<schedule>
  <version>Voltron 3.1 2.1 1.5 MemoryRefreshV1.3 1.2.4</version>
  <conference>
    <acronym>35c3</acronym>
    <title>35th Chaos Communication Congress</title>
    <start>2018-12-27</start>
    <end>2018-12-30</end>
    <days>4</days>
    <timeslot_duration>00:10</timeslot_duration>
    <base_url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/</base_url>
  </conference>
  <day index="1" date="2018-12-27" start="2018-12-27T11:00:00+01:00" end="2018-12-28T03:00:00+01:00">
    <room name="Adams">
      <event id="9985" guid="15f4e5c5-40e1-4c73-8da0-4cc2a773ab13">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9985.html</url>
        <logo/>
        <date>2018-12-27T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>00:30</duration>
        <room>Adams</room>
        <slug>35c3-9985-opening_event</slug>
        <title>Opening Event</title>
        <subtitle>35C3: Refreshing Memories</subtitle>
        <track>CCC</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Hier geht es los.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8759">rufus</person>
          <person id="5638">rixx</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="10021" guid="9dde571b-4d49-4b44-8329-42e354bcc24b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10021.html</url>
        <logo/>
        <date>2018-12-27T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-10021-the_precariat_a_disruptive_class_for_disruptive_times</slug>
        <title>The Precariat: A Disruptive Class for Disruptive Times.</title>
        <subtitle>Why and How the Precariat will define the Global Transformation to save our planet.</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The combination of the ongoing technological revolution, globalisation and what are usually called 'neo-liberal' economic policies has generated a global system of rentier capitalism in which property rights have supplanted free market principles and in which a new global class structure has taken shape. The 20th century income distribution system has broken down irretrievably, and a new mass class, the precariat has been growing dramatically fast in every part of the world. What are the deeper reasons for these developments? How does an ecologically sustainable strategy look like? Is it possible to restore a balanced market economy in which inequalities and insecurities will lessen and in which the drift to populist and even neo-fascist politics will be reversed? This talk will try to provide answers.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8785">Guy Standing</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9917" guid="87083bf8-f1e8-433d-8b51-ffece756bbd7">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9917.html</url>
        <logo/>
        <date>2018-12-27T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9917-election_cybersecurity_progress_report</slug>
        <title>Election Cybersecurity Progress Report</title>
        <subtitle>Will the U.S. be ready for 2020?</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Recent attacks against elections in the U.S. and Europe demonstrate that nation-state attackers are becoming more aggressive, even as campaigning and voting are becoming increasingly reliant on computers.  How much has changed since 2016, when the U.S. experienced unprecedented attacks on its election infrastructure?  What has to happen to ensure that the 2020 presidential election is secure?  In this talk, I'll give a progress report on election security in the U.S. and around the world, informed by results from my own research and my work with legislators and election officials over the past two years.  I'll also hold a mock election with a current U.S. voting machine to demonstrate how cyberattacks on election infrastructure could potentially change the results of national elections.  Finally, I'll explain what everyone can do to get involved and help safeguard the foundations of democracy.&#13;
</abstract>
        <description>Strengthening election cybersecurity is essential for safeguarding democracy. For over 15 years, I and other computer scientists have been warning about the vulnerable state of election security, but attacks against recent elections in the U.S. and Europe demonstrate that sophisticated attackers are becoming more aggressive, even as campaigning and voting become increasingly reliant on computers.&#13;
 &#13;
Since 2016, I’ve been working with election officials and members of congress to strengthen election cybersecurity.  In this talk, I’ll give a progress report about what’s happened since then and what still needs to happen to secure future elections.  While many U.S. states have made progress at securing some aspects of their election infrastructure, and Congress provided $380M in new funding to the strengthen elections, significant vulnerabilities remain that put the integrity of future elections at risk.  To demonstrate the ongoing threat, I’ll hold a mock election on stage with a real U.S. voting machine still used in 18 states, and show how remote attacks could potentially affect the outcome of a close national contest.&#13;
 &#13;
Finally, I’ll explain how defenses developed by researchers over the past decade could provide practical and cost-effective safeguards.  Unfortunately, they have yet to be widely deployed due to a lack of resources and political leadership.  I’ll describe legislative efforts in the U.S. and other countries that could, if successful, go a long way to making elections secure.  I’ll also explain what technologists and other concerned humans can do to help secure elections at all levels.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4228">J. Alex Halderman</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/653/original/Election_Cybersecurity_Progress_Report_%2835c5__December_2018%29.pdf?1545925095">Slides</attachment>
        </attachments>
      </event>
      <event id="9647" guid="9629fcf4-6810-48d7-bd17-d81f924e6b47">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9647.html</url>
        <logo>/system/events/logos/000/009/647/large/rems_logo.png?1542841646</logo>
        <date>2018-12-27T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9647-taming_the_chaos_can_we_build_systems_that_actually_work</slug>
        <title>Taming the Chaos: Can we build systems that actually work?</title>
        <subtitle>Possible paths from today's ghastly hackery to what computing should be</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>We rely on mainstream computer engineering every day, but it's insanely complex, poorly understood, unreliable, and, as CCC reminds us every year, chronically insecure.  This talk will explain some ways that we can do better: taming parts of this this chaos with precise understanding - illustrated with disturbing facts and clean models for current architectures and the C language, from the &lt;a href="https://www.cl.cam.ac.uk/~pes20/rems/"&gt;REMS&lt;/a&gt; project, and principled but pragmatic new alternatives, that build in more hardware and software security protection,as developed in the &lt;a href="https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/"&gt;CHERI&lt;/a&gt; project.</abstract>
        <description>Computing has been massively successful, and we routinely trust computer systems with our personal, financial, medical, commercial, and governmental information. But at the same time, these systems are pervasively prone to security flaws and subject to malicious attacks.  We have to trust them, but they are not *trustworthy*.&#13;
&#13;
There are two root causes. First, the pan-industry computing infrastructure, of processors, programming languages, and operating systems, is based on designs from a more forgiving time, with simpler systems and little incentive to design-in strong security protection. Second, the conventional engineering techniques we use (prose specifications, manually written tests, and test-and-debug development) are good enough to make systems work in common cases, but cannot exclude all errors - and a single coding error can lead to a devastating exploit.&#13;
&#13;
Are we doomed?  Perhaps not.  This talk will highlight the sorry state of the art and then draw on cutting-edge research, from the University of Cambridge, SRI International, ARM, and other partners, to show some ways we can do better.  First, we'll show how it's become possible to build and use rigorous models for key existing interfaces to improve engineering: for the ARMv8-A and RISC-V architectures, and the C language, in the &lt;a href="https://www.cl.cam.ac.uk/~pes20/rems/"&gt;REMS&lt;/a&gt; project.  Then we'll describe a principled but pragmatic path to build in more hardware and software security protection to future systems, as developed in the &lt;a href="https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/"&gt;CHERI&lt;/a&gt; project.  These are joint work by many people over the last 10 years.&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5247">Peter Sewell</person>
        </persons>
        <links>
          <link href="https://www.cl.cam.ac.uk/~pes20/rems/">REMS</link>
          <link href="https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/">CHERI</link>
          <link href="http://www.cl.cam.ac.uk/~pes20/sail/">Sail ISA Description Language and Models</link>
          <link href="https://www.cl.cam.ac.uk/~pes20/cerberus/">Cerberus C Semantics</link>
        </links>
        <attachments/>
      </event>
      <event id="9491" guid="51ede2da-0f9b-4984-bd58-659c556d20c9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9491.html</url>
        <logo>/system/events/logos/000/009/491/large/logo.svg.png?1538557991</logo>
        <date>2018-12-27T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9491-hunting_the_sigfox_wireless_iot_network_security</slug>
        <title>Hunting the Sigfox: Wireless IoT Network Security</title>
        <subtitle>Dissecting the radio protocol of Sigfox, the global cellular network for the IoT you have probably never heard of</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>&lt;a href="https://www.sigfox.com/"&gt;Sigfox&lt;/a&gt; is an emerging low-power wide-area network (LP-WAN) technology for IoT devices, comparable to &lt;a href="https://lora-alliance.org/"&gt;LoRa&lt;/a&gt;.&#13;
&#13;
This talk recounts my analysis of Sigfox's radio protocol and presents an open reference implementation of an alternative Sigfox protocol stack.&#13;
&#13;
It confirms that while Sigfox ensures authenticity and integrity, transmitted payloads are not confidential.&#13;
&#13;
This presentation is targeted at a technical audience with some basic knowledge of cryptography (security goals, AES), but &lt;b&gt;no&lt;/b&gt; knowledge in RF technology (modulation, scrambling, error correction) is required.</abstract>
        <description>&lt;p&gt;Sigfox can be compared to a cellular network, but for mostly battery-powered IoT devices that don't need to transmit much data. While &lt;a href="https://www.etsi.org/deliver/etsi_gs/LTN/001_099/003/01.01.01_60/gs_LTN003v010101p.pdf"&gt;some&lt;/a&gt; &lt;a href="https://www.sigfox.com/en/sigfox-iot-technology-overview"&gt;sparse&lt;/a&gt; &lt;a href="https://tools.ietf.org/html/draft-zuniga-lpwan-sigfox-system-description-04"&gt;details&lt;/a&gt; on Sigfox's architecture and &lt;a href="https://www.sigfox.com/sites/default/files/1701-SIGFOX-White_Paper_Security.pdf"&gt;its security&lt;/a&gt; have been published and &lt;a href="https://www.disk91.com/2017/technology/sigfox/the-sigfox-radio-protocol/"&gt;some basic reverse engineering has been carried out&lt;/a&gt;, most of the protocol specifications remain proprietary and closed, so by now, no independent security audit was performed. Advertised use cases of Sigfox include air quality monitoring, weather stations, utilities metering and tracking farm animals. In this talk, I illustrate why these applications are fine, but why one might not want to track a money transporter with Sigfox or base a home alarm system on it.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;The Sigfox network is very atypical, with uplink and downlink based on different physical layers.&#13;
After a short introduction, I begin the presentation by taking a deep dive into Sigfox's radio protocol with a focus on its Security. Basics of radio technology (SDRs, ultra-narrow band (UNB) modulation, SRD bands) and techniques for analyzing protocols are briefly summarized and the uplink's and downlink's frame structures are presented.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;Subsequently, I show how a radio sniffer that has captured Sigfox messages can extract the uplink's and downlink's contents. While the uplink's payload is already contained in plaintext, the downlink is scrambled, but I indicate how the downlink's pseudorandom whitening sequence used for scrambling can be generated or brute-forced by an eavesdropper. Moreover, I outline attacks that could even compromise Sigfox's authenticity checking.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;Finally, I provide some suggestions on how to improve Sigfox's security.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;The reference implementation of an alternative Sigfox protocol stack &amp;quot;librenard&amp;quot; that was created as part of this work as well as reconstructed protocol specifications detailing the uplink and significant portions of the downlink protocol will be published immediately after this talk.&lt;/p&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8179">Florian Euchner (Jeija)</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9386" guid="527b56af-8d56-4edb-9027-9ca60767c742">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9386.html</url>
        <logo>/system/events/logos/000/009/386/large/i2DL.jpg?1544387802</logo>
        <date>2018-12-27T17:10:00+01:00</date>
        <start>17:10</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9386-introduction_to_deep_learning</slug>
        <title>Introduction to Deep Learning</title>
        <subtitle/>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This talk will teach you the fundamentals of machine learning and give you a sneak peek into the internals of the mystical black box. You'll see how crazy powerful neural networks can be and understand why they sometimes fail horribly.</abstract>
        <description>Computers that are able to learn on their own. It might have sounded like science-fiction just a decade ago, but we're getting closer and closer with recent advancements in Deep Learning. Or are we?&#13;
&#13;
In this talk, I'll explain the fundamentals of machine-learning in an understandable and entertaining way. I'll also introduce the basic concepts of deep learning. With the current hype of deep learning and giant tech companies spending billions on research, understanding how those methods works, knowing the challenges and limitations is key to seeing the facts behind the often exaggerated headlines.&#13;
&#13;
One of the most common applications of deep learning is the interpretation of images, a field that has been transformed significantly in recent years. Applying neural networks to image data helps visualising and understanding many of the faults as well as advantages of machine learning in general. As a research scientist in the field of automated analysis of bio-medical image data, I can give you some insights into these as well as some real-world applications.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8117">teubi</person>
        </persons>
        <links>
          <link href="https://www.nussschale-podcast.de">Nussschale Podcast</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/647/original/i2DL_Slides.pdf?1545916065">Slides</attachment>
        </attachments>
      </event>
      <event id="10011" guid="686c1387-e761-4df6-b395-f9ddf92d46e7">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10011.html</url>
        <logo/>
        <date>2018-12-27T18:10:00+01:00</date>
        <start>18:10</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-10011-hackerethik_-_eine_einfuhrung</slug>
        <title>Hackerethik - eine Einführung</title>
        <subtitle>Verantwortung und Ethik beim schöpferisch-kritischen Umgang mit Technologie</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Die Hackerethik ist die Grundlage für den Umgang mit den diversen ethischen Problemen, die sich beim schöpferisch-kritischen Umgang mit Technologie (auch "hacking" genannt) stellen. </abstract>
        <description>Die Hackerethik ist die Grundlage für den Umgang mit den diversen ethischen Problemen, die sich beim schöpferisch-kritischen Umgang mit Technologie (auch "hacking" genannt) stellen. Sie bietet Anhaltspunkte für die alltäglichen Fragestellungen und Probleme, die aufkommen, wenn man Technologie anders benutzt, als der Hersteller es sich gedacht hat, wenn man Lücken in Systemen findet und ausnutzt oder über Berge von persönlichen Daten stolpert. Dieser Talk gibt eine Einführung in die verschiedenen Aspekte der Hackerethik und regt zum Nachdenken über die ethischen Fragen an, die sich Menschen mit speziellen Fähigkeiten und Fertigkeiten stellen, wenn sie ihren Neigungen nachgehen. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="1633">frank</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9545" guid="ea7c532f-cc2d-4cb1-8f15-1933df7fd523">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9545.html</url>
        <logo/>
        <date>2018-12-27T19:10:00+01:00</date>
        <start>19:10</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9545-venenerkennung_hacken</slug>
        <title>Venenerkennung hacken</title>
        <subtitle>Vom Fall der letzten Bastion biometrischer Systeme</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Die Venenerkennung ist eine der letzten Bastionen biometrischer Systeme, die sich bisher der Eroberung durch Hacker widersetzt hat. Dabei ist sie ein lohnendes Ziel, schützt sie doch Bankautomaten und Hochsicherheitsbereiche. In diesem Talk machen wir die Verteidigungsanlagen dem Erdboden gleich.</abstract>
        <description>Seit Jahrzehnten vor allem im asiatischen Raum eingesetzt sind bisher keine ernsthaften Versuche bekannt Venenerkennungssysteme zu üeberwinden. Neben dem Mythos der Hochsicherheit sind vor allem die, unsichtbar im Körper gelegenen Merkmale dafür verantwortlich. In diesem Talk werden wir zeigen, mit welch geringem Aufwand man an die "versteckten" Venenbilder gelangen kann und wie, auf Grundlage dieser, Attrappen gebaut werden können, welche die Systeme der beider grosser Hersteller überwinden.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="1623">starbug</person>
          <person id="8381">Julian</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/734/original/1812-congress.pdf?1546876965">slides</attachment>
        </attachments>
      </event>
      <event id="10016" guid="f010dc03-13bc-413d-95ec-e8786626a2f1">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10016.html</url>
        <logo/>
        <date>2018-12-27T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-10016-g10_bnd-gesetz_und_der_effektive_schutz_vor_grundrechten</slug>
        <title>G10, BND-Gesetz und der effektive Schutz vor Grundrechten</title>
        <subtitle>Die strategische Fernmeldeüberwachung des BND vor dem Bundesverfassungsgericht</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Der Vortrag behandelt die Klage des Internetknotens DE-CIX gegen die strategische Fernmeldeüberwachung des BND vor dem Bundesverwaltungsgericht in Leipzig, was wir aus dem Urteil über den Rechtsschutz der Bürger lernen können und wieso der Fall nun das Bundesverfassungsgericht in Karlsruhe beschäftigt.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="174">Klaus Landefeld</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/713/original/Effektiver_Schutz_vor_Grundrechten_20181227.pdf?1546115285">Präsentation</attachment>
        </attachments>
      </event>
      <event id="9992" guid="71bdcf60-c567-4cf6-94f4-5681b1d008b4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9992.html</url>
        <logo/>
        <date>2018-12-27T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9992-all_your_gesundheitsakten_are_belong_to_us</slug>
        <title>All Your Gesundheitsakten Are Belong To Us</title>
        <subtitle>"So sicher wie beim Online-Banking": Die elektronische Patientenakte kommt - für alle.</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Plötzlich geht alles ganz schnell: Online-Behandlungen und elektronische Gesundheitsakten sind dieses Jahr für Millionen Krankenversicherte Wirklichkeit geworden. Zu einem hohen Preis: Bereits einfache Angriffe lassen das Sicherheitskonzept der Apps und Plattformen zusammenbrechen. Warum das so ist, welche kritischen Fehler Vivy &amp; Co. gemacht haben und wie das möglicherweise verhindert werden kann, das soll dieser Vortrag zeigen - denn in spätestens drei Jahren sollen auch die Gesundheitsdaten aller übrigen Versicherten zentral gespeichert und online abrufbar sein.</abstract>
        <description>Die elektronische Gesundheitskarte ist gescheitert. Stattdessen kommt jetzt die elektronische Patientenakte: In spätestens drei Jahren sollen die Befunde, Diagnosen, Röntgenbilder und Rezepte aller gesetzlich Krankenversicherten online und zentral gespeichert verfügbar sein. Schon heute können Millionen Versicherte eine solche Lösung nutzen und, wie Gesundheitsminister Jens Spahn fordert, "auch auf Tablets und Smartphones auf ihre elektronische Patientenakte zugreifen". Zeitgleich zur elektronischen Patientenakte steht die Onlinebehandlung vor der Tür: Das Fernbehandlungsverbot wurde vor wenigen Monaten gekippt, und schon heute können sich Millionen Versicherte ausschließlich online behandeln lassen.&#13;
&#13;
Nach Jahren des Wartens geht dabei alles ganz schnell. "Diese Maßnahmen dulden keinen Aufschub", sagt Spahn. Und macht uns alle damit zu Beta-Testern in Sachen Gesundheit. Mit fatalen Folgen: Unsere streng vertraulichen Gesundheitsdaten liegen für alle sichtbar im Netz.&#13;
&#13;
In diesem Vortrag zeige ich an fünf konkreten Beispielen, welche fahrlässigen Entscheidungen die Online-Plattformen und Apps der Anbieter aus dem Bereich Gesundheitsakte und Telemedizin so angreifbar machen und demonstriere, wie einfach der massenhafte Zugriff auf unsere vertraulichen Gesundheitsdaten gelang. Zur Debatte steht, was angesichts dieser neuen alten Erkenntnisse zu tun ist - und was wir besser bleiben lassen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7912">Martin Tschirsich</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="10015" guid="1a28630d-985e-409b-be4a-b6679ecc83c3">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10015.html</url>
        <logo>/system/events/logos/000/010/015/large/polizeiRun.jpg?1544462653</logo>
        <date>2018-12-27T23:30:00+01:00</date>
        <start>23:30</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-10015-polizeigesetze</slug>
        <title>Polizeigesetze</title>
        <subtitle>Endlich viele neue Gründe zu demonstrieren</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Heimatminister Horst Seehofer und seine Amtskollegen in den Ländern erweitern die Rechte der Polizeien und planen ein „Musterpolizeigesetz“. Damit handelten sie sich die größten Proteste gegen Überwachungsvorhaben seit Jahren ein.</abstract>
        <description>Wir geben nicht nur einen Überblick über die zahlreichen Neuregelungen der Polizeigesetze in den Bundesländern, sondern berichten auch aus den Anhörungen in den Landtagen und von den Stellungnahmen. Wir erklären, was in den neuen Gesetzen steht und welche rechtlichen und technischen Grenzüberschreitungen wir zu kritisieren haben.&#13;
&#13;
Und wir haben ein paar Forderungen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8733">Marie Bröckling</person>
          <person id="1630">Constanze Kurz</person>
        </persons>
        <links>
          <link href="https://netzpolitik.org/tag/polizeigesetz/">Berichterstattung zu den Polizeigesetzen bei netzpolitik.org</link>
        </links>
        <attachments/>
      </event>
      <event id="9506" guid="462f9320-3a0e-4785-82de-15343803c2ba">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9506.html</url>
        <logo/>
        <date>2018-12-28T00:40:00+01:00</date>
        <start>00:40</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9506-freude_ist_nur_ein_mangel_an_information</slug>
        <title>Freude ist nur ein Mangel an Information</title>
        <subtitle>Ein Demotivationsworkshop zur politischen Lage.</subtitle>
        <track>Entertainment</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Nico Semsrott hat in Zeiten des globalen Rechtsrucks den überflüssigsten Job der Welt: Er ist Demotivationstrainer. Mit Powerpointpräsentationen und viel Pessimismus schafft er es, komplexe Themen zu vereinfachen, ohne dabei auf alternative Fakten zurückgreifen zu müssen.</abstract>
        <description>Politisch gesehen ist zwar alles aussichtslos. Aber wenn man schon aufgibt, kann man man genauso gut auch das Resignieren aufgeben. Deswegen kandidiert Nico auf Platz 2 der Europaliste der Partei Die PARTEI. Um dann in Brüssel als Kommissionspräsident die Demokratie in Europa einzuführen. Notfalls gegen den Willen der Bürgerinnen und Bürger.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8748">Nico Semsrott</person>
        </persons>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Borg">
      <event id="9607" guid="c0e4f528-92c7-4170-aff3-d4dd5cd74b2c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9607.html</url>
        <logo>/system/events/logos/000/009/607/large/500px-Move_protect.svg.png?1539423571</logo>
        <date>2018-12-27T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9607-the_rocky_road_to_tls_1_3_and_better_internet_encryption</slug>
        <title>The Rocky Road to TLS 1.3 and better Internet Encryption</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Since a few months we have a new version of TLS, the most important encryption protocol on the Internet. From the vulnerabilities that created the need of a new TLS version to the challenges of deploying it due to broken devices this talk will give an overview of the new TLS 1.3.</abstract>
        <description>In August the new version 1.3 of the Transport Layer Security (TLS) protocol was released. It‘s the result of a process that started over four years ago when it became increasingly clear that previous TLS versions suffered from some major weaknesses.&#13;
&#13;
In many ways TLS 1.3 is the biggest step ever done in the history of TLS and its predecessor SSL. While previous TLS versions always tried to retain compatibility and not change too many things, the new version radically removes problematic and insecure constructions like static RSA key exchanges, fragile CBC/HMAC constructions and broken hash functions like MD5 and SHA1.&#13;
&#13;
As a bonus TLS 1.3 comes with a reworked handshake that reduces the number of round-trips and thus provides not just more security, but also better performance. If that sounds too good to be true: An optional, even faster mode of TLS 1.3 – the zero round trip or 0RTT mode – makes some security researchers worried, because they fear it introduces new security risks due to replay attacks.&#13;
&#13;
Though the road to TLS 1.3 was complicated. The Internet is a buggy place and particularly Enterprise devices of all kinds – middleboxes, TLS-terminating servers and TLS-interception devices – slowed down the deployment and finalization of the new encryption protocol. Also some banks thought that TLS 1.3 is too secure for them.&#13;
&#13;
The talk will give an overview of the developments that led to TLS 1.3, the major changes it brings, the challenges it had to face and some practical advice for deployment.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="2462">hanno</person>
        </persons>
        <links>
          <link href="https://www.feistyduck.com/bulletproof-tls-newsletter/issue_44_tls_1_3_is_here">TLS 1.3 is here</link>
          <link href="https://www.feistyduck.com/bulletproof-tls-newsletter/issue_33_why_tls_13_isnt_there_yet">Why TLS 1.3 isn’t there yet</link>
          <link href="https://www.golem.de/news/tls-1-3-die-zukunft-der-netzverschluesselung-1612-124724.html">TLS 1.3: Die Zukunft der Netzverschlüsselung</link>
          <link href="https://int21.de/slides/35c3-tls13/">The Rocky Road to TLS 1.3 - Slides</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/732/original/tls13.pdf?1546421079">Slides</attachment>
        </attachments>
      </event>
      <event id="9904" guid="d995955c-319f-4228-b3f4-080868bbfdf8">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9904.html</url>
        <logo/>
        <date>2018-12-27T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9904-the_social_credit_system</slug>
        <title>"The" Social Credit System</title>
        <subtitle>Why It's Both Better and Worse Than We can Imagine</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The Chinese Social Credit System (SCS) has been discussed a lot in Western media. However, we do not know currently how the system that is supposed to take nationwide effect by 2020 will look like, as there are more than 70 pilot projects currently undertaken. These pilots rank from commercial royalty and rewards programs (Sesame Credit) to an Orwellian system, where each action has a predetermined associated score (Rongcheng). In-between, there’s nebulous algorithmic systems that basically act as a Black Box (Honesty Shanghai). This talk, therefore, looks at some of these pilots and their implementation details, and through an agent-based modeling framework, discusses the likely effects of different implementations. In doing so, it shows that most of the systems currently being tested are prone to manipulation by leaders from all levels of government, and that the ostensible goal of allocating scarce resources more efficiently is unlikely to be served by the new system(s).</abstract>
        <description>The author, Antonia Hmaidi, is a PhD candidate in East Asian Economics with a focus on China. She presented a talk on the impact of internet censorship at the 33C3. This talk’s goal is to provide those interested with a technically-grounded understanding of “the” Chinese social credit system and its possible impact on Chinese society and economy. In doing so, it seeks to provide a more nuanced picture than is usually presented in either Chinese or Western media. Working on data science and machine learning in her free time allows the author to better understand the algorithms comprising “the” social credit system.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6990">Toni</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9877" guid="94b77e5a-c826-45a9-a8bd-bbb8e5e7c9ff">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9877.html</url>
        <logo>/system/events/logos/000/009/877/large/cp.png?1539636113</logo>
        <date>2018-12-27T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9877-censored_planet_a_global_censorship_observatory</slug>
        <title>Censored Planet: a Global Censorship Observatory </title>
        <subtitle/>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Six years ago the idea behind CensoredPlanet started, that is now launched at censoredplanet.org. We had a simple (yet essential) guiding principle: measurements that may be politically sensitive should be done without volunteer participation. In this talk, besides a detailed scientific overview of the techniques and the current state of CensoredPlanet, I plan to talk about my experience in developing the project from the ground up.&#13;
&#13;
Despite the pervasive nature of Internet censorship and the continuous evolution of how and where censorship is applied, measurements of censorship remain comparatively sparse. Current censorship projects, including OONI, depend on participants within countries to help them collect measurements. While these projects are valuable, we have empirically seen that there are issues relating to continuity in terms of measurement, coverage of the geographical area, and ethical dilemmas when user participation is a requirement. Censored Planet use tens of thousands of *remote infrastructural and organizational vantage points* from over 170 countries to conduct it’s measurements, thereby removing the need for user participation. This allows us to regularly measure Internet disruptions over a longer period of time in significantly more countries in a safer way. &#13;
&#13;
The research we conduct at Censored Planet provides unique insights and data points on Internet disruptions. This information is extremely valuable to researchers in diverse fields from political science to computer science as well as to activists and journalists living and operating in countries where Internet disruptions are prevalent. By making our data easily accessible to the public, we aim to encourage future research in the field. Link to our data: https://censoredplanet.org/data/raw.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8385">Roya Ensafi</person>
        </persons>
        <links>
          <link href="https://censoredplanet.org">Censored Planet: a Global Censorship Observatory </link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/654/original/35C3-CensoredPlanet-Ensafi.pdf?1545925229">Presentation Slides</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
        </attachments>
      </event>
      <event id="10005" guid="f0d70663-0769-4462-ad27-bc516d9cb141">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10005.html</url>
        <logo/>
        <date>2018-12-27T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-10005-how_does_the_internet_work</slug>
        <title>How does the Internet work?</title>
        <subtitle>An explanation of Inter-Net and everyday protocols</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This Foundations talk explains the systems and protocols that make up the Internet, starting from a laptop with a Wi-Fi connection. No particular technical knowledge required.</abstract>
        <description>Many consider "the Internet" a utility similar to electricity - and that's a great attitude! - but for most, "the Internet" only means access to a few centralized services offered by mega-corporations "for free", around which people build their entire social and professional lives.&#13;
&#13;
Come along for a look behind the scenes of all those fancy websites, let's go through what the Internet actually is!&#13;
&#13;
Knowing the difference between the network and services reachable through the network is perhaps more important than ever, because if we implicitly give service providers all the power by never asking for a public, utility-like network then that's the end of the Internet as we know it. Key word: Net neutrality.&#13;
&#13;
So in this talk we will discover the network. In simple terms and without too much technical detail we'll start out with the "atom" of networks &lt;i&gt;the packet&lt;/i&gt;, then cover the fundamental &lt;i&gt;Internet Protocol&lt;/i&gt; (IPv4-only for simplicity), we'll try to answer &lt;i&gt;what is a network?&lt;/i&gt; - not obvious it turns out, we'll look at &lt;i&gt;where do IP addresses come from?&lt;/i&gt; and then we'll move on to the Internet cornerstone that is &lt;i&gt;routing&lt;/i&gt;. We'll approach routing from the perhaps most well-known router - the &lt;i&gt;wireless home router&lt;/i&gt; - and then look at how similar or dissimilar &lt;i&gt;routers on the Internet&lt;/i&gt; are to that home router, leading us to a look at the &lt;i&gt;routing protocol&lt;/i&gt; which constantly determines how our packets flow throughout the world.&#13;
&#13;
Those are the basic building blocks of the Internet. Now for some delicious alphabet soup!&#13;
&#13;
We'll take a step toward applications and compare &lt;i&gt;UDP&lt;/i&gt;, &lt;i&gt;TCP&lt;/i&gt; and &lt;i&gt;SCTP&lt;/i&gt;, which are all used together with IP for most if not all end-user Internet communication.&#13;
&#13;
Finally, we'll arrive at the most common applications, looking into how &lt;i&gt;DNS&lt;/i&gt; (domain names), &lt;i&gt;SMTP&lt;/i&gt; (sending email) and &lt;i&gt;HTTP&lt;/i&gt; (web) work.&#13;
&#13;
All of this is actually surprisingly simple and surprisingly old. None of it was built to be secure.&#13;
&#13;
The goal is that you will gain an understanding of the structure of the Internet, that you will be able "see through" the browser, email client and web service facades, because now you know what's going on behind the scenes, and everything that's &lt;i&gt;actually&lt;/i&gt; possible with a public utility network - far more than centralized consumption/you-are-our-product services.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="2142">Peter Stuge</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/677/original/35c3-internet.zip?1546003081">Presentation slides</attachment>
        </attachments>
      </event>
      <event id="9563" guid="a42e5a4f-fd9b-4571-bf17-483978afecb3">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9563.html</url>
        <logo>/system/events/logos/000/009/563/large/wallet.fail.png?1539543982</logo>
        <date>2018-12-27T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9563-wallet_fail</slug>
        <title>wallet.fail</title>
        <subtitle>Hacking the most popular cryptocurrency hardware wallets</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>In this presentation we will take a look at how to break the most popular cryptocurrency hardware wallets. We will uncover architectural, physical, hardware, software and firmware vulnerabilities we found including issues that could allow a malicious attacker to gain access to the funds of the wallet. The attacks that we perform against the hardware wallets range from breaking the proprietary bootloader protection, to breaking the web interfaces used to interact with wallets, up to physical attacks including glitching to bypass the security implemented in the IC of the wallet. Our broad look into several wallets demonstrates systemic and recurring issues. We provide some insight into what needs to change to build more resilient hardware wallets.&#13;
</abstract>
        <description>Hardware wallets are becoming increasingly popular and are used to store a significant percentage of the world’s cryptocurrency. Many traders, hedge funds, ICOs and blockchain projects store the entirety of their cryptocurrency on one or very few wallets. This means that users of hardware wallets store tens of millions of euros of cryptocurrency on small USB peripherals that costs only a few euros to manufacture. Moreover, many users that trade and speculate in cryptocurrency interact, update, and generate transactions using their hardware wallets on a daily basis.&#13;
&#13;
In this talk we look at the good, the bad and the ugly of hardware wallet security: We will walk through the different architectures of the wallets, look at the different attack vectors and talk about the challenges of building secure hardware before diving in deep finding vulnerabilities in the different wallets.&#13;
&#13;
The vulnerabilities we will present range from vulnerabilities that can be fixed in a firmware upgrade, to bugs that will require a new hardware revision, up to attacks on the microcontrollers themselves, requiring new silicon to be fixed.&#13;
&#13;
Some of the (most entertaining) vulnerabilities will be demonstrated live on stage.&#13;
&#13;
&lt;h2&gt;Classes of Vulnerabilities we will look at&lt;/h2&gt;&#13;
&lt;b&gt;Firmware Vulnerabilities&lt;/b&gt;&#13;
Firmware vulnerabilities are vulnerabilities affecting the software that runs on the hardware wallet. Since most wallets provide update mechanisms this class of bug can be patched in a future firmware release.&#13;
&#13;
&lt;b&gt;Software Vulnerabilities&lt;/b&gt;&#13;
Software vulnerabilities are vulnerabilities affecting the host software that runs on the PC or smartphone and communicates with the hardware wallet. Since most wallets provide update mechanisms this class of bug can be patched in a future release of the host software&#13;
&#13;
&lt;b&gt;Hardware Vulnerabilities&lt;/b&gt;&#13;
Hardware vulnerabilities are vulnerabilities affecting the device hardware of the hardware wallet. Hardware vulnerabilities are generally incorrectly set configurations of the hardware either during manufacturing or by the firmware. If the configuration is set by firmware these vulnerabilities can be patched in a future firmware release. Otherwise, they are unlikely to be fixed by the vendor.&#13;
&#13;
&lt;b&gt;Physical Vulnerabilities&lt;/b&gt;&#13;
Physical vulnerabilities are vulnerabilities affecting the hardware design of the hardware wallet. Once the device has been manufactured, hardware vulnerabilities cannot be mitigated and can only be fixed in a future hardware revision of the device. This class of vulnerabilities is unlikely to be fixed by the vendor.&#13;
&#13;
&lt;b&gt;Architectural Vulnerabilities&lt;/b&gt;&#13;
Architectural vulnerabilities are vulnerabilities affecting the overall architecture of the hardware wallet. These are inherent design flaws in the device and can only be fixed in a major hardware revision, i.e. a new version of the device. This class of vulnerabilities is unlikely to be fixed by the vendor.&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7775">Thomas Roth</person>
          <person id="3985">Dmitry Nedospasov</person>
          <person id="4958">Josh Datko</person>
        </persons>
        <links>
          <link href="https://wallet.fail">wallet.fail website</link>
        </links>
        <attachments/>
      </event>
      <event id="9766" guid="a12d17e9-3758-4fa0-b612-0c6ba22ea773">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9766.html</url>
        <logo>/system/events/logos/000/009/766/large/logo-quadrat-vector.jpg?1539611939</logo>
        <date>2018-12-27T18:50:00+01:00</date>
        <start>18:50</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9766-das_ist_mir_nicht_erinnerlich_der_nsu-komplex_heute</slug>
        <title>"Das ist mir nicht erinnerlich." − Der NSU-Komplex heute</title>
        <subtitle>Fünf Monate nach dem Urteil im ersten NSU-Prozess</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Sieben Jahre lang musste den Behörden jedes Stück der versprochenen Aufklärung des NSU-Komplexes abgerungen werden. Das Urteil im ersten NSU-Prozess zeigt: Deutschland ist nur sehr eingeschränkt bereit, rechtem Terror entgegenzutreten und ihn aufzuarbeiten, den Betroffenen, Geschädigten und Überlebenden zuzuhören und ihnen Schutz zu garantieren. Das zu leisten ist unsere Aufgabe: die Aufgabe der Gesellschaft, die Aufgabe einer antifaschistischen und antirassistischen Linken. </abstract>
        <description>Am 4. November 2011 enttarnte sich der „Nationalsozialistische Untergrund“ (NSU) selbst. Fast sieben Jahre später, am 10. Juli 2018, wurde das Urteil im ersten NSU-Prozess  gesprochen. Heute, fünf Monate nach der von Neonazis bejubelten mündlichen Urteilsverkündung, müssen wir mit einem Urteil umgehen, in dem sich viele gebrochene Aufklärungsversprechen zuspitzen. Das Gericht geht von der These aus, der NSU sei ein weitgehend isoliertes „Trio“ ohne Netzwerk und ohne Verstrickung der Behörden gewesen. Nach allem, was in den letzten Jahren – teilweise mühsam – über den NSU-Komplex ans Licht gezerrt werden konnte, ist die „Trio“-These aber nicht haltbar. Zum NSU-Komplex gehören ein Neonazinetzwerk, der gesamtgesellschaftliche Rassismus und das Handeln der Polizei sowie des Verfassungsschutzes. &#13;
Gleichzeitig stellen sich die Angehörigen der vom NSU Ermordeten und die Überlebenden der Anschläge immer noch die gleichen Fragen wie 2011: Wer hat die Tatorte ausgewählt? Warum wurde gerade ihr Vater, Ehemann, Sohn, ihre Tochter ermordet? Wer ist Teil des Unterstützungsnetzwerks des NSU? Was wusste der Verfassungsschutz und was machte er warum mit seinem Wissen (nicht)? &#13;
Klar ist: Die gesellschaftlichen Verhältnisse, die den NSU hervorgebracht haben, müssen abgeschafft werden. Das Urteil im ersten NSU-Prozess hat noch einmal unterstrichen: Deutschland ist nur in sehr eingeschränktem Maße bereit, rechtem Terror entgegenzutreten und ihn aufzuarbeiten, den Betroffenen, Geschädigten und Überlebenden zuzuhören und ihnen Schutz zu garantieren. Das zu leisten ist unsere Aufgabe: die Aufgabe der Gesellschaft, die Aufgabe einer antifaschistischen und antirassistischen Linken. &#13;
