prototype Fund", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "en", 
                                "abstract": "The Prototype Fund is a funding program for Public Interest Techfirst of its kind in Germany and supports independent software developers, hackers and creative people in implementing their open source ideas from concept to first demo. Since 2016, we (Adriana, Elisa, Fiona, Julia and Katharina) have been working to break down existing structures and narratives in the field of innovation funding and to encourage meaningful digital solutions for society in Software Infrastructure, IT-Security, Data Literacy and Civic Tech. We want to get to know you and your ideas and talk about how we, together with politicians, developers and other initiators from the (active) civil society, can best support, develop and make visible good digital-social innovation practices from the perspective of the community. Which decisions are necessary in the future, what are meaningful political demands? And which are the next big things in Tech? Get to know us, ask us everything, recover from the hustle and bustle of the congress!", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 81, 
                                        "code": "BBLK3X", 
                                        "public_name": "Katharina Meyer", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 292, 
                                "guid": "1e5859eb-8231-57c1-a0b4-083215923cd4", 
                                "logo": "", 
                                "date": "2018-12-28T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "7BRU3D", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/7BRU3D/", 
                                "title": "Empowering rural Africa using the freifunk model", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "envisioning a thriving, connected future amidst conflict-struck Nigeria. Creating opportunities for rural women and youth, in a scalable, inclusive way.", 
                                "description": "###About the presenter\r\nPaul Henckel from TribeGroup (DK-based) will share his thoughts and plans for an ongoing resilience project with Fantsuam (NG-based) in creating ICT coworking spaces for rural women and youths in Nigeria, using the knowledge from Freifunk communities. \r\n\r\n###About TribeGroup\r\nTribeGroup is a Danish impact investment startup with mission to support or invest in other companies, projects or initiatives that have a potentially high social or environmental impact. It currently directs WorkHive, a flexible, affordable, inclusive and carbon negative coworking space in Copenhagen. The collaboration with Nigerian-based Fantsuam tries to integrate best practices of Freifunk, Fantsuam and WorkHive to create a new coworking space in Kafanchan, Nigeria.\r\n\r\n###About Fantsuam\r\nOur Mission at Fantsuam Foundation (www.fantsuam.org) is to eliminate poverty and disadvantage among rural women and youths in Nigeria through integrated development programs. At our ICT Academy,In 22 years, we have empowered 12,000, and we aim to educate women and youths with relevant digital literacy skills to manage their development priorities, providing opportunities for girls to become developers and deploy ICT solutions for their livelihoods. Our services have become even more imperative as our communities come out of decade long cycles of sectarian violence. We plan to reach 25,000 more by 2020.\r\n\r\nCommunity Network, is a resilient communication platform in which the community owns, manages and maintains its own communication infrastructure provides the opportunities for rural youths to gain the necessary hands-on experience. Fantsuam Foundation hosts the Google Developers Group in Kafanchan, this is another resource that is being deployed to provide ICT skills and knowledge opportunities for our youths.\r\n\r\nWe are now  engaged in high level policy advocacy for affordable and available internet access for the unconnected in rural Nigeria. Obtaining the TVWS concession for the unconnected in Nigeria will begin to make for an inclusive national telecommunication effort. It is within that context that Fantsuam continues to support the increasing number of youths, particularly females, who now recognise the career opportunities available in ICT. Our ICT Academy provides basic digital literacy training and has expanded to provision of training in computer and network maintenance. In order to optimise the use of resources and make our services more accessible, we have located an office space in the Kafanchan Railway town where we would like to set up an ICT Co-Working space where budding entrepreneurs can have ready access to training and mentoring facilities, office space with assured power and internet access at affordable prices.\r\n\r\nOur efforts at tackling poverty through an integrated approach has meant that we also provide social services in public health, menstrual health hygiene, sanitation marketing, peace building, entrepreneurship training supported by microfinance. We currently have 32 full time staff and a large pool of volunteers who are invited to join specific projects and programs, which are usually of short duration. Our work in peace building led us to build six new apartments for victims of recent sectarian crisis, and we continue to explore opportunities to enable our communities to resume their normal lives. Our model of farming cooperatives, called the TIME-AID, empowers individuals and families to engage in commercial farming with the goal of household food security, family health insurance, adequate housing and education for all our children.\r\n\r\nFantsuam Foundation\u2019s integrated approach to develop has enabled it to have an inbuilt resilience to cope with the challenges of rural development, global economic challenges whose effects are usually more devastating at the base of the pyramid, while we continue to develop initiatives that helps the people to assert their humanity and freedom from poverty.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 76, 
                                        "code": "EWPH87", 
                                        "public_name": "Paul Henckel", 
                                        "biography": "Let me cut it short: *I'm basically a care-taker.* \r\nI care for you, and I care for myself, and I care for our mutual existence on this planet.\r\nIf I should recap my life then this aspect is pretty much the essence of me actually. I grew up with my mum and big sister and times werent always easy, so I learned to care because there was no other option than that to make our life work.\r\n'Caring for others' became a big part of me, so as I went into adolescence and adulthood I see patterns that I was stressing my self out too much in trying to find new people to 'care for', new relations. We all know where that kind of behavior goes, when 'caring runs rampant' and you try care for people who dont care similarly for you -> stress, depression, anxiety, fear of rejection, etc.\r\nThat was OK too, because that in turn taught me a lot about caring for myself...\r\nGo read some more on the anthropological and socio-economic aspects of caretaking, it's a very interesting topic if not a form of art/craft in itself.\r\n\r\nGiving back to the world\r\nI'm also a philosopher, software developer, mathematician, statistician, data visualiser, test engineer, consultant, entrepreneur, photographer, inventor, permaculture designer, volunteer, counsellor, , interaction designer, ethnographer, business developer, market analyst, etc. and am truly blessed with many close friends that I can team up with to co-create 'truly good stuff with a focus and a purpose'.\r\nI'm currently working on WorkHive - the tagline of which is 'Making space for people and plants to be productive'. It's a co-working space for the self-employed, students and 'struggling' (unemployed, seniors, etc) to sit together and work on their own projects, or team up at different workshops and attend seminars. It's a networking platform, enabling people to be more productive on their own things, and to get inspiration from others in the same or different situations and with different perspectives - being able to do short, informal reviews of your own work in a safe space together with an 'unwilling third person' has a huge implication for the success of your work before sending it out to your real audience in the big world.\r\n(What about the plants? Yeah, I will tell you about it when you have signed up, but as you know I'm into permaculture, sustainable livelihoods, aquaponics and I have quite a few good horticulturist friends and biologists who are helping me do some amazing stuff)\r\n\r\nThank you for your time, create the world you want to live in, today!\r\nPaul Olutokunbo Kristian Henckel-Ojo", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 310, 
                                "guid": "6d0ea2d9-aa91-5bba-84af-21dd73038d81", 
                                "logo": "", 
                                "date": "2018-12-28T13:30:00+01:00", 
                                "start": "13:30", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "SWS3WR", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/SWS3WR/", 
                                "title": "Careables: Open Source Hardware in Health+Care [Introduction]", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "Careables", 
                                "description": "Calling all hackers, designers, makers, carers, and healthcare professionals!\r\n\r\nWhat are challenges you face every day using standard tools for health and wellbeing? Do you have an idea that makes everyday life easier? How could you use your existing hackerspace to foster exchange and collaboration in health and care?\r\n\r\nThrough Careables, maker and designer collaborate with patients and healthcare professionals to create personalized solutions and open source knowledge that will improve the lives of many patients and professionals.\r\n\r\nAccessible, comprehensive and easy to use open source hardware are being documented, collected and shared through the platform Careables.org. This platform is currently being launched and will function as repository for well documented open hardware projects. It offers many different communities a place to connect and exchange knowledge, needs and co-create solutions.\r\n\r\nIt's easy to think of open hardware that make a difference in people's lives. An example of this is OPEN LIGHTS. This project offers people with wheelchairs an adjustable wheelchair specific light that makes them better visible at night and that can be built with most common DIY technologies.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 96, 
                                        "code": "P3GLDY", 
                                        "public_name": "Sandra GIG", 
                                        "biography": "tl;dr: GIG is the global network of social and technological innovators. #wearegig\r\n\r\nGlobal Innovation Gathering (GIG) is a vibrant, diverse community of innovation hubs, makerspaces, hackerspaces and other grassroot innovation community spaces and initiatives as well as individual innovators, makers, technologists and changemakers. GIG is pursuing a new vision for global cooperation based on equality, openness and sharing. We aim to enable more diversity in the production of technology, and global innovation processes and support open and sustainable solutions developed by grassroot innovators. With strong roots in the global south, we share, collaborate and work together globally. GIG provides a platform for meaningful exchange by fostering knowledge exchange and collaboration between its members.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 231, 
                                "guid": "2ff22102-25a3-5bd9-8e77-ef169442f6a8", 
                                "logo": "", 
                                "date": "2018-12-28T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "00:42", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "WUBRSK", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WUBRSK/", 
                                "title": "GSoC 2018 - project presentations", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "Some students will present results of their projects", 
                                "description": "* zoobab shows \"MultipathTCP and Openwrt improvements with eBPF\"\r\n* mwarning talks about the \"Meshenger App\"", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7, 
                                        "code": "USJAK9", 
                                        "public_name": "Andreas Br\u00e4u", 
                                        "biography": "Freifunker since 2006", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 269, 
                                "guid": "eb03cae4-9fb8-5ac6-b3b6-132cd07a7db0", 
                                "logo": "", 
                                "date": "2018-12-28T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "V3XY87", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/V3XY87/", 
                                "title": "Project Parker: Klassisches Routing f\u00fcr Freifunk", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "de", 
                                "abstract": "Gluon mit BATMAN setzt klassisch auf ein gro\u00dfes Layer 2 Netz, was in den gro\u00dfen Freifunk Communities zu Problemen f\u00fchrt. Mit unseren Bem\u00fchungen in \"Project Parker\" versuchen wir diese Probleme durch den Einsatz von klassischem Routing zu umgehen. In unserem Talk stellen wir unsere Architektur vor und zeigen welchen Stand unsere Umsetzung erreicht hat.", 
                                "description": "Gluon mit BATMAN setzt klassisch auf ein gro\u00dfes Layer 2 Netz, was in den gro\u00dfen Freifunk Communities zu Problemen f\u00fchrt. Diese Communities begegnen den Problemen i.d.R. mit der Segmentierung des Netzes in Domains. Innerhalb dieser Domains wird allerdings das klassische Netz (BATMAN) eingesetzt.\r\n\r\nMit \"Project Parker\" versuchen wir diese Probleme durch klassisches Routing in einem hierarchischem Netz zu l\u00f6sen: Jeder Freifunk-Knoten mit Uplink ist Gateway f\u00fcr sein Netzsegment, macht DHCP und ist DNS-Cache. Das Routing mit BATMAN beschr\u00e4nkt sich nun auf kleine Mesh-Netze innerhalb des gesamten Netzes.\r\n\r\nWir stellen in unserem Talk unsere Architektur vor und zeigen welchen Stand unsere Umsetzung erreicht hat.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 61, 
                                        "code": "LWSSPE", 
                                        "public_name": "Chris Fiege und Jan L\u00fcbbe", 
                                        "biography": "Chris Fiege (chrissi^) und Jan L\u00fcbbe (shoragan) sind ein Teil der Technik-Abteilung beim Freifunk Braunschweig.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 296, 
                                "guid": "d69cd444-9df3-5e9b-a79f-b70b7b3ec98d", 
                                "logo": "", 
                                "date": "2018-12-28T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "01:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "BBGXPY", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/BBGXPY/", 
                                "title": "Wem ist noch zu helfen", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 80min total (etwa 30min  Q&A)", 
                                "language": "de", 
                                "abstract": "Global NGO Players vs. (linke) Grassroots-Gruppen - wer entscheidet, wem wann wie geholfen wird...und wo verkommt humanit\u00e4re Praxis zum politischen Spielfeld", 
                                "description": "Aus Kritik am humanit\u00e4ren System der UN und seinen beteiligten Gro\u00df-NGOs haben sich viele (linke) Grassroots-Gruppen gegr\u00fcndet. Auch diese k\u00f6nnen nat\u00fcrlich nicht ohne finanzielle Mittel arbeiten, und sind somit auf Spenden, ergo auf \u00d6ffentlichkeitsarbeit angewiesen. \r\nWie entscheiden die \"Gro\u00dfen\" wann und wie und wem geholfen wird? Welche L\u00fccken bleiben dabei (zwangsl\u00e4ufig)?\r\nUnd wie werden diese Entscheidungen bei den Grassroots getroffen? Und welche Auswirkungen auf die Wahrnehmung von Krisen hat ihre \u00d6ffentlichkeitsarbeit? \"Trommeln geh\u00f6rt  zum Handwerk\", aber wo l\u00e4uft linkes humanit\u00e4res Engagement Gefahr, in rein politisch motivierten Aktivismus abzudriften? Und wenn das schlimm ist, warum? \r\nEine kritische Betrachtungsweise.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 60, 
                                        "code": "PFDWBY", 
                                        "public_name": "Sebastian", 
                                        "biography": "CEO von CADUS e.V.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 267, 
                                "guid": "0519cc1f-4c12-53f0-a83d-5958edcfc148", 
                                "logo": "/media/35c3oio/images/KB9VRZ/who-owns-your-data.png", 
                                "date": "2018-12-28T18:30:00+01:00", 
                                "start": "18:30", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "KB9VRZ", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/KB9VRZ/", 
                                "title": "Get your data back under control - 200 things you can do with Nextcloud", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "en", 
                                "abstract": "We live in a world of data theft and broken clouds and I believe it is time to decentralize, host at home or a local provider we trust. Nextcloud is an option that can take care of many of your file sync'n'share, chat and document editing needs, and I'll show how and why!", 
                                "description": "The data from many people is floating around on 'clouds', regularly stolen and traded. We need to decentralize, host ourselves or at a large number of small, local providers we can trust! Probably the most used solution for that today is Nextcloud, which through its app ecosystem of almost 200 apps can be extended to do lots of things.\r\n\r\nWith Nextcloud you can sync and share files, access your calendars and contacts, share holiday pictures with your family or play music. But also manage your passwords, track your phone through GPS, draw, read news, chat and have audio/video calls, read mail, manage tasks and much more.\r\n\r\nThe community has developed almost 200 apps that do all that and more, and loads of tutorials on how to install Nextcloud on a Nuc, in a VM, on a raspberry Pi and more. If self-hosting isn't realistic for you, we have Simple Signup which sets you up at a Nextcloud hosting provider close to you in a few clicks.\r\n\r\nThis talk is for people not yet familiar with Nextcloud!", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 59, 
                                        "code": "KMKHUZ", 
                                        "public_name": "Jos Poortvliet", 
                                        "biography": "People person, technology enthusiast and all-things-open evangelist. Doing marketing at Nextcloud, previously Community Manager at ownCloud and SUSE, recovering business consultant with decade long involvement in the KDE community. Enjoys avoiding traffic and public transport on bike through Berlin, but only when the weather is good. Loves cooking for friends and family and playing with the dog.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 214, 
                                "guid": "b0e5ac97-960a-516c-a1ac-5cda9129b0f4", 
                                "logo": "", 
                                "date": "2018-12-28T19:30:00+01:00", 
                                "start": "19:30", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "ELUSFV", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/ELUSFV/", 
                                "title": "Menschenrechte, Bildung, open infrastructure", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "de", 
                                "abstract": "Die 3 Begriffe werden beleutet und Zusammenh\u00e4nge hergestellt", 
                                "description": "Heute hat sich eindeutig das Internet durchgesetzt und es stellt sich die Frage, wie gehen wir damit um. Die AkteurInnen im Internet sind Menschen oder von Menschen gemachte Programme. Als Grundlage im Internet sollten die nun schon 70 Jahre alten Menschenrechte gelten. Auch im Bildungsbereich ver\u00e4ndert das Internet die bisherigen Strukturen unseres Bildungssystems, mMn sogar weltweit. Menschen begegnen sich auf Augenh\u00f6he. Die open infrastructure hilft dabei Bildung f\u00fcr Menschen zug\u00e4nglich zu machen und Menschen ein selbstbestimmtes Leben f\u00fchren zulassen. Die \"Hierachien im Kopf\" werden von dem realistischen Denken \"wir sind alle gerade jetzt auf der Oberfl\u00e4che von Planet Erde auf Augenh\u00f6he\" abgel\u00f6st. Dies ist der Prozess, den wir gerade in vielen Bereichen unserer Gesellschaft beobachten.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 16, 
                                        "code": "TRQPDR", 
                                        "public_name": "Peter Babnik (Petergoge)", 
                                        "biography": "Ich komme aus Koblenz und bin \"Musik-Peter-goge\". Mich interessiert die derzeitige technische Entwicklung und daher mache ich gerne bei 35c3 mit. LG Peter", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 273, 
                                "guid": "ee10b98c-7538-5354-b486-66e363cbb44f", 
                                "logo": "/media/35c3oio/images/W9RHXR/TL-WR841ND-01.png", 
                                "date": "2018-12-28T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "W9RHXR", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/W9RHXR/", 
                                "title": "Fight for the bytes! Fun with Four Megabytes Flash", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "The majority of Freifunk mesh routers only have 4mb flash and 32mb memory. The talk wants to start a discussion about possibilities and limits for future support of these devices.", 
                                "description": "Lot's of mesh communities and even OpenWrt want to drop support for 4mb flash / 32mb memory devices. Where is the size and memory increase coming from? Can we do it in a different way or do we have to accept defeat? \r\n\r\n- Forcing OpenWrt to diet: What knobs can we tweak? What gains and tradeoffs can we expect?  \r\n- A short introduction to ubus over HTTP\r\n- Stupid ideas and experiments.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 70, 
                                        "code": "AFNDA9", 
                                        "public_name": "mt", 
                                        "biography": "weimarnetz.de", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 312, 
                                "guid": "b4fdd0df-1969-5b9e-9bf1-277eb1411d6b", 
                                "logo": "", 
                                "date": "2018-12-28T22:30:00+01:00", 
                                "start": "22:30", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "DAN8AX", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/DAN8AX/", 
                                "title": "Wifi4EU - broken by technical specification", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "en", 
                                "abstract": "With the Wifi4EU programm the EU is planning to spend 100 million \u20ac by 2020 to subsidise a centralized surveillance infrastructure for centers of public life in the EU. The talk will lay out how Wifi4EU is supposed to work both administratively and technically, where there are problems with the later and what is and can be done about it.\r\n\r\nSlides: https://zenodo.org/record/2527538#.XCUXplxKjIU", 
                                "description": "With the Wifi4EU programm [1] the EU is planning to subsidies the installation of free Wi-Fi with 120 million \u20ac until 2020. The installations are planned to be \"... free of charge, free of advertising and free from commercial re-use of data. ...\" [2] and aim \"... to equip every European village and every city with free wireless internet access around the main centres of public life. ...\" [1]\r\n\r\nUnfortunately the technical specifications implemented in the first call on the 7th - 9th of November [3] tell a different story. So far 42 Million \u20ac are planned to be spend in a flawed design.\r\n\r\nAmongst other problems they include:\r\n\r\n* requirements for a centralized authentification infrastructure - like eduroam [4] (FAQ 23),\r\n* inherent IT security problems - embedded snippets in the captive portals [4] (FAQ 26) and\r\n* proprietary standards - hotspot 2.0. [4] (FAQ 27)\r\n\r\nFollowing a talk at the wireless community weekend in May this year [5] the talk will include:\r\n\r\n* a short introduction to the programm,\r\n* how it came to be,\r\n* what happend so far\r\n* the implications of the programm\r\n* what can be done to fix things.\r\n\r\nBesides contacting the european comission, several members of the european parlament and Klaus Landefeld of the eco [6] we were able to get members of the german Bundestag to get interested in the issue [7]. This led to a \"schriftliche Anfrage\" towards the Bundesregierung regarding the GDPR compliance of the authentification infrastructure, the situation is currently evolving.\r\n\r\nThe talk aims to inform about the current state of affairs and hoefully foster a discussion during the congress what can and should be done to prohibit the creation of yet another surveillance infrastructure and what a desirable public Wi-Fi infrastructure should look like.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 22, 
                                        "code": "EWR9DF", 
                                        "public_name": "Gregor Bransky", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 313, 
                                "guid": "8b2ce950-136c-53a5-89ff-7acde44faca2", 
                                "logo": "", 
                                "date": "2018-12-29T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "00:40", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "GYT733", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/GYT733/", 
                                "title": "9DoorsOpen - audiivisueller 35min Trip", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "en", 
                                "abstract": "10 Jahre Schaffensphase, 20.000.000 Fotodateien, \r\n9 Doors Open ist ein k\u00fcnstlerisches Langzeitprojekt, eine meditativ psychedelisch, audiovisuelle Reise.", 
                                "description": "F\u00fcr Fans von: Ambient, Doom, Dronemusik, visuelle Kunst, psychedelische Trips, Meditation, Bewusstseinserweiterung\r\n\r\nAndreas Voland (Musiker) und Steffen Freiling (Fotograf) verschieben in ihrem gemeinsamen Werk die Dimensionen Raum und Zeit und geben so die M\u00f6glichkeit, die uns bekannte Realit\u00e4t in vielf\u00e4lltigsten Formen neu zu entdecken.\r\n\r\nAm 2. Februar findet im Friedrichshainer Zukunft am Ostkreuz (Laskerstr. 5, 10245 Berlin die Auff\u00fchrung statt.\r\n\r\nHier auf dem CCC schon vorab.", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 97, 
                                        "code": "U9QGT3", 
                                        "public_name": "Andreas", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Workshop-Domo": [
                            {
                                "id": 288, 
                                "guid": "c225c6dc-8f35-50e7-b4b1-f83f2022577d", 
                                "logo": "", 
                                "date": "2018-12-28T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "00:45", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "RPSCUR", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/RPSCUR/", 
                                "title": "Nudeln hacken f\u00fcr Junghacker von 5 Jahren bis \u221e (Session 1)", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 45min", 
                                "language": "de", 
                                "abstract": "Spa\u00df am Ger\u00e4t: Mehrere Teams bauen gleichzeitig mit Nudeln um die Wette.", 
                                "description": "Was man aus Nudeln alles machen kann ... Junghacker bzw. solche die es werden wollen k\u00f6nnen alleine oder als Team kommen. Es kann jeder mitmachen, der wei\u00df was eine Nudel ist.\r\n\r\nErwachsene d\u00fcrfen auch mitmachen - werden aber wahrscheinlich gegen den Nachwuchs verlieren :-D\r\n\r\nPS: Erwachsene nur, so lange sie den Junghackern kenen Platz wegnehmen. \r\nPPS: Man kann auch mit Glutenallergie bedenkenlos teilnehmen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 74, 
                                        "code": "73PEWU", 
                                        "public_name": "Stefan Safari", 
                                        "biography": "Ich bin Nudelfan, dreifacher Vater und freue mich auf den Congress.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 289, 
                                "guid": "ba5c1095-2bc6-5ee7-9493-17fb51091346", 
                                "logo": "", 
                                "date": "2018-12-28T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "00:45", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "NXGUVK", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/NXGUVK/", 
                                "title": "Nudeln hacken f\u00fcr Junghacker von 5 Jahren bis \u221e (Session 2)", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 45min", 
                                "language": "de", 
                                "abstract": "Spa\u00df am Ger\u00e4t: Mehrere Teams bauen gleichzeitig mit Nudeln um die Wette.", 
                                "description": "Was man aus Nudeln alles machen kann ... Junghacker bzw. solche die es werden wollen k\u00f6nnen alleine oder als Team kommen. Es kann jeder mitmachen, der wei\u00df was eine Nudel ist.\r\n\r\nErwachsene d\u00fcrfen auch mitmachen - werden aber wahrscheinlich gegen den Nachwuchs verlieren :-D\r\n\r\nPS: Erwachsene nur, so lange sie den Junghackern kenen Platz wegnehmen. \r\nPPS: Man kann auch mit Glutenallergie bedenkenlos teilnehmen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 74, 
                                        "code": "73PEWU", 
                                        "public_name": "Stefan Safari", 
                                        "biography": "Ich bin Nudelfan, dreifacher Vater und freue mich auf den Congress.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 295, 
                                "guid": "00b000b4-fd0b-580d-8070-d2e4dd2d03fa", 
                                "logo": "/media/35c3oio/images/QSRLNA/Little_Detritus.jpg", 
                                "date": "2018-12-28T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "01:20", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "QSRLNA", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/QSRLNA/", 
                                "title": "Wifi4EU - how to fix it?", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 80min", 
                                "language": "en", 
                                "abstract": "Wifi4EU is currently broken by technical specifications. Within this workshop session I would like to kick of a discussion what a desireable infrastructure would look like and if it can be realized within the given political boundaries.\r\n\r\nThe issues with Wifi4EU will be outlined in the following talk:\r\nhttps://fahrplan.chaos-west.de/35c3chaoswest/talk/K39NLS/", 
                                "description": "tba", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 77, 
                                        "code": "QZCMD7", 
                                        "public_name": "Little Detritus", 
                                        "biography": "Freifunka aus Aachen der dar\u00fcber nachdenkt wie man sowas antiquiertes wie Privatsph\u00e4re behalten kann. Diskutiert gerade gerne dar\u00fcber wieso Wifi4EU - so wie gerade geplant - eine dumme Idee ist [1]. Man sich sonst Gedanken dar\u00fcber wie Kryptographie im Zeitalter von Quantencomputern aussehen kann [2]. Teilt Albernes und Ernstes auf Twitter unter @LittleDetritus\r\n\r\n[1] https://www.youtube.com/watch?v=YbPpK8_X9Qg\r\n[2] https://video.fsmpi.rwth-aachen.de/cccac/6131", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 307, 
                                "guid": "9ae3ed84-ba3e-5573-87f9-83c5210c1eb8", 
                                "logo": "", 
                                "date": "2018-12-28T18:30:00+01:00", 
                                "start": "18:30", 
                                "duration": "01:20", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "FUL8DG", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/FUL8DG/", 
                                "title": "Weimarnetztreffen", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 80min", 
                                "language": "de", 
                                "abstract": "Communitytreffen des Weimarnetzes", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 94, 
                                        "code": "Z7W7NQ", 
                                        "public_name": "Ren\u00e9 Hoffmann", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 315, 
                                "guid": "fe37d6a9-bea6-531b-be70-f2c4d7828a78", 
                                "logo": "", 
                                "date": "2018-12-28T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "01:00", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "ZXBCCJ", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/ZXBCCJ/", 
                                "title": "SatNOGS meeting (AOS)", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 45min", 
                                "language": "en", 
                                "abstract": "...", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 100, 
                                        "code": "7VMKDP", 
                                        "public_name": "bastla", 
                                        "biography": "Sebastian Lange (DL7BST), c3space, SatNOGS, AfuTUB/DK0TU", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 251, 
                                "guid": "072dc1fe-89cc-5387-8405-c7086b0f2687", 
                                "logo": "", 
                                "date": "2018-12-28T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "01:20", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "BEWPU3", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/BEWPU3/", 
                                "title": "Maritime Technik: How to Schiff", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 80min", 
                                "language": "de", 
                                "abstract": "Hier bekommt ihr eine kurze Einf\u00fchrung in die Welt der Nautik und der schwankenden Metallk\u00e4hne. Was gibt es da f\u00fcr Technik an Bord, wof\u00fcr wird es gebraucht und wie wird es benutzt. \u00dcberblick mit Schwerpunkt auf technischen Details.", 
                                "description": "Wir f\u00fchlen uns auf Schiffen zu Hause. Wir nutzen sie als vielf\u00e4ltiges Mittel zum Retten und Versorgen von Menschen in Not, um Menschenrechtsverletzungen auf See zu dokumentieren oder um gegen das Aussterben von Tierarten zu k\u00e4mpfen. \r\nDoch was h\u00e4lt eigentlich so ein Schiff zusammen? Wie steuert mensch es? Warum klingt unsere Kommunikation immer noch nach 19. Jahrhundert? Was ist eigentlich ein Ruderlagenanzeiger und wof\u00fcr braucht man Stevenrohr und Stopfbuchse?\r\nTechnisch-nerdige Antworten rund ums Schiff und eure Fragen.", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 46, 
                                        "code": "7W3VBM", 
                                        "public_name": "Nico", 
                                        "biography": "Aktivist, Segler und Schiffe.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "WikiPakaWG Esszimmer": [
                            {
                                "id": 501, 
                                "guid": "c1a547d9-2f53-5444-8e3c-6b6ebb26578d", 
                                "logo": "", 
                                "date": "2018-12-28T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "F9NUJT", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/F9NUJT/", 
                                "title": "Generative Art with Paper.js", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop mit Standard-Bestuhlung", 
                                "language": "de", 
                                "abstract": "The heck is Generative Art and what to do with it?\r\nThe workshop will give a short introduction into paper.js and how it can be used to generate art. Please bring your own laptop so we can code together a bit.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 2, 
                                        "code": "RBEKZW", 
                                        "public_name": "bleeptrack", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 516, 
                                "guid": "ded36d57-579c-524e-9bf8-a7477670608f", 
                                "logo": "", 
                                "date": "2018-12-28T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "WFA9YB", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/WFA9YB/", 
                                "title": "FragDenStaat User-Treffen", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "Alle Leute, die FragDenStaat und Informationsfreiheitsgesetze bereits nutzen oder nutzen wollen, sind herzlich eingeladen. Wir sprechen \u00fcber Neuerungen und Pl\u00e4ner f\u00fcr FragDenStaat.de und nehmen Kritik und Anregungen auf.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 17, 
                                        "code": "K38FMT", 
                                        "public_name": "Arne", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 41, 
                                        "code": "7U9YY3", 
                                        "public_name": "Stefan", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 40, 
                                        "code": "LJNMJA", 
                                        "public_name": "Filter", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 517, 
                                "guid": "fdf06e81-63a7-5a92-ac5a-053440cdf221", 
                                "logo": "", 
                                "date": "2018-12-28T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "00:30", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "883YLC", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/883YLC/", 
                                "title": "Einf\u00fchrung in Kubernetes Deployments f\u00fcr Codefor Labs", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "de", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 18, 
                                        "code": "8TKR3G", 
                                        "public_name": "Tobias", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 534, 
                                "guid": "b87a648f-d84d-5669-b472-3df1a7f8035d", 
                                "logo": "", 
                                "date": "2018-12-28T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "PXFGZ8", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/PXFGZ8/", 
                                "title": "Hebocon-Finale", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5, 
                                        "code": "BWRH7E", 
                                        "public_name": "Daniel", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 11, 
                                        "code": "B9E7PX", 
                                        "public_name": "Ilona", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 10, 
                                        "code": "VVLMZ9", 
                                        "public_name": "Robert", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 29, 
                                        "code": "MU8SYW", 
                                        "public_name": "Philip", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 518, 
                                "guid": "a9e3d617-edc2-545f-9271-30f820b1a559", 
                                "logo": "", 
                                "date": "2018-12-28T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "02:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "VX8N7K", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/VX8N7K/", 
                                "title": "Legal Documents Hack", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop mit Gruppentischen", 
                                "language": "de", 
                                "abstract": "Mit OffeneGesetze.de haben wir s\u00e4mtliche Bundesgesetzbl\u00e4tter seit 1949 frei ver\u00f6ffentlicht. Jetzt sollten wir die Dokumente auch angemessen nutzen. Hier besprechen wir, was man mit den Daten machen kann und was wir als n\u00e4chstes befreien sollten.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 17, 
                                        "code": "K38FMT", 
                                        "public_name": "Arne", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 40, 
                                        "code": "LJNMJA", 
                                        "public_name": "Filter", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 41, 
                                        "code": "7U9YY3", 
                                        "public_name": "Stefan", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 521, 
                                "guid": "51af7600-c483-505d-be4b-656a9fd72eac", 
                                "logo": "", 
                                "date": "2018-12-28T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "02:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "V7FCMD", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/V7FCMD/", 
                                "title": "Community Treffen Jugend hackt", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 5, 
                                        "code": "BWRH7E", 
                                        "public_name": "Daniel", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "WikiPakaWG K\u00fcche": [
                            {
                                "id": 504, 
                                "guid": "b4fda763-216c-5c9d-b850-f049efa09e9b", 
                                "logo": "", 
                                "date": "2018-12-28T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:30", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "R9SZCT", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/R9SZCT/", 
                                "title": "Orgameeting Tag 2", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 4, 
                                        "code": "33UT8A", 
                                        "public_name": "WikiPaka Orga", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 539, 
                                "guid": "a9053903-cfac-5d45-87d0-6711510c68e4", 
                                "logo": "", 
                                "date": "2018-12-28T15:00:00+01:00", 
                                "start": "15:00", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "LSDUED", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/LSDUED/", 
                                "title": "Ride Sharing, OpenData, Schnittstellen, Mitfahr-B\u00f6rsen, Fahrgemeinschaften, Trampen und mehr", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "We meet to talk about ride sharing. How to reduce the ecologic impact of traffic by more people riding in cars together. Some activists of the ride sharing ecosystem will be there and we would like to meet more people to grow. Topics will be tools, data and especiall ahot to imporove ride shraing to and from the Congress.\r\n\r\nInhalte: Ride Sharing, Mitfahren, Fahrgemeinschaften, Trampen\r\n\r\nNote there is 35c3.fahrgemeinschaft.de for finding ride to and from the Congress.\r\n\r\nThe meeting is not exclusively about fahrgemeinschaft.de but open to any other projects, ideas, etc.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 38, 
                                        "code": "8GKMBN", 
                                        "public_name": "Ernesto", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 519, 
                                "guid": "928f8340-4213-5db7-bb4c-05f2187bde49", 
                                "logo": "", 
                                "date": "2018-12-28T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "EC9ZRM", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/EC9ZRM/", 
                                "title": "Wikibase Quick starter guide", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "en", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 19, 
                                        "code": "GD7CGL", 
                                        "public_name": "Matthias", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 520, 
                                "guid": "14be7095-56d4-56b8-ad6e-ef4e08238936", 
                                "logo": "", 
                                "date": "2018-12-28T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "JCUCQA", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/JCUCQA/", 
                                "title": "Wikidata+Wikibase meetup", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "en", 
                                "abstract": "Meetup for all Wikidata and Wikibase enthusiasts. Come and meet the community, ask questions, hack together", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 20, 
                                        "code": "FNL9RF", 
                                        "public_name": "L\u00e9a", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "Discodrama": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10169.html", 
                                "id": 10169, 
                                "guid": "7c665abc-1d20-4c2b-a800-99793b114637", 
                                "logo": null, 
                                "date": "2018-12-28T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "03:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10169-fairy_dust_-_day2", 
                                "title": "Fairy Dust - Day2", 
                                "subtitle": "Rocket Away", 
                                "track": "Music", 
                                "type": "other", 
                                "language": "en", 
                                "abstract": "Modify the Fairy Dust", 
                                "description": "After standing in the cold rain and snow for too long, the Fairy Dust will find its place this time in the middle of the crowd at hall 5. A video installation will take place on the surface. This is a call for people, who can handle c4d files and have the bravery to put their vision on the symbol of the congress.\r\n\r\nThe file attached to this event contains all information about the object, as well the position and lenses of the 4 projectors. Fell free to develop whatever you like. Keep in mind that the surface is very glossy and actually eats the light away. Rendered video best with HAP or MP4.\r\n\r\nIn the hours between 2 pm and 5 pm on the days of the congress, there will be access to the video system, if you come around and have a device with HDMI out.  \r\n\r\nEnjoy!\r\n\r\nPowered by PENTAKLON und Rico Rose \r\n\r\nContact: privatlehrer[at]gmail[:]com", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/633/original/35C3-template-ROCKET.c4d?1545876636", 
                                        "title": "35C3-template-ROCKET.c4d"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10062.html", 
                                "id": 10062, 
                                "guid": "64e1c408-0738-42c8-84ec-c619c0cca73e", 
                                "logo": "/system/events/logos/000/010/062/large/avatars-000007922119-cq47oe-t500x500.jpg?1545407521", 
                                "date": "2018-12-28T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10062-lxc", 
                                "title": "LXC", 
                                "subtitle": "Dub, Broken Beats, Drum&Bass", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "LXC is an audio tinker from Leipzig, creating pretty much everything between Ambient and Hardcore with a focus on broken beats, dubwise soundscapes and a hefty amount of sub bass.", 
                                "description": "Early sound research about 8 bit bassdrum sampling started about 1993, leading to a quite noisy Drum&Bass liveact around the years of 2000. The leipzig based label Phantomnoise pressed LXC's pretty harsh debut vinyl entitled Strukturbruch EP in 2002. Further releaes followed up on labels such as Offshore from overseas, Subtle Sudio from Dublin, Death$ucker from London, on the hamburg-based imprints Sozialistischer Plattenbau and Plainaudio and T\u00fcbingen's Santorin. These days one can find works on Zamzam's Khaliphonic and the latest compilation of Defrostatica, again from trade fair town. Or bare rave town?\r\nBeyond exploring unheard music and non-music, the man like LXC is running his own cutting-edge drum&bass/jungle imprint called Alphacut Records, which got expanded into sublabels like 45seven and Alpha Cutauri. Also, LXC is promoting Bassmaessage, Alphacutility and more bassy nights in his home hood, operating Bassmaessage sound system, mastering and cutting lacquers at the RAND Muzik vinyl pressing plant and is looking after an endless amount of smaller projects about audible and visual confusion every now and then. No shit.\r\n\r\nLXC sounds like:\r\nAnti-clockwize-Drum'n'Bass, Scientific Dubber, Fakecore, Noskoolbreaks, Dumbstep, Reggaetomb, Deathhall, Gabbadub, Chip Hop, Phunkrock, Bambient, ...\r\n\r\nLXC releases on:\r\n45seven, Alphacut, Alpha Cutauri, Offshore, Subtle Audio, Bustle Beats, Modern Urban Jazz, Death$ucker, Zamzam's Khaliphonic, Defrostatica, Sozialistischer Plattenbau, Phantomnoise, Santorin, Plainaudio, Dhyana, Minor, Trash Tapes, Moniker Eggplant, ...", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://www.lxc808.com", 
                                        "title": "http://www.lxc808.com"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/lxc", 
                                        "title": "https://soundcloud.com/lxc"
                                    }, 
                                    {
                                        "url": "http://alphacut.net", 
                                        "title": "http://alphacut.net"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10069.html", 
                                "id": 10069, 
                                "guid": "c88ebe30-c799-46d7-8835-b64b42fd591d", 
                                "logo": "/system/events/logos/000/010/069/large/avatars-000361741337-lfts8t-t500x500.jpg?1545407693", 
                                "date": "2018-12-28T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10069-voxel_blue", 
                                "title": "voxel.blue", 
                                "subtitle": "Various Styles of Psy", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "DJ from Dresden / Sachsen / Germany\r\nStyles: zenonesque, uk night psy, darkprog, psybass, psybreaks, psychill, psybient, ambient, ...", 
                                "description": "\"My style changes over the day. The atmosphere of the floor heavy influence the music I find fitting so, zero guarantees ;)\"", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/voxel-blue", 
                                        "title": "https://soundcloud.com/voxel-blue"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10172.html", 
                                "id": 10172, 
                                "guid": "d2c0e6fe-3c67-43ab-b330-ea524db86f23", 
                                "logo": "/system/events/logos/000/010/172/large/a2020515426_10.jpg?1546021817", 
                                "date": "2018-12-28T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10172-dual_core", 
                                "title": "Dual Core", 
                                "subtitle": "nerdcore", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Brought together by the power of the internet (and perhaps a touch of musical providence), California based computer programmer / rapper int eighty and English web designer / music producer c64 have been rocking the more studious side of the hip hop underground since 2007.", 
                                "description": "Brought together by the power of the internet (and perhaps a touch of musical providence), California based computer programmer / rapper int eighty and English web designer / music producer c64 have been rocking the more studious side of the hip hop underground since 2007.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://dualcoremusic.com/nerdcore/", 
                                        "title": "http://dualcoremusic.com/nerdcore/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10041.html", 
                                "id": 10041, 
                                "guid": "c6260cf6-e3cc-4f6c-977c-85d22be3b58b", 
                                "logo": "/system/events/logos/000/010/041/large/avatars-000119756252-ydapyg-t500x500.jpg?1545407986", 
                                "date": "2018-12-28T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10041-kollektiv_turmstrasse", 
                                "title": "Kollektiv Turmstrasse", 
                                "subtitle": "Techno/House/Trance", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "There are few artists operating in the house/techno milieu who offer much beyond functionality in their music. Those who bring more than this to the table always stand out from the crowd. Hamburg/Berlin duo Kollektiv Turmstrasse (Christian Hilscher and Nico Plagemann) are one of those rare acts whose music caters for both body and soul.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/kollektivturmstrasse", 
                                        "title": "https://soundcloud.com/kollektivturmstrasse"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10068.html", 
                                "id": 10068, 
                                "guid": "ad4d8964-4f48-44c0-b7ef-0853b77cd4f1", 
                                "logo": "/system/events/logos/000/010/068/large/avatars-000109415745-x7apen-t500x500.jpg?1545389220", 
                                "date": "2018-12-29T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10068-dave_dinger", 
                                "title": " Dave Dinger", 
                                "subtitle": "Techno/House", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Bachstelzen / KaterBlau, Berlin", 
                                "description": "Dave Dinger began his illustrious career in Berlins legendary Bar25 in his own, very special way. There, he didn\u2019t just play music, but actually built the DJ booths where the music was played from. This unique blend of passion for music and intrigue in aesthetic concepts has driven him through the mesmerising Berlin underground since the end of the '90s. Dave is personalizing his workspace as a DJ according to his interpretation of what electronic music culture is all about. There is a certain warmth, honesty and depth throughout his work that transcends through both his musicality and his design treatments. As a core member of Berlins famous Bachstelzen Collective, he was one of the founders who blueprinted what got to be known as the typical Berlin style \u2013 an architecture of social, musical and aesthetic concepts. Using chaotic, wild and organic scrap wood in his constructions were his distinctive signature well before the term \u2018up-cycling\u2018 became hip. Bar25, the Katerholzig club and the Bachstelzen floor at Fusion Festival were prototypes of this time. His recent works contain a more polarising focus; a love for minimalistic abstract geometry, and years of experience in project management. Nothing shows this development in a greater way than Garbicz Festival \u2014 whose natural, albeit utopian habitat has become a homebase for both his music and his design aesthetics. An invitation to create the celebrated Turmb\u00fchne Stage at Fusion Festival\u2019s 20th anniversary along with a coveted gig on the stage marked a milestone for both of his careers. For Dave, spacial design and sound are tools for installing an arena for unconventional social interactions. A sphere where common aesthetics are to be challenged and will change therefore constantly. His residency in KaterBlau helped him to build up his reputation as a DJ and to grow into the international realm. In the last years he has worked and played in Australia, New Zealand, India and all around Europe. There is a saying that \u2018To talk about music, is like dancing to architecture\u2019 - Dave Dinger takes the latter part as a challenge. So let his music speak for itself \u2014 and dance to both.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/dave-dinger", 
                                        "title": "https://soundcloud.com/dave-dinger"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10083.html", 
                                "id": 10083, 
                                "guid": "4fc77737-db51-409d-88bc-ad025d8a3ebf", 
                                "logo": "/system/events/logos/000/010/083/large/avatars-000007049727-oyxhri-t500x500.jpg?1545408610", 
                                "date": "2018-12-29T02:00:00+01:00", 
                                "start": "02:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10083-akaak", 
                                "title": "akaak", 
                                "subtitle": "House", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "akaak is also a member of hamburg-based dj-trio sutsche", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/akaak_klingtsogut", 
                                        "title": "https://soundcloud.com/akaak_klingtsogut"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10071.html", 
                                "id": 10071, 
                                "guid": "0678ee05-7581-4523-a2e3-f1485eb89998", 
                                "logo": null, 
                                "date": "2018-12-29T04:00:00+01:00", 
                                "start": "04:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10071-404", 
                                "title": "404", 
                                "subtitle": "Electronica, Downbeat", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "dj 7000, bidi, 404, k\u00f6fte, dj abbau, dj closing, ayran, tyskie, dj partner set, and more ...", 
                                "description": "Unter gewaltigen Opfern, schreibt er eine Reihe von Geschichten mit Ortsnamen, Jahreszahlen und sonstigen Daten, die sich durchaus belegen lassen und in ihrer Wirklichkeit nicht anzuzweifeln sind. Diese Eckdaten sind nur Bruchst\u00fccke, die aus einer Summe von Erinnerungen zusammengesetzt wurden. Das tats\u00e4chlich gelebte und dies was wir zu erleben glaubten, ist ein Teil seiner Biographie, die lediglich eine nachtr\u00e4gliche Interpretation darstellt.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.mixcloud.com/bambaata/", 
                                        "title": "https://www.mixcloud.com/bambaata/"
                                    }, 
                                    {
                                        "url": "https://vannutt.ch/about/", 
                                        "title": "https://vannutt.ch/about/"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Shutter Island": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10100.html", 
                                "id": 10100, 
                                "guid": "f4c038b2-fd9c-438b-bf74-2de42bf7a42c", 
                                "logo": null, 
                                "date": "2018-12-28T10:00:00+01:00", 
                                "start": "10:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10100-mr_galonga_-_minmon", 
                                "title": "Mr. Galonga - Minmon", 
                                "subtitle": "Minmon Kollektiv", 
                                "track": "Music", 
                                "type": "other", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Mr. Galonga ist Mutti und Vati vom Minmon Kollektiv. Vor allem im Raum Potsdam sind einige Partys und Podcasts auf seinem Mist gewachsen. Ihm geht es nicht um Kohle, sondern um Liebe und deshalb ist er in diesem jahr erstmalig als Dj aufm 35C3.\r\n---\r\nMr. Galonga is mum and dad from the Minmon collective. Especially in the Potsdam area some parties and podcasts he did on his own bat. He is not interested in wonga, but in love and that's why this year for the first time he's a DJ on 35C3.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.minmon.de/", 
                                        "title": "https://www.minmon.de/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10162.html", 
                                "id": 10162, 
                                "guid": "18e43220-4ede-479a-9fc5-9d43fb2c22f8", 
                                "logo": null, 
                                "date": "2018-12-28T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10162-welle", 
                                "title": "welle", 
                                "subtitle": "n(e)w", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10102.html", 
                                "id": 10102, 
                                "guid": "f28ad5fc-d5cf-411f-a7c2-bb0737d183ea", 
                                "logo": null, 
                                "date": "2018-12-28T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10102-mogreens", 
                                "title": "Mogreens", 
                                "subtitle": "Vinyls of Funk, Soul and Jazz", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Einer der ersten Stunden. Ein echter Prototyp.\r\n---\r\nOne of the first. A real prototype.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10103.html", 
                                "id": 10103, 
                                "guid": "a95947a0-89ea-4178-b563-4d9c5fcba397", 
                                "logo": null, 
                                "date": "2018-12-28T15:00:00+01:00", 
                                "start": "15:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10103-fussel", 
                                "title": "Fussel", 
                                "subtitle": "Electronic Music", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Fussel, vom Pech verfolgt, ist er nicht nur unser Allrounder f\u00fcr die Umsetzung jeder noch so wahnsinnigen Idee, er hat auch einen ausgepr\u00e4gten Hang zur endzeitlichen, elektronischen Musik - auf die wir uns sehr freuen. \r\n---\r\nFussel - followed by bad luck, he is not only our all-rounder for the realization of even-the-most-insane-ideas, he also has a pronounced inclination towards electronic music of the last days - to which we are very much looking forward.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10104.html", 
                                "id": 10104, 
                                "guid": "0ca8fff6-fb64-467c-89ff-30ca23c430b9", 
                                "logo": null, 
                                "date": "2018-12-28T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10104-karlakakarl", 
                                "title": "Karlakakarl", 
                                "subtitle": "Gute Music von Schallplatte", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Karlakakarl w\u00e4re gern mit dem Rad gekommen, muss aber gleich weiter nach Tel Aviv - Karl untersucht den Einfluss guter Musik (vorsicht kann Teile von Jazz enthalten) auf die Bluthirnschranke und teilt seine Erkenntnisse f\u00fcr 2 Stunden mit uns. \r\n---\r\nKarlakakarl would have liked to come by bike, but has to go straight on to Tel Aviv - Karl examines the influence of good music (caution may contain parts of Jazz) on the blood-brain barrier and shares his findings for 2h with us.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10105.html", 
                                "id": 10105, 
                                "guid": "41b2799f-4e87-4423-be3c-1914e8cdf9a5", 
                                "logo": null, 
                                "date": "2018-12-28T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "06:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10105-mr_jb", 
                                "title": "Mr. JB", 
                                "subtitle": "The master of mission", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Mr. JB aka monkeyking ist die Geheimwaffe und der wohl am besten vorbereiteteste DJ im Shutterisland, ein wandelndes Musiklexikon und Meister der \u00dcberg\u00e4nge und genau darum bekommt er auch 6h Playtime.\r\n---\r\nMr. JB is the secret weapon and probably the best prepared dj in shutterisland, a walking music encyclopedia and master of transitions and that's exactly why he gets 6h playtime.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/monkeyking/tracks", 
                                        "title": "https://soundcloud.com/monkeyking"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10106.html", 
                                "id": 10106, 
                                "guid": "ee06a7bf-a70d-40be-8b66-83c9c3c914aa", 
                                "logo": null, 
                                "date": "2018-12-29T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10106-senor_sib", 
                                "title": "Se\u00f1or SIB", 
                                "subtitle": "More Vinyl", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Se\u00f1or SIB ist in der (guten) politschen Bildung t\u00e4tig und er sammelt (gute) Platten und er ist ein (guter) Freund - irgendein Bogen von jazzig zu drum\u00b4n bass war mal im Gespr\u00e4ch.\r\n---\r\nSe\u00f1or SIB is active in (good) political education and he collects (good) records and he is a (good) friend - some bow from jazzy to drum\u00b4n bass was once in the conversation.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.mixcloud.com/senorsib/", 
                                        "title": "https://www.mixcloud.com/senorsib/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10107.html", 
                                "id": 10107, 
                                "guid": "760ab0fc-bf67-4625-9860-f8ba4427622a", 
                                "logo": null, 
                                "date": "2018-12-29T02:00:00+01:00", 
                                "start": "02:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10107-zeerone", 
                                "title": "ZeerOne", 
                                "subtitle": "TwittyTwister", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "ZeerOne der Philosoph mit diesem Humor darf nicht fehlen. Er ist der Inbegriff der gut gelaunten Stetigkeit und sein musikalisches Spektrum w\u00fcrde auf kein Display passen.\r\n---\r\nZeerOne the philosopher and with this humor must not be absent. He is the epitome of good-humoured consistency and his musical spectrum he would not fit on any display.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/zeerone-aka-twittytwister/tracks", 
                                        "title": "https://soundcloud.com/zeerone-aka-twittytwister"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10108.html", 
                                "id": 10108, 
                                "guid": "4ba97db1-9a0d-43e3-920e-9460f74fceaf", 
                                "logo": null, 
                                "date": "2018-12-29T04:00:00+01:00", 
                                "start": "04:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10108-malte_rathmann", 
                                "title": "Malte Rathmann", 
                                "subtitle": "Audio / Video Set", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10109.html", 
                                "id": 10109, 
                                "guid": "d2bd6f64-1b10-4a7c-b6f0-710db580db89", 
                                "logo": null, 
                                "date": "2018-12-29T05:00:00+01:00", 
                                "start": "05:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10109-die_snuff_lagune", 
                                "title": "Die Snuff Lagune", 
                                "subtitle": "Audio / Video Set", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Devon, Franziska, Jan, Malte. elektoinstrumentaler ambient chillcore, Glitchyplatsch meets Rohrschachbrettmuster im Darkroom. Alle k\u00f6nnen. immer.\r\n---\r\nDevon, Franziska, Jan, Malte. electro-instrumental ambient chillcore, Glitchyplatsch meets Rohrschach board pattern in the darkroom. Everyone can. Always.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10110.html", 
                                "id": 10110, 
                                "guid": "e16cb096-773e-47d0-86d2-ccdb5ca953bb", 
                                "logo": null, 
                                "date": "2018-12-29T06:00:00+01:00", 
                                "start": "06:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10110-fussel", 
                                "title": "Fussel", 
                                "subtitle": "djset", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Fussel, vom Pech verfolgt, ist er nicht nur unser Allrounder f\u00fcr die Umsetzung jeder noch so wahnsinnigen Idee, er hat auch einen ausgepr\u00e4gten Hang zur endzeitlichen, elektronischen Musik - auf die wir uns sehr freuen. \r\n---\r\nFussel - followed by bad luck, he is not only our all-rounder for the realization of even-the-most-insane-ideas, he also has a pronounced inclination towards electronic music of the last days - to which we are very much looking forward.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Compeiler": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10147.html", 
                                "id": 10147, 
                                "guid": "0dcd4053-2b28-4f2a-b462-022f5afa0b58", 
                                "logo": null, 
                                "date": "2018-12-28T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10147-rote_schule_music_workshop", 
                                "title": "Rote Schule Music Workshop", 
                                "subtitle": "Workshop/Performance", 
                                "track": "Music", 
                                "type": "workshop", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10129.html", 
                                "id": 10129, 
                                "guid": "ff216e54-ddee-4f70-8314-605dfc93a567", 
                                "logo": "/system/events/logos/000/010/129/large/avatars-000138623825-tpdxbg-t500x500.jpg?1545595311", 
                                "date": "2018-12-28T15:00:00+01:00", 
                                "start": "15:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10129-anna_hauss", 
                                "title": "Anna Hauss", 
                                "subtitle": "Singer-Songwriterin", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Anna Hauss ist S\u00e4ngerin, Texterin und Komponistin und lebt derzeit in Leipzig. Aufgewachsen ist sie in Berlin, wo ihre musikalische Laufbahn schon fr\u00fch begann. 2013 erschien ihr Solo-Deb\u00fct \"Summerbreak\", ein Jahr sp\u00e4ter begann sie in Leipzig Jazzgesang zu studieren. In ihren Songs geht es um pers\u00f6nliche Erfahrungen sowie aktuelle Beobachtungen unserer Zeit. Dabei ist sie immer wieder auf der Suche nach neuen Herausforderungen und Sounds. Aktuell ist sie mit ihrer Band STILL IN THE WOODS und deren aktuellem Album \"Rootless Tree\" unterwegs, spielt Konzerte als Solok\u00fcnstlerin oder startet Projekte mit Musikern aus der Leipziger Jazzszene.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/haussmusic", 
                                        "title": "https://soundcloud.com/haussmusic"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10130.html", 
                                "id": 10130, 
                                "guid": "10ed2311-451b-44e9-a7fa-58303a6034c3", 
                                "logo": "/system/events/logos/000/010/130/large/bio01.png?1545412551", 
                                "date": "2018-12-28T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10130-peter_klohmann", 
                                "title": "Peter Klohmann", 
                                "subtitle": "Jazz", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Peter Klohmann \r\ngeb. 1986, Frankfurt am Main\r\n2001-2005 Jungstudent am Peter-Cornelius-Konservatorium Mainz \r\n2005-2010 Bachelor Studium Jazz Saxophon an der Johannes Gutenberg-Universit\u00e4t Mainz\r\n2010 bis 2012 Master Studium Jazz Saxophon bei Prof. Bernd Konrad an der Musikhochschule Stuttgart\r\nab WS 2012 Master Studium Jazz Komposition bei Prof. Rainer Tempel an der Musikhochschule Stuttgart\r\n2001-2007 Landesjugenjazzorchesters Rheinland-Pfalz \r\n2007-2011 Bundesjazzorchester (BujazzO)\r\n2012 Aushilfe HR-Big Band (Schultour)\r\nTourneen f\u00fchrten ihn nach Brasilien, USA, S\u00fcdafrika, S\u00fcd-Korea, Russland, Polen, Indien, Italien und auf den Balkan (Kroatien, Bosnien-Herzegowina, Serbien, Bulgarien, Rum\u00e4nien)\r\n \r\nGr\u00fcndet 2009 die Konzertreihe \u201eJunge Szene Frankfurt\u201c\r\n2013 Arbeitsstipendium Jazz der Stadt Frankfurt am Main\r\n2014 Er\u00f6ffnung des 45. Deutsches Jazzfestivals Frankfurt am Main", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://peterklohmann.com", 
                                        "title": "http://peterklohmann.com"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10088.html", 
                                "id": 10088, 
                                "guid": "95f3d4ff-145f-426d-a705-52e67e416c94", 
                                "logo": "/system/events/logos/000/010/088/large/avatars-000389452269-8x5ub9-t500x500.jpg?1545412662", 
                                "date": "2018-12-28T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10088-jeanette_tresbien", 
                                "title": "Jeanette Tr\u00e8sbien", 
                                "subtitle": "Part 1", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Moloch, Ringelpietz / Hamburg", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/jeanette-tr-sbien", 
                                        "title": "https://soundcloud.com/jeanette-tr-sbien"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10131.html", 
                                "id": 10131, 
                                "guid": "244005eb-b499-4f13-80e1-ab1ee66db666", 
                                "logo": "/system/events/logos/000/010/131/large/sofija.jpg?1545754685", 
                                "date": "2018-12-28T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10131-zso_co", 
                                "title": "Zso & Co.", 
                                "subtitle": "live! ukulele", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Zso is the stage name of a young artist Sofia (16) from Novi Sad, Serbia. Her voice is regularly described as \u201chypnotic\u201d, and her performances as \u201cout-of-this-world\u201d. She started to perform just recently and her sets usually consists of cover songs that the most of you will recognise, but they could hardly be labeled as \u201chits\u201d. She also writes her own songs and one will be premiered at 35C3.\r\n\r\nCurrently, she is touring Germany with her dad, _djura_ who is a musician and a DJ. Together, under the name \u201cZso & Co.\u201d  they will bring you interesting renditions of some popular songs in their own, unique style: combining analogue and acoustic instruments with dirty synths in minimalistic arrangements, accompanying Sofia\u2019s beautiful voice.", 
                                "description": "Zso is the stage name of a young artist Sofia (16) from Novi Sad, Serbia. Her voice is regularly described as \u201chypnotic\u201d, and her performances as \u201cout-of-this-world\u201d. She started to perform just recently and her sets usually consists of cover songs that the most of you will recognise, but they could hardly be labeled as \u201chits\u201d. She also writes her own songs and one will be premiered at 35C3.\r\n\r\nCurrently, she is touring Germany with her dad, _djura_ who is a musician and a DJ. Together, under the name \u201cZso & Co.\u201d  they will bring you interesting renditions of some popular songs in their own, unique style: combining analogue and acoustic instruments with dirty synths in minimalistic arrangements, accompanying Sofia\u2019s beautiful voice.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10132.html", 
                                "id": 10132, 
                                "guid": "c8a0ca06-f75e-45b9-871b-f48a468df302", 
                                "logo": "/system/events/logos/000/010/132/large/avatars-000389452269-8x5ub9-t500x500.jpg?1545412872", 
                                "date": "2018-12-28T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10132-jeanette_tresbien", 
                                "title": "Jeanette Tr\u00e8sbien", 
                                "subtitle": "Part 2", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Moloch, Ringelpietz / Hamburg", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/jeanette-tr-sbien", 
                                        "title": "https://soundcloud.com/jeanette-tr-sbien"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10053.html", 
                                "id": 10053, 
                                "guid": "94a79550-1fef-4ba0-8db6-985c8241b90b", 
                                "logo": "/system/events/logos/000/010/053/large/35.jpg?1545413155", 
                                "date": "2018-12-28T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10053-air_cushion_finish", 
                                "title": "Air Cushion Finish", 
                                "subtitle": "Impromptu, Acousmatic, Ambient, Krautrock,", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Air Cushion Finish do multi-style and real time music. It's created from anything the players come up with at a particular moment. The resulting music defies style definitions.", 
                                "description": "The slow motion part was referred to as homeopathic punk. before, however ambient, electro-acoustic electronica, dada, soundtrack, radio play, spoken word, impromptu (though preconceived in a certain sense), even jazz or free music could come to mind as well.\r\n\r\nAir Cushion Finish formed in Berlin in 2007 and comprised composer/player jayrope and natural vocal synthesizer Lippstueck, who had enjoyed playing Berlin\u2019s underground together since the 1990s. Lippstueck prominently sings, wordless and backwards in time, while his partner jayrope tends to also appreciate any DIY, electronic, string or percussion instrument small enough to fit into a single suitcase altogether. \r\nChanging setup and subsequently music is programmatic to them, as well as having friends as guest musicians, all resulting into an unforeseeable slow motion cacophony of whispers, bleeps, rhythms and harmonies. \r\nThere\u2019s a notion of Dada, but you never know.\r\n\r\nThis rather poetic note about their separation from cemented structures & styles took them to places. ACF got to support a number of their own favourite artists along the line. Subsequently ACF\u2019s 8th album FLINK \u2013 upon a friendly invitation \u2013 was recorded and mixed with Thierry Amar at Montreal\u2019s Hotel2Tango. For the first time in a proper studio, if you will, but nonetheless with an audience present at recording time. The resulting double 12\u201d \u2018Flink\u2019 was released on Lullabies for Insominacs in early 2017, telling of ACF\u2019s current state of poetical accident, swaying, swinging and bouncing, boldly careful, like a transparent tattoo on your forehead.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.aircushionfinish.com", 
                                        "title": "https://www.aircushionfinish.com"
                                    }, 
                                    {
                                        "url": "https://aircushionfinish.bandcamp.com/", 
                                        "title": "https://aircushionfinish.bandcamp.com/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10079.html", 
                                "id": 10079, 
                                "guid": "b2755b2f-1701-42b7-8d2e-61f328f6c2fa", 
                                "logo": "/system/events/logos/000/010/079/large/avatars-000023223454-7aeb1i-t500x500.jpg?1545413510", 
                                "date": "2018-12-28T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10079-michelson", 
                                "title": "Michelson", 
                                "subtitle": "Part 1", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "..puts compositions together like a dj does \r\nso that makes him a dj \r\nin a ambienty, krauty, electronicy way he is\r\ntrtying to tell you something he only knows \r\nwhen its time for it. \r\nmagical! \r\n", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/megamichelson", 
                                        "title": "https://soundcloud.com/megamichelson"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10060.html", 
                                "id": 10060, 
                                "guid": "d22ea0df-965c-4e0a-8254-e1dc16fba4c9", 
                                "logo": null, 
                                "date": "2018-12-28T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10060-vai", 
                                "title": "Vai", 
                                "subtitle": "Experimental Electronics Live Set", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "\"This world is so full of love. You are not here by accident. You don\u2019t have to worry about anything. Your being, is so full of love, so full of peace. You don\u2019t have to go to someplace else to find peace. It is right where you are. Trust this, don\u2019t worry about anything at all. Just enter this place and be .\"", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://holger-records.bandcamp.com/album/son-of-idaia", 
                                        "title": "Listen: Son of Idaia EP (Holger Records)"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10133.html", 
                                "id": 10133, 
                                "guid": "5b864156-e94c-4935-854b-9a0df97c3564", 
                                "logo": "/system/events/logos/000/010/133/large/avatars-000023223454-7aeb1i-t500x500.jpg?1545413633", 
                                "date": "2018-12-28T23:00:00+01:00", 
                                "start": "23:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10133-michelson", 
                                "title": "Michelson", 
                                "subtitle": "Part 2", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "..puts compositions together like a dj does \r\nso that makes him a dj \r\nin a ambienty, krauty, electronicy way he is\r\ntrtying to tell you something he only knows \r\nwhen its time for it. \r\nmagical! \r\n", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/megamichelson", 
                                        "title": "https://soundcloud.com/megamichelson"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10081.html", 
                                "id": 10081, 
                                "guid": "76b1d16f-ca84-4b46-afe5-7932e75fbfbc", 
                                "logo": "/system/events/logos/000/010/081/large/Leafar-Legov-.jpg?1545389380", 
                                "date": "2018-12-29T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "02:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10081-leafar_legov", 
                                "title": " Leafar Legov ", 
                                "subtitle": "Ambient", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Leafar Legov is a quiet but essential member of the Giegling family. Legov's relationship with club music seems purely conditional\u2014he'll follow its guidelines only when they happen to suit his creative impulses. With Kettenkarussell, he makes what could loosely be described as downtempo house. On his solo records, he offsets ambient sketches with somber hip-hop instrumentals. But his personal musical universe is still, for the most part, a mystery\u2014aside from \"Blush,\" an excellent one-off from 2009 he made as Robert Oh, his first solo release was the EP \"Talk\" on Giegling, which came out in 2016. Abstract and subdued, it's a record that points to Giegling's emotional depth and stylistic open-endedness. ", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/leafarlegov", 
                                        "title": "https://soundcloud.com/leafarlegov"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10134.html", 
                                "id": 10134, 
                                "guid": "fd70f35d-95d9-4fd3-ba93-2d96039f0a9b", 
                                "logo": null, 
                                "date": "2018-12-29T02:00:00+01:00", 
                                "start": "02:00", 
                                "duration": "02:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10134-pacheko_b2b_oliotronix", 
                                "title": "Pacheko b2b Oliotronix", 
                                "subtitle": "Techno/Rave", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Oliotronix:\r\nIn 2017/18 her new music setup has taken shape in form of energetic performances using Gameboy DMG and various electronic noise machines still combined with an hooligan/techno/rave DJ set.", 
                                "description": "Few feedbacks from the audience:\r\n\r\n\u201cWhat is exciting about DJ Oliotronix is she doesn't follow the trend but deliver crazy sets following her own taste while keeping it entertaining on a high level of intensity. Prepare to have fun!\u201c\r\nMadame Claude, Berlin\r\n\r\n\u201cVery original and eclectic, with interesting non-standard use of equipment. Also very cool neo-cyber-hip look!\u201d\r\nGalaxy Wolf, London\r\n\r\n\u201cGreat! Good energy and selection. Nice to see DJs enjoying themselves too!\u201d\r\nCrux, London", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/elcapitano", 
                                        "title": "Pacheko: https://soundcloud.com/elcapitano"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Uptime Bar": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10061.html", 
                                "id": 10061, 
                                "guid": "60b4884f-575e-4849-903c-6403631e70b4", 
                                "logo": "/system/events/logos/000/010/061/large/avatars-000140974016-n2w1av-t500x500.jpg?1545414123", 
                                "date": "2018-12-28T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10061-sudseemelodien", 
                                "title": "S\u00fcdseemelodien", 
                                "subtitle": "Finest Hawaii Bar Sounds", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Purest aloha spirit to dream away as you let the sounds transporting you to ocean, beach, surfers and luau riding on the back of a glittering Humuhumunukunuku\u0101pua'a.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/suedseemelodien", 
                                        "title": "https://soundcloud.com/suedseemelodien"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10063.html", 
                                "id": 10063, 
                                "guid": "5f7f1cef-1b23-43f3-8de5-6bf77048fba3", 
                                "logo": "/system/events/logos/000/010/063/large/shikoba.jpg?1545329369", 
                                "date": "2018-12-28T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10063-shikoba", 
                                "title": " SHIKOBA", 
                                "subtitle": "Krautrock, Experimental, Techno", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "SHIKOBA, real name Adem Zor, creative mind behind the interstellar label Planet Almanac, collaborates with Don't DJ and Iku Sakan, varies in his DJ sets in the hypnotic tension field between Krautrock, Experimental and Techno. Juggling with the sound aesthetics appeals to him the most. Dance Music, which transfers the club night's escapism to a more artistic than functional level.", 
                                "description": "Loops, rhythms and sound aesthetics are the three key words with which his sets can be described. Natural sounds combined with digital synthesis, using the listener as a medium to close the gap between these two.\r\n\r\nHe himself understands his sets as experienceable ideas, which are presented and carried forward by the experiencer and be thougt even further.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/shikobamakesnoize", 
                                        "title": "https://soundcloud.com/shikobamakesnoize"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10073.html", 
                                "id": 10073, 
                                "guid": "78b5625a-0af0-494e-bc6b-57edd0138d27", 
                                "logo": "/system/events/logos/000/010/073/large/avatars-000539299344-d3tt0s-t500x500.jpg?1545414558", 
                                "date": "2018-12-28T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10073-alexa_d_saster", 
                                "title": " Alexa D!saster ", 
                                "subtitle": "Musical oxymorons", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "AL-D! (Alexa-D!saster) // electric-guitar //loops & effects // vocals // lo-fi //improv // DAW // drums // bells //\r\n\r\nAlexa D Saster is a DJ, musician and crossover artist based in Berlin. \r\n\r\nDJ Alexa D!saster is a record collector and sound-explorer. Her dj-sets are between mildstyle and wildstyle and based on underground-music and unheard rarities. She's spinning her sets in Berlin's subculture spots and elsewhere in Germany and Europe. \r\n\r\nAlexa is a guitarist and singer and plays in different formations. Under the moniker AL-D! she runs her indie-loop-project, where she combines electronic sounds with vocals and electric-guitar.\r\n\r\nShe is creator of Golden Disko, resident of mild! open air in Berlin's cutest garden Zuckerzauber and host of Kizamani kisasa radio show on Radio Rixdorf.\r\n\r\nIn addition to her music, Alexa is working as comic artist  and web designer.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://alexa-dsaster.de", 
                                        "title": "http://alexa-dsaster.de"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/alexadsaster", 
                                        "title": "https://soundcloud.com/alexadsaster"
                                    }, 
                                    {
                                        "url": "https://www.mixcloud.com/alexadsaster", 
                                        "title": "https://www.mixcloud.com/alexadsaster"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/alexadisaster", 
                                        "title": "https://soundcloud.com/alexadisaster (spot the difference!)"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10087.html", 
                                "id": 10087, 
                                "guid": "18f08a7c-9481-4928-9ed1-6842d10a40ca", 
                                "logo": "/system/events/logos/000/010/087/large/avatars-000449268345-ysghqy-t500x500.jpg?1545414667", 
                                "date": "2018-12-28T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10087-please_talk_softly", 
                                "title": "Please Talk Softly", 
                                "subtitle": "Diverse Music", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Con Han Hop, mjut / Leipzig", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/pleasetalksoftly", 
                                        "title": "https://soundcloud.com/pleasetalksoftly"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10084.html", 
                                "id": 10084, 
                                "guid": "9d0bb2cc-9d75-4033-9e27-4b372e8a9cee", 
                                "logo": "/system/events/logos/000/010/084/large/unnamed.jpg?1545741830", 
                                "date": "2018-12-28T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10084-cornelius_niki_nebel", 
                                "title": " Cornelius & Niki Nebel", 
                                "subtitle": "Diverse Music", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Hamburg in town", 
                                "description": "Sven. sind Nele und Cornelius. Sie haben Irgendwann in der Vergangenheit gemerkt, dass sie ganz gut musikalisch aufeinander reagieren k\u00f6nnen. Zusammen lassen sie  ein Amalgam aus gebrochenen Beats, krautigen Wellen und wabernden Fl\u00e4chen enstehen. In einen Genre-Setzkasten l\u00e4sst sich das alles nicht stellen, muss es ja auch nicht, ganz im Gegenteil. Manchmal wissen sie selbst nicht so ganz genau, wohin die Reise geht, um dann aber trotzdem genau da anzukommen wo sie vielleicht hinwollten. Geradezu \u00fcbernat\u00fcrlich, einfach wowi.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/nele-wittler", 
                                        "title": "https://soundcloud.com/nele-wittler"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/cornelius11", 
                                        "title": "https://soundcloud.com/cornelius11"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10117.html", 
                                "id": 10117, 
                                "guid": "0e0a5472-d260-4936-917a-fcb8063caac1", 
                                "logo": null, 
                                "date": "2018-12-29T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10117-dj_samantha", 
                                "title": "DJ Samantha", 
                                "subtitle": "Music for non places", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "A selection of dub, african and techno classics will be rearranged for a mix; to park (20 kilogramm) suitcases; find a seat next to the smoking compartment and head off to gate B. Playing a DJ set with mostly vinyl, Samantha is slowly paneling her sound with a diverse selection of\r\nmusic.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "OIO L\u00f6tarea": [
                            {
                                "id": 308, 
                                "guid": "eda8f6cd-d88a-519d-9d69-4dd5e69a3fb9", 
                                "logo": "", 
                                "date": "2018-12-28T10:00:00+01:00", 
                                "start": "10:00", 
                                "duration": "06:00", 
                                "room": "OIO L\u00f6tarea", 
                                "slug": "XHGP3G", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/XHGP3G/", 
                                "title": "L\u00f6ten zum Junghackertag", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "L\u00f6tarea 110 min", 
                                "language": "de", 
                                "abstract": "Zum Junghackertag gibt es extra L\u00f6tprogramme", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 95, 
                                        "code": "UYHAB8", 
                                        "public_name": "djim", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ]
                    }
                }, 
                {
                    "index": 3, 
                    "date": "2018-12-29", 
                    "day_start": "2018-12-29T11:00:00+01:00", 
                    "day_end": "2018-12-30T03:00:00+01:00", 
                    "rooms": {
                        "Adams": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9686.html", 
                                "id": 9686, 
                                "guid": "a750228d-a37d-43c0-8e2f-d46137a991dc", 
                                "logo": null, 
                                "date": "2018-12-29T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9686-die_dreckige_empirie", 
                                "title": "Die dreckige Empirie", 
                                "subtitle": "Kann man empirischen Studien trauen?", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Kann man empirischen Studien trauen oder nicht? Wie kann ich gute Studien von schlechten unterscheiden? Und was mache ich, wenn es zu einem Thema Studien mit gegens\u00e4tzlichen Befunden gibt? Der Vortrag soll helfen, Antworten auf diese Fragen zu finden und empirische Studien besser zu verstehen.", 
                                "description": "Empirischen Studien begegnet man nicht nur in Vorlesungen und Laboren, auch in den Nachrichten und in Diskussionen werden sie zitiert und oft als unumst\u00f6\u00dfliche Wahrheit dargestellt. Andererseits gibt es ein gro\u00dfes Misstrauen gegen\u00fcber diesen Studien. Den Satz \u201eTraue keiner Statistik die du nicht selbst gef\u00e4lscht hast\u201c hat wohl jeder schon geh\u00f6rt und beim Congress im letzten Jahr hie\u00df es mit Verweis auf psychologische und sozialwissenschaftliche Methoden \u201eScience is broken\u201c. Aber entspricht das wirklich der Wahrheit? Der Vortrag besch\u00e4ftigt sich mit der Frage, was die Denkweise hinter empirischen Studien ist und wie man sie besser verstehen kann. Dabei sollen sowohl Grundlagen wie Wahrscheinlichkeiten, verschiedene statistische Testverfahren und Metaanlysen als auch Probleme wie p-Hacking und die Replikationskrise angesprochen werden. Ziel des Vortrags ist es, den Zuh\u00f6rer*innen einen Eindruck davon zu vermitteln, was empirische Studien aussagen k\u00f6nnen und was nicht. Dabei liegt besonderes Augenmerk auf der Frage, ob und welchen empirischen Studien man trauen kann. Man ben\u00f6tigt keine Vorkenntnisse zum verfolgen des Vortrages. Als Beispiele werden aktuelle und klassische Studien aus der Psychologie benutzt.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8515, 
                                        "public_name": "Aiko "
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/693/original/Empirie3.pdf?1546087794", 
                                        "title": "Slides_DieDreckigeEmpirie"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9407.html", 
                                "id": 9407, 
                                "guid": "d0d6d058-f117-4ccb-ba6a-c41d9290a287", 
                                "logo": null, 
                                "date": "2018-12-29T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9407-die_verborgene_seite_des_mobilfunks", 
                                "title": "Die verborgene Seite des Mobilfunks", 
                                "subtitle": "HF-St\u00f6rquellen im Uplink", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Der Vortrag beleuchtet die Einfl\u00fcsse auf den geheimnisvollen Teil des Mobilfunks \u2013 St\u00f6rquellen im Uplink und deren Auswirkungen auf die Mobilfunk-Kommunikation sowie Praktiken zum Aufsp\u00fcren von HF-St\u00f6rquellen.\r\n\r\nDie Feldst\u00e4rke-Balkenanzeige eines Smartphones (die Downlink-Empfangsfeldst\u00e4rke) ist nur die H\u00e4lfte der Wahrheit zur Bewertung einer Mobilfunkversorgung. Die andere H\u00e4lfte ist der weithin unsichtbare aber gegen St\u00f6reinfl\u00fcsse hochempfindliche Uplink, die Richtung vom Endger\u00e4t zu den Basisstationen. In diesem Vortrag werden Uplink-St\u00f6rquellen, deren Auswirkungen sowie Mess- und Analysem\u00f6glichkeiten erl\u00e4utert.", 
                                "description": "Der Uplink von Mobilfunknetzen ist f\u00fcr die mobile Kommunikation unerl\u00e4sslich, aber niemand kann ihn wirklich sehen. Der Uplink kann durch St\u00f6rsender, Repeater und viele andere HF-Quellen gest\u00f6rt werden. Wenn er gest\u00f6rt ist, ist die mobile Kommunikation eingeschr\u00e4nkt. Ich werde zeigen, welche Arten von St\u00f6rquellen den Uplink st\u00f6ren k\u00f6nnen und welche Auswirkungen das auf die Nutzung des Mobilfunks hat und wie Interference Hunting durchgef\u00fchrt werden kann.\r\n\r\nZun\u00e4chst erl\u00e4utere ich die notwendige Pegelsymmetrie des Downlinks (von der Mobilfunk-Basisstation - eNodeB zum Endger\u00e4t) und dem Uplink (vom Endger\u00e4t zur\u00fcck zur eNodeB). Da die Sendeleistungen von Endger\u00e4t und eNodeB sehr unterschiedlich sind, erkl\u00e4re ich technische Hintergr\u00fcnde zum Erreichen der Symmetrie. Im Folgenden werde ich die Probleme und M\u00f6glichkeiten bei der Messung von Uplink-Signalen am eNodeB erl\u00e4utern, in Empf\u00e4nger kann man ja schlecht hineinschauen. Der Downlink ist im Vergleich dazu sehr einfach zu messen, man sieht die Balken auf dem Smartphone oder kann APPs dazu nutzen, die detaillierte Feldst\u00e4rkeinfos etc. liefern. Der Uplink bleibt allerdings weitgehend unsichtbar. Wenn dieser allerdings am eNodeB gest\u00f6rt ist, sagen die Feldst\u00e4rkebalken am Endger\u00e4t gar nichts aus. Dazu werde ich eine M\u00f6glichkeit der Beobachtung vorstellen, die einige Endger\u00e4te on Board mitbringen bzw. mit APPs aus dem Chipset herausgelesen werden k\u00f6nnen. In welcher Form der Uplink gest\u00f6rt werden kann, die Auswirkungen f\u00fcr die Kommunikation und das Suchen von Uplink-St\u00f6rquellen werden den Vortrag abschlie\u00dfen. Dabei werde ich auch auf das Problem der 'passiven Intermodulation' (PIM), eine (nicht) neue St\u00f6rquelle in den Bassisstations-Antennenanlagen, deren Bewertung, Messung und Vermeidung eingehen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8197, 
                                        "public_name": "Peter Schmidt"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9507.html", 
                                "id": 9507, 
                                "guid": "787007cf-828d-4409-94b0-90a0b8d727a0", 
                                "logo": "/system/events/logos/000/009/507/large/IFG_angriff.jpg?1545231555", 
                                "date": "2018-12-29T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9507-best_of_informationsfreiheit", 
                                "title": "Best of Informationsfreiheit", 
                                "subtitle": "Transparenz mit der Brechstange", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Mit (u. a.): Rainer Rehak, Anna Biselli, Andre Meister, ...\r\n\r\nWas f\u00fcr die Breitbandversorgung in Deutschland gilt, gilt auch f\u00fcr Transparenz: \u00dcberall Demokratie-Funkl\u00f6cher, die man stopfen muss, am besten mit Klagen. Wir erz\u00e4hlen, was das Informationsfreiheitsgesetz in diesem Jahr f\u00fcr die Demokratie-Infrastruktur getan hat, welche Rolle dabei Klagen gespielt haben und was die IFG-Meisterschaften damit zu tun haben.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5605, 
                                        "public_name": "Arne Semsrott"
                                    }, 
                                    {
                                        "id": 1642, 
                                        "public_name": "Rainer Rehak"
                                    }, 
                                    {
                                        "id": 5764, 
                                        "public_name": "Andre Meister"
                                    }, 
                                    {
                                        "id": 4465, 
                                        "public_name": "Anna Biselli"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://media.ccc.de/v/35c3-9507-best_of_informationsfreiheit", 
                                        "title": "VIDEO"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9858.html", 
                                "id": 9858, 
                                "guid": "4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5", 
                                "logo": null, 
                                "date": "2018-12-29T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9858-archaologische_studien_im_datenmull", 
                                "title": "Arch\u00e4ologische Studien im Datenm\u00fcll", 
                                "subtitle": "Welche Daten speichert Amazon \u00fcber uns?", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Jeder Nutzer hat das Recht bei seinen Dienstanbietern eine Kopie seiner Daten anzufordern. Doch wer macht das schon? Wir haben genau das getan. Das Ergebnis war nicht nur eine intensive und emotionale Brieffreundschaften mit der Datenschutz-Abteilung von Amazon. Das Ganze hat auch sehr viel Datenm\u00fcll zu Tage bef\u00f6rdert.", 
                                "description": "Jeder Nutzer hat das Recht bei seinen Dienstanbietern eine Kopie seiner Daten anzufordern. Doch wer macht das schon? Wir haben genau das getan. Das Ergebnis war nicht nur eine intensive und emotionale Brieffreundschaft mit der Datenschutz-Abteilung von Amazon. Das Ganze hat auch sehr viel Datenm\u00fcll zu Tage bef\u00f6rdert. Amazon schickte eine Tabelle mit den letzten 15.000 Klicks \u2013 zu jedem Eintrag gab es bis zu 50 zus\u00e4tzliche Angaben. \r\n\r\nAuf den ersten Blick war klar: In diesen Datenbergen lohnt es sich zu w\u00fchlen. Genau das haben wir in den darauf folgenden Monaten getan. Mit einigen Analysen haben wir nach Auff\u00e4lligkeiten und Mustern gesucht und diese auch gefunden. Amazon wei\u00df, wann wir wo unterwegs waren, wie es um die Qualit\u00e4t unserer Internetverbindung steht, wie es um die H\u00e4ufigkeit von um Familienbesuchen bestellt ist und und welche Zeitung wir lesen. \r\n\r\nDer Vortrag erkl\u00e4rt auf unterhaltsame und kurzweilige Weise, was sich aus unserem Datenm\u00fcll mit einfachen Mitteln alles herauslesen l\u00e4sst. Und warum es problematisch ist, wenn Amazon unsere Vorlieben irgendwann besser kennt, als enge Freunde. Als Bonus geben wir Euch noch die wichtigsten Tipps & Kniffe auf den Weg, wie ihr auch bei unkooperativen Unternehmen an Eure eigene Datenauskunft kommt. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8629, 
                                        "public_name": "Letty"
                                    }, 
                                    {
                                        "id": 8662, 
                                        "public_name": "Katharina Nocun"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9761.html", 
                                "id": 9761, 
                                "guid": "240fe8a1-ee33-4f07-88d0-34b8bb04db71", 
                                "logo": null, 
                                "date": "2018-12-29T17:10:00+01:00", 
                                "start": "17:10", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9761-truly_cardless_jackpotting_an_atm_using_auxiliary_devices", 
                                "title": "Truly cardless: Jackpotting an ATM using auxiliary devices.", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Pursuit of \u201cgood customers\u2019 experience\u201c not only leads to new customers, but also attract criminals of all sorts. Presentation will give overview of current security situation of ATMs with different auxiliary devices allowing cardless transactions. Cardless is new sexy for criminals.", 
                                "description": "Era of ATMs has started in London in 1967. Since time, when the \u201chole-in-the-wall\u201d cash machine used radiocarbon paper cheques, ATMs became more complex and smart, providing opportunity to withdraw money without cards. Vendors, in accordance to banks and consumer\u2019s demand, create ATMs that replace plastic cards and PINs with smartphones or QR codes. \r\nCash withdrawal from an ATM now easier than never before not only for clients, but also for attackers. Jackpotting an ATM via malware or black box are pretty familiar. Countermeasures against such attacks are already in place in many banks. Thus, attackers need to discover new (or well-forgotten) ways to achieve their evil goals. \r\nWe will not chew the fat, telling stories about the old days, because new functionality provides new possibilities. Migration from Windows XP to Windows 7/10 means there is always PowerShell on the ATM. \u201cNew\u201d types of input devices allow BadBarcode-like attacks. Legitimate auxiliary device connected to the ATM in pursuit of so-called good customers\u2019 experience may lead to ejection of all money from ATM. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6960, 
                                        "public_name": "Olga Kochetova"
                                    }, 
                                    {
                                        "id": 7221, 
                                        "public_name": "Alexey Osipov"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9653.html", 
                                "id": 9653, 
                                "guid": "5a8097ad-15c2-492e-8bc4-6b634fd8e963", 
                                "logo": "/system/events/logos/000/009/653/large/photo_2018-10-14_15-01-31.jpg?1539524849", 
                                "date": "2018-12-29T18:10:00+01:00", 
                                "start": "18:10", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9653-russia_vs_telegram_technical_notes_on_the_battle", 
                                "title": "Russia vs. Telegram: technical notes on the battle", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "It's time to highlight facts and epic fails that were observed on the wire during attempts to block Telegram in Russia.\r\n", 
                                "description": "Russian Federal Service for Supervision of Communications, IT and Mass Media started the process to ban Telegram on April the 16th. Roskomnadzor press-office claimed that the process will take a few hours. Telegram mostly worked in Russia during the incident beginning and still works half a year later.\r\n\r\nRussia banned Amazon, Google, Microsoft, DigitalOcean, Hetzner and other networks covering almost 0.5% of Internet Protocol address space, presumably, to put pressure on international businesses to make Telegram persona non-grata on those networks.\r\n\r\nRussia also banned IP addresses of major local businesses (VKontakte, Yandex and others), presumably, by mistake. A flaw in the filter was exploited to bring one of the major ISPs down for a while. Moscow Internet exchange point announced that alike flaw of the filter could be used to disrupt peering. Proxy-hunting experiments were observed sniffing live network traffic, both for obfuscated MTProto proxy and good old Socks5.\r\n\r\nThis talk will <em>not</em> cover legal aspects of the lawyers fighting for Telegram in court. Also, it will <em>not</em> show any \"insider\" information from Telegram team.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8452, 
                                        "public_name": "Leonid Evdokimov (darkk)"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://usher2.club/en/", 
                                        "title": "Usher II: having fun with Roskomnadzor's Register of Prohibited sites"
                                    }, 
                                    {
                                        "url": "https://darkk.net.ru/35c3/", 
                                        "title": "Errata & Slides mirror"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/698/original/35c3-russia-vs-telegram.pdf?1546092203", 
                                        "title": "PDF slides"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/699/original/35c3-russia-vs-telegram.odp?1546092203", 
                                        "title": "OpenDocument slides with speaker notes"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9783.html", 
                                "id": 9783, 
                                "guid": "94447a62-a3ba-4f6d-a3b7-b5318a954651", 
                                "logo": "/system/events/logos/000/009/783/large/Mars_Science_Laboratory_mission_logo.png?1539618594", 
                                "date": "2018-12-29T19:10:00+01:00", 
                                "start": "19:10", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9783-the_mars_rover_on-board_computer", 
                                "title": "The Mars Rover On-board Computer", 
                                "subtitle": "How Curiosity's Onboard Computer works, and what you can learn from how it was designed", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Mars Rover Curiosity is one of the most sophisticated pieces of hardware ever launched into space. Because of the communication delay from Earth to Mars, it needs to accomplish most of its tasks completely autonomously: landing, navigation, exploration and singing birthday songs to itself. To do all this, it only has one central onboard computer. Let's look at that computer and the software it runs in detail. ", 
                                "description": "<p>While space is a somewhat unique environment, we can still learn a lot by looking at how the pieces hardware and software on board of Curiosity are designed and managed. The spacecraft only has one onboard computer that took over from the second it was launched towards Mars. It navigated the stars and orbits, managed a very complicated landing procedure, and now drives around as a car-sized rover over rocks and slippery ravines, all while collecting samples and analysing them with its on board lab.</p>\r\n\r\n<p>First we'll have a look at the history of the Mars Science Laboratory plans, then in part two we will launch into hardware. What processors do we have, how are the working together? How is redundancy handled, and shielding against radiation?</p>\r\n\r\n<p>As a part three, we'll look closely at the rover's software. Using over the air updates, almost all code running on Curiosity has been pushed there after it had landed on Mars. NASA pushed updates to enable new scientific missions, to make it traverse the environment in a different way, and to route around broken hardware. </p>\r\n\r\n<p>After listening to this talk, you should find yourself inspired to look at problems of software and hardware fault-tolerance and  long-term maintenance in a new light. You should be entertained by a hopefully interesting aspect of computers and space flight.  And you'll get a certain awe of the engineers at JPL and their accomplishments. </p>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4702, 
                                        "public_name": "breakthesystem"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.amazon.com/Design-Engineering-Curiosity-Performs-Springer/dp/3319681443", 
                                        "title": "The Design and Engineering of Curiosity: How the Mars Rover Performs Its Job (Springer Praxis Books) 1st ed. 2018 Edition"
                                    }, 
                                    {
                                        "url": "https://www.youtube.com/watch?v=09iTidqkriw", 
                                        "title": "Another Talk by Daniel"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9716.html", 
                                "id": 9716, 
                                "guid": "48ed6dea-e67d-4866-8c35-318e9d892363", 
                                "logo": "/system/events/logos/000/009/716/large/lossy-page1-576px-%22WAAC_-_SILENCE_MEANS_SECURITY%22_-_NARA_-_515987.tif.jpg?1545215113", 
                                "date": "2018-12-29T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9716-du_kannst_alles_hacken_du_darfst_dich_nur_nicht_erwischen_lassen", 
                                "title": "Du kannst alles hacken \u2013 du darfst dich nur nicht erwischen lassen.", 
                                "subtitle": "OpSec f\u00fcr Datenreisende", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Schon Wladimir Wladimirowitsch Putin wusste: \"Hacker, das sind freie Menschen, so wie K\u00fcnstler.\" Wie wollen daf\u00fcr sorgen, dass es so bleibt.", 
                                "description": "Der Hacksport erfreut sich immer gr\u00f6\u00dferer Beliebtheit \u2013\u00a0nicht nur in Russland. \r\n\r\nIn diesem Einf\u00fchrungs-Talk geben wir einen \u00dcberblick \u00fcber die Risiken des Hobbys: Eingetretene T\u00fcren, Hausdurchsuchungen und hohe Anwaltskosten tr\u00fcben den Genuss des freien Hacksports.\r\n\r\nHier lohnt es sich f\u00fcr den hackenden Nachwuchs, aus den Fehlern anderer zu lernen. Wir geben klassische Beispiele f\u00fcr Fehler in der Operational Security, damit Ihr sie nicht machen m\u00fcsst.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 3995, 
                                        "public_name": "Linus Neumann"
                                    }, 
                                    {
                                        "id": 3901, 
                                        "public_name": "Thorsten Schr\u00f6der"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10017.html", 
                                "id": 10017, 
                                "guid": "1c64358f-3bdd-484e-a28e-58dc7baa4480", 
                                "logo": null, 
                                "date": "2018-12-29T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "00:50", 
                                "room": "Adams", 
                                "slug": "35c3-10017-electronic_evicence_in_criminal_matters", 
                                "title": "Electronic Evicence in Criminal Matters", 
                                "subtitle": "An introduction and critique of the EC proposal for a regulation", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The lecture will give an introduction into the \"EC Proposal for a Regulation on European Production and Preservation Orders for Electronic Evidence in Criminal Matters (COM (2018) 225 final)\" and .\r\nthe impact to civil liberties of the users as well as the challenges for service providers of the diverse range of services covered by the proposal.<br>\r\nUrgent action is required <b>now</b> by diverse groups to fight the existing proposal and prevent it from becoming binding law throughout the EU..    ", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 174, 
                                        "public_name": "Klaus Landefeld"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/712/original/35C3_-_e-evidence_20181229.pdf?1546115203", 
                                        "title": "Presentation"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9667.html", 
                                "id": 9667, 
                                "guid": "a667d070-483e-4e2b-9bf9-d9a5475b6356", 
                                "logo": null, 
                                "date": "2018-12-29T23:10:00+01:00", 
                                "start": "23:10", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9667-desinformation_und_fake_news_-_bekampfung_und_verifizierung_leicht_gemacht", 
                                "title": "Desinformation und Fake News - Bek\u00e4mpfung und Verifizierung leicht gemacht", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "F\u00fcr Journalisten bieten soziale Netzwerke eine Vielzahl von Quellen und Informationen, in einem Ausma\u00df, das vor Jahren unvorstellbar war. Doch damit steigt auch das Risiko immer weiter, auf Manipulationen und \u201eFake News\u201c hereinzufallen. In Zeiten von \u201eL\u00fcgenpresse\u201c-Rufen stellt das Journalisten vor neue Herausforderungen. Der Vortrag zeigt, wie die Verifizierung von Bildmaterial bei gro\u00dfen Medienh\u00e4usern abl\u00e4uft \u2013 und warum auch normale Nutzer diese M\u00f6glichkeiten kennen und benutzen sollten. ", 
                                "description": "W\u00e4hrend Bildmaterial bis vor wenigen Jahren noch haupts\u00e4chlich eigenproduziert oder eingekauft wurde oder \u00fcber Agenturen geliefert wurde, kann dank Smartphones jeder zum Video- und Nachrichtenproduzent werden. Teilweise haben solche Videos eine Reichweite, von der etablierte Medien nur tr\u00e4umen k\u00f6nnen. Es geschieht kaum eine Breaking News, bei der nicht nach wenigen Minuten bereits Bilder im Netz kursieren. Dass solche Bilder nicht ungepr\u00fcft \u00fcbernommen werden sollten, hat sich zum Gl\u00fcck rumgesprochen. Aber wie kann der Wahrheitsgehalt eines Bildes oder Videos unabh\u00e4ngig und nachvollziehbar verifiziert werden? Viele Medienh\u00e4user haben erkannt, dass traditionelle Recherchemethoden bei diesem Thema schnell an ihre Grenzen sto\u00dfen und haben Verifizierungsteams gegr\u00fcndet. Gl\u00fccklicherweise gibt es viele Programme, Webseiten und Plug-Ins, die einen bei der Verifizierung unterst\u00fctzen. Der Vortrag zeigt, welche Arten von F\u00e4lschungen es gibt und wie man F\u00e4lschungen mit welchen Mitteln entlarven kann.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8192, 
                                        "public_name": "Robert Clausen"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://verificationhandbook.com", 
                                        "title": "verificationhandbook.com"
                                    }, 
                                    {
                                        "url": "http://osintframework.com", 
                                        "title": "osintframework.com"
                                    }, 
                                    {
                                        "url": "http://suncalc.org", 
                                        "title": "suncalc.org"
                                    }, 
                                    {
                                        "url": "http://invid-project.eu", 
                                        "title": "invid-project.eu"
                                    }, 
                                    {
                                        "url": "http://wikimapia.org", 
                                        "title": "wikimapia.org"
                                    }, 
                                    {
                                        "url": "http://graph.tips", 
                                        "title": "graph.tips"
                                    }, 
                                    {
                                        "url": "http://citizenevidence.amnestyusa.org", 
                                        "title": "citizenevidence.amnestyusa.org"
                                    }, 
                                    {
                                        "url": "http://camopedia.org", 
                                        "title": "camopedia.org"
                                    }, 
                                    {
                                        "url": "http://logos.iti.gr", 
                                        "title": "logos.iti.gr"
                                    }, 
                                    {
                                        "url": "http://worldlicenseplates.com", 
                                        "title": "worldlicenseplates.com"
                                    }, 
                                    {
                                        "url": "https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA/edit", 
                                        "title": "Bellingcat Toolkit (Google Doc)"
                                    }, 
                                    {
                                        "url": "http://geolocatethis.site", 
                                        "title": "geolocatethis.site (aktuell offline)"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9486.html", 
                                "id": 9486, 
                                "guid": "1f290832-c93f-453b-9966-83ecbda4c1c3", 
                                "logo": null, 
                                "date": "2018-12-30T00:10:00+01:00", 
                                "start": "00:10", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9486-hebocon", 
                                "title": "Hebocon", 
                                "subtitle": "The sumo robot fight for the technically ungifted", 
                                "track": "Entertainment", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "We let the technically ungifted build robots and to fight each other for the laughs. \r\n\r\nPlease contact @honky in RocketChat or visit the ChaosZone Hall 2 if you want to participate. We need at least 8 Robots to participate, if we have more, we'll bring this to the battlefield.", 
                                "description": "Let's build funny robots and let them fight each other as long as we are superior to them :) Please let's dishonor high tech and celebrate everything made out of stuff we usually throw away (and blinks).\r\n\r\nPlease contact @honky in RocketChat or visit the ChaosZone Hall 2 if you want to participate. We need at least 8 Robots to participate, if we have more, we'll bring this to the battlefield.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8067, 
                                        "public_name": "honky"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://media.ccc.de/v/DS2018-9308-hebocon_finale", 
                                        "title": "Datenspuren 2018"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/690/original/hebocon.png?1546085092", 
                                        "title": "Advertisment on Site"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/710/original/Hebocon.pdf?1546113492", 
                                        "title": "Slides for Translators"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9911.html", 
                                "id": 9911, 
                                "guid": "e4dbae08-779a-4972-a099-7c85df141fa4", 
                                "logo": null, 
                                "date": "2018-12-30T01:10:00+01:00", 
                                "start": "01:10", 
                                "duration": "01:30", 
                                "room": "Adams", 
                                "slug": "35c3-9911-chaos_communication_slam", 
                                "title": "Chaos Communication Slam", 
                                "subtitle": "Technische Liebesgedichte & Horrorgeschichten im Dichterwettstreit", 
                                "track": "Entertainment", 
                                "type": "other", 
                                "language": "de", 
                                "abstract": "Chaos meets Poetry Slam. \r\nDer humoristische Dichterwettstreit mit Informatikhintergrund. Mitmachen ausdr\u00fccklich erw\u00fcnscht. ", 
                                "description": "Und keine Sorge, ein Poetry Slam hat nichts mit dem Ingeborg-Bachmann-Preis zu tun. Hierbei geht es um einen Wettkampf bei dem selbstgeschriebene Texte live vorgetragen werden. Prosa, Lyrik, lustige Geschichte, das ist eure Wahl. Erz\u00e4hlt von euren Sysadmin Lovestorys, WebDev-f*ckUps oder was auch immer euch auf der Seele liegt.\r\nF\u00fcr Kurzentschlossene bieten wir euch davor noch einen Crash Kurs in Slam Poetry an, damit auch ihr das Publikum begeistern k\u00f6nnt und mit in das Finale einzieht. Die Session findet ihr zeitnah im Event-Wiki. Auf dieser Seite findet ihr auch eine Adresse, um euch f\u00fcr das gro\u00dfe Event anzumelden.\r\nDurch den Abend begleitet euch das Slam-erfahrene Team der \"Slamigans\" aus dem Umfeld des Chaostreff Flensburg. Moderiert von Thorben Dittmar, fr\u00fcherer U20-Local aus dem K\u00fchlhaus und ewiger zweiter Platz, stimmt das Publikum zusammen \u00fcber die besten Beitr\u00e4ge ab. Das Siegertreppchen darf sich schon auf tolle Preise freuen.\r\nAlso schnell anmelden!", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8386, 
                                        "public_name": "Thorben Dittmar"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Borg": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9567.html", 
                                "id": 9567, 
                                "guid": "ed525209-a9e5-4082-810a-3bd466ca8ca0", 
                                "logo": "/system/events/logos/000/009/567/large/yG2ahUfL_400x400.jpg?1543064844", 
                                "date": "2018-12-29T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "02:20", 
                                "room": "Borg", 
                                "slug": "35c3-9567-lightning_talks_day_3", 
                                "title": "Lightning Talks Day 3", 
                                "subtitle": "", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!", 
                                "description": "Did you think that the thrill of sharing your ideas in front of a huge audience at a C3 was something you'd never experience? Do you work on a cool project and want to get the word out? Was your talk one of the hundreds that got rejected? Did you come up with an awesome hack that you need to share? Go ahead and enter your Lightning Talk now!\r\n\r\nThe 35C3 Lightning Talks consist of three fast paced sessions which are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to get out to a global audience. Even if you don't have an awesome idea or project to share, a Lightning Talk is perfect for pitching your Assembly, your workshop or even a longer talk you'll give as a self-organized session. Your five minutes of fame!\r\n\r\nFor registration and schedule info, please check out https://c3lt.de/35c3", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5263, 
                                        "public_name": "gedsic"
                                    }, 
                                    {
                                        "id": 4601, 
                                        "public_name": "bigalex"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://c3lt.de/35c3", 