&#13;
Im Vortrag soll der Stand der Aufklärung im NSU-Komplex umrissen werden und diskutiert werden, wie wir als Gesellschaft damit umgehen und was wir tun können.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8543">Caro Keller (NSU-Watch)</person>
        </persons>
        <links>
          <link href="nsu-watch.info">NSU-Watch</link>
        </links>
        <attachments/>
      </event>
      <event id="9462" guid="42650545-4394-4455-a5f5-9efad111fedc">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9462.html</url>
        <logo/>
        <date>2018-12-27T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>00:40</duration>
        <room>Borg</room>
        <slug>35c3-9462-what_the_fax</slug>
        <title>What The Fax?!</title>
        <subtitle>Hacking your network likes it's 1980 again</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>We all know what FAX is, and for some strange reason most of us need to use it from time to time. Hard to believe its 2018, right?&#13;
&#13;
But can FAX be something more than a bureaucratic burden? Can it actually be a catastrophic security hole that may be used to compromise your entire network? Come watch our talk and find out …</abstract>
        <description>Unless you've been living under a rock for the past 30 years or so, you probably know what a fax machine is. For decades, fax machines were used worldwide as the main way of electronic document delivery. But this happened in the 1980s. Humanity has since developed far more advanced ways to send digital content, and fax machines are all in the past, right? After all, they should now be nothing more than a glorified museum item. Who on earth is still using fax machines?&#13;
&#13;
The answer, to our great horror, is EVERYONE. State authorities, banks, service providers and many others are still using fax machines, despite their debatable quality and almost non-existent security. In fact, using fax machines is often mandatory and considered a solid and trustworthy method of delivering information. &#13;
&#13;
What the Fax?!&#13;
&#13;
We embarked on a journey with the singular goal of disrupting this insane state of affairs. We went to work, determined to show that the common fax machine could be compromised via mere access to its fully exposed and unprotected telephone line – thus completely bypassing all perimeter security protections and shattering to pieces all modern-day security concepts.&#13;
&#13;
Join us as we take you through the strange world of embedded operating systems, 30-year-old protocols, museum grade compression algorithms, weird extensions and undebuggable environments. See for yourself first-hand as we give a live demonstration of the first ever full fax exploitation, leading to complete control over the entire device as well as the network, using nothing but a standard telephone line.&#13;
&#13;
This talk is intended to be the canary in the coal mine. The technology community cannot sit idly by while this ongoing madness is allowed to continue!&#13;
&#13;
The world must stop using FAX!</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6000">Yaniv Balmas</person>
          <person id="8269">Eyal Itkin</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9838" guid="5f5d8fd7-45a7-44e4-8d82-dfb8ee692f8b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9838.html</url>
        <logo>/system/events/logos/000/009/838/large/logo.png?1539632549</logo>
        <date>2018-12-27T21:50:00+01:00</date>
        <start>21:50</start>
        <duration>00:40</duration>
        <room>Borg</room>
        <slug>35c3-9838-genom-editierung_mit_crispr_cas</slug>
        <title>Genom-Editierung mit CRISPR/Cas</title>
        <subtitle>“Eine neue Hoffnung” oder “Angriff der Klonkrieger”? </subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>CRISPR/Cas hat die Genforschung revolutioniert und könnte bald in großem Stil gentechnisch eingesetzt werden. Aber was ist CRISPR und wie funktioniert es? Kurz gesagt: Teile des adaptiven Immunsystems von Bakterien werden genutzt, um Gene zu verändern. Und das funktioniert präziser als mit jedem anderen Werkzeug zuvor und offenbar in allen Tier- und Pflanzenarten. Damit ist CRISPR anders als die herkömmlichen Methoden der Gentechnik. Es ist einfach anzuwenden, preiswert, schnell, extrem vielseitig und damit in jedem Biologielabor erhältlich. Bio-Hacker haben sogar begonnen, CRISPR zu Hause zu nutzen. CRISPR wird bereits eingesetzt, um mehr über Genfunktionen und -dysfunktionen zu erfahren. So könnte es realistischerweise zur Behandlung einiger Krankheiten eingesetzt werden. Aber welche Hürden gibt es noch und welche ethischen Fragen würden sie mit sich bringen? Wie kann (oder sollte?) CRISPR in der Landwirtschaft eingesetzt werden, wenn der Klimawandel die Erträge verringert und die Biodiversität gefährdet? &#13;
Unser Vortrag gibt einen Überblick darüber, was mit dem CRISPR/Cas-System möglich ist. Wir möchten genügend Informationen liefern, um zwischen Pseudowissenschaften und dem, was tatsächlich möglich ist, unterscheiden zu können.&#13;
</abstract>
        <description>André ist Physiker, Biochemiker und Wissenschaftskommunikator.&#13;
Katrin studierte Biochemie, verpodcastete Wissenschaftsnachrichten und berät wissenschaftliche Softwareprojekte.&#13;
Anna ist Biologin und hat während ihrer Doktorarbeit teilweise mit CRISPR gearbeitet.&#13;
Obwohl wir aus verschiedenen Bereichen der Wissenschaft kommen, haben wir eine gemeinsame Leidenschaft: Themen aus der Wissenschaft verständlich darzustellen. Eine der vielversprechendsten neuen Technologien ist CRISPR/Cas. Dabei handelt es sich um eine Gentechnikmethode, die ein großes Potenzial für Mensch und Umwelt hat. Aber wie jedes Werkzeug kann CRISPR sowohl für Gutes als auch für Böses eingesetzt werden - und es ist nicht immer einfach zu sagen, was was ist, besonders in biologischen und ökologischen Systemen. CRISPR hilft uns, Genfunktionen und Krankheiten besser erforschen zu können. Es könnte uns auch helfen, die Folgen des Klimawandels in vielerlei Hinsicht zu bekämpfen - doch haben wir uns nicht genug in die Umwelt eingemischt? CRISPR könnte uns helfen, Krankheiten zu behandeln, vielleicht sogar bei Embryonen mit genetischen Krankheiten. Aber ist es ethisch vertretbar, die menschliche Keimbahn zu verändern? Oder sollten wir sie bei Tieren verändern, um höhere  Fleisch-, Milch- oder Eiererträge zu erzielen? Was könnten wir ändern und was sollten wir besser in Ruhe lassen?&#13;
Was mit CRISPR getan wird - darüber sollte es einen breiten Dialog in der Gesellschaft geben. Wir wollen versuchen die wissenschaftliche Faktenlage darzustellen, und die Möglichkeiten und Grenzen von CRISPR zu beleuchten. &#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6979">_Adora_Belle_</person>
          <person id="7027">André Lampe</person>
          <person id="6574">KaLeiMai</person>
        </persons>
        <links>
          <link href="http://scienceblogs.de/diekleinendinge/">Blog André Lampe / anderelampe</link>
          <link href="https://zellmedien.de/">Anna Müllner / Adora Belle </link>
          <link href="https://wirkstoffradio.de">Wirkstoffradio</link>
          <link href="https://fyyd.de/user/KonScience/curation/crispr-genomeditierung?page=0">kuratierte Podcastepisoden über CRISPR &amp; Co.</link>
          <link href="https://docs.google.com/presentation/d/1WMHsmgAln0tWvW5kd9MexENBBfdue4NXrXZiiJGkPxI/edit">Google-Slides (zum Kommentieren)</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/662/original/CRISPR-Cas-Angriff-der-Klonkrieger-oder-Eine-Neue-Hoffnung-35c3.pdf?1545950437">PDF</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
        </attachments>
      </event>
      <event id="9597" guid="96d10915-cc4b-42ca-ad75-15205db70d0b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9597.html</url>
        <logo>/system/events/logos/000/009/597/large/bios.png?1539366432</logo>
        <date>2018-12-27T22:50:00+01:00</date>
        <start>22:50</start>
        <duration>00:40</duration>
        <room>Borg</room>
        <slug>35c3-9597-modchips_of_the_state</slug>
        <title>Modchips of the State</title>
        <subtitle>Hardware implants in the supply-chain</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Hardware implants and supply chain attacks have been in the news recently, but how feasible are they and what can we do about them? In this talk we'll examine the design of a proof of concept SPI bus hardware implant that has similar capabilities to those described in the Bloomberg/Supermicro article as well as some countermeasures that we can use to try to detect these "modchips" and increase our trust in our systems.</abstract>
        <description>We don't know how much of the Bloomberg story about hardware implants installed in Supermicro servers shipped to Apple and Amazon is true, nor do we know the story behind the story and the reasons for the vehement denials by all the parties involved.&#13;
&#13;
However, a technical assessment of details of the describe implants reveals that a supply chain attack on the hardware is definitely possible, that the capabilities of the BMC can be used to bypass OS protections, and that there are means to access the BMC that would not necessarily generate readily identified network traffic.&#13;
&#13;
In this talk we'll examine the design of a proof of concept SPI bus hardware implant that has similar capabilities to those described in the Bloomberg/Supermicro article as well as some countermeasures that we can use to try to detect these "modchips" and increase our trust in our systems.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4825">Trammell Hudson</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9614" guid="e8385c89-d33a-42d8-afb6-8ae28fe5c89d">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9614.html</url>
        <logo/>
        <date>2018-12-27T23:50:00+01:00</date>
        <start>23:50</start>
        <duration>00:40</duration>
        <room>Borg</room>
        <slug>35c3-9614-inside_the_amd_microcode_rom</slug>
        <title>Inside the AMD Microcode ROM</title>
        <subtitle>(Ab)Using AMD Microcode for fun and security</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Microcode runs in most modern CPUs and translates the outer instruction set (e.g. x86) into a simpler form (usually a RISC architecture). It is updatable to fix bugs in the silicon (see Meltdown/Spectre), but these updates are encrypted and signed, so no one knows how microcode works on conventional CPUs. We successfully reverse engineered part of the microde semantics of AMD CPUs and are able to write our own programs. We also recovered the mapping between the physical readout (electron microscope) and the "virtual" addresses used by microcode itself. In this talk we present background on microcode, our findings, our open source framework to write custom microcode and our custom defensive measures implemented in microcode.&#13;
</abstract>
        <description>We build on our results presented on 34C3 to provide more insight into how microcode works and more details of the microcode ROM itself.&#13;
&#13;
tl;dr diff to last talk:&#13;
- Mapped physical readout to virtual addresses, we can now read the microcode implementation of specfic instructions&#13;
- More microcode semantics known, more stable programs&#13;
- Opensource framework for creating, diassembling and testing microcode on AMD CPUs&#13;
- Simple hardware setup to develop microcode programs&#13;
- More practical examples of what you can do with microcode, focused on defense instead of offense this time&#13;
&#13;
Since 34C3 we worked on recovering the microcode ROM completely and used that knowledge to implement constructive microcode programs that add to or enhance functionality of the CPU. We also worked on our now open source framework to create and diassemble microcode for AMD CPUs up to 2013. We will give a short intro into how to use it to create custom microcode programs and test them on real hardware. We also provide guidelines on how to construct the test setup we used, which is essentially any old AMD mainboard (native serial port required), a RaspberryPi with a serial adapter and some wiring including a few basic electronic components. Using this you can remotely and automatically test any number of microcode updates and it is integrated in our framework.&#13;
&#13;
On the microcode program side we will show how to hijack microcoded instructions to replace them with new semantics, for example reviving the good-old BOUND x86 instruction. We also show how to roll your own microcode update verification scheme, so only trusted and signed updates can be loaded on vulnerable CPUs.&#13;
&#13;
Additionally we will provide some implementation details found in the microcode ROM and show how it is used to implement complex functions like the instruction WRMSR, which among other functions is used to update the microcode.&#13;
&#13;
We will start with a crash-course covering fundamentals related to instruction decoding, CPU architecture and microcode principles. We will then present our new insights and finish with a demo of how our framework works.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7652">Benjamin Kollenda</person>
          <person id="7984">Philipp Koppe</person>
        </persons>
        <links>
          <link href="https://media.ccc.de/v/34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask">Our 34C3 talk on microcode</link>
          <link href="https://www.syssec.rub.de/research/publications/constructive-microcode/">Paper with our new insights, to-be-presented on CCS 2018</link>
          <link href="https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/koppe">Original microcode paper and corresponding talk</link>
          <link href="https://github.com/RUB-SysSec/Microcode">Github project - to be updated</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/674/original/Microcode35C3.pdf?1545996674">Presentation Slides</attachment>
        </attachments>
      </event>
    </room>
    <room name="Clarke">
      <event id="9599" guid="e9095f5f-a38a-48da-b3d7-20da141b8b14">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9599.html</url>
        <logo>/system/events/logos/000/009/599/large/icon-new.png?1542635567</logo>
        <date>2018-12-27T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>00:40</duration>
        <room>Clarke</room>
        <slug>35c3-9599-locked_up_science</slug>
        <title>Locked up science</title>
        <subtitle>Tearing down paywalls in scholarly communication</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Restricting access to knowledge and science is not beneficial for society. So why are scientific results still locked up behind paywalls? Even though the answer to this question is enlightening, the story is quickly told. Much more important is the knowledge on how to change this.</abstract>
        <description>Politics, research funders, libraries and scientists have to join forces and to push forward to flip scholarly communication from closed to open access. What has happened so far? What are the current developments? What can each of these parties contribute to the transformation of scholarly communication? Open access guidelines, repositories and the hashtag #ICanHazPDF are just a few examples of approaches that jointly undermine the paywalls. One that has been recognized even beyond the scientific community is Project DEAL which aims to achieve open access for scientific publications from German scientists with major academic publishers.&#13;
&#13;
Things are currently progressing very fast and a lot can happen in the weeks between now and the congress. The talk will start with a brief introduction to the most common way of scholarly communication, where science is still mainly locked up behind paywalls. In line with the most recent developments, the talk will then focus on different approaches to open up science and their political and practical consequences. Whatever happens, the transformation of scholarly communication is well underway and it will affect not only the scientific community but society as a whole. So let’s join forces!</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8418">Claudia Frick - @FuzzyLeapfrog</person>
        </persons>
        <links>
          <link href="https://doi.org/10.5281/zenodo.1495601">Slides (DOI)</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/639/original/35c3-FuzzyLeapfrog.pdf?1545913798">Slides</attachment>
        </attachments>
      </event>
      <event id="9513" guid="7177142b-6f15-4fac-af62-c45df7a377a9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9513.html</url>
        <logo/>
        <date>2018-12-27T12:30:00+01:00</date>
        <start>12:30</start>
        <duration>00:40</duration>
        <room>Clarke</room>
        <slug>35c3-9513-mind_the_trap_die_netzpolitik_der_afd_im_bundestag</slug>
        <title>Mind the Trap: Die Netzpolitik der AfD im Bundestag</title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Die AfD-Bundestagsfraktion wird in der Öffentlichkeit vor allem mit ihren rassistischen Positionen wahrgenommen – mit ihren netzpolitischen Aktivitäten bleibt sie zumeist unter dem Radar. Dieser Talk zeigt, wie die AfD-Fraktion die Netzpolitik dennoch als vermeintlich neutrales Thema nutzt, um für ihre rechtsextreme Partei eine parlamentarische und gesellschaftliche Normalisierung herzustellen. </abstract>
        <description>Als Mitarbeiterin einer Bundestagsabgeordneten von den Grünen verfolge ich täglich das Verhalten der AfD in netzpolitischen Debatten im Bundestag: Im Plenarsaal, im Ausschuss Digitale Agenda, in der Enquête-Kommission Künstliche Intelligenz und bei Veranstaltungen und Diskussionen mit außerparlamentarischen Organisationen.&#13;
&#13;
Dabei ist mir aufgefallen, dass die netzpolitischen AfD-Abgeordneten in ihrem Verhalten eher einem kooperationsorientierten statt einem krawallorientierten Parlamentariertyp innerhalb ihrer Fraktion zuzuordnen sind. Die inhaltliche Positionierung der AfD wiederum folgt bei verschiedenen netzpolitischen Debatten zumeist einer von drei verschiedenen Strategien: Konsensorientiert, anti-europäisch oder Opfermythos-betonend. Diese Beobachtungen werden mit einer Reihe von Beispielen illustriert.&#13;
&#13;
Bei den netzpolitischen Diskussionen im Bundestag finden die zentralen Auseinandersetzungen zwischen der Großen Koalition und den demokratischen Oppositionsparteien statt. Was die AfD-Fraktion dazu sagt, wird häufig kaum wahrgenommen.&#13;
&#13;
Dieser Talk zeigt, wie die AfD-Fraktion die Netzpolitik dennoch als vermeintlich neutrales Thema nutzt, um für ihre rechtsextreme Partei eine parlamentarische und gesellschaftliche Normalisierung herzustellen. Er belegt dies anhand zahlreicher Beispiele aus dem parlamentarischen Alltag und zeigt auf, wo diese Strategie bereits aufgeht und wo nicht. Deswegen soll es auch darum gehen, wie zivilgesellschaftliche Organisationen und Akteure damit umgehen können, wenn AfD-Abgeordnete in der netzpolitischen Szene auftauchen und vermeintlich sinnvolle netzpolitische Positionen vertreten.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4918">Noujoum</person>
        </persons>
        <links>
          <link href="https://seyborg.de/">Blog</link>
        </links>
        <attachments/>
      </event>
      <event id="9561" guid="4cc5cf9a-214f-4e7d-991f-199e9f0db8cc">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9561.html</url>
        <logo/>
        <date>2018-12-27T13:30:00+01:00</date>
        <start>13:30</start>
        <duration>00:40</duration>
        <room>Clarke</room>
        <slug>35c3-9561-first_sednit_uefi_rootkit_unveiled</slug>
        <title>First Sednit UEFI Rootkit Unveiled</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>UEFI rootkits have been researched and discussed heavily in the past few years, but sparse evidence has been presented of real campaigns actively trying to compromise systems at this level. Our talk will reveal such a campaign successfully executed by the Sednit group. We will detail the full infection chain showing how Sednit was able to install their custom UEFI module on key targets' computers. Additionally, we will provide an in-depth analysis of their UEFI module and the associated trojanized LoJack agent.</abstract>
        <description>UEFI rootkits have been researched and discussed heavily in the past few years, but sparse evidence has been presented of real campaigns actively trying to compromise systems at this level. Our talk will reveal such a campaign successfully executed by the Sednit group. This APT group, also known as Fancy Bear, Sofacy and APT28, has been linked to numerous high profile cyberattacks such as the 2016 Democratic National Committee email leak scandal.&#13;
&#13;
Earlier this year, there was a public report stating that the infamous Sednit/Sofacy/APT28 APT group successfully trojanized a userland LoJack agent and used it against their targets. LoJack, an embedded anti-theft application, was scrutinized by security researchers in the past because of its unusual persistence method: a module preinstalled in many computers' UEFI/BIOS software. Over the years, several security risks have been found in this product, but no significant in-the-wild activity was ever reported until the discovery of the Sednit group leveraging some of the vulnerabilities affecting the userland agent. However, through our research, we now know that Sednit did not stop there: they also tried to, and succeeded, in installing a custom UEFI module directly into a system's SPI flash memory.&#13;
&#13;
In this talk, we will detail the full infection chain showing how Sednit was able to install their custom UEFI module on key targets' computers. Additionally, we will provide an in-depth analysis of their UEFI module and the associated trojanized LoJack agent.&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8388">Frédéric Vachon</person>
        </persons>
        <links>
          <link href="https://www.welivesecurity.com/wp-content/uploads/2018/09/ESET-LoJax.pdf">LOJAX: First UEFI rootkit found in the wild, courtesy of the Sednit group (white paper)</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/638/original/35C3-First-Sednit-UEFI-Rootkit-Unveiled.pdf?1545904527">Slides</attachment>
        </attachments>
      </event>
      <event id="9809" guid="1601bf3b-ce4a-44c9-993f-7d28fa65168d">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9809.html</url>
        <logo/>
        <date>2018-12-27T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>00:40</duration>
        <room>Clarke</room>
        <slug>35c3-9809-datenschutz_fur_neulandburger</slug>
        <title>Datenschutz für Neulandbürger</title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Der Datenschutz ist als erst relativ frisch erkämpftes Abwehrrecht von Bürgern gegen Firmen und Staat ein wichtiges, aber häufig missverstandenes Rechtsgebiet. Zuletzt ist es durch die Grundverordnung auf europäischer Ebene in den Blick der Netzöffentlichkeit geraten.&#13;
&#13;
Dieser Vortrag soll einen niedrigschwelligen Einstieg in den Datenschutz geben und aus Perspektive einer Datenschützerin mit zehnjähriger Erfahrung im Gebiet die aufregenden Aspekte und Herausforderungen aufzeigen, dem Bürgerrecht Leben einzuhauchen.</abstract>
        <description>Ziele des Vortrags (wird noch zum Volltext ausgearbeitet)&#13;
* Eingrenzen des Rechtsgebiets&#13;
* Beleuchten der Geschichte, Kontrast zu anderen "Geheimnis-Schutz"-Rechten&#13;
* positive Auswirkungen auf den Bürger seit Kodifizierung durch BVerfG und Hessischem Datenschutzgesetz&#13;
(angebliche) negative Auswirkungen auf Sicherheit, Strafverfolgung und Wirtschaftlichkeit&#13;
* jüngste Neuerungen seit DSGVO&#13;
* tatsächliche Auswirkungen der DSGVO auf bestehende Infrastruktur ("Blogsterben", "war vorher schon illegal")&#13;
* Mythos Datenschutzerklärung&#13;
* Wie sieht unsere Lieblings-Datenschutzerklärung aus?&#13;
* Ausblicke auf weitere Initiativen</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6784">Beata Hubrig</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9923" guid="5b947f86-8ba1-4b99-adbe-7c5030deea0c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9923.html</url>
        <logo/>
        <date>2018-12-27T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9923-space_ops_101</slug>
        <title>Space Ops 101</title>
        <subtitle>An introduction to Spacecraft Operations</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>After launching a spacecraft into orbit the actual work for mission control starts. Besides taking care of the position and speed of the spacecraft this includes e.g. detailed modeling of the power usage, planning of ground station contacts, payload operations and dealing with unexpected anomalies. In this talk we will see many examples of problems particular to space crafts and how they influence the way space craft mission operations works.</abstract>
        <description>&lt;p&gt;Suppose you built your own satellite and somehow managed to launch it into space, what are you going to do next? Can you just ssh into your onboard computer and try out a couple of things to take a picture of earth and download the file? Did you just lose contact with your satellite due to an empty battery, because it heated up too much or because it rotated in the wrong direction? What are other issues you might forget to account for?&lt;/p&gt;&#13;
&lt;p&gt;After understanding why in spacecraft operations nothing works the way one expects we will have some answers to these questions. Also we will see how these problems are nowadays tackled by mission control centers all over the world, what happens in emergencies, what FDS, GDS, LEOP and TTC stand for and why spacecraft operators worry so much about weird particularities of time systems. Everything will be illustrated by real-life examples.&lt;/p&gt;&#13;
&lt;p&gt;The only prerequisite for this talk is that you know that earth is not flat!&lt;/p&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8640">sven</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9508" guid="385ac419-50f5-49b5-b571-701691d2734f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9508.html</url>
        <logo>/system/events/logos/000/009/508/large/Screenshot_2018-12-09_21-08-08.png?1544386150</logo>
        <date>2018-12-27T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9508-digital_airwaves</slug>
        <title>Digital Airwaves</title>
        <subtitle>Software Defined Radio Basics and some Modulation Theory </subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Encoding or decoding random radio-waveforms doesn't need incredible expensive hardware anymore which offers new possibilities for building up over-the-air communication systems. There are Software Defined Radios providing affordable cellular radio to remote villages, Community Radios are using SDR to build up digital radio networks and other cool stuff.&#13;
&#13;
Some basic knowledge what is going on in SDR Hard/Software as the influence of the samplerate, I/Q-data of the math behind the waterfall-diagram is helpful to have fun with SDR. Some theory on modulation techniques helps you to decode or encode your waveforms. </abstract>
        <description>With a cheap DVB-T USB  receiver used with some SDR-Software you can already have a look whats going on in the airwaves around you at certain frequencies. But what happens between the antenna and your computer display showing or decoding the signal? The talk should give basic information and background about SDR and some modulation theory.&#13;
&#13;
There will probably be a SDR Challenge at the Congress to practice you new skills. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5073">Friederike</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9372" guid="eff16504-08ce-4de0-bf44-d877d286aac9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9372.html</url>
        <logo>/system/events/logos/000/009/372/large/edri_logo.png?1536831004</logo>
        <date>2018-12-27T18:50:00+01:00</date>
        <start>18:50</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9372-citzens_or_subjects_the_battle_to_control_our_bodies_speech_and_communications</slug>
        <title>Citzens or subjects? The battle to control our bodies, speech and communications</title>
        <subtitle>A call to action to defend our ePrivacy and eliminate upload filters</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Technology is the solution: What is the problem? This seems to be the motto. Algorithms  may be about to control our free speech while  tracking technologies could control our bodies and communications. Will we react or stay quiet?</abstract>
        <description>Technology is the solution: What is the problem? This seems to be the motto. Whether it is about preventing the dissemination of terrorist content or to prevent copyright infringements the solution from the legislator is upload filters. &#13;
&#13;
While content is controlled by algorithms, devices need to be under scrutiny. That is why confidentiality of communications needs to be secured now too.&#13;
&#13;
We have little time to stop these threats from becoming a reality, but we have most citizens on our side and the EU elections near. We still can and have to win this battle. Otherwise, once filters are put for copyright or terrorist content, they will be used for anything else. And if software and hardware does not defend our privacy by design and by default, 24/7 surveillance will be the new "normal".</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8131">Diego Naranjo (EDRi)</person>
          <person id="8770">Andreea Belu (EDRi)</person>
        </persons>
        <links>
          <link href="https://edri.org/press-release-eu-parliament-flip-flops-backwards-on-copyright/">EDRi's analysis on the adoption of upload filters</link>
          <link href="https://www.eff.org/deeplinks/2018/09/today-europe-lost-internet-now-we-fight-back">EFF analysis of upload filters in the EU</link>
        </links>
        <attachments/>
      </event>
      <event id="9358" guid="a9c0c28c-4f40-4d06-99da-d73fbb2655c4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9358.html</url>
        <logo>/system/events/logos/000/009/358/large/Wikipedia_ZDF.gif?1536738413</logo>
        <date>2018-12-27T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9358-chaos_im_fernsehrat</slug>
        <title>Chaos im Fernsehrat</title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Seit Juli 2016 darf ich – nominiert unter anderem vom CCC – den Bereich "Internet" im Fernsehrat des ZDF vertreten. Nach gut zwei Jahren ist es Zeit für eine Zwischenbilanz: Was macht ein Fernsehrat, was machen öffentlich-rechtliche Angebote im Netz, und was sollten sie eigentlich tun? </abstract>
        <description>&lt;blockquote&gt;Der Fernsehrat vertritt die Interessen der Allgemeinheit gegenüber dem ZDF. Deshalb ist er kein Expertengremium, sondern so vielfältig wie die Gesellschaft selbst. Seine Mitglieder werden von unterschiedlichen gesellschaftlichen Gruppen entsandt. Der Fernsehrat tagt öffentlich. Sowohl die Tagesordnung als auch die Zusammenfassungen der wesentlichen Ergebnisse der Sitzungen werden im Internet veröffentlicht.&lt;/blockquote&gt;&#13;
&#13;
So beschreibt sich der ZDF-Fernsehrat auf seiner Webseite selbst. Nach einem Urteil des Bundesverfassungsgerichts im Jahr 2014 mussten die Länder den ZDF-Staatsvertrag neu formulieren, der Fernsehrat ist deshalb seit Juli 2016 neu zusammengesetzt. Nur noch maximal 20 von 60 Mitgliedern dürfen aktive Politiker sein, der Rest soll verschiedene gesellschaftliche Gruppen repräsentieren. Neu hinzu kamen im Zuge der Neuordnung Vertreter, die von den Ländern – in der Regel auf Vorschlag von Vereinen oder Verbänden – für Bereiche wie Minderheiten, Menschen mit Behinderung, Digitales oder LGBTQI nominiert werden.&#13;
&#13;
Während Bayern das Nominierungsrecht für den Bereich "Digitales" an den Branchenverband der Telekommunikationsindustrie BITKOM delegiert hat, wurde ich vom Land Berlin auf gemeinsamen Vorschlag der vier Vereine &lt;a href="https://ccc.de/"&gt;Chaos Computer Club (CCC)&lt;/a&gt;, &lt;a href="https://d-64.org/"&gt;D64 – Zentrum für Digitalen Fortschritt e. V.&lt;/a&gt;, &lt;a href="https://www.eco.de/"&gt;eco – Verband der Internetwirtschaft&lt;/a&gt; und &lt;a href="http://www.medianet-bb.de/"&gt;media.net berlinbrandenburg e. V.&lt;/a&gt; für den Bereich "Internet" nominiert. &#13;
&#13;
Nach etwas mehr als der Hälfte meiner vierjährigen Periode möchte ich im Rahmen des 35C3 von meinen Aktivitäten als und im Fernsehrat berichten – zumindest soweit das übertriebene Verschwiegenheitsklauseln zulassen – und skizzieren, welche (neuen) Aufgaben öffentlich-rechtliche Medien gerade im Zeitalter digitaler Plattformöffentlichkeiten haben. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4212">Leonhard Dobusch</person>
        </persons>
        <links>
          <link href="https://netzpolitik.org/neues-aus-dem-fernsehrat/">Reihe "Neues aus dem Fernsehrat" bei netzpolitik.org</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/651/original/Dobusch-35C3-Chaos_im_Fernsehrat_FINAL.pdf?1545924504">Slides "Chaos im Fernsehrat"</attachment>
        </attachments>
      </event>
      <event id="9792" guid="bf5019dc-499d-4c06-9ad0-35adbe01e7f3">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9792.html</url>
        <logo/>
        <date>2018-12-27T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9792-quantum_mechanics</slug>
        <title>Quantum Mechanics</title>
        <subtitle>A Gentle Introduction</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>An (almost) self-contained introduction to the basic ideas of quantum mechanics. The theory and important experimental results will be discussed.</abstract>
        <description>&lt;p&gt;Quantum mechanics is one of the two paradigm-changing physical theories of the early twentieth century (the other being special and general relativity). Suddenly, one of the most fundamental physical theories was no longer deterministic: Measurement is a probabilistic process in quantum mechanics. This caused a controversy on how to interpret this and whether quantum mechanics is a complete theory that continues until today.&lt;/p&gt;&#13;
&lt;p&gt;This talk tries to counter a trend: Most people know the fundamentals of special relativity, while few know quantum mechanics beyond the Bohr model of hydrogen. On reason is that the presentation of quantum mechanics in schoolbooks is often dated, inaccurate and incomplete, and, as a consequence, quantum mechanical concepts are often used as a magical component in fringe science and esoteric theories.&lt;/p&gt;&#13;
&lt;p&gt;The talk will shortly discuss some of the experimental results that have lead to the formulation of quantum mechanics and then formulate the theory. The parts of quantum mechanics that often show up in quack theories will be examined and dissected.&lt;/p&gt;&#13;
&lt;p&gt;Allergy advice: This talk may contain mathematics. Some prior knowledge of linear algebra will help to understand this talk.&lt;/p&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8587">sri</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/665/original/talk.pdf?1545952876">Presentation Slides</attachment>
        </attachments>
      </event>
      <event id="9951" guid="07cbfcb7-08de-4965-b70f-f904d39f7c78">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9951.html</url>
        <logo>/system/events/logos/000/009/951/large/mass-awareness-mass-surveillance-2.png?1539643035</logo>
        <date>2018-12-27T23:30:00+01:00</date>
        <start>23:30</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9951-it_always_feels_like_the_five_eyes_are_watching_you</slug>
        <title>It Always Feels Like the Five Eyes Are Watching You</title>
        <subtitle>Five Eyes’ Quest For Security Has Given Us Widespread Insecurity</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This talk will discuss all about the Five Eyes, the espionage alliance between Australia, Canada, New Zealand, the United Kingdom and the United States. It is one of the largest intelligence operations in the world, which monitors billions of communications around the globe in the name of security. Yet the Five Eyes propose to weaken security, privacy and eroded the possibility of secure systems.</abstract>
        <description>This talk will go into details about the Five Eyes (FVEY), covering its origins in the aftermath of World War II, its expansion in the cold war, ECHELON, and further expansion in the the era of counter-terrorism, through today, where the Five Eyes have set their sights on enabling mass surveillance and stopping strong encryption.&#13;
&#13;
The discussion will include:&#13;
- The history and background of the Five Eyes&#13;
	Origins&#13;
	Cold War (ECHELON)&#13;
	Terrorism&#13;
- How the FVEY spying and intelligence sharing works&#13;
	- Malware&#13;
	- Backdoors&#13;
	- Routers&#13;
	- Internet exchanges&#13;
- Domestic sharing: when one member spies on another’s citizens, and shares the information back to get around prohibitions on domestic surveillance.&#13;
- More Eyes, More Problems.  Proposals to expand the number of eyes, including many within the EU&#13;
- Whistleblowers: What the documents shared by Edward Snowden revealed about the Five Eyes&#13;
- The Five Eyes latest fight: Against strong encryption. FVEY member claim to aim to "thwart the encryption of terrorist messaging,” and the UK and Australia have taken steps through legislation to weaken security.&#13;
- Why this matters - the legal and policy framework for communications surveillance and the application of human rights principles for surveillance.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4020">Kurt Opsahl</person>
        </persons>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Dijkstra">
      <event id="9529" guid="2912b643-f5a8-4bbd-8b24-74983bc55754">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9529.html</url>
        <logo/>
        <date>2018-12-27T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9529-artistic_pcb_design_and_fabrication</slug>
        <title>Artistic PCB Design and Fabrication</title>
        <subtitle>From doodle to manufacture: how I make mechanically complicated PCBs.</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>When a electrical device needs to be a piece of art or used as a mechanical component, a printed circuit board is more than a piece of fiberglass with wires embedded in it. In chemical engineering applications internal holes which allow fluids to be transported through the PCB need to be placed in complex precise patterns. As art, holes can be used to create positive and negative space, allowing you to see a charlieplexed LED display as a snowflake. Creating complex shapes in PCB design software is difficult to impossible. However, it is easy in CAD software. In this talk I will present the project workflow I use to design and manufacture my PCBs. Additionally, I will discuss the problems I have run into during manufacturing and how these problems were resolved. </abstract>
        <description>&lt;p&gt;Making electrical-artistic and electrical-mechanical PCBs adds steps and complications to the usual PCB fabrication process. In this talk I will go over my project workflow and discuss how and why I do each step. I will also discuss problems I have run into during both the design and the manufacturing process.&lt;/p&gt;&#13;
&lt;p&gt;An overview of my workflow is as follows:&lt;p&gt;&#13;
&lt;ul&gt;&#13;
&lt;li&gt;Make a sketch of what the final PCB will look like and what it will do.&#13;
&lt;li&gt;Make a schematic of the electronics (kicad).&#13;
&lt;li&gt;Assign footprints to the electrical components (kicad).&#13;
&lt;li&gt;Check the manufacturers webpage for the design criterion on internal cuts.&#13;
&lt;li&gt;Create a CAD file of the PCB outline (no electrical connections) (fusion 360/solidworks etc).&#13;
&lt;li&gt; (optional) Conduct multiphysics simulations of the PCB outline, to find an optimal design (comsol etc).&#13;
&lt;li&gt;Make boxes to represent the footprints of the electrical components and place these where you want them to be on the final PCB (fusion 360/solidworks etc).&#13;
&lt;li&gt;Think about how the boards will be panelized and insert mouse bites/tabs for V-cuts as needed (fusion 360/solidworks etc).&#13;
&lt;li&gt;Export a 2D drawing of the PCB including the components.&#13;
&lt;li&gt;Make a PCB file with all the components (kicad).&#13;
&lt;li&gt;Import the 2D drawing of the PCB as the edge cuts in the PCB file (kicad).&#13;
&lt;li&gt;Place electrical components in the correct location and delete the edge cuts which are just being used as markers (kicad).&#13;
&lt;li&gt;Use a routing software to connect components or connect these manually.&#13;
&lt;li&gt;(optional) Panelize the boards by making a new PCB file and importing the single PCB.&#13;
&lt;li&gt;Export the gerber files.&#13;
&lt;li&gt;Check that the outlines are correct in the gerber files and clean up machining code if necessary.&#13;
&lt;li&gt;Upload files to manufacturers webpage and include an image of which places should be milled out.&#13;
&lt;/ul&gt;&#13;
&lt;p&gt;Common problems have included:&lt;/p&gt;&#13;
&lt;ul&gt;&#13;
&lt;li&gt;V-cuts on non-rectangular PCBs.&#13;
&lt;li&gt;Keepout zones on internal edge-cuts.&#13;
&lt;li&gt;Gerber file generation errors caused by internal edge cuts and pannelization.&#13;
&lt;li&gt;Some manufacturers do not do internal edge cuts.&#13;
&lt;li&gt;Boards are mechanically weakened by internal cuts.&#13;
&lt;/ul&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8162">hammes hacks</person>
        </persons>
        <links>
          <link href="http://hammeshacks.com/">Project Webpage</link>
          <link href="https://www.youtube.com/channel/UCuMGhT5u-Y6Ju8j4m7s8X2A">Youtube Channel</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/507/original/IMG_20181008_181143.jpg?1539015548">shamrock</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
        </attachments>
      </event>
      <event id="9720" guid="c8b34953-b60f-4ed0-8784-dc20153e0725">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9720.html</url>
        <logo/>
        <date>2018-12-27T13:30:00+01:00</date>
        <start>13:30</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9720-frontex_der_europaische_grenzgeheimdienst</slug>
        <title>Frontex: Der europäische Grenzgeheimdienst</title>
        <subtitle>Das Grenzüberwachungssystem EUROSUR führt Aufklärungsdaten von Satelliten, Flugzeugen, Drohnen und bald auch Fesselballons zusammen</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Die EU-Grenzagentur Frontex nimmt eine Reihe neuer Überwachungsmethoden im Mittelmeer in Betrieb. Die Fähigkeiten zur Beobachtung des sogenannten Grenzvorbereichs gehören zum Grenzüberwachungssystem EUROSUR, das die Europäische Union vor fünf Jahren gestartet hat. </abstract>
        <description>EUROSUR vernetzt die Zentrale von Frontex in Warschau mit den Grenzbehörden der 28 Mitgliedstaaten. Über deren nationale Koordinierungszentren wird Frontex über alle wichtigen Vorkommnisse an den Außengrenzen der Europäischen Union unterrichtet. Kern des EUROSUR-Systems ist die Satellitenaufklärung, über die Frontex auch selbst an den Grenzen beobachten kann. Die Bilder stammen von kommerziellen Satellitendiensten sowie von optischen und radarbasierten Satelliten des EU-Erdbeobachtungsprogramms „Copernicus“. Sie werden vom Satellitenzentrum der Europäischen Union (SatCen) erhoben, aufbereitet und an Frontex übermittelt. Zu den Bildlieferanten gehört der Rüstungskonzern Airbus, der Bilder seiner Radarsatelliten „TerraSar-X“ und „TanDEM-X“ mit einer Auflösung von 24 cm verkauft. Für die schnelle Kommunikation mit den Satelliten nutzt „Copernicus“ als erster Kunde die „Weltraumdatenautobahn“ des Airbus-Konzerns. Die Nutzung der Daten für die einzelnen AnwenderInnen wurde erst kürzlich mithilfe einer App vereinfacht, die ein Mitarbeiter der Abteilung „Informationshoheit“ als eine Art Instagram für Sicherheitsanwendungen beschreibt.&#13;
Nun werden auch die technischen Fähigkeiten von „Copernicus“ ausgebaut. Das System soll „Unregelmäßigkeiten im Schiffsverhalten“ erkennen und melden. Dabei werden Informationen zum Standort, der Schiffsbezeichnung und zum abweichenden Verhalten übermittelt. Als verdächtig kann etwa gelten, wenn ein Schiff keine gewöhnlichen Routen fährt oder die Geschwindigkeit verlangsamt. Frontex hat im vergangenen Jahr einen „Mehrzweck-Flugdienst“ gestartet. Von Flugzeugen über dem Mittelmeer aufgenommene Videos werden in Echtzeit in ein Lagezentrum der EUROSUR-Zentrale nach Warschau gestreamt. Seit diesem Jahr erhält Frontex außerdem Bilder von Aufklärungsdrohnen, die von der Agentur für die Sicherheit des Seeverkehrs geflogen werden. Zunächst handelt es sich dabei um ein Pilotprojekt für zwei verschieden große Drohnen der MALE-Klasse. Demnächst will Frontex außerdem Fesselballons zur „Grenzraumüberwachung aus der Luft“ testen. &#13;
&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4722">Matthias Monroy</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/538/original/EUROSUR-Pilot.jpg?1539592021"> EUROSUR-Pilotprojekt von 2009. Damals kam die Gefahr für Frontex noch aus dem Osten.</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/650/original/35C3_Frontex.pdf?1545923568">Präsentation</attachment>
        </attachments>
      </event>
      <event id="9909" guid="65563dfd-db48-41ea-85a9-e889dd673d09">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9909.html</url>
        <logo>/system/events/logos/000/009/909/large/schrift_knoten.png?1539639051</logo>
        <date>2018-12-27T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9909-updates_von_der_europaischen_aussengrenze</slug>
        <title>Updates von der europäischen Außengrenze</title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Als Organisation für Menschenrechtsbeobachtungen geben wir Euch einen Überblick der aktuellen Entwicklungen an der EU-Außengrenze auf dem Mittelmeer.</abstract>
        <description>Mare Liberum betreibt ein Schiff auf dem Mittelmeer, um Menschenrechtsverletzungen zu dokumentieren. Dabei arbeiten wir zur Zeit in der Ägäis, der Seegrenze zwischen der Türkei und Griechenland. Hier flüchten noch immer tausende Menschen auf der Suche nach Schutz und Würde.&#13;
&#13;
Seit den Vorträgen von Sea-Watch und der Iuventa-Crew ist viel Zeit vergangen. Die zivilen Seenotrettungsorganisationen fahren nicht mehr raus – sind alle gerettet?&#13;
&#13;
Wie hat sich die Situation für die Flüchtenden und Helfer verändert?&#13;
&#13;
Wie werden Euch einen Überblick der aktuellen Entwicklungen an der EU-Außengrenze auf dem Mittelmeer geben.&#13;
&#13;
Warum schaffen es die europäischen Staaten nach fünf Jahren Katastrophe im Mittelmeer nicht, das Sterben zu beenden? Was ist eigentlich deren Agenda?&#13;
&#13;
Warum wollen alle ständig eine neue Flagge?&#13;
&#13;
Wie gut funktionert eigentlich der EU-Türkei-Deal?&#13;
&#13;
Welche staatlichen Akteure gibt es auf dem Wasser und was machen sie?&#13;
&#13;
Warum ist die Rolle der Menschenrechtsbeobachter, selbst in Europa, so wichtig?</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8627">Nico</person>
          <person id="8743">Nina Gassmann</person>
        </persons>
        <links>
          <link href="https://mare-liberum.org">Mare Liberum e. V.</link>
          <link href="https://mare-liberum.org/de/support">Unterstützung</link>
        </links>
        <attachments/>
      </event>
      <event id="10027" guid="4db8970f-bbfe-4541-90a8-31a05d599ffb">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10027.html</url>
        <logo/>
        <date>2018-12-27T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-10027-cyber-_stalking_wenn_grenzen_verschwimmen</slug>
        <title>(Cyber-)Stalking: Wenn Grenzen verschwimmen</title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>&lt;p&gt;Von unerwünschten Nachrichten über Bedrohungen bis hin zum Intimizid. Allein im Jahr 2017 wurden rund 18.483 Fälle von Stalking polizeilich erfasst, die Dunkelziffer wird auf 600.000-800.000 Betroffene geschätzt. Unter dem Begriff Stalking wird allgemein das „wiederholte, widerrechtliche Verfolgen und Belästigen eines Menschen, so dass dessen Sicherheit bedroht und er/sie in seiner/ihrer Lebensgestaltung schwerwiegend beeinträchtig wird“ verstanden. Die Ausführungsformen und Intensität des Stalkings oder Cyberstalkings sind sehr heterogen, sodass sich oft die Frage nach der Grenze zur Strafbarkeit stellt.&lt;\p&gt;</abstract>
        <description>&lt;p&gt;Neben einer kurzen Einführung in den Phänomenbereich werden die Ursachen und Typologien des Stalkings skizziert, sowie Internventionsmöglichkeiten präsentiert: Welche psychotherapeutischen Unterstützungsmaßnahmen gibt es für Betroffene und Ausführende? Welche juristischen Möglichkeiten gibt es?  &lt;\p&gt;&#13;
&lt;p&gt;Da rund jeder zwölfte Mensch in Deutschland in seinem Leben von Stalking betroffen ist und der/die Ausführende zumeist aus dem Nahbereich der/des Betroffenen stammt, kann sich auch im eigenen Freundeskreis die Frage stellen: Wie kann ich einer/m Stalking-Betroffen/m unterstützen und helfen? Oder wie spreche ich eine/n vermutlichen Stalking-Ausführende/n auf sein/ihr Verhalten an?&lt;\p&gt;&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8741">Jan Kalbitzer</person>
          <person id="8740">Korina Winter </person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="10023" guid="a5de31e6-0223-4b1f-953c-558e2fd39bd9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10023.html</url>
        <logo>/system/events/logos/000/010/023/large/Fliegenpilz_fly-agaric-2817723_640.jpg?1545772806</logo>
        <date>2018-12-27T17:10:00+01:00</date>
        <start>17:10</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-10023-stalking_spy_apps_doxing_digitale_gewalt_gegen_frauen</slug>
        <title>Stalking, Spy Apps, Doxing: Digitale Gewalt gegen Frauen</title>
        <subtitle>Die digitale Seite der häuslichen Gewalt</subtitle>
        <track>CCC</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Digitale Formen von Gewalt gegen Frauen sind keine eigenständigen Phänomene, sondern in der Regel Weiterführungen oder Ergänzungen von anderen Gewaltformen. Stalking, Kontrolle, Bedrohung, Erpressung, Beleidigung, Überwachung sind altbekannte Aspekte häuslicher Gewalt. Für alle diese Phänomene gibt es digitale Entsprechungen, allerdings ist wenig darüber bekannt, wie oft sie ausgeübt werden, wann und von wem. Das macht es für die Betroffenen schwer, sich zu wehren, auch weil Politik und Justiz hier genauso verständnislos reagieren wie bei anderen digitalen Entwicklungen. </abstract>
        <description>Warum ist Kinderpornographie ein Kernthema der deutschen und europäischen Innenpolitik, aber kaum jemand redet über Revenge-Porn?&lt;/br&gt;&#13;
&lt;/br&gt;&#13;
In diesem Talk geht es um die verschiedenen Formen digitaler Gewalt und darum, wie oft sie vorkommen und wer davon betroffen ist.&lt;/br&gt;&#13;
&lt;/br&gt;&#13;
Es gibt kaum aussagekräftige Zahlen und wenig Hilfe für Betroffene. Warum wissen wir sowenig und was gibt es für Möglichkeiten, sich gegen die verschiedenen Formen digitaler Gewalt zu wehren? &lt;/br&gt;&#13;
&#13;
&#13;
&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="1864">Anne Roth</person>
        </persons>
        <links>
          <link href="https://www.aktiv-gegen-digitale-gewalt.de/de/">bff Projekt 'Aktiv gegen digitale Gewalt'</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/628/original/KleineAnfrage_Digitale_Gewalt_19-6174.pdf?1545758999">Kleine Anfrage Die Linke "Digitale Gewalt gegen Frauen"</attachment>
        </attachments>
      </event>
      <event id="9383" guid="8a3e490c-30a5-46a6-ab4f-45ef3b23b1a1">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9383.html</url>
        <logo>/system/events/logos/000/009/383/large/Screen-Shot-2018-08-14-at-4.16.18-AM-1.png?1536981731</logo>
        <date>2018-12-27T18:10:00+01:00</date>
        <start>18:10</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9383-compromising_online_accounts_by_cracking_voicemail_systems</slug>
        <title>Compromising online accounts by cracking voicemail systems</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Voicemail systems can be compromised by leveraging old weaknesses and top of current technology. The impact goes way beyond having your messages exposed.</abstract>
        <description>Voicemail systems have been with us since the 80s. They played a big role in the earlier hacking scene and re-reading those zines, articles and tutorials paints an interesting picture. Not much has changed. Not in the technology nor in some of the attack vectors. Can we leverage the last 30 years innovations to compromise voicemail systems? And what is the real impact today of pwning these?&#13;
&#13;
In this talk I will cover voicemail systems, it's security and how we can use oldskool techniques and new ones on top of current technology to compromise them. I will discuss the impact of gaining unauthorized access to voicemail systems and introduce a new tool that automates the process.&#13;
&#13;
Correction: There is no default PIN on O2 anymore. Initial PINs are generated randomly as it is the case for Vodafone and Telekom.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7159">Martin Vigo</person>
        </persons>
        <links>
          <link href="https://www.martinvigo.com/demo_bruteforcing.mp4">Bruteforcing a voicemail PIN with voicemailcracker</link>
          <link href="https://www.martinvigo.com/demo_whatsapp.mp4">Compromising WhatsApp with voicemailcracker</link>
          <link href="https://www.martinvigo.com/demo_paypal.mp4">Compromising Paypal with voicemailcracker</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/667/original/compromising_online_accounts_by_cracking_voicemail_systems.pdf?1545960801">Slides</attachment>
        </attachments>
      </event>
      <event id="9675" guid="ffdc92f3-1a39-4931-9409-f8bfabe9f628">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9675.html</url>
        <logo/>
        <date>2018-12-27T19:10:00+01:00</date>
        <start>19:10</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9675-transmission_control_protocol</slug>
        <title>Transmission Control Protocol</title>
        <subtitle>TCP/IP basics</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>TCP/IP is the most widely used protocol on the Internet for transmitting data. But how does it work in detail? This talk will explain the TCP protocol, from handshake over established to teardown in detail - and elaborate a bit on protocol adjustments over time and congestion control.</abstract>
        <description>I will briefly explain how computers talk to each other via the Internet Protocol (IP), and explain the transport protocols UDP and TCP, and their interaction with ICMP (for error and control messages). UDP is the user datagram protocol, an unreliable packet-oriented protocol. TCP provides a reliable stream of data, and includes connection establishment, feature negotiation, window management, and teardown.&#13;
&#13;
Over the last years at University of Cambridge I contributed to a formal model of TCP/IP and the Unix sockets API, developed in HOL4. We validated our HOL4 model with the FreeBSD-12 stack using Dtrace (packets, system calls, internal TCP state). In this research, we formalised a more exact TCP state machine than in initial RFCs or common literature (Stevens).</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="1626">Hannes Mehnert</person>
        </persons>
        <links>
          <link href="https://www.cl.cam.ac.uk/~pes20/Netsem/paper3.pdf">Engineering with Logic: Rigorous Test-Oracle Specification and Validation for TCP/IP and the Sockets API</link>
          <link href="https://github.com/rems-project/netsem">Network Semantics repository</link>
        </links>
        <attachments/>
      </event>
      <event id="9778" guid="dbd61e6a-dbde-4dcd-9b2e-73ba7ad62861">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9778.html</url>
        <logo>/system/events/logos/000/009/778/large/oscar_eckig.png?1545254350</logo>
        <date>2018-12-27T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9778-open_source_firmware</slug>
        <title>Open Source Firmware</title>
        <subtitle>Eine Liebesgeschichte</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Open Source firmware ist ein Begriff seit 1999 wo LinuxBIOS (coreboot) und u-boot als Projekt starteten. Heute nach fast 20 Jahren ist endlich Open Source firmware bei den Herstellern von Hardware angekommen:&#13;
&#13;
Google Chromebooks - coreboot&#13;
Facebook Open Compute Hardware - coreboot / LinuxBoot&#13;
Purism Laptops - coreboot&#13;
Microsoft Olympus - TianoCore&#13;
Microsoft Surface - TianoCore&#13;
IBM Power 9 - Hostboot / Skiboot&#13;
ARM Hardware - ARM Trusted Firmware&#13;
Intel Minnowboard - TianoCore, coreboot&#13;
A lot embedded hardware - u-boot&#13;
&#13;
In diesem Vortrag werden wir uns den Weg der Open Source firmware  Entwicklung von der Vergangeheit bis in die Gegenwart anschauen. Dabei werden wir ein Schwerpunkt auf neue Technologien in der Firmware Entwicklung und eine Einführung in bestehende Konzepte legen. Teil des Vortrags werden auch Sicherheitstechnologien und Konzepte der Firmware sein. Zum Schluss werden wir einen Ausblick auf die Zukunft und damit verbundenen Ideen uns anschauen.&#13;
&#13;
Dies ist ein Einsteiger Vortrag der dazu dienen soll mehr Menschen von der Open Source Firmware Entwicklung zu begeistern.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8332">zaolin</person>
        </persons>
        <links>
          <link href="www.coreboot.org">coreboot</link>
          <link href="www.linuxboot.org">LinuxBoot</link>
          <link href="www.denx.de/wiki/U-Boot">U-Boot</link>
          <link href="www.tianocore.org">TianoCore</link>
          <link href="www.trustedfirmware.org">ARM Trusted Firmware</link>
          <link href="github.com/open-power/hostboot">Hostboot</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/668/original/slides_open-source-firmware.zip?1545963349">Talk slides</attachment>
        </attachments>
      </event>
      <event id="9456" guid="1dc4f8d0-e5f6-4e49-b647-1a5e0cabbb00">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9456.html</url>
        <logo/>
        <date>2018-12-27T23:30:00+01:00</date>
        <start>23:30</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9456-hacking_ecology</slug>
        <title>Hacking Ecology</title>
        <subtitle>How Data Scientists can help to avoid a sixth global extinction</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>As humans have a large negative impact on ecosystems all around the globe, we are approaching a major extinction event in which around 70% of all species will go extinct. This talk will give an introduction to a data-driven and system-based view of ecology.</abstract>
        <description>Since life emerged on this planet around 3 billion years ago, five global extinction events took place, that are characterized by over 60% of all species disappearing within a geologically short time interval. The last decades of environmental research, however, made it evidently clear that anthropogenic impacts on the global ecology could lead to a sixth global extinction. Being caused by the destabilization of ecosystems due to climate change, poaching, fragmenting of habitats, species invasions, pollution and other human activities, this extinction event would be the first induced by a species and not by natural catastrophes.&#13;
&#13;
Two general paths of action seem available to mitigate this threat or at least limit the damage: One consists of radically limiting anthropogenic influence on nature by restricting human habitats (to, as argued by E. O. Wilson among others, half of the earths surface), which, however, seems politically infeasible. A second strategy aims to effectively re-stabilize ecosystems by selective and specific intervention, but this would require a much deeper knowledge of ecosystem processes and how to modulate them. &#13;
&#13;
In this talk, I will provide an overview of the declining quality of ecosystems worldwide and argue that data-driven approaches as well as a hacker mindset will be essential to tackle open questions. I will support this argument by examples from my own research, in which I aim to identify important interactions between microbes in lake ecosystems. Finally, I will try to start a discussion on how to create citizen science projects that will help us understand our natural environment.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8239">Theodor Sperlea</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/656/original/Talk_35c3_169.pdf?1545927988">Presentation slides</attachment>
        </attachments>
      </event>
    </room>
    <room name="Eliza">
      <event id="9913" guid="bfdac26a-86bf-4a80-99c6-a9a0be15f003">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9913.html</url>
        <logo/>
        <date>2018-12-27T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9913-going_deep_underground_to_watch_the_stars</slug>
        <title>Going Deep Underground to Watch the Stars</title>
        <subtitle>Neutrino Astronomy with Hyper-Kamiokande</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Neutrinos are “ghost-like” elementary particles that can literally go through walls. They can bring information from places that are impossible to observe through other means.&#13;
This talk provides a glimpse behind the scenes of a next-generation neutrino detector called Hyper-Kamiokande – a cylindrical water tank the size of a high-rise building. I will describe some of the problems you encounter when planning a subterranean detector of this size, and explain how this detector helps us figure out why the sun shines and how giant stars explode.</abstract>
        <description>Neutrinos are tiny elementary particles that do not interact through the electromagnetic force. Almost like ghosts, they can literally go through walls and escape places that are inaccessible by other means, giving us a unique way of observing the interior of stars or nuclear reactors.&#13;
&#13;
Hyper-Kamiokande – a cylindrical water tank that is 62 m high and 76 m in diameter – is a next-generation neutrino detector, which will be built inside a mountain 250 km northwest of Tokyo starting in 2020. The talk will give an overview on the process of designing and building a subterranean detector of this size, starting from preparations for cavern construction and ending with the design of photodetectors, electronics and data analysis.&#13;
&#13;
In addition, the talk will cover selected areas of the physics programme of this detector. It will be explained how detecting neutrinos from our sun lets us figure out why the sun shines and how we can measure the temperature at its core to a precision of about 1%. Finally, I will explain how such a neutrino detector can help us watch, millisecond by millisecond, how giant stars explode in a supernova, creating many of the chemical elements that are necessary for life and computers to exist.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6836">Jost Migenda</person>
        </persons>
        <links>
          <link href="http://www.hyperk.org">Hyper-Kamiokande website</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/630/original/35C3_JostMigenda.pdf?1545850403">Slides (pdf, 30MB)</attachment>
        </attachments>
      </event>
      <event id="9410" guid="9d8d4506-03b2-483d-aee5-d106f0a3eef5">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9410.html</url>
        <logo>/system/events/logos/000/009/410/large/lsa.png?1537339912</logo>
        <date>2018-12-27T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9410-libresilicon</slug>
        <title>LibreSilicon</title>
        <subtitle>Decentralizing semiconductor manufacturing</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>While a lot of projects are currently developing their own processors, mostly as open source in Verilog, VHDL or even Chisel, we miss the free process that actually manufactures these chips. So we're developing the "Libre Silicon" project, a portable semiconductor manufacturing process and technology, using only free and open source tools: We would like to introduce the project, who we are, what we are doing and where we are now.</abstract>
        <description>The manufacturing is proprietary and has vendor lock-ins with triple NDAs – one for the &lt;b&gt;process development kit&lt;/b&gt; (PDK), the technology itself; – one for the Standard Cell Library you can use to synthesize your RTL; – and even another one for the details of all purchase commitments.&#13;
&#13;
Our purpose is a free and open, community based silicon manufacturing process (&lt;a href="https://github.com/libresilicon/process"&gt;GitHub link&lt;/a&gt;) without any NDAs, a Standard Cell Library (&lt;a href="https://github.com/chipforge/StdCellLib"&gt;GitHub link&lt;/a&gt;) not only for that process as well as a suitable, refurbished, new-written open source tool chain QtFlow (&lt;a href="https://github.com/leviathanch/qtflow"&gt;GitHub link&lt;/a&gt;).&#13;
&#13;
During the last couple of months we already developed the first free 1µm process and are now close to manufacturing a first test wafer (&lt;a href="https://github.com/libresilicon/PearlRiver"&gt;GitHub link&lt;/a&gt;). Even though 1µm does not sounds very ambitious, this process node is still quite well documented in text books, robust and 5 Volt-tolerant.&#13;
&#13;
Once we get a hang on this, the machinery park in the clean room allows us to shrink down to 500nm and less.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4618">leviathan</person>
          <person id="1018">hsank</person>
          <person id="8731">Andreas Westerwick</person>
        </persons>
        <links>
          <link href="https://github.com/leviathanch/qtflow">QtFlow</link>
          <link href="https://github.com/chipforge/StdCellLib">Standard Cell Lib</link>
          <link href="http://libresilicon.com/">LibreSilicon project page</link>
          <link href="https://github.com/chipforge/PearlRiver">PearlRiver test wafer</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/636/original/talk-20181227-35c3.pdf?1545900171">talk-20181227-35c3.pdf</attachment>
        </attachments>
      </event>
      <event id="9375" guid="6a5007f4-e7d6-4c63-9a10-26dd48a6eb6c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9375.html</url>
        <logo>/system/events/logos/000/009/375/large/logo.png?1542061465</logo>
        <date>2018-12-27T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9375-silivaccine_north_korea_s_weapon_of_mass_detection</slug>
        <title>SiliVaccine: North Korea's Weapon of Mass Detection</title>
        <subtitle>How I Learned to Stop Worrying and Love the Backdoor</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Meet SiliVaccine – North Korea's national Anti-Virus solution. SiliVaccine is deployed widely and exclusively in the DPRK, and has been continuously in development by dedicated government teams for over fifteen years. When we heard of this strange software, we were immediately driven to investigate it: it's not every day that you can catch a glimpse of the malware landscape inside the closed garden of the DPRK's intranet.&#13;
&#13;
In this talk, we will describe how we were able to obtain a rare copy of SiliVaccine; how we reverse-engineered it, despite the hair-tearing obstacles; and what surprising discoveries we made about its program architecture – all the way down to the file scanning engine, the system level drivers, the user mode utilities, and the most bizarre and puzzling implementation details. As it turns out, there is plenty going on behind the scenes of this product, away from the public eye.&#13;
&#13;
How was SiliVaccine created? Who created it? What was the game plan? We will try to shed light on these questions, and on the sheer effort that must have gone into developing this product. If there is anything we learned from this research, it's that DPRK state-sponsored software is a secretive industry underlied by incredibly shady practices, and that if Kim Jong-Un sends you a free trial of his latest security solution, the correct answer is "thank you but no thank you".&#13;
&#13;
Disclaimer: No significant knowledge in reverse engineering is required to understand the talk. We break down our thought process and methodology to its very basics, so that this talk can relate to both technical and non-technical audiences.&#13;
&#13;
Another Disclaimer: We guarantee an entertaining talk. :) </abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8148">Mark Lechtik</person>
        </persons>
        <links>
          <link href="https://research.checkpoint.com/silivaccine-a-look-inside-north-koreas-anti-virus/">Full technical publication of the research</link>
          <link href="https://recon.cx/2018/montreal/schedule/system/event_attachments/attachments/000/000/055/original/RECON-MTL-2018-silivaccine_weapon_of_mass_detection.pdf">Slide deck of this talk, as presented in REcon Montreal 2018</link>
          <link href="https://www.forbes.com/sites/thomasbrewster/2018/05/01/north-korea-antivirus-has-mystery-code-from-trend-micro/">A publication on the research from Forbes magazine (good non-technical summary)</link>
          <link href="https://www.theregister.co.uk/2018/05/02/north_korea_silivaccine_av_software_analysis/">An even shorter summary from The Register</link>
        </links>
        <attachments/>
      </event>
      <event id="9635" guid="b34662ae-f1c6-4711-9270-b5865f6dd6c8">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9635.html</url>
        <logo>/system/events/logos/000/009/635/large/hermies.png?1539503435</logo>
        <date>2018-12-27T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9635-scuttlebutt</slug>
        <title>Scuttlebutt</title>
        <subtitle>The decentralized P2P gossip protocol</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>In this talk @zelf invites to the world of Scuttlebutt, the decentralized P2P gossiping protocol, and how it can be transformative for society through decentralization of data and enabling local community development. </abstract>
        <description>Scuttlebutt is a fast growing decentralized social network. As an alternative to the large corporate social networks it enables autonomy for the users and a free zone from big data harvesting. &#13;
&#13;
It’s based on a protocol (referred to as SSB) which connects the users via a blockchain styled base with each user functioning as a node. Since the information is collected via a 2 or 3 step social connection it’s completely usable while offline and syncs when connected to a local network, a friend or wifi.&#13;
&#13;
Scuttlebutt has a large community of users who together develop the protocol and platforms. Completely open-source there are many initiatives of projects, maintenance and explorations as part of the Scuttlebutt ecosystem. Some of these projects range from local community on-boarding by @luandro in Quilombola - Brazil, git-ssb by @cel, and even a chess interface!&#13;
&#13;
As the Scuttlebutt interface is interchangeable, with the one most widely used being Patchwork, there is a possibility to utilize the same network with multiple applications. Perfect for local communities in rural areas or for environments which require offline workability or simply for user with integrity, the potentials are grand. As of today the estimate is that the user base is beyond 8000 individuals, yet there's no way to surely know.&#13;
&#13;
We will explore the Scuttleverse and beyond. What is Scuttlebutt now, and and importantly, what can it enable society to become?</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6147">Zenna / zelf</person>
        </persons>
        <links>
          <link href="https://www.scuttlebutt.nz/">Scuttlebutt</link>
          <link href="https://www.manyver.se/">Manyverse - Mobile Client for Scuttlebutt </link>
        </links>
        <attachments/>
      </event>
      <event id="9734" guid="ee26ac2f-4727-4f29-9d0f-a31669e2c0ed">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9734.html</url>
        <logo>/system/events/logos/000/009/734/large/GroupLogo.png?1539599370</logo>
        <date>2018-12-27T17:10:00+01:00</date>
        <start>17:10</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9734-information_biology_-_investigating_the_information_flow_in_living_systems</slug>
        <title>Information Biology - Investigating the information flow in living systems</title>
        <subtitle>From cells to dynamic models of biochemical pathways and  information theory, and back.</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>How to apply Shannon's information theory to biology.</abstract>
        <description>&lt;p&gt;Cells, from bacteria to human cells, constantly take up, store, retrieve, communicate and make decisions based on information. How they realise all this computation using very unreliable components is still largely an open question. Instead of transistors they have to employ proteins, but proteins constantly degenerate and are re-built making their numbers fluctuate. If cellular signalling is impaired severe diseases can be the result, for instance cancer or epilepsy.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;As cellular communication is so pervasive and essential, researchers start to look into this information flow in biological systems in more detail. My research group at the BioQuant centre, Heidelberg University, is also active in this area, an area which I would call Information Biology &amp;mdash; the study of how biological systems deal with information.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;I will show you how you can apply Shannon's information theory to biological systems. For this we need three ingredients, namely dynamic models of biological pathways, stochastic simulation algorithms (that take into account intrinsic fluctuations in molecular numbers), and, of course, Shannon's theory of information.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;I will give brief and user-friendly introductions to these three ingredients. After that I am going to talk about a number of use cases, such as:&lt;/p&gt;&#13;
&lt;ul&gt;&#13;
&lt;li&gt;How much memory does a bacterium have? And how long can it remember things?&lt;/li&gt;&#13;
&lt;li&gt;How many bits per second can a liver cell process via its calcium signalling pathway?&lt;/li&gt;&#13;
&lt;li&gt;How must signalling pathways be constructed, structurally and dynamically, for certain stimuli to be decoded?&lt;/li&gt;&#13;
&lt;li&gt;and others&amp;hellip;&lt;/li&gt;&#13;
&lt;/ul&gt;&#13;
&#13;
&lt;p&gt;I will also give links to (open source) software that is being developed in my group, which you can use to simulate and play around with biochemical pathways, and also to estimate information flows and do information biology.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;FYI: The research I am talking about here is part of a research area which is called Computational Systems Biology. Systems Biology is a field which studies biological systems not by reducing them to their constituent parts, such as single receptors, genes, molecular complexes etc., but by viewing them in the cellular or organismal context and, importantly, as (dynamic) systems. And Computational Systems Biology is Systems Biology done with the help of mathematical models and simulation/analysis algorithms.&lt;/p&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8521">Jürgen Pahle</person>
        </persons>
        <links>
          <link href="https://lab.pahle.org">Research group homepage</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/676/original/2018-12-27_35C3JuergenPahle.pdf?1546000267">Slides</attachment>
        </attachments>
      </event>
      <event id="10009" guid="4dcbb9c4-8f93-40ed-85c0-90474f4ea623">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10009.html</url>
        <logo>/system/events/logos/000/010/009/large/AFROROUTES__-_TEDx-_Praia_2018_%28Auszug%29.001.jpeg?1542300758</logo>
        <date>2018-12-27T18:10:00+01:00</date>
        <start>18:10</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-10009-afroroutes_africa_elsewhere</slug>
        <title>Afroroutes: Africa Elsewhere</title>
        <subtitle>VR experience "Beyond Slavery"</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Let's think "Beyond Slavery": Afroroutes is a one-of-a-kind VR experience conceived as a journey through 3 displaced African heritages, immersing users in Rituals and Ceremonies to experience that well-conserved memory form, but also to feel the power of Music as a strong anthropological tool. Connecting Afro-diasporic narratives: alterity and heritage transcendence within the digital era, Afroroutes is a trigger to open a crucial debate about diasporic identity.&#13;
</abstract>
        <description>Afroroutes is a VR experience taking you to some burning key destinations where African culture has been displaced through slavery and then, rooted again. From Salvador to Bahia to Gujarat through Tangier, there is a common history. Based on this VR Experience, the debate should be extended around "Beyond Slavery". &#13;
&#13;
What happened with the millions of displaced African men and women? Where are their descendants living today? Did their original culture and language disappear? How did their heritage contribute to building their new countries? How did the assimilation or rejection process go? How has this memory subsisted, and how is it lived and celebrated today?  But also, how to assimilate that chapter of history and transform it into a real global narrative - is there what we call a "diasporic identity"? And if it is the case, how to build this identity within a global, disrupted world? How can digital tools push this storytelling process?   &#13;
&#13;
The medium "Virtual Reality" takes all its sense in this project, allowing an immersive and almost physical experience of those paths of slavery. This experience is triggered by music and sounds. Music is much more than a simple way of being together: it is the oral legacy of our intertwined culture. Music is such a powerful tool to explain and tackle the cultural dynamics of displaced heritage, but also as a most trustful narrative connector.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8728">Sélim Harbi</person>
        </persons>
        <links>
          <link href="https://vimeo.com/254095649">Afroroutes trailer </link>
        </links>
        <attachments/>
      </event>
      <event id="9864" guid="d7aa8828-4e06-4029-b962-1009815efa58">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9864.html</url>
        <logo>/system/events/logos/000/009/864/large/pnxc_logo_bluemarine.png?1539635128</logo>
        <date>2018-12-27T19:10:00+01:00</date>
        <start>19:10</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9864-a_routing_interregnum_internet_infrastructure_transition_in_crimea_after_russian_annexation</slug>
        <title>A Routing Interregnum: Internet infrastructure transition in Crimea after Russian annexation  </title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This lecture tells the story of Internet infrastructure transformations in Crimea, the peninsula disputed between Russia and Ukraine between 2014 and 2018. It is based on an extensive year-long study involving network measurements and interviews with key players. Crimea has become a "laboratory" where we can observe, in just 4 years, a rapid and profound transition of infrastructure, that deeply impacted the Internet Service Provider market, routing trajectories, Internet censorship practices in the region. Annexation has transformed the way Crimea is plugged to the "outer world" - in terms of peering and transit relations between various autonomous systems, creating a much more centralized infrastructure and monopolized market. This, in its turn, had an important impact for Crimean end-users - in terms of quality, speed, price of Internet service, as well as in terms of Internet censorship and various traffic anomalies that they experience. Moreover, server-side geoblocking by online payment platforms, Google Play, Apple and other important services, is imposed on Crimean users, because of international sanctions that have a controversial impact, including a risk of overblocking, further isolation of Crimean civil society and reinforcing a more general trend towards "balkanization" of the Internet(s). [1]</abstract>
        <description>This talk is based on a one-year long research conducted at Citizen Lab [2], using a mixed methods approach. On the one hand, we conducted network measurements with OONI probe [3], testing a set of URLs from Crimean vantage points, and comparing results with mainland Russia and Ukraine. We have done an analysis of BGP routing history, and AS neighbouring history, using data from RIPE and CAIDA in collaboration with researchers behind the "Internet Health Report" initiative [4] using the recently deployed methodology of "AS Hegemony Index" [5]. On the other hand, we conducted an extensive qualitative study, including interviews with Crimean ISPs, Ukrainian and Russian tech activists and representatives of RIPE and other Internet governance bodies; web-ethnography (analysis of professional chats and forums of Crimean / Ukrainian ISPs) and media analysis.&#13;
&#13;
We will briefly introduce the context of annexation from the point of view of Internet infrastructure, show an interactive timeline of events that have impacted Crimean Internet ecosystem. Then we will focus on the case of "Infrastructure interregnum", where Ukrainian and Russian traffic co-existed for a while. We will share our infographics, including video animation that demonstrates progressive "wiring" of Crimea to "Russian Internet". On the case of several Ukrainian ISPs we will show how routing becomes matter of dispute. We will question the role of international sanctions and geoblocking by Google, Apple and other big players, on Crimean Internet. Finally, we will conclude with observations of the effects of this infrastructure transition on the end-users, especially activists and journalists working in the region, in terms of their security and the way they experience censorship.&#13;
&#13;
&#13;
We will also share our website [currently under final revisions, will be open to public by October 31, 2018] that presents results of our research in an accessible form for non-tech and non-academic audiences, but also contains longer reports and links for data and infographics that are open for downloading for further reusage, recycling and reading.&#13;
&#13;
&#13;
[1] [Dalek et al., 2014] J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill, and R. J. Deibert. A method for identifying and confirming the use of URL filtering products for censorship. In 14th ACM Internet Measurement Conference (IMC), 2014.&#13;
&#13;
[2] Citizen Lab is an interdisciplinary research laboratory based at the University of Toronto, Canada. Citizen Lab studies information controls—such as network surveillance and content filtering—that impact the openness and security of the Internet.&#13;
&#13;
[3] https://ooni.torproject.org&#13;
&#13;
[4] https://ihr.iijlab.net/ihr/&#13;
&#13;
[5] Romain Fontugne, Anant Shah, and Emile Aben. 2017. AS Hegemony: A Robust Metric for AS Centrality. In Proceedings of SIGCOMM Posters and Demos ’17, Los Angeles, CA, USA, August 22–24, 2017, 3 pages. https://doi.org/10.1145/3123878.3131982</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7340">Xenia</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9654" guid="6c44067f-a011-48ec-b302-fbaff1260b78">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9654.html</url>
        <logo>/system/events/logos/000/009/654/large/ICA-London.jpg?1539525271</logo>
        <date>2018-12-27T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9654-a_la_recherche_de_l_information_perdue</slug>
        <title>A la recherche de l'information perdue</title>
        <subtitle>some technofeminist reflections on Wikileaks</subtitle>
        <track>Art &amp; Culture</track>
        <type>performance</type>
        <language>en</language>
        <abstract>Performance lecture by Cornelia Sollfrank that makes a (techno-)feminist comment on the entanglements of gender, technology and information politics exemplified by the case of Julian Assange and Wikileaks. The artist takes us in her text assemblage on an adventurous trip into the realm of zeros and ones, of data and pure information, of ciphers, signifiers and figures. On the other side of reality we encounter suspected heroes, leaks and phreaks, engineers of escape who control our secret desires. Rape can be performed in many ways. In a state of total transparency: what shall we eat, when society feeds upon the repressed? Knowing yourself means knowing what to look for.</abstract>
        <description>The performance is a technofeminist comment on the wikileaks case, in particular the fact that Julian Assange has spent more than five years in confinement following a rape accusation. Instead of making a moral judgement, however, the performance uses and combines sources from information science, psychoanalysis, cultural studies, feminist studies and activism to embed the case is a wide cultural landscape in which gendered structures becomes more than obvious. The performance is divided into 9 chapters with headers such as Information, Organisation, Zeroes&amp;Ones, Binary Worlds, Pure Difference, Cyberfeminism, Gender&amp;Technology, Naked Information and Transparency, and creates a captivating atmosphere by the use of sound and visuals.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8496">Coco Sollfrank</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/526/original/ICA-London.jpg?1539525271">Cornelia Sollfrank at ICA London</attachment>
        </attachments>
      </event>
      <event id="10024" guid="85ec8360-737b-4ee3-be2d-d8e050b1d117">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10024.html</url>
        <logo>/system/events/logos/000/010/024/large/01.jpg?1542036118</logo>
        <date>2018-12-27T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-10024-tactical_embodiment</slug>
        <title>Tactical Embodiment</title>
        <subtitle>Activism and Performance In Hostile Spaces Online</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>During her talk “Tactical Embodiment,” artist and activist Angela Washko will present several different strategies for performing, participating in and transforming online environments that are especially hostile toward women. She will introduce her long-term performative intervention “The Council on Gender Sensitivity and Behavioral Awareness in World of Warcraft” alongside several interventions, interviews, performances, written works and video games works she has created with the manosphere and online men’s seduction communities.   In addition to walking the audience through her research, Washko will screen excerpts from her interview with a seduction coach who has been dubbed “The Web’s Most Infamous Misogynist” and highlight instructional DVDs, books, and hidden-camera videos created by a community of pick-up artists who teach men how to interact with and seduce women. The talk will close with an audience-participation based performative play-through of her most recent project “The Game: The Game,” a dating simulator video game presenting the practices of several infamous pick-up artists.</abstract>
        <description>During her talk “Tactical Embodiment,” artist and activist Angela Washko will present several different strategies for performing, participating in and transforming online environments that are especially hostile toward women. She will introduce her long-term performative intervention “The Council on Gender Sensitivity and Behavioral Awareness in World of Warcraft” alongside several interventions, interviews, performances, written works and video games works she has created with the manosphere and online men’s seduction communities.   In addition to walking the audience through her research, Washko will screen excerpts from her interview with a seduction coach who has been dubbed “The Web’s Most Infamous Misogynist” and highlight instructional DVDs, books, and hidden-camera videos created by a community of pick-up artists who teach men how to interact with and seduce women. The talk will close with an audience-participation based performative play-through of her most recent project “The Game: The Game,” a dating simulator video game presenting the practices of several infamous pick-up artists.&#13;