                                        "title": "Registration and schedule"
                                    }, 
                                    {
                                        "url": "https://events.ccc.de/congress/2018/wiki/index.php/Static:Lightning_Talks", 
                                        "title": "Congress Wiki Page"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9971.html", 
                                "id": 9971, 
                                "guid": "a35c6c71-1f67-445c-bf13-11a586dff32c", 
                                "logo": null, 
                                "date": "2018-12-29T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9971-the_critical_making_movement", 
                                "title": "The Critical Making Movement", 
                                "subtitle": "How using critical thinking in technological practice can make a difference", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Critical Thinking + Making = Critical Making. Around the world, academics and grassroots communities alike are engaging in critical making. With roots in critical design and critical engineering, etc., the point is to re-politicise making, help people understand that it needs to be more than printing cheap plastic knickknacks and can be used for activism and social innovation to improve peoples' lives. ", 
                                "description": "Using critical thinking in the DIY culture to look beyond the idealised picture of the maker and \"reintroduce a sense of criticality back into post-2010 maker culture to un-sanitize, un-smooth and re-politicize it\" (Hertz) is a relatively recent notion. More and more academia introduce Critical Making into their curricula, but bottom-up, grassroots movements also use critical making. Not only to raise awareness and hopefully change the status quo but also to see profit-oriented innovation practices vary, to minimise their adverse effects on society and the environment. \r\n\r\nThis lecture will explore the notion of using more societal reflection in technology (both hardware and software) and its importance for our future. Insights on political-activist examples and case studies from around the world (Indonesia, Brazil, Germany) will be presented, with a focus on practice, practitioner and motivation. The aim is to explore making movement as a broader, global yet hyper-locally relevant phenomenon. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8256, 
                                        "public_name": "Regina M. Sipos"
                                    }, 
                                    {
                                        "id": 8529, 
                                        "public_name": "Saad Chinoy"
                                    }, 
                                    {
                                        "id": 8687, 
                                        "public_name": "Ricardo Ruiz"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/691/original/Critical_Making_Movement_CCC.pdf?1546086750", 
                                        "title": "Critical Making movement, first part of talk, by Regina"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/692/original/35c3.pdf?1546086848", 
                                        "title": "Engineering Good"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9364.html", 
                                "id": 9364, 
                                "guid": "7228f88d-8d6f-40a9-a5dd-b5c91b823ada", 
                                "logo": "/system/events/logos/000/009/364/large/molecule.png?1536771644", 
                                "date": "2018-12-29T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9364-viva_la_vita_vida", 
                                "title": "Viva la Vita Vida", 
                                "subtitle": "Hacking the most secure handheld console", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Since its release in 2012, the PlayStation Vita has remained one of the most secure consumer devices on the market. We will describe the defenses and mitigations that it got right as well as insights into how we finally defeated it. The talk will be broken into two segments: software and hardware. First, we will give some background on the proprietary security co-processor we deem F00D, how it works, and what we had to do to reverse an architecture with minimal public information. Next, we will talk about hardware attacks on a real world secure hardware and detail the setup process and the attacks we were able to carry out. This talk assumes no prior knowledge in hardware and a basic background in system software. Focus will be on the methods and techniques we've developed along the way.", 
                                "description": "How do you hack a device running a full featured, security hardened, and completely proprietary operating system executed on a custom designed SoC? Although the PlayStation Vita did not reach the market success of its contemporaries, it was a surprisingly solid device security-wise. Sony learned from the mistakes of PS3 and PSP and there were (mostly) no \"FAIL\" moments. It carried exploit mitigations that are standard today but groundbreaking for a \"popular\" device in 2012: SMAP, kernel ASLR, > 2 security domains, and more. Molecule was the first group to run unsigned code on the device as well as the first to hack kernel mode and TrustZone. However, to target the security co-processor (F00D), we need to bring out the big guns. Using a highly customized version of the popular ChipWhisperer hardware, we carried out hardware attacks on the device including fault injection (glitching) and side channel analysis. In a board with twelve layers, dozens of unknown ICs, and hundreds of passives, how do you even begin to attack it without any information? We will start with the basics: a whirlwind tour of the theory behind the attacks. Then we will move to the practical application: mapping out the power domains of a SoC, soldering tips for microscopic points, finding a good trigger signal, finding a glitch target, and searching the right parameters. Finally, if time permits, we will also talk a bit about how to extend our existing setup to perform side channel analysis with a few modifications.\r\n\r\nIt is unfortunate that the Vita was such a niche device, but we hope this talk will inspire more people to pick it up. The Vita is dead, long live the Vita!", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8138, 
                                        "public_name": "Yifan Lu"
                                    }, 
                                    {
                                        "id": 8140, 
                                        "public_name": "Davee"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://yifan.lu/2016/12/31/state-of-the-vita-2016/", 
                                        "title": "State of the Vita (2016)"
                                    }, 
                                    {
                                        "url": "https://yifan.lu/2017/07/31/henkaku-enso-bootloader-hack-for-vita/", 
                                        "title": "Ens\u014d Bootloader Hack (2017)"
                                    }, 
                                    {
                                        "url": "https://yifan.lu/2016/11/01/taihen-cfw-framework-for-ps-vita/", 
                                        "title": "taiHEN CFW Framework (2016)"
                                    }, 
                                    {
                                        "url": "https://yifan.lu/2016/07/28/henkaku-vita-homebrew-for-everyone/", 
                                        "title": "HENkaku Hack (2016)"
                                    }, 
                                    {
                                        "url": "https://yifan.lu/2013/09/10/why-hacking-the-vita-is-hard-or-a-history-of-first-hacks/", 
                                        "title": "Why hacking the Vita is hard (2013)"
                                    }, 
                                    {
                                        "url": "https://blog.xyz.is/2016/webkit-360.html", 
                                        "title": "Exploiting WebKit on Vita 3.60"
                                    }, 
                                    {
                                        "url": "https://blog.xyz.is/2018/enso.html", 
                                        "title": "Ens\u014d: A PS Vita bootloader exploit"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9788.html", 
                                "id": 9788, 
                                "guid": "83bf042d-7382-4975-a3f8-92229944b8fc", 
                                "logo": null, 
                                "date": "2018-12-29T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9788-memsad", 
                                "title": "Memsad", 
                                "subtitle": "why clearing memory is hard.", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "This presentation will start off with a simple problem (how do you clear memory that holds sensitive content). It explores numerous possible solutions, and presents real live facts and figures. bugs in common applications will be shown. ", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 821, 
                                        "public_name": "Ilja van Sprundel"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/719/original/memsad.pptx?1546120017", 
                                        "title": "memsad.pptx"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9973.html", 
                                "id": 9973, 
                                "guid": "7030e406-2e1f-4d4d-8b1b-c68aa22a3434", 
                                "logo": "/system/events/logos/000/009/973/large/GFF_Bildmarke_freigestellt.jpg?1540979362", 
                                "date": "2018-12-29T18:50:00+01:00", 
                                "start": "18:50", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9973-freedom_needs_fighters", 
                                "title": "Freedom needs fighters!", 
                                "subtitle": "Wie die GFF mit strategischen Klagen f\u00fcr Freiheitsrechte k\u00e4mpft und was in 2019 auf uns zukommt", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Der Talk gibt einen \u00dcberblick \u00fcber die Arbeit der Gesellschaft f\u00fcr Freiheitsrechte (GFF): Wir klagen, um Grund- und Menschenrechte vor Gesetzgebern und Beh\u00f6rden zu sch\u00fctzen.", 
                                "description": "Die letzten Jahre waren harte Zeiten f\u00fcr die B\u00fcrgerrechte: Im Bund regierten gro\u00dfe Koalitionen, die reihenweise \u00dcberwachungsgesetze verabschiedeten - etwa die Staatstrojaner im Strafverfahren, das neue BKA-Gesetz oder den Zugriff von Geheimdienste auf die biometrischen Passbildern aller B\u00fcrgerinnen und B\u00fcrger, selbst wenn sie sich nichts haben zuschulden kommen lassen. Auch in vielen Bundesl\u00e4ndern scherten sich die Parlamente nicht viel um Grundrechte, etwa in Bayern, wo seit dem Sommer das h\u00e4rteste Polizeigesetz seit dem Ende der Nazi-Diktatur herrscht - ein Gesetz, das so krass ist, dass sich sogar die Polizeigewerkschaft kritisch \u00e4u\u00dferte. Diese und viele andere Themen besch\u00e4ftigen die GFF, die mit strategischen Klagen versucht, Grundrechte und Menschenrechte zu sch\u00fctzen. Unsere Arbeit geht dabei weit hinaus \u00fcber den Bereich \"digitale Grundrechte\" hinaus: Derzeit laufen Verfahren bzw. bereiten wir Verfahren vor gegen \u00a7 219a StGB (Maulkorb f\u00fcr \u00c4rzt*innen, die Abtreibungen vornehmen), die Polizeigesetze in Bayern, NRW und Hessen, das Verbot von linksunten.indymedia, die Staatstrojaner in der StPO sowie gegen die Internet-Massen\u00fcberwachung durch den BND durch das G10 und das BND-Gesetz. Au\u00dferdem engagieren wir uns in einem Verfahren f\u00fcr gleiches Gehalt f\u00fcr Frauen und M\u00e4nner und organisieren gemeinsam mit Frag den Staat eine Serie von Transparenzklagen,  um Informationsfreiheit auch vor Gericht durchzusetzen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 3723, 
                                        "public_name": "Ulf Buermeyer"
                                    }, 
                                    {
                                        "id": 8688, 
                                        "public_name": "Nora Markard"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9851.html", 
                                "id": 9851, 
                                "guid": "5909125c-6118-4cda-931a-8b936f81dda0", 
                                "logo": null, 
                                "date": "2018-12-29T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "00:40", 
                                "room": "Borg", 
                                "slug": "35c3-9851-conquering_large_numbers_at_the_lhc", 
                                "title": "Conquering Large Numbers at the LHC", 
                                "subtitle": "From 1 000 000 000 000 000 to 10: Breaking down 14 Orders of Magnitude", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "We are going to outline the ingredients necessary to perform measurements at the LHC, starting from an ordinary bottle of hydrogen. Let us take you on a journey following the path of the protons from this bottle to being ready for collisions in one of the detectors. Once the collisions are recorded we show the approaches and tools on how to extract the metaphorical needle in the haystack.", 
                                "description": "The Large Hadron Collider at CERN is one of the largest and most precise machines mankind has built. As a particle accelerator, it enables us to study proton collisions in large detector experiments such as ATLAS and CMS. These detectors basically work like huge cameras with millions of channels taking up to one billion snapshots of the collisions per second. In a large fraction of these collisions, reactions take place that have been studied and understood for decades now. The very rare processes, however, are those that are especially interesting, but at the same time challenging to extract. \r\nThe probabilities of processes, that have been studied and confirmed so far, span a range of 14 orders of magnitude. Finding the needle in the haystack of events we record at the LHC is like trying to score a field goal in basketball from space.\r\nThe rareness of the interesting phenomena not only calls for pure physics understanding, but it also requires advanced techniques in data mining to find as many events of interest as possible while reducing the number of incorrectly accepted events. Hence, data handling in high energy physics means to dig into petabytes of data to filter out and catch a hand full of interesting reactions. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8540, 
                                        "public_name": "Carsten Bittrich"
                                    }, 
                                    {
                                        "id": 8622, 
                                        "public_name": "Stefanie Todt"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/724/original/ConqueringLargeNumbersAtLHC.pdf?1546182066", 
                                        "title": "Slides"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9596.html", 
                                "id": 9596, 
                                "guid": "7eac80f4-c999-4c2e-a0de-90eabca7ea7d", 
                                "logo": null, 
                                "date": "2018-12-29T21:50:00+01:00", 
                                "start": "21:50", 
                                "duration": "00:40", 
                                "room": "Borg", 
                                "slug": "35c3-9596-no_evidence_of_communication_and_morality_in_protocols_off-the-record_protocol_version_4", 
                                "title": "No evidence of communication and morality in protocols: Off-the-Record protocol version 4", 
                                "subtitle": "", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "OTRv4 is the newest version of the Off-The-Record protocol. It is a protocol where the newest academic research intertwines with real-world implementations. It is also one of the first protocols that comes from the global south which makes the political discussion around protocols an urgency.  This newest versions also asks us to revisit our definitions around deniability (online and offline) and how important is it to the world. In this talk we will try to start a discussion around the importance of protocols, its political/moral foundations, the real-world implementation of academic ideas, the importance of securely implementing them, the definition of deniability in the current world and the design of OTRv4.", 
                                "description": "As we know from past revelations, the Internet has become a place where any action is surveilled and recorded. In the light of this, the OTR protocol was created. But it was created long time ago. In the past years, there have been a increased work on cryptographic primitives, and privacy and security notions. But these thoughts have not been incorporated into projects. OTRv4 is the newest version of the Off-The-Record protocol, which tries to incorporate these new ideas. At the same time, OTRv4 is a protocol that challenges the common thinking around protocols as it comes from the global south, and takes moral questions into its design, as Rogaway tried to defined on his \"The Moral Character of Cryptographic Work?\" paper. Furthermore, OTRv4 tries to update the notion of deniability and why it is important for the world. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8357, 
                                        "public_name": "Sofia Celi"
                                    }, 
                                    {
                                        "id": 8736, 
                                        "public_name": "Jurre van Bergen"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://petsymposium.org/2018/files/hotpets/7-bini.pdf", 
                                        "title": "No evidence of communication: Off-The-Record Protocol version 4OTRv4: HotPETS paper"
                                    }, 
                                    {
                                        "url": "https://github.com/otrv4/otrv4/blob/master/otrv4.md", 
                                        "title": "OTRv4 specification"
                                    }, 
                                    {
                                        "url": "https://github.com/otrv4/libotr-ng", 
                                        "title": "OTRv4 implementation"
                                    }, 
                                    {
                                        "url": "http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf", 
                                        "title": "\"The Moral Character of Cryptographic Work?\" paper"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/726/original/CCC.pdf?1546217037", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9523.html", 
                                "id": 9523, 
                                "guid": "3a571c21-31ed-453b-886d-7dea7b5751cd", 
                                "logo": "/system/events/logos/000/009/523/large/iod.png?1538977573", 
                                "date": "2018-12-29T22:50:00+01:00", 
                                "start": "22:50", 
                                "duration": "00:40", 
                                "room": "Borg", 
                                "slug": "35c3-9523-internet_of_dongs", 
                                "title": "Internet of Dongs", 
                                "subtitle": "A long way to a vibrant future", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "With great pleasure comes great responsibility. A responsibility, which is not taken enough into consideration by the smart sex toy manufacturers as they should, while handling extremely sensitive data. As long as there is no serious breach, there is no problem, right? This was the basis for a research project (Master Thesis) called \u201cInternet of Dildos, a long way to a vibrant future\u201d, dealing with the assessment of smart sex toys and identification of vulnerabilities in those products, including mobile apps, backends and the actual hardware. \r\nAfter the assessment of a selection of multiple smart sex toys an abyss of vulnerabilities was revealed. The identified vulnerabilities range from technically interesting vulnerabilities to vulnerabilities which affect the privacy of the users in extreme and explicit ways.\r\n", 
                                "description": "In recent years the internet of things has slowly creeped into our daily life and is now an essential part of it, whether you want it or not. A long-existing sub category of the internet of things is a mysterious area called teledildonics. This term got invented about 40 years ago and described (at this time fictional) devices, allowing their users to pleasure themselves, while being interconnected to a global network of plastic dongs. In the 21st century, teledildonics actually exist. Multiple devices are on the (multi-million dollar) market, offering the ability to pleasure an individual, while being connected to the internet. Those devices offer functionalities, like remote pleasuring over local links as well as over the internet. They implement social media-like functionalities such as friends lists, instant messaging, movie chats and explicit-image sharing. \r\nWith great pleasure comes great responsibility. A responsibility, which is not taken enough into consideration by the smart sex toy manufacturers as they should, while handling extremely sensitive data. As long as there is no serious breach, there is no problem, right?\r\nThis was the basis for a research project called \u201cInternet of Dildos, a long way to a vibrant future\u201d, dealing with the assessment of smart sex toys and identification of vulnerabilities in those products, including mobile apps, backends and the actual hardware. \r\nAfter the assessment of a selection of multiple smart sex toys an abyss of vulnerabilities was revealed. The identified vulnerabilities range from technically interesting vulnerabilities to vulnerabilities which affect the privacy of the users in extreme and explicit ways. It was possible to gain access to thousands of users\u2019 data records, including cleartext passwords, explicit images, real-world names, real-world addresses, and many more specific facts. Furthermore, we were able to remotely pleasure individuals without their consent over the internet, or over a local link.\r\n\r\nPresentation Outline\r\n1.\tWhy?\r\nExplanation as to why it is necessary to conduct penetration tests in the area of teledildonics and why the topic was chosen for further research. \r\n\r\n2.\tQuick introduction into basics like\r\nInternet of Things (IoT)\r\nSextech\r\nTeledildonics (History of Smart Sex Toys)\r\nInternet of Dongs (IoD)\r\n\r\n3.\tThe \u201cTest Devices\u201d\r\nA quick introduction of the test devices examined during this project.\r\nExplanation of their feature set including areas of application and use-cases.\r\n\r\n4.\tLet\u2019s get dirty \u2013 An overview of the identified vulnerabilities\r\nDS_STORE File Information Disclosure\r\nCustomer Database Credential Disclosure\r\nUnrestricted Access to administrative interfaces\r\nWeird authentication implementation\r\nUnauthenticated Bluetooth LE Connections\r\nMissing Authentication in Remote Control\r\nAnd many more\u2026\r\n\r\n5.\tBluetooth LE Protocol exploitation\r\nBrief overview over Bluetooth LE security features\r\nBrief overview over Bluetooth LE authentication/pairing methods\r\nBrief overview over Bluetooth LE exploitation Hardware\r\nBrief overview over Bluetooth LE exploitation Software\r\nHands-on example\r\n\r\n6.\tThe \u201cSwinger Club Problem\u201d\r\nHow the manufacturers tried to downplay the vulnerabilities.\r\n\r\n7.\tLegal Issues \u2013 Rape over the wire?\r\nHow are current laws dealing with sexual pleasure without consent over the internet?\r\n\r\n8.\tResponsible Disclosure Process\r\nCoordinated vulnerability remediation with the German CERT-Bund\r\n\r\n9.\tOngoing/Similar Research\r\n\r\nTakeaways\r\nAttendees are made aware that not a single category of devices in the internet of things is secure, no matter how obscure and outlandish the device might be. This should also raise attention and motivation to test all those devices that are already out there and handle the Internet of Things more cautiously.\r\nAnother important takeaway is to raise attention to how poorly programmed many IoT devices are and how it is still possible to discover vulnerability cases, which should be resolved and extinct. \r\nLast but not least, we want to take the opportunity to discuss and raise attention to the hot topic of \u201cremote rape\u201d or how our current legislature deals with remote pleasuring without consent.\r\n\r\nWhy this talk?\r\nFirst and foremost, this talk will be a lot of fun while teaching the audience how to assess smart sex toys and penetrate their backends (pun intended). The audience will learn what an attacker is capable of when attacking smart sex toys, nowadays. Furthermore, the audience will get deep insights into Bluetooth LE penetration testing including a hands-on example on a selected smart sex toy.\r\nMost of the identified vulnerabilities [1, 2, 3, 4] identified to this day include minor backend issues and or the good old exploitation of the Bluetooth LE protocol. The major difference compared to this research is, that the SEC Consult Vulnerability Lab identified a potential massive breach of data, including explicit images, clear text passwords, etc) via the \u201cpublicly\u201d accessible database, as well as the issue with the remote pleasuring without consent, which is a so called \u201cFeature\u201d.\r\n\r\n[1] https://arstechnica.com/information-technology/2017/10/screwdriving-many-bluetooth-sex-toys-leave-users-vulnerable/\r\n[2] https://internetofdon.gs/reports/\r\n[3] https://www.pentestpartners.com/security-blog/screwdriving-locating-and-exploiting-smart-adult-toys/\r\n[4] https://scubarda.wordpress.com/2017/10/17/hacking-a-bt-low-energy-ble-butt-plug/", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8352, 
                                        "public_name": "Werner Schober"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://sec-consult.com/en/blog/2018/02/internet-of-dildos-a-long-way-to-a-vibrant-future-from-iot-to-iod/index.html", 
                                        "title": "IoD Blogpost"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9941.html", 
                                "id": 9941, 
                                "guid": "ea00d1e0-a580-415f-a8cf-f02883d939dc", 
                                "logo": "/system/events/logos/000/009/941/large/images.png?1539641148", 
                                "date": "2018-12-29T23:50:00+01:00", 
                                "start": "23:50", 
                                "duration": "00:40", 
                                "room": "Borg", 
                                "slug": "35c3-9941-how_facebook_tracks_you_on_android", 
                                "title": "How Facebook tracks you on Android", 
                                "subtitle": "(even if you don\u2019t have a Facebook account)", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "<p>In this talk, we\u2019re looking at third party tracking on Android. We\u2019ve captured and decrypted data in transit between our own devices and Facebook servers. It turns out that some apps routinely send Facebook  information about your device and usage patterns - the second the app is opened. We\u2019ll walk you through the technical part of our analysis and end with a call to action: We believe that both Facebook and developers can do more to avoid oversharing, profiling and damaging the privacy of their users.</p>", 
                                "description": "<p>In this talk, we\u2019re looking at third party tracking on Android. We\u2019ve captured and decrypted data in transit between our own devices and Facebook servers. It turns out that some apps routinely send Facebook  information about your device and usage patterns - the second the app is opened. We\u2019ll walk you through the technical part of our analysis and end with a call to action: We believe that both Facebook and developers can do more to avoid oversharing, profiling and damaging the privacy of their users.</p>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8626, 
                                        "public_name": "Frederike Kaltheuner"
                                    }, 
                                    {
                                        "id": 8597, 
                                        "public_name": "Christopher Weatherhead"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://privacyinternational.org/types-abuse/facebook", 
                                        "title": "Privacy International [Facebook Stories]"
                                    }, 
                                    {
                                        "url": "https://privacyinternational.org", 
                                        "title": "Privacy International Website [Clearnet]"
                                    }, 
                                    {
                                        "url": "https://privacyintyqcroe.onion", 
                                        "title": "Privacy International Website [onion]"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/716/original/How_Facebook_tracks_users_on_Android_%28even_if_they_don't_have_a_Facebook_account%29-3.pdf?1546118360", 
                                        "title": "Slides"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }
                                ]
                            }
                        ], 
                        "Clarke": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9657.html", 
                                "id": 9657, 
                                "guid": "4e6ab724-8663-456a-ac01-1cfdfc94c27f", 
                                "logo": null, 
                                "date": "2018-12-29T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9657-from_zero_to_zero_day", 
                                "title": "From Zero to Zero Day", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "In this talk I will share my story of how in a little over a year, a high school student with almost zero knowledge in security research found his first RCE in Edge.", 
                                "description": "After starting my BSc in CS and Math I picked up a new hobby: solving coding challenges. The next logical step was to try harder challenges, which lead me to participate in CTF competitions. During these CTFs I found that I\u2019m fascinated by vulnerabilities: finding mistakes or things that developers failed to think through. This is how I started going down the rabbit hole. \r\n\r\nFast forward a year later, I found my first 0-day, a critical RCE in Edge. To understand it, we will review the recent trend of JIT Type Confusion vulnerabilities in ChakraCore. I will talk about the vulnerability I found, explain how I discovered it and show similar vulnerabilities recently found by other researchers. Finally, I will demo a working exploit of this vulnerability. \r\n\r\nThis session could be helpful both for people interested in getting into the security field, and for experienced security researchers who want to learn more about browser vulnerabilities and exploitation.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8362, 
                                        "public_name": "Jonathan Jacobi"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/735/original/From_Zero_to_Zero_Day.pdf?1547555612", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9664.html", 
                                "id": 9664, 
                                "guid": "cf86e707-27a6-4839-a03f-438413e7756f", 
                                "logo": null, 
                                "date": "2018-12-29T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9664-kosmische_teilchenbeschleuniger_und_ihre_spuren_in_der_antarktis", 
                                "title": "Kosmische Teilchenbeschleuniger und ihre Spuren in der Antarktis", 
                                "subtitle": "\u00dcber die Identifikation des ersten kosmischen Teilchenbeschleunigers und den Beginn einer neuen \u00c4ra in der Multimessenger-Astronomie", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Vor 5.7 Milliarden Jahren emittierte der Blazar TXS0506+056 eine gro\u00dfe Menge schwach wechselwirkender Neutrinos. Von dem durch ein supermassives schwarzes Loch im Zentrum seiner Galaxie angetriebenen kosmischen Teilchenbeschleuniger fand eines dieser Teilchen seinen Weg zur Erde und interagierte mit Wassermolek\u00fclen im antarktischen Eis. Durch einen gl\u00fccklichen Zufall konnte das IceCube Neutrino Observatory, ein Kubikkilometer gro\u00dfer Detektor aus instrumentiertem Eis, am 22. September 2017 eine Lichtspur aufzeichnen, die direkt zur Quelle zur\u00fcck zeigte. Damit konnte erstmals ein bekanntes astrophysikalisches Objekt mit dem Ursprung eines kosmischen Neutrinos assoziert werden und das Ereignis IceCube-170922A schrieb Geschichte. Ein n\u00e4herer Blick auf die w\u00e4hrend 2014-2015 gesammelten Daten zeigte, dass die Neutrino-Emission von TXS0506+056 phasenweise erh\u00f6ht ist. Dies unterst\u00fctzt die These, dass das Ereignis von 2017 tats\u00e4chlich dem Blazar zugeordnet werden kann und die Entdeckung wurde zu einem gro\u00dfer Erfolg f\u00fcr die Multi-Messenger Astrophysik. ", 
                                "description": "Bereits 1912 entdeckte Viktor Hess die als kosmische Strahlen bekannten hochenergetischen Teilchen, die im Sekundentakt aus dem Weltall auf die Erdatmosph\u00e4re treffen. Einige von ihnen stammen aus unserer Sonne, andere von Quellen in unserer eigenen Galaxie \u2013 bei den h\u00f6chsten Energien liegen die Urspr\u00fcnge allerdings vermutlich in weit entfernten Galaxien. Ungl\u00fccklicherweise handelt es sich gr\u00f6\u00dfteils um geladene Ionen, die auf ihrem Weg durch das Universum durch Magnetfelder abgelenkt werden und nicht zu ihren Quellen zur\u00fcckverfolgt werden k\u00f6nnen. Deswegen konnte in den mehr als 100 Jahren seit ihrer Entdeckung keine eindeutige Quelle extragalaktischer kosmischer Strahlen identifiziert werden.  \r\nTrotz allem gibt es dort drau\u00dfen Objekte, die winzige Teilchen mit den unvorstellbar geringen Massen von 10^-24g auf die Energie beschleunigen, mit der Rafael Nadal seine Tennisb\u00e4lle aufschl\u00e4gt. In irgendeiner Form m\u00fcssen diese Objekte strahlen und neben kosmischen Strahlen auch andere Teilchen emittieren. Hier setzt die Idee von Multi-Messenger Astroteilchenphysik an: Bei der Untersuchung der energiereichsten Objekte unseres Universums werden zugleich Licht, Neutrinos und Gravitationswellen betrachtet, allesamt ungeladene Boten, die Informationen von den Quellen direkt zu unseren Detektoren tragen. W\u00e4hrend 2017 Gravtitationswellen eines Gammastrahlenblitzes identifiziert werden konnten, war der diesj\u00e4hrige Durchbruch in der Multi-Messenger Astroteilchenphysik die Assoziation eines von IceCube detektierten Neutrinos mit einem bekannten Blazar in einer weit entfernten Galaxie. \r\n\r\nIn diesem Vortrag erkl\u00e4ren wir, was Menschen zum Bau komplexer Detektoren an den exotischsten Pl\u00e4tzen der Welt motiviert, um hochenergetische Teilchen aus dem Weltall zu jagen. Wir sprechen \u00fcber die bahnbrechende Entdeckung diesen Jahres und beleuchten, wie der Durchbruch durch twitter-\u00e4hnliche Echtzeit-Monitoring-Systeme \u00fcberhaupt erst m\u00f6glich wurde.  \r\n\r\n5.7 billion years ago, the blazar TXS0506+056, a gigantic particle accelerator driven by the super-massive black hole at the center of its host galaxy, emitted a large number of weakly interacting elementary particles, known as neutrinos. One of these particles found its way to Earth and interacted with water molecules in the South-Antarctic Ice Sheet. Fortunately, the IceCube Observatory, a cubic kilometer of instrumented ice recorded a track of light that pointed directly back to its origin, unlike many other neutrinos captured in the past. This event, called IceCube-170922A writes history, since for the first time a concrete astrophysical object can be associated to the origin of this neutrino and thus the presence of strongly accelerated, interacting matter. A second look at the data recorded in 2014-2015 confirmed that the blazar has indeed periods of high-neutrino emission, strengthening the confidence in the 2017 event to be a real discovery and great success for Multi-Messenger Astrophysics.\r\n\r\nAs discovered by Victor Hess already in 1912, there are particles impinging the Earth\u2019s atmosphere every couple of seconds called Cosmic Rays. Some of them are accelerated in the sun, others by sources in our galaxy but at the highest energies, these particles are very likely coming from distant galaxies. Unfortunately, most of them are charged ions that are deflected by magnetic fields on their way through the universe and they do not point back to the point where they have been accelerated. Therefore, even 100 years after the discovery of cosmic rays a definite and obvious source has not been discovered. However, there is something out there that can accelerate a tiny particle with a mass as little as 10-24g (this is a number with !23! decimal zeros) to the energy equivalent to a tennis ball served by Rafael Nadal, then it must somehow shine and emit other radiation among the Cosmic Rays. This is the basic idea of multi-messenger astrophysics that aims to study the most violent objects in the universe by looking simultaneously at the emitted light, the neutrinos and the gravitational waves, which are all uncharged messengers carrying the information from the sources directly to our detectors. While n 2017, gravitational waves from a Gamma-Ray Burst were identified, this years major breakthrough in the field of multi-messenger astrophysics was the association  of a high energy neutrino detected by IceCube with a known blazar in a far away galaxy.  \r\n\r\nIn this lecture, we will aim to explain what motivates mankind to build complex observatories at the most exotic location around the globe to haunt for very high energy particles from space. We will shed light on this brand new detection and highlight that without the recent developments in a real-time monitoring/Twitter-like system the detection would have gone unnoticed.\r\n\r\nImage / Video Credits \r\n\r\nTitelbild: NASA\r\nB2\tUni Wien\r\nB3\tNASA\r\nB4\tCERN / LHC\r\nB5\tAuger Collaboration\r\nB6\tSven Lafebre\r\nB7\tNASA\r\nB8\t A. Fedynitch DESY\r\nB9\tIceCube Observatory\r\nB10\tfreier-grafiker.de\r\nB11 \tIceCube Collaboration\r\nB12\thttps://military.id.me/\r\nB13\tArgonne National Laboratory\r\nB14\tIceCube Collaboration\r\nB15\tIceCube Collaboration\r\nB16\tDESY (Renderbild)\r\nB17\tIceCube Collaboration\r\nB18\tIceCube Collaboration\r\nB19\tIceCube Collaboration\r\nB20\t\tScience Communication Lab und DESY (https://multimessenger.desy.de/ ) \r\nB21\t\tScience Communication Lab und DESY (https://multimessenger.desy.de/ )\r\n\r\nReferences\r\n\r\nR1\thttps://www.mpi-hd.mpg.de/hfm/HESS/public/vfHess.pdf (DE) ausf\u00fchrliche Diploma-Thesis\r\nR2\thttps://arxiv.org/abs/1808.02927 Original-Paper inkl. Kommentare\r\nR3\thttps://arxiv.org/abs/1701.07305 Proceedings on electron positron fluxes (AMS Coll. ) \r\nR4\thttps://arxiv.org/abs/astro-ph/0609060 Auger Observatory \r\nR5\thttps://arxiv.org/abs/1502.01323 ausf\u00fchrliche Detektorbeschreibung\r\nR6\thttps://arxiv.org/abs/1604.03637 AugerPrime Design Report, ohne AERA Radio Det.\t\r\nR7\thttps://arxiv.org/abs/1311.7346  Galactic Cosmic Rays Review\r\nR8\thttps://arxiv.org/abs/1804.02331 Galactic CR from young massive stars\r\nR9\thttps://arxiv.org/abs/0711.2256 2008 Correlation of UHECR with AGN (Auger Coll.)\r\nR10\thttps://arxiv.org/abs/1709.07321\t2017 large scale UHECR anisotropy (Auger Coll.)\r\nR11\thttps://arxiv.org/abs/0812.3809 High Energy Neutrino Detectors overview\r\nR12\thttps://arxiv.org/abs/1412.5106 IceCube Gen2\r\nR13 \thttps://arxiv.org/abs/1607.02671 PINGU IceCube\r\nR14\thttps://arxiv.org/abs/1612.05093 IceCube Instrumentation and Online Systems (DOM)  \r\nR15\thttp://science.sciencemag.org/content/342/6161/1242856.full (https://arxiv.org/abs/1311.5238 )\r\nR16\thttps://arxiv.org/abs/1805.11112  Neutrino Astronomy focus IceCube\r\nR17 \thttp://science.sciencemag.org/content/361/6398/eaat1378 (open access: https://arxiv.org/abs/1807.08816 ) \t\r\nR18\thttp://science.sciencemag.org/content/361/6398/147 (open access: https://arxiv.org/abs/1807.08794 )\r\nR19\t  https://arxiv.org/abs/1807.04275 modeling TXS2\r\nR20 \thttp://adsabs.harvard.edu/abs/1993ARA%26A..31..473A AGN Unification scheme 1993\r\nR21\thttps://arxiv.org/abs/1107.5576 AGN UHECR\r\nR22\thttps://arxiv.org/abs/1812.05939 Historical flare conventional models \r\nR23\thttps://arxiv.org/abs/1809.00601 Gas - Jet interaction model for historical flare \t\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7409, 
                                        "public_name": "Anni"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/733/original/Teilchenbeschleuniger_Antarktis.pdf?1546468006", 
                                        "title": "Presentation"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9648.html", 
                                "id": 9648, 
                                "guid": "e66cded3-7336-42bd-a7c8-d77073465ad2", 
                                "logo": "/system/events/logos/000/009/648/large/CCC_title.jpg?1539521954", 
                                "date": "2018-12-29T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9648-micropython_python_for_microcontrollers", 
                                "title": "MicroPython \u2013 Python for Microcontrollers", 
                                "subtitle": "How high-level scripting languages make your hardware project beautifuly easy", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "MicroPython is a lean and efficient implementation of the Python 3 programming language that includes a small subset of the Python standard library and is optimised to run on microcontrollers and in constrained environments.<br>\r\nThis talk will give an overview about the MicroPython hard- and software and introduces the community.", 
                                "description": "MicroPython is an Open Source project and developed in the open on GitHub. With more than 7000 stars, it ranks in the top 100 of the most popular C/C++ projects.<br>\r\nThe MicroPython pyboard is a compact electronic circuit board that runs MicroPython on the bare metal, giving you a low-level Python operating system that can be used to control all kinds of electronic projects.<br>\r\nMicroPython is packed full of advanced features such as an interactive prompt, arbitrary precision integers, closures, list comprehension, generators, exception handling and more. Yet it is compact enough to fit and run within just 256k of code space and 16k of RAM.<br>\r\nMicroPython aims to be as compatible with normal Python as possible to allow you to transfer code with ease from the desktop to a microcontroller or embedded system.<br>\r\nIt's used by educators, makers and professional hard- and software developers around the world. The use cases reach from embedded hardware testing over Industrial Internet of Things into space applications.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8135, 
                                        "public_name": "Christine Spindler"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "micropython.org", 
                                        "title": "MicroPython Website"
                                    }, 
                                    {
                                        "url": "github.com/micropython", 
                                        "title": "MicroPython on Git"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/686/original/MP_CCC_talk.pdf?1546076871", 
                                        "title": "Slides for MicroPython talk"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9346.html", 
                                "id": 9346, 
                                "guid": "7ee42591-4f4d-481d-884b-44f5e18e1803", 
                                "logo": "/system/events/logos/000/009/346/large/russiancard.png?1545036658", 
                                "date": "2018-12-29T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "00:40", 
                                "room": "Clarke", 
                                "slug": "35c3-9346-in_soviet_russia_smart_card_hacks_you", 
                                "title": "In Soviet Russia Smart Card Hacks You", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The classic spy movie hacking sequence: The spy inserts a magic smart card provided by the agency technicians into the enemy's computer, \u2026 the screen unlocks \u2026 What we all laughed about is possible!", 
                                "description": "Smartcards are secure and trustworthy. This is the idea smart card driver developers have in mind when developing drivers and smart card software. The work presented in this talk not only challenges, but crushes this assumption by attacking drivers using malicious smart cards.\r\n\r\nWe will present a fuzzing framework for *nix and Windows along with some interesting bugs found by auditing and fuzzing smart card drivers and middleware. Among them classic stack and heap buffer overflows, double frees, but also a replay attack against smart card authentication.\r\n\r\nSince smart cards are used in the authentication process, a lot of vulnerabilities can be triggered by an unauthenticated user, in code running with high privileges. During the author's research, bugs were discovered in OpenSC (EPass, PIV, OpenPGP, CAC, Cryptoflex \u2026), YubiKey drivers, pam_p11, pam_pkc11, Apple's smartcard-services and others.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8085, 
                                        "public_name": "Eric Sesterhenn"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/512/original/DEFCON-26-Eric-Sesterhenn-Soviet-Russia-Smartcard-Hacks-You.pdf?1539367610", 
                                        "title": "Defcon Slides"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/721/original/slides.pdf?1546148332", 
                                        "title": "35C3 Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9674.html", 
                                "id": 9674, 
                                "guid": "089b7fec-3ee1-493c-9b90-782c0514ffb4", 
                                "logo": null, 
                                "date": "2018-12-29T17:10:00+01:00", 
                                "start": "17:10", 
                                "duration": "00:40", 
                                "room": "Clarke", 
                                "slug": "35c3-9674-domain_name_system", 
                                "title": "Domain Name System", 
                                "subtitle": "Hierarchical decentralized naming system used since 30 years", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Whenever you enter a name into your computer, it resolves it to a numerical IP address. This resolution uses the Domain Name System (DNS), which is a hierarchical decentralised naming system used on the Internet. DNS is organised in a way that top-level domain (e.g. .com, .org) are delegated to registrars, which delegate subdomains (e.g. foo.com). This delegation is done as well via the DNS protocol via nameserver (NS) records. Since different types of data are kept in DNS, it can as well be seen as a distributed (and cached!) key-value store - which is fault-tolerant.\r\n\r\nI will explain the basic usage of DNS, including stub and recursive resolver, server, various protocol extensions (zone transfer, dynamic updates, authentication, notifications, ...), privacy extensions (query path minimisation, DNS-over-TLS), provisioning let's encrypt certificates. I will talk about attacks (poisoning, amplification, ...) and implementation pitfalls (not get stuck in the recursive resolver). I implemented DNS with above mentioned extensions as minimized MirageOS unikernels over past years.", 
                                "description": "DNS is used since 1985 for the Internet, and provides useful service for various protocols. Its initial design could not foresee its wide usage 30 years later. DNS is a core dependency of today's Internet usage. Within the <a href=\"https://mirage.io\">MirageOS</a> project we re-develop network protocols, and I was eager to learn about all the details of DNS, a protocol which has been around and will be around for more time since a lot of systems depend on it.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 1626, 
                                        "public_name": "Hannes Mehnert"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://hannes.nqsb.io/Posts/DNS#What-is-DNS", 
                                        "title": "Re-engineering DNS (blog)"
                                    }, 
                                    {
                                        "url": "https://github.com/roburio/udns", 
                                        "title": "\u00b5DNS implementation"
                                    }, 
                                    {
                                        "url": "https://mirage.io", 
                                        "title": "MirageOS"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9483.html", 
                                "id": 9483, 
                                "guid": "955e9c12-cd90-4f48-88f0-b879269a5421", 
                                "logo": null, 
                                "date": "2018-12-29T18:10:00+01:00", 
                                "start": "18:10", 
                                "duration": "00:40", 
                                "room": "Clarke", 
                                "slug": "35c3-9483-web-based_cryptojacking_in_the_wild", 
                                "title": "Web-based Cryptojacking in the Wild", 
                                "subtitle": "When your browser is mining coins for other people", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "A cryptojacking website abuses the computing resources of its visitors to covertly mine for cryptocurrencies in the browser. In this talk, we explore this phenomenon and answer, amongst others, the following questions: How does the mining script work under the hood? How common is this attack? How much money do the attackers earn? And how can I defend myself against such attacks?", 
                                "description": "With the introduction of memory-bound cryptocurrencies, such as Monero, the implementation of mining code in browser-based JavaScript has become a worthwhile alternative to running dedicated mining rigs. Based on this technology, a new form of parasitic computing, widely called cryptojacking, has gained momentum in the web.\r\n\r\nIn this talk, we systematically explore this phenomenon: To begin with, we demonstrate how modern web technologies are used to create an efficient miner solely in JavaScript. We then present our methodology on how to identify mining scripts on real websites at scale, which we use for a study on the Alexa top 1 million websites. In particular, we perform several secondary analyses to gain insight into the cryptojacking landscape, including a measurement of code characteristics, an estimate of expected mining revenue, and an evaluation of current blacklist-based countermeasures.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5643, 
                                        "public_name": "Marius Musch"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://arxiv.org/pdf/1808.09474.pdf", 
                                        "title": "Technical Report"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/720/original/cryptojacking.pdf?1546124881", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9385.html", 
                                "id": 9385, 
                                "guid": "1d9c1120-c076-4802-b95b-f35d8396638b", 
                                "logo": "/system/events/logos/000/009/385/large/publicdomainq-scientist-Isaac_Newton.png?1537050277", 
                                "date": "2018-12-29T19:10:00+01:00", 
                                "start": "19:10", 
                                "duration": "00:40", 
                                "room": "Clarke", 
                                "slug": "35c3-9385-modeling_and_simulation_of_physical_systems_for_hobbyists", 
                                "title": "Modeling and Simulation of Physical Systems for Hobbyists", 
                                "subtitle": "Essential Tools for Developing, Testing and Debugging Systems Interacting with the Real World", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "This is a foundations talk about modeling and simulation as tools for development, testing and debugging systems. It requires very little previous knowledge to address all makers and hobbyists interested in creating or modifying hardware that physically interacts with its environment (e.g. robots, drones, etc.). It explains the purpose of modeling and simulation, basic principles, and tips and tricks on a practical level.", 
                                "description": "During the development of robots, drones or other machines, the individual components are usually not all available at the same time, but are developed and tested separately and then assembled to the final system. Thus, it is often useful to have a placeholder that acts just like the missing components that are not present. Or, for debugging, it might be useful to have a reference configuration, which is known to work, in order to exclude potential sources of error. On the other side, it might be helpful to artificially recreate errors to test the system for robustness to these errors without risking real hardware. This is where modeling and simulation are useful tools to make the development faster and less error-prone.\r\n\r\nThis talk explains basic modeling and simulation techniques that help even for small project, how to model the physical effects encountered most frequently and to make a simulation of the created model run in a simple way. All examples will be held as practical as possible for community projects, relying only on common hardware and open-source software, in order to make them useful for a broad audience.\r\n\r\nBring your computer with Gnumeric, Python and OMEditor installed to follow the examples, if you want.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8168, 
                                        "public_name": "Manuel Aiple"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/643/original/interactiverobot.zip?1545914780", 
                                        "title": "Self-balancing robot simulator example"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/644/original/drop-with-drag.gnumeric?1545914880", 
                                        "title": "Drop with drag example"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/645/original/mass-spring-damper.gnumeric?1545914880", 
                                        "title": "Mass spring damper example"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/646/original/electric-motor.gnumeric?1545914880", 
                                        "title": "Electric motor example"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/659/original/script.pdf?1545942710", 
                                        "title": "Script to the talk"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/660/original/slides.pdf?1545942957", 
                                        "title": "Slides to the talk"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9765.html", 
                                "id": 9765, 
                                "guid": "35e80689-6330-49fe-b5c5-46972418f5b6", 
                                "logo": null, 
                                "date": "2018-12-29T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9765-remo2hbo_-robustes_und_reparierbares_vitalparametermonitoring", 
                                "title": "Remo2hbo -Robustes und reparierbares Vitalparametermonitoring", 
                                "subtitle": "Medizinger\u00e4te f\u00fcr Alle ", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Moderne Medizintechnik ist teuer und wenn sie kaputt geht, dann kann man sie normalerweise nur durch Servicetechnikerinnen austauschen lassen. Designkriterien orientieren sich an den Gesundheitsversorgung reicher L\u00e4nder. Wir stellen ein System zur Messung der wichtigsten Vitalparameter vor, das nicht nur open source und frei, sondern auch f\u00fcr den off-road Einsatz ausgelegt ist, wenn die Servicehotline nicht erreichbar ist. ", 
                                "description": "Medizinische Versorgung orientiert sich immer st\u00e4rker an \u00f6konomischen Aspekten und das gilt auch f\u00fcr Medizinger\u00e4te. Insbesondere werden sie f\u00fcr Industriel\u00e4nder entwickelt. Wie bei Laptops und Smartphones geht der Trend zu unreparierbaren Einmalger\u00e4ten. Was aber, wenn man als kleine NGO mit wenig Geld mit dem mobilen Krankenhaus im Krisengebiet ist oder eine Gesundheitsstation in Kirgisien aufbaut? Da hilft dann auch die gutgemeinte Spende von alten Medizinger\u00e4ten nicht so richtig viel weiter und endet schnell als Elektroschrott. Mit dem Anspruch, dass Medizinische Versorgung \u00fcberall m\u00f6glich sein muss und Gesundheit keine Ware ist, bauen wir einen Vitalparametermonitor, der sowohl hard- als auch softwarem\u00e4\u00dfig open source ist und m\u00f6glichst robust und reparierbar ist. Im Rahmen des Talks wollen wir Euch die wichtigsten Designkriterien, unsere Tests mit \"herk\u00f6mmlichen\" kommerziellen Systemen und unsere Hard- und Softwarel\u00f6sungen vorstellen und mit Euch disktutieren. Wenn alles l\u00e4uft wie geplant, gibt es sogar schon L\u00f6tkits des Prototypen zum Selbstkostenpreis... \r\n\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8571, 
                                        "public_name": "Dagmar Krefting"
                                    }, 
                                    {
                                        "id": 6404, 
                                        "public_name": "Sebastian J\u00fcnemann"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://remo2hbo.f4.htw-berlin.de/", 
                                        "title": "remo2hbo-Projekt"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/697/original/35C3_remo2hbo.pdf?1546092198", 
                                        "title": "35C3_remo2hbo.pdf"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9972.html", 
                                "id": 9972, 
                                "guid": "400622c5-3754-43fd-aaf3-0ca00e9ad551", 
                                "logo": "/system/events/logos/000/009/972/large/cellular-tower.jpg?1545130749", 
                                "date": "2018-12-29T22:10:00+01:00", 
                                "start": "22:10", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9972-funkzellenabfrage_die_alltagliche_rasterfahndung_unserer_handydaten", 
                                "title": "Funkzellenabfrage: Die allt\u00e4gliche Rasterfahndung unserer Handydaten", 
                                "subtitle": "Wie wir alle regelm\u00e4\u00dfig den Beh\u00f6rden ins Netz gehen und wie man immerhin mehr Transparenz schaffen kann", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Polizei und Geheimdienste sammeln per \"Funkzellenabfrage\" Tag f\u00fcr Tag Millionen von Standort-Daten. Netzbetreiber liefern den Beh\u00f6rden regelm\u00e4\u00dfig Datens\u00e4tze aller Mobilfunknummern, die zu einem bestimmten Zeitpunkt in bestimmten Funkzellen waren. Entgegen den gesetzlichen Bestimmungen erfahren Betroffene nicht davon.", 
                                "description": "Dieser Talk macht deutlich, was diese Form der Massen\u00fcberwachung aus b\u00fcrgerrechtlicher Sicht bedeutet. Danach stellen die Speaker das Berliner Funkzellenabfragen-Transparenz-System vor, das zumindest ein wenig Licht ins Dunkel dieser \u00dcberwachungsma\u00dfnahmen bringen kann.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 3723, 
                                        "public_name": "Ulf Buermeyer"
                                    }, 
                                    {
                                        "id": 5764, 
                                        "public_name": "Andre Meister"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://fts.berlin.de/", 
                                        "title": "Funkzellenabfragen-Transparenz-System des Landes Berlin"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9943.html", 
                                "id": 9943, 
                                "guid": "fb15f53a-ca5b-4c29-b901-89398e9aab72", 
                                "logo": "/system/events/logos/000/009/943/large/grafik.jpg?1539640858", 
                                "date": "2018-12-29T23:30:00+01:00", 
                                "start": "23:30", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9943-afdwegbassen_protest_club-_kultur_und_antifaschistischer_widerstand", 
                                "title": "#afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand", 
                                "subtitle": "\u00dcber kreative Organisation, poltische Aktionen und das Bed\u00fcrfnis nach vernetztem Aktivismus", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Im Mai 2018 initiierte Reclaim Club Culture (RCC) in Berlin einen Protest gegen einen Aufmarsch der AfD und die AFDsierung der Gesellschaft. Zusammen mit mehr als 170 Techno Clubs, Festivals und Veranstalter*innen organisierten wir innerhalb von zwei Wochen drei Demoz\u00fcge, auf denen sich mehr als 60.000 Demonstrant*innen versammelten. Dies ereignete sich in einem politischen Klima, in dem die Linke von den Erfolgen der Faschist*innen wie gel\u00e4hmt schien und ein gro\u00dfer Teil der Gesellschaft immer weiter nach rechts abdriftete.\u00a0Ausgehend von einer selbstkritischen Praxis werden wir der Frage nachgehen, wie und warum dies (scheinbar) pl\u00f6tzlich gelang. ", 
                                "description": "Dieser Impuls war Teil einer Mobilisierung, die in 2018 - zumindest was Gro\u00dfdemos angeht - insgesamt wieder ein wenig Hoffnung macht. Gleichzeitig stellt sich die Frage, wie wir unsere Stra\u00dfenmobilisation st\u00e4rker in den gesellschaftlichen Alltag tragen. Auf keinen Fall d\u00fcrfen wir trotz unserer Paar Erfolge vergessen, wie es unter anderem in Ellwangen und Chemnitz aussieht und dass global und in Europa gerade wieder ein vermehrtes Aufkommen faschistischer Regierungen Realit\u00e4t ist.\r\nMit den entsprechenden Folgen f\u00fcr die dort lebenden Menschen.\r\nDerzeit arbeiten wir an Organisationsstrukturen, wie Infrastruktur, Kommunikation, Netzwerken und Sicherheit, die weitere politische Aktivit\u00e4ten unterst\u00fctzen sollen. W\u00e4hrend dieser Arbeit und der Durchf\u00fchrung von weiteren Aktionen blieben einige Fragestellungen innerhalb dieser Felder unbeantwortet. Einer der gr\u00f6\u00dften Unterst\u00fctzer*innenkreise der Aktion war der wohl \u00e4lteste Club Berlins: der CCC.\r\nWir werden unsere gegenw\u00e4rtigen Ans\u00e4tze vorstellen, untersuchen und daran die Frage kn\u00fcpfen, wie durch die Hackercommunity der digitale Raum als Unterst\u00fctzung im Kampf gegen Faschismus besser aktiviert werden kann. Ziel dabei ist gemeinsam ein anderes, vielleicht gar neues Level von Aktivismus zu erreichen.\u00a0", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8570, 
                                        "public_name": "Reclaim Club Culture"
                                    }, 
                                    {
                                        "id": 8767, 
                                        "public_name": "Rosa Rave"
                                    }, 
                                    {
                                        "id": 8768, 
                                        "public_name": "Rosa Rave*"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://twitter.com/MenschMeier4/status/996775769664868352", 
                                        "title": "Aufruf Tweet zu #afdwegbassen"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Dijkstra": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9517.html", 
                                "id": 9517, 
                                "guid": "064a7014-a88c-462a-b06f-7d6de62d622f", 
                                "logo": null, 
                                "date": "2018-12-29T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9517-provable_security", 
                                "title": "Provable Security", 
                                "subtitle": "How I learned to stop worrying and love the backdoor", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Modern cryptography is based on security-proofs. We will demonstrate how these work, why they are desirable and what their limitations are.", 
                                "description": "<p>Even the use of secure primitives like AES or RSA does not guarantee that the end-result is secure as well. In recent years breaks of modern primitives have in fact become exceedingly rare, yet stories like the KRACK-attack or ROBOT keep appearing.</p>\r\n\r\n<p>The obvious answer to these problems would be to proof that our protocols are secure. While that may sound great in theory, there are many issues as well:</p>\r\n\r\n<ul>\r\n<li>Proving (almost) anything secure, would require to solve a millennium-problem.</li>\r\n<li>Given the above, assumptions are required; but which assumptions are reasonable?</li>\r\n<li>The word \u201csecure\u201d may seem intuitive, but can we formally define it? And can something be <em>too</em> secure?</li>\r\n<li>Idealizing primitives can solve many problems, but what about over-idealizations?</li>\r\n<li>Can backdoors be necessary to prove security?</li>\r\n<li>A proof can only show the absence of attacks in a certain model. What about attacks outside those models?</li>\r\n</ul>\r\n\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8345, 
                                        "public_name": "FJW"
                                    }, 
                                    {
                                        "id": 8350, 
                                        "public_name": "Lukas"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/689/original/slides.pdf?1546084427", 
                                        "title": "Final slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9670.html", 
                                "id": 9670, 
                                "guid": "64d3f3f5-5665-4050-ba15-0db530ecc262", 
                                "logo": null, 
                                "date": "2018-12-29T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9670-safe_and_secure_drivers_in_high-level_languages", 
                                "title": "Safe and Secure Drivers in High-Level Languages", 
                                "subtitle": "How to write PCIe drivers in Rust, go, C#, Swift, Haskell, and OCaml", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Drivers are usually written in C for historical reasons, this can be bad if you want your driver to be safe and secure. We show that it is possible to write low-level drivers for PCIe devices in modern high-level languages.\r\nWe are working on super-fast user space network drivers for the Intel 82599ES (ixgbe) 10 Gbit/s NICs in different high-level languages. We've got fully working implementations in Rust, C#, go, OCaml, Haskell, and Swift. All of them are written from scratch and require no kernel code.\r\n\r\nCheck out <a href=\"https://github.com/ixy-languages/ixy-languages\">our GitHub page</a> with links to all implementations, performance measurements, and publications for further reading.", 
                                "description": "Supposedly modern user space drivers (e.g., DPDK or SPDK) are still being written in C in 2018 :(\r\n\r\nThis comes with all the well-known drawbacks of writing things in C that might be prevented by using safer programming languages.\r\nAlso, did you ever see a kernel panic because a driver did something stupid? It doesn't have to be that way, drivers should not be able to take down the whole system.\r\n\r\nThere are three steps to building better drivers:\r\n\r\n1. Write them in a safer programming language eliminating whole classes of bugs and security problems like bad memory accesses\r\n\r\n2. Isolating them from the rest of the operating system: user space drivers that drop privileges\r\n\r\n3. Isolating the hardware using the IOMMU\r\n\r\n\r\nWe show that it is possible to achieve all of these goals for PCIe drivers on Linux by implementing user space network drivers in all of the aforementioned programming languages. Our techniques are transferable to other drivers that would benefit from more modern implementations. \r\n\r\nOur drivers in <a href=\"https://github.com/ixy-languages/ixy.rs\">Rust</a>, <a href=\"https://github.com/ixy-languages/ixy.cs\">C#</a>, <a href=\"https://github.com/ixy-languages/ixy.go\">go</a>, and <a href=\"https://github.com/ixy-languages/ixy.swift\">Swift</a> are completely finished, tuned for performance, evaluated, and benchmarked. And all of them except for Swift are about 80-90% as fast as <a href=\"https://github.com/emmericp/ixy\">our user space C driver</a> and 6-10 times faster than the kernel C driver. We also investigate how garbage collectod languages affects the latency of a packet forwarder built on top of our drivers.\r\n\r\nWe also got something for fans of functional languages: our implementations in <a href=\"https://github.com/ixy-languages/ixy.ml\">OCaml</a> and <a href=\"https://github.com/ixy-languages/ixy.hs\">Haskell</a> are working but not yet tuned for performance. We are also working on Python, Java, and Javascript.\r\nWe take a brief look at Haskell, Swift, OCaml, and C# in the talk and a deeper dive into Rust and Go.\r\n\r\nThe talk also features a quick summary from <a href=\"https://media.ccc.de/v/34c3-9159-demystifying_network_cards\">last year's talk about user space driver basics</a>, so no previous knowledge is required.\r\n\r\n\r\nAnother thing to take away from this talk is: writing drivers is neither scary nor hard. You can write one in your favorite programming language, so go ahead and try that :)\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7808, 
                                        "public_name": "Paul Emmerich"
                                    }, 
                                    {
                                        "id": 8772, 
                                        "public_name": "Simon Ellmann"
                                    }, 
                                    {
                                        "id": 8808, 
                                        "public_name": "Sebastian Voit"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://media.ccc.de/v/34c3-9159-demystifying_network_cards", 
                                        "title": "Talk about the basics of user space drivers"
                                    }, 
                                    {
                                        "url": "https://github.com/ixy-languages/ixy-languages", 
                                        "title": "Project page on GitHub with further links"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9671.html", 
                                "id": 9671, 
                                "guid": "25c54ce3-598c-42ee-8832-52fe9deae7ad", 
                                "logo": null, 
                                "date": "2018-12-29T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9671-self-encrypting_deception", 
                                "title": "Self-encrypting deception", 
                                "subtitle": "weaknesses in the encryption of solid state drives (SSDs)", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "<p>We have analyzed the hardware full-disk encryption implementation of several Self-Encrypting Drives (SEDs) from Samsung and Crucial (Micron) by reverse engineering their firmwares. The vendors combined cover a majority of the market share of SEDs sold today.</p>\r\n\r\n<p>In theory, the security guarantees offered by hardware encryption are similar to those of software implementations. In reality, we found that many hardware implementations have critical security weaknesses, for many models allowing for complete recovery of the data without knowledge of any secret.</p>\r\n\r\n<p>BitLocker, the encryption software built into Microsoft Windows will rely exclusively on hardware full-disk encryption if the drive advertises supported for it. Thus, for these drives, data protected by BitLocker is also compromised.</p>\r\n\r\n<p>This challenges the view that full-disk encryption implemented in hardware is preferable over software. We conclude that one should not rely solely on hardware encryption offered by SEDs.</p>", 
                                "description": "<p>In recent years, protection of sensitive data has received increased attention.\r\nProtection of digital data has become a necessity, certainly in the light of new European Data Protection Regulation. Technically, encryption is the go to protection mechanism; it may be implemented in software or hardware (or both). It can be applied on the level of individual files, or the entire drive, which is called full-disk encryption. Full-disk encryption is often the solution of choice as it takes away concerns of sensitive data leakage through, for example, temporary files, page files and caches. Several software solutions for full-disk encryption exist, and modern operating systems typically integrate it as a feature. However, purely software-based encryption has inherent weaknesses, such as the encryption key being present in RAM at all times and performance drawbacks.</p>\r\n\r\n<p>In an attempt to address these weaknesses, hardware full-disk encryption is often proposed; the encryption is performed within the drive itself, thereby confining the encryption key exclusively to the drive. Typically, the encryption itself is performed by a dedicated AES co-processor, whereas the software on the drive (firmware) takes care of the key management. It is often regarded as the successor of software full-disk encryption. Full-disk encryption software, including those integrated in modern operating systems, may autonomously decide to rely solely on hardware encryption in case it is supported by the storage device (via the TCG Opal standard). In case the decision is made to rely on hardware encryption, software encryption is disabled. In fact, BitLocker, the full-disk encryption software built into Microsoft Windows, switches off software encryption and completely relies on hardware encryption by default if the drive advertises support.</p>", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8308, 
                                        "public_name": "Carlo Meijer"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://www.cs.ru.nl/~cmeijer/", 
                                        "title": "Author homepage"
                                    }, 
                                    {
                                        "url": "https://www.ru.nl/english/news-agenda/news/vm/icis/cyber-security/2018/radboud-university-researchers-discover-security/", 
                                        "title": "Public Statement"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/616/original/draft-paper_1.pdf?1541600497", 
                                        "title": "Draft Paper"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/684/original/presentation.pdf?1546031613", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9400.html", 
                                "id": 9400, 
                                "guid": "e77ef54a-5dd7-4be1-80c7-42726b273e6f", 
                                "logo": "/system/events/logos/000/009/400/large/matrix_logo.png?1537273042", 
                                "date": "2018-12-29T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9400-matrix_the_current_status_and_year_to_date", 
                                "title": "Matrix, the current status and year to date", 
                                "subtitle": "", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Matrix is an open standard for communication over the Internet. I will talk about the matrix standard, both the technical implementation and the reasons for its creation. We will focus on the changes and progress that has been made in the previous year, particularly getting the specification out of beta, and the growth of the ecosystem. Finally, the Matrix environment continues to develop, and we\u2019ll look at the roadmap for the future.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8193, 
                                        "public_name": "Ben Parsons from Matrix"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/700/original/2018-12-29_Matrix_35c3.pdf?1546093857", 
                                        "title": "Matrix Slides"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "file"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9804.html", 
                                "id": 9804, 
                                "guid": "9f27a4c2-f957-4bad-81a8-988a37429d5c", 
                                "logo": "/system/events/logos/000/009/804/large/s_einkaufswagen_tr.png?1542150721", 
                                "date": "2018-12-29T17:10:00+01:00", 
                                "start": "17:10", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9804-die_hauser_denen_die_darin_wohnen", 
                                "title": "Die H\u00e4user denen, die darin wohnen!", 
                                "subtitle": "Langfristig bezahlbares, gemeinsames \u201eMieteigentum\u201c schaffen \u2013 \tauch ohne Banken", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Wir wenden uns gegen Gentrifizierung, Luxussanierung und Spekulation mit H\u00e4usern. Das Mietsh\u00e4user Syndikat ist ein bundesweiter Verbund linker, selbstverwalteter Hausprojekte mit dem Ziel der Initiierung und dauerhaften Erhaltung von gemeinschaftlich genutztem und bezahlbarem Wohn- und Gewerberaum. Der Grundgedanke: Gemeineigentum wird geschaffen und dauerhaft dem Markt entzogen. Die Mieter*innen sind zugleich Besitzer*innen ohne private Gewinnerzielungsabsichten, sie transferieren Knowhow und oft auch Direktkredite an andere Hausprojekte.", 
                                "description": "In einer Zeit, in der Mieten teilweise die H\u00e4lfte des Einkommens verschlingen, wollen wir mit unserer Idee des Mietsh\u00e4user Syndikats (MHS) dagegenhalten. Jedes Haus eines MHS-Hausprojektes wird dabei Gemeineigentum, die aktuellen Mieter*innen sind damit auch ihre eigenen Vermieter*innen. Das MHS beruht auf drei Grundpfeilern: Die Gruppen m\u00fcssen sich selbst organisieren, sie m\u00fcssen in einen Solidarfonds zur Initialisierung weiterer Hausprojekte einzahlen, und sie d\u00fcrfen \"ihr\" Haus nie mehr verkaufen. Die einzelnen Hausprojekte agieren wirtschaftlich eigenst\u00e4ndig, der Dachverband (das MHS) h\u00e4lt jedoch Besitzanteile an allen Hausprojekten und hat damit ein Vetorecht bei Verkaufsabsichten. Solvente Hausprojekte fungieren zudem intern oft als Direktkreditgeber mit dem Ziel, die Abh\u00e4ngigkeit von kommerziellen Bankkrediten erheblich zu reduzieren bzw. sie langfristig komplett obsolet zu machen. Die Mieten werden nur soweit erh\u00f6ht, dass die laufenden Kosten gedeckt werden k\u00f6nnen. So entstehen bezahlbare Wohnr\u00e4ume und R\u00e4ume f\u00fcr soziale und politische Initiativen \u2013 auch in St\u00e4dten, in denen Mieten mittlerweile unerschwinglich geworden sind.\r\n\r\nDerzeit gibt es 133 MHS-Hausprojekte, in Frankreich, \u00d6sterreich und den Niederlanden entstehen nach modifiziertem Modell eigene Syndikate und es gibt weltweit Beratungsanfragen. Die Hausprojekte sind in ihrer Vielfalt sehr unterschiedlich, von reinen Wohn- bis hin zu reinen Gewerbeh\u00e4usern ist alles vorhanden. Oft gibt es R\u00e4ume f\u00fcr Veranstaltungen oder Treffen von sozialen Gruppen und politischen Initiativen. Das MHS beschr\u00e4nkt sich auf die Organisation von Hausprojekten, denkbar w\u00e4ren auch andere Syndikatsideen wie z.B. Ackerland- und Wagenburgsyndikate oder lokale Energieerzeugersyndikate.\r\n\r\nDie anschlie\u00dfende Diskussion beleuchtet Synergien von MHS und CCC, teils am Beispiel des CCC Freiburg, der seit einem Jahr seine Clubr\u00e4ume in einem solchen MHS-Hausprojekt hat und so zum MHS-Mitglied wurde. \r\nDas MHS ben\u00f6tigt wachstumsbedingt Unterst\u00fctzung bei der Einrichtung von Tools f\u00fcr Kommunikation, Organisation und Entscheidungsfindung, aber auch bei neuen Partizipationsformen an (teils l\u00e4nder- und sprach\u00fcbergreifenden) Projekten oder Veranstaltungen, bei denen nur noch ein Teil der Teilnehmer*innen vor Ort ist und die \u00fcbrigen digital mitwirken. Die Hausprojekte profitieren von freier Kommunikation in digitalen Datennetzen, wie es beispielsweise reudnetz oder freifunk anbieten. Die regionalen CCC-Verb\u00e4nde wiederum finden bezahlbare Clubr\u00e4ume in den Hausprojekten. Eine Zusammenarbeit auf politischer Ebene k\u00f6nnte genutzt werden, um gemeinsamen Kampagnen mehr Durchschlagskraft zu geben. Ganz konkret werden Projekte gegen Rechts immer notwendiger.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8342, 
                                        "public_name": "Elke Manz"
                                    }, 
                                    {
                                        "id": 6469, 
                                        "public_name": "fuzzle/fr"
                                    }, 
                                    {
                                        "id": 8737, 
                                        "public_name": "Schmidt"
                                    }, 
                                    {
                                        "id": 8750, 
                                        "public_name": "Lina Hurlin"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://das-ist-unser-haus.de/", 
                                        "title": "Das ist unser Haus (Film cc)"
                                    }, 
                                    {
                                        "url": "https://www.syndikat.org/", 
                                        "title": "Mietsh\u00e4user Syndikat"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9898.html", 
                                "id": 9898, 
                                "guid": "020051ff-2594-46ce-b92a-0786743e4624", 
                                "logo": "/system/events/logos/000/009/898/large/mehr_slecht_als_recht.png?1546616089", 
                                "date": "2018-12-29T18:10:00+01:00", 
                                "start": "18:10", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9898-mehr_schlecht_als_recht_grauzone_sicherheitsforschung", 
                                "title": "Mehr schlecht als Recht: Grauzone Sicherheitsforschung", 
                                "subtitle": "", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Reverse Engineering zum Aufsp\u00fcren von Schwachstellen ist g\u00e4ngige Praxis. Umso \u00fcberraschender kam f\u00fcr 2 Forschungsteams die Abmahnung durch Rechtsanw\u00e4lte eines Herstellers. Sie hatten Schwachstellen aufgedeckt und damit, so der Hersteller, seine Rechte verletzt. Vorwurf? Vom Versto\u00df gegen das Urheberrecht bis zum Verrat von Gesch\u00e4ftsgeheimnissen war alles dabei.\r\nNach hunderten Seiten an Schrifts\u00e4tzen, einem zur\u00fcckgehaltenen Paper sowie 7 Stunden Marathon-Prozess konnte ein Vergleich geschlossen werden, bei dem wir mit einer Verpflichtung zum Responsible Disclosure davon kamen - die Kernfragen bleiben jedoch offen: Welche Teile des Reverse Engineering sind rechtswidrig? Verst\u00f6\u00dft Reversing auch zum Zwecke der IT-Sicherheitsforschung gegen das Urheberrechtsgesetz? Was sch\u00fctzt in Zukunft Sicherheitsforscher vor rechtlichen Schritten des Herstellers? Wie k\u00f6nnen sich Unternehmen verhalten und welche Abw\u00e4gungen m\u00fcssen vor der Ver\u00f6ffentlichung getroffen werden? \r\nWir berichten vom Ablauf eines solchen Prozesses inklusive Anekdoten, weisen auf die Unklarheiten in geltendem Recht hin und schaffen ein Bewusstsein f\u00fcr die Problematik.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8453, 
                                        "public_name": "domenukk"
                                    }, 
                                    {
                                        "id": 8782, 
                                        "public_name": "Fabian Franzen"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/723/original/35c3_MehrSchlechtAlsRecht_.pdf?1546179919", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9573.html", 
                                "id": 9573, 
                                "guid": "07f5d97a-161c-4435-abad-6ef08107df15", 
                                "logo": "/system/events/logos/000/009/573/large/chain0.png?1545670378", 
                                "date": "2018-12-29T19:10:00+01:00", 
                                "start": "19:10", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9573-a_blockchain_picture_book", 
                                "title": "A Blockchain Picture Book", 
                                "subtitle": "Blockchain origins and related buzzwords, described in pictures.", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Where is the blockchain, how long is it, and what does it have to do with cryptography? And is it really something completely new? I spent a lot of time in pubs explaining to people what this blockchain hype is all about. It turns out that the best way to do that is to use images - literally.\r\nThe idea behind this talk is to give you a rough understanding of the scientific background  behind the Blockchain technology.", 
                                "description": "We make a short excursion into the field of distributed computing where we gain a rough understanding of the origins behind this technology - in a most abstract way.\r\nWe explore how different kinds of Blockchains are formed and what kind of properties we may achieve - good as well as the bad ones.\r\nBe warned: This is not meant as investment advice. The goal of the talk is to give you an actual basic understanding of the topic so you can teach your uninformed friends at the pub, too.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8154, 
                                        "public_name": "Alex Dirksen"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9681.html", 
                                "id": 9681, 
                                "guid": "a875f05c-5eeb-4478-9e6f-863fc52b8868", 
                                "logo": null, 
                                "date": "2018-12-29T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9681-butterbrotdosen-smartphone", 
                                "title": "Butterbrotdosen-Smartphone", 
                                "subtitle": "Mein DIY-Smartphone-Bau ", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Ich m\u00f6chte euch zeigen, wie ich mir aus einem Raspberry PI ein Smartphone baue. Auf welche Probleme und Schwierigkeiten ich dabei gesto\u00dfen bin und welche L\u00f6sungen ich gefunden habe. Das Projekt ist noch nicht abgeschlossen, es fehlen noch ein paar Kleinigkeiten. Trotzdem will ich euch schon mal mein Smartphone in der praktischen Butterbrotdose zeigen und euch erz\u00e4hlen wie es entstanden ist.", 
                                "description": "Ich hab gar nicht gedacht, das der Bau eines Smartphones so kompliziert sein kann. Raspberry Pi + Touchdisplay ist nicht alles, was es zu bedenken gibt, bei diesem Projekt. Im Moment lebt das Smartphoneprojekt in einer Butterbrotdose und zieht in der S-bahn oder U-bahn schon mal die Aufmerksamkeit auf sich. Wenn die Powerbank passthrough kann, ist das vorteilhaft, hab ich feststellen m\u00fcssen. Die Einrichtung der X und Y Achsen auf dem Touchdisplay, damit man damit auch die OnScreenTastatur bedienen kann, war nicht so einfach. Und ich musste feststellen das Landscape nicht die richtige Gr\u00f6\u00dfe zum fl\u00fcssigen arbeiten ist. Die meisten Linux-Programme sind, nicht so direkt Touchf\u00e4hig oder brauchen zu viel Speicher. Dann gab es auch gro\u00dfe Herausforderungen! L\u00f6ten lernen war so eine. Erst lernen wie man l\u00f6tet, um dann das entl\u00f6ten zu lernen, um sich dann an den PI zu trauen. Diese und andere Geschichten zum Bau meines Smartphones m\u00f6chte ich euch erz\u00e4hlen. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8127, 
                                        "public_name": "b\u00fccherratten"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/626/original/IMG_20181014_202105.jpg?1543185403", 
                                        "title": "Das Butterbrotdosen-Smartphone"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9758.html", 
                                "id": 9758, 
                                "guid": "3745513b-c2e6-449a-abd0-2e32f738f168", 
                                "logo": "/system/events/logos/000/009/758/large/Logo.png?1539607949", 
                                "date": "2018-12-29T21:50:00+01:00", 
                                "start": "21:50", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9758-hacking_the_human_microbiome", 
                                "title": "Hacking the Human Microbiome", 
                                "subtitle": "", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The human microbiome is a diverse community of bacteria that lives inside us. Their contribution towards our personal well-being or sickness is controversially discussed within the scientific world and, likewise, in our society. First attempts to rationally (reverse-)engineer the human microbiome are hyped in medicine and within the DIY biohacking scene. The implications of these endeavours potentially concern several aspects of our life: eating habits, fitness state, susceptibility for infections, aging, and cancer. But what about ethical aspects of hacking the human microbiome? How can biosafety be maintained? Are there any data security issues? I will seriously discuss the state-of-the-art and future directions of the research to show whether actual hacking of the human microbiome is rather science or fiction.", 
                                "description": "First, I will answer some general questions to lay the foundation: What is the human microbiome? How is it studied? Why is there a hype at the moment?\r\nSubsequently, I will explain fundamental concepts of human microbiome research: Faecal microbiome transplantations (\u201ceating poop\u201d), microbiome enrichment (\u201ctaking probiotics\u201d), microbiome depletion (\u201cswallowing antibiotics\u201d), and rational, targeted interventions (\u201cgetting or killing a single bug\u201d).\r\nThis will be followed by an introduction into different experimental and computational methods, that are being performed to discern the complex interplay between bacteria and our human body. The data obtained from these analyses are hard to interpret. The conclusions drawn from the data hardly move beyond associations. The advancement of the field from discovered correlations to causations is demanded but rarely achieved. I will outline major challenges in measurement techniques and analysis pipelines. The debate about the proper acquisition, encryption, storage and accessibility of genetic information of the human person itself is still in its infancy. Discussions about the (meta-)genetic information of the human microbiome are lacking even more behind. The talk will be concluded by a speculative but facts-based projection of current microbiome engineering approaches into the future. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8444, 
                                        "public_name": "LorenzAdlung"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://lorenzadlung.wordpress.com/socialmedia/scienceslams/", 
                                        "title": "Link to my blog regarding science slams:"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/709/original/20181229_HackingTheHumanMicrobiome_LorenzAdlung.pdf?1546112640", 
                                        "title": "20181229_HackingTheHumanMicrobiome_LorenzAdlung"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9616.html", 
                                "id": 9616, 
                                "guid": "84be4017-78a0-444b-8b6f-5a14089bb0f7", 
                                "logo": null, 
                                "date": "2018-12-29T22:50:00+01:00", 
                                "start": "22:50", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9616-circumventing_video_identification_using_augmented_reality", 
                                "title": "Circumventing video identification using augmented reality", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Video identification is the process of establishing the identity of a person via video chat. The person to be identified has to show his face as well as her official ID card to the camera. This lecture gives a step-by-step tutorial on how such video streams can be augmented with computer-generated official ID cards, including all visible watermarks.", 
                                "description": "To be specific, we will use a credit-card printed with markers, which will be detected using the Aruco library shipping with OpenCV.\r\nThe resulting position and orientation will then be used to render a 3D representation of an official ID card with arbitrary information.\r\nThe 3D representation will be rendered using OpenGL. A shader will compose its look using several layered textures.\r\nAdditionally, skin detection will be used to create a skin mask in the area of the card to avoid rendering over fingers held in front of it.\r\nFinally, the input image, the known position and orientation of the card, the rendered fake card and the skin mask will be composed to a convincing output image - ready to be presented to the call center agent.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8439, 
                                        "public_name": "Jan Garcia"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.deutschepost.de/de/p/postident/identifizierungsverfahren/verfahren-videochat.html", 
                                        "title": "Official Post-Ident Video-Legitimation explanation"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9680.html", 
                                "id": 9680, 
                                "guid": "13d40859-635a-49e6-91bd-0f64bfcfe64c", 
                                "logo": null, 
                                "date": "2018-12-29T23:50:00+01:00", 
                                "start": "23:50", 
                                "duration": "00:40", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9680-osterreich_uberwachungsstaat_oder_doch_nur_digitalisierung_fur_anfanger", 
                                "title": "\u00d6sterreich: \u00dcberwachungsstaat oder doch nur Digitalisierung f\u00fcr Anf\u00e4nger?", 
                                "subtitle": "Ein Jahr unter der rechtsextremen Regierung", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "In \u00d6sterreich regiert seit einem Jahr eine Koalition aus der rechtskonservativen \u00d6VP und der rechtsextremen FP\u00d6. Eine ihrer ersten Ma\u00dfnahmen war eine vollkommen \u00fcberzogene Versch\u00e4rfung von \u00dcberwachungsbefugnissen: Bundestrojaner, Anlassdatenspeicherung, verst\u00e4rkte Video\u00fcberwachung, Stra\u00dfen\u00fcberwachung. Registrierungspflicht f\u00fcr SIM-Karten, etc. Zugleich wurde versucht, die Datenschutzgrundverordnung (DSGVO) zu untergraben. Betroffenenrechte wurden ausgeschlossen, weite Ausnahmen geschaffen und Strafen sollen am besten gleich gar nicht angewendet werden. In diesem Talk geben wir ein Update \u00fcber die netzpolitische Lage in \u00d6sterreich. ", 
                                "description": "Die neue \u00f6sterreichische Regierung steht f\u00fcr mehr \u00dcberwachung und weniger Datenschutz. Viele der Ma\u00dfnahmen treffen alle Menschen in diesem Land und nicht nur Kriminelle. Schutzsuchenden werden die Menschenrechte \u00fcberhaupt aberkannt. K\u00fcnftig sollen sie im Asylverfahren ihre Mobiltelefone zur Beweissicherung aush\u00e4ndigen m\u00fcssen. Diese k\u00f6nnen dann komplett ausgelesen werden, es kommt zu einer digitalen Hausdurchsuchung. Damit wird st\u00e4rker in die Rechte von Asylwerbern und Asylwerberinnen eingegriffen, als in die von Menschen, die einer schweren Straftat verd\u00e4chtigt werden. \r\n\r\nHeikle personenbezogene Daten aus \u00f6ffentlichen Datenbanken sollen zu allen wissenschaftlichen Zwecken \u2013 auch kommerziellen \u2013  zur Verf\u00fcgung stehen, z.B. auch Daten aus der Elektronischen Gesundheitsakte (ELGA). Krankenkassen wurden zur Rasterfahndung in Gesundheitsdaten verpflichtet, um \"Missbrauch von Versicherungsleistungen\" zu verhindern. Auch eine Vorratsdatenspeicherung von IP-Adressen versuchte die Regierung in einen Gesetzesentwurf zu schmuggeln - als es auffiel und Protest hervorrief, nahm sie den Vorschlag jedoch sofort wieder zur\u00fcck. \r\n\r\n In unserem Vortrag versuchen wir, einen \u00dcberblick dar\u00fcber zu geben, was sich im letzten Jahr in \u00d6sterreich netzpolitisch getan hat und was noch alles auf uns zukommen k\u00f6nnte.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4366, 
                                        "public_name": "Thomas Lohninger"
                                    }, 
                                    {
                                        "id": 7704, 
                                        "public_name": "Angelika Adensamer"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.epicenter.works", 
                                        "title": "epicenter.works"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Eliza": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10019.html", 
                                "id": 10019, 
                                "guid": "f16f2242-d265-42d2-91d0-632243013b3f", 
                                "logo": null, 
                                "date": "2018-12-29T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-10019-internet_the_business_side", 
                                "title": "Internet, the Business Side", 
                                "subtitle": "a try to explain the ecosystem", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Net neutrality, a big buzzword in the last years. It is not only a buzzword? There are economic reasons why it is a stake. This talk tries to give an overview and explain how money is made in the \"internet\" and how it is related to net neutrality.", 
                                "description": "Topics discussed:\r\n- Early Days and the Finance behind the Internet / Darpanet\r\n- \"Day 0\" of the Internet as we know it today\r\n- Step By Step Explanation how the internet is built from Access To Backbone To World and back again\r\n- Add some price tags to the network and a try to explain the ecosystem behind it\r\n- \u201eNetzneutralit\u00e4t\u201c a definition?\r\n- Show the relation between Netzneutralit\u00e4t and the price tags\r\n- Outlook into the next 24 months\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8754, 
                                        "public_name": "swaio"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10012.html", 
                                "id": 10012, 
                                "guid": "6d23f2dc-988a-4877-a6e5-3a43ea6dc8bb", 
                                "logo": "/system/events/logos/000/010/012/large/selbsportrait1.jpg?1541855191", 
                                "date": "2018-12-29T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-10012-transhuman_expression", 
                                "title": "Transhuman Expression", 
                                "subtitle": "Interdisciplinary research in Painting and Robotics. with Prof. Oliver Deussen, PhD candidate Marvin Guelzow, and the Artist Liat Grayver.", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The meeting point of art and science as a place of inspiration, exchange of knowledge and creation is the main focal point of the talk. Together with Prof. Oliver Deussen, the PhD candidate Marvin Guelzow, and Liat Grayver we will discuss both the technical challenges and innovation aspects in the development of the e-David robot, alongside the the social and artistic practice its offers. Topics as such  \u201cparadigms of creativity\u201d under the title \u201cNew Materialism / Anthropocentrism / Posthumanism\u201d will be presented with the goal to position and understand machine-assisted creative interfaces within the broader field of media art and painting traditions.", 
                                "description": "The painting robot developed at the University of Konstanz in southwestern Germany is a pioneer project in this field and is presently the only one with a visual feedback system. Much more than just a printer capable of reproducing a flat image, the e-David creates unique works through the application of paint strokes that are irreproducible in terms of their colour blend and the materiality of their layering. The possibility of visual feedback brings up many questions within the contemporary discourse on deep learning, artificial intelligence and robotic creativity.\r\nThe Collaborating explored further possibilities to exploit the painting robot creatively, and reflected on ideas about the ways in which these could be implemented in the form of software and hardware. A number of questions of wider impact arose as the result of our collaboration: When and why would a semantic method of defining the object in the image be used? Is it an advantage or a disadvantage to paint semantic objects without having a pre-existing cognitive understanding of them? How could I use abstract forms, grammatical structures or mathematic models to achieve more complex surfaces? How would computer language be used to express the intentions of a composition? When and why would different painting styles be used?\r\nFurther, on a technical level, we had to take into consideration how different materials would react with one another. For example, how could different colours be mixed on the canvas or on the palette? How should the size of the brush be set, and when is it necessary to add glaze? We would have to develop a range of distinct, individual brushstrokes (controlling the velocity and the z-axis) whose characteristics are analogous to those made by human painters in the \u201creal world\u201d, in order to be able to pre-define when, in which order and for which tasks each stroke is to be used. In doing so, we are basically defining and categorizing singular parameters within a library of painterly \u201cacts\u201d and \u201cperceptions\u201d, in order to create a grammatical structure for the \u201clanguage\u201d of robotic painting.\r\nConstructing e-David has provided many challenges in the realms of engineering, robotics, computer graphics and computer vision. We discuss how we arrived at our current painting set up and highlight the strengths and weaknesses found so far, as well as plans for future extensions. On the robotics side, the main issue is working with machines designed for repetitive, precise tasks and applying them for approximate and dynamic processes. Supervision of a painting process using vision or other sensors is challenging, as well as finding methods to process the data in a meaningful way. Seemingly simple tools like brushes are highly complex in their behaviour and using them precisely is difficult. In the talk, we elaborate on current problems and what future plans are to deal with these issues.\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8722, 
                                        "public_name": "Liat_Grayver"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://www.liatgrayver.com/robotic-painting", 
                                        "title": "Breaststrokes at the digital age"
                                    }, 
                                    {
                                        "url": "https://www.liatgrayver.com/robotic-painting-1", 
                                        "title": "Robotic Paintings"
                                    }, 
                                    {
                                        "url": "https://www.liatgrayver.com/traversing-the-threshold", 
                                        "title": "Traversing the Threshold"
                                    }, 
                                    {
                                        "url": "http://graphics.uni-konstanz.de/eDavid/", 
                                        "title": "e-David. A painting process"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/618/original/grayver_brushstrokes_print_18.pdf?1541855201", 
                                        "title": "Brushstrokes in the Digital age "
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/619/original/Traversing_the_Threshold_newpdf.pdf?1541855201", 
                                        "title": "Traversing the Threshold"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/621/original/Abstract_Grayver.pdf?1541861917", 
                                        "title": "Abstract-Transhuman Expression. "
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9695.html", 
                                "id": 9695, 
                                "guid": "4b765099-8cfa-4325-b132-0d9dc9b84267", 
                                "logo": null, 
                                "date": "2018-12-29T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9695-planes_and_ships_and_saving_lives", 
                                "title": "Planes and Ships and Saving Lives", 
                                "subtitle": "How soft and hardware can play a key role in saving lives at sea and why Frontex doesn\u00b4t like it", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The death rate at Europes seaborder reached a historical record: One out of five trying for Europe drowned this September: Main reason is the crackdown on sea rescue by European authorithies who barely pass any information on distress cases to competent rescue workers. The hope of those trying to escape torture, slavery hunger and other forms of violence therefore soleyly lies on the efforts of the civil rescue fleet. \r\nIn the future, a civil society run maritime rescue coordination center could help to significantly reduce the death rate at sea. This talk will focus on the software and hardware components used on the aerial and nautical assets of the civil rescue fleet. \r\nWe\u00b4ll talk about the difficulties installing sat com on a moving ship or even an aircraft, how the camera system of the Sea-Watch 3 recorded the evidence that is now challenging the Italian state at the European Court of human rights, how important data is secured if the state challenges you as in the case of the LIFELINE and about a software that will help to join forces in the near future to coordinate rescues in an efficient way. Help is still needed to tear down Europes wall. ", 
                                "description": "The death rate at Europes seaborder reached a historical record this year: One out of five people, who left wartorn libya on flimsy boats, bound for Europe, drowned in September 2018. The main reason for the increasing death rate ist the crackdown on sea rescue by European authorithies. Back in 2015 and 2016, when rescue NGOs took up rescue efforts on the deadliest waters of the world, the Italian Coast Guard, the NGOS and even the European Navy worked hand in hand, to save as many lives as possible. Nowadays European authorithies are trying to turn the central med into a blackbox: As they rather want to watch people drown then to see them arrive at Europes shores, and barely any information on distress cases is passed to competent rescue workers, the hope of those trying to escape torture, slavery hunger and other forms of violence soleyly lies on the efforts of the civil rescue fleet. \r\n\r\nSince no rescue coordination center clearly takes responsibility in favor of those in distress, the technical means of communication and such to increase the search capacity or to document incidents at sea, used on the aerial and nautical assets of the civil rescue fleet, do play a key role in the efforts to coordinate rescues d.i.y. \r\n\r\nIn the future, a civil society run maritime rescue coordination center could help to significantly reduce the death rate at sea. This talk focuses on the software and hardware components necessary to challenge Europes deadly border policy of letting people drown. \r\nWe\u00b4ll talk about the difficulties installing sat com on a moving ship or even an aircraft, how the camera system of the Sea-Watch 3 recorded the evidence that is now challenging the Italian state at the European Court of human rights, how important data is secured if the state fights back as in the case of the LIFELINE and about a software that will help to join forces in the near future to be even more efficient. \r\n\r\nWe will talk about standards (NMEA0183, NMEA2000), Communication technologies (VSAT, IRIDIUM), Positioning and information/communication systems and anti collision systems (RADAR, GPS, AIS) Other interesting devices to be found aboard (Gyrocompass, etc.) and of course our setup (OpenWRT, OLSR, Ansible, Wireguard) and open source applications for nautic purpose (weather, navigation, etc: ZyGRIB, OpenCPN).", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6989, 
                                        "public_name": "Trollofix"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://sea-watch.org", 
                                        "title": "Seawatch"
                                    }, 
                                    {
                                        "url": "https://mission-lifeline.de/", 
                                        "title": "Mission Lifeline"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9611.html", 
                                "id": 9611, 
                                "guid": "8703c4a7-981c-4aa5-8f4c-36da54d5b435", 
                                "logo": "/system/events/logos/000/009/611/large/35c3-Integrity.png?1539437398", 
                                "date": "2018-12-29T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9611-enclosure-puf", 
                                "title": "Enclosure-PUF", 
                                "subtitle": "Tamper Proofing Commodity Hardware and other Applications", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "We are presenting an innovative technology, which allows verifying the authenticity, integrity and/or the physical state of an item by employing the propagation behaviour of electromagnetic waves. In particular, it enables to check for any tamper attempts for larger structures, such as off-the-shelf computers and their periphery. The technology extends existing tamper proof approaches from the chip/PCB to a system level and is easily retrofittable.\r\nIn this presentation, we are demonstrating exemplary tamper proofing in order to protect secret information without an attack-detection or data-deletion circuit (!), which is a known difficult problem and an imperfect undertaking. Therefore, we demonstrate the simplicity and effectiveness using a very cheap self-made testbed (using alumium foil) to protect standard hardware against invasive attacks, such as needle probing through the case. ", 
                                "description": "Cyber-physical systems are ubiquitous and are often located in non-trustworthy environments, in which data is processed that is both sensitive and worth protecting. Despite employed protection, measures such as secured communication an extraction of data and/or manipulation of it are often easily feasible if physical access to the components of the system is given. Or with the words of Brian Gladman: \u201cIt is relatively easy to build an encryption system that is secure if it is working as intended and is used correctly but it is still very hard to build a system that does not compromise its security in situations in which it is either misused or one or more of its sub-components fails (or is \u2019encouraged\u2019 to misbehave) ... this is now the only area where the closed world is still a long way ahead of the open world and the many failures we see in commercial cryptographic systems provide some evidence for this.\u201d\r\nOur technology is aiming to verify the integrity of such systems in order to detect attempts of an attack and activate appropriate countermeasures. The propagation behaviour of electromagnetic waves allows for an extension of the protection from individual small components to the entire periphery of a system (or even object). This allows detecting attacks, like spudding/drilling into cash terminals. \r\nBy deriving cryptographic key material based on physical disorder and unclonable complexity of an environment, it is possible to create a protection, which protects secret information without an attack-detection or data-deletion circuit. Due to its generic nature it is possible to flexibly use this protection concerning size and application. \r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8459, 
                                        "public_name": "Christian Zenger"
                                    }, 
                                    {
                                        "id": 8493, 
                                        "public_name": "David Holin"
                                    }, 
                                    {
                                        "id": 8539, 
                                        "public_name": "Lars Steinschulte"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://news.rub.de/vermischtes/2018-10-11-it-sicherheitspreis-die-besten-innovationen-kommen-aus-bochum", 
                                        "title": "[1]"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9603.html", 
                                "id": 9603, 
                                "guid": "5b7f01a6-f762-4c28-961c-7f6ab2f70fb4", 
                                "logo": null, 
                                "date": "2018-12-29T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9603-sneaking_in_network_security", 
                                "title": "Sneaking In Network Security", 
                                "subtitle": "Enforcing strong network segmentation, without anyone noticing", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Highly compartmentalized network segmentation is a long-held goal of most blue teams, but it's notoriously hard to deploy once a system has already been built. We leveraged an existing service discovery framework to deploy a large-scale TLS-based segmentation model that enforces access control while automatically learning authorization rules and staying out of the way of developers. We also did it without scheduling downtime or putting a halt to development. This talk covers how we engineered this, and shares lessons learned throughout the process.", 
                                "description": "The \"hard-shell, soft-center\" model of network security has been popular since the invention of networks--building proper internal controls is often skipped when organizations grow quickly, and by the time that scale has been achieved, security teams resort to defending the perimeter. In this talk, I'll show an example of how we took a large modern network to a significantly more secure model by building network segmentation into the existing service discovery framework in use.\r\n\r\nService discovery is a critical part of recent network design, and popular frameworks often offer security features. However, these tend to be difficult to implement after the network has already been established, and don't offer endpoint-to-endpoint solutions. We built a series of extensions to SmartStack, an open-source service discovery framework, that allow it to protect all communications with mutual TLS and offer both authentication and authorization. This was all done in a way that's transparent to the applications on either side, allowing us to migrate to this system without changing any application code or teaching developers the details of the system.\r\n\r\nThis talk will discuss the technologies used and the challenges encountered in doing this rollout, and will aim to provide useful guidance to other security engineers wishing to make a similar transition.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8389, 
                                        "public_name": "Maximilian Burkhardt"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9579.html", 
                                "id": 9579, 
                                "guid": "4fff6281-e452-4d64-bf9a-bc677614776a", 
                                "logo": null, 
                                "date": "2018-12-29T18:50:00+01:00", 
                                "start": "18:50", 
                                "duration": "01:00", 
                                "room": "Eliza", 
                                "slug": "35c3-9579-attacking_chrome_ipc", 
                                "title": "Attacking Chrome IPC", 
                                "subtitle": "Reliably finding bugs to escape the Chrome sandbox", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "In this talk, I discuss how to reliably find bugs in the Chrome IPC system with the goal of escaping the sandbox. I show how to enumerate the attack surface, how to identify the weak areas, and how to fuzz those areas efficiently to consistently produce bugs.", 
                                "description": "Since the win32k lockdown on the Chrome renderer process, full chain Chrome exploits on Windows have become very rare, with the most recent successful competition exploit occurring in 2015.\r\n\r\nBy applying new fuzzing strategies, I was able to identify many vulnerabilities in the sandbox in the past year, one of which I used to demonstrate a full chain exploit at Hack2Win this year when combined with a teammate's RCE bug.\r\n\r\nIn this talk I hope to show how I found these bugs by using extremely targeted fuzzing in a way that was easy to setup but reliably had great results, and briefly cover how we leveraged one use after free bug to fully escape the sandbox.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7068, 
                                        "public_name": "nedwill"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://twitter.com/NedWilliamson/status/1043150732742946816", 
                                        "title": "Exploit Demo"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9598.html", 
                                "id": 9598, 
                                "guid": "0a4a43e0-2b8d-424c-aaa3-101c843de75c", 
                                "logo": "/system/events/logos/000/009/598/large/credit_Ana_Caria_Leonor_Fonseca__FBAUL.jpg?1539368387", 
                                "date": "2018-12-29T20:50:00+01:00", 
                                "start": "20:50", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9598-a_webpage_in_three_acts", 
                                "title": "A WebPage in Three Acts", 
                                "subtitle": "live coding performance", 
                                "track": "Art & Culture", 
                                "type": "performance", 
                                "language": "en", 
                                "abstract": "A Web Page in Three Acts is a live coding performance which combines principles of choreography within the formal structures of coding. An assemblage of semi-improvised visuals and composition experiments in web environments. The screen becomes an open stage for the hybrid code which links choreography and web programming as well as body and language.", 
                                "description": "For the series \u2018WebPage Act I, II, III\u2019, Joana Chicau created a specific grammar or vocabulary that links choreographic concepts from post-modern dance with web-coding functions. \r\nThis technique follows the concept of esoteric programming languages, also called esolang, used when writing so ware, integrating a new grammar into an existing one. Although an esolang doesn\u2019t have a proper functionality, it is used in combination with other programming languages to explore alternative ways of composing and writing code. Chicau started using esoteric programming languages as an a empt to overcome the abstractness of algorithmic code, and simultaneously as a way to develop my own design language, which derives from choreographic concepts. \r\nThe performance starts with a standard webpage, followed by the opening of the web console. The screen is now divided in two stages: the \u2018frontstage\u2019, the interface a user normally accesses and the \u2018backstage\u2019 or the web console in which programming languages can be ran. In the web console Chicau is calling, juxtaposing and manipulating different functions from a glossary of code, while simultaneously displaying the varied outcomes of graphic elements in the screen. These functions are named a er choreographic concepts, which are assigned to specific web actions. While the computer interprets the code, the audience will be interpreting and start wondering about the relation between the \u2018choreographic vocabulary\u2019 within the code and its immediate outcome.\r\nThe screen becomes an open stage, providing the audience the access to the methodology and the tools used during the performance. The performative aspect of the act of coding is a way to make more transparent the process of composition and to enhance the nuances and transient character of coding. \r\nAs in choreography, web-design also deals with space, time and movement qualities. It has been defining ways of moving, collectively or individually, through fluid nonetheless complex landscapes of information displays, networked spaces, and multi- media environments. The performance being presented and the notion of \u2018choreographic coding\u2019 is a technical as much as social, cultural and aesthetic experiment constantly being expanded.\r\nProgram Code\r\nThe flexibility of code allows for a combination of possibilities, not only for the live performance se ing, but also for the use of the code itself by other designers, just as in any choreography that can be re-interpreted, re-created and adapted. The code serves as a generative tool for new possible outcomes in the creation of graphics for interfaces and a way of playing with the choreographic logic. Therefore, this method promotes disciplinary openness, by sharing ideologies and methodologies and questioning structures of collaboration and of intellectual property.\r\nThe documentation is delivered in an open-ended format, following Free/Libre Open Source (Floss) models/ philosophies. The source code for the project is available on: github.com/JoBCB", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8443, 
                                        "public_name": "Joana Chicau"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://joanachicau.com/", 
                                        "title": "Project Website"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/624/original/credit_Ana_Caria_and_Leonor_Fonseca01.jpg?1542546650", 
                                        "title": "Performance by Joana Chicau"
                                    }, 
                                    {
                                        "url": "/attachments/original/missing.png", 
                                        "title": "Performance image"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9993.html", 
                                "id": 9993, 
                                "guid": "70b257cc-d26a-4044-b95e-5d3e6d8c7597", 
                                "logo": null, 
                                "date": "2018-12-29T21:50:00+01:00", 
                                "start": "21:50", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9993-media_disruption_led_by_the_blind", 
                                "title": "Media Disruption Led By The Blind", 
                                "subtitle": "Hacking Visual Culture", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Visual culture dominates our societies, every day encouraging and rewarding corporations and their users to create more visual content to populate their digital spaces and build their digital lives. But what if there was an unseen method of disruption to these powers? What can we learn from the blind and their increased awareness of sound and vibration to disrupt and circumvent these powers without detection?", 
                                "description": "As we move towards immersive computing (XR) being the primary means of human-computer interaction, are we thinking of the blind and visually impaired? To this date, the simple answer to that question is no. However, through the visual innovations of VR HMDs, we have seen a strong momentum build for improved sonic and tactile computer interfaces. In my project Infinite Observer, I am working directly with blind innovators and content creators to set standards for UX in VR, and to empower the next generation of computing to support accessibility for the blind and visually impaired.\r\n\r\nInfinite Observer is the first narrative VR experience designed from the ground up by the blind for the blind. The experience places you in an underground ring of blind hackers called the Infinite Observers. As you discover throughout the experience, the group is filled with members of unique sensory skill sets and a deep understanding of the vibratory qualities that make sound so powerful. They monitor movements using echolocation and build resonant frequency-based weaponry. They can shift tectonic plates, teleport using molecular vibration, and hack into digital communication via sub-frequencies undetectable to the typical human ear. And you (as the user)\u2026your purpose is to learn these skills and secretly take them to the AG to subvert the present, corrupted visual culture. \r\n\r\nThe goal of the experience is to empower its users, and create a heightened appreciation for the hidden powers of the senses beyond sight. It is also meant to instill clarity around the dominance of the visual in modern culture, and inspire ways to circumvent this. As hackers, I would hope for a discussion surrounding possible techniques that might be used by the Infinite Observers, and how sound/vibration can facilitate either increased privacy/anonimity or direct disruption of dominant visual media in the real world. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8711, 
                                        "public_name": "Sabio"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "http://infiniteobserver.com", 
                                        "title": "Infinite Observer Project Page"
                                    }, 
                                    {
                                        "url": "http://thegladscientist.info", 
                                        "title": "The Glad Scientist"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/706/original/CCC.pdf?1546098678", 
                                        "title": "Presentation Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9882.html", 
                                "id": 9882, 
                                "guid": "51bb6adc-c0e7-4675-8f93-cf0e2dbd9587", 
                                "logo": "/system/events/logos/000/009/882/large/fsworld.png?1539636379", 
                                "date": "2018-12-29T22:50:00+01:00", 
                                "start": "22:50", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9882-the_foodsaving_grassroots_movement", 
                                "title": "The foodsaving grassroots movement", 
                                "subtitle": "How cooperative online structures can facilitate sustainable offline activism", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "When you're fighting for a cause, you need tools that reflect your values. While venture capital-backed tools are seductive, especially at the beginning of your movement, they can be harmful in the long-term. This session shows how co-operatively owned, non-hierarchically built Free and Open Source Software (FOSS) provides a more sustainable, and equitable, solution.", 