&#13;
“The Game: The Game” is a video game presenting the practices of several prominent seduction coaches (aka pick-up artists) through the format of a dating simulator. In the game these pick-up gurus attempt to seduce the player using their signature techniques taken verbatim from their instructional books and video materials. The game sets up the opportunity for players to explore the complexity of the construction of social behaviors around dating as well as the experience of being a femme-presenting individual navigating this complicated terrain.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8734">Angela Washko</person>
        </persons>
        <links>
          <link href="www.angelawashko.com">Artist Website</link>
          <link href="www.art.cmu.edu/people/angela-washko/">Assistant Professor of Art, Carnegie Mellon University</link>
        </links>
        <attachments/>
      </event>
      <event id="9446" guid="c6790632-b9eb-49a2-87fe-30129fbcbce1">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9446.html</url>
        <logo>/system/events/logos/000/009/446/large/sdwan.png?1539171047</logo>
        <date>2018-12-27T23:30:00+01:00</date>
        <start>23:30</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9446-sd-wan_a_new_hop</slug>
        <title>SD-WAN a New Hop</title>
        <subtitle>How to hack software defined network and keep your sanity?</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The software defined wide-area network is technology based on SDN approach applied to branch office connections in Enterprises. According to Gartner's predictions, more than 50% of routers will be replaced with SD-WAN Solutions by 2020.&#13;
&#13;
The SD-WAN can have firewalls and other perimeter security features on board which makes them attractive targets for attackers. Vendors promise "on-the-fly agility, security" and many other benefits. But what does "security" really mean from a hand-on perspective? Most of SD-WAN solutions are distributed as Linux-based Virtual Appliances or a Cloud-centric service which can make them low-hanging fruit even for script kiddie. &#13;
&#13;
Complexity of SDN creates additional security issues and cybersecurity pro should address it before an attack occurs. This presentation will introduce practical analysis of different SD-WAN solutions from the attacker perspective. Attack surface, threat model and real-world vulnerabilities in SD-WAN solutions will be presented.</abstract>
        <description>Detailed Outline:&#13;
&#13;
1.	SD-WAN overview&#13;
&#13;
a.       SD-WAN in a nutshell&#13;
b.       Typical SD-WAN design overview&#13;
c.       Cloud, on premise, hybrid architecture &#13;
d.       Common technology stack (netconf, strongswan, DPDK, etc.)&#13;
e.       Customization, vCPE and VNF&#13;
f.       Security features&#13;
&#13;
Basic terminology, the essentials of SD-WAN architecture: declared advantages and implementation options. Customization approaches via tailored and 3rd party VNF and uCPE/vCPE. Overview of built-it and additional security features. &#13;
&#13;
&#13;
2.       SD-WAN attack surface&#13;
a.       Management interfaces&#13;
b.       Local shells and OS&#13;
c.       Control plane and data plane separation&#13;
d.       Analytics-Controller-vCPE/uCPE-VNF communications&#13;
e.       Hypervisor and virtualization (VNF) separation&#13;
f.        Routing, IPSec Overlay&#13;
g.       Updates and Cloud features &#13;
&#13;
Technical analysis of data and control flow between major components in typical SD-WAN architecture (Orchestration – Controller – vCPE – VNF [and back]). Attack vectors, vertical and horizontal (for multi-tenant/managed service) privilege escalation scenarios. &#13;
&#13;
3.       Security Assessment&#13;
&#13;
a.       SD-WAN as a (virtual) appliance&#13;
b.       Rooting the "box"&#13;
c.       Old school *nix tricks&#13;
d.       How I Learned to Stop Worrying and Love the Node.js&#13;
e.       Built-in security features&#13;
f.        Post-deploy "Forensics"&#13;
g.       SD-WAN Managed Services&#13;
h.       Top down, bottom up and lateral movement &#13;
&#13;
Practical SD-WAN security assessment cases, vulnerabilities (next summarized in "SD-WAN vulnerabilities" section), tips and tricks. &#13;
&#13;
4.       SD-WAN Offensive and Defensive toolkit &#13;
&#13;
a.       Internet census &#13;
b.       SD-WAN vulnerabilities&#13;
c.       Attacks cases &#13;
d.       SD-WAN threat model&#13;
e.       Pentester and hardening checklists&#13;
f.       Buyer guide&#13;
&#13;
SD-WAN Internet census, Google/Shodan SD-WAN Cheat Sheet. Issues with cloud deployment and support (AWS, Azure). Publically know attack cases. &#13;
Vulnerabilities in top 5 SD-WAN (depends on fixes, responsible disclosure in progress). &#13;
&#13;
5.       Conclusion/ Takeaways</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5824">Sergey Gordeychik</person>
        </persons>
        <links>
          <link href="http://www.scada.sl/search/label/sd-wan">SD-WAN New Hope project blog</link>
          <link href="https://github.com/sdnewhop/sdwannewhope">SD-WAN New Hope project Github</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/661/original/SD-WAN_-_35C3_-_publish.pdf?1545948392">SD-WAN New Hop slides</attachment>
        </attachments>
      </event>
    </room>
    <room name="Lecture room 11"/>
    <room name="Seminar room 14-15"/>
    <room name="Seminar room 13"/>
    <room name="Lecture room M1"/>
    <room name="Lecture room M2"/>
    <room name="Lecture room M3"/>
    <room name="Kidspace"/>
    <room name="CCL Saal 3"/>
    <room name="Chaos West Bühne">
      <event id="167" guid="2184122e-03b0-5730-bedf-dc8015807a56">
        <logo/>
        <date>2018-12-27T10:45:00+01:00</date>
        <start>10:45</start>
        <duration>00:15</duration>
        <room>Chaos West Bühne</room>
        <slug>T3RMSP</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/T3RMSP</url>
        <title>Opening der Chaos-West Stage</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>de</language>
        <abstract>Opening der Chaos-West Stage</abstract>
        <description>Opening der Chaos-West Stage</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="85">
            <name>Chaos-West</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="164" guid="fefd1797-166c-5d43-9582-f6b23fa8c225">
        <logo/>
        <date>2018-12-27T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>00:30</duration>
        <room>Chaos West Bühne</room>
        <slug>USG7KM</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/USG7KM</url>
        <title>Opening [Streaming]</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Opening Streaming</abstract>
        <description>Opening Streaming</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="82">
            <name>35C3</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="159" guid="0cd6c4d6-5260-53d1-8abe-111907e394a6">
        <logo/>
        <date>2018-12-27T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>7LRXLM</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/7LRXLM</url>
        <title>Security Expedition in b0rkenLand - Watch out! There are dangerous Security Problems</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>en</language>
        <abstract>2018 started really well for the internet regarding computer security. &#13;
Let's take care of it and bring it to a good end. A small travel from broken metal chunks to "undocumented user accounts" and other security holes. There will be a recap of security problems from well known and also lesser known products presented.</abstract>
        <description>IT resp. computer security is an interesting area. Not only for&#13;
criminals but also for scientists, programmers and users. We all should know that 100% security does not exist.  Therefore I would like to underpin this statement with this lecture.&#13;
&#13;
2018 was a blast in case of security disasters. B0rken processors, authentification bypasses all around, behind every corner a Remote Code Execution waiting for you and sometimes even some 0days jumps out of nowhere.&#13;
&#13;
I want to review together with the audience the best security disasters from 2018. Maybe we can reveal some trends that are happening in the disaster industry. Besides having an entertaining lecture I want also reflect on consequences of such security failures and what we can hopefully learn about it.&#13;
&#13;
If the demo gods are not on holiday, I will present a live demo.&#13;
&#13;
You will probably see your software and hardware differently after this lecture.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="71">
            <name>Hetti</name>
            <biography>Technical Computer Science student from Vienna with a passion for IT Security and geeky stuff.&#13;
&#13;
He is one of the board members of the finest Viennese Hackspace [Metalab](https://metalab.at/) .&#13;
In his free time he enjoys travelling to community based IT Conferences.&#13;
The [Viennese Cryptoparty](https://cryptoparty.at/) is organized by him, where he also holds lectures and workshops about a broad range of IT Security &amp; Privacy topics.&#13;
&#13;
You can also find him at the [Chaos Computer Club Vienna (C3W)](https://c3w.at/) .&#13;
On some weekends he is hunting flags with the successful academic CTF Team [We_0wn_Y0u](https://w0y.at/) .</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="132" guid="2963ebe9-6499-5d17-9f2f-0c3f31db5738">
        <logo/>
        <date>2018-12-27T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>KDYQEB</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/KDYQEB</url>
        <title>Toll of personal privacy in 2018</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>en</language>
        <abstract>We are well into 21st century and the all-digital promise land is just around the corner. What will happen to those of us who choose to retain our privacy by not joining the digital revolution? And most importantly how do we shape the revolution in a way that we can both reap the benefits brought to us by new technologies, while still keeping our private lives undisturbed?</abstract>
        <description>This talk is both scary and hilarious. &#13;
&#13;
It's about author's personal privacy choices that they made in the past and how those affected their life financially, socially and otherwise. Author also covers some more extreme choices they opted not to make and discusses what generally motivates one to care about their privacy. You'll learn about the dawn of loyalty cards, biometric passports, banking services, CCTV and more... We'll try to find out how to work for a better future and what can we all do to make life with privacy more bearable.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="44">
            <name>Kirils Solovjovs</name>
            <biography>Mg. sc. comp. Kirils Solovjovs is the most visible white-hat hacker in Latvia having discovered and responsibly disclosed or reported multiple security vulnerabilities in information systems of both national and international significance. Kirils is one of the authors of the jailbreak tool for Mikrotik RouterOS. He has extensive experience in network flow analysis, reverse engineering, social engineering and penetration testing.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="129" guid="e1e7a102-8bc7-5ffc-b328-8ecc3aee0351">
        <logo/>
        <date>2018-12-27T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>NZSH79</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/NZSH79</url>
        <title>Die eigene Stimme hacken</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Die eigene Stimme ist sehr wichtig dafür wie eine Person von anderen am Telefon und im Alltag wahrgenommen wird. Das ist meist besonders für trans Personen wichtig die einen ungewollten Stimmbruch hinter sich haben. Der Vortrag orientiert sich daher an meinen eigenen Erfahrungen und versucht Grundlagen der Stimmbildung, der Stimmwahrnehmung und Ansätze zum Üben zu vermitteln. Der Inhalt des Vortrags orientiert sich besonders dran, eine femininer gelesene Stimme zu bekommen.</abstract>
        <description>Die eigene Stimme ist sehr wichtig dafür wie eine Person von anderen am Telefon und im Alltag wahrgenommen wird. Das ist meist besonders für trans Personen wichtig die einen ungewollten Stimmbruch hinter sich haben. Der Vortrag orientiert sich daher an meinen eigenen Erfahrungen aus den letzten anderthalb Jahren und versucht Grundlagen der Stimmbildung, der Stimmwahrnehmung und Ansätze zum Üben zu vermitteln. Der Inhalt des Vortrags orientiert sich besonders dran, eine femininer gelesene Stimme zu bekommen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="41">
            <name>Leah</name>
            <biography>Platzhalter.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="145" guid="3575514b-600c-5772-8b93-afc657e6fd2f">
        <logo/>
        <date>2018-12-27T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>HUCR9H</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/HUCR9H</url>
        <title>GNUnet to the rescue!</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>en</language>
        <abstract>GNUnet is a new network protocol stack for building secure, distributed, and privacy-preserving applications. You will learn which problems GNUnet can help to solve. This talk is a introductory talk to motivate you joining the workshops of the GNUnet assembly.</abstract>
        <description>GNUnet is a metadata-preserving foundation for your application, covering areas from addressing, to reliable bidirectional Axolotl-encrypted channels, with advanced routing. You will hear about&#13;
&#13;
* GNS, "a censorship-resistant, privacy-preserving and decentralized name system designed to provide a secure alternative to DNS, especially when censorship or manipulation is encountered."&#13;
* CADET, "a new algorithm for establishing robust end-to-end transport-layer connections in completely self-organized networks with-out a central authority."&#13;
* secushare, an application for distributed, privacy preserving, "real" social networking.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="56">
            <name>t3sserakt</name>
            <biography>* secushare and GNUnet developer&#13;
* privacy activist</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="127" guid="2cc78749-a8c0-5c48-83ac-ec0c40c1b41d">
        <logo/>
        <date>2018-12-27T16:30:00+01:00</date>
        <start>16:30</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>JLPCPC</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/JLPCPC</url>
        <title>Long range radio communication for everyone using LoRaWAN.</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>en</language>
        <abstract>Having lots of ideas for wireless technical gadgets but your WLAN range is to short? Building a sensor network, but you are tired of wiring the sensors together? LoRaWAN could be the way out of those traps for your next project! Set up a single gateway, and you will be able to deploy a ton of devices in kilometres of range. And what is best, there is even a cooperative community about it. You will provide your neighbours with LoRaWAN, too!</abstract>
        <description>LoRa is a low power long range radio data transmission technology. LoRaWAN is a wide area network protocol on top of LoRa, that makes it easy to hook up lots of wireless, battery powered devices to the internet or to your personal server. We will introduce you to LoRaWAN, tell you what it can be used for, and how it works.&#13;
&#13;
With “the things network” there exists an open source community that aims at creating a global network for LoRaWAN devices. You can use it to have your own technical creations reach your server at home from wherever there is a gateway. You can set up your own gateways to help build that network and share the coverage created by you with the community.&#13;
&#13;
We are working with this technology on a daily basis at our jobs (at Lobaro GmbH [1], a small company creating industrial IoT solutions), and find that it has high potential in many geek/hobby/maker projects. With "the things network" [2] there exists a community based open source initiative for making it available (think "freifunk" for IoT), but still there is not much knowledge about it in the scene. It's a cool technology that people should know about!&#13;
&#13;
Our introductions will be centred around Arduino based hardware, which is what most are familiar with.&#13;
&#13;
We will also have a LoRaWAN TTN Gateway at our assembly (which is Deep Cyber [3]) along with some LoRaWAN devices, so that people who get interested by the talk and want to try out how it feels to work with the technology can come to our assembly and have a go at it.&#13;
&#13;
We are aware that there has been a talk about LoRa at 33C3 [4], but that had a totally different scope than ours. They focused on the modulation and how bits are physically transmitted. We want to talk about LoRaWAN, which is build on top of LoRa, and which provides an affordable and easy to use way of data transmission.&#13;
&#13;
[1]: https://www.lobaro.com/&#13;
[2]: https://www.thethingsnetwork.org/&#13;
[3]: https://www.deepcyber.de/&#13;
[4]: https://media.ccc.de/v/33c3-7945-decoding_the_lora_phy</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="35">
            <name>Peer Springstübe</name>
            <biography>I tried to get the most out of university by learning different aspects of computer science, with focus on embedded systems and machine learning, while also studying physics and philosophy. I'm currently working with industrial IoT, creating devices for existing problems instead of inventing problems to try and sell unnecessary solutions.&#13;
&#13;
Have an urge do create stuff with interesting technologies in my free time, so I try to keep some people around me, to do that together. Based in Hamburg.&#13;
&#13;
I'm heavily involved with the assembly Deep Cyber.</biography>
          </person>
          <person id="38">
            <name>Tobias Kaupat</name>
            <biography>Ich beschäftige mich seit 2 Jahren im Umfeld Industrial IoT mit LoRa. Ich habe einen eigenen LoRaWAN Stack mit entwickelt und viel expertise über LoRaWAN von der Hardware-Entwicklung bis zum Appserver.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="152" guid="ab8ff127-534d-5893-b807-a31188930798">
        <logo/>
        <date>2018-12-27T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>K39NLS</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/K39NLS</url>
        <title>Wifi4EU - broken by technical specification</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>en</language>
        <abstract>With the Wifi4EU programm the EU is planning to spend 100 million € by 2020 to subsidise a centralized surveillance infrastructure for centers of public life in the EU.&#13;
The talk will lay out how Wifi4EU is supposed to work both administratively and technically, where there are problems with the later and what is and can be done about it.&#13;
&#13;
Slides: https://zenodo.org/record/2527538#.XCUXplxKjIU</abstract>
        <description>With the [Wifi4EU programm [1]](https://www.wifi4eu.eu/) the EU is planning to subsidies the installation of free Wi-Fi with 120 million € until 2020. The installations are planned to be "... free of charge, free of advertising and free from commercial re-use of data. ..." [[2]](http://europa.eu/rapid/press-release_IP-18-2065_en.htm) and aim "... to equip every European village and every city with free wireless internet access around the main centres of public life. ..." [[1]](https://www.wifi4eu.eu/) &#13;
&#13;
Unfortunately the technical specifications  implemented in the first call on the 7th - 9th  of November [[3]](https://ec.europa.eu/digital-single-market/en/news/preliminary-results-1st-wifi4eu-call) tell a different story. So far 42 Million € are planned to be spend in a flawed design.&#13;
&#13;
Amongst other problems they include:&#13;
&#13;
* requirements for a centralized authentification infrastructure - like eduroam [[4]](https://ec.europa.eu/digital-single-market/en/faq/wifi4eu-questions-and-answers) (FAQ 23),&#13;
* inherent IT security  problems - embedded snippets in the captive portals [[4]](https://ec.europa.eu/digital-single-market/en/faq/wifi4eu-questions-and-answers) (FAQ 26)  and &#13;
* proprietary standards  - hotspot 2.0.  [[4]](https://ec.europa.eu/digital-single-market/en/faq/wifi4eu-questions-and-answers) (FAQ 27)&#13;
&#13;
Following a talk at the wireless community weekend in May this year [[5]](https://www.youtube.com/watch?v=YbPpK8_X9Qg)  the talk will include:&#13;
&#13;
* a short introduction to the programm, &#13;
* how it came to be, &#13;
* what happend so far &#13;
* the implications of the programm&#13;
* what can be done to fix things. &#13;
&#13;
Besides contacting the european comission, several members of the european parlament and Klaus Landefeld of the eco [[6]](https://international.eco.de/people/klaus-landefeld/) we were able to get members of the german Bundestag to get interested in the issue [[7]](https://twitter.com/jimmyschulz/status/1060210780992356352). This led to a "schriftliche Anfrage" towards the Bundesregierung regarding the GDPR compliance of the authentification infrastructure, the situation is currently evolving. &#13;
&#13;
The talk aims to inform about the current state of affairs and hoefully foster a discussion during the congress what can and should be done to prohibit the creation of yet another surveillance infrastructure and what a desirable public Wi-Fi infrastructure should look like.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="39">
            <name>Little Detritus</name>
            <biography>Freifunka aus Aachen der darüber nachdenkt wie man sowas antiquiertes wie Privatsphäre behalten kann. Diskutiert gerade gerne darüber wieso Wifi4EU - so wie gerade geplant - eine dumme Idee ist [1]. Man sich sonst Gedanken darüber wie Kryptographie im Zeitalter von Quantencomputern aussehen kann [2]. Teilt Albernes und Ernstes auf Twitter unter @LittleDetritus&#13;
&#13;
[1] https://www.youtube.com/watch?v=YbPpK8_X9Qg&#13;
[2] https://video.fsmpi.rwth-aachen.de/cccac/6131</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="136" guid="aedb122c-b6ce-5941-b4cf-f1fc3773d765">
        <logo/>
        <date>2018-12-27T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>02:00</duration>
        <room>Chaos West Bühne</room>
        <slug>JGDLDW</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/JGDLDW</url>
        <title>Haecksen Happy Hour</title>
        <subtitle/>
        <track/>
        <type>Klangteppich</type>
        <language>de</language>
        <abstract>Party at the haecksen's (https://www.haecksen.org)! We invite all beings at the congress to enjoy two hours of electronic, rock, jazz, pop and downtempo beats with dj shroombab (https://m.soundcloud.com/shroombab).</abstract>
        <description>Party party!</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="49">
            <name>Haecksen</name>
            <biography>Die "Haecksen" sind der Zusammenschluss eines Teils der weiblichen* Mitglieder des Chaos Computer Clubs. Gegründet wurde die Gruppierung 1988 von Rena Tangens und Barbara Thoens. Die Haecksen treffen sich jährlich auf dem Chaos Communication Congress des CCC und veranstalten eigene Projekte. Da sie sich als virtueller Erfa-Kreis des CCC verstehen, ist ihr wichtigstes Kommunikationsmittel eine Mailingliste.&#13;
&#13;
Das Ziel der Haecksen ist es, zu zeigen, dass Mädchen* und Frauen* ganz selbstverständlich kreativ mit Technik umgehen können und dass das Bild in den Köpfen der Menschen - dass Hacker männlich sind - nicht stimmt.&#13;
&#13;
Hierbei verstehen wir unter Haecksen eine Gruppe aus Hackerinnen, die sich als Frauen* identifizieren. Dies umfasst cis und trans Frauen sowie nicht-binäre Menschen, die sich mit dem Label "Frau" wohlfühlen. Der Stern repräsentiert nicht nur diese Personengruppen, sondern auch die Tatsache, dass Geschlecht ein soziales Konstrukt (und damit überaus hackbar) ist. &#13;
&#13;
https://www.haecksen.org/mediawiki/index.php/Main_Page</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="114" guid="899041a1-b437-59aa-b752-03212d7d3c05">
        <logo/>
        <date>2018-12-27T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>AGSNQR</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/AGSNQR</url>
        <title>Einfache Erkennung von fortschrittlichen Rootkits</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Ein Rootkit (englisch etwa: „Administratorenbausatz“; root ist bei unixähnlichen Betriebssystemen der Benutzer mit Administratorrechten) ist eine Sammlung von Softwarewerkzeugen, die nach dem Einbruch in ein Softwaresystem auf dem kompromittierten System installiert wird, um zukünftige Anmeldevorgänge (Logins) des Eindringlings zu verbergen und Prozesse und Dateien zu verstecken.</abstract>
        <description>Aufspüren von Schadsoftware durch Analyse des Datenverkehrs&#13;
&#13;
In unserem Talk beschreiben wir eine Methode, besonders gut getarnte (=virtualisierende) Rootkits sowie manipulierte Firmware (UEFI, BIOS, Netzwerkkarten- oder Grafikkarten-Firmware) zuverlässig zu entdecken. Hierzu wird ein Vergleich des erwarteten Datenverkehrs mit dem tatsächlichen Datenverkehr durchgeführt, um die Schadsoftware durch den von ihr initiierten Datenverkehr zu erkennen.&#13;
&#13;
Wir beschreiben, wie der Vergleich durchgeführt wird und wie die Daten erfasst und verglichen werden. Zudem beschreiben wir die Vor- und Nachteile des verwendeten Ansatzes, der im Zuge einer Masterarbeit entwickelt wurde.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="79">
            <name>Jennifer Roller</name>
            <biography/>
          </person>
          <person id="80">
            <name>christian schmidt-janssen</name>
            <biography>christian schmidt-janssen</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="168" guid="9c7b5d1d-6f78-5935-9aa5-bf10bf26e54e">
        <logo/>
        <date>2018-12-27T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>YKLGHA</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/YKLGHA</url>
        <title>Die Faxgeräte im Zentrum der Macht</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Welche Bemühungen zur Digitalisierung des Bundestages gibt es, warum "ein Pad und ein Wiki" eben nicht ausreicht, was man noch so tun könnte und wofür man eigentlich immer noch Faxgeräte in der Politik braucht - darüber diskutieren Julia (Bundestag, netzpolitik.org, cihr.eu), Ijon (Bundestag, LOAD e.V.) und Walter (Open Knowledge Foundation), moderiert von Noujoum.</abstract>
        <description>In Fragen der Digitalisierung des Staates ist Deutschland weit hinter andere europäische Länder zurückgefallen, die Politik soll es jetzt (endlich) richten, ist aber selbst noch hoffnungslos analog.&#13;
&#13;
Die politischen Prozesse und bürokratischen Abläufe im Bundestag sind den Politiknerds Ijon, Noujoum und Julia als Mitarbeitende von Abgeordneten im Bundestag im Detail vertraut.&#13;
&#13;
Welche Bemühungen es gibt, warum "ein Pad und ein Wiki" eben nicht ausreichen, was man noch so tun könnte und wofür man eigentlich immer noch Faxgeräte in der Politik braucht - darüber diskutieren Julia (Bundestag, netzpolitik.org, cihr.eu), Ijon (Bundestag, LOAD e.V.) und Walter (Open Knowledge Foundation), moderiert von Noujoum.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="91">
            <name>ijon</name>
            <biography/>
          </person>
          <person id="92">
            <name>Julia Krüger</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="120" guid="5e68df49-aed6-535b-b7e3-094f66b11c12">
        <logo/>
        <date>2018-12-27T23:00:00+01:00</date>
        <start>23:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>GBVHJT</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/GBVHJT</url>
        <title>Geschichten aus der Cobol Gruft</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Das fast 60 Jahre alte Cobol wird noch heute von sehr vielen Banken und Versicherungen eingesetzt.&#13;
Ich erzähle aus meiner langjährigen, nicht selten schmerzhaften, Erfahrung als Cobol-Entwickler in der Großrechner-Umgebung, heute unter anderem mit Blick auf die Security.</abstract>
        <description>Um auf die Sicherheitsaspekte eingehen zu können, stelle ich Cobol und die mir bekannte Großrechner-Umgebung kurz vor.&#13;
Wie alt ist die Sprache, wo sind ihre Schwächen - hat sie Stärken? &#13;
Warum nutzen Banken und Versicherungen bis heute Cobol und Großrechner-Umgebungen? &#13;
&#13;
Im zweiten Teil geht es um die Sicherheit der Sprache.&#13;
Wie lohnenswert ist der Angriff auf Cobol-basierte Systeme? Wie leicht das Spiel für Angreifer?&#13;
Wie läuft die interne Fehlersuche der DV? Und die Fehlerbehebung? &#13;
Wie wird das Programmverhalten protokolliert?&#13;
Können Großrechner-Umgebungen geschützt werden? Und wird entsprechender Schutz genutzt? Warum nicht?&#13;
&#13;
Abschließend der kleine Hoffnungsschimmer: Immer mehr Banken und Versicherungen wollen von Cobol auf modernere Programmiersprachen umstellen und - gezwungenermaßen - den Großrechner abschaffen.&#13;
Ich berichte aus meiner Erfahrung, wie diese Umstellung in einer Versicherung läuft und was mögliche Probleme sind.&#13;
&#13;
Talk ist für Einsteiger mit Grundlagen in der Anwendungsentwicklung geeignet. Ihr müsst und wollt Cobol dafür nicht verstehen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="30">
            <name>Habrok</name>
            <biography>Ich bin Cobol-Entwickler in einer Großrechner-Umgebung - und als einer der jüngsten Spezialisten bei uns ist mein Job sicher... Solange Cobol und DB2 weiterhin nicht tot zu kriegen sind.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="ChaosZone">
      <event id="715" guid="ef2d214c-12a5-5162-b8f6-74dde79c7c09">
        <logo/>
        <date>2018-12-27T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>00:30</duration>
        <room>ChaosZone</room>
        <slug>DALFMM</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/DALFMM</url>
        <title>livestream - Opening Ceremony</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>Live stream of the 35C3 Opening Ceremony</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="20">
            <name>livestream</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="701" guid="52c50dc4-e473-5716-a4fc-6ef7e328902c">
        <logo/>
        <date>2018-12-27T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>00:30</duration>
        <room>ChaosZone</room>
        <slug>KYND3Y</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/KYND3Y</url>
        <title>ChaosZone opening ceremony</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>Welcome to ChaosZone at 35C3. Lets have a nice kickoff together. Learn and discuss about everything regarding ChaosZone at 35C3 and beyond.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="1">
            <name>nilo</name>
            <biography/>
          </person>
          <person id="4">
            <name>bigalex</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="707" guid="181cc8cd-d3f4-59b6-befa-3e4e8c8cd8c2">
        <logo/>
        <date>2018-12-27T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>PUCEB3</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/PUCEB3</url>
        <title>Früh übt sich -- Junghacker am Eigenbaukombinat</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>Eine kurze Einführung in den Junghackertag am Eigenbaukombiant in Halle. Was machen wir dort? Was haben wir gemacht?</abstract>
        <description>Seit circa 2 Jahren treffen wir uns an jedem¹ 4. Samstag im Monat, um Kindern und Jugendlichen den Spaß am Umgang mit Elektronik, Bits und Bytes und Aspekte darum herum nahe zu bringen. In meiner kurzen Einführung möchte ich davon berichten, was gut läuft, wo wir Probleme sehen und wieso die Arbeit mit dem Nachwuchs nicht nur wichtig ist, sondern auch noch Spaß macht.&#13;
&#13;
¹ Ausnahmen, wenn wir uns nicht treffen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8">
            <name>frlan</name>
            <biography>Linux-Admin, Freie Software-Aktivist, Entwickler. Kurz gesagt: Klischee pur.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="720" guid="11077242-300d-582f-8060-d711bf9072a3">
        <logo/>
        <date>2018-12-27T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>GEBZBY</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/GEBZBY</url>
        <title>Aenigma: The state-of-the-art, secure-by-default, one-touch-deployed XMPP server for everyone.</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>After a short dive into the current state of instant messaging, we'll see how to take back our communications with aenigma, a fully standard-compliant and secure out-of-the-box xmpp server automation project.</abstract>
        <description>Follow us here:&#13;
&#13;
https://github.com/openspace42/aenigma&#13;
&#13;
Contact me here:&#13;
&#13;
nz [at] os [dot] vu [mail | xmpp | matrix/riot.im]</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="25">
            <name>Nicolas North</name>
            <biography>Founder at openspace, the new hackerspace in Milano, Italia.&#13;
systems automation enthusiast and developer.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="703" guid="c1c12d9d-12bd-5bab-820f-c4cbac4dce86">
        <logo/>
        <date>2018-12-27T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>U8YM3N</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/U8YM3N</url>
        <title>Makertools im Labor - Über Raketentriebwerke und Beschleunigung</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>Die Möglichkeiten moderner 3D-Drucker sind mannigfaltig. Komplexe Objekte lassen sich in kurzer Zeit von der digitalen Blaupause in die reale Welt bringen. Wir möchten die Möglichkeiten moderner 3D-Drucker im wissenschaftlichen Laborumfeld aufzeigen. Wie wäre es hochempfindliche Sensoren und Raketenantriebe damit zu drucken? Und da alles noch besser mit einem LASER wird, bauen wir diesen auch gleich mit ein.</abstract>
        <description>Raoul-Amadeus Lorbeer, Benjamin Ewers&#13;
Deutsches Zentrum für Luft- und Raumfahrt, Institut für technische Physik, Stuttgart&#13;
&#13;
Wir zeigen einen Laserantrieb für Satelliten aus dem 3D-Drucker. Dabei wird der Treibstoff durch intensive Laserimpulse beschleunigt und generiert präzisen Schub. Soll der Antrieb zudem noch in einen Cube-Sat passen wird eine kompakte Bauweise obligatorisch. Dies wurde mittels 3D-Druck verwirklicht. Gesteuert wird der Antrieb mittels Mikrokontroller. Und da alles noch besser mit einem USB-Anschluss wird, bauen wir diesen auch gleich mit ein.&#13;
Beschleunigungssensoren arbeiten häufig mit einer federnd gelagerten Masse, dessen Verschiebung kontinuierlich gemessen wird. Verschiebungen lassen sich hervorragend mit optischen Interferometern messen. Wir zeigen einen präzisen interferometrischen Beschleunigungssensor aus dem 3D-Drucker, natürlich mit LASER. Und da alles noch besser mit einem SDR (Software Defined Radio) wird, bauen wir dieses auch gleich mit ein.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="11">
            <name>Benjamin Ewers, Raoul-Amadeus Lorbeer</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="711" guid="7425b4d7-95f5-5551-b81b-2e7aca7fb400">
        <logo/>
        <date>2018-12-27T19:30:00+01:00</date>
        <start>19:30</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>MZWAKF</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/MZWAKF</url>
        <title>a home among the stars: Galina Balashova, architect of the soviet space programme</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>Galina Balashova was the main architect and designer for the soviet space programme. She designed the interieurs and visual identity of spacecrafts such as the Soyuz, Buran, and Mir.</abstract>
        <description>»Space stations are not only technical structures but architecture built amidst zero gravity.«&#13;
&#13;
Galina Balashova (b. 1931) is a self-described "architect-engineer" who spent almost 30 years working in the Soviet Space Programme. She designed the ergonomics, the colours &amp; style and the typography of most soviet spacecrafts, including the Soyuz, the Salyut space stations, the Buran shuttle and the Mir space station.&#13;
Her pioneering work in the field of zero-gravity architecture is still referenced today in the ISS and other spacecrafts.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="17">
            <name>aurora</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="704" guid="3a86fe86-b951-5f20-a2f9-8d300e3f77e8">
        <logo/>
        <date>2018-12-27T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>SVLSXP</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/SVLSXP</url>
        <title>Erinnerungen an Wau Holland</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>Erinnerungen an den Mitgründer des Chaos Computer Clubs, Wau Holland alias Herwart Holland Moritz</abstract>
        <description>Bin gern bereit, einige Geschichten aus dem Leben von Wau Holland zu erzählen. Und ich würde mich freuen, wenn zu dieser Session noch andere Leute sich zugesellen würden, die Wau vor oder während der Gründung des CCC kennen und schätzen gelernt haben.  Und die meine Geschichten relativieren oder andere Geschichten beifügen könnten.  &#13;
&#13;
Wau oder Herwart Holland-Moritz ist nun seit 17 Jahren tot. Seit 15 Jahren gibt es die Wau Holland Stiftung, die ein Archiv seines Nachlasses der Öffentlichkeit zugänglich machen soll und sein Lebenswerk weiter in Erinnerung bringen und vervollständigen soll. &#13;
Ich möchte meine persönlichen Erinnerungen an ihn teilen und Menschen treffen, die  auch ihre Erinnerungen an einen großartigen und innovatives intergalaktisches Wesen teilen möchten.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="12">
            <name>Ursula Kooke</name>
            <biography>Na ja, über mich gibt es nicht viel zu sagen. Ich habe Wau kennen gelernt, als ich 18 war und wir gemeinsam Mathematik und Politik in Marburg studiert haben. Er war über lange Jahre bis zu seinem Tod mein bester Freund. Ich habe zeitweilig bei seinem Vater gelebt, der mich auch beauftragt, hat, Waus Nachlass zu verwalten, als Wau gestorben war. Und so habe ich gemeinsam mit Winfried Motzkus, Bernd Fix, Gerriet Hellwig und Mel Wahl auf der Beisetzungsfeier beschlossen, eine Stiftung zu gründen, habe als Stifterin diese errichtet und war die ersten Jahre auch Vorsitzende. Gab dann erst den Vorsitz und dann den Vorstandssitz 2007 ab. &#13;
&#13;
 Ich bin Asperger Autistin und komme mit medizinischem Begleithund. Die Veranstaltung ist also nix für Hundehaarallergiker oder Paniker.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="721" guid="194f1218-3352-5884-8911-a75f1df92810">
        <logo/>
        <date>2018-12-27T22:30:00+01:00</date>
        <start>22:30</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>GLMTRM</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/GLMTRM</url>
        <title>Elektrogruselkabinett</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>ich zeige Bilder meiner Urlaube, wo ich elektrische Installationen fragwürdiger Art fotografiert habe und erzähle ein wenig dazu.</abstract>
        <description>Im Prinzip dasselbe wie damals schon&#13;
(https://log.koepferl.de/2017/12/29/34c3-elektrogruselkabinett/)&#13;
Eine Diashow mit Erzählungen von teilweise abenteuerlichen Elektrokonstuktionen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="26">
            <name>robert0k</name>
            <biography>Softwareentwickler, Informatiker und Mitglied des chch.it Chemnitz</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Vortrags-Arena">
      <event id="293" guid="0bb3bf25-818e-5503-ab16-e4f6625dcd41">
        <logo/>
        <date>2018-12-27T10:00:00+01:00</date>
        <start>10:00</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>CJQCCB</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/CJQCCB/</url>
        <title>Introduction for oio stage helpers</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>en</language>
        <abstract>Come here if you want to help running the program on stage</abstract>
        <description>how to record&#13;
how to use audio&#13;
how to control lights</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7">
            <code>USJAK9</code>
            <public_name>Andreas Bräu</public_name>
            <biography>Freifunker since 2006</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="305" guid="bb0127dd-fda6-5793-9237-bca7d0e3c31c">
        <logo/>
        <date>2018-12-27T10:55:00+01:00</date>
        <start>10:55</start>
        <duration>00:30</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>9ZHVHL</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/9ZHVHL/</url>
        <title>OIO habour clean up  - Day 1</title>
        <subtitle/>
        <track/>
        <type>OIO Housekeeping</type>
        <language>en</language>
        <abstract>daily OIO habour clean up</abstract>
        <description>daily OIO habour clean up</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="93">
            <code>HUQ9YA</code>
            <public_name>35c3oio@freifunk.space</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="283" guid="98550357-b645-5683-9e6b-af20295d8fb1">
        <logo/>
        <date>2018-12-27T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>01:30</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>WNDAXJ</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WNDAXJ/</url>
        <title>Opening Session</title>
        <subtitle/>
        <track/>
        <type>Talk 80min total (etwa 30min  Q&amp;A)</type>
        <language>en</language>
        <abstract>The official start of our orbit. With a keynote and a short introduction of all involved communities.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7">
            <code>USJAK9</code>
            <public_name>Andreas Bräu</public_name>
            <biography>Freifunker since 2006</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="229" guid="be0461ef-ad9f-51cb-be5a-f6dd3adf091e">
        <logo>/media/35c3oio/images/DMQDTK/pic01-small.jpg</logo>
        <date>2018-12-27T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>DMQDTK</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/DMQDTK/</url>
        <title>Freifunk IoT</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Bei diesem Talk stellen wir das Freifunk-IoT Projekt sowie seine Module vor, und zeigen generelle Möglichkeiten auf, das Freifunk-Netz nicht nur als Transitnetz zu verwenden, sondern auch smarte Sensoren einzubinden.</abstract>
        <description>Freifunk-IoT ist ein Projekt, welches ein Framework zum Einbinden von offenen Sensoren in Freifunk-Netze entwickelt und anbietet.&#13;
Es gibt Ressourcen zu Hardware-Modulen wie Anleitungen und Platinenlayouts, und fertige Software für die Sensoren.&#13;
&#13;
Zusätzlich dazu stellt Freifunk-IoT ein serverseitiges Framework bereit, welches die Daten aggregiert, auswertet, visualisiert und wieder bereitstellt.&#13;
&#13;
In diesem Talk wird der aktuelle Stand des Projektes vorgestellt, sowie im Anschluss eine Diskussion zur Weiterentwicklung angeregt.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="12">
            <code>SZWSUS</code>
            <public_name>margau</public_name>
            <biography>Student der Informationstechnik, Freifunk Stuttgart &amp; begeisterter IoT-Bastler.</biography>
          </person>
          <person id="38">
            <code>JGZD9Q</code>
            <public_name>Hibas123</public_name>
            <biography>Hobby Entwickler, mit anscheinend zu viel Freizeit :)</biography>
          </person>
          <person id="92">
            <code>QFPHZF</code>
            <public_name>adnidor</public_name>
            <biography>Mastodon: @adnidor@chaos.social</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="270" guid="b1e00343-506c-51c4-92f5-6483562760d0">
        <logo>/media/35c3oio/images/8GTXCY/DECT-612d-Eventphone-2000x1200.jpg</logo>
        <date>2018-12-27T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>8GTXCY</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/8GTXCY/</url>