                                "description": "Capitalist and consumerist structures have led to reduced incentives to make the most efficient use of food. Wastage is massive and the reasons are many: misshapen vegetables, damaged packaging, mislabeling, forecasting errors, unsold items, etc. These are all symptoms of the structure of our industrialised food production structures, food waste is inherent in these systems.\r\n\r\nMany organisations have sprung up to try and access this food, using many approaches. France has tried to outlaw supermarket food waste, apps like Olio and Too Good To Go try and use the startup/funding approach, charities like FareShare in the UK receive massive government funding to redistribute to other charities. Startups and big charities replicate the hierarchical structures and bureaucratic processes of capitalist organisations. Whilst they can achieve much at times, we don't believe this is the sustainable resilient model - profit motives or government objectives dictate the approach to take.\r\n\r\nIn Germany <a href=\"https://foodsharing.de\">foodsharing.de</a> was created as a grassroots volunteer movement with origins in the dumpster diving scene. It has scaled up to co-ordinate the activities of 30k food savers to collect leftovers from supermarkets. This was achieved with almost no external funding. It faced its own organisational scaling issues and expanding beyond German speaking regions has not been possible. In response to this, and working together, we created <a href=\"https://github.com/yunity/karrot-frontend\">Karrot</a> to try and alleviate some of these issues. Unlike in foodsharing.de we develop the software independently from any specific group, this has allowed us to build common software to be used across 6 countries by independent groups. We empower local groups with access to high quality software but otherwise leave them to organise themselves.\r\n\r\nWe believe that for solving a problem you cannot use the very practices that produce it in the first place: Hierarchies lead to passive individuals who wait for their leader's decisions and don't dare to get active on their own accord. For-profit organisations need to make money and will always prioritize this goal. We are not just here to save food, but want to support and encourage self-help, self-responsibility, democracy, equality, equity and solidarity. This brings us inline with the wider co-operative and solidarity economics movement. To reject the capitalist structures that cause the problem in the first place.\r\n\r\nHowever, it's not always easy...", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8307, 
                                        "public_name": "Tilmann Becker"
                                    }, 
                                    {
                                        "id": 8654, 
                                        "public_name": "Nick sellen"
                                    }, 
                                    {
                                        "id": 8661, 
                                        "public_name": "Janina Abels"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://foodsaving.world", 
                                        "title": "foodsaving.world"
                                    }, 
                                    {
                                        "url": "https://github.com/yunity/karrot-frontend", 
                                        "title": "Karrot"
                                    }, 
                                    {
                                        "url": "https://foodsharing.de", 
                                        "title": "foodsharing.de"
                                    }, 
                                    {
                                        "url": "https://community.foodsaving.world", 
                                        "title": "Foodsaving Community Forum"
                                    }, 
                                    {
                                        "url": "https://www.youtube.com/watch?v=MLWccmvhIlU", 
                                        "title": "Presentation from the beginning of the project (2016)"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/708/original/presentation.pdf?1546106349", 
                                        "title": "Presentation"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9371.html", 
                                "id": 9371, 
                                "guid": "b87de377-eb03-4795-b998-7988a63fc239", 
                                "logo": "/system/events/logos/000/009/371/large/Repair_Caf%C3%A9_-_Logo_generisch.png?1536821082", 
                                "date": "2018-12-29T23:50:00+01:00", 
                                "start": "23:50", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9371-repair-cafes", 
                                "title": "Repair-Caf\u00e9s", 
                                "subtitle": "\u2026 und warum ihr dabei mitmachen solltet", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Die Repaircaf\u00e9-Bewegung rollt \u00fcber unser Land herein. Wie k\u00f6nnen wir uns daran beteiligen und Synergien nutzen?", 
                                "description": "In vielen St\u00e4dte sind in den letzten Jahren Reparaturtreffs zur festen Institution geworden. Was gibt es f\u00fcr Schnittmengen mit der Hacker- und Makerszene? Warum solltet ihr euch beteiligen, was gibt es dabei zu beachten und zu gewinnen?", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7323, 
                                        "public_name": "Fraxinas"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://pads.schaffenburg.org/p/Repaircafe-35C3", 
                                        "title": "Presentation Repair-Caf\u00e9s"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Lecture room 11": [], 
                        "Seminar room 14-15": [], 
                        "Seminar room 13": [], 
                        "Lecture room M1": [], 
                        "Lecture room M2": [], 
                        "Lecture room M3": [], 
                        "Kidspace": [], 
                        "CCL Saal 3": [], 
                        "Chaos West B\u00fchne": [
                            {
                                "id": 163, 
                                "guid": "8f9197a2-06a9-5809-b094-621f95e8d2e7", 
                                "logo": null, 
                                "date": "2018-12-29T01:30:00+01:00", 
                                "start": "01:30", 
                                "duration": "02:00", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "ALV3XL", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/ALV3XL", 
                                "title": "\u00dcberraschungsgast", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Klangteppich", 
                                "language": "en", 
                                "abstract": "Wir bringen einen \u00dcberraschungsgast mit. Kommt vorbei, es wird gut werden!", 
                                "description": "Wir bringen einen \u00dcberraschungsgast mit. Kommt vorbei, es wird gut werden!", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 81, 
                                        "name": "\u00dcberraschungs Gast", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 126, 
                                "guid": "b4850756-d05b-5689-818b-b4b3b233244e", 
                                "logo": null, 
                                "date": "2018-12-29T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "NBCWSE", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/NBCWSE", 
                                "title": "pam_panic - A Linux authentication module for people in distress", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "en", 
                                "abstract": "pam_panic is an authentication module made for people who think they might get into a distressing situation where they are forced to type in or even tell the password to bad people.\r\nThe idea is to use a password or a media device at a login screen which issues a destruction of the LUKS keyslots.\r\nThere will be a little crash course on what LUKS is to be more clear how and why it works.", 
                                "description": "## pam_panic ##\r\n[on github](https://github.com/pampanic/pam_panic)\r\n\r\n### Purposes ###\r\n- Make a LUKS encrypted filesystem inaccessible when in distress\r\n\r\n\r\n### What is the idea? ###\r\n- Have an encrypted system done by LUKS\r\n- Have two passwords or two media devices (One of the passwords/media devices is used for regular authentication, the other one is used for issuing a destruction of the LUKS key material slots and have a reboot/shutdown)\r\n- Ask for a password/media device before your regular user password\r\n\r\n\r\n### Crash course: LUKS ###\r\n- What do we need to know to get this to work?\r\n- How does the LUKS header look like?\r\n\r\n### Making my data inaccessible ###\r\n- Using `cryptsetup luksErase` \r\n\r\n### Scenarios ###\r\nScenarios where it can help:\r\n\r\n- Being forced to type/tell your password\r\n- Raids\r\n\r\n\r\nScenarios where it doesn't help:\r\n\r\n- Letting them make a clone of your hard drive, then having your password/media device forced from you\r\n\r\n\r\n## Demonstration of pam_panic ##\r\n1. Setup\r\n2. Show authentication password and media device\r\n3. Show panic password/media device and show the result of inaccessibility\r\n\r\n## Q+A ##\r\n..if there's enough time.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 36, 
                                        "name": "Bandie", 
                                        "biography": "Home Hackspace: [Chaospott](https://chaospott.de)\r\nDECT: 2263 (BAND)", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 110, 
                                "guid": "c22707f5-d850-5827-9334-c48446f69fd2", 
                                "logo": null, 
                                "date": "2018-12-29T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "DUAEJC", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/DUAEJC", 
                                "title": "p\u2261p Engine Development - Tales of a MIME Warrior", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "en", 
                                "abstract": "p\u2261p is an end-to-end privacy-focused security architecture, which, in its first incarnation, aims to provide a seamless private, encrypted email solution for everyone. This talk focuses on some of the development challenges in supporting an ambitious product from the inside and lessons-learned that don't appear in software engineering classes.", 
                                "description": "p\u2261p is an end-to-end privacy-focused security architecture, which, in its first incarnation, aims to provide a seamless private, encrypted email solution for everyone. We do this without the requirement that the user has any understanding of keys, encryption, protocols, or encryption engines while still maintaining complete transparency at the core by providing the adapters and engine as free software. The p\u2261p foundation develops and maintains the engine and adapters which allow external app development (including that done by the business arm of p\u2261p) to securely use the p\u2261p engine without needing to understand and implement the secure functions of the p\u2261p protocol. \r\n\r\nMoving the complexity of a product to the engine, however, creates a number of challenges relating to ensuring maximal cross-platform compatibility, communication (and often, adaptation) of APIs and usage, determination of where problems should be solved, etc. Doing this with a product that handles email adds the additional entertainment of repeatedly revisiting the less-deterministic-than-desired land of MIME RFCs and the reality that the product has to support all of the violations of those RFCs, even when one would prefer to avoid the egregiously broken. This talk focuses on some of the development challenges in supporting an ambitious product from the inside and lessons-learned that don't appear in software engineering classes.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 21, 
                                        "name": "Krista Bennett", 
                                        "biography": "Krista Bennett is a software developer, researcher and linguist residing in Germany, and is currently the core engine developer at p\u2261p foundation. She has previously worked at the Technische Universit\u00e4t M\u00fcnchen, Fraunhofer AISEC, Purdue University, and Hewlett-Packard, and has a Masters in Computer Science from Purdue University and a B.S. in Computer Science from the University of Wisconsin-Milwaukee. She would definitely rather be playing video games right now.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 111, 
                                "guid": "5b7a598e-95a6-58fa-b390-96a66a1cd7b5", 
                                "logo": null, 
                                "date": "2018-12-29T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "ATBYBZ", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/ATBYBZ", 
                                "title": "Introduction to Network Security", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "en", 
                                "abstract": "Learn about the most common attacks against your network privacy - and how to avoid them. By looking at  things from an attackers perspective, we can get some insight into technical details that provide us with essential knowledge about network protocols.", 
                                "description": "You will learn about three of the most common attacks against computer network security.  In each of these scenarios, a victim's communication can be monitored and modified at a total loss of privacy. By learning how these attacks are executed, you can defend yourself better.\r\n\r\nARP Spoofing is used to claim any IP address on a local network. This can be the address of the victim's computer or that of the router. I will show you how the possibilities of attacking in both directions.\r\n \r\nDNS Hijacking is a technique to monitor or modify the victim's queries on the Internet Domain System. Even when using encrypted protocols like HTTPS, privacy is at risk. With this scenario, you can apply a number of attacks I will present. \r\n\r\nRogue Access Points on a wireless network are harmful on another layer than previously inspected. In probably most of the installations out there, the attacker can easily add a malicious access point to intercept traffic. I will give some short intro into wi-fi and its protocol design. \r\n\r\nHopefully, you can use this knowledge to protect your own privacy and that of others. With these examples, you will at least get some valuable insight into an area that is the playground of the most commonly known type of hackers.\r\n\r\nOnly basic knowledge about network protocols is expected.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 23, 
                                        "name": "nomaster", 
                                        "biography": "Studied computer science and philosophy, but never got an academic title. With a practical approach, got some insight into the legacy of operating systems and networks. As an active member of several hackspaces and the Freifunk community, nomaster dedicates his work on the educational perspective on technology.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 161, 
                                "guid": "0a1a58a4-7700-502b-b8f2-405f3e42c1bc", 
                                "logo": null, 
                                "date": "2018-12-29T13:30:00+01:00", 
                                "start": "13:30", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "BBPFCJ", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/BBPFCJ", 
                                "title": "wirtschaft hacken!", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Was passiert, wenn menschen mit einer hacker_innen-artigen grundhaltung in die wirtschaft gehen? \r\nsie halten sich nicht an alle regeln. das geht nicht nur, es geht sogar oft viel besser als \"normal\"...", 
                                "description": "wirtschaft ist auch nur ein system mit regeln. gesetze, sachzw\u00e4nge, stra\u00dfen, bwl, vwl, sowas. dinge sind wie sie sind. \r\nja? nicht alle.\r\ngerade in der wirtschaft lassen sich regeln verbiegen und viele dinge anders machen. nicht die inhabenden treffen die entscheidungen, sondern alle betroffenen. nicht nur in mehrheiten, sondern im konsens. gewinne sind nicht n\u00f6tig, ja gar nicht erw\u00fcnscht. werbung ebenso. es gibt anti-mengenrabatte f\u00fcr kleine kunden, aber keine mengenrabatte f\u00fcr gro\u00dfe. die umwelt ist wichtiger als der ertrag. einheitsl\u00f6hne. \r\nund soweiter  wir haben in den letzten jahren einiges in der wirtschaft verbogen; \r\nin der getr\u00e4nkebranche,  in der festival-logistik, in beratungen, und in der hausverwaltung. \r\nund wir erz\u00e4hlen gerne davon, um andere zu ermutigen, auch dinge anders zu machen. \r\ndas geht nicht nur, es geht sogar oft besser als \"normal\".", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 74, 
                                        "name": "Uwe L\u00fcbbermann", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 138, 
                                "guid": "208a0d4d-bd15-5795-82aa-563e270001d5", 
                                "logo": null, 
                                "date": "2018-12-29T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "N7LQFX", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/N7LQFX", 
                                "title": "Chatbots im Kundenservice - Are we still talking about pink dildos??", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "de", 
                                "abstract": "Vortrag \u00fcber Chatbots im Kundenservice. Eine Inhaltsanalyse mit anschliessender experimenteller Befragung. Was k\u00f6nnen Chatbots heutzutage und k\u00f6nnen sie Kunden genauso zufriedenstellen wie ein menschlicher Mitarbeiter?", 
                                "description": "Chatbots im Kundenservice sind heutzutage nichts mehr aussergew\u00f6hnliches. Unternehmen wie ebay, zalando oder H&M setzen f\u00fcr die Beratung ihrer Kunden virtuelle Agenten ein. Chatbots k\u00f6nnen Kunden 24/7 bedienen, sind billiger im Unterhalt als ein menschlicher Mitarbeiter und nie unfreundlich. Jedoch stellt sich f\u00fcr Unternehmen auch die Frage, ob die virtuellen Berater die Kunden genauso zufrieden stellen k\u00f6nnen wie ein menschlicher Mitarbeiter. Schliesslich kann es zu technischen Fehlern oder auch zu einem Unverst\u00e4ndnis der Eingabe des Kunden seitens des Chatbots kommen. Ausserdem f\u00fchlen sich manche Menschen unwohl im Umgang mit einem im Real life nicht existierenden Gespr\u00e4chspartner. Viele Kunden sind auch der \u00dcberzeugung, dass sie mit einer solchen K\u00fcnstlichen Intelligenz nichts zu tun haben wollen oder Chatbots technisch noch lang nicht so weit sind, um einen guten Service zu leisten.\r\nIn meiner Masterarbeit bin ich genau diesem Thema nachgegangen (zusammen mit meiner Kollegin, die leider nicht am CCC dabei sein kann) und will es nun auf dem CCC vorstellen. Zun\u00e4chst werde ich vorstellen, wie sich der heutige State of Art der existierenden Service-Chatbots gliedert und welche F\u00e4higkeiten diese besitzen. Zeigen sie Gef\u00fchle oder sind sie eher neutral? Sind sie gut darin, meine W\u00fcnsche zu ber\u00fccksichtigen? Welche Umgangsformen herrschen? All dies wurde in einer Inhaltsanalyse erforscht.\r\nDanach m\u00f6chte ich vorstellen, wie Menschen darauf reagieren, wenn sie von einem Chatbots oder einem Mensch \u00fcber Chat bedient werden. Dazu wurde aus dem Material der Inhaltsanaylse ein Stimulus geschaffen, mit dem getestet wurde, wie Kunden auf einen Chatbot im Vergleich zu einem menschlichen Mitarbeiter reagieren. Es wurde eine experimentelle Befragung mit ca. 200 Teilnehmern durchgef\u00fchrt, wo ihnen ein Kundengespr\u00e4ch mit Chatbots oder menschlichen Mitarbeitern vorgef\u00fchrt wurde. Daraufhin bewerteten die Kunden das Gespr\u00e4ch auf die Qualit\u00e4t hin.\r\nEs kam heraus, dass es keinen Unterschied macht, ob man von einem Mensch oder einem Chatbot bedient wird, Hauptsache, der Chatpartner leistet eine hohe Beratungsqualit\u00e4t. Dies bedeutet, dass man Chatbots im Service-Bereich durchaus einsetzen kann, jedoch darauf achten muss, dass diese ihre Aufgabe gut erledigen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 52, 
                                        "name": "Silia Nebelstreif", 
                                        "biography": "Ich studiere Kommunikationswissenschaften und Biologie an der Universit\u00e4t Z\u00fcrich, und bin zum 4. Mal am CCC dabei. Ich bin am meisten an der sozialwissenschaftlichen Seite des Congresses interessiert, aber finde auch alle anderen Themen sehr spannend. Ich liebe Metal, Wrestling, Tiere und ganz viel Knuddeln :)", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 151, 
                                "guid": "5d64ecaa-6eb6-55a3-8747-74f47b61b7b2", 
                                "logo": null, 
                                "date": "2018-12-29T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "7ZSFL9", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/7ZSFL9", 
                                "title": "9 out of 10 x86_64 firmware vendors will hate this talk!", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "en", 
                                "abstract": "We'll give a short introduction what you might find in your machines firmware and tell the story of two hackers that magically found tens of thousands x86_64 firmware images in their backyard as well as their journey to explore common configuration fuckups, update frequencies and potential security risks.", 
                                "description": "24 vendor images that will make you wonder where we all went wrong\r\n\r\n2 hackers looked over 5 mins on several thousand firmware images an you'll never guess what they found!\r\n\r\nThese 6 x86_64 vendors belong in jail\r\n\r\nWhat happens when you suddenly find tenth of thousand firmware images in your backyard\r\n\r\nOn a level from coreboot to [censored]. How fucked are you?\r\n\r\nYou won't believe what vendors put in your firmware image.\r\n\r\nEverything you need to know if all your friends are apparently????? Having non-free firmware????\r\n\r\n42 Facts about vendor firmware that'll probably make you want to start your own coreboot port.\r\n\r\nSorry, but you have to decide between these few firmware vendors.\r\n\r\nThese are the biggest firmware trends of 2018, according to these two people", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 64, 
                                        "name": "bibor", 
                                        "biography": "bibor is a random hacker with and interest in firmware, hardware and their security.", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 65, 
                                        "name": "Mimoja", 
                                        "biography": "Mimoja is a western german hacker with a focus on firmware, hardware and security.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 121, 
                                "guid": "09ebfa89-8334-5cd8-86e3-c4b6041aa524", 
                                "logo": null, 
                                "date": "2018-12-29T16:30:00+01:00", 
                                "start": "16:30", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "BEENSD", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/BEENSD", 
                                "title": "Cloudcalypse: It looks like you've reached the end. How to take your data into net2o", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "en", 
                                "abstract": "The GPDR allows to take out your data **out** of the collapsing cloud (Google+ sunset: August 2019, Facebook jumping from data breach to breach, github now part of Microsoft), but the challenge is to take it **into** something else.  This talk will show how to move it into net2o, a peer to peer system. #ybti #wefixthenet", 
                                "description": "# Talk structure #\r\n\r\n  1. Motivation: The Internet is broken, it needs to be fixed.\r\n      + Special highlight: Data in the cloud \u2014 up at whim to whoever owns that cloud\r\n      + Nonfree software as a service means your data is useless without the service\r\n      + Why free software means you have to operate it yourself\r\n  2. What is net2o:\r\n      + peer to peer protocol stack\r\n      + last years' talk: application layer framework.\r\n      + this year: Let's talk about actual applications.\r\n  3. The technical challenge\r\n      + how does data takeouts look like (Examples: Google+, Twitter, Facebook, blogger.com)\r\n      + What kind of data does net2o want?\r\n      + Convert the data\r\n      + Done\r\n  4. The non-technical challenge\r\n      + Get your contacts to net2o, too.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 31, 
                                        "name": "Bernd Paysan", 
                                        "biography": "I've done free software for more than 25 years, since I started developing Gforth, the GNU project's Forth system in 1992, and am developing net2o, a peer to peer network protocol stack since 2010.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 117, 
                                "guid": "df01776d-607c-598e-917f-2ffd406c4330", 
                                "logo": null, 
                                "date": "2018-12-29T17:30:00+01:00", 
                                "start": "17:30", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "RZ7NWT", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/RZ7NWT", 
                                "title": "Nothing new about XSS in impress.js", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "en", 
                                "abstract": "I built a small demonstrator for Cross-Site-Scripting (XSS) attacks in impress.js. It would be a waste to let it stay on my computer, because I think it could help you giving a brief lecture on XSS. Much more interesting, probably, is my implementation of the whole thing: the cockpit (a header and footer that provide a visual frame, while the viewpoint navigates the 3-dimensional space of your presentation) and the handling of input to modify contents of successive slides.", 
                                "description": "While I don't think to tell you anything new about cross-site scripting, I hope you are interested in the two features I add to the impress.js examples. Well the XSS-part also is interesting in itself, but I am astonished every time I find this weakness in the wild, because it is not difficult to prevent. Thus, if you also learn about XSS in the progress, I am happy.\r\n\r\nMostly the presentation will show you two new example techniques for presentations with impress.js\r\n\r\nThe cockpit: just some fixed headers and footer in the layout. But better graphical artists might actually turn this into a real cockpit view. In the end it is only a wee bitty of css, but it is something that turns a 3-d animation into a flight through the slide-space.\r\n\r\nUse my [demo sources](https://gitlab.com/larsipulami/xss-demo) and make me famous!\r\nValue-transfer: Why using JavaScript to present static slides, it makes no sense to not utilise a fully-fledged, yet tedious, interpreter environment \u2014 your web-browser \u2014 if you don't make something more dynamic with your slides. For example transferring inputs between slides and execute contents to demonstrate the effects of XSS.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 26, 
                                        "name": "inj4n", 
                                        "biography": "CDA - HASI - CCCHB", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 113, 
                                "guid": "4dca2405-3576-59a5-8bd9-98c9d452eaa5", 
                                "logo": null, 
                                "date": "2018-12-29T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "QR8RPD", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/QR8RPD", 
                                "title": "Das Geoportal des Guten Lebens", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "de", 
                                "abstract": "Das Forschungsprojekt \"Transformationsstadt - B\u00fcrgerInnen forschen f\u00fcr ein Gutes Leben\" (http://www.transformationsstadt.de/geoportal/) hat zum Ziel, ein GeoPortal f\u00fcr georeferenzierte offene Daten zu Themen des Gutes Lebens zu entwickeln. Warum noch ein GeoPortal? Und warum ein GeoPortal des Guten Lebens? Das haben wir uns auch gefragt. Die Antwort darauf erfahrt ihr in unserem Vortrag!", 
                                "description": "Das GeoPortal des Guten Leben bietet eine Plattform, auf der zum einen georeferenzierbare offene Daten der St\u00e4dte, Bundesl\u00e4nder und von wissenschaftlichen Einrichtungen flie\u00dfen und zum anderen B\u00fcrgerInnen Wissen \u00fcber ihre Umgebung festhalten k\u00f6nnen. Alle Daten, die in das GeoPortal des Guten Lebens eingetragen werden, werden nach Dimensionen einer lokalen Adaption des Better Life Index der OECD (https://w-indikatoren.de/) indexiert. Zu den insgesamt 12 Dimensionen geh\u00f6ren beispielsweise Gemeinschaft, Infrastruktur, Wohnen, Engagement, Umwelt oder Sicherheit. Ziel des Portals ist einen dauerhaften Wissensaustausch zwischen B\u00fcrgerschaft und zivilgesellschaftlichen Initiativen, Wissenschaft und Kommunen zu diesen Themen zu initiieren. Eine erste Version des Portals wird aktuell entwickelt und im kleineren Rahmen getestet. Perspektivisch kann das Portal weltweit genutzt werden.\r\n\r\nDas GeoPortal des Guten Lebens wird gemeinsam von der zivilgesellschaftlichen Organisation Utopiastadt (http://utopiastadt.eu), dem Wuppertal Institut (https://wupperinst.org) und dem Zentrum f\u00fcr Transformationsforschung und Nachhaltigkeit (https://www.transzent.uni-wuppertal.de) entwickelt und verfolgt dabei die Grundgedanken von Open Data, Open Source und Open Access. Das Projekt wird gef\u00f6rdert vom Bundesministerium f\u00fcr Bildung und Forschung im Bereich B\u00fcrgerforschung.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 25, 
                                        "name": "Benedikt", 
                                        "biography": "twitter.com/kleinbenny", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 77, 
                                        "name": "Jana", 
                                        "biography": "Jana is an UX, Communication and Public Interest Designer from Wuppertal. She works for the project \"GeoPortal des Guten Lebens\" at the Center for Transformation Research and Sustainability (TransZent) at the University of Wuppertal.\r\n\r\n@JanaGreen |  janapahlkoetter.de", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 78, 
                                        "name": "Ralf", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 166, 
                                "guid": "749df06a-df6d-552b-9f5f-defc25fcbded", 
                                "logo": null, 
                                "date": "2018-12-29T18:30:00+01:00", 
                                "start": "18:30", 
                                "duration": "01:30", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "JGUAGC", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/JGUAGC", 
                                "title": "Haecksen Happy Hour", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Klangteppich", 
                                "language": "en", 
                                "abstract": "Party with the haecksen! Dance and celebrate with an uplifiting drum and base mix by dj shroombab (https://m.soundcloud.com/shroombab).", 
                                "description": "Party party!", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 49, 
                                        "name": "Haecksen", 
                                        "biography": "Die \"Haecksen\" sind der Zusammenschluss eines Teils der weiblichen* Mitglieder des Chaos Computer Clubs. Gegr\u00fcndet wurde die Gruppierung 1988 von Rena Tangens und Barbara Thoens. Die Haecksen treffen sich j\u00e4hrlich auf dem Chaos Communication Congress des CCC und veranstalten eigene Projekte. Da sie sich als virtueller Erfa-Kreis des CCC verstehen, ist ihr wichtigstes Kommunikationsmittel eine Mailingliste.\r\n\r\nDas Ziel der Haecksen ist es, zu zeigen, dass M\u00e4dchen* und Frauen* ganz selbstverst\u00e4ndlich kreativ mit Technik umgehen k\u00f6nnen und dass das Bild in den K\u00f6pfen der Menschen - dass Hacker m\u00e4nnlich sind - nicht stimmt.\r\n\r\nHierbei verstehen wir unter Haecksen eine Gruppe aus Hackerinnen, die sich als Frauen* identifizieren. Dies umfasst cis und trans Frauen sowie nicht-bin\u00e4re Menschen, die sich mit dem Label \"Frau\" wohlf\u00fchlen. Der Stern repr\u00e4sentiert nicht nur diese Personengruppen, sondern auch die Tatsache, dass Geschlecht ein soziales Konstrukt (und damit \u00fcberaus hackbar) ist. \r\n\r\nhttps://www.haecksen.org/mediawiki/index.php/Main_Page", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 134, 
                                "guid": "ec1f65e0-1333-5bb2-af4c-46f91052467e", 
                                "logo": null, 
                                "date": "2018-12-29T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "U3R3RZ", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/U3R3RZ", 
                                "title": "Freitagsfoo gestern, heute, morgen", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "de", 
                                "abstract": "Wie organisiert man einen \"offenen Abend\" mit Vortr\u00e4gen? Muss man da \u00fcberhaupt etwas organisieren oder schaffen das die Vortragenden selbst?\r\n\r\nWir erz\u00e4hlen vom [Freitagsfoo](https://wiki.chaosdorf.de/Freitagsfoo) im Chaosdorf und unseren Erfahrungen.", 
                                "description": "Der Freitagsfoo ist ein w\u00f6chentliches Event im Chaosdorf, bei dem u.a. gegessen und vorgetragen wird. Wir berichten \u00fcber Vergangenheit und Gegenwart und haben Ideen f\u00fcr die Zukunft.\r\n\r\nFr\u00fcher wurde das mit den Vortr\u00e4gen aber leider etwas schleifen gelassen. Dies hatte viele Gr\u00fcnde. Der Hauptgrund d\u00fcrfte sein, dass die Moderationsrolle meistens erst spontan zugewiesen wurde - oder auch gar nicht.\r\n\r\nMit unserem neuen Moderationsteam (die Vortragenden hier) und neuer Technik (z.B. unserer [Info-Beamer App](https://github.com/chaosdorf/freitagsfoo-infobeamer) und unserer [Web App](https://github.com/chaosdorf/freitagsfoo-web)) wird das alles besser!\r\n\r\nAu\u00dferdem berichten wir von einem anderen Anlauf, der in diese Richtung schon 2015 unternommen wurde, aber leider nur sehr kurzfristig (eine Woche) funktioniert hat.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 47, 
                                        "name": "ytvwld", 
                                        "biography": "Ich bin Teil des Freitagsfoo-Moderations-Teams im Chaosdorf und Hauptentwickler unserer Info-Beamer-App und der Webapp.", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 57, 
                                        "name": "hanemile", 
                                        "biography": "{Python, Go} {TFG, HHU, @chaosdorf} {ENERGIE!}", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 23, 
                                        "name": "nomaster", 
                                        "biography": "Studied computer science and philosophy, but never got an academic title. With a practical approach, got some insight into the legacy of operating systems and networks. As an active member of several hackspaces and the Freifunk community, nomaster dedicates his work on the educational perspective on technology.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 123, 
                                "guid": "f4568030-a378-586e-b39a-4fab71027a37", 
                                "logo": null, 
                                "date": "2018-12-29T21:30:00+01:00", 
                                "start": "21:30", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "ZZ79BR", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/ZZ79BR", 
                                "title": "Bei gleicher Qualifikation werden M\u00e4nner bevorzugt - Algorithmic Bias & der \u00f6sterreichische Arbeitsmarkt", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "As algorithms are involved or even solely responsible for more and more decisions in our daily lives, there is more and more discussion about algorithms being unfair, biased, even straight-on discriminatory.\r\n\r\nThe Austrian Public Employment Service (AMS) announced in October that they would start using an algorithmic system (in short, every-day language \"algorithm\") to decide who will receive more (or less) benefits and support from their system. First analyses in the days after the announcement already predicted that the system would be discriminating against people who are already marginalise", 
                                "description": "In this talk I want to give people a better understanding of why and how algorithmic systems are biased and how people are trying to solve problems these biases cause. Specifically, we will see how data collection and interpretation, model creation, problem definition, definition of success and even the design of outputs can impact algorithmic systems \u2013 or improve justice and equality, if proper thought and care is put into designing them.\r\n\r\nAs a computer science student, students' rights activist and privacy activist, I have worked on the topic of algorithmic bias at various institutions and with different groups of people. \r\nA one-page article I co-authored on the topic of algorithmic bias aimed at students in Austria can be found at <a href=\"https://www.progress-online.at/artikel/wenn-der-algortihmus-zum-unterdr%C3%BCcker-wird\">Progress magazines' website</a>. \r\nA write-up for the masters' course \"Critical Algorithm Studies\" at TU Wien can be found on <a href=\"https://pascoda.fairydust.space/index.php/2018/09/write-up-bias-in-algorithmic-systems/\">my blog</a>. It discusses which current issues in algorithmic systems are, in my opinion, the most urgent ones.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 33, 
                                        "name": "pascoda", 
                                        "biography": "I am a CS student and an activist for students' rights, privacy, and social justice.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 133, 
                                "guid": "8de552ac-9a4d-5b37-b4eb-e0576d64dfe5", 
                                "logo": null, 
                                "date": "2018-12-29T22:30:00+01:00", 
                                "start": "22:30", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "QHNDRQ", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/QHNDRQ", 
                                "title": "Hackspaces: How to conflict eine offene Frage", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Wir beobachten in immer mehr Spaces Konflikte innerhalb der Community die teilweise bis zur Spaltung f\u00fchren. Wir wollen versuchen die Probleme anhand unseres eigenen Spaces zu ana\u00adly\u00adsie\u00adren. Au\u00dferdem wollen wir potentielle L\u00f6sungsm\u00f6glichkeiten, die wir gerade versuchen einzuf\u00fchren, vorstellen. Schlie\u00dflich wollen wir Versuchen einen Diskussion dar\u00fcber innerhalb der gesamten Hacking und Chaos Community anzusto\u00dfen anstatt das jeder Space versucht die Probleme alleine und erneut zu l\u00f6sen", 
                                "description": "Aktuellen sehen wir immer mehr Gemeinschaften in der Hacking Community in denen es kriselt und sich Konflikte innerhalb der Gemeinschaft auftun. Oft gibt es auf den ersten Blick keinen konkreten Anlass oder Grund daf\u00fcr. Wir haben das sowohl aus erster Hand in unserem lokalem Space als auch aus der ferne bei mehreren anderen beobachtet. Wir glauben das die Gr\u00fcnde daf\u00fcr unter anderem in fehlenden Gemeinschaftlichen Identit\u00e4t und Gemeinschaftlichen Werten sowie der Kommunikation liegt. In diesem Talk wollen wir die Probleme die wir glauben Identifiziert zu haben am Beispiel unseres Spaces vorstellen. Au\u00dferdem werden wir vorstellen was wir glauben wie man diese Probleme angehen und beheben kann. Da die Ereignisse bei uns sehr aktuell sind ist es aber noch nicht m\u00f6glich ein Fazit zu sehen ob alle diese Techniken wirklich funktionieren. Wir sehen diesen Talk viel mehr auch als ein Startpunkt das wir als deutsche Hacking bzw Chaosnahe Gemeinschaft dar\u00fcber eine Diskussion f\u00fchren sollten wie wir mit solchen F\u00e4llen umgehen und was wir hoffentlich proaktiv tun k\u00f6nnen damit es gar nicht so weit kommt.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 45, 
                                        "name": "Sandzwerg", 
                                        "biography": "Seit Ende 2012 im m\u00fcnsteraner Hackspace, der warpzone aktiv. Seit 2013 im Vorstand, seit 2014 tue ich auch Dinge bei Chaos-West", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 84, 
                                        "name": "Reverend", 
                                        "biography": "From hackerspace M\u00fcnster: warpzone", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 119, 
                                "guid": "04c8e1d6-ccde-596c-8d15-1fe758d0bc0e", 
                                "logo": null, 
                                "date": "2018-12-29T23:30:00+01:00", 
                                "start": "23:30", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "S98TLU", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/S98TLU", 
                                "title": "IMFUC", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "de", 
                                "abstract": "Bei diesem Spiel, geht es um Filme und Code. Um nerdige Referenzen und t\u00f6tlichen Wortwitz. Zwei Teams m\u00fcssen anhand von Codeschnipseln Filmtitel erraten. Die Teams haben abwechselnd 30 Sekunden Zeit um den richtigen Titel zu finden. Mehr wird noch nicht verraten.", 
                                "description": "In einem Moment endloser Langeweile schrieb einst Gro\u00dfmeister der Hackerfilme einen Code. Dabei viel ihm auf, dass dieser Code einen echten Handlungsstrang aufwies. Er r\u00e4tselte \u00fcber ein halbes Jahrhundert, bis ihm auffiel, dass es sich um den Pseudocode von \"V wie Vendetta\" handelte. Darauf hin beschloss er allen Code der Welt zu analysieren und auf versteckte Filme zu pr\u00fcfen. Das Ergebnis von 3,1415 Jahrtausenden Arbeit ist IMFUC. Ein Spiel. Eine Challenge. Ein schmerzhafter Wordwitz.\r\n\r\nAuch das Publikum wird mitraten d\u00fcrfen. Dabei wird die Anzahl der korrekten Antworten auf der B\u00fchne angezeigt. Und das ganz sicher nicht, um die Teams ein wenig zu trollen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 29, 
                                        "name": "harmoniemand", 
                                        "biography": "Nerd und Softwareentwickler aus Heilbronn. Arbeite dort mit Jugendlichen und Technik.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "ChaosZone": [
                            {
                                "id": 709, 
                                "guid": "fc628de1-d13c-5cca-a55e-56bc092c8fb3", 
                                "logo": null, 
                                "date": "2018-12-29T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "8ZNLPJ", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/8ZNLPJ", 
                                "title": "Haskell Game Development", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "A short view on my yet early stages of game development in Haskell and the tools I have crafted so far.", 
                                "description": "In this talk I will give some insights into the programming language Haskell as well as common problems you encounter, when starting game development in this language.\r\n\r\nFurthermore You will see my attempts at game programming in this language, being both 2D and 3D applications, and my best attempts in completing a game, of which one is still work in progress.\r\n\r\nI will also be presenting \"Affection\", my own, still minimalist, game engine to the public and seek like-minded people to help advance it further.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 14, 
                                        "name": "Nek0", 
                                        "biography": "", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 722, 
                                "guid": "20dfd0fc-67f7-55aa-bf2f-4e629ff038b5", 
                                "logo": null, 
                                "date": "2018-12-29T15:15:00+01:00", 
                                "start": "15:15", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "GAP7W8", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/GAP7W8", 
                                "title": "ChaosZone goes Chaos Communication Camp - Hackspaces of the East, let's organize some Outdoor Chaos", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "We need you to make ChaosZone at Chaos Communication Camp 2019 awesome. In this session we would like to start weaving the net between our hackspaces to make it happen.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4, 
                                        "name": "bigalex", 
                                        "biography": "", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 1, 
                                        "name": "nilo", 
                                        "biography": "", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 27, 
                                        "name": "honky", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 718, 
                                "guid": "a1139df6-a02e-5d1b-96f3-0a1094909659", 
                                "logo": null, 
                                "date": "2018-12-29T16:45:00+01:00", 
                                "start": "16:45", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "UDCQHX", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/UDCQHX", 
                                "title": "Hebocon - Regionalliga", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "Weight-In und Vorausscheid f\u00fcr das sp\u00e4ter staffindende Hebocon-Finale", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 21, 
                                        "name": "honky", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 712, 
                                "guid": "14a8a211-a5f3-5495-891d-72392cd0550e", 
                                "logo": null, 
                                "date": "2018-12-29T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "KHLB8Z", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/KHLB8Z", 
                                "title": "Aus der Praxis eines studentischen Hackspaces: Selfhosting, Freie Software, Chaos", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "Der Maschinenraum ist ein Hackspace, der seit fast 20 Jahren Teil des studentischen Lebens in Weimar ist. Bei uns l\u00e4uft einiges anderes - wir erz\u00e4hlen vom Kampf um freie Software, Akzeptanz dezentraler Dienste, und dem allgemeinen Chaos.", 
                                "description": "Wir betreiben als Initative des Studierendenkonvents u.a. eigene Nextcloud-, Gitlab-, Etherpad-, Wordpress- & Mastodon-Instanzen. Und wir k\u00e4mpfen f\u00fcr freie Software in der Lehre \u2013 manchmal auch einfach nur, weil wir keinen Bock mehr haben 10 mal am Tag gefragt zu werden ob wir Photoshop cracken k\u00f6nnen.\r\nUnd auch die B\u00fcrokratie kann nicht viel mit einem Hackspace anfangen, aktuell sollen wir z.B. der Innenrevision nachweisen, dass wir nicht im kriminelle Machenschaften verstrickt sind \u2013 und zwar indem wir Selbstzensur und Total\u00fcberwachung betreiben.\r\nWir haben also genug zu erz\u00e4hlen, aber erwartet bitte keinen allzu ernsten und technischen Vortrag. :)", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 17, 
                                        "name": "aurora", 
                                        "biography": "", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 22, 
                                        "name": "mt", 
                                        "biography": "", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 708, 
                                "guid": "886791c2-9ab1-5779-b889-3429d5e4021e", 
                                "logo": null, 
                                "date": "2018-12-29T19:30:00+01:00", 
                                "start": "19:30", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "GYDDDD", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/GYDDDD", 
                                "title": "DevOps Disasters", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "Abgr\u00fcnde und Gruseligkeiten aus der Operations-Welt", 
                                "description": "Software will nicht nur gebaut, sondern auch betrieben werden. Sp\u00e4testens, wenn es sich beim Production Environment nicht l\u00e4nger um Wohnzimmerprovider, Standard-Webspace und FTP handelt, wird schnell deutlich, was ein St\u00fcck Code wirklich taugt, ob er skaliert, oder ob das, was in der Entwicklungsumgebung noch ganz nett aussah im Betrieb f\u00fcr ernsthafte Schmerzen sorgt. Doch nicht nur die Software selbst hat Grusel-Potential...", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5, 
                                        "name": "Stefan", 
                                        "biography": "Hacktivism, DevOpse, Guerilla-IT, freies Radio & Co.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 714, 
                                "guid": "806d9394-f19e-512b-9290-91e633e9921d", 
                                "logo": null, 
                                "date": "2018-12-29T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "SPC9JS", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/SPC9JS", 
                                "title": "Lightningtalks Overflow", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "You didn't manage to get an official Lightningtalk slot? Here is another chance to deliver your talk. Overflow talks will be managed by the \"official\" Lightning talk pretalx system. Please do NOT submit lightningtalks directly to ChaosZone.\r\n\r\nDetailed program: https://c3lt.de/35c3overflow/schedule/\r\n\r\nCfP https://c3lt.de/35c3overflow/cfp", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 19, 
                                        "name": "-", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 724, 
                                "guid": "fdb28191-b9f5-5cc0-a3a1-dbb54ffdc527", 
                                "logo": null, 
                                "date": "2018-12-29T22:30:00+01:00", 
                                "start": "22:30", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "EWKNEU", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/EWKNEU", 
                                "title": "Fucked Up For A Cause", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "When working coding for the Atari 2600 VCS, one can assume that the guys building the hardware did some very crude fuck ups. Let my show you why this is a wrong assumption.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 29, 
                                        "name": "SvOlli", 
                                        "biography": "Award winning demo coder. Favourite system: Atari 2600 VCS as released in 1977 (US) and 1979 (Europe).", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Vortrags-Arena": [
                            {
                                "id": 306, 
                                "guid": "83cb47b2-23fd-5a97-a82f-053469f31640", 
                                "logo": "", 
                                "date": "2018-12-29T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "00:30", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "QMHCUH", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/QMHCUH/", 
                                "title": "OIO habour clean up - Day 2", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "OIO Housekeeping", 
                                "language": "en", 
                                "abstract": "daily OIO habour clean up - Day 2", 
                                "description": "daily OIO habour clean up - Day 2", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 93, 
                                        "code": "HUQ9YA", 
                                        "public_name": "35c3oio@freifunk.space", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 281, 
                                "guid": "e498a961-fe0d-5eb0-b12b-b462061f6edc", 
                                "logo": "", 
                                "date": "2018-12-29T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "CNPSQR", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/CNPSQR/", 
                                "title": "OIO Daily Standup day 3", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "Let's start into day 3", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6, 
                                        "code": "HFER8G", 
                                        "public_name": "Andreas Dorfer", 
                                        "biography": "https://forum.freifunk.net/u/adorfer/", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 239, 
                                "guid": "75a12486-070c-539d-b4a9-a9495c86b78d", 
                                "logo": "", 
                                "date": "2018-12-29T12:30:00+01:00", 
                                "start": "12:30", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "AVFU8A", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/AVFU8A/", 
                                "title": "Freifunk - The Next Generation", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "FF-TNG aims at regrowing a local FF based network community by -on the one hand- going back to the 90's \"B\u00fcrgernetze\" Idea of free communication with others, (focus on VOIP, SMS, Chat, mail) but also by enabling the individual community member to offer services to others and the world (e.g. via DNS zone delegation to individual nodes). For true autonomy we envisage to not only use WIFI and VPN links but also include LORA-based communication to connect local nodes for low bitrate communication (chat, sms).", 
                                "description": "A small group of FF-Munich people is currently developing a concept called FF-TNG \"Freifunk - The Next Generation\".\r\nIt came about after FFMUC had grown rapidly but a vast majority of FFMUC nodes is only using FF as a cheap pseudo-VPN gateway to the internet and after the rapid growth has put BATMAN to its limits making FF an only 'so-so' experience.\r\nThe concept aims at regrowing a local network community by -on the one hand- going back to the 90's \"B\u00fcrgernetze\" Idea of free communication with others, (e.g. VOIP, SMS, Chat) and -on the other hand- also by enabling the individual community member to offer services to others and the world (i.e. including DNS zone delegation to individual nodes and ipv6). For parts of the mesh we are looking at Babel. To get to a truly wide ranging individual network our concept includes LORA based communication for low-bitrate communication (Chat, SMS) to reach locations not reachable by simple 2.4 or 5GHz WIFI nodes.\r\nThe talk will be a ride through our first concept of how we think communication power can be put back to people so they can control their communication network. We hope for comments and input from the community - also of the kind \"das kannste schon so machen, aber dann isses halt kacke\"", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 37, 
                                        "code": "JXBP8Z", 
                                        "public_name": "Peter Buschkamp", 
                                        "biography": "After studying Physics in Bielefeld, I somehow thought getting a PhD in Astrophysics is fun. It was. In part. Now I build optical instruments that get to fly on satellites by day and sometimes stare at the sky by night. In between, I like to discuss and mull over implications of natural and computer sciences for society, hike the alps and help to build the Munich Freifunk wireless backbone.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 263, 
                                "guid": "d3e546e5-f917-51ab-ab5e-a88c89699fcc", 
                                "logo": "", 
                                "date": "2018-12-29T13:30:00+01:00", 
                                "start": "13:30", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "EGJW3F", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/EGJW3F/", 
                                "title": "Independent Solar Energy Mesh System", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "de", 
                                "abstract": "Das Independent Solar Energy Mesh System (ISEMS) kn\u00fcpft an den Freifunk-OpenMPP-Tracker an. Das System (Lua-Tool, Integration in Luci, Mikrocontroller-Firmware f\u00fcr den OpenMPPT, Web-App) soll es f\u00fcr Nicht-Experten einfacher machen, ihrer eigene drahtlosen Freifunk-Kommunikationsinfrastruktur unabh\u00e4ngig vom Stromnetz zu betreiben.", 
                                "description": "ISEMS \u00fcberwacht u.a. den Batteriestand, die Batterietemperatur und die Energiedaten des Moduls und bietet Strategien zum Energiesparen.\r\n\r\nMit der ISEMS-Software k\u00f6nnen Benutzer eine \u00dcbersicht einsehen, wie ihre Solarknoten arbeiten. Die Web-App zeigt eine \u00dcbersicht aller Knoten sowie eine Checkliste f\u00fcr die einzelnen Knoten. Wenn etwas aus dem Ruder l\u00e4uft, liefert sie Warnungen und Hinweise zur Fehlerbehebung.\r\n\r\nDauer: 20 Minuten f\u00fcr unsere Pr\u00e4sentation mit 10 Minuten f\u00fcr Q + A\r\n\r\nZus\u00e4tzliche Infos / Links / Referenzen:\r\n\r\nhttp://isems.de\r\nhttps://www.youtube.com/watch?v=BxFpY2tsPtU\r\nhttps://wiki.freifunk.net/Freifunk-MPP-Tracker", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 57, 
                                        "code": "HZ9WHF", 
                                        "public_name": "Elektra", 
                                        "biography": "Free wireless networks since 2001\r\nFreifunk since 2003", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 291, 
                                "guid": "96770b24-6aa8-53b1-9766-cc72e2e179c1", 
                                "logo": "", 
                                "date": "2018-12-29T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "Q7XT7M", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/Q7XT7M/", 
                                "title": "St\u00f6rerhaftung: Aktuelles aus der juristschen Welt", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "de", 
                                "abstract": "Bea gibt einen \u00dcberblick \u00fcber den aktuellen Stand zur St\u00f6rerhaftung, wie es den Abmahnungen geht und was uns der Gesetzgeber neues bietet.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 75, 
                                        "code": "UEK7FN", 
                                        "public_name": "Bea Hubrig", 
                                        "biography": ".", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 266, 
                                "guid": "1535b9d7-2182-53bb-b00d-4697c83bb5fc", 
                                "logo": "", 
                                "date": "2018-12-29T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "WCXEXU", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WCXEXU/", 
                                "title": "Seenotrettung und humanit\u00e4re Hilfe - was war, was ist, was wird? Kriminalisierung und der Ausblick auf 2019", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "de", 
                                "abstract": "Die andauernde Kriminalisierung humanit\u00e4rer Hilfe hat auch in diesem Jahr unsere Arbeit massiv erschwert, Menschenleben gekostet und die europ\u00e4ische Abschottungspolitik vorangetrieben. In diesem Talk geben wir einen \u00dcberblick dar\u00fcber, welche Auswirkungen die Kriminalisierung humanit\u00e4rer Hilfe haben kann und was im kommenden Jahr zu erwarten ist.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 55, 
                                        "code": "NFL8CT", 
                                        "public_name": "just humans", 
                                        "biography": "Wir sind eine Gruppe politischer und humanit\u00e4rer Aktivist*innen aus verschiedenen Organisationen.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 274, 
                                "guid": "175f6e41-1cf4-5733-b656-5c990453fe2c", 
                                "logo": "", 
                                "date": "2018-12-29T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "00:50", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "UFZYAS", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/UFZYAS/", 
                                "title": "F-Droid:Pimp your Android(-fork) with the best Free Software apps", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "en", 
                                "abstract": "After a short introduction about software freedom on Android and Custom ROMs, I will demonstrate the Free-Software-App-Repository \"F-Droid\" with its anarchic and anti-censorship features. But as F-Droid offers you access to hundreds of Free-Software-apps and the sheer amount can be overwhelming in the beginning, in a next step I will also come up with the 10 or so most important apps (IMHO!).", 
                                "description": "F-Droid is a Free-Software-App-only repository for Android systems and every Android-based fork and a powerful client that is designed to be resilient against surveillance and censorship. For its competitive character, F-Droid is not available via other \"app stores\" (like Google Play). You have to download it via your browser once but then it is easy to install and easy to use - and without the need for any account!\r\n\r\nOnce installed, F-Droid offers you access to hundreds of Free-Software-apps in compiled form and their sources. It also allows you to share (your) apps in mulitple ways, including offline methods and via onion repositories. You can add your own Free-Software-project to the official F-Droid catalogue or even set-up your own repositories and offer access via F-Droid.\r\n\r\nUnfortunately, F-Droid misses any kind of rating system, so the sheer amount of available Free-Software-apps can be overwhelming in the beginning. So, after a short introduction about software freedom on Android and Custom ROMs, I will demonstrate F-Droid with its anarchic and anti-censorship features. Next, I will come up with the 10 or so most important apps (IMHO!).\r\n\r\n**Update:** [Slides by Erik Albers, CC-BY-SA](https://web.3rik.cc/Nextcloud13/index.php/s/zRqYoA3TQb97mrP)", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 89, 
                                        "code": "AB9QAQ", 
                                        "public_name": "Erik Albers", 
                                        "biography": "Erik Albers is communication and programme manager for the Free Software Foundation Europe and engages since many years for users' and software freedom. Erik regularly publishes articles about diverse aspects of Free Software on different channels and occasionally writes on Netzpolitik.org.  In his spare time, Erik researches about digital sustainability with a special focus on sustainability of an by software as well as therein implied dependencies or solutions.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 233, 
                                "guid": "465d4b06-089c-571d-af98-5d3c87cf53a3", 
                                "logo": "", 
                                "date": "2018-12-29T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "FS7D9L", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/FS7D9L/", 
                                "title": "Vom eingestaubten Teleskop zum High Tech Lieblingsteleskop", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "de", 
                                "abstract": "3D-gedruckte Open Source GOTO Steuerung f\u00fcr 0815 Billig Teleskope, oder wer es lieber wissenschaftlich mag die bt\u00b3s Open Source und Open Hardware Steuerung zum nachbauen", 
                                "description": "Open Hardware GOTO Steuerung f\u00fcr Low Budget Teleskope selber bauen. Erfahrungsbericht und Live Demonstration.\r\n\r\nVorstellen der 3D gedruckten Open Hardware GOTO Steuerung f\u00fcr Teleskope (Entwickelt von Roman Hujer).\r\n\r\nTechnische Details zur Hardware sowie Quellen Empfehlungen zum Nachbau. Konfiguration vorstellen f\u00fcr die GOTO Steuerung (Firmware) und Schnittstellen Konfiguration in Stellarium.\r\n\r\nStellarium Konfiguration detailliert f\u00fcr GOTO Steuerung, GPS Daten via GPS/Glonas USB Stick einpflegen und Sternen und Satelliten Datenbank Repositories aktivieren und erweitern.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 28, 
                                        "code": "K93XDG", 
                                        "public_name": "h3rb3rn", 
                                        "biography": "https://hackover.de/fahrplan/speakers/3958.html", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 234, 
                                "guid": "21ff694c-e8f9-5aed-94bc-0efa78f93132", 
                                "logo": "", 
                                "date": "2018-12-29T18:30:00+01:00", 
                                "start": "18:30", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "WA38FQ", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WA38FQ/", 
                                "title": "Freifunkinstallationen in Fl\u00fcchtlingsheimen - Erfahrungsbericht, Empfehlungen", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "de", 
                                "abstract": "Am Beispiel einiger Freifunkinstallationen in Fl\u00fcchtlingsunterk\u00fcnften in M\u00fcnchen wird anhand von Best Practices beschrieben, wie am besten vorzugehen ist. Budget, Ansprache der Verantwortlichen, technische H\u00fcrden, Umsetzung, Planung, R\u00fcckbau.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 30, 
                                        "code": "X3XLVM", 
                                        "public_name": "pkoerner81929", 
                                        "biography": "Freifunker aus Leidenschaft.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 235, 
                                "guid": "8cde9720-65a3-5463-b9e8-aa8bfb6416b4", 
                                "logo": "", 
                                "date": "2018-12-29T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "00:55", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "QHXBFG", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/QHXBFG/", 
                                "title": "State of the InterNAT - Freifunk Rheinland Backbone Update", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 50min total (etwa 15min  Q&A)", 
                                "language": "de", 
                                "abstract": "Was war, was ist, was wird - ein \u00dcberblick \u00fcber die Events der letzten Zeit und unsere Pl\u00e4ne f\u00fcr mehr Selbstverwaltung", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 31, 
                                        "code": "LLZPXX", 
                                        "public_name": "Maximilian Wilhelm", 
                                        "biography": "* Barbarossa\r\n * Kevin\r\n * Lars\r\n * Takt\r\n * Thomas", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 246, 
                                "guid": "0f38a37f-f2fe-5a70-9640-2614c3c9e050", 
                                "logo": "", 
                                "date": "2018-12-29T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "3ME8XJ", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/3ME8XJ/", 
                                "title": "10 Tops & Flops f\u00fcr den erfolgreichen Aufbau einer Community wie Freifunk M\u00fcnchen", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "de", 
                                "abstract": "Freifunk M\u00fcnchen wird getrieben vom Freie Netze M\u00fcnchen e.V.. Jeder Verein hat H\u00f6hen und Tiefen. Um ein stabiles Team zu halten sind einige Basics notwendig.", 
                                "description": "1. Wir reden \u00fcber die Gr\u00f6\u00dften Erfolge.\r\n2. \u00dcber die Durststrecken ... ohne Admins.\r\n3. Politik die mal will oder nicht in M\u00fcnchen und Bayern.\r\n4. NixOS ist genial aber kaum einer kann es.\r\n5. Segmentierung = Fluch oder Segen?\r\n6. Warum traut sich keiner an Babel?\r\n7. Virtualisierung Proxmox oder OpenNebula?\r\nFragen....", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 44, 
                                        "code": "9SNQSH", 
                                        "public_name": "Daniel Fussy", 
                                        "biography": "Freifunk M\u00fcnchen", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 299, 
                                "guid": "bde24074-90b6-511b-8fd8-588149529d8f", 
                                "logo": "", 
                                "date": "2018-12-29T21:30:00+01:00", 
                                "start": "21:30", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "ZFQCBB", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/ZFQCBB/", 
                                "title": "Mathematische Modellierung informatischer Probleme", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "de", 
                                "abstract": "Der Vortrag soll sich haupts\u00e4chlich darauf beziehen, wie Mathematik bei der L\u00f6sung von informationstechischen Problemen helfen kann, wobei M\u00f6glichkeiten und Probleme aufgezeigt werden sollen.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 78, 
                                        "code": "8YLAG3", 
                                        "public_name": "Lukas Schneider", 
                                        "biography": "* Sch\u00fcler am ASGspez in Erfurt\r\n* BwInf-Teilnehmer\r\n* Gro\u00dfes Interesse an Politik\r\n* Und an Informatik :-D", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 314, 
                                "guid": "fef79e66-cab6-5fc4-b31e-dc802c46f277", 
                                "logo": "", 
                                "date": "2018-12-29T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "01:30", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "QAS33L", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/QAS33L/", 
                                "title": "Schwarze L\u00f6cher f\u00fcr blutige Anf\u00e4nger", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 80min total (etwa 30min  Q&A)", 
                                "language": "de", 
                                "abstract": "Albert Einstein hat sie vorhergesagt, bis in die 90er hinein war ihre Existenz heftig umstritten - die vielleicht verr\u00fccktesten Dinger im Universum: Schwarze L\u00f6cher.", 
                                "description": "Eigentlich d\u00fcrften Schwarze L\u00f6cher nicht existieren. Wie kann etwas \"unendliche Dichte\" haben, \"unendlich klein\" sein. Und wenn nichts, aber auch gar nichts ein schwarzes Loch verlassen kann, wie kann dann die Gravitation das schwarze Loch verlassen? Und was passiert mit der Zeit in der N\u00e4he schwarzer L\u00f6cher, bleibt die da wirklich stehen? Und woher wissen wir, dass sie wirklich existieren? In Schwarzen L\u00f6chern krachen zwei unvereinbare Theorien aufeinander, die Quantenphysik und die Relativit\u00e4tstheorie.  \r\nWir besch\u00e4ftigen uns mit jeder Menge Fragen an den Grenzen der Physik... und manchmal ein wenig dar\u00fcber hinaus.\r\n\r\nVorkenntnisse sind nicht erforderlich.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 99, 
                                        "code": "9ZUND7", 
                                        "public_name": "Steini", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 302, 
                                "guid": "076b0e7a-4d97-5958-8e02-740f6d8c6456", 
                                "logo": "", 
                                "date": "2018-12-30T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "01:00", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "UVGYXJ", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/UVGYXJ/", 
                                "title": "Iuventa counter-investigation", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Movie with Q&A", 
                                "language": "en", 
                                "abstract": "Documentation and Q&A with crew members of Iuventa and other SAR ships", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 91, 
                                        "code": "UPW7QV", 
                                        "public_name": "Solidarity at Sea", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Workshop-Domo": [
                            {
                                "id": 316, 
                                "guid": "85587d11-2426-5b34-b8cf-7f2a020d4517", 
                                "logo": "", 
                                "date": "2018-12-29T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "02:00", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "AQ9TUQ", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/AQ9TUQ/", 
                                "title": "SatNOGS meeting (TCA)", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 110min", 
                                "language": "en", 
                                "abstract": "...", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 100, 
                                        "code": "7VMKDP", 
                                        "public_name": "bastla", 
                                        "biography": "Sebastian Lange (DL7BST), c3space, SatNOGS, AfuTUB/DK0TU", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 309, 
                                "guid": "b2ec2d49-e698-5858-be0a-2513b4849a01", 
                                "logo": "", 
                                "date": "2018-12-29T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "00:45", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "T8NVCS", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/T8NVCS/", 
                                "title": "Careables Open Source Hardware in Health+Care [Meetup]", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 45min", 
                                "language": "en", 
                                "abstract": "Meetup", 
                                "description": "Calling all hackers, designers, makers, carers, and healthcare professionals!\r\n\r\nWe want to discuss: What are challenges you face every day using standard tools for health and wellbeing? Do you have an idea that makes everyday life easier? How could you use your existing hackerspace to foster exchange and collaboration in health and care?\r\n\r\nThrough Careables, maker and designer collaborate with patients and healthcare professionals to create personalized solutions and open source knowledge that will improve the lives of many patients and professionals.\r\n\r\nAccessible, comprehensive and easy to use open source hardware are being documented, collected and shared through the platform Careables.org. This platform is currently being launched and will function as repository for well documented open hardware projects. It offers many different communities a place to connect and exchange knowledge, needs and co-create solutions.\r\n\r\nIt's easy to think of open hardware that make a difference in people's lives. An example of this is OPEN LIGHTS. This project offers people with wheelchairs an adjustable wheelchair specific light that makes them better visible at night and that can be built with most common DIY technologies.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 96, 
                                        "code": "P3GLDY", 
                                        "public_name": "Sandra GIG", 
                                        "biography": "tl;dr: GIG is the global network of social and technological innovators. #wearegig\r\n\r\nGlobal Innovation Gathering (GIG) is a vibrant, diverse community of innovation hubs, makerspaces, hackerspaces and other grassroot innovation community spaces and initiatives as well as individual innovators, makers, technologists and changemakers. GIG is pursuing a new vision for global cooperation based on equality, openness and sharing. We aim to enable more diversity in the production of technology, and global innovation processes and support open and sustainable solutions developed by grassroot innovators. With strong roots in the global south, we share, collaborate and work together globally. GIG provides a platform for meaningful exchange by fostering knowledge exchange and collaboration between its members.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 318, 
                                "guid": "ae8d646b-83a8-5327-b4bd-d3dab9f544d8", 
                                "logo": "", 
                                "date": "2018-12-29T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "00:45", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "PXYMLE", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/PXYMLE/", 
                                "title": "Bits & B\u00e4ume @ Congress : weiter zusammen(-)wachsen", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 45min", 
                                "language": "de", 
                                "abstract": "Bei der Konferenz Bits & B\u00e4ume haben im November Aktivist*innen unter\r\nanderem aus der Hacker- und \u00d6koszene \u00fcber ihre Ziele, Utopien und\r\nStrategien diskutiert. Entstanden sind nicht nur neue Verbindungen\r\nsondern auch elf Forderungen an die Politik. Wir wollen die Idee und\r\nErgebnisse der Konferenz vorstellen und mit euch gemeinsam weiterspinnen.\r\n\r\nhttps://bits-und-baeume.org\r\nhttps://bits-und-baeume.org/forderungen\r\nhttps://media.ccc.de/v/bub2018-246-eine_andere_digitalisierung_ist_moglich\r\n(ab 31:00)", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 101, 
                                        "code": "RADWLR", 
                                        "public_name": "Nico", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 286, 
                                "guid": "e2492352-efbd-5b2c-88e6-29f890fc148c", 
                                "logo": "", 
                                "date": "2018-12-29T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "00:45", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "KSDGVM", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/KSDGVM/", 
                                "title": "Freifunk-Workshop: Community-Vernetzung", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 45min", 
                                "language": "de", 
                                "abstract": "Das \"Freifunk-Vernetzungsmumble\" ist ziemlich tot. Warum? \r\nM\u00f6glichkeiten der Zusammenarbeit auf Community-Ebene?", 
                                "description": "Es soll hier nicht die x-te Auflage von \"warum das ICVPN in Zeiten von Public IPv6 niemand mehr will\" und \"warum es keine internen Dienste gibt\" sein. \r\nWir sehen deutlich mehr gr\u00f6\u00dfere \"Festivals\", das WCW wird gr\u00f6\u00dfer obwohl das Leben in vielen lokalen Communities eher weniger wird. Welche Inhaltliche Zusammenarbeit k\u00f6nnen wir ganz konkret selbst anbieten und wie k\u00f6nnte man es organsiieren, ohne eine Tooldebatte um \"Mailingsliste vs. Slack vs Wiki (welches eigentlich?)\" zu er\u00f6ffnen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6, 
                                        "code": "HFER8G", 
                                        "public_name": "Andreas Dorfer", 
                                        "biography": "https://forum.freifunk.net/u/adorfer/", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 311, 
                                "guid": "1e3b8de7-2051-546b-8a89-b5473ec6ac99", 
                                "logo": "", 
                                "date": "2018-12-29T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "01:20", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "N7NADC", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/N7NADC/", 
                                "title": "Next Generation FOSS Lightning Control - Brainstorming & Kick-Off", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 80min", 
                                "language": "en", 
                                "abstract": "Die bisherigen L\u00f6sungen f\u00fcr Lichtsteuerung sind in der Regel teuer oder sehr kompliziert/nutzerunfreundlich. Ziel ist es, eine neue Lichtsteuerung zu entwickeln, die auf FOSS-Basis ein gutes Werkzeug f\u00fcr kreative wird.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 12, 
                                        "code": "SZWSUS", 
                                        "public_name": "margau", 
                                        "biography": "Student der Informationstechnik, Freifunk Stuttgart & begeisterter IoT-Bastler.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 254, 
                                "guid": "be48f5dc-8df6-5917-ba56-3e2162202057", 
                                "logo": "", 
                                "date": "2018-12-29T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "00:45", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "WXUJ8N", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WXUJ8N/", 
                                "title": "Aufbau von Freifunk in Kleingartenanlagen", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 45min", 
                                "language": "de", 
                                "abstract": "Diskussionsrunde auf Basis einer Problemstellung (Kartendaten zu einer Anlage) ohne eine L\u00f6sung einzubringen.\r\nZiel ist: Erfahrungen einzusammeln und auszutauschen, Hinweise und Tips zu bekommen und auszutauschen.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 48, 
                                        "code": "NFMZXP", 
                                        "public_name": "Richard", 
                                        "biography": "Softwareentwickler mit Garten", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "WikiPakaWG Esszimmer": [
                            {
                                "id": 522, 
                                "guid": "14016199-6d4b-5f13-8b2f-a057afeb3abd", 
                                "logo": "", 
                                "date": "2018-12-29T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:45", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "DBVJK7", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/DBVJK7/", 
                                "title": "AI in Wikipedia", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "de", 
                                "abstract": "A general overview and report on how Wikipedia uses artificial intelligence to improve its efficiency", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7, 
                                        "code": "8GDPPA", 
                                        "public_name": "Amir", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 523, 
                                "guid": "0967f643-013b-57cc-870b-f2d4dfebc442", 
                                "logo": "", 
                                "date": "2018-12-29T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "XRQNHR", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/XRQNHR/", 
                                "title": "Building a Wikidata tool", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "de", 
                                "abstract": "Much of the work in the Wikimedia universe, and especially on Wikidata, is done using external tools. Here you\u2019ll see how you can build your own! (See also the [behind-the-scenes blog post](https://lucaswerkmeister.de/posts/2019/01/04/speedpatrolling/).)", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6, 
                                        "code": "RE9MSE", 
                                        "public_name": "Lucas", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 540, 
                                "guid": "da94b720-9118-513f-885e-3312c033dfd0", 
                                "logo": "", 
                                "date": "2018-12-29T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "LEFJBC", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/LEFJBC/", 
                                "title": "Squarelet - Kooperativ Lernen mit Open Source-Pinboards", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop mit Gruppentischen", 
                                "language": "de", 
                                "abstract": "Wir entwickeln [squarelet.org](https://www.squarelet.org), ein Open-Source-Pinboard f\u00fcr kooperatives Lernen und Arbeiten. In dem Workshop stellen wir die Alpha-Version vor, erstellen Use Cases und freuen uns \u00fcber eure Ideen und Anregungen. Agenda: https://hackmd.okfn.de/0Q4h28VDRym0vKKAm7GRxQ#", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 43, 
                                        "code": "U9QVUW", 
                                        "public_name": "Markus", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 44, 
                                        "code": "EVCNRE", 
                                        "public_name": "mavo", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 45, 
                                        "code": "XHBSU3", 
                                        "public_name": "Edgar", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 542, 
                                "guid": "5dcb6c1b-6016-58cf-820a-534f47b9a778", 
                                "logo": "", 
                                "date": "2018-12-29T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "MJAKJY", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/MJAKJY/", 
                                "title": "Hacks/Hackers Meet-Up", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "\u201cHacks\u201d (journalists) and \u201chackers\u201d (technologists) work together to create physical and digital spaces for exploring new ways to tell stories.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 47, 
                                        "code": "ZV98N9", 
                                        "public_name": "fex", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 537, 
                                "guid": "faa0618b-14fe-5542-b160-d6591468a897", 
                                "logo": "", 
                                "date": "2018-12-29T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "UYWYWZ", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/UYWYWZ/", 
                                "title": "Jugend hackt Lightning Talks", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Lightning Talk", 
                                "language": "de", 
                                "abstract": "Android entgooglen (Max)\r\nWarum ich 1 Mozillian wurde (Jens)\r\nAndroid Entwicklung - Nativ vs nicht-Nativ (Abraham)\r\nArduino ohne Arduino \u2013 bau nur den Microcontroller ein! (noniq)\r\nAmateurfunk (Janek G\u00e0l und Noah Rullmann)", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5, 
                                        "code": "BWRH7E", 
                                        "public_name": "Daniel", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 526, 
                                "guid": "7956605c-adae-5563-ab8c-c97b6781fefa", 
                                "logo": "", 
                                "date": "2018-12-29T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "X7FPWS", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/X7FPWS/", 
                                "title": "Alles was du jemals zu Wikipedia wissen wolltest", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "de", 
                                "abstract": "Du kennst Wikipedia. Gibt es ja auch seit 17 Jahren. Du nutzt Wikipedia regelm\u00e4\u00dfig und wei\u00dft alles dar\u00fcber. Aber wer zur H\u00f6lle sind Wikimedia, MediaWiki, Wikidata? Was machen die? Was k\u00f6nnen sie f\u00fcr dich tun? Menschen, die f\u00fcr Wikipedia Artikel oder Code schreiben, sich politisch oder kulturell oder f\u00fcr die Freiwilligen der Wikipedia einsetzen, k\u00f6nnen dir in dieser Session deine Fragen beantworten.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 21, 
                                        "code": "7TBZJF", 
                                        "public_name": "Verena", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 527, 
                                "guid": "9a59a736-ef6f-57ec-9261-e632cac8b51c", 
                                "logo": "", 
                                "date": "2018-12-29T21:30:00+01:00", 
                                "start": "21:30", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "ZKJDBE", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/ZKJDBE/", 
                                "title": "Digital what? Wie man Bildung nicht digitalisieren sollte", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "de", 
                                "abstract": "Regierungen und politische Entscheidungstragende setzen auf die Forcierung und den Ausbau von Plattformen, um Bildung \"endlich\" zu digitalisieren. Doch die Umsetzung widerspricht dem Ziel, Menschen dazu zu bef\u00e4higen, sich im digitalen Raum sicher und m\u00fcndig zu bewegen.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 22, 
                                        "code": "WRQU7K", 
                                        "public_name": "Dominik Theis", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 34, 
                                        "code": "9FJGJ3", 
                                        "public_name": "Anja Lorenz", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 35, 
                                        "code": "GJBVT8", 
                                        "public_name": "Jelisaweta Kamm", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 528, 
                                "guid": "38b1c87c-d474-5d11-8559-df4a1e18b507", 
                                "logo": "", 
                                "date": "2018-12-29T23:00:00+01:00", 
                                "start": "23:00", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "7CHZ9V", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/7CHZ9V/", 
                                "title": "Operation Mindfuck #2 - Computer, Kunst und Kuriosit\u00e4ten", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "de", 
                                "abstract": "Eine bunter Blumenstrau\u00df von Nerdsniping-Themen!", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 2, 
                                        "code": "RBEKZW", 
                                        "public_name": "bleeptrack", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 23, 
                                        "code": "39LEJR", 
                                        "public_name": "blinry", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "WikiPakaWG K\u00fcche": [
                            {
                                "id": 505, 
                                "guid": "e6151f47-7ed3-5772-bb7f-201102afd00f", 
                                "logo": "", 
                                "date": "2018-12-29T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:15", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "BBDTHN", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/BBDTHN/", 
                                "title": "Orgameeting Tag 3", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 4, 
                                        "code": "33UT8A", 
                                        "public_name": "WikiPaka Orga", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 524, 
                                "guid": "7527606f-ac7f-58c3-a384-eb86cdc93d90", 
                                "logo": "", 
                                "date": "2018-12-29T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "VQP8QS", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/VQP8QS/", 
                                "title": "Wikidata: help with building tools", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop mit Gruppentischen", 
                                "language": "en", 
                                "abstract": "Additional space to help with building tools, if wanted.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 6, 
                                        "code": "RE9MSE", 
                                        "public_name": "Lucas", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 533, 
                                "guid": "6f6b4805-90f8-5c54-bfd7-2ba62839419b", 
                                "logo": "", 
                                "date": "2018-12-29T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "B3V7LE", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/B3V7LE/", 
                                "title": "\ud83c\udf82\ud83c\udf89", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "\ud83c\udf89", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 28, 
                                        "code": "7AGQRG", 
                                        "public_name": "Ulrike", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 541, 
                                "guid": "184234c0-f856-58ef-9d1c-a60eaad3b007", 
                                "logo": "", 
                                "date": "2018-12-29T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "FDHUCR", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/FDHUCR/", 
                                "title": "Zwischenstand der NSU-Aufkl\u00e4rung", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "de", 
                                "abstract": "Im NSU-Komplex arbeiten aktuell auf juristischer sowie ausser- wie innerparlamentarischer Ebene verschiedene Akteure an der Aufkl\u00e4rung. Wir wollen uns \u00fcber den aktuellen Stand und weitere Schritte verst\u00e4ndigen. Ziel ist eine bessere Vernetzung und aufzuzeigen, wo auch das Chaos-Umfeld bei der NSU-Aufkl\u00e4rung helfen kann.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 46, 
                                        "code": "HVP8H3", 
                                        "public_name": "noname", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 48, 
                                        "code": "G3E7Q3", 
                                        "public_name": "Caro (NSU-Watch)", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "Discodrama": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10170.html", 
                                "id": 10170, 
                                "guid": "32c6829d-8f43-4c9a-8798-824f914f7934", 
                                "logo": null, 
                                "date": "2018-12-29T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "03:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10170-fairy_dust_-_day3", 
                                "title": "Fairy Dust - Day3", 
                                "subtitle": "Rocket Away", 
                                "track": "Music", 
                                "type": "other", 
                                "language": "en", 
                                "abstract": "Modify the Fairy Dust", 
                                "description": "After standing in the cold rain and snow for too long, the Fairy Dust will find its place this time in the middle of the crowd at hall 5. A video installation will take place on the surface. This is a call for people, who can handle c4d files and have the bravery to put their vision on the symbol of the congress.\r\n\r\nThe file attached to this event contains all information about the object, as well the position and lenses of the 4 projectors. Fell free to develop whatever you like. Keep in mind that the surface is very glossy and actually eats the light away. Rendered video best with HAP or MP4.\r\n\r\nIn the hours between 2 pm and 5 pm on the days of the congress, there will be access to the video system, if you come around and have a device with HDMI out.  \r\n\r\nEnjoy!\r\n\r\nPowered by PENTAKLON und Rico Rose \r\n\r\nContact: privatlehrer[at]gmail[:]com", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/634/original/35C3-template-ROCKET.c4d?1545876712", 
                                        "title": "35C3-template-ROCKET.c4d"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10048.html", 
                                "id": 10048, 
                                "guid": "217f7d18-c837-4e12-aac4-2cf826730252", 
                                "logo": "/system/events/logos/000/010/048/large/0007254766_10.jpg?1545415840", 
                                "date": "2018-12-29T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10048-demoscene_time_machine", 
                                "title": "Demoscene Time Machine", 
                                "subtitle": "Melodic bleepy & fakebit music", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Demoscene Time Machine (aka David Whiting) has been making melodic bleepy music since 2008. Inspired by old SNES soundtracks, DOS demos and the ever-versatile range of the PC speaker, he\u2019s now in full force producing heavy dancefloor-friendly fakebit music with catchy melodies and infectious beats.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://demoscenetimemachine.com/", 
                                        "title": "https://demoscenetimemachine.com/"
                                    }, 
                                    {
                                        "url": "http://www.thewit.ch", 
                                        "title": "http://www.thewit.ch"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/demoscenetimemachine", 
                                        "title": "https://soundcloud.com/demoscenetimemachine"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/vitling", 
                                        "title": "https://soundcloud.com/vitling"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/davw", 
                                        "title": "https://soundcloud.com/davw"
                                    }, 
                                    {
                                        "url": "http://www.thewit.ch/portfolio/", 
                                        "title": "http://www.thewit.ch/portfolio/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10042.html", 
                                "id": 10042, 
                                "guid": "b1b875a6-812f-4e6c-86aa-40fff58ff790", 
                                "logo": "/system/events/logos/000/010/042/large/avatars-000373881752-5r40p5-t500x500.jpg?1545415685", 
                                "date": "2018-12-29T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10042-viktor_talking_machine", 
                                "title": "Viktor Talking Machine", 
                                "subtitle": "House", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Digital is death.\r\n\r\nShortly before the Tibetan Highlands, a small clearing, dressed with black fern which sways to the rhythm of the sun, extends itself. Here you can meet the inhabitants of a sleepy coastal village, who had found the remains of a huge comet years ago. A viscous dark mass that they turned immediately into brownies with ice cream and pickles. The energy that was gained from the process drives huge machines, planting anemones and helps the bees with their mating rituals. Every 1210 years when the planets order in a circular orbit, a child is born into this magical world, who comes to change everything.", 
                                "description": "Viktor grew up in a musical family on the outskirts of a small mountain village. Early on, he discovered his love for nature and analogue soundscapes. He devoured all the sounds of nature and the vastness of the Antarctic wilderness and distilled from them his deep sound which accompanies him until today.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/viktor-talking-machine", 
                                        "title": "https://soundcloud.com/viktor-talking-machine"
                                    }, 
                                    {
                                        "url": "https://www.residentadvisor.net/dj/viktortalkingmachine", 
                                        "title": "https://www.residentadvisor.net/dj/viktortalkingmachine"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10052.html", 
                                "id": 10052, 
                                "guid": "877f5b00-c744-4c27-930c-cfa9e4e26bbc", 
                                "logo": "/system/events/logos/000/010/052/large/avatars-000410038332-aohj1k-t500x500.jpg?1545416337", 
                                "date": "2018-12-29T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10052-maurizio_schmitz", 
                                "title": " Maurizio Schmitz", 
                                "subtitle": "Techno/House", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Maurizio Schmitz drives his own bus, dividing his diary effortlessly between work and play and playing.\r\n\r\nHalf Italian, half German and his is a dizzying ongoing musical journey that flies economy and business all at the same time. Maurizio exploits these contrasts, wearing pinstripes or pyjamas or both - he jams.\r\n\r\nWe are talking about psychedelic house here. Socks off and sensual. It works on the big stage, it works in the club and it washes all over an after hour. This sound did not happen by accident.\r\nIn 1990 scrambling around some old Thorens decks in a club his mother worked in Maurizio was scooping up all the vinyl lost from the night before \u2013 the first Schmitz mixtapes (which actually were not mixed) saw the light of day at this time. Many were to follow and these valuable suckers live amongst 11,000 pieces of vinyl collected and stroked over the years.\r\n\r\nWhen German techno was dynamite, changing the rules and ushering in a whole new world of electronic music Maurizio was not only there \u2013 he was smack in the middle of it.\r\n\r\nBonn, Hamburg, Frankfurt, Munich. From the infamous \u201cLabor\u201d club to a 10 years residency at 'FrequenzBerater' to Frankfurt and \u201cU60311\u201d. Many many more but maybe two things stand out and tell you more. Spaldingstreet 43 in Hamburg, the original flat sharing rave. Maurizio presided over 7 years of lovely madness. Today you could create a major art/music festival just from the people who crashed out on the sofas there. Then the tour de force. His very own Mauromusica night founded in Bonn 2004 in the beautiful \u201cRheingarten\u201d. An octagon shaped glass pavilion. Promoter, resident DJ and mum on the door. Another 10 years.\r\n\r\nNo need to name names, somewhere in the above paragraph they all passed through.\r\n\r\nPerhaps one name, because here comes the other Maurizio Schmitz.\r\nIn a 1994 after hour set in Munich, \u201cPulvertum\u201d it was called, the raver Maurizio noticed Sven Vath 2 metres high in a tree mid set. You don\u2019t forget stuff like that.\r\nTheir paths were never going to stop crossing.\r\n\r\nEvent manager, promoter, booker and for some time now the right hand man and frequent support act for the immortal legendary magician Sven Vath. It is a relationship that is not stopping any time soon.\r\n\r\nSo, to summarise, Sicilan passion met German techno and spat out the Dj Maurizio Schmitz.\r\n\r\n(2018, Words by Andrew Gillings)", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/mauromusica/", 
                                        "title": "https://soundcloud.com/mauromusica/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10075.html", 
                                "id": 10075, 
                                "guid": "1df771b7-17cf-4c3b-9472-251c660f0ef4", 
                                "logo": "/system/events/logos/000/010/075/large/loungejpg?1546105301", 
                                "date": "2018-12-29T23:00:00+01:00", 
                                "start": "23:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10075-marko_morelle", 
                                "title": "Marko Morelle", 
                                "subtitle": "Techno/", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "from the family", 
                                "description": "from the family", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/chaishop-com/dj-marco-morelle-germany", 
                                        "title": "https://soundcloud.com/chaishop-com/dj-marco-morelle-germany"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10044.html", 
                                "id": 10044, 
                                "guid": "2cb3722c-ea32-4f51-8b06-b2c190fe87e9", 
                                "logo": "/system/events/logos/000/010/044/large/tn04_104__andreas04.jpg?1545417072", 
                                "date": "2018-12-30T01:00:00+01:00", 
                                "start": "01:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10044-der_dritte_raum", 
                                "title": "Der Dritte Raum", 
                                "subtitle": "Techno/Trance", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Andreas Kr\u00fcger, aka Der Dritte Raum, is the man behind some of the most stirring electronic music of the past twenty-five years. But he'd rather not talk about himself. \"The least important thing in all I do is myself,\" he says. \"It's about the music.\"", 
                                "description": "But of course there would be no music -- no epic anthems like \"Hale Bopp\" nor transcendent tunes like \"Electric Friends\" without his creativity, vision, and technical virtuosity which has been honed by his lifelong fascination with sound.\r\nThe son of musical parents, Andreas grew up immersed in music. He began to study the piano as a child but quickly tired of rigid instruction. He stopped taking lessons and instead played along to records by The Beatles and Pink Floyd, \"trying to understand how they made the songs.\"\r\nHis main love, though, was electronics and physics. \"I never thought I'd be a musician,\" he says with a chuckle. \"I was the boy who built my own circuits, my own AM radio.\"\r\nThis fascination with electronics helped spark his love for pioneering synth bands like Devo, Human League and Heaven 17. When a friend lent him a synthesizer, Andreas and his brother set it up in their basement, along with a drum machine and organ, and proceeded to \"make a lot of noise.\" He was studying physics at the time but music absorbed more and more of his energy.\r\nIn the early 90s he and a friend opened a \"freaky punk New Wave\" studio. Suddenly, being a professional musician or recording engineer seemed realistic. About the same time another life-changing experience occurred: Andreas started going to techno parties.\r\nFor the first time, he saw his two great loves, music and technology, wedded to create something unique. \"It was music without a standard arrangement, music without vocals,\" he explains. \"Our New Wave and EBM projects always had a standard intro, bridge, verses, etc. Techno was totally new.\"\r\nWith typical fervour, Andreas dropped his other projects to concentrate on making a \"really cool techno record\". Much to the delight of electronic music fans, he has been doing so, with surpassing brilliance, ever since.\r\nThe marriage of Andreas's deep musical background and peerless technical skills birthed a unique sound that runs like a high-tensile wire through his prolific output as Der Dritte Raum. In the course of a dozen albums and almost thirty records and EPs, Andreas has never lost his fascination with pushing the boundaries of melody and technology.\r\n\"Commercial music has a very narrow horizon,\" he says. \" It is important for me to make music that can be played with other tracks without copying other ideas or sounds. It is dangerous to maintain a unique direction but that is the basic idea of making art.\"\r\nCurrently, the artist is at work on multiple projects, including polishing a new techno album for release later this year, playing with a live band, remastering old Der Dritte Raum material, and taking his music to the masses with his DJ/live performance partner Ralf Uhrlandt. As Der Dritte Raum live, Andreas and Ralf have been pushing the boundaries of electronica since the early '90s. They bring the studio to life onstage with an array of computers, synths, desks and effects. \"The equipment keeps evolving but it's always about jamming with sounds,\" says Andreas.\r\nHowever far-flung his gigs, or wide-ranging his ideas, Andreas is grounded by a simple truth: \"I love music. Not just electronic music. All music.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/derdritteraum", 
                                        "title": "https://soundcloud.com/derdritteraum"
                                    }, 
                                    {
                                        "url": "http://www.der-dritte-raum.de/", 
                                        "title": "http://www.der-dritte-raum.de/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10076.html", 
                                "id": 10076, 
                                "guid": "ba07707c-a984-4ac5-b6f7-b947a44245b2", 
                                "logo": "/system/events/logos/000/010/076/large/31947322_1886358088061796_2297047130939850752_n.jpg?1545417368", 
                                "date": "2018-12-30T02:00:00+01:00", 
                                "start": "02:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10076-super_flu", 
                                "title": "Super Flu", 
                                "subtitle": "Progressive House", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Willkommen in einer Welt, in der knusprig gebackene Bassdrums den Ton angeben; in der Momratzn zu zwickenden Hihats zucken und dir Sprechblasen sympathische B\u00e4sse zuwinken! Du musst eine schwierige Entscheidung treffen? Super Flu empfehlen dir Doppelbr\u00f6tchen mit Knoblauch und 6-Minuten-Eiern! Dein Equipment ist Schrott? Vertrau auf dein Gef\u00fchl, kitzel das Maximale aus der alten Bude und quetsch Inspiration aus allem, das du in die Finger kriegst! Dir fehlen die Ideen? H\u00f6r auf deinen Papagei! Mach Urlaub und trink Bier. Probier, (wei\u00dft schon, was zu machen, was du sonst nie machen w\u00fcrdest). H\u00f6r Jazz. Bastel was aus lustigen D\u00f6nerbuden-Namen, exotischen Instrumenten und Kinderspielzeug. Mit deinem besten Kumpel und mindestens einem gemeinsamen Lieblingsb\u00e4cker, viel Herzblut und einem gro\u00dfen Traum dahinter kann dir nun nichts mehr passieren\u2026!", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://super-flu.de/", 
                                        "title": "http://super-flu.de/"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/super-flu-de", 
                                        "title": "https://soundcloud.com/super-flu-de"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10070.html", 
                                "id": 10070, 
                                "guid": "634362fa-d58b-4a76-bf26-5e763619c4f6", 
                                "logo": "/system/events/logos/000/010/070/large/avatars-000186202996-mb8pqe-t500x500.jpg?1545417580", 
                                "date": "2018-12-30T04:00:00+01:00", 
                                "start": "04:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10070-rk9", 
                                "title": "RK9", 
                                "subtitle": "Joeri Jungschlager, EDM/Drum&Bass/Breakcore", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "From reverbnation:\r\n\r\nRK9 is an allias for Joeri Jungschlager, he used to play in bands and compose music in gerne's like hardcore (punk), jazz, deathcore & mathcore. in 2012 he first released on his own behave a EP Liquid Mind Fucks/Push this party till dawn later on in 2013 his first own EP murder for reblogs which came out on 2C-Broadcast Recordings and in 2014 a fully 3DS produced single came out through bandcamp 'miss the sky' and later used in a full live set recording avaible through youtube. RK9 is a general work out of the idea of a hybrid between liquid drum & bass and breakcore. Allong the road the hybrid ellements changed from the orginal idea too hardcore drum & bass/breakcore with mathcore. Which have given endless suprises and elements too the act.\r\n\r\nWith support from around various scen\u00e9's and different labels doing VIP Remix for various Dubstep & DnB labels. And founded 2C-Broadcast together with the prototype being the only hard DnB label in the Hague but also made several appearnces at District 9, Langweiligkeit, Benchmark Sessions and the PRSPCT stage on Eendracht Festival (Rotterdam)\r\nHis productions since 2015 got several radio plays. And is played on the internet.\r\nAlso he made several podcasts in that year Satanicast for example.\r\n\r\nRK9 is the Allias for Joeri Jungschlager also known as the disturbing breakcore panda but that is just a scene name.\r\nHe was born in Drachten, Netherlands but now lives in Rotterdam.\r\n\r\n====\r\n\r\nFrom Soundcloud: \r\n\r\nStarted out pretty young in the squat scen\u00e9 around nintencore & breakcore but moved on to breakcore and jungle and a different allias in 2011 RK9 plays and produces a violent combination of Liquid Drum & Bass, Breakcore and crossbreed with support from around various scen\u00e9's and different labels doing VIP Remix for various Dubstep & DnB labels. And founded 2C-Broadcast together with the prototype being the only hard DnB label in the Hague but also made several appearnces at District 9, Langweiligkeit, Benchmark Sessions and the PRSPCT stage on Eendracht Festival (Rotterdam) His productions since 2015 got several radio plays. And is played on the internet. Also he made several podcasts in that year Satanicast for example.", 
                                "description": "RK9 is also a Developer of OpenDJ:\r\n(text from Github)\r\nOpen DJ or oDJ project is a project that aims to build a fully open source tabletop mediaplayer like pioneers X/CDJ or Denon SC5000 allowing DJ's to do more with their equipment than just DJ. The goal so far is to build 3 models one CDJ which contains CD/USB/SD card and ethernet/wifi link up connections, one XDJ which contains USB/SD, ethernet connections, wifi & LoRaWAN and a modular model which will start with an USB/SD but is expandable and get it's own development kit. Since this all can be quite complex and we have a tech community with more knowledge than just me, I want to build a community around this. This topic for a relatively simple device will be heavily cross domain. The goal is to provide an Open Source building block for smart clubs.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.reverbnation.com/rk9", 
                                        "title": "https://www.reverbnation.com/rk9"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/rk9_dnb", 
                                        "title": "https://soundcloud.com/rk9_dnb"
                                    }, 
                                    {
                                        "url": "https://github.com/sicarii-13/OpenDJ", 
                                        "title": "OpenDJ on Github "
                                    }, 
                                    {
                                        "url": "https://www.mixcloud.com/joeridamianjungschlager", 
                                        "title": "https://www.mixcloud.com/joeridamianjungschlager"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Shutter Island": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10149.html", 
                                "id": 10149, 
                                "guid": "fa17b7ce-6dcb-49e9-bfae-9d5d517b9ad7", 
                                "logo": null, 
                                "date": "2018-12-29T10:00:00+01:00", 
                                "start": "10:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10149-rudi_stoher", 
                                "title": "Rudi St\u00f6her", 
                                "subtitle": "Ask Ronny Kraftfuttermischwerk.", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/rudi-stoher/tracks", 
                                        "title": "https://soundcloud.com/rudi-stoher/tracks"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10150.html", 
                                "id": 10150, 
                                "guid": "fd7b283b-67f3-4554-b226-83db5a519a87", 
                                "logo": null, 
                                "date": "2018-12-29T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "03:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10150-patstyx", 
                                "title": "Patstyx", 
                                "subtitle": "Looking forward to Schuppi", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Patstyx aka Schuppi war schon Sysadmin als man noch beim Internet angerufen hat - er zog weg, nach Halle, in Congressn\u00e4he. Legte schon immer auf, macht Podcasts und Drum\u00b4n Bass Events und wir freuen uns auf Schuppi.\r\n\r\nPatstyx was already sysadmin when you called the Internet, by dialing a number on moms phone - he moved away, to Halle, near the congress. Allways deejayed, does podcasts and Drum\u00b4n Bass events and we are looking forward to Schuppi.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://hearthis.at/pat-styx/", 
                                        "title": "https://hearthis.at/pat-styx/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10151.html", 
                                "id": 10151, 
                                "guid": "8b678cb0-a364-41ce-8fb4-1d067168fde6", 
                                "logo": null, 
                                "date": "2018-12-29T15:00:00+01:00", 
                                "start": "15:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10151-e", 
                                "title": "e\u0308", 
                                "subtitle": "Legend AV-set", 
                                "track": "Music", 
                                "type": "performance", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://raum-e.com/", 
                                        "title": "http://raum-e.com/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10163.html", 
                                "id": 10163, 
                                "guid": "141a49b4-76a4-48e0-a86d-7c19e6a7821f", 
                                "logo": null, 
                                "date": "2018-12-29T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10163-umbaumusik", 
                                "title": "Umbaumusik", 
                                "subtitle": "Mr. G & Mr. Mo", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10152.html", 
                                "id": 10152, 
                                "guid": "3600a06a-6aae-49c3-95e3-da5bc6dd87f6", 
                                "logo": null, 
                                "date": "2018-12-29T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10152-eulberg_spock", 
                                "title": "Eulberg & Spock", 
                                "subtitle": "Fledermausmusik", 
                                "track": "Music", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Vortrag: Fledermaus Streaming Project\r\nNABU, CCC und Dominik Eulberg & DJ Spock\r\n\r\nDie Ger\u00e4usche der Flederm\u00e4use werden h\u00f6rbar in Musik umgewandelt und gestreamt.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10153.html", 
                                "id": 10153, 
                                "guid": "cb62321b-fd39-4b11-8668-1384f661a076", 
                                "logo": null, 
                                "date": "2018-12-29T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "03:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10153-kfmw", 
                                "title": "kfmw", 
                                "subtitle": "Irgendwelche Fragen?", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Das Kraftfuttermischwerk. Srlsy? Ihr kennt Ronny nich? Bester Mumpelkollege, Chillflaggenhochhalter, hat auch ein tollen Myspaceaccount.\r\n\r\nDas Kraftfuttermischwerk. Srlsy? You don't know Ronny? Best mate, chilloutmusic clockstone, also has a great myspaceaccount.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.kraftfuttermischwerk.de/blogg/", 
                                        "title": "https://www.kraftfuttermischwerk.de/blogg/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10154.html", 
                                "id": 10154, 
                                "guid": "57953398-ba71-43d4-ab03-a1a1bc7f66df", 
                                "logo": null, 
                                "date": "2018-12-29T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10154-saetchmo", 
                                "title": "Saetchmo.", 
                                "subtitle": "1000 Echochambers", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "S\u00e4tche ist sowas von Teil der Familie - seine Echochamber l\u00e4uft regelm\u00e4ssig in der c-base, er f\u00e4hrt ne alte Feuerwehr und wer ihm krummkommt, merkt das schon.\r\n\r\nS\u00e4tchmoe is sooo part of the family - his Echochamber runs regularly in the c-base, he drives an old fire brigade and whoever annoyise him, will notices that.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.saetche.net/blog/", 
                                        "title": "https://www.saetche.net/blog/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10155.html", 
                                "id": 10155, 
                                "guid": "89e3b2ae-d714-44a5-9e18-6270ce7c3c2b", 
                                "logo": null, 
                                "date": "2018-12-30T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10155-kons_t_il", 
                                "title": "kons[t]il", 
                                "subtitle": "Till & Konsti, zwei Seelenverwandte begegnen einander.", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Till & Konsti, zwei Seelenverwandte begegnen einander. Diese zwei Jungs aus Berlin, finden sich um  einen Sound zu kreieren, ihre Stimmungen und Erfahrungen in unverwechselbare Sounds zu verpacken, durchlaufen verschiedenste Facetten der elektronischen Tanzmusik... Sumseln sich durch das Dickicht des Deep-House Waldes, das Ziel...  Back to the roots, um sich zu einem gro\u00dfen Ganzen zu vereinen, unabh\u00e4ngig von Zeit und Raum tanzen wir schwerelos durch die Unendlichkeit.\r\n\r\nTill & Konsti, two soul mates meet each other, these two boys from Berlin find each other to create sound, to wrap their moods and experiences into unmistakable sounds, go through different facets of electronic music... Are humming through the thicket of the deep-house forest, the goal... Back to the roots, to unite to one big whole, independent of time and space we dance weightlessly through Infinity.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.mixcloud.com/konstil/kons[t]il", 
                                        "title": "https://www.mixcloud.com/konstil/kons[t]il"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10156.html", 
                                "id": 10156, 
                                "guid": "55ff173d-84b9-4931-94d0-fc01fc408aba", 
                                "logo": null, 
                                "date": "2018-12-30T02:00:00+01:00", 
                                "start": "02:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10156-404_tba_aka_marillion", 
                                "title": "404 tba aka Marillion", 
                                "subtitle": "More to be and let go.", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Swiss bliss & HH Adel", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10157.html", 
                                "id": 10157, 
                                "guid": "b2b637e0-df81-4999-82d4-5d4468f73a5b", 
                                "logo": null, 
                                "date": "2018-12-30T04:00:00+01:00", 
                                "start": "04:00", 
                                "duration": "03:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10157-lord_spreadpoint", 
                                "title": "Lord Spreadpoint", 
                                "subtitle": "Audio Visual Set", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "Siegfried K\u00e4rcher (1974/Force Inc.) wurde in die Zeit der Heimcomputer hineingeboren. Nach Atari VCS 2600 folgte der C64 und dann der Commodore Amiga und einige Ber\u00fchmtheit in der Hacker/Cracker- und Demoszene. Er ist Mitglied des Computerkollektivs Spreadpoint. Der nahe gelegene Techno Club in Frankfurt, wo seit Anfang der 80er Techno erfunden wurde, wirkte ebenso stilpr\u00e4gend.\r\nIn den Anfangstagen gab es noch keine strikte Trennung der elektronischen Musikstile und so erlebte K\u00e4rcher von piepsenden Konsolen und chiptunigen Heimcomputern wie dem C64, harter EBM, \u00fcber Midifizierung der Tonstudios durch den Atari ST, Harddiskrecording, Kommerzialisierung und Ausverkauf des Technos eigentlich alle wichtigen Entwicklungsschritte mit.\r\nSeit einem Hochbegabtenstudium der freien bildenden Kunst entwickelt er Werke im Bereich bildender Kunst und Musik. Er lebt und arbeitet in Frankfurt am Main und Berlin. \r\nAuf dem 35c3 nimmt uns Siegfried K\u00e4rcher mit auf eine Klangreise in technoide Ambientgefilde, die musikalisch mal historische Leuchtt\u00fcrme aufblinken lassen aber auch in die Zukunft schauen lassen oder einfach nur zur Kontemplation einladen.\r\n\r\nSiegfried K\u00e4rcher (1974/Force Inc.) was born into the time of home computers. After Atari VCS 2600 followed the C64 and then the Commodore Amiga and some celebrity in the hacker/cracker and demo scene. He is a member of the computer collective Spreadpoint. The nearby Techno Club in Frankfurt, where Techno was invented since the beginning of the 80's, also had a style shaping effect.\r\nIn the early days there was no strict separation of the electronic music styles and so K\u00e4rcher experienced all important development steps from beeping consoles and chiptuning home computers like the C64, hard EBM, via midification of the recording studios by the Atari ST, hard disk recording, commercialization and sell out of the techno.\r\nHe has been developing works in the field of fine arts and music since he studied free visual arts as a highly gifted student. He lives and works in Frankfurt am Main and Berlin. \r\nOn the 35c3 Siegfried K\u00e4rcher takes us on a journey of sound into technoid ambient environments, which musically blink historical lighthouses but also let us look into the future or simply invite us to contemplation.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "www.4sk.de", 
                                        "title": "www.4sk.de"
                                    }, 
                                    {
                                        "url": "https://www.youtube.com/watch?v=MEZcpR4aG9k", 
                                        "title": "https://www.youtube.com/watch?v=MEZcpR4aG9k"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Compeiler": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10148.html", 
                                "id": 10148, 
                                "guid": "91b4a4c3-98e0-49f6-a3fc-621140621c7f", 
                                "logo": null, 
                                "date": "2018-12-29T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10148-rote_schule_music_workshop", 
                                "title": "Rote Schule Music Workshop", 
                                "subtitle": "Workshop/Performance", 
                                "track": "Music", 
                                "type": "workshop", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10135.html", 
                                "id": 10135, 
                                "guid": "6f0d635e-7483-4e6a-8ed3-05c39df5546d", 
                                "logo": null, 
                                "date": "2018-12-29T15:00:00+01:00", 
                                "start": "15:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10135-riley", 
                                "title": "Riley", 
                                "subtitle": "Dance performance", 
                                "track": "Music", 
                                "type": "performance", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10057.html", 
                                "id": 10057, 
                                "guid": "f6457dfe-a669-453d-ad9f-ddecdd261feb", 
                                "logo": "/system/events/logos/000/010/057/large/47163654_2020787697968002_5431537559463264256_n.jpg?1545417900", 
                                "date": "2018-12-29T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10057-window_magic", 
                                "title": " Window Magic", 
                                "subtitle": "Ambient/Experimental", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Window Magic is the ambient/tape music project of Andreas Bonkowski. With an arsenal of cassettes, tape loops, analog synths, trusty fx units and escapist tunes he creates lo-fi collages and mystical soundscapes.", 
                                "description": "Sometimes you hear a sound and may be not quite sure what it is. Or what it was. If you are fascinated by the mystery of noise, tape music is an artichoke, a rough diamond, a welcome phantom with many faces. Window Magic melts found sounds, manipulated source material and field recordings into tape deck ghosts and drones that haunt, flutter and sing. From a very early age growing up in East-Berlin, Andreas Bonkowski was fascinated by tape recorders and shortwave radio stations, filling C60s of his late night finds and experimenting with cutting techniques to make his own versions of songs and broadcasts. This fascination never left, though his other musical adventures with Corwood Manual or Siva. somehow took very different routes to explore other territories. Window Magic opens a portal to someplace else, channeling sounds that move outside the workings of time.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://windowmagic.pm/", 
                                        "title": "http://windowmagic.pm/"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/windowmagic", 
                                        "title": "https://soundcloud.com/windowmagic"
                                    }, 
                                    {
                                        "url": "https://twitter.com/window_magic", 