        <title>Eventphone: früher, heute, morgen.</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Wir haben im letzten Jahr die Hard und Software des Phone Operation Center fast vollständig ersetzt. Der größte Schritt aus Benutzersicht war, die langen DECT Registrierungsschlangen gegen eine Selbst- oder Auto-Registrierungsfunktion zu tauschen. In einem Vortrag möchten wir zeigen was wir gemacht haben, warum wir agil arbeiten, wie eigentlich ein Minimum Viable Product (MVP) geht, welche Fehler wir gemacht haben und im Nachgang eure Fragen beantworten.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="63">
            <code>D8M8QM</code>
            <public_name>ST Kambor-Wiesenberg</public_name>
            <biography>ST ist Künstler. Er hat eine Ausbildung zum Energieelektroniker absolviert, Informatik, Physik, generalistisches Management sowie bildende Kunst studiert und arbeitet neben seinen Kunstprojekten als Agile Coach und Scrum Master.&#13;
&#13;
Seit 2000 treibt er sich im Umfeld des Chaos Computer Club und den entsprechenden Veranstaltungen herum. Er ist Mitgründer der BlinkenArea und seit 2003 Teil des Eventphone Teams.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="268" guid="ea041ba6-e43b-52ea-9310-f36a7872abf5">
        <logo>/media/35c3oio/images/BRRGEK/end-to-end.png</logo>
        <date>2018-12-27T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>00:45</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>BRRGEK</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/BRRGEK/</url>
        <title>End-to-end encryption for secure, zero-knowledge file sync &amp; share</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>In this talk I'll detail the Nextcloud End-to-end Encryption design, going through the steps of creating the private/public key pair, encrypting and syncing it, encrypting files and uploading them, adding devices to the trusted circle and so on.</abstract>
        <description>Nextcloud's E2EE is designed to protect user data from the server. The goal was to let users sync and share folders (and their contents) as easily as possible without the server ever having the ability to access the data. That rules out a web interface and has other limitations, but that's the price for knowing your server can't spy on you. It isn't and was never meant for ALL your data, as you should use a solution purely focused on E2EE instead! The nice features of Nextcloud, from online document editing to public sharing, will work on all your files except those you put in E2EE folders.&#13;
&#13;
The talk is reasonably technical - it doesn't delve in to code or algorithms but sticks to the general design and flow of data: how do we create and share public keys, how do we get the private key on another device without the server being able to access it, how do we encrypt files and share them and so on.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="59">
            <code>KMKHUZ</code>
            <public_name>Jos Poortvliet</public_name>
            <biography>People person, technology enthusiast and all-things-open evangelist. Doing marketing at Nextcloud, previously Community Manager at ownCloud and SUSE, recovering business consultant with decade long involvement in the KDE community. Enjoys avoiding traffic and public transport on bike through Berlin, but only when the weather is good. Loves cooking for friends and family and playing with the dog.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="244" guid="760fa3e5-8307-5d44-9248-bc28b510bbe0">
        <logo>/media/35c3oio/images/XCU9PD/voidcoin.svg.png</logo>
        <date>2018-12-27T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>XCU9PD</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/XCU9PD/</url>
        <title>State Of The Void</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>en</language>
        <abstract>Void Linux is a general purpose operating system based on the Linux Kernel. In this talk we'd like to give an introduction about Void, why we think our work matters and talk about the challenges that we were faced during the last year.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="43">
            <code>7UUC7W</code>
            <public_name>Enno Boland</public_name>
            <biography>An active member of the open source community since his teenage years. Former contributor of the Suckless project, then Node.js guy, now distribution maintainer.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="277" guid="6cfe5b4a-6517-5f03-acfd-254718f91f57">
        <logo/>
        <date>2018-12-27T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>BJMGW8</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/BJMGW8/</url>
        <title>Detection of refugee boats on the Mediterranean with a drone by using FOSS</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>en</language>
        <abstract>As NGOs continuing searching the Mediterranean by boat and a few planes, it would be good to find additional effective ways to find people in distress in the sea. To be able to search a huge area in the Mediterranean its good to get more eyes in the sky. For this purpose I want to show you and discuss computer-vision approaches to detect refugee boats which are able to run on basic minicomputers (like the RPI) which are cheap enough to put on a simple drone. All done by using free open source software. Furthermore I want to present a dataset and the current codebase which enables you to help searchwing/seawatch to work on the topic</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="86">
            <code>ZVA9RV</code>
            <public_name>Petrosilius</public_name>
            <biography>...</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Workshop-Domo">
      <event id="287" guid="589930fa-a993-54cc-93f9-b6eafdd97cc6">
        <logo/>
        <date>2018-12-27T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>01:20</duration>
        <room>OIO Workshop-Domo</room>
        <slug>KFCQED</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/KFCQED/</url>
        <title>Freifunk-Workshop: Was tun gegen den Admin-Mangel</title>
        <subtitle/>
        <track/>
        <type>Workshop 80min</type>
        <language>de</language>
        <abstract>Diskussionsrunde: Ein Teil der Freifunk-Krise seit 2016 in vielen Communities ist die Admin-Fluktuation. Was sind wirksame Modelle dagegen?</abstract>
        <description>"Wenn Freifunk performed, dann hört man nichts. Und wenn es nicht läuft, dann gibt es Schimpfe" ist ein oft gehörtes Klagelied. &#13;
Darüber hinaus: Solange es gut läuft werden von den "Routerverteilenden" immer mehr Geräte herausgestellt... bis es nimmer läuft. Und dann sind wieder die Admins schuld. &#13;
Umgekehrt haben sich viele Admins über die Jahre ihre Standards so weit entwickelt, dass es für Dazukommende schwierig ist aufzuschließen, auch weil Dokumentation häufig allenfalls rudimentär und/oder veraltet ist. &#13;
Welche erfolgreichen Konzepte gibt es und was gilt es besser zu vermeiden?</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="6">
            <code>HFER8G</code>
            <public_name>Andreas Dorfer</public_name>
            <biography>https://forum.freifunk.net/u/adorfer/</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="297" guid="f185741b-3aaf-5b51-914e-6406c9df8e1c">
        <logo/>
        <date>2018-12-27T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>00:45</duration>
        <room>OIO Workshop-Domo</room>
        <slug>MLQWXT</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/MLQWXT/</url>
        <title>nerds go humanitarian aid</title>
        <subtitle/>
        <track/>
        <type>Workshop 45min</type>
        <language>de</language>
        <abstract>Ein Workshop um Möglichkeiten aufzuzeigen, wie und wo sich Betätigungsfelder für Nerds, Geeks und Specialists im humanitären Bereich ergeben...operativ werden statt nur Geld spenden.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="60">
            <code>PFDWBY</code>
            <public_name>Sebastian</public_name>
            <biography>CEO von CADUS e.V.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="300" guid="e3a587be-30ad-511c-a706-d24b48d1581a">
        <logo>/media/35c3oio/images/VWQJGS/transparent_0_0.png</logo>
        <date>2018-12-27T20:30:00+01:00</date>
        <start>20:30</start>
        <duration>02:00</duration>
        <room>OIO Workshop-Domo</room>
        <slug>VWQJGS</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/VWQJGS/</url>
        <title>GNUnet e. V. Mitgliederversammlung</title>
        <subtitle/>
        <track/>
        <type>Workshop 80min</type>
        <language>de</language>
        <abstract>Mitglieder Versammlung des GNUnet e. V.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="79">
            <code>RHHMVL</code>
            <public_name>xrs</public_name>
            <biography>Mitglied des GNUnet e. V.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="WikiPakaWG Esszimmer">
      <event id="503" guid="3a8dd9e1-a581-516d-b3e4-19418371591a">
        <logo/>
        <date>2018-12-27T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:45</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>NSU8Y8</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/NSU8Y8/</url>
        <title>Orgameeting Tag 1</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="4">
            <code>33UT8A</code>
            <public_name>WikiPaka Orga</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="509" guid="38b15b79-d1eb-5e6f-b50c-ce1ba2817305">
        <logo/>
        <date>2018-12-27T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>GWJR9B</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/GWJR9B/</url>
        <title>Introduction to Wikidata and the Wikidata Query Service</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>en</language>
        <abstract>Discover Wikidata, the free knowledge base from Wikimedia, and learn how to work with it.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6">
            <code>RE9MSE</code>
            <public_name>Lucas</public_name>
            <biography/>
          </person>
          <person id="7">
            <code>8GDPPA</code>
            <public_name>Amir</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="510" guid="22d77083-ceb3-50bd-b275-678ce3b22760">
        <logo/>
        <date>2018-12-27T15:00:00+01:00</date>
        <start>15:00</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>RRCVBW</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/RRCVBW/</url>
        <title>Datenpumpen-Hackathon #01</title>
        <subtitle/>
        <track/>
        <type>Workshop mit Gruppentischen</type>
        <language>de</language>
        <abstract>Explore the Data-Pump and build new Wikidata requests to visualise Free Knowledge and connected data.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8">
            <code>8XHJNS</code>
            <public_name>John</public_name>
            <biography/>
          </person>
          <person id="6">
            <code>RE9MSE</code>
            <public_name>Lucas</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="512" guid="f8c096cc-2785-5ce8-9b8d-5aeee71dafb4">
        <logo/>
        <date>2018-12-27T16:30:00+01:00</date>
        <start>16:30</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>BEANCH</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/BEANCH/</url>
        <title>Jugend hackt - Willkommen auf dem Congress!</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="5">
            <code>BWRH7E</code>
            <public_name>Daniel</public_name>
            <biography/>
          </person>
          <person id="9">
            <code>XN9PTD</code>
            <public_name>Paula</public_name>
            <biography/>
          </person>
          <person id="10">
            <code>VVLMZ9</code>
            <public_name>Robert</public_name>
            <biography/>
          </person>
          <person id="11">
            <code>B9E7PX</code>
            <public_name>Ilona</public_name>
            <biography/>
          </person>
          <person id="12">
            <code>E3QEBQ</code>
            <public_name>Basti</public_name>
            <biography/>
          </person>
          <person id="13">
            <code>9HQVHR</code>
            <public_name>Saadya</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="538" guid="8cfcba40-e656-5f5b-b46f-8a9f09913c85">
        <logo/>
        <date>2018-12-27T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>YWXE7F</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/YWXE7F/</url>
        <title>Programmieren mit der Maus</title>
        <subtitle/>
        <track/>
        <type>Workshop mit Standard-Bestuhlung</type>
        <language>de</language>
        <abstract>Werkstattbericht: Wie kam es zu Programmieren mit der Maus? Wie geht es 2019 weiter und gibt es Wünsche für Programmieren mit dem Elefanten?</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="37">
            <code>NKKBZK</code>
            <public_name>P3nny</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="536" guid="fba5593d-a919-531d-833a-4af31897bc69">
        <logo/>
        <date>2018-12-27T19:45:00+01:00</date>
        <start>19:45</start>
        <duration>00:30</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>WH3E9B</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/WH3E9B/</url>
        <title>Technikschulung Tag 2 für die WikipakaWG</title>
        <subtitle/>
        <track/>
        <type>Workshop mit Gruppentischen</type>
        <language>de</language>
        <abstract>-</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="3">
            <code>8KKP9X</code>
            <public_name>robbi5</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="515" guid="46774122-21b4-5f19-8b3f-eba958080a1c">
        <logo/>
        <date>2018-12-27T20:30:00+01:00</date>
        <start>20:30</start>
        <duration>02:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>ZAPYDL</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/ZAPYDL/</url>
        <title>Community Treffen Code for Germany</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="16">
            <code>LZAHGJ</code>
            <public_name>Michael</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="WikiPakaWG Küche">
      <event id="511" guid="e62603e3-dcd9-53c9-b649-34ba70bc4ca7">
        <logo/>
        <date>2018-12-27T15:00:00+01:00</date>
        <start>15:00</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Küche</room>
        <slug>7FRCLS</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/7FRCLS/</url>
        <title>Wikidata: help with queries</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>en</language>
        <abstract>Additional space to address questions about Wikidata and the query service, if wanted.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="6">
            <code>RE9MSE</code>
            <public_name>Lucas</public_name>
            <biography/>
          </person>
          <person id="7">
            <code>8GDPPA</code>
            <public_name>Amir</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="513" guid="112730d8-6275-559e-8712-6233ffe59de0">
        <logo/>
        <date>2018-12-27T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Küche</room>
        <slug>WGCR99</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/WGCR99/</url>
        <title>The Things Network / LoRaWAN</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract>Treffen der LoRaWAN / The Things Network Communities aus Deutschland. Kennenlernen, Erfahrungsaustausch, gemeinsame Projekte anschieben &amp; Fachsimpeln.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="14">
            <code>GHKXRV</code>
            <public_name>Caspar</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="Discodrama">
      <event id="10168" guid="05e70735-b961-44d2-aaa1-2ee9a112ca83">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10168.html</url>
        <logo/>
        <date>2018-12-27T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>03:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10168-fairy_dust_-_day1</slug>
        <title>Fairy Dust - Day1</title>
        <subtitle>Rocket Away</subtitle>
        <track>Music</track>
        <type>other</type>
        <language>en</language>
        <abstract>Modify the Fairy Dust!</abstract>
        <description>After standing in the cold rain and snow for too long, the Fairy Dust will find its place this time in the middle of the crowd at hall 5. A video installation will take place on the surface. This is a call for people, who can handle c4d files and have the bravery to put their vision on the symbol of the congress.&#13;
&#13;
The file attached to this event contains all information about the object, as well the position and lenses of the 4 projectors. Fell free to develop whatever you like. Keep in mind that the surface is very glossy and actually eats the light away. Rendered video best with HAP or MP4.&#13;
&#13;
In the hours between 2 pm and 5 pm on the days of the congress, there will be access to the video system, if you come around and have a device with HDMI out.  &#13;
&#13;
Enjoy!&#13;
&#13;
Powered by PENTAKLON und Rico Rose&#13;
&#13;
Contact: privatlehrer[at]gmail[:]com</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/632/original/35C3-template-ROCKET.c4d?1545876425">35C3-template-ROCKET.c4d</attachment>
        </attachments>
      </event>
      <event id="10049" guid="09e6fbc0-aca1-418a-862b-dedd2571b627">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10049.html</url>
        <logo>/system/events/logos/000/010/049/large/sui.jpg?1545328482</logo>
        <date>2018-12-27T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10049-sui</slug>
        <title>SUI</title>
        <subtitle>Diverse Music</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Sui likes the inconstancy of space affected by a diversity of sounds and people who drop in accidentally or with intent. All the emerging possibilities of such incidents are carefully sketched into a audible experience. This kind of soundvoyages evolving from slowly and fondly selected sounds and range from folklore to hiphop to field recordings to broken sounds. As she is not the best decision maker referring a genre, every sound that catches a curious ear and hits a heart needs to be played. A warm invitation to listen, hanging around lazily or to dance.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/sofieheinz">https://soundcloud.com/sofieheinz</link>
        </links>
        <attachments/>
      </event>
      <event id="10112" guid="772c609d-c220-49fd-8e9a-671c6045304d">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10112.html</url>
        <logo>/system/events/logos/000/010/112/large/1654341_593106100763608_757469119_n.jpg?1545404961</logo>
        <date>2018-12-27T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10112-das_weltweite_netzwerk_fur_ein_bedingungsloses_grundeinkommen</slug>
        <title>Das weltweite Netzwerk für ein bedingungsloses Grundeinkommen</title>
        <subtitle>Experimental Pop</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>»Das weltweite Netzwerk fur ein bedingungsloses Grundeinkommen« steht gekleidet im Blaumann mit beiden Beinen fest auf einem leeren Bierkasten und zersingt altbekannte Popsongs. Es vervielfaltigt einfältige Ohrwurmer so lange, bis sie Schwarmintelligenz entwickeln. Es transformiert beiläufges Nachgesumme in gänsehauterregende Opernchöre und Unterhaltungsgedudel in antikapitalistische Klagelieder.</abstract>
        <description>»Das weltweite Netzwerk für ein bedingungsloses Grundeinkommen« ist der bescheidene Name des Musikarbeiters und Medienkünstlers Tommy Neuwirth, der ganz alleine mit den Tönen und ihrer Herkunft jongliert, dass einem das taube Dahinhören vergeht und die Ohren des Publikums ihre vielfältigen Verbindungen zu verschiedensten Hirnregionen, zu den Lachmuskeln, den Tränensäcken und den Tanzbeinen entdecken.&#13;
Neuwirth gönnt seinen Songs - oder soll man sagen: Musikkabarettnummern? - Nachdenkpausen, wenn die musikalische Konventionen sie voran peitschen wurden, er gebiert Melodien und überlässt sie sich selber und dem Publikum, wahrend er seine Aufmerksamkeit schon neuem Spielzeug widmet. Er trennt die Geräusche, die er als Performer live auf der Bühne hervorbringt magischerweise ab von den Bewegungen seines Körpers und synchronisiert sich mit erstaunlichstem.&#13;
»Das weltweite Netzwerk fur ein bedingungsloses Grundeinkommen« alias Tommy Neuwirth lässt seinen skurrilen Humor seit 2012 in Form von Videos, Konzerten, Performances und Radio-Improvisationen auf die Menschen los.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="www.tommyneuwirth.de">www.tommyneuwirth.de</link>
        </links>
        <attachments/>
      </event>
      <event id="10045" guid="749eb50d-d91f-4035-a7ef-eac5904cbefc">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10045.html</url>
        <logo>/system/events/logos/000/010/045/large/954843_902544953129673_2577253257806048523_n.jpg?1545405145</logo>
        <date>2018-12-27T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10045-melted_moon</slug>
        <title>Melted Moon</title>
        <subtitle>8 Bit Electro</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>A black text on green background, scrolling towards the middle of the screen. Di-Dinnng! Gameboy: the electronic soul of the past. It flows across the dance floor like a flash in the fog. We are the symbiosis of man and machine, the pulse drives us, heartbeats counted in BPM, we make sounds out of waves and waves out of sounds, we turn music into emotions and emotions into music, from minimum to maximum, from techno to dubstep. The whole spectrum is dancing. Penetrating sounds move you, electrify you, and the bass is massaging your soul. 8-bit power saves your life. Give yourself a chance. Experience Melted Moon&#13;
&#13;
Melted Moon started in 2006, when Mathias combined his two hobbies (music and gaming) by converting Gameboys into instruments. Back then, Melted Moon was merely a solo project, which slowly but perceptively gained popularity in Aschaffenburg. Later, in 2012, his friend Stefan joined him, followed by Fabian in 2013. Stefan was more technically savvy, while Fabian brought a lot of musical know-how, and it took just half a year to find a label and release the first album, "Meltdown".&#13;
&#13;
Since the label (Kompuphonik) is affiliated with the well-known band "Welle:Erdball", who also use retro computer hardware to create their music, they came in touch with each other and Melted Moon now regularly performs as a sidekick on many large Welle:Erdball concerts. Melted Moon even officially played at "Rock am Ring" in 2016 - the largest open air festival of Europe - and has performed on Nintendoom (the largest chiptune festival on the European mainland) twice.&#13;
&#13;
Not only is Melted Moon known in the music scene - of course Nintendo had to hear about them - not only because of Mathias' conspicuous Nintendo tattoos. And so it came that Melted Moon is also often invited to make some noise at the Gamescom (the largest video games convention of the world) on Nintendo's stage, but Melted Moon is also an integral part of the ROCCAT raffle shows - every year since 2013 - as well as their daily performances on the retro stage in the Gamescom's family area. Also, the city festival of Aschaffenburg features Melted Moon every year on the most central stage of the town - the "5x4m ABhörn-Bühne".&#13;
&#13;
Melted Moon uses only original Gameboy hardware to make music. The Gameboys are, of course, modified with a so-called "pro sound mod" (audio output directly from the soundchip to eliminate noise from the volume control), a backlight for the LCD screen, Bluetooth transceivers as a wireless link cable, and MIDI-Out for additional hardware (like SID synthesizers). The software used by Melted Moon is called "Little Sound DJ", or LSDJ for short, which runs on flashable third-party cartridges. LSDJ is a tracker program with a "Live" mode, where sections in the four individual channels can be played and looped selectively (additional to some live editing and effects).</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.meltedmoon.de/">https://www.meltedmoon.de</link>
        </links>
        <attachments/>
      </event>
      <event id="10091" guid="b4a3ab2d-da99-40a6-acbc-6f18b234f292">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10091.html</url>
        <logo/>
        <date>2018-12-27T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10091-konflikt</slug>
        <title>Konflikt</title>
        <subtitle>Techno/House</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/herr-koreander">https://soundcloud.com/herr-koreander</link>
        </links>
        <attachments/>
      </event>
      <event id="10086" guid="b63863c1-8e67-4cf8-9a09-da058eb56900">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10086.html</url>
        <logo>/system/events/logos/000/010/086/large/VRIL_2019.jpg?1545251026</logo>
        <date>2018-12-28T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10086-vril</slug>
        <title>Vril</title>
        <subtitle>Techno Live Set</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Seemingly out of nothing, through dust and with no bang, VRIL appeared on the scene in 2010 with his debut on Giegling. His music made such beautiful noise that it instantly found his place on Marcel Dettmann’s selection for his “Conducted” CD. Also he was part of the Berghain05 Compilation in 2011. His sound is a search for the evergoing movement, exploring a never stopping energy. Once he catches you in his groove it will shine so bright you won’t be able to escape it.&#13;
</abstract>
        <description>Tales of his harder sounding live sets being heard at DGTL, Awakenings, Fusion Festival, Berghain and all over the world. All sets share the same common feature that it was an as euphoric as energetic travel in sound.&#13;
Since 2010 he was touring nonstop worldwide and had been to over 45 countries.&#13;
The warmer and more slower side of VRILs sound he shows in Podcasts that are released yearly on sites like Resident Advisor, Dekmantel, XLR8R, Inverted Audio, etc.&#13;
VRIL is also quite active in doing Remixes.&#13;
For Percy X, Sterac, Suuns, Iori, HVOB to only name a few.&#13;
His highly anticipated debut album on Giegling named “Torus” (2014) contained a lot of great surprises soundwise.&#13;
The second Album „Portal“ (2015) (which had more functional sound) and also the 12inch called „Vortekz“ (2014) was realeased on Delsin Records. The same label where his third LP „anima mundi“ was released in late 2018.&#13;
All Releases in 2018:&#13;
VRIL -Haus- (12 inch on Giegling)&#13;
VRIL -Omniverse- (12 inch on Dystopian) VRIL -anima mundi- (LP on Delsin Records).</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/vril_01">https://soundcloud.com/vril_01</link>
          <link href="https://vrildelsin.bandcamp.com">https://vrildelsin.bandcamp.com</link>
        </links>
        <attachments/>
      </event>
      <event id="10114" guid="c79080c5-41d5-4159-b7ba-4d3d12efbbb5">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10114.html</url>
        <logo>/system/events/logos/000/010/114/large/Steffen-Bennemann-1-by-Martin-Lovekosi_quad.jpg?1545310913</logo>
        <date>2018-12-28T01:00:00+01:00</date>
        <start>01:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10114-steffen_bennemann</slug>
        <title>Steffen Bennemann</title>
        <subtitle>Techno/House</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Curator of Nachtdigital Festival, Holger Records and many events in his home city of Leipzig - among them: Acid Haus (allnighters in a dark foggy basement), Sleep In (indoors &amp; outdoors Ambient sleepovers), Idiots (parties in various off-locations).</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/steffenbennemann">https://soundcloud.com/steffenbennemann</link>
        </links>
        <attachments/>
      </event>
      <event id="10113" guid="0a8eb550-c937-480a-909c-a0506c22cf7f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10113.html</url>
        <logo>/system/events/logos/000/010/113/large/Map.Ache-by-Thomas-Kru%CC%88ger-1068x527.png?1545310592</logo>
        <date>2018-12-28T03:00:00+01:00</date>
        <start>03:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10113-map_ache</slug>
        <title>Map.ache</title>
        <subtitle>House Live Set</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Map.ache is Jan Barich, a Leipzig-based DJ-producer most widely known for his releases on Giegling, as part of the DJ duo Manamana, and work with KANN, the acclaimed imprint he runs with Alex Neuschulz (a.k.a. Sevensol) and Dennis Knoof (a.k.a. Bender). Promoting what they call "modern dance music," and with a discography that includes, among many other immensely talented artists, themselves, Traumprinz, and Falke, it's no surprise that the label is regarded so highly by deep house fans today.</abstract>
        <description>Barich's story has been partly told before: growing up in Leipzig, he began playing the drums aged 14 and subsequently became involved in two band projects, namely Diario and The Hands Of The Wrong People—the former of which was a real success. Steadily, throughout the mid-'90s, he became increasingly interested in electronica, in part down regular visits to Conne Island, an alternative youth cultural center that hosted a rich musical program ranging across the entire spectrum. "It [Conne Island] certainly shaped my musical personality," Barich reflects.&#13;
&#13;
Soon, however, he began attending illegal techno parties around the city, held in abandoned spaces in the twilight hours after Conne Island's doors had been closed. DJing and production started soon thereafter. He learned to do the former around the age of 14, though only started playing out in the early 2000s; while he taught himself the latter in 2003, inspired by the music he was being exposed too. He was, he says, a "shy bedroom producer" who lacked the self-confidence to share his music with labels, leading him to set up KANN in 2008 as an outlet for his productions and those of his partners. The imprint, without question, has been a success, seeing a wide number of wonderful releases and serving as a platform for Map.ache to share his work elsewhere: since quitting his job at Conne Island in 2014, the Leipzig-based artist has released a beautiful collection of musical works. He's certainly an artist on the rise, so what better time to catch up with him to reflect on his journey to date and plans for the future.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/ache-map">https://soundcloud.com/ache-map</link>
          <link href="https://kann-records.com">https://kann-records.com</link>
        </links>
        <attachments/>
      </event>
      <event id="10111" guid="c39ca3be-da21-4910-b107-8de2a6e87dca">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10111.html</url>
        <logo>/system/events/logos/000/010/111/large/avatars-000146613399-bud282-t500x500.jpg?1545404839</logo>
        <date>2018-12-28T04:00:00+01:00</date>
        <start>04:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10111-rss_disco</slug>
        <title>RSS Disco</title>
        <subtitle>Disco/House</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>RSS DISCO (originally RSS Music Summary; later, two competing approaches emerged, which used the backronyms Really Simple Seduction and Relatively Serious Sequence respectively) is a type of continuous music feed which allows users and robots to access updates to recorded content in a standardized, computer-readable format. This feed can, for example, allow a dancer to keep track of many different tracks in a single night. Any fun aggregator can periodically check RSS Disco for new content, allowing the content to be automatically passed from the turntable to the soundsystem. This passing of content is called DJing. &#13;
An RSS experience (called “set”, “mix”, or "performance") includes full frequencies, action and vibes.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/rss">https://soundcloud.com/rss</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Shutter Island">
      <event id="10164" guid="a7735c0a-3bcb-46e3-b063-b2bb3b6a26cd">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10164.html</url>
        <logo/>
        <date>2018-12-27T10:00:00+01:00</date>
        <start>10:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10164-start</slug>
        <title>Start</title>
        <subtitle>Expected</subtitle>
        <track>Music</track>
        <type>meeting</type>
        <language>en</language>
        <abstract/>
        <description>All creatures welcomes each.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10165" guid="de0828fd-8129-476e-8ff7-d94ff88bba2c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10165.html</url>
        <logo/>
        <date>2018-12-27T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10165-moe</slug>
        <title>Moe</title>
        <subtitle>Mogreens</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>User:Mogreens</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10166" guid="af719b79-4271-4313-8d0d-171b1883e7d9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10166.html</url>
        <logo/>
        <date>2018-12-27T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10166-fussil_moe</slug>
        <title>Fussil &amp; Moe</title>
        <subtitle>Kick it. Get Punk*</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10167" guid="04bf5d96-f119-42c8-a867-86094936b0df">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10167.html</url>
        <logo/>
        <date>2018-12-27T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10167-fussil</slug>
        <title>Fussil</title>
        <subtitle>Fussel on the decks.</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>It is, what is it?</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10093" guid="d6e5e3f9-8c16-4c07-a92d-11a1ceacd9df">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10093.html</url>
        <logo/>
        <date>2018-12-27T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>03:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10093-mike_lait</slug>
        <title>Mike Lait</title>
        <subtitle>Music that feels like a warm blanket.</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Mike Lait baut schon seit Jahren Deko auf dem Congress.&#13;
Das kann er gut. Auch wirklich gut kann er Musik auflegen, die sich wie eine warme Kuscheldecke anfühlt.&#13;
&#13;
Mike Lait has been building deco at the congress for years. &#13;
He's good at that. He is also good at put on music that feels like a warm blanket.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/mikelait">https://soundcloud.com/mikelait</link>
        </links>
        <attachments/>
      </event>
      <event id="10094" guid="eaf099e4-70e8-4f09-b078-732f74bc2116">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10094.html</url>
        <logo/>
        <date>2018-12-27T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10094-zuurb</slug>
        <title>zuurb</title>
        <subtitle>Chillgoldmine</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>zuurb ist eine wandelnde Chillgoldmine. Ob vor internationalen Größen Drum´n Bass Sets astrein abzuliefern oder stundenlang melanchonische Knusper-Piano-Flocken rieseln zu lassen, er kann es.&#13;
&#13;
zuurb is a walking chillgoldmine, whether to deliver drum´n bass sets in front of international stars or to let melanchonic crunchy piano flakes trickle for hours, he can do it.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/zuurb">https://soundcloud.com/zuurb</link>
        </links>
        <attachments/>
      </event>
      <event id="10095" guid="d76f85a8-db2d-4a53-987e-281e3a98a746">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10095.html</url>
        <logo/>
        <date>2018-12-27T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10095-timo_minmon</slug>
        <title>Timo Minmon</title>
        <subtitle>Minmon Kollektiv</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language/>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.minmon.de/">https://www.minmon.de/</link>
        </links>
        <attachments/>
      </event>
      <event id="10096" guid="5c8de34c-03e3-45f1-9f8d-bdb06eaa9a7a">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10096.html</url>
        <logo/>
        <date>2018-12-27T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10096-barbnerdy</slug>
        <title>barbnerdy</title>
        <subtitle>Basic chillout</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>barbnerdy ist Teil der Congresschillabteilung - ja man streitet sich auch mal und dann schaut man nach vorne und hört gemeinsam gute Musik mit viel Bass, das ist nämlich ihr Steckenpferd.&#13;
---&#13;
barbnerdy is part of the congresschill department - yes argue happened sometimes and then we look forward and listen to good music together with a lot of bass, that's her hobbyhorse.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/barbnerdy/tracks">https://soundcloud.com/barbnerdy/</link>
        </links>
        <attachments/>
      </event>
      <event id="10097" guid="c7f4afa9-ea3f-48d3-b284-54ae24fd85e2">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10097.html</url>
        <logo/>
        <date>2018-12-27T23:00:00+01:00</date>
        <start>23:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10097-mohammed_atari</slug>
        <title>Mohammed Atari</title>
        <subtitle>Vinyl Spezialist</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Mohammed Atari spielte mal in Hamburg seine Lieblingsschallplatten, als ein junges Mädchen an das DJ Pult herantrat und laut rief: “Tolle Musik spielst du!”. Er ist ein Mysterium und ja wir sind gespannt auf sein Set.&#13;
---&#13;
Mohammed Atari was playing his beloved vinyls once in Hamburg when a young girl appeared and shouted “you play great music!”. He is a man of mystery and yes we are curious to listen to his set.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://hearthis.at/mohammed-atari/">https://hearthis.at/mohammed-atari/</link>
        </links>
        <attachments/>
      </event>
      <event id="10098" guid="2a0d1f6a-5120-40cc-aded-e32fe0769c24">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10098.html</url>
        <logo>/system/events/logos/000/010/098/large/warden.png?1545255045</logo>
        <date>2018-12-28T01:00:00+01:00</date>
        <start>01:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10098-gregoa</slug>
        <title>Gregoa</title>
        <subtitle>Mr. G. Music</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Gregoa - Verkorkster Endvierziger mit Hang zu melancholischer Musik zwischen geschmeidigen bis stümperhaften Übergängen.&#13;
Bislang unentdeckt, doch vom Chaos wegen der doch recht speziellen Musikmischung geschätzt.&#13;
---&#13;
Gregoa - Corked up in his late forties with a tendency towards melancholic music between smooth and unprofessional transitions.&#13;
So far undiscovered, but appreciated by the chaos because of the very special musical mixture.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://hearthis.at/gregoa/#tracks">https://hearthis.at/gregoa/</link>
        </links>
        <attachments/>
      </event>
      <event id="10099" guid="66d45141-41e4-4dcf-9eeb-e6ce201b4f0f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10099.html</url>
        <logo/>
        <date>2018-12-28T03:00:00+01:00</date>
        <start>03:00</start>
        <duration>04:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10099-bidi_morelle</slug>
        <title>Bidi &amp; Morelle</title>
        <subtitle>Swiss Fondue und Hamburger Jung'</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Bidi - https://vannutt.ch/ ist direkt aus einem Casting einer italienisch-schweizerischen  Koproduktion über psychidelische Aspekte nächtelanger Chillkultur und derer Interaktion mit heruntergepitchen Schlagersongs entsprungen und wie immer lange und spät dran.&#13;
&#13;
Morelle entstammt einem alten Hamburger Geschlecht der Musikpudel und hat sich mit seinen gerne auch über Stunden ziehenden Sets bei entsprechender Musikauswahl immer als einer der DJs erwiesen, der weiß, wie es geht. Musik die wohltuend ins Ohr aber auch in die Beine geht.&#13;
---&#13;
Bidi - https://vannutt.ch/ is the direct result of a casting of an Italian-Swiss co-production on psychedelic aspects of night-long chill culture and its interaction with down-pitched folksongs and, as always, long and late.&#13;
&#13;
Morelle comes from an old Hamburg family of music poodles and with his sets, which can last for hours, has always proved to be one of the DJs who knows how to do it. Music that goes pleasantly into the ear but also into the legs.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Compeiler">
      <event id="10146" guid="3e99eab9-bce3-4446-a635-74a26d538c5f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10146.html</url>
        <logo/>
        <date>2018-12-27T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>02:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10146-rote_schule_music_workshop</slug>
        <title>Rote Schule Music Workshop</title>
        <subtitle>Workshop/Performance</subtitle>
        <track>Music</track>
        <type>workshop</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10120" guid="e874417a-105a-4c49-a251-553f9aa5359a">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10120.html</url>
        <logo>/system/events/logos/000/010/120/large/EselsAlptraum_1.jpg?1545595130</logo>
        <date>2018-12-27T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10120-esels_alptraum</slug>
        <title>Esels Alptraum</title>
        <subtitle>Antifaschistisches Jodel Duo</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Love Yodel - Hate Fascism</abstract>
        <description>"Jodeln klingt für Viele nach Heimatkitsch &amp; Konservatismus - Nicht mit uns! Als Jodel-Delegation des 1. anarchistischen Traditions- und Folklorevereins jodeln wir gegen die Beschissenheit des Systems und für das gute, schöne, lustvolle Leben."</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://www.eselsalptraum.de">http://www.eselsalptraum.de</link>
        </links>
        <attachments/>
      </event>
      <event id="10121" guid="5ddc92a0-46b6-4a12-a529-71ba23699ad2">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10121.html</url>
        <logo>/system/events/logos/000/010/121/large/1535626_619269164806791_1189704944_n.jpg?1545594520</logo>
        <date>2018-12-27T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10121-form</slug>
        <title>Form</title>
        <subtitle>HipHop</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>form ist ein Gutmensch und macht Arschbombe in die Rapszene. Denn entgegen landläufiger Erwartungen muss man gar kein faschistoider, sexistischer Volltrottel sein, um zu rappen. HipHop ist very gut, vergesst das nicht! form ist ein sehr lebendiger Beweis dafür. Drum reihet euch ein, um auf der Achterbahn der Gutmenschlichkeit durch die Höhen und Tiefen der menschlichen Existenz zu rasen. Es knallt, versprochen.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://www.fifaform.de">http://www.fifaform.de</link>
        </links>
        <attachments/>
      </event>
      <event id="10122" guid="2fee9c9c-ce05-4a5e-91fe-92a971fc264a">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10122.html</url>
        <logo>/system/events/logos/000/010/122/large/lena_bio.jpg?1545410988</logo>
        <date>2018-12-27T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10122-lena_stoehrfaktor</slug>
        <title>Lena Stoehrfaktor</title>
        <subtitle>HipHop</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Lena Stoehrfaktor, rappende Underground-Größe aus Berlin, bringt sich seit 2004 mit rotzigen Styles in die karge HipHop-Landschaft ein. Seitdem entstanden 4 eigene Alben sowie 3 Crewalben mit "Conexion Musical". Außerdem wirkt sie in verschiedenen musikalischen Projekten mit. Seit ihren Anfängen ist sich Lena Stoehrfaktor treu geblieben. Die Themen ihrer Texte werden aus dem realen Leben gegriffen und in feinster Art und Weise auf Beats gelegt, die die Stimmung der Inhalte unterstreichen.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.lenastoehrfaktor.de">https://www.lenastoehrfaktor.de</link>