                                        "title": "https://twitter.com/window_magic"
                                    }, 
                                    {
                                        "url": "https://store.windowmagic.pm/", 
                                        "title": "https://store.windowmagic.pm/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10050.html", 
                                "id": 10050, 
                                "guid": "a4d093fc-aa2f-4edb-86ea-a9d149ba75a9", 
                                "logo": "/system/events/logos/000/010/050/large/22730453_1809696109060321_4866779364793401634_n.jpg?1545419292", 
                                "date": "2018-12-29T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10050-sevensol", 
                                "title": "Sevensol", 
                                "subtitle": "Part 1", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Alex is one third of esteemed label Kann and 1/2 of DJ Duo Manamana together with Map.ache.\r\n\r\nAside from his former work in recordshops, Dj-ing since ages and releasing new music (Mana-All-Nite, Kann) Alex has also been quietly issuing out his own music (together with Bender) and remixes as well.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/sevensol", 
                                        "title": "https://soundcloud.com/sevensol"
                                    }, 
                                    {
                                        "url": "https://kann-records.com/", 
                                        "title": "https://kann-records.com/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10080.html", 
                                "id": 10080, 
                                "guid": "003d5cf1-efd6-47e5-b01f-4b49e81271c4", 
                                "logo": "/system/events/logos/000/010/080/large/maxresdefault.jpg?1545419128", 
                                "date": "2018-12-29T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10080-ana_bogner", 
                                "title": "Ana Bogner", 
                                "subtitle": "Experimental/Ambient", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Ana Bogner is an electronic musician and sound artist.\r\nHer artistic content revolves around the theme of imaginary space: poetic realities as a state of human consciousness. She works both compositionally and installatively - architecturally.\r\nShe layers spheres, dreams of utopian urban ambience, built on ethereal light-heartedness through which stories float.", 
                                "description": "She received a honorary mention \"Digital Musics and Sound Art\" for \"sounds from the white box\" (as part of the exhibition Pulse 'Lab II: Works for Wave Field Synthesis', initiated by Robert Henke), Ars Electronica, AUS\r\nIn 2014 her EP multiple proportions was published on headphonica.\r\nIn 2019 there will be the release of 1967/People in collaboration with Arpen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://anabogner.de", 
                                        "title": "http://anabogner.de"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/anabogner", 
                                        "title": "https://soundcloud.com/anabogner"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10136.html", 
                                "id": 10136, 
                                "guid": "220c710c-e4f9-4dda-9bd4-a9416acc2901", 
                                "logo": "/system/events/logos/000/010/136/large/22730453_1809696109060321_4866779364793401634_n.jpg?1545419446", 
                                "date": "2018-12-29T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10136-sevensol", 
                                "title": "Sevensol", 
                                "subtitle": "Part 2", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Alex is one third of esteemed label Kann and 1/2 of DJ Duo Manamana together with Map.ache.\r\n\r\nAside from his former work in recordshops, Dj-ing since ages and releasing new music (Mana-All-Nite, Kann) Alex has also been quietly issuing out his own music (together with Bender) and remixes as well.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/sevensol", 
                                        "title": "https://soundcloud.com/sevensol"
                                    }, 
                                    {
                                        "url": "https://kann-records.com", 
                                        "title": "https://kann-records.com"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10090.html", 
                                "id": 10090, 
                                "guid": "e7ee2001-53cc-4c0f-9e8b-84159da6633f", 
                                "logo": "/system/events/logos/000/010/090/large/Esmark_MG_0497_bw.jpg?1545250908", 
                                "date": "2018-12-29T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10090-esmark", 
                                "title": "Esmark", 
                                "subtitle": "Dark Drone Landscapes ", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Esmark is the latest musical vehicle of sound architect Nikolai von Sallwitz and experimental artist Alsen Rau. They\u2019ve worked together on a variety of experimental and performative projects since 2001. Their latest project was recorded in late 2016, in Scandinavia, where they beautiful surroundings and solitude inspired them to record enough music for two albums. Rather than save some of the music for a followup album, a decision was made to release two albums simultaneously.", 
                                "description": "Both Nikolai von Sallwitz and Alsen Rau are experienced musicians, who have enjoyed lengthy and successful careers. They\u2019ve both previously worked together, and have also worked with a variety of different artists in a variety of roles.\r\nIn the case of sound architect Nikolai von Sallwitz he was mastered Scheich In China first two albums and has written for the Karachi Files\u2019 2016 debut eponymous album and Scheich In China. However, Nikolai von Sallwitz is best known as known as Taprikk Sweezee, which is the moniker he has been using since 2006.\r\nSince then, Taprikk Sweezee has worked in a variety of capacities, ranging from singer and songwriter, to recordist remixer and producer. His career as Taprikk Sweezee started in 2006 as a vocalist and since then, he has served what is akin to a musical apprentice. That is only part of the Taprikk Sweezee story.\r\nTaprikk Sweezee has written music and has been involved with sound design for film, theatre and a variety of art and pop projects. Somehow, Taprikk Sweezee has found time to collaborate with a number of visual artists, including Chris Hoffmann, Andreas Nicholas Fischer and Robert Seidel. There are it seems, many strings to Taprikk Sweezee\u2019s bow.\r\nIn 2010, Taprikk Sweezee released his debut EP Conversea. A year later, and Taprikk Sweezee returned with his sophomore EP Poly. Taprikk Sweezee also finds time to work on projects with his friend Alsen Rau, including on the Barabass, Scheich in China and their most recent project Esmark.\r\nJust like Nikolai von Sallwitz, Alsen Rau has a wealth of musical experience. Over the years, he has been a member of various groups including Barabass, who released an EP in 2006. On + Brr followed in 2010, who released their debut album Peace and Love in 2010. This was followed by a quartet of singles. Alsen Rau\u2019s next project was Scheich in China, who have released five albums between 2014 and 2016. However, this is just part of the story of Alsen Rau.\r\nHe\u2019s also one of the founders and curators of Kraniche, a Hamburg-based club, that is renowned for exhibitions of experimental art. They\u2019ve received praise and plaudits from critics and cultural commentators. There\u2019s also been performances of experimental music at Kraniche, which has gained a reputation as a place that is\r\n  \r\nunafraid to showcase ambitious and inventive music. Away from Kraniche, Alsen Rau has also curated a number of exhibitions, performances and readings, and is heavily involved with city\u2019s art scene. However, much of Alsen Rau\u2019s time is spent making music.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://www.bureau-b.com/esmark.php", 
                                        "title": "http://www.bureau-b.com/esmark.php"
                                    }, 
                                    {
                                        "url": "https://e-s-m-a-r-k.tumblr.com", 
                                        "title": "https://e-s-m-a-r-k.tumblr.com"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10056.html", 
                                "id": 10056, 
                                "guid": "c1d78229-225b-44fd-a087-b6acd77601c0", 
                                "logo": "/system/events/logos/000/010/056/large/avatars-000118314231-989ats-t500x500.jpg?1545419962", 
                                "date": "2018-12-29T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "02:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10056-electric_kool_aid", 
                                "title": " Electric Kool Aid", 
                                "subtitle": "Deeptech", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Electric Kool Aid is the atmospheric deeptech outfit of label head, studiogeek and dj extraordinaire Peer Schmid.", 
                                "description": "Looking back on an intimate personal relationship with more than fifteen years of electrosonic art, Peer has been able to make himself a name \u2013 both as an artist and a remixer, with a great hand for unique and diverse atmospheres - as well as a witty producer, with the ability to capture and further refine the magic studio moment. With his dj residency @ \"Zoo\" in Hamburg's world famous \"Villa Nova\" club - he is regularly warming up for some of the biggest names in the industry like Dave Seaman, Robert Babicz, Extrawelt, Oliver Schories, Butch, Namito, Thomas Schumacher or D-Nox & Beckers with his praised musical and atmospheric blend of deephouse and groovy deeptech. You should also try to catch one of his acclaimed radio mixes on Frisky radio with a more listening oriented, couch-esque approach.\r\n\r\nHaving worked in event-, label- and artist management, in both the underground and the mainstream music industry alike, his music proves a mature sense for the outstanding and fresh. Apart from his solo works as Electric Kool Aid, he has released more than 60 tracks under diverse names and further collaborated in diverse styles with various artists on dozens of different projects.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/electrickoolaid", 
                                        "title": "https://soundcloud.com/electrickoolaid"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10119.html", 
                                "id": 10119, 
                                "guid": "402a0c16-edf5-4f1a-8315-3955383292b9", 
                                "logo": null, 
                                "date": "2018-12-29T23:00:00+01:00", 
                                "start": "23:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10119-crasser_sauer", 
                                "title": "Crasser & Sauer", 
                                "subtitle": "Experimental Electronics", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Electroaccoustic interplay between the Leipzig-based musicians Judith Crasser & Adam Sauer, both representing the local Pracht collective, an association and venue dedicated to extraordinarities in sound and beyond. In their dialogic live-perfomance they investigate the relations between sonic reality and synthesized fiction, dynamically combining elements of Musique Concrete, Industrial, Glitch and Free Improvisation.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/judithcrasser", 
                                        "title": "https://soundcloud.com/judithcrasser"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/zond21", 
                                        "title": "https://soundcloud.com/zond21"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10089.html", 
                                "id": 10089, 
                                "guid": "7d635c88-125c-4798-9e23-987aae04db30", 
                                "logo": "/system/events/logos/000/010/089/large/A-4388736-1517147016-1439.jpeg.jpg?1545387098", 
                                "date": "2018-12-30T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10089-rodion_levin", 
                                "title": "Rodion Levin", 
                                "subtitle": "Techno", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "One half of On+Brr and Brenz Hold (both with Alsen Rau), known for their infamous Hamburg club \"Kraniche\" (R.I.P.).", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.discogs.com/de/artist/4388736-Rodion-Levin", 
                                        "title": "https://www.discogs.com/de/artist/4388736-Rodion-Levin"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10047.html", 
                                "id": 10047, 
                                "guid": "c61626b4-4b8c-45cd-ac46-90176071ab43", 
                                "logo": "/system/events/logos/000/010/047/large/26239498_140042200002882_4900957278046703016_n.jpg?1545420767", 
                                "date": "2018-12-30T01:00:00+01:00", 
                                "start": "01:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10047-niklas_wandt", 
                                "title": "Niklas Wandt", 
                                "subtitle": "Part 1", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Deeply inhaling rock music, then hiphop and, maybe most significantly jazz from an early age, collecting music has been Niklas\u2019 favorite pastime since way back when. Starting to dj was then really just a process of making public and formatting a bit what had been going on at home anyways \u2013 with as little care for genre and imposed boundaries as possible, you\u2019ll find Niklas aka Franco DJ play a diverse range of fringe dance musics from percussion and library records, disco and boogie tunes, spiritual jazz, No Wave, far out Kosmische and, yes, some roughed up house music. In Berlin, he regularly throws a party dedicated to genre-defying dances named SMELLS in various locations such as Sameheads and Loophole.\r\nGuests thus far include Jan Schulte, Retrogott, Basso, Philipp Otterbach, Jules, Twit One, Katzele among others. As a DJ, Niklas was heard at the Salon Des Amateurs, D\u00fcsseldorf, in Berlin at KaterBlau, JohnnyKn\u00fcppel, Klunkerkranich and Sisyphos, at the Teder/Romano in Tel Aviv and over the airwaves of LYL Radio, Redlight Radio and Cashmere Radio.\r\n\r\nAlso catch him at his monthly bar residencies at Heiner/Weserstr. 58 in Berlin-Neuk\u00f6lln and at King Georg in Cologne.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://niklaswandt.com", 
                                        "title": "https://niklaswandt.com"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/niklaswandtmusik", 
                                        "title": "https://soundcloud.com/niklaswandtmusik"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10078.html", 
                                "id": 10078, 
                                "guid": "d41b8215-69f0-442c-8c77-c8f5871bce22", 
                                "logo": "/system/events/logos/000/010/078/large/48416970_718041131928965_6199364178822561792_n.jpg?1545402577", 
                                "date": "2018-12-30T02:00:00+01:00", 
                                "start": "02:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10078-nkls", 
                                "title": "nkls", 
                                "subtitle": "Synths & Stuff", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "walking on tounges of drums,\r\nwriting melodic textures - \r\nwhy not crying for a miracle ?", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/n_kl_s", 
                                        "title": "https://soundcloud.com/n_kl_s"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10092.html", 
                                "id": 10092, 
                                "guid": "57f5b48a-2337-44e8-abf2-b5e3bf96ea1f", 
                                "logo": "/system/events/logos/000/010/092/large/26239498_140042200002882_4900957278046703016_n.jpg?1545420917", 
                                "date": "2018-12-30T03:00:00+01:00", 
                                "start": "03:00", 
                                "duration": "01:00", 
                                "room": "Compeiler", 
                                "slug": "35C3-ABFahrplan-10092-niklas_wandt", 
                                "title": "Niklas Wandt", 
                                "subtitle": "Part 2", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Deeply inhaling rock music, then hiphop and, maybe most significantly jazz from an early age, collecting music has been Niklas\u2019 favorite pastime since way back when. Starting to dj was then really just a process of making public and formatting a bit what had been going on at home anyways \u2013 with as little care for genre and imposed boundaries as possible, you\u2019ll find Niklas aka Franco DJ play a diverse range of fringe dance musics from percussion and library records, disco and boogie tunes, spiritual jazz, No Wave, far out Kosmische and, yes, some roughed up house music. In Berlin, he regularly throws a party dedicated to genre-defying dances named SMELLS in various locations such as Sameheads and Loophole. \r\nGuests thus far include Jan Schulte, Retrogott, Basso, Philipp Otterbach, Jules, Twit One, Katzele among others. As a DJ, Niklas was heard at the Salon Des Amateurs, D\u00fcsseldorf, in Berlin at KaterBlau, JohnnyKn\u00fcppel, Klunkerkranich and Sisyphos, at the Teder/Romano in Tel Aviv and over the airwaves of LYL Radio, Redlight Radio and Cashmere Radio.\r\n\r\nAlso catch him at his monthly bar residencies at Heiner/Weserstr. 58 in Berlin-Neuk\u00f6lln and at King Georg in Cologne.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://niklaswandt.com", 
                                        "title": "https://niklaswandt.com"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/niklaswandtmusik", 
                                        "title": "https://soundcloud.com/niklaswandtmusik"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Uptime Bar": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10138.html", 
                                "id": 10138, 
                                "guid": "c743b3a8-aaf7-4458-8eb8-400ea9870a53", 
                                "logo": null, 
                                "date": "2018-12-29T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10138-chiara", 
                                "title": "Chiara", 
                                "subtitle": "", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10139.html", 
                                "id": 10139, 
                                "guid": "0b24a14d-f414-4fec-990c-fa5154072925", 
                                "logo": null, 
                                "date": "2018-12-29T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10139-faheus", 
                                "title": "faheus", 
                                "subtitle": "", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.mixcloud.com/matthiasdamasty/", 
                                        "title": "https://www.mixcloud.com/matthiasdamasty/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10140.html", 
                                "id": 10140, 
                                "guid": "e1d5950b-3278-4e04-aa4e-919ea48860bf", 
                                "logo": null, 
                                "date": "2018-12-29T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10140-morellion", 
                                "title": "Morellion", 
                                "subtitle": "Techno", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "From the family...", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10055.html", 
                                "id": 10055, 
                                "guid": "6e2d531c-b9ea-4801-b7ee-388c6c5657d1", 
                                "logo": null, 
                                "date": "2018-12-29T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10055-dj_t_shaba", 
                                "title": "DJ T\u00b4shaba", 
                                "subtitle": "Electro-Kraut & Cosmic-Shit", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "\u201eWelche Rolle spielt Musik bei der Identit\u00e4tsbildung? M\u00fcssen Punker Punk h\u00f6ren? D\u00fcrfen Rocker nur Gitarre? Raver nur Techno? Rastas Reggae? Oder l\u00e4sst sich da was extrahieren, gibt es sowas wie eine universale Musik? Aus einer in 30 Jahren in viele Richtungen gewachsenen Plattensammlung mit Subkulturaffinit\u00e4t werden im berliner underground, auf festivals wie fusion und eben auch hier Antworten versucht, Vinyl only, alles analoge Handarbeit.\u201c", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10054.html", 
                                "id": 10054, 
                                "guid": "b9a5df83-302b-4e7d-8dd2-4599b3df2e9a", 
                                "logo": "/system/events/logos/000/010/054/large/avatars-000373142309-25ak0t-t500x500.jpg?1545421325", 
                                "date": "2018-12-29T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10054-naroma", 
                                "title": "Naroma", 
                                "subtitle": "Downtempo", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "people also called her sets n\u00b0aromatherapy.\r\nit assumes that movement and emotion are directly related.", 
                                "description": "Dance has been used therapeutically for thousands of years,\r\nits an expressive therapy for cognitive, social, behavioral and physical conditions. I\u2019ve been hearing about Naroma from the beginning of my time working with artists from Europe. She\u2019s a bit of a legend as an organizer - Urubu Marinka reported she traveled to Leipzig to play one of Naroma\u2019s parties and stayed an extra night, and then another, and basically just moved to Leipzig, in large part due to Naroma\u2019s warmth as a host.\r\nAnd then as a performer, there are Naroma\u2019s 8-hour closing sets at Fusion. That\u2019s some serious business. But, there\u2019s a twist - for years she performed these marathons on two iPods. You know, with the wheels. This is entirely bonkers, borderline impossible. But don\u2019t worry,  since 2 years she uses a computer to play on and she loves all the new possibilities. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "http://www.naroma.net/", 
                                        "title": "http://www.naroma.net/"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/naroma", 
                                        "title": "https://soundcloud.com/naroma"
                                    }, 
                                    {
                                        "url": "https://www.mixcloud.com/naroma/", 
                                        "title": "https://www.mixcloud.com/naroma/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10072.html", 
                                "id": 10072, 
                                "guid": "3b31d22c-33dc-48d4-b81f-38c81e8f28c9", 
                                "logo": null, 
                                "date": "2018-12-30T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10072-bambi_de_luxe", 
                                "title": "bambi de luxe", 
                                "subtitle": "Electronica/Downtempo", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Hailing from Geneva to Falken, bambi de luxe has been haunting Zurich's underground scene for many years. She cultivates an alternative vision of living in occupied places promoting community spirit and rejecting materialism in the centre of capitalism and consumption.\r\nPlays only on best PA\u2019s.\r\nOn a couch.\r\nNever calls the police.\r\nLOVE FREEDOM EVERYTHING", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://www.mixcloud.com/bambideluxe/", 
                                        "title": "https://www.mixcloud.com/bambideluxe/"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "OIO L\u00f6tarea": [
                            {
                                "id": 290, 
                                "guid": "3c8fb2e5-b752-524f-b9b1-d3393929976d", 
                                "logo": "", 
                                "date": "2018-12-29T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "04:00", 
                                "room": "OIO L\u00f6tarea", 
                                "slug": "HPHDXC", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/HPHDXC/", 
                                "title": "Solder your own MPP tracker", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "L\u00f6tarea 110 min", 
                                "language": "en", 
                                "abstract": "Elektra prepares some kits of her MPP tracker, you'll finish them with her help.", 
                                "description": "See details here: https://wiki.freifunk.net/Freifunk-MPP-Tracker\r\n\r\nYou can participate on a first come first serve base.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 57, 
                                        "code": "HZ9WHF", 
                                        "public_name": "Elektra", 
                                        "biography": "Free wireless networks since 2001\r\nFreifunk since 2003", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ]
                    }
                }, 
                {
                    "index": 4, 
                    "date": "2018-12-30", 
                    "day_start": "2018-12-30T11:00:00+01:00", 
                    "day_end": "2018-12-30T19:00:00+01:00", 
                    "rooms": {
                        "Adams": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9989.html", 
                                "id": 9989, 
                                "guid": "54c671a2-1803-4085-a923-a875ca11723a", 
                                "logo": "/system/events/logos/000/009/989/large/espr_35c3.jpg?1545253268", 
                                "date": "2018-12-30T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9989-what_the_flag_is_ctf", 
                                "title": "What the flag is CTF?", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Every year since 2011 on the 28C3 we organize a Capture the Flag contest for people on the Congress and from all over the world. This year we want to give you an overview about what a CTF is, the challenges, the players, the community and how much fun it is to play (not only our) CTF.", 
                                "description": "Capture the Flag competitions started to become a thing in the infosec community more than 20 years ago. When we started playing they were casual games to improve our skill set every now and then on weekends with a bunch of friends. In recent years, the CTF community grew much bigger and nowadays you can play a CTF every weekend if you want to. So what is it all about?\r\n\r\nFor the past 7 years, we organized the C3 CTF with a variety of challenges that try to be oriented towards real-world scenarios. The range of topics include reverse engineering, crypto(graphy) and web, and of course good old binary exploitation. If you solve a task, you get a flag. As simple as that. For the second time this year, we also run a separate, entry-level CTF designed for folks who do not like spending 48 hours on a single challenge. We are honored that over a thousand teams are playing with us every year from every corner of the world, and trolling our IRC channels.\r\n\r\nWe will present some challenges from this year's contest to give you an idea what you are up to when you decide to play. You will see how to solve our challenges even if you never played a CTF before. We realize that everybody needs to start somewhere and would love to motivate even more people to join our lovely community.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 2545, 
                                        "public_name": "Andy"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10037.html", 
                                "id": 10037, 
                                "guid": "36635330-55d6-4297-abcd-6d22fd2d22df", 
                                "logo": "/system/events/logos/000/010/037/large/dollar.jpg?1544663679", 
                                "date": "2018-12-30T12:30:00+01:00", 
                                "start": "12:30", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-10037-microtargeting_und_manipulation", 
                                "title": "Microtargeting und Manipulation", 
                                "subtitle": "Von Cambridge Analytica zur EU-Wahl", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Die M\u00f6glichkeiten des Microtargetings, aber auch der Desinformation mit Hilfe von Werbeplattformen wie Facebook sind vielf\u00e4ltiger, als man vor dem Cambridge-Analytica-Skandal vielleicht vermutet h\u00e4tte. Darauf wollen wir auch angesichts der anstehenden Wahlen in Europa einen Blick werfen.", 
                                "description": "Seit dem US-Pr\u00e4sidentschaftswahlkampf und dem Brexit-Entscheid sind Details ans Licht gekommen, wie politische Propaganda heute praktisch durchgef\u00fchrt wird. Was die noch nicht einmal beendeten Untersuchungen bisher ergeben haben, wollen wir zusammenfassen. Denn dass sie mindestens dazu beitrugen, die Wahlergebnisse zu beeinflussen, ist nun  nachvollziehbar.\r\n\r\nEntsprechend werden in Br\u00fcssel derzeit Gegenma\u00dfnahmen geplant, die die Wahlen zum Europ\u00e4ischen Parlament vor ungebetenen verdeckten Manipulationen sch\u00fctzen sollen. Aber halten sich die zur Wahl Stehenden selber an ihre Forderungen und Vorschl\u00e4ge?", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 810, 
                                        "public_name": "Ingo Dachwitz"
                                    }, 
                                    {
                                        "id": 1630, 
                                        "public_name": "Constanze Kurz"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9727.html", 
                                "id": 9727, 
                                "guid": "623fd999-d7dd-4fd8-896c-75e51a21df1e", 
                                "logo": null, 
                                "date": "2018-12-30T13:30:00+01:00", 
                                "start": "13:30", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9727-netzpolitischer_wetterbericht_2018", 
                                "title": "Netzpolitischer Wetterbericht 2018", 
                                "subtitle": "Die H\u00f6hen und Tiefen der deutschen und europ\u00e4ischen Netzpolitik", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Das Jahr 2018 bietete wieder zahlreiche Beispiele f\u00fcr einen netzpolitischen Wetterbericht. Die Gro\u00dfe Koalition lief sich mit der Bundesregierung warm und am Ende des Jahres droht man den \u00dcberblick \u00fcber zahlreiche Kommissionen und Arbeitsgruppen zur Digitalisierung zu verlieren.\r\n\r\nDie gute Nachricht ist: Netzpolitik ist angekommen und geht nicht mehr so schnell weg. Die schlechte Nachricht ist: Beispiele f\u00fcr eine bessere Netzpolitik, Wert auf den Schutz und Ausbau von Grund- und Verbraucherrechte legt, gibt es leider eher weniger.\r\n\r\n", 
                                "description": "W\u00e4hrend die Urheberrechtsrichtlinie wahrscheinlich Uploadfilter und Leistungsschutzrecht auf EU-Ebene verankert, bringen die Innenminister Uploadfilter gegen Terrorpropaganda voran.\r\n\r\nDie ePrivacy-Verordnung hatte im Parlament zuviele Fans von Verbraucherrechten, deshalb wird sich jetzt im EU-Rat gestoppt. Der Skandal um Cambridge Analytica f\u00fchrte dazu, dass Gesch\u00e4ftsmodelle und Datenschutz bei Facebook und Co in der \u00d6ffentlichkeit st\u00e4rker diskutiert wurden und nebenbei erblickte die Datenschutzgrundverordnung das Licht der \u00d6ffentlichkeit. Fast alles in der Netzpolitik dreht sich derzeit um K\u00fcnstliche Intelligenz, wobei immer noch unklar ist, was sich Politikerinnen und Politiker darunter vorstellen, wenn sie davon sprechen. Irgendwas mit Arbeitspl\u00e4tzen auf jeden Fall, vielleicht auch noch was mit Ethik und Regulierung. Je nach Perspektive.\r\n\r\nDaf\u00fcr gibt es nat\u00fcrlich mehr \u00dcberwachung. Es gibt neue Beh\u00f6rden und Agenturen f\u00fcr den Bau von Staatstrojanern und am Bahnhof S\u00fcdkreuz wurden erfolgreich/erfolgslos biometrische Video\u00fcberwachungssysteme getestet, die demn\u00e4chst \u00fcberall ausgerollt werden k\u00f6nnten. Neue Polizeigesetze bringen mehr \u00dcberwachungsbefugnisse auf L\u00e4nderebene.\r\n\r\nEs gibt aber auch gute Nachrichten aus diesem Jahr. Mehr dazu dann gerne live vor Ort.\r\n\r\nEs ist viel passiert in 2018 und die l\u00e4ngeren Linien helfen dabei, einen Blick in die Debatten des kommenden Jahres zu werfen.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 1595, 
                                        "public_name": "Markus Beckedahl"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9498.html", 
                                "id": 9498, 
                                "guid": "8bd222ad-34a7-468a-9e83-11767dcfa809", 
                                "logo": "/system/events/logos/000/009/498/large/bug.png?1546169738", 
                                "date": "2018-12-30T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "00:40", 
                                "room": "Adams", 
                                "slug": "35c3-9498-dissecting_broadcom_bluetooth", 
                                "title": "Dissecting Broadcom Bluetooth", 
                                "subtitle": "", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Broadcom's Bluetooth firmware on popular devices \u2013 such as Nexus 5, Nexus 6P, Raspberry Pi 3, and Raspberry Pi 3+ \u2013 shares the same firmware update mechanisms, which allows for local firmware modifications. With InternalBlue we published a framework to change lower Bluetooth layers. In this talk we go even further and demonstrate a remote exploit in the Broadcom firmware.", 
                                "description": "In the first part of this talk we present the InternalBlue framework, which allows to experiment with Broadcom-based Bluetooth chips. On Nexus 5 and 6P, it already supports monitoring and injection tools for the lower layers of the Bluetooth protocol stack.\r\n\r\nThe second part of this talk focuses on security. We show how behavior during pairing can be modified, e.g. by setting other device features or IO capabilities. We also demonstrate an implementation of the recent publicly known ECDH key exchange attack.\r\n\r\nLast, we demonstrate a new attack (CVE-2018-19860) that can crash the Bluetooth stack and execute a limited set of functions \u2013 only requiring knowledge of the Bluetooth MAC address of the device under attack. This vulnerability has silently been patched in newer firmware versions, but it applies to Broadcom chips in popular devices such as Nexus 5, Raspberry Pi 3, iPhone 6, Xperia Z5, Samsung Galaxy Note 3, MacBook Pro 2016 and more.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 4927, 
                                        "public_name": "jiska"
                                    }, 
                                    {
                                        "id": 8329, 
                                        "public_name": "mantz"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://media.ccc.de/v/2018-154-internalblue-a-deep-dive-into-bluetooth-controller-firmware", 
                                        "title": "MRMCD talk on InternalBlue (more details on how to use it)"
                                    }, 
                                    {
                                        "url": "https://github.com/seemoo-lab/internalblue", 
                                        "title": "InternalBlue on GitHub"
                                    }
                                ], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/722/original/2018-12-30_bluetooth_%284%29.pdf?1546169669", 
                                        "title": "Presentation Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9685.html", 
                                "id": 9685, 
                                "guid": "b1b28bd0-5279-4950-8385-9ee8a57187f9", 
                                "logo": null, 
                                "date": "2018-12-30T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9685-security_nightmares_0x13", 
                                "title": "Security Nightmares 0x13", 
                                "subtitle": "", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?", 
                                "description": "Wie immer wagen wir den IT-Security-Alptraum-Ausblick auf das Jahr 2019 und dar\u00fcber hinaus. Denn was wir wirklich wissen wollen, ist ja schlie\u00dflich: Welche artifiziell intelligenten Poltergeister werden in unseren Ger\u00e4ten herumspuken, welchen Meistern werden sie gehorchen und wie werden wir sie wieder los?", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 1633, 
                                        "public_name": "frank"
                                    }, 
                                    {
                                        "id": 384, 
                                        "public_name": "Ron"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9986.html", 
                                "id": 9986, 
                                "guid": "46b7c5d8-318d-4f6c-a17e-73f2638ab46a", 
                                "logo": null, 
                                "date": "2018-12-30T17:10:00+01:00", 
                                "start": "17:10", 
                                "duration": "01:00", 
                                "room": "Adams", 
                                "slug": "35c3-9986-closing_event", 
                                "title": "Closing Event", 
                                "subtitle": "", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Hier h\u00f6rt es auf.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8759, 
                                        "public_name": "rufus"
                                    }, 
                                    {
                                        "id": 5638, 
                                        "public_name": "rixx"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Borg": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9568.html", 
                                "id": 9568, 
                                "guid": "8580bb67-f3f8-4978-aba8-abad02ecceec", 
                                "logo": "/system/events/logos/000/009/568/large/yG2ahUfL_400x400.jpg?1543064831", 
                                "date": "2018-12-30T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "02:20", 
                                "room": "Borg", 
                                "slug": "35c3-9568-lightning_talks_day_4", 
                                "title": "Lightning Talks Day 4", 
                                "subtitle": "", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!", 
                                "description": "Did you think that the thrill of sharing your ideas in front of a huge audience at a C3 was something you'd never experience? Do you work on a cool project and want to get the word out? Was your talk one of the hundreds that got rejected? Did you come up with an awesome hack that you need to share? Go ahead and enter your Lightning Talk now!\r\n\r\nThe 35C3 Lightning Talks consist of three fast paced sessions which are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to get out to a global audience. Even if you don't have an awesome idea or project to share, a Lightning Talk is perfect for pitching your Assembly, your workshop or even a longer talk you'll give as a self-organized session. Your five minutes of fame!\r\n\r\nFor registration and schedule info, please check out https://c3lt.de/35c3", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5263, 
                                        "public_name": "gedsic"
                                    }, 
                                    {
                                        "id": 4601, 
                                        "public_name": "bigalex"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://c3lt.de/35c3", 
                                        "title": "Registration and schedule"
                                    }, 
                                    {
                                        "url": "https://events.ccc.de/congress/2018/wiki/index.php/Static:Lightning_Talks", 
                                        "title": "Congress Wiki Page"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9925.html", 
                                "id": 9925, 
                                "guid": "c293b397-9fad-45ff-9ffe-716503c6c095", 
                                "logo": "/system/events/logos/000/009/925/large/IMG_20181225_232912.jpg?1545778008", 
                                "date": "2018-12-30T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9925-let_s_reverse_engineer_the_universe", 
                                "title": "Let's reverse engineer the Universe", 
                                "subtitle": "exploring the dark", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "There is four times more dark matter and over fifteen times more dark energy than regular matter in the universe. And we have absolutely no idea what these invisible dark substances might be. This talk will show how we know that dark energy and dark matter exist, although we cannot see them directly. This kind of reverse enigneering of the universe already revealed some interesting features of the dark parts. However, the true nature of dark matter and dark energy are literally in the dark.", 
                                "description": "When it comes to dark matter, cosmology is facing a crisis. Many theories that can be tested nowadays where falsified and dark matter particle candidates still haven't been found in most of the predicted energy ranges. Whatever dark matter and dark energy will turn out to be, it will be stunning. So stay tuned and explore the dark. ", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8670, 
                                        "public_name": "Sara Konrad"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9576.html", 
                                "id": 9576, 
                                "guid": "9e340a17-98f7-4ac2-8fd4-2f195c60c212", 
                                "logo": null, 
                                "date": "2018-12-30T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "01:00", 
                                "room": "Borg", 
                                "slug": "35c3-9576-35c3_infrastructure_review", 
                                "title": "35C3 Infrastructure Review", 
                                "subtitle": "Up and to the right: All the statistics about this event you could wish for", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "35C3 is run by teams of volunteers. In this event, they will provide some insight into the challenges they faced while building the GSM, DECT and IP networks, running video streams, or organizing ticket sales. All graphs will be pointing up and to the right.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 2042, 
                                        "public_name": "Leon"
                                    }, 
                                    {
                                        "id": 5126, 
                                        "public_name": "K\u00e9vin Redon"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Clarke": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9370.html", 
                                "id": 9370, 
                                "guid": "49fe1044-4038-4cec-8e80-71621c9e7d6e", 
                                "logo": "/system/events/logos/000/009/370/large/newLogoEyeSkills.png?1543078784", 
                                "date": "2018-12-30T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9370-hacking_how_we_see", 
                                "title": "Hacking how we see", 
                                "subtitle": "A way to fix lazy eye?", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "We mostly see with the mind, and the mind is flexible. For the four hundred million people with amblyopia (lazy eye), their brain encountered an installation error when linking both eyes as babies.  As a \"Plan B\", their brain switched one eye off.\r\n\r\nI'll talk a bit about how the visual system works, and how our open-source virtual reality software (backed by social impact lab Leipzig and the prototypefund.de) can hack through that suppression and provide a chance to \"re-install\" full sight with two eyes. ", 
                                "description": "By providing an open set of tools for creating comparable experiments, our goal is not just to provide a tool, and a set of tools for building more tools, but to provide the basis for one of the world's largest open-science experiments.\r\n\r\nNobody claims to have predictive scientific models of how the visual system works in its entirety, and that means there is still so much more to discover. In the case of Lazy Eye, some aspects of the visual system are de-activated and/or dormant. What we can do is to comparatively explore which techniques and approaches have which effects on opening visual perceptions, and thereby drive our understanding of the system forward on a theoretical and practical level.\r\n\r\nIf you'd like to know more, check out www.eyeskills.org and come along to this talk. :-) \r\n\r\n\r\n\r\n", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8142, 
                                        "public_name": "Ben Senior"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "www.eyeskills.org", 
                                        "title": "EyeSkills"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9768.html", 
                                "id": 9768, 
                                "guid": "75b955c7-3e7c-463d-9d31-5b1e1745a5b2", 
                                "logo": "/system/events/logos/000/009/768/large/0865eb00acd7dc00c592fd205d3f93de_preview_featured.jpg?1545500740", 
                                "date": "2018-12-30T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Clarke", 
                                "slug": "35c3-9768-open_source_orgelbau", 
                                "title": "Open Source Orgelbau", 
                                "subtitle": "", 
                                "track": "Hardware & Making", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Spa\u00df und ein kleines Bisschen Wissenschaft mit 3D-gedruckten Orgelteilen", 
                                "description": "Musikinstrumentenbau ist \u00fcberwiegend geheim-by-accident, es wird pers\u00f6nlich weiter gegeben und ist nicht ohne weiteres \u00f6ffentlich zug\u00e4nglich. Das ist f\u00fcr musik- und handwerklich interessierte Nerds nat\u00fcrlich unbefriedigend.  \r\n3D-gedruckte Pfeifen werden ich mitbringen.\r\n\r\n## Ablauf \r\n* Kurze Einf\u00fchrung, was ist eine Orgel eigentlich \r\n* Was kann man heute cooler machen mit 3D-Druck und modischer Elektronik, Erl\u00e4uterungen zu Funktionsweisen und CAD-Files\r\n* \u00dcberlegungen \u00fcber Tastatur-Dynamik \r\n\r\n## Links \r\nDas Spektrogramm auf dem Mac: \r\nffmpeg -f avfoundation -i \":0\" -lavfi showspectrum=s=1440x900:slide=rscroll -c:v rawvideo -r 25 -pix_fmt yuv420p -f matroska - | mpv - \r\nLinux: ffplay -f pulse -i \"default\"\r\n\r\nPreviously auf media.ccc.de \r\n* https://media.ccc.de/v/MRMCD15-7058-die_pfeifenorgel_im_zeitraffer\r\n* https://media.ccc.de/v/WHTT3V\r\n\r\nParametrische Orgelpfeifen-Files (FreeCAD und OpenSCAD):\r\n* https://github.com/benjaminwand/3d-printed-labial-pipe \r\n* https://github.com/benjaminwand/3d-printed-reversed-free-reed-pipe\r\n* https://github.com/benjaminwand/3d-printed-organ-parts\r\n\r\nFachw\u00f6rter-pdf: https://www.walcker.com/downloads/dictionnaire-des-orgues.pdf", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8577, 
                                        "public_name": "Benjamin Wand"
                                    }, 
                                    {
                                        "id": 8818, 
                                        "public_name": "Jannik Beyerstedt"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/730/original/35C3_Orgelbau_Talk.pdf?1546384027", 
                                        "title": "Folien Jannik Beyerstedt"
                                    }, 
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/731/original/35C3_Vortrag.pdf?1546384027", 
                                        "title": "Folien Benjamin Wand "
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9964.html", 
                                "id": 9964, 
                                "guid": "b11ac9c0-8a4d-47ae-a584-f5c01fa2a01c", 
                                "logo": "/system/events/logos/000/009/964/large/Untitled-11.png?1539703024", 
                                "date": "2018-12-30T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "00:50", 
                                "room": "Clarke", 
                                "slug": "35c3-9964-cat_mouse_evading_the_censors_in_2018", 
                                "title": "Cat & Mouse: Evading the Censors in 2018", 
                                "subtitle": "Preserving access to the open Internet with circumvention technology", 
                                "track": "Resilience", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "The deepening of global Internet infrastructure comes accompanied with an invigorated capacity and intent by adversaries to control the information that flows across it. Inextricably, political motivations and embedded power structures underlie the networks through which we interpret and understand our societies and our world - censorship threatens the integrity of the public sphere itself. The increasing technical sophistication of information controls deployed by censors in adversarial network environments around the world can be uniquely viewed and researched by circumvention tool providers, whose work continues to preserve access to the open Internet for all communities. Through this presentation, we endeavour to share insights gained from the front lines of this technical contest.", 
                                "description": "The deepening of global Internet infrastructure comes accompanied with an invigorated capacity and intent by adversaries to control the information that flows across it. Inextricably, political motivations and embedded power structures underlie the networks through which we interpret and understand our societies and our world - censorship threatens the integrity of the public sphere itself. The increasing technical sophistication of information controls deployed by censors in adversarial network environments around the world can be uniquely viewed and researched by circumvention tool providers, whose work continues to preserve access to the open Internet for all communities. Through this presentation, we endeavour to share insights gained from the front lines of this technical contest.\r\n\r\nThe following key questions will be answered in this session:\r\n- What are circumvention tools conceptually and how do they work?\r\n- How have the techniques of adversaries evolved?\r\n- What are the latest innovations in circumvention technology?\r\n- How have emerging economies been affected, where censorship and and surveillance hardware and software are built-in to newly established ICT infrastructure?\r\n- How do circumvention trends follow censorship events and social/political movements?\r\n- Where do we see these technical advances leading the next generation of censorship and circumvention technology?\r\n\r\nThis is a Foundations talk. No prior understanding of circumvention technology is required to enjoy this, but the presentation will hopefully be enjoyable to all experience levels.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8668, 
                                        "public_name": "kmc"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3244046", 
                                        "title": "A recently published paper by this presenter: Censorship and Collateral Damage: Analyzing the Telegram Ban in Iran"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Dijkstra": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9905.html", 
                                "id": 9905, 
                                "guid": "093eca9c-c084-462a-8ed2-b95954782b06", 
                                "logo": "/system/events/logos/000/009/905/large/talk_logo.png?1545853700", 
                                "date": "2018-12-30T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9905-are_machines_feminine", 
                                "title": "Are machines feminine?", 
                                "subtitle": "exploring the relations between design and perception of machines and the dynamics in between", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Why do navigation systems have feminine voices? We know Tay, Eliza, Siri not only as female names, but also as chatbots and software, which directly interact with humans. Although computer programs are per se genderless, gender seems not to be cancelled out in human-machine interaction, but why? ", 
                                "description": "This talk aims to examine how we map gender on computers and machines. This includes looking at software in machine-human interaction, as well as digging deeper into a cultural history of imagining and building human-like machines. \r\nTo look at this, two view points are taken; \r\nIn the examples of the virtual assistants; What do the responses these devices give in conversation reveal about their design? What are the expectations and projections users map onto a machine when they interact with it? \r\nThis connects to the cultural imagining of machines as subjects, which has been pondered in literature and film before and parallel to technical research. From 18th century clockwork powered figures, that wrote and played music, to 19th century literature, in which young men fall in love with piano playing automata to A.I. characters in movie series and cinema.\r\nThis talk tries to explore the relations between design and perception of machines and the dynamics in between.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8405, 
                                        "public_name": "Polaris"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9532.html", 
                                "id": 9532, 
                                "guid": "362172c1-b637-48e8-ae2a-1fa40391b160", 
                                "logo": null, 
                                "date": "2018-12-30T12:50:00+01:00", 
                                "start": "12:50", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9532-kernel_tracing_with_ebpf", 
                                "title": "Kernel Tracing With eBPF", 
                                "subtitle": "Unlocking God Mode on Linux", 
                                "track": "Security", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Have you ever wanted to trace all syscalls or dump all IPC traffic across a Linux system? Until recently, doing so may have required some significant setup involving a half-baked tracing kernel module, a custom kernel module, or even using a kernel debugger. This talk will introduce the eBPF functionality of the Linux kernel and cover practical uses of the technology beyond mere code profiling. We will show how eBPF can be used both defensively and offensively to protect, or compromise, a system.\r\n\r\nThis talk will primarily focus on using eBPF to dynamically instrument kernel functionality and gain deep insight on the workings of both kernel and userspace code across a running system. Attendees will leave with practical knowledge for using eBPF to (performantly) watch every action taken on a running system and make processes reveal their secrets.", 
                                "description": "eBPF (or \"extended\" Berkeley Packet Filter) is a bytecode and virtual machine used as a safe computing environment within the Linux kernel to perform arbitrary programmatic actions. It is a redesign of the original BPF bytecode VM used, typically in userspace, to power features like tcpdump filters. eBPF has an entirely different set of capabilities and instructions, with its primary goal being to serve as a JIT-able virtual machine instruction set that can be targeted by compilers of a memory-safe \"restricted C\" language. In the Linux kernel BPF and eBPF have been applied to various different kernel features, from programmatic syscall filtering (for sandboxing) to performing efficient custom packet processing inline on the kernel's network data plane.\r\n\r\nIn this talk, we will first introduce and briefly discuss the internals of the eBPF implementation in the Linux kernel, its features, and the current set of components that it may be integrated with. We will also briefly cover how eBPF does not intrinsically make C code secure and demonstrate how using eBPF instead of other, more mature, technologies may introduce vulnerabilities.\r\n\r\nThe majority of this talk will focus on using eBPF to trace kernel functions to inspect both kernel and userland code and the data that flows through them. In line with this goal, this talk will cover pragmatic approaches to using eBPF and the non-idiomatic coding styles required to perform useful tasks in eBPF's sandbox. Additionally, while the aim of this talk is to cover the capabilities of \"vanilla\" eBPF, we will also demonstrate how the kernel may be trivially modified to lift the constraints of the eBPF sandbox when one does not have the time to tiptoe around the bytecode validator (or seeks to use eBPF as a drop-in replacement for kernel modules).\r\n\r\nLastly, this talk will show that while eBPF may generally be \"safe\" for the kernel itself, it is decidedly not when applied to userspace code. We will conclude this talk by demonstrating a general purpose privilege escalation technique that may be used by privileged users to hop namespacing and escape certain container configurations using nothing but eBPF.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7551, 
                                        "public_name": "Jeff Dileo"
                                    }, 
                                    {
                                        "id": 8366, 
                                        "public_name": "Andy Olsen"
                                    }
                                ], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/729/original/Kernel_Tracing_With_eBPF.pdf?1546315681", 
                                        "title": "Slides"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9623.html", 
                                "id": 9623, 
                                "guid": "ba68f092-89bd-4348-9f81-7a05317a0497", 
                                "logo": null, 
                                "date": "2018-12-30T14:10:00+01:00", 
                                "start": "14:10", 
                                "duration": "01:00", 
                                "room": "Dijkstra", 
                                "slug": "35c3-9623-augmented_reality_bridging_the_gap_between_the_physical_and_the_digital_world", 
                                "title": "Augmented Reality: Bridging the gap between the physical and the digital world", 
                                "subtitle": "", 
                                "track": "Science", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "There has been a lot of talk about Virtual Reality (VR), but still there are very little applications to enhance our everyday lives outside of entertainment. Augmented Reality (AR), the less known sibling of VR, has the power to have a more profound impact on our lives than VR ever could. Instead of replacing the real world with a virtual one, AR enhances the reality with virtual content. Therefore, AR can be a gateway for people in accessing and understanding todays technology and could provide vast possibilities to support our everyday lives, e.g., for navigation, traveling, or education.\r\nThis talk will give an overview on AR in general and explain its possible benefits and use cases, as well as the issues that may arise, e.g., regarding privacy, data security, as well as psychological and sociological challenges. The talk requires no special knowledge and is suited for people with little exposure to AR and mixed reality, but it will also give insights into current relevant research and development.", 
                                "description": "The recent renaissance and the technical advance brought Virtual Reality (VR) into the spotlight of the mainstream media and led to many promises of a upcoming VR revolution. But despite the abundance of VR headsets, the profund impact into our everyday lives is still not on the horizon. However, hidden in the shadows of VR, Augmented Reality (AR) has a much higher potential to change our lives. In contrast to VR, which aims to replace our physical reality with a virtual one, AR expands our physical world with virtual content. While VR disconnects us from the world, AR bridges the gap between the real and the digital world.\r\n\r\nResearch in last decades focused mostly on specialized and professional use, e.g., in medicine or the industry. Nonetheless, there are a lot of applications for everyday usage, like navigation, traveling, education, and others. Probably the most important promise of AR is that it can help mend the ever increasing breach between humans and technology. Todays technical systems are often to complex, processes to distributed for humans to fully understand the function and state of systems. With AR we can superimpose these information directly on our physical world, visualizing data flows and connections, and make technology understandable again.\r\n\r\nDespite these opportunities to improve our lives, AR also harbors possible dangers for our society. Looking at the development of the smartphone ecosystems, there will very likely be a few closed systems controlled by their respective globally operating manufacturer. The Microsoft HoloLens is an early example of this likely trend with supporting only  applications of windows universal platform. This implies the danger that these concerns have a vast control over the devices itself and with AR could literally dictate what we are allowed to see and what not. Privacy is also an important factor. To function in a satisfactory manner, AR headsets need a very good positional tracking and a video feed of what the user is currently seeing. To make sense of these informations, cloud-services will very likely be involved. This means sending what is basically a live feed of a persons live to somewhere in the vast expanse of the web. It's very hard to think of data that is any more sensitive than this. Therefore the challenge is how to make sure the data is handled responsibly and remains in the control of the user. Furthermore, AR can also be used for services, which are not in the best interest of the user, like personalized advertisements that, in a worst case scenario, could be superimposed on any surface. Last but not least, there are also some psychological and sociological challenges in the regard of how AR could influence our understanding of the world and how we interact which each other. This is an important question with our current use of smartphones, it becomes even more important when AR has entered our everyday lives.\r\n\r\nAll of this makes Augmented Reality one of the most interesting areas of the current technical development. Therefore, it is important to get an understanding of what it is all about, which is exactly the goal of this talk. Besides a short definition and overview of the historical context and the current state-of-the-art, the talk will introduce a possible scenario of how AR can influence our everyday lives, which is based on the raise of the smartphone to the ubiquitous device it is today. We will hopefully close with an interesting question and answer session, where we can discuss some aspects even further.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8081, 
                                        "public_name": "preip"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Eliza": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9774.html", 
                                "id": 9774, 
                                "guid": "29febf04-4e28-4420-b159-d22634c6817e", 
                                "logo": "/system/events/logos/000/009/774/large/9.jpg?1539613952", 
                                "date": "2018-12-30T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9774-radical_digital_painting", 
                                "title": "Radical Digital Painting", 
                                "subtitle": "Fantastic Media Manipulation", 
                                "track": "Art & Culture", 
                                "type": "lecture", 
                                "language": "en", 
                                "abstract": "Radical Digital Painting groups and presents several ideas and artifacts related to contemporary painting and contextualizes its connection to historical processes and digital technology. It is inspired by and is a continuation of Radical Computer Music.", 
                                "description": "Through demonstrative, interactive performance lectures, American artist and educator Jeffrey Alan Scudder presents homegrown software inventions and new theories about painting and picture making. \r\n\r\nHe has performed 60 times since 2016 across the US and Europe, mostly in art schools for students, and often with collaborators Goodiepal, Casey REAS, Julia Yerger, and Artur Erman.\r\n\r\nA Google search for \u201cdigital painting\u201d today mostly brings up Photoshop tutorials related to translating age old representational painting techniques to computational media, but the topic of digital painting has much more to offer fine arts in terms of poetry and theory.\r\n\r\nPainting software today has largely developed out of a need for traditional artists to keep up pace of work in large scale mass media production pipelines, like those of video games and movies. Few systems have been developed to explore the spontaneity and spirituality present in modernism and contemporary art and further develop the language of painting in general. \r\n\r\nJeffrey has created several programs that highlight abstract expressivity, play, and improvisation over production quality and technical control.\r\n\r\nIn addition to software demos, new theoretical models of image resolution, computer literacy, and picture making are illustrated, described, and connected to the history of abstraction in drawing and painting. New ways of approaching drawing are also presented. \r\n\r\nHe presently spends all his time traveling, performing, and continuing to develop his software and media performances.\r\n\r\nAs of Summer and Fall 2018 he is traveling and lecturing with the Danish composer Goodiepal and his band GP&PLS throughout Europe. Jeffrey\u2019s work Ten Minute Painting is now a part of the International Goodiepal Collection at the SMK Statens Museum for Kunst in Copenhagen, Denmark.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8584, 
                                        "public_name": "Jeffrey Alan Scudder"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "https://docs.google.com/document/d/170R26_4n3uQ_tlhGEWZZbsWssnwz6441ndqEQDSah2U/edit?usp=sharing", 
                                        "title": "Summary / Media"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9343.html", 
                                "id": 9343, 
                                "guid": "52ce1398-fa9b-4bd3-aa9e-6a49a764ac2c", 
                                "logo": "/system/events/logos/000/009/343/large/logo-weiss.jpg?1536683965", 
                                "date": "2018-12-30T12:30:00+01:00", 
                                "start": "12:30", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9343-court_in_the_akten", 
                                "title": "Court in the Akten", 
                                "subtitle": "OpenSchufa und OffeneGesetze", 
                                "track": "Ethics, Society & Politics", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Private Unternehmen m\u00fcssen nicht so transparent sein wie Beh\u00f6rden - selbst wenn sie sich wie Beh\u00f6rden benehmen. \r\nWelche Mittel k\u00f6nnen wir nutzen, um trotzdem Lichts ins Dunkel der Konzerne zu bringen? Wir stellen zwei Projekte mit unterschiedlichen Herangehensweise vor: Zum einen OpenSchufa, das das Scoring-Verfahren der Schufa rekonstruieren soll und erste Ergebnisse vorstellen kann. Zum anderen OffeneGesetze, das alle Bundesgesetzbl\u00e4tter seit 1949 erstmals kostenfrei und zur freien Weiterverwendung bereitstellt und jetzt daf\u00fcr m\u00f6glicherweise verklagt wird.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 5605, 
                                        "public_name": "Arne Semsrott"
                                    }
                                ], 
                                "links": [
                                    {
                                        "url": "FragDenStaat.de", 
                                        "title": "FragDenStaat"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9868.html", 
                                "id": 9868, 
                                "guid": "23d0c7cd-5472-4e73-ace6-94209981ecf8", 
                                "logo": null, 
                                "date": "2018-12-30T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "00:40", 
                                "room": "Eliza", 
                                "slug": "35c3-9868-kickstart_the_chaos_hackerspace_grunden_fur_anfanger", 
                                "title": "Kickstart the Chaos: Hackerspace gr\u00fcnden f\u00fcr Anf\u00e4nger", 
                                "subtitle": "Ein Erfahrungsbericht aus unbetreuter Vereinsmeierei", 
                                "track": "CCC", 
                                "type": "lecture", 
                                "language": "de", 
                                "abstract": "Laut Mythos wurde der CCC nur zu einem Verein, weil als einzige andere Rechtsform nur noch die kriminelle Vereinigung zur Alternative stand. Damit es bei euch nicht soweit kommt zeigen wir euch wie ihr bequem aus eurem Interessensverband, der Brettspielgruppe oder dem Nerdstammtisch einen guten deutschen e.V. macht. Alles mit einer Prise Humor aus unserem eigenen Versagen und einer Gemeinn\u00fctzigkeit als Kirsche obendrauf.", 
                                "description": "Was macht eigentlich ein Vorstand? Ist Kassenwart sein nicht voll viel Papierkram? Wie mache ich jetzt richtige Beitrittserkl\u00e4rungen?\r\nAlles Fragen die unser eins gerne davon abhalten einen richtigen Verein zu gr\u00fcnden. Wenn man sich aber kurz in das Abenteuer Vereinsrecht st\u00fcrzt hat man am Ende ein klasse Tool in der Werkzeugkiste um noch fantastischer im Hackerspace zusammen an Projekten arbeiten zu k\u00f6nnen.\r\nWir sprechen dabei aus teilweise schmerzlicher, teilweise lustiger Erfahrung. Samuel und Thorben waren beteiligt an der Gr\u00fcndung und Entwicklung mehrerer Vereine. In den letzteren Versuchen dann auch mit mehr Erfolg. So existiert und floriert bis heute auch der Chaostreff Flensburg e. V., an dessen Geschichte wir euch zeigen wollen wie ihr einen Hackerspace oder \u00e4hnliches auf die Beine stellen k\u00f6nnt, wo ihr ihn beheimatet, wie ihr Mitglieder gewinnt, eine Community schafft und auch das n\u00f6tige Kleingeld f\u00fcr eure Projekte zusammenkratzt. Was f\u00fcr Tools und Technik k\u00f6nnt ihr auf eure Probleme werfen und wo hilft der Gang zum befreundeten Steuerberater? Und wie kann man \u00fcberhaupt ein Teil des gro\u00dfen Chaos werden, ohne \u00fcberhaupt nur eine Seele dabei zu haben die wei\u00df worum es geht? Und wie kann ich mein erstes kleines Event starten?\r\nDen n\u00f6tigen Papierkram f\u00fcr Gr\u00fcndung, Beitritte und Versammlungen bringen wir euch nat\u00fcrlich zum Kopieren und benutzen mit.\r\nFreut euch auf eine humoristische Mischung aus gut gemeinter Inkompetenz und gemeinn\u00fctzigen Papierschlachten. Danach wollt auch ihr Vereinsmeier werden.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 8386, 
                                        "public_name": "Thorben Dittmar"
                                    }, 
                                    {
                                        "id": 8651, 
                                        "public_name": "Samuel Brinkmann"
                                    }
                                ], 
                                "links": [], 
                                "attachments": []
                            }
                        ], 
                        "Lecture room 11": [], 
                        "Seminar room 14-15": [], 
                        "Seminar room 13": [], 
                        "Lecture room M1": [], 
                        "Lecture room M2": [], 
                        "Lecture room M3": [], 
                        "Kidspace": [], 
                        "CCL Saal 3": [], 
                        "Chaos West B\u00fchne": [
                            {
                                "id": 116, 
                                "guid": "94644686-b92d-5c42-bfdc-0a10a5a62672", 
                                "logo": null, 
                                "date": "2018-12-30T00:00:00+01:00", 
                                "start": "00:00", 
                                "duration": "02:00", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "KCQ7PR", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/KCQ7PR", 
                                "title": "CTF Afterparty: Project Poltergeist ft. VJ Pyree", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Klangteppich", 
                                "language": "de", 
                                "abstract": "Wie letztes Jahr wird es wieder ein spezielles Set auf der Chaos West B\u00fchne zur CTF Afterparty geben. \r\nEs wird intensiv elektronisch und tanzbar mit Techno, Hard Electro, Psytrance, Drum and Bass und \u00e4hnlichem.\r\n&\r\nReal-time generated visuals combined with live (shader) coding. I use a self-written OpenGL engine written in Python that can hotload both python and shader code to create an ever evolving visual landscape.", 
                                "description": "Herzlich Willkommen zur dieses Jahr erstmals offiziellen CTF-Aftershowparty. \r\nNachdem letztes Jahr so ein Erfolg war, ist die Wiederholung dieses Jahr selbstverst\u00e4ndlich.\r\nStatt dem Hirn und Augen sind jetzt Ohren und F\u00fc\u00dfe gefragt: Mit einem Mix aus Techno, Psytrance, Hard Dance und Artverwandtem.\r\nLasst euch ein bisschen \u00fcberraschen, es wird auf jeden Fall elektronisch und auf jeden Fall extrem tanzbar. \r\nAls coolen Zusatz gibt es Live Shaderprogrammierung von VJ Pyree obendrauf. \r\nKommt also zur Chaos-West B\u00fchne und lasst die Nacht voller Energie ausklingen zu lassen!", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 28, 
                                        "name": "Alexeyan", 
                                        "biography": "CTF-Spieler und DJ\r\nhttps://twitter.com/Alexeyan2\r\nhttps://www.mixcloud.com/Alexeyan/", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 10, 
                                        "name": "DrLuke", 
                                        "biography": "I am VJ Pyree", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 115, 
                                "guid": "513a294c-0102-5ccb-83e5-a0788c1107bf", 
                                "logo": null, 
                                "date": "2018-12-30T02:00:00+01:00", 
                                "start": "02:00", 
                                "duration": "02:00", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "FE8ABF", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/FE8ABF", 
                                "title": "Techno/Techhouse Set", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Klangteppich", 
                                "language": "de", 
                                "abstract": "Techno/Techhouse Set by dray", 
                                "description": "Techno/Techhouse Set, vermutlich vom Stil zwischen Johnny Aemkel und Tiari, k\u00f6nnte sich aber auch noch ein wenig \u00e4ndern.", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 27, 
                                        "name": "dray", 
                                        "biography": "TBD", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 146, 
                                "guid": "b05b0e85-eb2a-509f-b87b-0a00fcec76d0", 
                                "logo": null, 
                                "date": "2018-12-30T04:00:00+01:00", 
                                "start": "04:00", 
                                "duration": "02:00", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "9YUVFS", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/9YUVFS", 
                                "title": "Technoid mit Juli Jane", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Klangteppich", 
                                "language": "de", 
                                "abstract": "Technoide Musik live gemixt von Juli Jane.", 
                                "description": "Technoide Musik im Live-DJ-Mix von Juli Jane\r\n\r\nEine bunte Mischung von Techno, Tech-House, Deep-House und/oder \u00e4hnlichen elektronischen Genres. \r\n\r\n* Set vom 34C3 im Electric Cube: https://soundcloud.com/juli_jane/nerds-can-dance\r\n* Set vom EMF Camp 2018: https://soundcloud.com/juli_jane/roadtrip\r\n* Mehr Sets und eigenproduzierte Tracks: https://soundcloud.com/juli_jane\r\n\r\nZuvor zu h\u00f6ren u.a. bei:\r\n\r\n* CCC Camp 2015 - Chaos West\r\n* 32C3 - Chaos West Klangteppich\r\n* SHA2017 - Chaos West,  GeraFFel und Mainfloor\r\n* 34C3 - Electric Cube\r\n* EMF Camp 2018 - Null Sector", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 61, 
                                        "name": "Juli Jane", 
                                        "biography": "CCC-Veteranin, Nerdette und DJane/Produzentin.\r\n\r\nMehr chaosrelevante Details: https://wiki.das-labor.org/w/Benutzerin:Julijane", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 107, 
                                "guid": "f106b309-ffa8-5800-b9bf-00acb573e48c", 
                                "logo": null, 
                                "date": "2018-12-30T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "00:20", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "THQZWQ", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/THQZWQ", 
                                "title": "Eine Einf\u00fchrung in Bildschirmtext", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Einfacher Slot mit optionalen Q+A", 
                                "language": "de", 
                                "abstract": "Bildschirmtext war der Onlinedienst f\u00fcr Konsumenten bei der Post. Dieser Talk f\u00fchrt in die Technik dahinter ein und soll auch zeigen war man daraus f\u00fcr einen Web-Nachfolger wiederverwenden kann, und was man \u00e4ndern m\u00fcsste.", 
                                "description": "Bildschirmtext ist nun schon seit 15 Jahre abgeschaltet. Wie bei jeder alten Technik spiegelt die Technik jedoch ihre Zeit wieder und zeigt gleichzeitig M\u00f6glichkeiten f\u00fcr die Zukunft auf.\r\n\r\nBildschirmtext ist einerseits simpel genug, dass es von Einzelpersonen weitgehend implementiert werden kann, andererseits jedoch vielseitig genug um moderne Features einzubetten. Die Standards hinter Bildschirmtext sahen bereits hoch aufgel\u00f6ste Fotos, Vektorgraphiken, Datei\u00fcbertragungen und Audio vor. Mit den gleichen Mechanismen von damals k\u00f6nnte man heute Video realisieren. Im Gegensatz zum Web, bei dem die Browser inzwischen Gigabytes an RAM ben\u00f6tigen, kann man ein simples Videotextterminal in einem mittelgro\u00dfen AT-Mega implementieren.\r\n\r\nDaf\u00fcr muss man nat\u00fcrlich irgendwo anfangen. Deshalb habe ich vor ein kleines BTX-System aufzusetzen . Der Code daf\u00fcr ist hier https://github.com/Casandro/cas_btx und wird dann (hoffentlich) per IP und DECT erreichbar sein. Dieses System hat einen primitiven Editor f\u00fcr BTX-Seiten und ist als Startpunkt f\u00fcr weitere Entwicklungen gedacht.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 14, 
                                        "name": "Christian Berger", 
                                        "biography": "Elektroingenieur der Nachrichtentechnik aus Leidenschaft mit einem Hang zur Technikgeschichte.\r\n\r\nBislang habe ich 5 Artikel von unterschiedlicher Qualit\u00e4t in 2600 ver\u00f6ffentlicht. (Pseudonym Casandro) In der \u00fcbern\u00e4chsten Datenschleuder wird voraussichtlich ein Artikel von mir \u00fcber den T.30 Faxstandard sein.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 143, 
                                "guid": "afa54ff4-f64e-5426-b822-50342f5d4ce9", 
                                "logo": null, 
                                "date": "2018-12-30T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "RDVAAZ", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/RDVAAZ", 
                                "title": "Informationssicherheit & IT-Risikomanagement am Beispiel der Bank B", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Gerade im Bereich der IT halten externe Berater (und auch Mitarbeiter) sich oft mehr oder weniger an den Vorgaben der Aufsicht fest. So manch einer hat keine Ahnung, ob das eigentlich zielf\u00fchrend ist - und von was redet der Techniker am anderen Ende des Tisches da eigentlich?!?!!!??? Garniert mit eigenen Anekdoten, kleinen fiktiven Beispielen und absolut tauglich f\u00fcr Anf\u00e4nger: Informationssicherheit & IT-Risikomanagement am Beispiel der Bank B!", 
                                "description": "Zum Aufw\u00e4rmen: Datenschutz und Informationssicherheit. Wo ist der Unterschied? Dann die drei Schutzziele Vertrautlichkeit / Integrit\u00e4t / Verf\u00fcgbarkeit am Anfang des Regelkreises zur Informationssicherheit: welchen Schutzbedarf haben meine Informationen? Welche Prozesse wirken darauf ein? Auf welchem Server liegen die Informationen eigentlich? Hat meine Anwendung eine Schnittstelle? Warum stellen diese Leute immer so viele Fragen? Bisher ist doch auch nichts passiert? Dann mach ich halt mal was.... sp\u00e4testens an dieser Stelle atme ich normalerweise tief durch. Dann kommt n\u00e4mlich der Part, an dem erkl\u00e4rt wird: n\u00f6, ist nicht. \r\n\r\nWenn dann wei\u00dfer Rauch aufsteigt, und alle irgendwie zufrieden sind, kommt das Restrisiko. Wie, noch mehr zu tun?! Ja! Dann werden Risiken eingestellt, bewertet, und \"gemanaged\", berichtet, abgelehnt, verloren, wiedergefunden, mitigiert und irgendwie zu einem eigenen S\u00fcppchen gekocht. Dabei k\u00f6nnte es so sch\u00f6n sein (vollst\u00e4ndiges, adressatengerechtes Reporting *h\u00fcstel*). Der zweite Teil beinhaltet dann also die Risikoanalyse. \u00dcber die Kl\u00e4rung, was eigentlich ein Risiko und eine Bedrohung ist, quantifizierter vs. qualifiziertes Ansatz, Risikobehandlung, Eintrittswahrscheinlichkeit & Schadensh\u00f6he.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 59, 
                                        "name": "Diula", 
                                        "biography": "Chaosdorf-Member <3 mit Vorliebe f\u00fcr Informationssicherheit, Prozesse und Anweisungen. Findet gerne heraus wie Dinge funktionieren, stellt Fragen und dokumentiert die Ergebnisse. Im Finanzbereich unterwegs.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 137, 
                                "guid": "166b7efd-99a0-5105-bc44-6aaa1abea911", 
                                "logo": null, 
                                "date": "2018-12-30T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "ER9F8B", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/ER9F8B", 
                                "title": "Hacker eG - Genossenschaft f\u00fcr chaosnahes Wirtschaften", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "# Hacker eG\r\n* Eine Genossenschaft f\u00fcr chaosnahes Wirtschaften\r\n\r\nViele von uns brauchen neben ihrem allt\u00e4glichen Broterwerb eine Genossenschaft, die uns geh\u00f6rt und uns bei Bedarf sogar nebenbei anstellt. Viele von uns wissen nicht, dass das so ist und warum. Dieser Vortrag erkl\u00e4rt die Zusammenh\u00e4nge und das Vorhaben.", 
                                "description": "Viele von uns haben einen Voll- oder Teilzeitjob zum t\u00e4glichen Broterwerb und tun daneben gutes im Chaos und dar\u00fcber hinaus. Manchmal w\u00fcrde man daf\u00fcr auch gern etwas Geld nehmen und auch gern bekommen - und nimmt dann doch keins, weil man dann ja ein Gewerbe anmelden, ein Unternehmen gr\u00fcnden, Nebent\u00e4tigkeiten genehmigen lassen m\u00fcsste, Steuerberater besch\u00e4ftigen usw. usf.\r\nSo mancher von uns braucht nur mal zwischendurch eine Firma. F\u00fcr ein cooles Projekt, den Containerimport aus China, oder zur \u00dcberbr\u00fcckung zwischen zwei Jobs. Erst gr\u00fcnden und dann wieder abwickeln lohnt sich oft nicht. \r\nOder man m\u00f6chte das zugeworfene Kleingeld f\u00fcr gef\u00e4llige Dienste rechtssicher und steuerehrlich in einen solidarischen Topf geben.\r\nManchmal kann man auch F\u00f6rdermittel f\u00fcr Projekte bekommen - wenn man denn nicht \"nur\" ein kleiner Freelancer ist.\r\n\r\nF\u00fcr alles das gibt es seit 150 Jahren eine L\u00f6sung. Nennt sich Genossenschaft. Ist ein bisschen aufw\u00e4ndig. Jedenfalls f\u00fcr einen alleine. Auch f\u00fcr 10 Leute. Aber nicht f\u00fcr 100 von uns. \r\n\r\nTun wir uns zusammen.\r\n\r\nGrundsatzinfos: [https://de.wikipedia.org/wiki/Genossenschaft](https://de.wikipedia.org/wiki/Genossenschaft)\r\n\r\nund bald auch konkret hier: [hkbl.de](http://hkbl.de)\r\n\r\nRegistrierung als Gr\u00fcndungsinteressent: Leere Mail mit Betreff \"Interesse\" an geno@damals-tm-podcast.de", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 50, 
                                        "name": "ajuvo", 
                                        "biography": "## Privatier und Zeitzeuge. \r\n\r\n*Ich mache ehrenamtlich Vortr\u00e4ge, Workshops, B\u00fccher, Radio und Podcasts.  Lange Jahre habe ich international Unternehmen, Organisationen und Regierungen beraten, war Diplomat, Lobbyist, Wissenschaftler, akademischer Lehrer und Radiomacher. Alter Sack (tm). \r\n\r\nRadio Hyperbandrauschen auf Berlin 88.4 ;  Podcaster damals-tm-podcast.de ; c-base; c3d2; 0x56686607E8A7D407; Z6X3DTSM; DECT 3370; @ajuvo@chaos.social ; \r\n\r\nzur Zeit Chaospate f\u00fcr Chaos Potsdam \r\n\r\nURL: [crew.c-base.org](https://ajuvo.crew.c-base.org/)", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 51, 
                                        "name": "therojam", 
                                        "biography": "Bone shortly after. The Wallmanns down in the ChaosZone near Elbe.\r\nToday working in Linux & OpenSource branch as Consultant & Supporter.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 156, 
                                "guid": "68619725-72ae-5645-8b6c-8e645e5d9c47", 
                                "logo": null, 
                                "date": "2018-12-30T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "MRKBBU", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/MRKBBU", 
                                "title": "It's not rocket science", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "en", 
                                "abstract": "Space is hard, but not that hard. Despite progress in technology, and cheaper rockets, science in space is becoming ever more expensive. Even copies of old missions now cost 2-4x as much. Better solutions are available, some taken straight from smartphones and consumer cameras.", 
                                "description": "Satellite hardware is not magic dust. It's a piece of electronics in a somewhat exotic environment. These days, hardware development has progressed to the point where off-the-shelf hardware can be used in space.  Improving performance, while cutting costs to a fraction. \r\n\r\nProfessional star trackers cost several hundred thousand dollars a piece. But it is just a simple camera and the necessary software to find and track star constellations. Consumer hardware, like CPUs and camera chips, is essentially space-rated by default. Silicon-on-insulator used to be special hardware for radiation environments, but is now used in consumer electronics. \r\n\r\nCheaper rockets became possible by pragmatic rocket engineering, notably by SpaceX but also Russian rockets still flying today. The ideas had been around for a long time. European, Chinese and Indian Launcher provide some examples on how to achieve reductions in launch cost and how not to achieve them.\r\n\r\nCheaper rockets in many cases also allow higher mass to be traded for lower prices. Larger margins reduce work for quality control and modular systems reuse old engineering hardware in new missions. Higher satellite mass become increasingly acceptable, if they reduce development and manufacturing cost. And none of this is rocket science.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 69, 
                                        "name": "Frank Wunderlich-Pfeiffer", 
                                        "biography": "I'm a journalist working for [Golem.de] (https://www.golem.de/specials/autor-frank-wunderlich-pfeiffer/) Covering spaceflight and other topics in science and technology.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 165, 
                                "guid": "c5f243d8-21be-5ee9-8cae-5310dc689191", 
                                "logo": null, 
                                "date": "2018-12-30T16:10:00+01:00", 
                                "start": "16:10", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "7DQX77", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/7DQX77", 
                                "title": "Security Nightmares [Streaming]", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Security Nightmares Streaming", 
                                "description": "Security Nightmares Streaming", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 82, 
                                        "name": "35C3", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 135, 
                                "guid": "e1b0a80b-4da3-5a16-983f-97ea88b56d1e", 
                                "logo": null, 
                                "date": "2018-12-30T17:10:00+01:00", 
                                "start": "17:10", 
                                "duration": "00:50", 
                                "room": "Chaos West B\u00fchne", 
                                "slug": "RMQHYM", 
                                "url": "https://fahrplan.chaos-west.de/35c3chaoswest/talk/RMQHYM", 
                                "title": "Closing [Streaming]", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Doppelter Slot 40 Minuten + 10 Minuten Q+A", 
                                "language": "de", 
                                "abstract": "Streaming des offiziellen Closing Events", 
                                "description": "Streaming des offiziellen Closing Events", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 82, 
                                        "name": "35C3", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "ChaosZone": [
                            {
                                "id": 723, 
                                "guid": "2020b8e5-6239-56db-a943-08d739bb83ed", 
                                "logo": null, 
                                "date": "2018-12-30T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "CR8PGP", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/CR8PGP", 
                                "title": "Die Alpha", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "de", 
                                "abstract": "Demo einer Alphastation mit 21064 Prozessor. Dazu Infos \u00fcber die Geschichte des Alpha-Prozessors und wie digital drin h\u00e4ngt/gehangen ist. Sowie Eckdaten zum Alpha", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 26, 
                                        "name": "robert0k", 
                                        "biography": "Softwareentwickler, Informatiker und Mitglied des chch.it Chemnitz", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 717, 
                                "guid": "a3f657ab-f9d6-5af0-9f54-2121dc894491", 
                                "logo": null, 
                                "date": "2018-12-30T17:10:00+01:00", 
                                "start": "17:10", 
                                "duration": "01:00", 
                                "room": "ChaosZone", 
                                "slug": "L8MWNG", 
                                "url": "https://cfp.chaoszone.cz/35c3/talk/L8MWNG", 
                                "title": "livestream - Closing Ceremony", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Session 60min", 
                                "language": "en", 
                                "abstract": "Livestream from the 35C3 Closing Ceremony", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 20, 
                                        "name": "livestream", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Vortrags-Arena": [
                            {
                                "id": 304, 
                                "guid": "7db71e6b-183a-55cf-b1eb-4bbf104ec505", 
                                "logo": "", 
                                "date": "2018-12-30T11:00:00+01:00", 
                                "start": "11:00", 
                                "duration": "00:30", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "R3DGAF", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/R3DGAF/", 
                                "title": "OIO habour clean up  - Day 3", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "OIO Housekeeping", 
                                "language": "en", 
                                "abstract": "OIO habour clean up", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 93, 
                                        "code": "HUQ9YA", 
                                        "public_name": "35c3oio@freifunk.space", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 282, 
                                "guid": "07ca3e82-b108-5267-9c00-6aa584c24a12", 
                                "logo": "", 
                                "date": "2018-12-30T11:30:00+01:00", 
                                "start": "11:30", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "SQXVCE", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/SQXVCE/", 
                                "title": "OIO Daily Standup day 4", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "Let's start into day 4", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 6, 
                                        "code": "HFER8G", 
                                        "public_name": "Andreas Dorfer", 
                                        "biography": "https://forum.freifunk.net/u/adorfer/", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 262, 
                                "guid": "9ae91188-8de6-5003-83b1-0c2e6efc9cc5", 
                                "logo": "", 
                                "date": "2018-12-30T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "M9VQA9", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/M9VQA9/", 
                                "title": "Why VPN? Freifunk via L2-BSA.", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "Why hassle with the VPN-Overhead. With the availability of commodity SV-VDSL Hardware in Gluon , it\u2019s now possible to replace Mesh-VPN with Mesh-DSL. What we learned in the process and how major projects and wireless backbone networks in particular can benefit from a \"VPN-free\" solution.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 53, 
                                        "code": "SB9DGB", 
                                        "public_name": "skorpy", 
                                        "biography": "Below 1GE? Do not touch it!", 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 54, 
                                        "code": "C9EY9L", 
                                        "public_name": "herrbett", 
                                        "biography": "Freifunk Karlsruhe", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 215, 
                                "guid": "fcf859a5-a914-5ac2-98c6-66af0328bd6f", 
                                "logo": "", 
                                "date": "2018-12-30T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "AYUMLK", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/AYUMLK/", 
                                "title": "Distributed DHCP", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "In mesh networks clients stay in separated ethernets. We developed and implemented a distributed dhcp algorithm so our mesh nodes now can serve dhcp directly while maintaining a consensus about leases of the same subnet.", 
                                "description": "In mesh networks, you can either run central dhcp servers or run them on the mesh nodes and have some administrative control about the served subnets, but those then scattered dhcp servers have no consensus\r\nabout the whole lease state and thus are not able to renew leases of roamed clients.\r\n\r\nOur algorithm, implemented in the ddhcpd addresses these problems:\r\nIt coordinates the served leases automatically, so you need no administrative control entity. And\r\nit allows roamed clients to renew and keep their IP addresses, through a forwarding mechanism.\r\n\r\nThe talk will be about the theoretical concept, the state of our implementation in ddhcpd and practical experience. \r\n\r\nDDHCPD: https://github.com/sargon/ddhcpd\r\nGluon Packet: https://github.com/sargon/gluon-sargon/tree/v2018.x/ddhcpd", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 15, 
                                        "code": "KMR7N8", 
                                        "public_name": "Daniel Ehlers", 
                                        "biography": "informatics network guy with interests in combinatoric algorithms.", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 284, 
                                "guid": "065f190a-06ca-5a79-8190-4abc4fd4f8be", 
                                "logo": "", 
                                "date": "2018-12-30T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "00:20", 
                                "room": "OIO Vortrags-Arena", 
                                "slug": "CEMDER", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/CEMDER/", 
                                "title": "OIO Closing Session", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk 20min total (etwa 5min  Q&A)", 
                                "language": "en", 
                                "abstract": "Shutdown notice", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 7, 
                                        "code": "USJAK9", 
                                        "public_name": "Andreas Br\u00e4u", 
                                        "biography": "Freifunker since 2006", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "OIO Workshop-Domo": [
                            {
                                "id": 319, 
                                "guid": "adb46547-e787-500d-807b-d373fad6cde9", 
                                "logo": "", 
                                "date": "2018-12-30T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "01:00", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "FTFSBU", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/FTFSBU/", 
                                "title": "ELECTRIC CARS, USE IT, HACK IT, TALK ABOUT IT", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 45min", 
                                "language": "en", 
                                "abstract": "Let's talk about computers on wheels. Electric cars. Let talk about experiences, hardware, software, hacking cars, coding cars.\r\n\r\nNo presentation, just talk about experiences, ideas, problems and solutions.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 104, 
                                        "code": "SAXFNS", 
                                        "public_name": "Morris Jobke", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 285, 
                                "guid": "9fbdc7f9-97d6-56b9-a082-f2581a307401", 
                                "logo": "", 
                                "date": "2018-12-30T15:30:00+01:00", 
                                "start": "15:30", 
                                "duration": "01:20", 
                                "room": "OIO Workshop-Domo", 
                                "slug": "WNYZ7A", 
                                "url": "https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WNYZ7A/", 
                                "title": "Freifunk-Workshop: bessere Vorschl\u00e4ge als \"weiter so\" f\u00fcr 2019?", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop 80min", 
                                "language": "de", 
                                "abstract": "Eine Diskussion: Weniger Nachfrage, unzeitgem\u00e4\u00dfe Performance, Adminfrust, erkl\u00e4rungsbed\u00fcrftige Hardware-Situation: Was k\u00f6nnen wir anders machen in den etablierten Communities. Visionen oder schlicht Ans\u00e4tze", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 6, 
                                        "code": "HFER8G", 
                                        "public_name": "Andreas Dorfer", 
                                        "biography": "https://forum.freifunk.net/u/adorfer/", 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "WikiPakaWG Esszimmer": [
                            {
                                "id": 529, 
                                "guid": "2ef1d870-f2b1-583b-98c6-09574123a90f", 
                                "logo": "", 
                                "date": "2018-12-30T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:45", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "K7G8NX", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/K7G8NX/", 
                                "title": "HackspaceDesignPatterns", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "de", 
                                "abstract": "\"Wir brauchen einen Hackspace.\"\r\nMit dieser Aussage beginnt alles.\r\nAber was ist notwendig, um diese Idee Wirklichkeit werden zu lassen? Einen geeigneten Ort finden, b\u00fcrokratische und finanzielle H\u00fcrden, Raumgestaltung, die Gemeinschaft in Ihrem Raum zusammenhalten ... Es gibt eine Menge Dinge, die man beachten sollte.\r\nMit Hilfe von Design Patterns zeigen wir Euch, wie Ihr Euren eigenen Hackspace aufbauen k\u00f6nnt.\r\n\r\nDer Hackspace Design Pattern Catalogue wurde erstmals auf der 24C3 vorgestellt. Seitdem sind die HackspaceDesignPatterns DAS Handbuch zum Einrichten eines eigenen Hackspace geworden. Jetzt, \u00fcber 10 Jahre sp\u00e4ter, glauben wir ist es an der Zeit, einige dieser Pattern zu aktualisieren.\r\nWas ist noch g\u00fcltig? Was hat sich ver\u00e4ndert? Brauchen wir neue Pattern? Brauchen wir Patterns f\u00fcr Makerspaces? etc...\r\nKommt zu diesem Vortrag, wenn ihr im Begriff seid, euren lokalen Chaos Computer Club oder Hackspace an irgendeinem Ort der Welt zu gr\u00fcnden und um von unseren Erfahrungen zu lernen!", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 24, 
                                        "code": "BDSWFX", 
                                        "public_name": "Felix", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 36, 
                                        "code": "YMCYGT", 
                                        "public_name": "Lars Weiler", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 532, 
                                "guid": "966fb613-e266-560b-be19-ab6b8aad1db8", 
                                "logo": "", 
                                "date": "2018-12-30T13:00:00+01:00", 
                                "start": "13:00", 
                                "duration": "01:00", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "RGU9XL", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/RGU9XL/", 
                                "title": "Datenguide / Statistik f\u00fcr alle!", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Workshop mit Gruppentischen", 
                                "language": "de", 
                                "abstract": "Mit unserem Projekt Datengui.de machen wir die Daten der statistischen \u00c4mter zug\u00e4nglich f\u00fcr alle! In unserer Pr\u00e4sentation zeigen wir, wie wir die Daten aus der amtlichen Statistik saugen und f\u00fcr euch so aufbereiten, dass ihr sie verstehen und weiterbenutzten k\u00f6nnt.", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 27, 
                                        "code": "YMYTMP", 
                                        "public_name": "Simon", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 37, 
                                        "code": "NKKBZK", 
                                        "public_name": "P3nny", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 531, 
                                "guid": "ff31429a-f7bd-5c10-a816-6c5bfb1295e2", 
                                "logo": "", 
                                "date": "2018-12-30T14:30:00+01:00", 
                                "start": "14:30", 
                                "duration": "01:30", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "A9QYBU", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/A9QYBU/", 
                                "title": "How To Become a (Media)Wiki Hacker", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Talk", 
                                "language": "en", 
                                "abstract": "Basic introduction how to get started to hack on Wikimedia software projects with Q&A", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [
                                    {
                                        "id": 25, 
                                        "code": "RVGZKL", 
                                        "public_name": "Daniel", 
                                        "biography": null, 
                                        "answers": []
                                    }, 
                                    {
                                        "id": 26, 
                                        "code": "DXJG8B", 
                                        "public_name": "Andre", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }, 
                            {
                                "id": 508, 
                                "guid": "386ef762-a66a-5cc2-b6bd-3bd139cb9b07", 
                                "logo": "", 
                                "date": "2018-12-30T17:00:00+01:00", 
                                "start": "17:00", 
                                "duration": "00:15", 
                                "room": "WikiPakaWG Esszimmer", 
                                "slug": "RXZ3FE", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/RXZ3FE/", 
                                "title": "Abbau-Meeting", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 4, 
                                        "code": "33UT8A", 
                                        "public_name": "WikiPaka Orga", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "WikiPakaWG K\u00fcche": [
                            {
                                "id": 506, 
                                "guid": "60b68950-57f5-5ca9-880d-9b1a732b2ad1", 
                                "logo": "", 
                                "date": "2018-12-30T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "00:15", 
                                "room": "WikiPakaWG K\u00fcche", 
                                "slug": "XXY8Q7", 
                                "url": "https://cfp.verschwoerhaus.de/35c3/talk/XXY8Q7/", 
                                "title": "Orgameeting Tag 4", 
                                "subtitle": "", 
                                "track": null, 
                                "type": "Meetup", 
                                "language": "de", 
                                "abstract": "", 
                                "description": null, 
                                "recording_license": "", 
                                "do_not_record": true, 
                                "persons": [
                                    {
                                        "id": 4, 
                                        "code": "33UT8A", 
                                        "public_name": "WikiPaka Orga", 
                                        "biography": null, 
                                        "answers": []
                                    }
                                ], 
                                "links": [], 
                                "attachments": [], 
                                "answers": []
                            }
                        ], 
                        "Discodrama": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10171.html", 
                                "id": 10171, 
                                "guid": "020fed02-b4b2-472a-a4fc-bf4d4ede4e51", 
                                "logo": null, 
                                "date": "2018-12-30T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "03:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10171-fairy_dust_-_day4", 
                                "title": "Fairy Dust - Day4", 
                                "subtitle": "Rocket Away", 
                                "track": "Music", 
                                "type": "other", 
                                "language": "en", 
                                "abstract": "Modify the Fairy Dust", 
                                "description": "After standing in the cold rain and snow for too long, the Fairy Dust will find its place this time in the middle of the crowd at hall 5. A video installation will take place on the surface. This is a call for people, who can handle c4d files and have the bravery to put their vision on the symbol of the congress.\r\n\r\nThe file attached to this event contains all information about the object, as well the position and lenses of the 4 projectors. Fell free to develop whatever you like. Keep in mind that the surface is very glossy and actually eats the light away. Rendered video best with HAP or MP4.\r\n\r\nIn the hours between 2 pm and 5 pm on the days of the congress, there will be access to the video system, if you come around and have a device with HDMI out.  \r\n\r\nEnjoy!\r\n\r\nPowered by PENTAKLON und Rico Rose \r\n\r\nContact: privatlehrer[at]gmail[:]com", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": [
                                    {
                                        "url": "/system/event_attachments/attachments/000/003/635/original/35C3-template-ROCKET.c4d?1545876786", 
                                        "title": "35C3-template-ROCKET.c4d"
                                    }
                                ]
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10141.html", 
                                "id": 10141, 
                                "guid": "097ca083-59b5-4b79-885e-76c3cfe285d3", 
                                "logo": null, 
                                "date": "2018-12-30T18:00:00+01:00", 
                                "start": "18:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10141-bobopk", 
                                "title": "BoboPK", 
                                "subtitle": "Game Boy Live!", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "From the family...", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10142.html", 
                                "id": 10142, 
                                "guid": "22702740-7748-46c5-84c4-7fd05aeba5c4", 
                                "logo": "/system/events/logos/000/010/142/large/avatars-000311048113-9dewz4-t500x500.jpg?1545422530", 
                                "date": "2018-12-30T19:00:00+01:00", 
                                "start": "19:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10142-exoboom", 
                                "title": "Exoboom", 
                                "subtitle": "Techno", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "We were deeply into research, \r\ntogether with a mad cartoon scientist,\r\nwhen shit hit the fan!\r\n..However, we got stuck in your dimension.\r\nAnd we brought you something very special.\r\nOur Quantum Techno Generator - EXOBOOM.\r\nYou don\u00b4t want to miss us firing up that thing!", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/exoboom", 
                                        "title": "https://soundcloud.com/exoboom"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10143.html", 
                                "id": 10143, 
                                "guid": "ec9d20a1-1795-4ec7-9f34-116b180be603", 
                                "logo": null, 
                                "date": "2018-12-30T20:00:00+01:00", 
                                "start": "20:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10143-onetake_perm", 
                                "title": "Onetake & Perm", 
                                "subtitle": "Part 1", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Since years OneTake & Perm share a faible for heavyweight and spacey Dub 7inches. Every once in a while they get together for a rare b2b set.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/onetake", 
                                        "title": "https://soundcloud.com/onetake"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/perm-3", 
                                        "title": "https://soundcloud.com/perm-3"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10064.html", 
                                "id": 10064, 
                                "guid": "1b66a579-3b51-4306-ae97-2eccc8a086a1", 
                                "logo": "/system/events/logos/000/010/064/large/disrupt_Cliona1.jpg?1545422990", 
                                "date": "2018-12-30T21:00:00+01:00", 
                                "start": "21:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10064-disrupt", 
                                "title": "Disrupt", 
                                "subtitle": "DigiDub", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "With a background in breakcore, weirdo electronic music and a love for video game soundtracks disrupt and a trashy laptop set out on a mission to unite bits and bytes with the goodness of DUB back in 2003.\r\n\r\nStarting the Jahtari imprint as an outlet for those humble but fun experiments helped to gain momentum for the sound and DIY approach the label is now known for.", 
                                "description": "A fair heap of releases followed since 2007: \u201cFoundation Bit\u201d (on Werk Discs), \u201cThe Bass Has Left The Bilding\u201d (LP), \u201cDot Matrix With Stereo Sound\u201d and many ruffneck dancehall EPs and 7\u2033s alongside Maffi and Naram.\r\n\r\nDisrupt also produced the cosmic enka LP \u201cKarma No Kusari\u201d by Kiki Hitomi, and the dub poetry epics \u201cDis Side Ah Town\u201d and \u201cDog Heart City\u201d by Roger Robinson.\r\n\r\nWith his highly immersive SciFi adventure album \u201cOmega Station\u201d disrupt is setting out towards a new era of space exploration for the Jahtari label.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://jahtari.org/artists/disrupt/", 
                                        "title": "https://jahtari.org/artists/disrupt/"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/jahtari_records", 
                                        "title": "https://soundcloud.com/jahtari_records"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10144.html", 
                                "id": 10144, 
                                "guid": "1c784f88-981b-4174-a58c-4692112cc373", 
                                "logo": null, 
                                "date": "2018-12-30T22:00:00+01:00", 
                                "start": "22:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10144-onetake_perm", 
                                "title": "Onetake & Perm", 
                                "subtitle": "Part 2", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Since years OneTake & Perm share a faible for heavyweight and spacey Dub 7inches. Every once in a while they get together for a rare b2b set.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/onetake", 
                                        "title": "https://soundcloud.com/onetake"
                                    }, 
                                    {
                                        "url": "https://soundcloud.com/perm-3", 
                                        "title": "https://soundcloud.com/perm-3"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10059.html", 
                                "id": 10059, 
                                "guid": "b284e621-c3d1-42b5-925b-5380b3eb9c77", 
                                "logo": "/system/events/logos/000/010/059/large/avatars-000529235811-z36gbq-t500x500.jpg?1545423475", 
                                "date": "2018-12-30T23:00:00+01:00", 
                                "start": "23:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10059-t-data", 
                                "title": "T-Data", 
                                "subtitle": "Bass", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Clear Memory member, future record store owner and Data Wrangler based in Leipzig. Transforming Breaks, UK Bass, Footwork, bossy Electro and Jungle into another format with the intent of making it more appropriate and valuable for a variety of listeners.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/tdata", 
                                        "title": "https://soundcloud.com/tdata"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10065.html", 
                                "id": 10065, 
                                "guid": "301217de-d81e-42e8-ae95-cd7428f5c04a", 
                                "logo": "/system/events/logos/000/010/065/large/avatars-000189510234-u4rq4y-t500x500.jpg?1545423354", 
                                "date": "2018-12-31T01:00:00+01:00", 
                                "start": "01:00", 
                                "duration": "01:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10065-ruz", 
                                "title": "RUZ", 
                                "subtitle": "Jungle/Bass/Rave", 
                                "track": "Music", 
                                "type": "concert", 
                                "language": "en", 
                                "abstract": "Leipzig based Artist and Producer Sebastian G. aka RUZ.\r\nAssociated with: ALPHACUT | 45SEVEN | BASSM\u00c6SSAGE\r\nOriginal Junglist, Soundscape lover and musical Madness searching Vinylist from Leipzig, Germany.", 
                                "description": "From ruff & rugged Breakbeat fiddlin' over smooth Oldschool Reggae Dub Vibes to dark, psychotic and melancholic Soundspheres.\r\nFor fans of 90's oldschool Jungle & newly modern Drum and Bass movements.", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/ruzztle", 
                                        "title": "https://soundcloud.com/ruzztle"
                                    }, 
                                    {
                                        "url": "https://www.mixcloud.com/TaRUZ/", 
                                        "title": "https://www.mixcloud.com/TaRUZ/"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10043.html", 
                                "id": 10043, 
                                "guid": "1e1d04bd-c5b7-41a0-b330-532ee2c85af7", 
                                "logo": "/system/events/logos/000/010/043/large/avatars-000154450404-yn2uz6-t500x500.jpg?1545423670", 
                                "date": "2018-12-31T02:00:00+01:00", 
                                "start": "02:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10043-ingo_boss", 
                                "title": "Ingo Boss", 
                                "subtitle": "Techno", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "Ingo Boss was born in 1979 in Frankfurt am Main. At the tender age of 11, Ingo was already entranced by the new sound called techno that he had heard on the radio \u2013 two years later he already became acquainted with the wonderful things one can do with two decks and a mixer. As so many others, he was inspired by the music Sven V\u00e4th played at the legendary \u201eOmen\u201c in Frankfurt where Ingo used to turn the night into day at the age of 15. In 1998 he had his first gig at the short-lived \u201eU-Bahnstation Miquelallee\u201c in Frankfurt. In 2000, Ingo became a resident at a series of events called \u201eSpectrum@MTW\u201c, organized by the German music magazine GROOVE. That same year he published his first production \u201emodes\u201c in cooperation with his studio partner Denis Engemann on PV Records and later on two mix CDs.\r\n\r\nIn 2001, Ingo went on a tour which also led him abroad for the first time: with PV Records and with the Delirium Recordstore on the occasion of their 10 year anniversary. In 2002, he began his residency at the \u201eU60311\u201c in Frankfurt and he held it until he gave it up in 2004 in favour of Cocoonclub. Ingo\u2019s breakthrough as a producer came in the form of his EP \u201eTransistor\u201c, which was released on Cocoon Recordings in 2003 and which contained the goosebump track \u201eLittle Eternity\u201c. The track made it onto Sven V\u00e4th\u2019s mix CD \u201eSound of the Fourth Season\u201c.\r\n\r\nOn Christmas Eve 2004, Ingo made his debut at Cocoonclub where he played side by side with Sven V\u00e4th and 2Raumwohnung \u2013 he became a regular at Cocoonclub and pretty soon, he hosted the \u201emicromized\u201c night with Chris Tietjen as co-host. In 2006, he and REBOOT made the successful remix of G-Man\u2019s techno classic \u201eQuo Vadis\u201c. In november 2010, the industrious musician finally released his first album on TopModel Records. Ingo has been part of the Cocoon roster since 2009. In 2011 he launched his BEATPORT label called EUREKA Frankfurt. In February 2012 he released \"Same Mind\" - his second artist album - on Eureka. Later on followed by the \u201eSame Mind Remixes\u201c abum incl. Remixes by Mark Reeve, Johannes Heil, Romano Alfieri, Dr. Shingo and many more artist. In this year he launched also his \u201einsane\u201c Techno Release \u201eFreakshow EP\u201c with a Neil Landstrumm Remix (EURK006). And a Co-Op Production with Mark Reeve on Cocoon Recordings (\u201eInitial Spark\u201c \u2013 COR12099). In August 2013 he decide to be an artist of CONTACT Booking agency.", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/ingoboss", 
                                        "title": "https://soundcloud.com/ingoboss"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10040.html", 
                                "id": 10040, 
                                "guid": "2b0865f1-0b78-492c-b4b5-53c0e3442094", 
                                "logo": null, 
                                "date": "2018-12-31T04:00:00+01:00", 
                                "start": "04:00", 
                                "duration": "02:00", 
                                "room": "Discodrama", 
                                "slug": "35C3-ABFahrplan-10040-tschunkelmusik", 
                                "title": "Tschunkelmusik", 
                                "subtitle": "Techno/House", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "two guys from the family, Erna Besen & Rosa Luxus, helping you to dance goodbye to 35C3", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/tschunkelmusik/gpn18-live-set-feat-arne-bense-edited-version", 
                                        "title": "Tschunkelmusik @ GPN18"
                                    }, 
                                    {
                                        "url": "https://tschunkelmusik.de/ethik.html", 
                                        "title": "Tschunkelmusik Ethik"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Shutter Island": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10158.html", 
                                "id": 10158, 
                                "guid": "22915806-0177-4f94-9213-5a0890f6f17d", 
                                "logo": null, 
                                "date": "2018-12-30T10:00:00+01:00", 
                                "start": "10:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10158-nuts", 
                                "title": "Nuts.", 
                                "subtitle": "Let*s go ahead.", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10159.html", 
                                "id": 10159, 
                                "guid": "3c01716d-191d-4094-8d24-a990033b612e", 
                                "logo": null, 
                                "date": "2018-12-30T12:00:00+01:00", 
                                "start": "12:00", 
                                "duration": "02:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10159-franz", 
                                "title": "Franz", 
                                "subtitle": "Not knowing (ich wei\u00df es doch auch nicht)", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10160.html", 
                                "id": 10160, 
                                "guid": "30f8b579-119f-4869-8648-2b4e65ac5db6", 
                                "logo": null, 
                                "date": "2018-12-30T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "03:00", 
                                "room": "Shutter Island", 
                                "slug": "35C3-ABFahrplan-10160-lord_spreadpoint", 
                                "title": "Lord/Spreadpoint", 
                                "subtitle": "Closing", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "www.4sk.de", 
                                        "title": "www.4sk.de"
                                    }
                                ], 
                                "attachments": []
                            }
                        ], 
                        "Compeiler": [], 
                        "Uptime Bar": [
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10145.html", 
                                "id": 10145, 
                                "guid": "e5985477-ef56-4e96-8b4a-24dd775570db", 
                                "logo": "/system/events/logos/000/010/145/large/avatars-000059086552-x8yvq5-t500x500.jpg?1545424436", 
                                "date": "2018-12-30T14:00:00+01:00", 
                                "start": "14:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10145-jaycee", 
                                "title": "Jaycee", 
                                "subtitle": "House/Techno", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/jaycieh", 
                                        "title": "https://soundcloud.com/jaycieh"
                                    }
                                ], 
                                "attachments": []
                            }, 
                            {
                                "url": "https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10046.html", 
                                "id": 10046, 
                                "guid": "3c8a875f-0d6b-42c5-8c7c-8891ea66c06d", 
                                "logo": "/system/events/logos/000/010/046/large/avatars-000384533228-52qa9w-t500x500.jpg?1545424204", 
                                "date": "2018-12-30T16:00:00+01:00", 
                                "start": "16:00", 
                                "duration": "02:00", 
                                "room": "Uptime Bar", 
                                "slug": "35C3-ABFahrplan-10046-juli_jane", 
                                "title": "Juli Jane", 
                                "subtitle": "Techno/Tech House/Deep House", 
                                "track": "Music", 
                                "type": "djset", 
                                "language": "en", 
                                "abstract": "I love music and I mix and create tracks which make me happy. I do my thing and if you like it, it makes me even happier :)", 
                                "description": "", 
                                "recording_license": "", 
                                "do_not_record": false, 
                                "persons": [], 
                                "links": [
                                    {
                                        "url": "https://soundcloud.com/juli_jane", 
                                        "title": "https://soundcloud.com/juli_jane"
                                    }
                                ], 
                                "attachments": []
                            }
                        ]
                    }
                }
            ]
        }
    }
}