        </links>
        <attachments/>
      </event>
      <event id="10123" guid="cb9ed396-4cf9-4bec-8934-0bf97cf0f705">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10123.html</url>
        <logo/>
        <date>2018-12-27T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10123-koffer</slug>
        <title>Koffer</title>
        <subtitle>Punk (19:30-20:30)</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Punk from Berlin</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10124" guid="b73eed35-ced6-4fbf-8261-38bc8f8c252d">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10124.html</url>
        <logo>/system/events/logos/000/010/124/large/0009954533_10.jpg?1545411278</logo>
        <date>2018-12-27T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10124-warm_swords</slug>
        <title>Warm Swords</title>
        <subtitle>Garage Psy Rock (20:30-21:30)</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Warm Swords is the "solo-project" of Regal's very own Caelan O'Flaherty. Born in New Zealand, raised in France, lived in Belgium and now living in Leipzig Germany where he found his live band featuring two members of The Staches.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://warmswords.bandcamp.com">https://warmswords.bandcamp.com</link>
        </links>
        <attachments/>
      </event>
      <event id="10125" guid="165a5f2a-c57d-4e86-81f4-de270b572434">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10125.html</url>
        <logo>/system/events/logos/000/010/125/large/page18-1000-full.jpg?1545410749</logo>
        <date>2018-12-27T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10125-guts_pie_earshot</slug>
        <title>Guts Pie Earshot</title>
        <subtitle>DancePunk vs. DubTech / Hardcore vs. Punk'n'Bass</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>GUTS PIE EARSHOT are surely one of the most unusual modern bands who music-wise vaguely have something to do with punk/hardcore and in the same time breakbeat/techno.</abstract>
        <description>Their music is purely instrumental. This instrumentation may appear minimalist, only cello and drums are played, and yet the music conjures up entire new universes in the mind's eye - or ear.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://www.gutspieearshot.de">http://www.gutspieearshot.de</link>
        </links>
        <attachments/>
      </event>
      <event id="10126" guid="3e91d529-95d8-41f6-b250-c529c0a94997">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10126.html</url>
        <logo/>
        <date>2018-12-28T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>02:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10126-hits_hits_hits</slug>
        <title>Hits Hits Hits</title>
        <subtitle>HitsPunkTrash</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10127" guid="749655f5-a19d-49ea-83a6-cb7c5d3fde75">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10127.html</url>
        <logo/>
        <date>2018-12-28T02:00:00+01:00</date>
        <start>02:00</start>
        <duration>02:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10127-miss_the_point</slug>
        <title>Miss the Point</title>
        <subtitle/>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10128" guid="0394f713-47fc-47eb-b759-d9835df2f8b3">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10128.html</url>
        <logo/>
        <date>2018-12-28T04:00:00+01:00</date>
        <start>04:00</start>
        <duration>02:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10128-monis_crew</slug>
        <title>Monis Crew</title>
        <subtitle/>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Uptime Bar">
      <event id="10074" guid="e35d77cb-637c-4383-b0d9-a454d09383e1">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10074.html</url>
        <logo>/system/events/logos/000/010/074/large/2018-08-25_20.52.00.jpg?1545576403</logo>
        <date>2018-12-27T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10074-otto_paul</slug>
        <title>otto/paul</title>
        <subtitle>Breakbeats, Pop, Electronic, Ambient</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>otto/paul appeared at the event horizon of Sagittarius A* where he began his journey to planet earth. While travelling through space &amp; time he happened to meet ancient astronauts, superintelligences and multi-dimensional entities and collected their most different types of music. Currently on earth, otto/paul blends breakbeats, pop, electronic, ambient, tribal and slow rhythim from allover the galaxy to satisfy and enlighten the ears of mankind.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.mixcloud.com/MartinOttoPaul/">https://www.mixcloud.com/MartinOttoPaul/</link>
        </links>
        <attachments/>
      </event>
      <event id="10161" guid="cae35aaf-b540-4343-a90b-6f0f147d46be">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10161.html</url>
        <logo/>
        <date>2018-12-27T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10161-parole_emil</slug>
        <title>Parole Emil!</title>
        <subtitle/>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/emil-torp">https://soundcloud.com/emil-torp</link>
        </links>
        <attachments/>
      </event>
      <event id="10058" guid="76278e10-8c1e-40df-9a70-618d7985cf8e">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10058.html</url>
        <logo>/system/events/logos/000/010/058/large/avatars-000460064742-8nkpcj-t500x500.jpg?1545406404</logo>
        <date>2018-12-27T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10058-psychedelic_duct_tape</slug>
        <title>Psychedelic Duct Tape</title>
        <subtitle>Ambient &amp; more</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/user-956219626">https://soundcloud.com/user-956219626</link>
        </links>
        <attachments/>
      </event>
      <event id="10116" guid="8c5b0d1c-b7f4-498b-b826-85ab8d2394d0">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10116.html</url>
        <logo>/system/events/logos/000/010/116/large/adelakram.jpg?1545311240</logo>
        <date>2018-12-27T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10116-adel_akram</slug>
        <title>Adel Akram</title>
        <subtitle>Diverse Electronic Music</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>With a background in shaping landscapes and creating permacultural environments, Adel became a multidimensional and interdisciplinary artist creating visuals whilst exploring waveforms and rooms. As well as providing visuals for Herrensauna and AnnaMelina’s and Varg’s Flora project at atonalFestival, his music appears in the upcoming movie M/M by DrewLint. By launching ‘When Are We Now?’ Adel Akram takes the idea of a label as an archive to document his surrounding and the process of examination with different media, arts and questions about our current position in time. </abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://timeandplace.net">http://timeandplace.net</link>
          <link href="https://wawn.bandcamp.com">https://wawn.bandcamp.com</link>
          <link href="https://soundcloud.com/adelakram">https://soundcloud.com/adelakram</link>
        </links>
        <attachments/>
      </event>
      <event id="10077" guid="c36d4196-e932-43c3-8bd6-ef6651684a43">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10077.html</url>
        <logo>/system/events/logos/000/010/077/large/123e-109b-4180-9a71-8c4a1880dba7.jpeg?1545406618</logo>
        <date>2018-12-27T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10077-alexeyan</slug>
        <title>Alexeyan</title>
        <subtitle>D&amp;B, Neurofunk</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>From the family...</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.mixcloud.com/Alexeyan/">https://www.mixcloud.com/Alexeyan/</link>
        </links>
        <attachments/>
      </event>
      <event id="10085" guid="3d8b7f78-1df5-4928-bd8f-766e940e0521">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10085.html</url>
        <logo>/system/events/logos/000/010/085/large/avatars-000068578992-leteqv-t500x500.jpg?1545406859</logo>
        <date>2018-12-28T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10085-tasmo</slug>
        <title>Tasmo</title>
        <subtitle>Bass&amp;Drum</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>From the family...</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://tasmo.rocks/">https://tasmo.rocks/</link>
          <link href="https://soundcloud.com/tasmo/">https://soundcloud.com/tasmo/</link>
          <link href="https://twitter.com/_Tasmo">https://twitter.com/_Tasmo</link>
          <link href="https://hearthis.at/tasmo/">https://hearthis.at/tasmo/</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="OIO Thementisch 1">
      <event id="245" guid="f2444f75-7b94-5026-bb2e-d6c5a9ce7fa5">
        <logo/>
        <date>2018-12-27T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>12:00</duration>
        <room>OIO Thementisch 1</room>
        <slug>Z98HRQ</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/Z98HRQ/</url>
        <title>Freifunk IoT-Demo</title>
        <subtitle/>
        <track/>
        <type>Präsentationsinsel (alle 3 Tage)</type>
        <language>de</language>
        <abstract>An dieser Präsentationsinsel wird das Konzept und verschiedene interaktive Ausstellungsstücke von Freifunk-IoT gezeigt.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="12">
            <code>SZWSUS</code>
            <public_name>margau</public_name>
            <biography>Student der Informationstechnik, Freifunk Stuttgart &amp; begeisterter IoT-Bastler.</biography>
          </person>
          <person id="38">
            <code>JGZD9Q</code>
            <public_name>Hibas123</public_name>
            <biography>Hobby Entwickler, mit anscheinend zu viel Freizeit :)</biography>
          </person>
          <person id="92">
            <code>QFPHZF</code>
            <public_name>adnidor</public_name>
            <biography>Mastodon: @adnidor@chaos.social</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Thementisch 2">
      <event id="265" guid="0435ccb3-5d7c-5f90-a52d-88d964a6fedc">
        <logo/>
        <date>2018-12-27T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>12:00</duration>
        <room>OIO Thementisch 2</room>
        <slug>Z37GSP</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/Z37GSP/</url>
        <title>Seenotrettung</title>
        <subtitle/>
        <track/>
        <type>Präsentationsinsel (alle 3 Tage)</type>
        <language>de</language>
        <abstract>Seenotrettungs-NGOs präsentieren ihre Arbeit, machen auf die Kriminalisierung von humanitärer Hilfe aufmerksam und freuen sich auf Gespräche und Austausch.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="55">
            <code>NFL8CT</code>
            <public_name>just humans</public_name>
            <biography>Wir sind eine Gruppe politischer und humanitärer Aktivist*innen aus verschiedenen Organisationen.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Thementisch 3">
      <event id="261" guid="052afba9-6f2d-52c7-bb4b-7bd7e4753242">
        <logo/>
        <date>2018-12-27T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>12:00</duration>
        <room>OIO Thementisch 3</room>
        <slug>HYJXWE</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/HYJXWE/</url>
        <title>Lots of blinking stuff, Pixelflut and Intergalaktische Reisepässe</title>
        <subtitle/>
        <track/>
        <type>Präsentationsinsel (alle 3 Tage)</type>
        <language>de</language>
        <abstract>Lots of blinking stuff and Pixelflut. Selling Intergalaktische Reisepässe</abstract>
        <description>We will populate a  Presentation isle with blinking decoration and sculptures.&#13;
&#13;
Additionally we will provide a 40 Gb/s Pixelflut server.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="52">
            <code>VHNKEG</code>
            <public_name>tsys</public_name>
            <biography>I'm a software developer/network administrator at Freifunk Kiel and active member of the Open Infrastructure Orbit Orga.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Thementisch 4">
      <event id="272" guid="cf0bd4d5-ecdb-5822-a45f-978f92bba358">
        <logo>/media/35c3oio/images/NVXWSM/who_owns_your_data.png</logo>
        <date>2018-12-27T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>12:00</duration>
        <room>OIO Thementisch 4</room>
        <slug>NVXWSM</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/NVXWSM/</url>
        <title>Nextcloud</title>
        <subtitle/>
        <track/>
        <type>Präsentationsinsel (alle 3 Tage)</type>
        <language>en</language>
        <abstract>We're the Nextcloud community (nextcloud.com/yourdata/) and we're here to meet people and chat about self-hosting, decentralization, federation, and many more topics! We can also show you Nextcloud demos, help you to get involved in our community, and of course, tell you everything about our new Nextcloud Include diversity program!</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="59">
            <code>KMKHUZ</code>
            <public_name>Jos Poortvliet</public_name>
            <biography>People person, technology enthusiast and all-things-open evangelist. Doing marketing at Nextcloud, previously Community Manager at ownCloud and SUSE, recovering business consultant with decade long involvement in the KDE community. Enjoys avoiding traffic and public transport on bike through Berlin, but only when the weather is good. Loves cooking for friends and family and playing with the dog.</biography>
          </person>
          <person id="68">
            <code>F3SR8V</code>
            <public_name>shiro</public_name>
            <biography>I'm shiro (shiromarieke.github.io) and I work on Nextcloud :)</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Thementisch 5">
      <event id="271" guid="51c9528c-1a01-5eea-abd3-3b762798bbe4">
        <logo/>
        <date>2018-12-27T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>12:00</duration>
        <room>OIO Thementisch 5</room>
        <slug>NXGJRN</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/NXGJRN/</url>
        <title>Global Innovation Gathering</title>
        <subtitle/>
        <track/>
        <type>Präsentationsinsel (alle 3 Tage)</type>
        <language>en</language>
        <abstract>GIG, the global network of social and technological innovators is bringing its members and their projects to the Congress for a showcase and interactive workshops</abstract>
        <description>- will follow -</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="64">
            <code>R8T8AG</code>
            <public_name>GIG – Global Innovation Gathering</public_name>
            <biography>tl;dr: GIG is the global network of social and technological innovators. #wearegig&#13;
&#13;
Global Innovation Gathering (GIG) is a vibrant, diverse community of innovation hubs, makerspaces, hackerspaces and other grassroot innovation community spaces and initiatives as well as individual innovators, makers, technologists and changemakers. GIG is pursuing a new vision for global cooperation based on equality, openness and sharing. We aim to enable more diversity in the production of technology, and global innovation processes and support open and sustainable solutions developed by grassroot innovators. With strong roots in the global south, we share, collaborate and work together globally. GIG provides a platform for meaningful exchange by fostering knowledge exchange and collaboration between its members.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Thementisch 6">
      <event id="264" guid="112c596e-4b94-559b-b00b-ef92a5de53ca">
        <logo>/media/35c3oio/images/W9G9FB/IMG_20181128_2313400.jpg</logo>
        <date>2018-12-27T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>12:00</duration>
        <room>OIO Thementisch 6</room>
        <slug>W9G9FB</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/W9G9FB/</url>
        <title>Freifunk Event Installationen und autarke Installationen</title>
        <subtitle/>
        <track/>
        <type>Präsentationsinsel (alle 3 Tage)</type>
        <language>de</language>
        <abstract>Freifunk temporär für kleine, mittlere und große Veranstaltungen. Freifunk kabelungebunden autark betreiben.</abstract>
        <description>Die Präsentation von Freifunk Düren zeigt zwei Dinge, einmal, wie Freifunk für Veranstaltungen angeboten werden kann und wie eine Versorgung ohne Kabelanbindung mit Strom und Mobilfunk möglich ist. Freifunk Düren hat vier Jahre Erfahrungen dazu sammeln können, wie auf Events bis zu 300 Clients versorgt werden und wie praxisnah Sachen funktionieren oder nicht. Ursprünglich war das Equipment groß und schwer. Wir zeigen, wie die Installationen so klein werden können, dass das Kisten schleppen entfällt und der Stromverbrauch so niedrig wird, dass mit Solarzellen kleineren Ausmaßes oder Powerbank der Betrieb funktioniert. Vom handlichen Freifunk2go mit LTE Stick für 30 Clients, um Freifunk in öffentlichen Verkehrsmitteln oder im Park mobil zu realisieren, bis zu einem mobilen LTE Offloader für 300 Clients, werden wir unserer Geräte zeigen. Auch die Aussicht, irgendwann Freifunk auf der Annakirmes anbieten zu können, einem Event in Düren mit bis zu 50.000 Menschen, die gleichzeitig auf dem Kirmesplatz sind, können wir berichten, was dafür benötigt wird. Der Stadt Düren konnten schon erste Vorschläge gemacht werden, die Orientierung dazu ist das WLAN auf dem Congress.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="42">
            <code>JGBAWZ</code>
            <public_name>Matthias Schmidt</public_name>
            <biography>Seit September 2014 aktiv bei Freifunk Düren und Aachen.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
  </day>
  <day index="2" date="2018-12-28" start="2018-12-28T11:00:00+01:00" end="2018-12-29T03:00:00+01:00">
    <room name="Adams">
      <event id="9744" guid="6beabddc-2dd6-43d2-9936-618d41d42cde">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9744.html</url>
        <logo/>
        <date>2018-12-28T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9744-inside_the_fake_science_factories</slug>
        <title>Inside the Fake Science Factories</title>
        <subtitle/>
        <track>Science</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>This talk investigates fake science factories; international twilight companies whose sole purpose is to give studies an air of scientific credibility while cashing in on millions of dollars in the process. We present the findings, outcomes and methodology from a team of investigative journalists, hackers and data scientists who delved into the parallel universe of fraudulent pseudo-academic conferences and journals. The story was published in Germany (ARD and Süddeutsche Zeitung Magazin) in mid of July and then went around the world. How did it begin? What did we learn in the process? And: What happened since the story got published?</abstract>
        <description>Until recently, fake science factories have remained relatively under the radar, with few outside of academia aware of their presence; but the highly profitable industry has been growing significantly in the last five years and with it, so are the implications. To the public, fake science is often indistinguishable from legitimate science, which is facing similar accusations itself.&#13;
We expose the scale and value of two fake science operations: Well-known institutions and professors who abuse this route of publication for personal gain and the deadly consequences when the public believe in fake cures or weird discoveries that seem scientific at a very first glance. Beyond the pressure to publish, we find varying motivations from paid vacations and promotions to obtaining stipends and research grants.&#13;
Our findings highlight the prevalence of the pseudo-academic conferences, journals and publications and the damage they can and are doing to society.&#13;
For 35C3 we did some extra analytics and will publish new numbers, how pseudo-academic publishing has dropped since the story got out in several countries in July 2018.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7209">@sveckert</person>
          <person id="8756">@tillkrause</person>
          <person id="8760">Peter Hornung</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9975" guid="f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9975.html</url>
        <logo>/system/events/logos/000/009/975/large/Jahresrueckblick18.png?1545577737</logo>
        <date>2018-12-28T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>02:20</duration>
        <room>Adams</room>
        <slug>35c3-9975-jahresruckblick_des_ccc_2018</slug>
        <title>Jahresrückblick des CCC 2018</title>
        <subtitle>Refreshing Memories</subtitle>
        <track>CCC</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Biometrische Videoüberwachung, Hausdurchsuchungen, Polizeiaufgabengesetze, Staatstrojaner und ganz viel Cyber: Wir geben einen Überblick über die Themen, die den Chaos Computer Club 2018 beschäftigt haben.</abstract>
        <description>Neben der Zusammenfassung und der Rückschau auf das vergangene Jahr wollen wir aber auch über zukünftige Projekte und anstehende Diskussionen reden.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="3995">Linus Neumann</person>
          <person id="1630">Constanze Kurz</person>
          <person id="1633">frank</person>
          <person id="1544">erdgeist</person>
          <person id="4395">nexus</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9791" guid="513a2aeb-79b0-4222-ba5e-09d1d9057122">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9791.html</url>
        <logo/>
        <date>2018-12-28T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9791-the_surveillance_state_limited_by_acts_of_courage_and_conscience</slug>
        <title>The Surveillance State limited by acts of courage and conscience</title>
        <subtitle>An update on the fate of the Snowden Refugees  </subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>An update on the circumstances of the Snowden Refugees will be provided at the 35C3 event and venue in December 2018. </abstract>
        <description>There have been many significant events and incidents during 2018, and some of these will be disclosed at the talk.&#13;
&#13;
Updates will provided on the Snowden Refugees appeals in Hong Kong and their refugee claims with Canada.&#13;
&#13;
There will also be disclosures on continued surveillance and harassment by the Hong Kong authorities.   </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8588">Robert Tibbo</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9723" guid="f58a2b6d-bde0-483b-a8db-043ea9371cb6">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9723.html</url>
        <logo>/system/events/logos/000/009/723/large/Element_2.png?1543960831</logo>
        <date>2018-12-28T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9723-smart_home_-_smart_hack</slug>
        <title>Smart Home - Smart Hack</title>
        <subtitle>Wie der Weg ins digitale Zuhause zum Spaziergang wird</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>GERMAN:&#13;
Mehr als 10.000 unterschiedliche Device-Hersteller aus aller Welt verwenden die Basis-Plattform (WIFI-Modul, Cloud, App) eines einzigen Unternehmens zur technischen Umsetzung ihrer Smart-Home-Produkte.&#13;
Die Analyse dieser Basis zeigt erhebliche Sicherheitsmängel auch konzeptioneller Natur und somit diverse Angriffspunkte, von denen mehrere Millionen Smart Devices betroffen sind.&#13;
Der Vortrag stellt die Funktionsweise smarter Geräte im Zusammenhang mit der genannten Basis-Plattform dar, zeigt das Ausmaß der Sicherheitslücken anhand diverser Angriffsszenarien und bietet der Community eine Lösung für die sichere Nutzung der betroffenen Geräte.&#13;
&#13;
ENGLISH:&#13;
More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.&#13;
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.&#13;
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.</abstract>
        <description>GERMAN:&#13;
Für die dem Vortrag zu Grunde liegenden Tests wurden verschiedenste Glühbirnen und Steckdosen verschiedener Hersteller bestellt und untersucht. Dabei fiel sofort auf, dass sehr oft ein ESP8266 (sehr kostengünstiger 32-Bit-Mikrocontroller mit integriertem 802.11 b/g/n Wi-Fi) der chinesischen Firma espressif verwendet wird.&#13;
Weitere Untersuchungen zeigten, dass neben dem verwendeten WIFI-Modul, unabhängig vom aufgedruckten Hersteller der Smart-Devices, auch dieselbe Cloud, sowie die gleiche Basis-App eines chinesischen IoT-Modul-Herstellers verwendet wird. &#13;
Diese Basis-Plattform ermöglicht somit jedem weltweit in kürzester Zeit selbst zum Reseller von bereits fertigen Produkten, wie „Smart Bulbs“ und „Smart Plugs“ zu werden, oder seine ganz eigenen Smart-Devices auf den Markt zu bringen, auch ohne den Besitz tieferer technischer Kenntnisse bezüglich IoT oder IT-Sicherheit.&#13;
&#13;
Die Analyse der "Smart"-Devices, die diese Basis-Plattform verwenden, ist allgemein erschreckend. Einfachste Sicherheitsregeln werden nicht befolgt und es gibt gravierende systematische und konzeptionelle Mängel, die stark zu Lasten der Sicherheit der Endanwender gehen. Aufgrund der einfachen Möglichkeit des Bezugs und Inverkehrbringens solcher Smart-Devices sind ganz neuartige kriminelle Konzepte denkbar, die auch ohne großes Experten-Hacker-Wissen in die Tat umgesetzt werden könnten.&#13;
&#13;
Der Vortrag stellt die Funktionsweise der untersuchten smarten Geräte im Zusammenhang mit der verwendeten Basis-Plattform dar und zeigt das Ausmaß der Sicherheitslücken anhand diverser Angriffsszenarien.&#13;
Abschließend wird eine Lösung des Sicherheitsdilemmas bei der Verwendung betroffener Smart-Devices angeboten, welche die sichere Nutzung dieser Geräte im eigenen Zuhause, auch für Nichtexperten, möglich macht.&#13;
&#13;
&#13;
&#13;
ENGLISH:&#13;
For the tests on which the lecture is based, various light bulbs and sockets from different manufacturers were ordered  and tested. It was immediately noticed that an ESP8266 (very cost-effective 32-bit microcontroller with integrated 802.11 b/g/n Wi-Fi) from the Chinese company espressif is very often used.&#13;
Further investigations showed that the same cloud and the same basic app from a Chinese IoT module manufacturer are used in addition to the WIFI module used, regardless of the printed manufacturer of the smart devices. &#13;
This basic platform gives anyone worldwide the possibility to become a reseller of already finished products, such as "Smart Bulbs" and "Smart Plugs", or to bring their own smart devices onto the market in the shortest possible time, even without having in-depth technical knowledge of IoT or IT security.&#13;
&#13;
The analysis of the "smart" devices using this basic platform is generally frightening. The simplest security rules are not followed and there are serious systematic and conceptual shortcomings, which strongly affect the security of end users. Due to the simple possibility of obtaining and placing such smart devices on the market, completely new criminal concepts are conceivable that could be put into practice even without a great deal of expert hacker knowledge.&#13;
&#13;
The talk presents the functionality of the examined smart devices in relation with the basic platform and shows the extent of the security gaps on the basis of various attack scenarios.&#13;
Finally, a solution to the security dilemma of using affected smart devices is offered, which makes it possible for even non-experts to safely use these devices in their own homes.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8478">Michael Steigerwald</person>
        </persons>
        <links>
          <link href="https://www.vtrust.de/35c3">Smart Home Smart Hack</link>
        </links>
        <attachments/>
      </event>
      <event id="9999" guid="520b7c92-8bd1-424e-acc4-7cf15dd168a4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9999.html</url>
        <logo>/system/events/logos/000/009/999/large/ID-Karim-2-2.jpg?1542118431</logo>
        <date>2018-12-28T18:50:00+01:00</date>
        <start>18:50</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9999-the_enemy</slug>
        <title>The Enemy </title>
        <subtitle>War, Journalism, VR</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The Enemy brings you face-to-face with combatants from three conflict zones: with the Maras in Salvador, in the Democratic Republic of the Congo, and in Israel and Palestine. Their testimonies and confessions about their lives, experiences, and perspectives on war will allow you to better understand their motivations… and their humanity.</abstract>
        <description>The Enemy by Karim Ben Khelifa, a groundbreaking interactive Virtual Reality (VR) exhibition, and immersive experience, makes its North American premiere at the MIT Museum. Through 360-degree imaging and recordings, participants will encounter combatants on opposite sides of conflicts in Israel/Palestine, the Congo, and El Salvador. In their own words, each will offer personal perspectives on war, including thoughts on motivations, suffering, freedom, and the future.&#13;
&#13;
The exhibition incorporates concepts from artificial intelligence and cognitive science-based interaction models. Conceived by acclaimed photojournalist Karim Ben Khelifa, this ambitious project was further developed during a visiting artist residency at MIT hosted by MIT’s Center for Art, Science &amp; Technology (CAST) and in collaboration with MIT Professor D. Fox Harrell.&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7970">Karim Ben Khelifa</person>
        </persons>
        <links>
          <link href="http://theenemyishere.org/about">The Enemy</link>
        </links>
        <attachments/>
      </event>
      <event id="9463" guid="c85de43e-107e-4247-b550-946f376e2ec4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9463.html</url>
        <logo>/system/events/logos/000/009/463/large/Bildschirmfoto_2018-09-28_um_09.53.44.png?1538121257</logo>
        <date>2018-12-28T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9463-attacking_end-to-end_email_encryption</slug>
        <title>Attacking end-to-end email encryption</title>
        <subtitle>Efail, other attacks and lessons learned.</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>In this talk, I’ll present several attacks that leak the plaintext of OpenPGP or S/MIME encrypted emails to an attacker. Some of the attacks are technically interesting, i.e. the two different efail attacks, some are somewhat silly, yet effective. Some abuse HTML emails, some also work with plain ASCII emails. Furthermore, I’ll discuss our lessons learned and describe the efail-related changes to mail clients and the OpenPGP and S/MIME standards.</abstract>
        <description>Email remains the least common denominator when two or more people communicate over the Internet. While many modern messengers use end-to-end (e2e) encryption by default, email relies on transport encryption among email servers, which offers a much weaker protection. &#13;
&#13;
OpenPGP and S/MIME are two competing standards that bring e2e encrypted communication to email. While S/MIME is mostly used in corporate environments and built into many of the widely used email clients, OpenPGP often requires that users install additional software and plugins. Both technologies never reached large deployment, mostly because both suffer from a range of usability issues. However, it is commonly assumed that if one manages to use OpenPGP or S/MIME to encrypt emails, it is very secure.&#13;
&#13;
In this talk, I’ll discuss several attacks that leak the plaintext of OpenPGP or S/MIME encrypted emails to an attacker. Some of the attacks are technically interesting, i.e. the two different efail attacks, some are somewhat silly, yet effective. Some abuse HTML emails, some also work with plain ASCII emails.&#13;
&#13;
The disclosure of the efail vulnerabilities caused a lot of stir in the press and the community, which also led to confusion about how the vulnerabilities work, about the mitigations and about the consequences for the OpenPGP and S/MIME standards. I’ll discuss our lessons learned and describe the efail-related changes to mail clients and the OpenPGP and S/MIME standards.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="3205">Sebastian Schinzel</person>
        </persons>
        <links>
          <link href="https://efail.de/">The efail attacks.</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/542/original/sec18-poddebniak.pdf?1539597057">Efail paper (USENIX Security 2018)</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/683/original/35c3-schinzel-efail.pdf?1546025131">Slides</attachment>
        </attachments>
      </event>
      <event id="10030" guid="8943659a-536d-4afb-85de-f1b8b29a7902">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10030.html</url>
        <logo/>
        <date>2018-12-28T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-10030-the_ghost_in_the_machine</slug>
        <title>The Ghost in the Machine</title>
        <subtitle>An Artificial Intelligence Perspective on the Soul</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Artificial Intelligence gives us a uniquely fascinating and clear perspective at the nature of our minds and our relationship to reality. We will discuss perception, mental representation, agency, consciousness, selfhood, and how they can arise in a computational system, like our brain.</abstract>
        <description>Cognitive Science describes our mind by identifying it as a particular kind of machine, a generally intelligent computer built from a nervous system embedded into the body of a social primate. Intelligence can be understood as a system's ability to create models, usually in the service of regulating the interaction of this system with its environment. But how does such regulation give rise to a sense of self and conscious awareness?&#13;
&#13;
This is the fifth installment on the series From Computation to Consciousness, which covers philosophy of mind, epistemology, the nature of consciousness, the emergence of social structure and the relationship between mind and universe using concepts from computer science and Artificial Intelligence.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4034">Joscha</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="10010" guid="9a91d92b-0691-46b2-ba73-112bc598342f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10010.html</url>
        <logo/>
        <date>2018-12-28T23:30:00+01:00</date>
        <start>23:30</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-10010-die_eu_und_ihre_institutionen</slug>
        <title>Die EU und ihre Institutionen </title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Ein kurzer Grundlagenabriss über die Institution der Europäischen Union, insbesondere zur Funktionsweise und Zusammenarbeit</abstract>
        <description>Welche Institutionen gibt es? Welche Rollen haben sie? Wie sind die Machtverhältnisse? Was läuft gut? Was läuft schlecht? tbc</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8729">Dustin Hoffmann</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="10038" guid="72c63924-b94d-4c83-b986-9e3e95ae91c0">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10038.html</url>
        <logo/>
        <date>2018-12-29T00:30:00+01:00</date>
        <start>00:30</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-10038-meine_abenteuer_im_eu-parlament</slug>
        <title>Meine Abenteuer im EU-Parlament</title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Bei der Europawahl 2014 wurde ich als Spitzenkandidat der Partei für Arbeit, Rechtsstaat, Tierschutz, Elitenförderung und basisdemokratische Initiative in das Europäische Parlament gewählt.</abstract>
        <description>Seit Juli 2014 bin ich dort Mitglied im Ausschuss für Kultur und Bildung, in der Delegation für die Beziehungen zur Koreanischen Halbinsel und war stellvertretendes Mitglied im Haushaltskontrollausschuss bis Juni 2015.&#13;
&#13;
Seit Januar 2017 bin ich stellvertretendes Mitglied im Ausschuss für auswärtige Angelegenheiten.&#13;
&#13;
In diesen Rollen erlebe ich so manches Abenteuer.</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="8780">Martin Sonneborn</person>
        </persons>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Borg">
      <event id="9566" guid="e96ff77d-7247-48a8-839b-554ee37328d6">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9566.html</url>
        <logo>/system/events/logos/000/009/566/large/yG2ahUfL_400x400.jpg?1543064858</logo>
        <date>2018-12-28T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>02:20</duration>
        <room>Borg</room>
        <slug>35c3-9566-lightning_talks_day_2</slug>
        <title>Lightning Talks Day 2</title>
        <subtitle/>
        <track>CCC</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!</abstract>
        <description>Did you think that the thrill of sharing your ideas in front of a huge audience at a C3 was something you'd never experience? Do you work on a cool project and want to get the word out? Was your talk one of the hundreds that got rejected? Did you come up with an awesome hack that you need to share? Go ahead and enter your Lightning Talk now!&#13;
&#13;
The 35C3 Lightning Talks consist of three fast paced sessions which are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to get out to a global audience. Even if you don't have an awesome idea or project to share, a Lightning Talk is perfect for pitching your Assembly, your workshop or even a longer talk you'll give as a self-organized session. Your five minutes of fame!&#13;
&#13;
For registration and schedule info, please check out https://c3lt.de/35c3</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5263">gedsic</person>
          <person id="4601">bigalex</person>
        </persons>
        <links>
          <link href="https://c3lt.de/35c3">Registration and schedule</link>
          <link href="https://events.ccc.de/congress/2018/wiki/index.php/Static:Lightning_Talks">Congress Wiki Page</link>
        </links>
        <attachments/>
      </event>
      <event id="9419" guid="76417167-e13b-43cd-a089-841ff78266e8">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9419.html</url>
        <logo/>
        <date>2018-12-28T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9419-explaining_online_us_political_advertising</slug>
        <title>Explaining Online US Political Advertising</title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Over the summer Facebook, Google, and Twitter have started making transparent United States political ads shown on their platforms. We have been collecting and analyzing these political ads to understand how candidates, elected officials, PACs, non-profits, for-profit companies, and individual citizens are disseminating U.S. political content using these advertising platforms.</abstract>
        <description>Based on our analysis we will explain how major political sponsors are using online advertising system to send microtargeted messages to different audiences. We will also explain the messages, targetting, goals, spending, and impressions for major US political advertisers. As part of our project to improve the transparency of online political advertising, we have publically released our data and tools for others to analyze online political ads.&#13;
&#13;
This will be a talk about improving the transparency of online political advertising.&#13;
&#13;
We will start by describing the online political advertising transparency efforts that Facebook, Google, and Twitter have implemented.&#13;
&#13;
We will next explain how we collected data from each of these efforts and are making it public.&#13;
&#13;
After this, we will explain some of the methodologies and tools we are building to help analyze and visualize this data. Next, we will present some of our findings on how online political ads are being targetted and the messages they are communicating with different target audiences.&#13;
&#13;
We will also present some case studies on major online political advertisers such as Donald Trump, Beto O’Rourke, the NRA, and Planned Parenthood. This will focus on how they are leveraging „micro-targeted“ advertisements and the goals of their advertising.&#13;
&#13;
We will finish by demonstrating some of the visualization tools are have deployed to enable people to better understand online political advertising.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8187">Damon McCoy</person>
        </persons>
        <links>
          <link href="https://online-pol-ads.github.io/">Home page for our project</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/451/original/Facebooks-archive_%281%29.pdf?1537466442">An Analysis of Facebook’s Archive of Ads With Political Content</attachment>
        </attachments>
      </event>
      <event id="10018" guid="23e85d7a-9645-4ae2-9954-63b71abc08d4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10018.html</url>
        <logo>/system/events/logos/000/010/018/large/atomicBomb.jpg?1545003847</logo>
        <date>2018-12-28T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-10018-verhalten_bei_hausdurchsuchungen</slug>
        <title>Verhalten bei Hausdurchsuchungen</title>
        <subtitle>Praktische Hinweise für den Kontakt mit der Staatsmacht</subtitle>
        <track>CCC</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Es ist 6 Uhr und ein Trupp uniformierter Polizisten steht vor deiner Wohnungstür. Was solltest du bis dahin getan haben und was solltest du jetzt tun?</abstract>
        <description>Eine Hausdurchsuchung ist etwas, was sich niemand ersehnt und vor dem wir möglichst verschont bleiben wollen. Dennoch passiert es auch im Chaosumfeld immer wieder, dass Hackerinnen und Hacker Besuch von den Staatsorganen bekommen.&#13;
&#13;
Dieses Jahr erwischte es unter anderem die Zwiebelfreunde, das OpenLab in Augsburg, den C3DO und evtl. andere. Daher solltet ihr euch gedanklich auf eine Durchsuchung vorbereiten und Schritte ergreifen.&#13;
&#13;
Im Vortrag erzählen euch Jens und Kristin, welche Maßnahmen weit vor einer Durchsuchung sinnvoll sind. Weiterhin geben sie euch Empfehlungen, auf was ihr bei einer laufenden Durchsuchung achten solltet und wie es nach einer Hausdurchsuchung weitergeht.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="2402">qbi</person>
          <person id="7771">Kristin Pietrzyk</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9800" guid="74b9c748-970f-4693-ac7e-46fcc733d2b4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9800.html</url>
        <logo/>
        <date>2018-12-28T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9800-how_to_teach_programming_to_your_loved_ones</slug>
        <title>How to teach programming to your loved ones</title>
        <subtitle>Enabling students over example-driven teaching</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Teaching beginners how to program is often &lt;i&gt;hard&lt;/i&gt;.  We love building programs, and seeing our loved ones struggle with this is painful.  Showing them how to copy-paste a few example programs and change a few parameters is easy, but bridging from there to building substantial programs is a different game entirely.  This talk is about how to teach programming successfully, through comprehensible &lt;i&gt;design recipes&lt;/i&gt;, which anyone can follow, using languages and tools designed for beginners.  This approach is probably different from how you learned how to program, or how you're used to teaching.  It is more effective, however, as it teaches more material successfully to a broader spectrum of people.  It is also more enjoyable.&#13;
</abstract>
        <description>The talk is based on many years of research by the &lt;a href="https://programbydesign.org/"&gt;Program by Design&lt;/a&gt;, &lt;a href="http://www.deinprogramm.de"&gt;DeinProgramm&lt;/a&gt;, and &lt;a href="http://www.bootstrapworld.org/"&gt;Bootstrap&lt;/a&gt; educational projects, as well as over 30 years of personal teaching experience in school, university and industrial contexts.  A word of warning: The resulting approach is radically different from most teaching approaches used in universities and schools.  In particular, it avoids teaching purely through examples and expecting students to develop the skills to arrive at the solutions on their own.  Instead, it eaches explicit methodology that enables students to solve problems of surprising complexity on their own, whether they are 11 or 55, whether in a classroom, a training facility, or your home.  Extensive documentation, material, and software to support this methodology is available for free.&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7686">Mike Sperber</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/679/original/teach-programming.pdf?1546010097">teach-programming.pdf</attachment>
        </attachments>
      </event>
      <event id="9658" guid="6e25dd44-763f-494b-bae5-75b409dcf1d0">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9658.html</url>
        <logo/>
        <date>2018-12-28T18:50:00+01:00</date>
        <start>18:50</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9658-computer_die_uber_asyl_mit_entscheiden</slug>
        <title>Computer, die über Asyl (mit)entscheiden</title>
        <subtitle>Wie das BAMF seine Probleme mit Technik lösen wollte und scheitert</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Welchen Dialekt spricht eine Geflüchtete aus Syrien? Was verrät das Handy eines Asylsuchenden aus dem Irak darüber, wo er herkommt? Und ist der Name Wasef eigentlich typisch für Afghanistan? Über diese Fragen entscheiden im Bundesamt für Migration und Flüchtlinge (BAMF) zunehmend Computer. Sie spucken Wahrscheinlichkeiten für Herkunftsländer aus, die entscheidend dafür sind, ob Geflüchtete Asyl bekommen - oder nicht. Kurz: Menschliche Schicksale hängen von Maschinen ab. Diese Maschinen wissen nichts darüber, ob einem Menschen in seiner alten Heimat Verfolgung, Folter und Tod drohen. Mitarbeiter des BAMF verlassen sich auf diese Ergebnisse, auch wenn sie falsch sein können. Recherchen und bisher unveröffentlichte Dokumente zeigen, warum das schiefgehen muss und welche schweren Folgen für Schutzsuchende das haben kann.&#13;
</abstract>
        <description>Im Jahr 2015 stellte fast &lt;a href="https://www.bmi.bund.de/SharedDocs/pressemitteilungen/DE/2016/01/asylantraege-dezember-2015.html"&gt;eine halbe Million Menschen&lt;/a&gt; einen Asylantrag in Deutschland. Das BAMF war überfordert, immer mehr unbearbeitete Anträge sammelten sich an. Der vermeintliche Ausweg lautete Prozessoptimierung. Allein im Jahr 2016 wurden 25 Millionen Euro für Unternehmensberatungen wie McKinsey ausgegeben, die das Amt &lt;a href="https://www.zeit.de/2017/14/bamf-unternehmensberater-geschwindigkeiten-folgen-fluechtlinge/komplettansicht"&gt;zu einer Entscheidungsfabrik machen&lt;/a&gt; sollten. Dass die Behörde über das Schicksal von Menschen entscheidet, trat in den Hintergrund. Immer mehr Entscheidungen in immer kürzerer Zeit, kaum ausgebildete Entscheider, schlechte Übersetzer, massive Datenschutzprobleme und viele falsche Ablehnungen, die im Nachhinein vor Gericht landeten und im Nachhinein revidiert werden mussten.&#13;
&#13;
Ein Beitrag zur vermeintlichen Optimierung sollten IT-Systeme für ein "Integriertes Identitätsmanagement" leisten, das aus vier Teilen besteht: Ein "Transliterationsassistent" soll Namen in arabischer Schrift einheitlich in lateinische Buchstaben übertragen, um Verwechslungen zu vermeiden und gleichzeitig auswerten, ob der Name im angegebenen Herkunftsland des Geflüchteten vorkommt. Aus einer automatischen Handyauswertung sollen sich Hinweise ergeben, welche Nationalität eine Person hat. Die Technik dafür stammt von einer Firma, die auch für Militär und Geheimdienste arbeitet. Mittels stimmbiometrischer Verfahren sollen die Entscheider Hinweise darauf bekommen, ob ein Antragsteller eher ägyptisches Arabisch spricht oder vielleicht einen levantinischen Dialekt, der auf eine syrische Herkunft hindeutet. Nicht zuletzt sollen biometrische Fotos helfen festzustellen, ob jemand bereits in einer anderen Datenbank registriert wurde. Damit will das BAMF "Vorreiter bei der Erschließung innovativer Technologien" sein.&#13;
&#13;
Doch die neuen IT-Systeme, die kurz vor der Bundestagswahl 2017 vorgestellt wurden, lösen die Probleme des BAMF nicht. Sie schaffen neue und entmenschlichen die Entscheidungen über Schutzsuchende, indem sie die Illusion von Korrektheit und Objektivität erzeugen.&#13;
&#13;
Durch Recherchen und Gespräche mit Betroffenen erhärtete sich der Verdacht, dass das zum Scheitern verurteilt ist. Geflüchtete erzählten davon, dass BAMF-Mitarbeiter die Systeme nicht richtig bedienen konnten. Ihre Asylakten zeigen, dass sie auch die Ergebnisse fahrlässig interpretiert haben. Sie vertrauten kaum aussagefähigen Prozentangaben aus intransparenten Computerprogrammen mehr als den Schilderungen und Dokumenten der Betroffenen. Bisher unveröffentlichte Dokumente zeigen, dass es sich wohl nicht nur um Einzelfälle handelt.&#13;
&#13;
Neben der Gefahr, dass Geflüchtete auf Grundlage der automatisierten Auswertungen abgeschoben werden, hat die Digitalisierungsoffensive im BAMF weitere Auswirkungen: Datenschutzprobleme und massenhafte Datenweiterleitungen an den Verfassungsschutz zum Beispiel. Doch die Behörde hat bereits ein neues Projekt gestartet: die &lt;a href="http://www.bamf.de/DE/DasBAMF/BAMFdigital/Blockchain/blockchain-node.html"&gt;Blockchainisierung des Asylverfahrens&lt;/a&gt;.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4465">Anna Biselli</person>
        </persons>
        <links>
          <link href="https://netzpolitik.org/2017/digitalisierte-migrationskontrolle-wenn-technik-ueber-asyl-entscheidet/">Digitalisierte Migrationskontrolle: Wenn Technik über Asyl entscheidet</link>
          <link href="https://motherboard.vice.com/de/article/a3q8wj/fluechtlinge-bamf-sprachanalyse-software-entscheidet-asyl">Eine Software des BAMF bringt Menschen in Gefahr</link>
        </links>
        <attachments/>
      </event>
      <event id="9629" guid="8c84a37f-a8a5-4061-bfde-8da074ea8693">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9629.html</url>
        <logo/>
        <date>2018-12-28T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9629-snakes_and_rabbits_-_how_ccc_shaped_an_open_hardware_success</slug>
        <title>Snakes and Rabbits - How CCC shaped an open hardware success</title>
        <subtitle/>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>&lt;p&gt;&#13;
This talk will present a historical narrative of the background behind how the &lt;a href="https://kosagi.com/w/index.php/NeTV_Main_Page"&gt;NeTV&lt;/a&gt; + Milkymist inspire the &lt;a href="hdmi2usb.tv"&gt;HDMI2USB&lt;/a&gt; then helped the &lt;a href="https://www.crowdsupply.com/alphamax/netv2"&gt;NeTV2&lt;/a&gt; projects and how they all became interlinked through events like Congress! From the study of this history, we will attempt to distill a few core lessons learned that can hopefully be applied to other open hardware projects.&#13;
&lt;/p&gt;</abstract>
        <description>&lt;p&gt;&#13;
Open hardware projects tend to evolve differently from open software projects. Even though it’s very easy to fork an open software project, pull requests and merges help ensure the main branch of a project continues to improve. Furthermore, open software projects tend to evolve along with their tools, as evidenced by the concurrent maturation of Servo and Rust, or Linux and Git. In contrast, open hardware projects tend to fork and then fracture the community as they gain commercial success and go closed, as evidenced in the evolution of the 3D printer and drone communities. There are also few examples of hardware projects that co-evolve with their tools.&#13;
&lt;/p&gt;&lt;p&gt;&#13;
The evolution of the &lt;a href="https://kosagi.com/w/index.php/NeTV_Main_Page"&gt;NeTV&lt;/a&gt; + Milkymist to the &lt;a href="hdmi2usb.tv"&gt;HDMI2USB&lt;/a&gt; to the &lt;a href="https://www.crowdsupply.com/alphamax/netv2"&gt;NeTV2&lt;/a&gt;, along with the concurrent maturation and adoption of the &lt;a href="https://m-labs.hk/migen/"&gt;Migen&lt;/a&gt; and &lt;a href="http://www.enjoy-digital.fr/"&gt;LiteX ecosystem&lt;/a&gt;, is one of these rare examples.&#13;
&lt;/p&gt;&lt;p&gt;&#13;
This talk will present a historical narrative of the background behind each of these projects and how they became interlinked. From the study of this history, we will attempt to distill a few core lessons learned that can hopefully be applied to other open hardware projects. &#13;
&lt;/p&gt;&lt;p&gt;&#13;
One important lesson is that open anything takes time and patience, and so the project itself needs to be in a space where it can move at an appropriate pace to grow a healthy community while maintaining relevance against potentially better-funded closed-source options. &#13;
&lt;/p&gt;&lt;p&gt;&#13;
Another lesson is the importance of crowdfunding as a mechanism to marshall community around a given release, as opposed to relying upon sources of financing that expect direct returns on investment (such as venture capital or loans). &#13;
&lt;/p&gt;&lt;p&gt;&#13;
A final example of a lesson we will discuss is the importance of picking the right tools to co-evolve with the project. While many open source options alternatives exist to closed-source tools, it’s problematic if the design tools somehow limit the hardware implementation or introduces flaws in the design itself -- and hardware, unlike software, cannot be patched. Migen/LiteX are front-end tooling for describing FPGA designs (“gateware”), and their output being a bitstream means it can be in the hardware space while enjoying the privilege of easy patching and updates. Furthermore, Migen/LiteX offer critical features and performance metrics unavailable in the closed-source alternatives, meaning that these are not simply design tools, they are also core to enabling the competitiveness of the hardware itself.&#13;
&lt;/p&gt;&#13;
&lt;h3&gt;Related previous Chaos Congress Talks&lt;/h3&gt;&#13;
&lt;ul&gt;&#13;
 &lt;li&gt;&lt;a href="https://media.ccc.de/v/cccamp11-4412-latest_developments_around_the_milkymist_system_on_chip-en"&gt; Latest developments around the Milkymist System-on-Chip - A roundup of one the most advanced open hardware projects&lt;/a&gt;&lt;/li&gt;&#13;
&lt;ul&gt;&#13;
 &lt;li&gt;&lt;a href="https://media.ccc.de/v/28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links"&gt; Implementation of MITM Attack on HDCP-Secured Links - A non-copyright circumventing application of the HDCP master key&lt;/a&gt;&lt;/li&gt;&#13;
 &lt;li&gt;&lt;a href="https://media.ccc.de/v/33c3-8057-dissecting_hdmi"&gt;Dissecting HDMI - Developing open, FPGA-based capture hardware for conference &amp; user group recording&lt;/a&gt;&lt;/li&gt;&#13;
&lt;/ul&gt;&#13;
&lt;h4&gt;Presenters&lt;/h4&gt;&#13;
&lt;ul&gt;&#13;
 &lt;li&gt;&lt;a href="https://blog.mithis.net"&gt;Tim 'mithro' Ansell&lt;/a&gt; is the founder of &lt;a href="http://code.timvideos.us"&gt;TimVideos&lt;/a&gt;. He is known for having to many projects including hardware like the &lt;a href="https://hdmi2usb.tv"&gt;HDMI2USB.tv&lt;/a&gt;, &lt;a href="https://tomu.im"&gt;I'm Tomu&lt;/a&gt; and many more!&lt;/li&gt;&#13;
 &lt;li&gt;&lt;a href="https://www.bunniestudios.com/"&gt;Andrew 'bunnie' Huang&lt;/a&gt; is a hacker, activist and author who is known for many projects including hardware like the &lt;a href=”https://kosagi.com/w/index.php/NeTV_Main_Page”&gt;NeTV&lt;/a&gt;, &lt;a href=”https://chibitronics.com”&gt;Chibitronics&lt;/a&gt;, Novena, and Chumby. &lt;/li&gt;&#13;
&lt;/ul&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6660">Tim 'mithro' Ansell</person>
          <person id="3155">bunnie</person>
        </persons>
        <links>
          <link href="https://hdmi2usb.tv">HDMI2USB.tv</link>
          <link href="https://m-labs.hk/migen">Migen (+Milkymist)</link>
          <link href="https://kosagi.com/w/index.php/NeTV_Main_Page">NeTV</link>
          <link href="https://www.crowdsupply.com/alphamax/netv2">NeTV2</link>
          <link href="http://www.enjoy-digital.fr/">Enjoy Digital + LiteX</link>
        </links>
        <attachments/>
      </event>
      <event id="9979" guid="9f8b19eb-31cb-4250-80d4-5caf4e0b33dd">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9979.html</url>
        <logo>/system/events/logos/000/009/979/large/gadget_500x500.png?1539718621</logo>
        <date>2018-12-28T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9979-the_layman_s_guide_to_zero-day_engineering</slug>
        <title>The Layman's Guide to Zero-Day Engineering</title>
        <subtitle>A demystification of the exploit development lifecycle</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>There's a certain allure to zero-day exploits. At the apex of the security industry, these elusive technologies are engineered by a persistent few to open doors of software systems that were never meant to exist. We go behind-the-scenes to provide an inside look at the zero-day development lifecycle, breaking common misconceptions regarding this increasingly difficult tradecraft.</abstract>
        <description>In this talk, we will discuss the engineering process behind a &lt;a href=”https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/”&gt;zero-day&lt;/a&gt; that was used to exploit Apple Safari at PWN2OWN 2018. Rather than placing an intense focus on the technical challenges required to weaponize this particular chain of vulnerabilities, we reflect on this experience as a case-study of the analytical approach we employ to attack unfamiliar software targets. In addition to these methods, we will contrast how this process differs from CTF/Wargame challenges, highlighting the path one can take to graduate from casual enthusiast to security professional.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8356">Markus Gaasedelen</person>
          <person id="8682">Amy (itszn)</person>
        </persons>
        <links>
          <link href="https://ret2.io">Ret2 Systems</link>
        </links>
        <attachments/>
      </event>
      <event id="9617" guid="2375222b-7dae-4bca-a5b0-aea227ab0d76">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9617.html</url>
        <logo>/system/events/logos/000/009/617/large/l1.png?1539450734</logo>
        <date>2018-12-28T23:30:00+01:00</date>
        <start>23:30</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9617-a_deep_dive_into_the_world_of_dos_viruses</slug>
        <title>A deep dive into the world of DOS viruses</title>
        <subtitle>Explaining in detail just how those little COM files infected and played with us back in the day</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>It is now 27 years since MS-DOS 5.0 was released. During its day there was the threat of viruses breaking your system or making it act in unpredictable ways. Due to its age and near total lack of consumer use it is safe to assume that all of the viruses for MS-DOS have been written. Using community archives and modern analysis methods we can uncover how they worked and reflect on how things have changed.</abstract>
        <description>Computers have come a long way in the last 27 years, and so has malware too. This talk will start off with some of the most famous and widely known payloads. A basic guide on how MS-DOS runs applications, and we will work up from there to analysing all 17k+ samples with that are in the archives using automatic tooling to pick out some of the most interesting ones.&#13;
&#13;
If you don’t have reverse engineering skills, don’t be afraid! We will start off with the basics of how the IBM PC works, MS DOS execution, binary runtime, and how we automatically run/disassemble/trace/fuzz malware on mass.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7509">Ben Cartwright-Cox</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9873" guid="93c1500d-c639-4247-854e-6e51e167dbeb">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9873.html</url>
        <logo>/system/events/logos/000/009/873/large/FairyBot_kl.jpg?1546016301</logo>
        <date>2018-12-29T00:30:00+01:00</date>
        <start>00:30</start>
        <duration>02:00</duration>
        <room>Borg</room>
        <slug>35c3-9873-all_creatures_welcome</slug>
        <title>All Creatures Welcome</title>
        <subtitle>a utopian documentary about the digital age</subtitle>
        <track>CCC</track>
        <type>film</type>
        <language>de</language>
        <abstract>"All Creatures Welcome sketches a utopian image of society in the digital era. Accompanied by the appeal to “use hacking as a mindset,” the viewers immerse themselves, together with the filmmaker, in a documentary adventure game and explore the world of digital communities at the events held by the Chaos Computer Club; a real-world reflection of the virtual spectrum." – after the rough cut screening at the 34c3 we will show now the final version. &#13;
Join us and be part of the moment when we put the movie online and make it freely available under a creative commons license at the beginning of the screening!</abstract>
        <description>Together with the filmmaker and the slogan"use hacking as a mindset" we immerse in a documentary adventure game and explore the world of Komputerfrieks, as they used to call themselves at the inaugural meeting of the Chaos Computer Club in 1981. We come upon an open, free-spirited society. The events of the CCC are a kind of utopian real-world reflection of the virtual spectrum. We encounter angels, activists, robots, coders and makers. We learn what a hack is, why lockpicking can be important, how a cellular system works. We dive into the game and become part of the community that is as inclusive as it is sophisticated. Still outside of this collective the challenges are immense in an era, in which political certainties and institutions increasingly erode. Models of governance, economics, social order, technology and science are being put into question 24/7. With the internet’s rules of conduct, national laws are being repealed and transformed into global structures. While  the worldwide web would structurally actually allow a radical renewal of democracy, changing it from representation to participation, more and more states are drifting towards authoritarian societies in political reality. In the course of that process, en passant the largest surveillance machinery of human history has been created.&#13;
We see how the hacker culture meets these challenges and what inner contradictions it encounters. We learn that our lives are not determined by general, given truths but actually through the way we work, develop ourselves, suffer or dream. The events of the CCC become a possible blueprint of social upheaval. Self-organization, freedom of expression and critical discussion merge in a colorful, polyphonic chorus apart from social norms and capitalist constraints: "Be excellent to each other!“</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7785">Sandra Trostel</person>
          <person id="8745">Thies Mynther</person>
        </persons>
        <links>
          <link href="http://www.allcreatureswelcome.net">Movie Page</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/622/original/ACW_Poster_KI_Regenbogen_digital.jpg?1542289809">Poster</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
        </attachments>
      </event>
    </room>
    <room name="Clarke">
      <event id="9852" guid="30278963-3b07-49a8-96a7-2b24a8cf573b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9852.html</url>
        <logo/>
        <date>2018-12-28T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9852-exploring_fraud_in_telephony_networks</slug>
        <title>Exploring fraud in telephony networks</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Telephone networks form the oldest large scale network that has grown to&#13;
touch over 7 billion people. Telephony is now merging many complex&#13;
technologies (PSTN, cellular and IP networks) and enabling numerous&#13;
services that can be easily  monetized. However, security challenges for&#13;
telephony are often neither well understood, nor well addressed. As a&#13;
result, telephone networks attract a lot of fraud. In this talk, we will&#13;
systematically explore the fraud in telephone networks, focusing on&#13;
voice telephony. We will present a taxonomy of fraud, and analyze two&#13;
prevalent fraud schemes in more detail: looking into the ecosystem of&#13;
International Revenue Share Fraud (IRSF), and discussing a new&#13;
countermeasure to the well-known problem of voice spam.</abstract>
        <description>This talk aims to improve the understanding of the fraud ecosystem in&#13;
telephony networks. We first provide a clear taxonomy that&#13;
differentiates between the root causes, the vulnerabilities, the&#13;
exploitation techniques, the fraud types and finally the way fraud&#13;
benefits fraudsters.&#13;
&#13;
As concrete examples, we first look into International Revenue Share&#13;
Fraud (IRSF), where phone calls to certain destinations are hijacked by fraudulent operators and diverted to the so-called ‘international premium rate services’. This fraud often involves multiple parties who collect and share the call revenue, and is usually combined with other&#13;
techniques (such as voice scam, mobile malware, PBX hacking) to generate call traffic without payment. We will further explore the IRSF ecosystem by analyzing more than 1 million `premium rate' phone numbers that we collected from several online service providers over the past 3 years.&#13;
&#13;
In the second part, we will look into voice spam, a prevalent fraud in&#13;
many countries. After giving an overview of various types of unwanted phone calls, we will focus on a recent countermeasure which involves connecting the phone spammer with a phone bot (“robocallee”) that mimics a real persona. Lenny is such a bot (a computer program) which plays a set of pre-recorded voice messages to interact with the spammers. We try to understand the effectiveness of this chatbot, by analyzing the recorded conversations of Lenny with various types of spammers. As we consider the ‘benefits’ as a fundamental part of our fraud definition, we believe that chatbots can be combined with the existing fraud detection and prevention mechanisms, as a supplementary way of slowing down voice spam campaigns.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7804">Merve Sahin</person>
          <person id="8646">Aurélien Francillon</person>
        </persons>
        <links>
          <link href="http://www.s3.eurecom.fr/docs/eurosp17_sahin.pdf">SoK: Fraud in Telephony Networks</link>
          <link href="http://www.s3.eurecom.fr/docs/soups17_sahin.pdf">Using chatbots against voice spam: Analyzing Lenny’s effectiveness</link>
          <link href="https://www.ieee-security.org/TC/SP2018/poster-abstracts/oakland2018-paper31-poster-abstract.pdf">IRSF</link>
        </links>
        <attachments/>
      </event>
      <event id="9631" guid="14281f92-873c-478c-a962-f1eb8b6c15d9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9631.html</url>
        <logo/>
        <date>2018-12-28T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9631-symbiflow_-_finally_the_gcc_of_fpgas</slug>
        <title>SymbiFlow - Finally the GCC of FPGAs!</title>
        <subtitle>A fully FOSS, Verilog to bitstream, timing driven, cross FPGA, usable toolchain.</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The &lt;a href="http://symbiflow.github.io"&gt;SymbiFlow project&lt;/a&gt; aims to be the "GCC of FPGAs" - a fully open source toolchain supporting, multiple FPGAs from different vendors. Allowing compilation from Verilog to bitstream without touching vendor provided tools, it includes support for large modern FPGAs like the Lattice ECP5 and Xilinx 7 series. These FPGAs can be used for things previously out of reach of FOSS tools, things like high resolution video and many gigabit networking. We have also documented the FPGA bitstreams to allow other new tools and a process for replicating this effort on new types of FPGAs!</abstract>
        <description>&lt;p&gt;&#13;
The &lt;a href="http://symbiflow.github.io"&gt;SymbiFlow project&lt;/a&gt; aims to be the "GCC of FPGAs" - a fully open source toolchain supporting multiple FPGAs from multiple different vendors. FPGAs have been around since 1980s but most have previously require getting giant closed source proprietary black boxes from the FPGA vendor (10 gigabytes or more!). Thanks to SymbiFlow this is no longer the case! &#13;
&lt;/p&gt;&lt;p&gt;&#13;
Like the previous IceStorm efforts, SymbiFlow includes &lt;b&gt;both&lt;/b&gt; documentation of FPGA bitstreams and a &lt;b&gt;working&lt;/b&gt;toolchain for compiling Verilog into these bitstreams. Unlike previous efforts, this new toolchain supports industry standard timing driven place, and route and significantly larger designs. This makes SymbiFlow a &lt;b&gt;big&lt;/b&gt; change over the previous Project IceStorm effort and enables support for large, modern FPGAs that can be used for things like high resolution video and many gigabit networking.&#13;
&lt;/p&gt;&lt;p&gt;&#13;
This presentation will give you an update on the current status of the project. What currently works, the future roadmap and how you can help with the project and how to expand the number of supported FPGAs even further.&#13;
&lt;/p&gt;&lt;p&gt;&#13;
Currently SymbiFlow is supporting the Lattice iCE40 plus two modern, capable and popular FPGAs architectures - the Lattice ECP5 and Xilinx 7 Series. The project has also gone to an effort to provide a well documented process for understanding FPGA bitstreams. This provides a clear pathway for new contributors to extend the tooling to support even more FPGAs!&#13;
&lt;/p&gt;&lt;p&gt;&#13;
Come find out about how a small group are changing the world of FPGA development!&#13;
&lt;/p&gt;&#13;
&#13;
&lt;h3&gt;About FPGAs&lt;/h3&gt;&#13;
&lt;p&gt;&#13;
Due to their reconfigurable nature, FPGAs make hardware problems into software problems and enable anyone to building custom integrated circuits. This means you could create &lt;b&gt;your&lt;/b&gt; ideal microcontroller, not what some manufacturer &lt;b&gt;thinks&lt;/b&gt; you want. You can have the &lt;b&gt;exact&lt;/b&gt; right set of peripherals including as many SPI, I2C or CAN as you want!&#13;
&lt;/p&gt;&lt;p&gt;&#13;
Previously developing for FPGAs has require getting giant closed source proprietary black boxes from the FPGA vendor (10 gigabytes or more!). This has strongly hampered their adoption and reduced them to niche use cases. However, with the ending of Moore's law and things like &lt;a href="https://riscv.org/"&gt;RISC-V&lt;/a&gt;, FPGAs have a strong role to play in enabling open source communities to participate in the explosion of new hardware design. They also enable us to apply the high speed of innovation and security we expect from an open source software.&#13;
&lt;/p&gt;&#13;
&#13;
&lt;h3&gt;Presenters&lt;/h3&gt;&#13;
&lt;p&gt;&#13;
&lt;a href="https://blog.mithis.net"&gt;Tim 'mithro' Ansell&lt;/a&gt; is the founder of &lt;a href="http://code.timvideos.us"&gt;TimVideos&lt;/a&gt;.He is known for having to many projects including hardware like the &lt;a href="https://hdmi2usb.tv"&gt;HDMI2USB.tv&lt;/a&gt;, &lt;a href="https://tomu.im"&gt;I'm Tomu&lt;/a&gt; and many more! Through this frustration with FPGA toolchains while developing these projects he ended up being heavily involved with the development of the &lt;a href="http://symbiflow.github.io"&gt;SymbiFlow&lt;/a&gt; project.&#13;
&lt;/p&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6660">Tim 'mithro' Ansell</person>
        </persons>
        <links>
          <link href="https://symbiflow.github.io">SymbiFlow Website</link>
          <link href="http://github.com/SymbiFlow">SymbiFlow GitHub</link>
        </links>
        <attachments/>
      </event>
      <event id="9612" guid="a24c67d2-9cad-41a5-ada4-eff706d29920">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9612.html</url>
        <logo/>
        <date>2018-12-28T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9612-the_nextpnr_foss_fpga_place-and-route_tool</slug>
        <title>The nextpnr FOSS FPGA place-and-route tool</title>
        <subtitle>the next step forward in open source FPGA tools</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Project IceStorm provides the first end-to-end open source FPGA toolchain, was originally presented at 32c3, and only targetted Lattice iCE40 FPGAs. nextpnr is the next big step for open source FPGA tools, providing a retargetable open source FPGA place-and-route tool that will enable open source flows for many different FPGAs from many different vendors.</abstract>
        <description>nextpnr is a retargetable FOSS FPGA place-and-route tool that is replacing arachne-pnr as place-and-route tool in the IceStorm open source iCE40 flow. (I have originally presented IceStorm and arachne-pnr at 32c3.)&#13;
&#13;
nextpnr is retargetable, meaning it can be ported to other FPGA architectures easily, uses timing-driven algorithms, provides a python scripting API, supports complex placement and floorplanning constraints, and has a nice GUI. Python and GUI support are optional, which may be useful when deploying nextpnr on an embedded platform. In short: It is a big step forward for open source FPGA tools, attempting to close the gap to vendor tools in some aspects, and even setting new standards in other aspects.&#13;
&#13;
As of now, iCE40 FPGAs (Project IceStorm) and ECP5 FPGAs (Project Trellis) are supported in nextpnr, but support for more architectures is expected to follow in short order.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5860">Clifford Wolf</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9775" guid="eb71c620-6102-4b08-8ac4-5f71b772a831">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9775.html</url>
        <logo/>
        <date>2018-12-28T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9775-how_medicine_discovered_sex</slug>
        <title>How medicine discovered sex</title>
        <subtitle>Introduction to sex- and gender-sensitive medicine</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Men with osteoporosis or depression, women with heart attacks - these are examples of diseases where medicine still shows a gender bias. Assuming that men and women have the same bodies, except when it comes to the reproductive organs still causes maltreatment up to death. In the past few years sex- and gender-sensitive medicine has discovered that the assumption of the same body has lead to the unnecessary death of patients and needs to be challenged.&#13;
This is a brief introduction into the paradigm shifting realm of sex- and gender-sensitive medicine showing how and where the sexes differ, that there are actually more than two sexes and that your gender also plays a role in how you are being treated by medical professionals.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4092">Sarah Hiltner</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/675/original/35c3-4-komprimiert.pdf?1545999934">35c3-4-komprimiert.pdf</attachment>
        </attachments>
      </event>
      <event id="9998" guid="622c9585-e332-4915-a9ac-987a34da4d14">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9998.html</url>
        <logo/>
        <date>2018-12-28T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9998-the_good_the_strange_and_the_ugly_in_2018_art_tech</slug>
        <title>The good, the strange and the ugly in 2018 art &amp;tech </title>
        <subtitle>On art, AI, hormones hacking and other prospects of a post-human world</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>What's been good, exciting, spooky and challenging in art and science/technology over this past year. With a short incursion into the ugly because even artists have the right to be awful.&#13;
</abstract>
        <description>Global warming, the threat of another economic crisis, the rise of far right discourses across Europe or the mass extinction of natural species, it might seem futile to invest time and attention to contemporary art. And yet, with their inquisitive mind, their skills in (ab)using new media and their provocative attitude, artists and critical designers can play a valuable role in creating richer narratives around issues that tend to polarize and/or dismay.  &#13;
&#13;
The talk will look at the good, the strange and the exciting in art and science/technology over this past year. With a short incursion into the ugly because even artists have the right to be awful.&#13;
&#13;
Some of the topics explored might include the environmental and human cost of AI, hormones hacking, 'racism' behind innocent looking devices and other prospects of a post-human world.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8727">Régine Debatty</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9797" guid="a9504e38-7f8e-4e2d-bf50-6cd69dbb60f9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9797.html</url>
        <logo/>
        <date>2018-12-28T18:50:00+01:00</date>
        <start>18:50</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9797-analyze_the_facebook_algorithm_and_reclaim_data_sovereignty</slug>
        <title>Analyze the Facebook algorithm and reclaim data sovereignty </title>
        <subtitle>Algorithms define your priorities. Who else besides you can know what you need?</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Facebook monopoly is an issue, but looking for replacements it is not enough. We want to develop critical judgment on algorithms, on why data politics matter and educate, raise awareness for a broad audience.  With &lt;a href="https://facebook.tracking.exposed"&gt;our tool&lt;/a&gt;, we enable an individual to collect evidence and see how Facebook's algorithm truly shares their data. Not data about themselves, but the bias of facebook treats data, re-shares certain content over other content. Collectively we can analyze the algorithm, understand Facebooks agendas and show how little agency users have.</abstract>
        <description>As algorithms define what our priorities are, they should be recognized as an extension of our will. We must be able to consciously build our own algorithms, change them whenever we want, and not have to delegate this decision to a commercial entity, with opaque functioning and objectives.&#13;
&#13;
This is the goal of &lt;a href="https://tracking.exposed"&gt;tracking.exposed&lt;/a&gt;, a goal that can only be achieved through education. We recognize that not everyone possesses the knowledge and skills to design their own algorithms, and therefore there is the need to create a support community, where algorithms can be shared, compared, improved and criticized. The algorithm is power; it can be a harmful cage or a helpful filter. Only autonomous and informed individuals can decide what is most appropriate for them at a given time.&#13;
&#13;
We also worked on &lt;a href="https://youtube.tracking.exposed"&gt;analyzing YouTube algorithm&lt;/a&gt;! And others platform should follow; the collaborative observation approach is replicable in every platform which personalizes the results. This talk wants to be accessible for ordinary social media users. We understand that many have to be on these platforms, but at least, we can try to use them without getting used!</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4912">Claudio Agosti</person>
        </persons>
        <links>
          <link href="https://facebook.tracking.exposed">website</link>
        </links>
        <attachments/>
      </event>
      <event id="9893" guid="feb18113-3325-4053-93a0-76d4980b137c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9893.html</url>
        <logo>/system/events/logos/000/009/893/large/spectre.png?1539637629</logo>
        <date>2018-12-28T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9893-a_christmas_carol_-_the_spectres_of_the_past_present_and_future</slug>
        <title>A Christmas Carol - The Spectres of the Past, Present, and Future</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>With the beginning of last year, two major security vulnerabilities have been disclosed: Meltdown and Spectre. While mitigations in software and hardware have been rolled out right away, new variants have been continuously released in the following months. With all those confusing names, how can you possibly still have a clear overview of all those vulnerabilities (SpectreV1, SpectreV2, Meltdown, Spectre-NG, SpectreRSB, L1TF, Foreshadow, ...)? With this talk, we present a novel classification that will ease the naming complexity of the current jungle of variants. Along with all different attacks, we will give an overview of all proposed mitigations and show how an attacker still can mount an attack despite the presence of implemented countermeasures. Furthermore, we will present new variants of the Meltdown attack, exploiting different parts of the CPU.</abstract>
        <description>Only a few days after the Chaos Communication Congress closed its doors last year, two major security vulnerabilities have been disclosed to the public.&#13;
Meltdown and Spectre exploit critical vulnerabilities in modern processors, allowing attackers to read arbitrary data currently processed on the computer without any permissions or privileges.&#13;
While mitigations in software and hardware have been proposed and rolled out right away, new variants of Spectre and Meltdown attacks have been published frequently in the following months.&#13;
&#13;
Spectre v1? Spectre v2? Meltdown? Spectre-NG? SpectreRSB? L1TF? Foreshadow? - With all those names and variants, how can you possibly have still a clear overview of those vulnerabilities?&#13;
With all those operating systems, compiler, and microcode updates, is my system really protected?&#13;
&#13;
In our talk, we present a novel classification of Spectre and Meltdown attacks and propose a new naming scheme to ease the naming complexity of the current jungle of variants.&#13;
Furthermore, we give an overview of all proposed mitigations and show that an attacker can still mount an attack despite the presence of implemented countermeasures.&#13;
Finally, we show new variants of the Meltdown attack, exploiting different parts of the CPU.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6937">Moritz Lipp</person>
          <person id="8665">Michael Schwarz</person>
          <person id="6293">Daniel Gruss</person>
          <person id="8700">Claudio Canella</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9703" guid="f76415ac-d07b-4c5a-bedf-460470711712">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9703.html</url>
        <logo/>
        <date>2018-12-28T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9703-supermuc-ng</slug>
        <title>SuperMUC-NG</title>
        <subtitle>… und das Rennen um den schnellsten Computer der Welt</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Der nationale Höchstleistungsrechner SuperMUC-NG unterstützt die öffentliche Wissenschaft in Deutschland. Wie ist er aufgebaut, was kann man damit tun, und wo steht er im Vergleich mit den schnellsten Supercomputern der Welt?</abstract>
        <description>Im September 2018 wurde nach einem Jahr für die öffentliche Ausschreibung und Beschaffung sowie einem halben Jahr Bauzeit die Inbetriebnahme des bayerischen Höchstleistungsrechners SuperMUC-NG gestartet. Der Rechner am Leibniz-Rechenzentrum (LRZ) in Garching wird derzeit diversen Tests unterzogen und soll Anfang 2019 für die Wissenschaft in Deutschland zur Verfügung stehen. In diesem Vortrag soll die Architektur von SuperMUC-NG vorgestellt und auf seine Besonderheiten eingegangen werden. Dazu zählt u. a. der Einsatz von herkömmlichen Skylake-Prozessoren und der Verzicht auf Beschleuniger (GPGPUs), aber auch die spezielle Heißwasserkühlung in Kombination mit Adsorptionskältemaschinen. Anhand ausgewählter Anwendungsbeispiele aus der Astrophysik, den Erdwissenschaften, der Genomanalyse und der personalisierten Medizin wird gezeigt, wofür diese Rechner gebaut werden. Natürlich ist SuperMUC-NG nicht der einzige derartige Rechner auf der Welt und mit der Top 500 Liste der Supercomputer gibt es zwei Mal jährlich ein "Rennen" um den schnellsten Computer der Welt. Wo steht Deutschlands derzeit schnellster akademischer Rechner im internationalen Vergleich, und warum ist dieser Vergleich genauso unwichtig wie ein Formel-1 Rennen für die Automobilbranche? </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8528">Dieter Kranzlmueller</person>
        </persons>
        <links>
          <link href="https://badw.de/die-akademie/presse/pressemitteilungen/pm-einzelartikel/detail/supermuc-ng-next-generation-hoechstleistungsrechner-am-leibniz-rechenzentrum.html">Pressemitteilung zu SuperMUC-NG</link>
          <link href="https://www.lrz.de/services/compute/supermuc/supermuc-ng/">Characteristics SuperMUC-NG</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/681/original/20181228_Leipzig_-_35C3_-_SuperMUC-NG_%E2%80%A6_und_das_Rennen_um_den_schnellsten_Computer_der_Welt.pdf?1546023818">Slides:SuperMUC-NG</attachment>
        </attachments>
      </event>
      <event id="9965" guid="3e75c48f-3a58-4afe-bafb-0670dd2b15cc">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9965.html</url>
        <logo>/system/events/logos/000/009/965/large/g62.png?1546009994</logo>
        <date>2018-12-28T23:30:00+01:00</date>
        <start>23:30</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9965-what_is_good_technology</slug>
        <title>What is Good Technology?</title>
        <subtitle>Answers &amp; practical guidelines for engineers.</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The last years, we all have felt the impact of applying technologies like machine learning, social networks and data-driven decision making on a massive scale to our societies. Yet all that technology has been developed by engineers like us. It's become clear that we have to do more than chase the ever evolving technological challenges and start to assume responsibility for our creations - or we too will wake up one day to the realization that technology we helped develop has done more harm than good. &#13;
We want to present practical, every day guidelines and principles that can help engineers and organizations to build technology that not only serves the application and business purpose, but also minimizes negative long-term effects on society and the people that use it.</abstract>
        <description>The Good Technology Collective was founded in December of 2017 in Berlin by a diverse group of experts from academia, government &amp; the private sector with the goal to bring fresh wind into the discussions everybody seemed to have about the impact of modern technology in the wake of the full impact of fake news, algorithmic biases, filter bubbles &amp; massive data breaches - without ever resulting in tangible action.&#13;
The GTC hosts and supports regular events to educate engineers, publishes articles to educate society through media partnerships, holds internal round tables and aims to work with policy makers long-term. As part of this years effort, we are releasing "Ethical Engineering Guidelines" that offer a practical way for engineers and organizations to responsibly develop new technology that takes ethics &amp; societal impact more into account and can easily be applied to small and large projects alike. These guidelines have been developed throughout the year a parts of them presented at various events as they progressed, to collect feedback and further improve them.&#13;
Members of GTC range from (former) whistle blowers, activist MPs, Oxford professors in ethics, authors to entrepreneurs and technology makers in various areas. The GTC is fully independent and only accepts public donations that are not tied to a specific project.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8525">Yann Leretaille</person>
        </persons>
        <links>
          <link href="https://goodtechnologycollective.com">Good Technology Collective Website</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/685/original/35C3-Dec_2018.pdf?1546070464">Presentation Slides</attachment>
        </attachments>
      </event>
    </room>
    <room name="Dijkstra">
      <event id="9812" guid="de977841-8510-4172-9622-dd0563c2cb82">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9812.html</url>
        <logo/>
        <date>2018-12-28T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9812-a_farewell_to_soul-crushing_code</slug>
        <title>A farewell to soul-crushing code</title>
        <subtitle>Towards correct software that enriches our lives</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>A major part of software development is maintenance, i.e. tinkering with software that should already be completed but still somehow does not work as it should. Software developed by tinkering is the antithesis to resilient technology, and a growing threat to our profession and our lives. Working on this kind of software crushes the soul. Yet this is exactly how most IoT devices (and computers in general) are programmed these days. We need to replace the dead technology-oriented objects of the past with supple models enriching our domains and our souls. This talk shows how it is done.&#13;
</abstract>
        <description>So how do we gain autonomy over the software of the future, which is currently spiralling out of control? Not with object-oriented programming, as it turns out: Mutable state, the absence of uniform abstraction mechanisms and the complexity introduced by inheritance make it hard for humans to develop correct and robust software. While "agile" has given developers autonomy over the soul-crushing processes of the past, the prevalent technology - object-orientation - is a fundamental part of the problem, not of the solution. It is time to say goodbye; we must start to teach the principles of systematic construction of correct software instead. At the core of this revolution is the consistent application of functional programming, i.e. of immutable data structures, systematic abstraction and data modelling. The talk illustrates the problems of the programming techniques of the past, and shows how to build robust models that lead to useful software. &#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7686">Mike Sperber</person>
          <person id="8613">Nicole Rauch</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/658/original/farewell.pdf?1545930771">Slides</attachment>
        </attachments>
      </event>
      <event id="9660" guid="9777cea0-ac06-4274-85db-908c1e87e2f4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9660.html</url>
        <logo/>
        <date>2018-12-28T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9660-modern_windows_userspace_exploitation</slug>
        <title>Modern Windows Userspace Exploitation</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>In this talk we will go through the different mitigations in Windows 10 and see how they affect modern userspace exploitation. We will explain the primary ones and the different ways to bypass them. Finally, we will demo a cool exploit that achieves code execution.</abstract>
        <description>In the past few years, many new mitigation techniques were introduced both into Windows kernel and userspace. These are supposed to make exploitation of certain vulnerabilities significantly harder, reduce exploit reliability, and require dependency on multiple primitives. It impacts many of the core components of the OS and build stack, including the loader, front-end allocator, compiler, and memory management. With such investment and impact, how effective are these really, from the exploit developer’s perspective?&#13;
In this talk, we’ll explain the primary mitigations in Windows that hinder modern memory corruption exploitation in userspace. Using examples of real-world vulnerabilities, we will see how to achieve arbitrary code execution on different Windows versions, comparing their impact on exploits. On our journey to code execution, we will learn the motivation behind these mitigations, understand their design, scope, and implementation, and study their weaknesses.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8499">Saar Amar</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9414" guid="ef9c53e5-b01b-431a-b141-9218f79b6c5a">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9414.html</url>
        <logo/>
        <date>2018-12-28T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9414-sense_without_sight_a_crash_course_on_blindnavigation</slug>
        <title>Sense without sight: a crash course on #BlindNavigation</title>
        <subtitle/>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Learn to see the world without your eyes. Wonder what it's like to navigate while blind? Want to learn to use your everyday senses in ways you don't know you don't know? In this talk, I hack &lt;em&gt;you&lt;/em&gt; with permanently enhanced sensory perceptions. &#13;
&#13;
This is very participatory, not just "sit and listen", and workshops are even more hands-on (blindfolded w/ cane in hand).&#13;
&#13;
Workshop &amp; volunteer signup: &lt;a href="https://s.ai/ccc/ws"&gt;https://s.ai/ccc/ws&lt;/a&gt;&#13;
Tag plz: #BlindNavigation @saizai #35c3</abstract>
        <description>&lt;h2&gt;Talk&lt;/h2&gt;&#13;
&lt;p&gt;&lt;b&gt;This talk is &lt;i&gt;not&lt;/i&gt; the same on video as in person. Come in person if you can.&lt;/b&gt;&lt;/p&gt;&#13;
&lt;p&gt;A few things I'll cover require a cane, but the vast majority are sensory input that you already have, and you simply don’t realize or pay attention to.&lt;/p&gt;&#13;
&lt;p&gt;This will also (briefly) cover how and how not to interact with a blind person on the street, cognitive shifts from perceiving the world as a blind person, real vs myth difficulties, etc.&lt;/p&gt;&#13;
&lt;p&gt;This talk is specifically focused on navigation and sensory experience. It won't cover Braille, computers, general life skills, medical/legal issues, or the like.&lt;/p&gt;&#13;
&lt;p&gt;After you attend, I'd greatly appreciate your feedback: &lt;a href="https://s.ai/ccc/fb"&gt;https://s.ai/ccc/fb&lt;/a&gt;. If you post about it, I'd appreciate if you use gender neutral pronouns for me, and tag me (saizai) or send me a link.&lt;/p&gt;&#13;
&lt;h3&gt;Participation&lt;/h3&gt;&#13;
&lt;p&gt;The talk is applied and participatory, not just abstract. I want you to actually experience what I discuss, so that you have a genuine qualitative sense of what it is like to navigate the world while blind.&lt;/p&gt;&#13;
&lt;p&gt;You will have a better experience if you are totally sober, don't have arms or head covered, &amp; have used the toilet beforehand.&#13;
&lt;p&gt;Some things you may be asked to do: &lt;ul&gt;&#13;
&lt;li&gt;make a single synchronized clap, to generate a sonic ping of the room&lt;/li&gt;&#13;
&lt;li&gt;listen carefully to the timing differences of echos&lt;/li&gt;&#13;
&lt;li&gt;stand up / sit down&lt;/li&gt;&#13;
&lt;li&gt;feel air currents&lt;/li&gt;&#13;
&lt;li&gt;put the back of your hand near the face of the person sitting next to you (&amp; vice versa), feeling for heat changes &amp; air currents&lt;/li&gt;&#13;
&lt;li&gt;come up to the stage when asking questions, so that you can get on stage if that would be helpful for me to demonstrate an answer for you directly&lt;/li&gt;&#13;
&lt;/ul&gt;&lt;/p&gt;&#13;
&lt;p&gt;Participation in these is strictly optional. It's totally OK if you don't want to (e.g. comfort, disability, not wanting to be on camera, etc), and you don't need to justify it. I'll ask for indications of consent or opt-out. However, participating will very significantly improve your experience and how much you'll learn.&lt;/p&gt;&#13;
&lt;h2&gt;Workshops&lt;/h2&gt;&#13;
&lt;p&gt;The talk will try to cover as much as can be done without direct experience. However, there's a huge qualitative difference between simply hearing me talk about it and experiencing it for yourself. Therefore, I am also running hands-on, 1-hour workshops (approx. 2 per day, TBD).&lt;/p&gt;&#13;
&lt;p&gt;Workshop participants will be blindfolded, given a guide cane, and led through a crash course in how to use and perceive the cues that are discussed in the talk, and an additional Q&amp;A / debriefing session afterwards. This starts from simply walking along a straight path, and quickly escalates to hearing corridors, feeling walls at a (short) distance, etc.&lt;/p&gt;&#13;
&lt;p&gt;Workshop observers are welcome. I also need several volunteers to make this happen, so if you can, please do.&lt;/p&gt;&#13;
&lt;h3&gt;Workshop &amp; volunteer signup&lt;/h3&gt;&#13;
&lt;p&gt;&lt;a href="https://s.ai/ccc/ws"&gt;https://s.ai/ccc/ws&lt;/a&gt;&lt;/p&gt;&#13;
&lt;h2&gt;Help wanted!&lt;/h2&gt;&#13;
&lt;h3&gt;People&lt;/h3&gt;&#13;
&lt;p&gt;I need volunteers:&lt;ol&gt;&#13;
&lt;li&gt;on stage (general, e.g. as human obstacle, safety, slides-checker, demonstration partner, etc.)&lt;/li&gt;&#13;
&lt;li&gt;on stage (aikido uke)&lt;/li&gt;&#13;
&lt;li&gt;during talk, in audience (to walk and/or bike around the aisles to generate wind currents, hold an open cup of coffee / mate for smell, etc)&lt;/li&gt;&#13;
&lt;li&gt;workshop assistants (requires training, preferably before 35C3 day 0)&lt;/li&gt;&#13;
&lt;/ol&gt;&lt;/p&gt;&#13;
&lt;p&gt;If you can, please &lt;a href="https://s.ai/ccc/ws"&gt;volunteer&lt;/a&gt;. I'll train you on what needs to be done.&lt;/p&gt;&#13;
&lt;p&gt;Please also &lt;a href="https://s.ai/contact"&gt;contact me&lt;/a&gt; if you:&lt;ul&gt;&#13;
&lt;li&gt;are blind / visually impaired and a cane or guide dog user going to 35C3; or&lt;/li&gt;&#13;
&lt;li&gt;would like to collaborate on blind navigation aids (e.g. cane-embedded compass).&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&#13;
&lt;h3&gt;Stuff&lt;/h3&gt;&#13;
&lt;p&gt;If you have:&lt;ul&gt;&#13;
&lt;li&gt;to give:&#13;
&lt;ul&gt;&#13;
&lt;li&gt;a working Northpaw anklet you can part with&lt;/li&gt;&#13;
&lt;li&gt;ability to make custom eyeglass frames with zero light leakage&lt;/li&gt;&#13;
&lt;/ul&gt;&lt;/li&gt;&#13;
&lt;li&gt;to borrow:&lt;ul&gt;&#13;
&lt;li&gt;long white guide canes&lt;/li&gt;&#13;
&lt;li&gt;sections of tactile paving (bumps, grooves, etc used on the street for blind people)&lt;/li&gt;&#13;
&lt;li&gt;sections of any random paving, flooring, tiles, carpet, etc&lt;/li&gt;&#13;
&lt;li&gt;tatami (aikido floor safety style)&lt;/li&gt;&#13;
&lt;li&gt;tactile or audio street crossing indicators&lt;/li&gt;&#13;
&lt;li&gt;dry ice &amp; a trough&lt;/li&gt;&#13;
&lt;li&gt;laser that can emit as a flat plane&lt;/li&gt;&#13;
&lt;li&gt;binaural audio recording equipment&lt;/li&gt;&#13;
&lt;li&gt;hands-free 360° video recording equipment (&amp; editing capability)&lt;/li&gt;&#13;
&lt;li&gt;… or anything similar&lt;/li&gt;&#13;
&lt;/ul&gt;&lt;/li&gt;&#13;
&lt;/ul&gt;&#13;
... please contact me: &lt;a href="https://s.ai/contact"&gt;https://s.ai/contact&lt;/a&gt;&lt;/p&gt;&#13;
&lt;h3&gt;Money&lt;/h3&gt;&#13;
&lt;p&gt;All workshops are free.&lt;/p&gt;&#13;
&lt;p&gt;Unfortunately, the equipment to run them is not (it costs a few hundred Euros), and I'm poor. If you can donate, it'd be appreciated: &lt;a href="https://s.ai/donate"&gt;https://s.ai/donate&lt;/a&gt;&lt;/p&gt;&#13;
&lt;h2&gt;About me&lt;/h2&gt;&#13;
&lt;p&gt;I do lots of things, e.g. conlanging (26C3), cognitive psychology (27C3), meditation (26C3 &amp; 27C3), civil rights litigation, government transparency, meta-politics, meta-law research, etc. See my wesite. &lt;a href="https://s.ai"&gt;https://s.ai&lt;/a&gt;&lt;/p&gt;&#13;
&lt;p&gt;I'm part-time fully blind. See &lt;a href="https://s.ai/essays/interaction"&gt;https://s.ai/essays/interaction&lt;/a&gt; for tips on how to interact with me &amp; &lt;a href="https://s.ai/essays/blindness"&gt;https://s.ai/essays/blindness&lt;/a&gt; for background info. In particular, please understand that blindness is not "what I do", and I'm going to hit my capacity for talking about it with the talk, Q&amp;A, and workshops. I always welcome feedback, collaborations, fellow-travelers, and press. Other than that, if you see me around Congress, let's please talk about something other than my blindness.&lt;/p&gt;&#13;
&lt;p&gt;&lt;a href="https://s.ai/contact"&gt;Contact info&lt;/a&gt;:&lt;ul&gt;&#13;
&lt;li&gt;Handle: saizai (Twitter/IRC/FB/G+/etc.)&lt;/li&gt;&#13;
&lt;li&gt;Email: ccc@s.ai&lt;/li&gt;&#13;
&lt;li&gt;DECT: 4724&lt;/li&gt;&#13;
&lt;li&gt;Signal/WhatsApp/Telegram +15103944724&lt;/li&gt;&#13;
&lt;/ul&gt;&lt;/p&gt;&#13;
&lt;p&gt;Gender neutral pronouns please.&lt;/p&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4696">Sai</person>
        </persons>
        <links>
          <link href="https://s.ai/ccc/ws">Workshop signup</link>
          <link href="https://s.ai/ccc">Notes &amp; other links</link>
          <link href="https://s.ai/essays/interaction">Interaction tips (from blind POV)</link>
          <link href="https://twitter.com/search?f=tweets&amp;q=%23BlindNavigation">Tweets about #BlindNavigation</link>
          <link href="https://s.ai/ccc/slides">Slides PDF</link>
        </links>
        <attachments/>
      </event>
      <event id="10039" guid="663a4b68-bb0d-493d-826c-07c609883b86">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10039.html</url>
        <logo/>
        <date>2018-12-28T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-10039-theater_und_quantenzeitalter</slug>
        <title>Theater und Quantenzeitalter</title>
        <subtitle>„Die Parallelwelt“- Das Schauspiel Dortmund und die Digitalität</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Seit 2010 ist die Sehnsucht des Schauspiel Dortmund, ein gegenwärtiges und wagemutiges Schauspiel für ein Publikum des 21. Jahrhunderts zu schaffen, ein Volkstheater für die Digitale Moderne. Intendant Kay Voges, Videokünstler Mario Simon und Engineer Lucas Pleß berichten über Dortmunder Theaterarbeiten zum Menschsein im Digitalen Zeitalter, speziell über die Stückentwicklung "Die Parallelwelt", die im September 2018 am Berliner Ensemble und am Schauspiel Dortmund gleichzeitig Premiere hatte, sowie über die "Akademie für Digitalität und Theater", die 2020 in Dortmund gegründet werden soll. </abstract>
        <description>Einen Theaterabend, der die Ränder des Erzählens auslotet und die Grenzen zwischen Theater, Film und Netz in Frage stellt: Im September 2018 hatte „Die Parallelwelt“ simultan am Schauspiel Dortmund und am Berliner Ensemble Premiere. Regisseur Kay Voges, Videokünstler Mario Simon und Software-Ingenieur Lucas Pleß vom Schauspiel Dortmund berichten über die Entwicklung eines Theaterabends, für den zwei Bühnen und zwei Zuschauerräume in zwei Städten in Echtzeit per Glasfaser verbunden sind. „Die Parallelwelt“ spielt mit der Vervielfältigung von Identitäten im Zusammenspiel mit dem Wandel von Bildern, die sich die menschliche Spezies zu dem Kosmos macht, dessen Teil sie ist – und mit Entgrenzung, Auflösungs-Alptraum und einer Neuzusammensetzung der Welt, wie wir sie kannten.&#13;
&#13;
„Die Parallelwelt“ ist die neueste Produktion zum Thema Menschsein im Digitalen Zeitalter vom Dortmunder Team um Kay Voges, das seit 2010 inhaltlich und formal an den Grenzen von Theater und Installation, Performance, Coding, Game und neuer Medienkunst forscht. Die Sehnsucht von „Deutschlands führendem Theaterlabor“ (DIE WELT): Ein gegenwärtiges und wagemutiges Schauspiel für ein Publikum des 21. Jahrhunderts, ein Volkstheater für die Digitale Moderne. Diese Forschungsreise wird ab 2020 intensiviert werden, wenn in Dortmund die neue „Akademie für Digitalität und Theater“ an den Start gehen soll.&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8813">Kay Voges</person>
          <person id="8814">Mario Simon</person>
          <person id="8793">Lucas Pleß</person>
        </persons>
        <links>
          <link href="https://www.theaterdo.de/detail/event/die-parallelwelt/">"Parallelwelt" in Dortmund</link>
          <link href="https://www.berliner-ensemble.de/inszenierung/die-parallelwelt">Parallelwelt in Berlin</link>
        </links>
        <attachments/>
      </event>
      <event id="9526" guid="623e136b-1ac6-4ef3-8152-d55cfcc80268">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9526.html</url>
        <logo>/system/events/logos/000/009/526/large/SOUNDCLOUD.jpg?1539001057</logo>
        <date>2018-12-28T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9526-never_forgetti</slug>
        <title>Never Forgetti</title>
        <subtitle>a didactic live-gaming performance about dying women across video game history</subtitle>
        <track>Art &amp; Culture</track>
        <type>performance</type>
        <language>en</language>
        <abstract/>
        <description>Never Forgetti &lt;br&gt;&#13;
lecture performance, 2018 &lt;br&gt;&#13;
multiplatform game, &lt;br&gt;&#13;
&lt;a href="https://soundcloud.com/imdrivingfast/sets/never-forgetti-ost"&gt; soundtrack &lt;/a&gt; &amp; &lt;a href="http://janberger.info/texts/nf_guide_web.pdf"&gt; strategy guide &lt;/a&gt; &lt;br&gt; &lt;br&gt;&#13;
Never Forgetti is a didactic live gaming lecture about the deaths of female video game characters and how their normative framing prevents them from developing agency to avert their fatal destiny. The performance investigates on power relationships between lecturer and audience to reflect on how models of subjugation are established in media and our current social realities. Taking on the persona of Jenny Vorfahrt, a mysterious character that exists both outside and inside the gaming realm, I provide attendees with showcase of gameplay and theoretical knowledge about life and death of popular heroines, as well as the symbolism of classical game design. In reality, however, Jenny is pursuing her own secretive agenda...</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8363">JAN BERGER</person>
        </persons>
        <links>
          <link href="http://www.janberger.info/nf.html">website summary Never Forgetti</link>
        </links>
        <attachments/>
      </event>
      <event id="10028" guid="809b164e-a331-4005-a1d8-ebe55d61d64c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10028.html</url>
        <logo/>
        <date>2018-12-28T18:30:00+01:00</date>
        <start>18:30</start>
        <duration>01:20</duration>
        <room>Dijkstra</room>
        <slug>35c3-10028-feminist_perspectives</slug>
        <title> Feminist Perspectives</title>
        <subtitle>Inclusive and Diverse Spaces and Communities</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>podium</type>
        <language>en</language>
        <abstract>A variety of initiatives aims at encouraging female engagement in the hacker and maker scene. We present there some promising approaches and key learnings in a joint panel discussion.</abstract>
        <description>Hong Phuc grew up in a small town in the Mekong Delta, south of Vietnam, She could never imagine how her life went a completely different path than what she was told as a young girl.&#13;
&#13;
Le RESET is a French feminist hackerspace created in 2016 by a small group of queer &amp; feminist hackers and hacktivists. The goal was to create a space at the intersection of communities that often remain apart.&#13;
&#13;
Em O'Sullivan is a former hackerspace and Maker Faire organiser. Currently, they are a PhD student researching ways to improve women and non-binary people's engagement with technology via makerspaces.&#13;
&#13;
Ready to Code is a young project from Stuttgart that teaches girls and women how to code and stand up for themselves.&#13;
&#13;
&#13;
&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="3874">Geraldine de Bastion</person>
          <person id="8649">Em O'Sullivan</person>
          <person id="8457">Lena Mohr</person>
          <person id="2658">Hong Phuc Dang</person>
          <person id="7813">Le RESET, feminist hackerspace</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/672/original/35c3_Feminist_Perspectives_HongPhucDang.pdf?1545993234">HongPhucDang</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/680/original/RTC_3C35.pdf?1546014737">ReadyToCode-Lena</attachment>
        </attachments>
      </event>
      <event id="9618" guid="948fee49-de6f-42b1-82f8-045af2aa155e">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9618.html</url>
        <logo/>
        <date>2018-12-28T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9618-jailbreaking_ios</slug>
        <title>Jailbreaking iOS</title>
        <subtitle>From past to present</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This talk aims to give a general overview of iOS Jailbreaking by starting at what jailbreaking was back in the days and how it evolved up until today, while also taking a quick look at how it might evolve in future.&#13;
 &#13;
Therefore the following topics are covered:&#13;
- Jailbreaking goals (technical)&#13;
- Types of jailbreak and it's origins (tethered, untethered, semi-tethered, semi-untethered)&#13;
- Exploit mitigations (ASLR, iBoot-level AES, KPP, KTRR, PAC)&#13;
- Kernel patches (h3lix)&#13;
- Kppless jailbreaks&#13;
&#13;
The goal is to give an insight into the jailbreak terminology, exploit mitigations and how these are dealt with in past and modern jailbreaks.</abstract>
        <description>I will give an introduction in jailbreak terminology and walk through the jailbreak history, thus presenting how iOS devices have been hacked/jailbroken in the past while focusing on what mitigations Apple added over the years. &#13;
Therefore i will discuss what effects these mitigations have on jailbreaking and how they were (and still are) dealt with.&#13;
&#13;
This should be interesting for hackers new in the iOS game, as several technical aspects are covered, but also for people who jailbreak their devices and want to get a better understanding of what is happening under the hood of jailbreaks as well as what challenges hackers have to face and why things evoled the way they are right now.&#13;
&#13;
This talk is structured somewhat similar to my previous talk 2 years ago "iOS Downgrading - From past to present".&#13;
Watching my previous talk is not neccessary for understanding this one, but is suggested to get a better overall image of iOS hacking.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6749">tihmstar</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9451" guid="3d5774f7-7f42-40bb-a318-4a2c6357dd9b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9451.html</url>
        <logo>/system/events/logos/000/009/451/large/AWl49xgk_400x400.jpg?1537891971</logo>
        <date>2018-12-28T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9451-simulating_universes</slug>
        <title>Simulating Universes</title>
        <subtitle>What Virtual Universes Can Tell Us About Our Own</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>In this talk I want to present the computational undertakings in the field of cosmological structure formation and galaxy formation. Here, sometimes gigantic simulations help us to unravel the processes that led to the Universe that we can see today. I will give a short overview of our current understanding of the evolution of the Universe, the history and techniques of the simulations and their current state and future.</abstract>
        <description>Almost every field of human discovery has gained immensely from the invention of computers, astrophysics maybe more than most others. Experiments are not an option in astrophysics. We cannot form planets, stars, or galaxies in laboratories on earth, but only observe them in an uncontrolled fashion using telescopes. We therefore rely on mathematical models that predict observations which we can test in reality. As the range of analytically tractable problems is very limited we rely on computers to numerically help us to understand the cosmos.&#13;
&#13;
In this talk I will concentrate on a specific branch of astrophysics and cosmology, the science of the evolution of the Universe as a whole: simulations of cosmological structure formation. These simulations follow dark matter in an expanding universe as it collapses under the influence of gravity into the structures which are the birthplaces of galaxies. We will see how these galaxies are glowing tracers on the highly complex, almost invisible structure of the cosmic web.&#13;
&#13;
The largest of these simulations are immense computational undertakings and take tens of millions of core-hours to run on tens of thousand of cores while producing hundreds of tera- if not petabytes of output. Throughout their history they have pushed to the limits of technical feasibility and limits of computing power. They are so rich in information that teams of scientists can find new results in them years, sometimes even more than a decade, after they were run.&#13;
&#13;
After a quick overview of our current understanding of the development of the Universe I will give an introduction to simulations of the dynamics of dark matter with so-called N-body simulations and how these were developed in the 20th century. We will then explore how people follow the evolution of gas and galaxies in these simulations to fill the darkness with stars, supernovae, black holes and sometimes even light. Finally, I will show how these simulations are comparing against our observations and how they helped us to further our understanding of what the Universe is made of, before ending with a short outlook on how cosmological simulations might improve in the future to explain more phenomena and keep up with observations.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8101">Philipp Busch</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9926" guid="bc545b26-8319-43fb-abc2-f624ef414ee8">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9926.html</url>
        <logo/>
        <date>2018-12-28T23:30:00+01:00</date>
        <start>23:30</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9926-the_year_in_post-quantum_crypto</slug>
        <title>The year in post-quantum crypto</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>  The world is finally catching on to the urgency&#13;
  of deploying post-quantum cryptography:&#13;
  cryptography designed to survive attacks by quantum computers.&#13;
  NIST's post-quantum competition is in full swing,&#13;
  and network protocols are exploring post-quantum extensions.&#13;
  This talk will take the audience on a journey&#13;
  through selected recent highlights&#13;
  from the post-quantum world.</abstract>
        <description>  Post-quantum cryptography has become one of the most active&#13;
  areas in cryptography,&#13;
  trying to address important questions from potential users.&#13;
&#13;
  Is post-quantum cryptography secure?&#13;
  In the first ten months of this year&#13;
  we have seen several serious breaks&#13;
  of submissions to the NIST competition.&#13;
  At this point, out of the original 69 submissions,&#13;
  13 are broken and 8 are partially broken.&#13;
  Are the remaining 48 submissions all secure?&#13;
  Or is this competition a denial-of-service attack&#13;
  against the cryptanalysis community?&#13;
  NIST will select fewer candidates for the 2nd round,&#13;
  but it is not clear whether there is an adequate basis&#13;
  for judging security.&#13;
&#13;
  Does post-quantum cryptography provide&#13;
  the functionality we expect from cryptography?&#13;
  For example,&#13;
  the original Diffie-Hellman system&#13;
  provides not just encryption&#13;
  but also more advanced features&#13;
  such as non-interactive key exchange&#13;
  (not provided by any NIST submissions)&#13;
  and blinding.&#13;
  The era of post-NIST post-quantum cryptography has begun&#13;
  with the exciting new CSIDH proposal,&#13;
  which has non-interactive key exchange&#13;
  and is smaller than any NIST submission,&#13;
  but uses more CPU time and needs much more study.&#13;
&#13;
  Is post-quantum cryptography small enough?&#13;
  Even for network protocols that rely purely on encryption,&#13;
  integration remains a major problem&#13;
  because of the bandwidth requirements of most post-quantum systems,&#13;
  especially the post-quantum systems&#13;
  with the strongest security track records.&#13;
  Experiments with integration of post-quantum cryptography into TLS&#13;
  have focused on encryption without post-quantum authentication.&#13;
  A new generation of network protocols&#13;
  has been designed from the ground up for full post-quantum security.&#13;
&#13;
  Is post-quantum cryptographic software fast enough,&#13;
  and is it safe to use?&#13;
  Adding post-quantum cryptography&#13;
  to the cryptographic software ecosystem&#13;
  has produced a giant step backwards in software quality.&#13;
  Major areas of current activity include&#13;
  software speedups,&#13;
  benchmarking,&#13;
  bug fixes,&#13;
  formal verification,&#13;
  patent avoidance, and&#13;
  development of post-quantum software libraries&#13;
  such as Open Quantum Safe and libpqcrypto.&#13;
&#13;
  The talk will be given as a joint presentation&#13;
  by Daniel J. Bernstein and Tanja Lange.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="3538">djb</person>
          <person id="3714">Tanja Lange</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/695/original/slides.pdf?1546088180">Slides for presentation</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
        </attachments>
      </event>
    </room>
    <room name="Eliza">
      <event id="10026" guid="a13bb3ac-fde1-4b82-833e-1fcf1f8f25dd">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10026.html</url>
        <logo/>
        <date>2018-12-28T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-10026-c2x_the_television_will_not_be_revolutionized</slug>
        <title> C2X: The television will not be revolutionized.</title>
        <subtitle>From Cyberfeminism to XenoFeminism</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>From Cyberfeminism to XenoFeminism - a short history of radical appropriations of media. This discussion will question how media is made (for whom and for what) and how meaning is produced through different contexts. it will feature media hacks and productions spanning a century and three continents.</abstract>
        <description>Sci-Hub, film excerpts, Red Planet and more will be referenced. It will also address how and where media matter, comparing different technologies, commenting on CCC projects and what is more/less relevant in different African and European contexts. We will also explore how media and technical developments are informed by their social, economic and political environments.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8778">Rama Thiaw</person>
          <person id="8739">dia</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9762" guid="8cbe8908-4040-402f-93b5-5a4a64cf6f09">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9762.html</url>
        <logo/>
        <date>2018-12-28T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9762-the_urban_organism</slug>
        <title>The Urban Organism</title>
        <subtitle>Hacking [in] Hong Kong</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This talk will engage the practises and protocols of hacking in the context of Hong Kong, drawing parallels from the stigmergic responses of the city (consensus network organisation) and the peer-production (or attempt) of the hackerspace, Dim Sum Labs.&#13;
&#13;
Perspectives on this will also draw from the publication, The Field Guide to Hacking (_TFGTH), a collection of (project and essay) snapshots generated from the hackerspace and its surrounding community.</abstract>
        <description>Part I: Culture + Society: Idiosyncrasies of the Metropolis&#13;
I.i Political and economic structures from outside (the space) to the inside (the space).&#13;
I.ii Cultural identities from the outside to the inside &#13;
I.iii The resulting pastiche&#13;
&#13;
Part II: Dim Sum Labs and _TFGTH: Hong Kong's First and Only Hackerspace&#13;
II.i Brief introduction to our space and activities &#13;
II.ii Introduction of the book (_TFGTH)&#13;
II.iii A few excerpts within &#13;
II.iv Demonstration of the interactive cover of the book&#13;
&#13;
Part III: Peer Production: Collaborative Scenarios&#13;
III.i Meritocracy vs Democracy&#13;
III.ii How this applies in the space/&#13;
III.iii How this applied to the project (_TFGTH)&#13;
III.iv How this applies to the city&#13;
III.v Parallels between hacking and urbanism</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8253">mp_ttaa</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="10022" guid="61176a8b-996d-42f4-b0b9-559902a59d52">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10022.html</url>
        <logo/>
        <date>2018-12-28T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-10022-reality_check_basel_lagos_in_virtual_reality</slug>
        <title>Reality Check! Basel/Lagos?? In virtual reality?</title>
        <subtitle>An African tale of art, culture and technology</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This talk will share the experience of a leading African extended reality lab - Imisi 3D. It will highlight this African journey to adopt augmented and virtual reality, the challenges and lessons learned and will then focus on some of the arts and culture use cases that have emerged so far. In particular we will explore the collaboration with the IAF Basel festival (organisers of the Contemporary Africa Photography prize) that resulted in Reality Check, a simultaneous virtual reality tour of Lagos and Basel.&#13;
</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8735">Judith Okonkwo</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9595" guid="3ff227f1-93cc-4a1d-8f0e-68fc12aea2c9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9595.html</url>
        <logo>/system/events/logos/000/009/595/large/wind_v3-1.jpg?1539610776</logo>
        <date>2018-12-28T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9595-wind_off-grid_services_for_everyday_people</slug>
        <title>Wind: Off-Grid Services for Everyday People</title>
        <subtitle>Integrating nearby and offline connectivity with the Internet</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The internet has become essential services, and offline methods of sharing data are rapidly disappearing.  Other possible networks are often better suited when connectivity is not available or affordable.  Radios, sensors, and computing are available in the cheapest of smartphones and routers.  Wind is integrating nearby/offline data exchange with the internet services that we all rely on.&#13;
</abstract>
        <description>We rely on the internet for so many things, from personal relationships to essential services.  As the internet has gotten stronger, the asynchronous and offline methods of sharing data are rapidly disappearing.  There has not been enough investment in the many other possible nets, even though they are often better suited for situations where connectivity is not available or affordable. The potential in radios, sensors and processing available in the cheapest of smartphones and routers are not fully utilized or realized.&#13;
&#13;
Wind is a network designed for opportunistic communication and sharing of local knowledge. It is built on impermanence, movement, and spontaneity.  Wind is a direct counterpoint to the metaphor of the Web, a system built upon the concept of fixed physical nodes, centralized authorities and permanent links. It is rooted in the mindsets and needs of people and communities who face challenges communicating. Wind is shaped by the movements and density of people in time and space.&#13;
&#13;
The Wind project began with giving F-Droid the ability to "swap apps" using only Bluetooth and local Wi-Fi connections.  We have enabled users with limited connectivity to gather and share media to archive.org via OpenArchive.  Added "nearby" data exchange to share sensitive or blocked news via Proofmode and Courier.  LibraryBoxen are integrated in as relay or source of data. &#13;
&#13;
Guardian Project always works in partnership with the people and organizations whose needs we are aiming to address.  Real world solutions do not exist in a bubble, so we always integrate with established free software projects, as well as develop design guidelines and document key concepts to spread all aspects of this research.  This work was undertaken in partnership with Tibetans facing internet shutdowns, Cubans working with their own separate networks, Latin Americans facing expensive data plans, and people all over the world who experience outages and unreliable connectivity.&#13;
&#13;
For Wind, our development approach is to incrementally improve upon existing efforts, while also focusing on developing the new integration glue necessary to provide a smooth, usable and practical to deploy experience. We are not inventing a new stack or protocol from scratch, or envisioning a utopian silo in which our systems solves all of the potential problems end-to-end. The issue that we see is that there are many potential components, protocols or software libraries that exist today, but that they have not been unified into a cohesive, usable experience that promotes easy deployment, bootstrapping and adoption.&#13;
&#13;
This work just won fourth prize in the Mozilla "Wireless Innovation for a Networked Society" Off-the-Grid Internet Challenge, providing us funding to take the next step in the development.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5330">Hans-Christoph Steiner</person>
        </persons>
        <links>
          <link href="https://guardianproject.info/wind/">Guardian Project's Wind page</link>
          <link href="https://wirelesschallenge.mozilla.org/#grand-winners-1">Mozilla "Wireless Innovation for a Networked Society" Off-the-Grid Internet Challenge</link>
          <link href="https://okthanks.com/blog/peronas-latin-america">Latin American Personas for guiding design processes</link>
        </links>
        <attachments/>
      </event>
      <event id="9915" guid="765cb049-78f4-4997-8cc6-238283e241a8">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9915.html</url>
        <logo/>
        <date>2018-12-28T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9915-projekt_hannah</slug>
        <title>Projekt Hannah</title>
        <subtitle>Ein open-source Hardware- und Software-Design für vierbeinige Laufroboter</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Um das Entwickeln von eigenen Laufrobotern zu erleichtern, brauchen wir offene Alternativen zu bestehenden Plattformen. Am Beispiel unseres Projektes "Hannah" stellen wir euch Möglichkeiten vor, wie Open Source in Robotik-Hardware praktisch eingesetzt werden kann.</abstract>
        <description>Wir bauen einen vierbeinigen Laufroboter, der vollständig open-source in Hard- und Software ist, denn Roboter werden für uns alle sicherer und nützlicher sein, wenn wir ihre Funktionalität vollständig verstehen und ihrer Hardware vertrauen können. Außerdem sind wir überzeugt, dass zukünftige Robotik/KI-Systeme für die Menschheit allgemein förderlich sein werden, wenn die zugrundeliegende Technologie unabhängig von privaten Interessen und in den Händen von Wissenschaftlern, Ingenieuren und Hackern weltweit ist.&#13;
&#13;
Bei der Entwicklung von Laufrobotern ist die notwendige Hardware oft nicht erschwinglich, oder die Quellen für die Hardware-Designs oder die Software schwer zugänglich. Einen Laufroboter von Grund auf zu entwickeln kann leicht mehrere Jahre dauern, was für Forscher und Hobbyisten viel Aufwand bedeutet und für Startups ein hohes Risiko darstellt.&#13;
&#13;
Wir entwickeln ein völlig freies quelloffenes Hardware- und Software-Design für einen Laufroboter, welches von allen verwendet, studiert, modifiziert und verteilt werden kann, und wollen damit einen Beitrag zur Demokratisierung des Bereichs der Laufroboter leisten. Das mechanische Design besteht aus 3D-gedruckten oder Laser-geschnitten Teilen, welche anderweitig zu teuer wären, bzw. aus Standardteilen, welche vielerorts günstig erworben werden können. Der Roboter kann somit leicht im lokalen Hackspace oder zu Hause nachgebaut werden. Das Motorsteuerungssystem ist eine ebenfalls quelloffene Elektronik- und Firmware-Eigenentwicklung zur einfachen Regelung von DC-Motoren inklusive eines flexiblen Bussystems zur Echtzeitkommunikation. Die Software umfasst die Low-Level Motorregelung und die Algorithmen zur Bewegungssteuerung für verschiedene Gangarten und Richtungen, welche durch Mikroprozessor-freundliche neuronale Regler erzeugt werden.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8657">Matthias Kubisch</person>
          <person id="6677">Felix Just</person>
        </persons>
        <links>
          <link href="https://suprememachines.de/">Supreme Machines Website</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/586/original/hannah_push_recovery.mp4?1539639211">Kurzes Video vom Roboter</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/587/original/IMG_20180525_155412.jpg?1539639211">Foto vom Roboter</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/588/original/IMG_20180609_183131.jpg?1539639211">Noch ein Foto vom Roboter</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/678/original/slides_1.pdf?1546008239">Slides</attachment>
        </attachments>
      </event>
      <event id="9733" guid="2d71612c-7f40-484b-a939-10b809aedd80">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9733.html</url>
        <logo>/system/events/logos/000/009/733/large/privacy.png?1539962563</logo>
        <date>2018-12-28T18:50:00+01:00</date>
        <start>18:50</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9733-was_schutzt_eigentlich_der_datenschutz</slug>
        <title>Was schützt eigentlich der Datenschutz?</title>
        <subtitle>Warum DatenschützerInnen aufhören müssen von individueller Privatheit zu sprechen.</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Beim Datenschutz geht es mitnichten um Privatsphäre, um das eigene Schlafzimmer oder um das Teilen privater Daten bei Facebook. Es geht gleichermaßen um den Erhalt einer demokratischen Gesellschaftsordnung wie um den Erhalt individueller Handlungsalternativen im digitalen Zeitalter. Wir dürfen also nicht so sehr über Einzelpersonen und ihre höchst subjektiven Privatheitswünsche sprechen, sondern viel mehr von Machtasymmetrien, Durchsetzungsmacht, sowie „starken“ und „schwachen“ Akteuren.</abstract>
        <description>Erst mit diesem strukturellen Blick können wir politischen Nebelkerzen wie "Selbst-Datenschutz", "Dateneigentum", "individuelle Datensouveränität" oder etwa "Algorithmen-Ethik" etwas entgegensetzen, die zunehmend als Lösung für das Problem der Verdatung der Gesellschaft angeboten werden. Wir müssen uns strukturell und auch theoretisch mit dem Problem der Informationsmacht großer Organisationen (Behörden, Firmen) beschäftigen, wenn wir einer grundrechtsorientierten digitalen Gesellschaft leben wollen. Denn Datenreichtumsbefürworter- und DatenschutzverächterInnen, die derartige Probleme wie so oft dem Individuum aufbürden wollen, haben nämlich keinen theoretischen Unterbau.&#13;
&#13;
Dieser Foundation-Talk vermittelt passioniert das Rüstzeug und die nötigen Grundlagen, um tatsächlich sinnvolle Datenschutzbebatten zu führen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="1642">Rainer Rehak</person>
        </persons>
        <links>
          <link href="https://media.ccc.de/v/35c3-9733-was_schutzt_eigentlich_der_datenschutz">VIDEO</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/702/original/35C3-Datenschutz_v1.0.pdf?1546096877">FOLIEN</attachment>
        </attachments>
      </event>
      <event id="9590" guid="c94fde2e-b5db-48f2-b94f-872ce7405875">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9590.html</url>
        <logo>/system/events/logos/000/009/590/large/swiss-flag_001.jpg?1545082519</logo>
        <date>2018-12-28T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9590-schweiz_netzpolitik_zwischen_bodensee_und_matterhorn</slug>
        <title>Schweiz: Netzpolitik zwischen Bodensee und Matterhorn</title>
        <subtitle>Massenüberwachung, Netzsperren und andere netzpolitische Schauplätze in der Schweiz</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Datenreichtum, E-Voting, Massenüberwachung und andere netzpolitische Schauplätze in der Schweiz</abstract>
        <description>Der Kampf um die Freiheit im digitalen Raum wird auch in der Schweiz intensiver. Wir blicken auf das netzpolitische Jahr 2018 in der Schweiz zwischen Bodensee und Matterhorn zurück. Wir behandeln jene Themen, die relevant waren und relevant bleiben. Weiter zeigen wir, was von der Digitalen Gesellschaft in der Schweiz im neuen Jahr zu erwarten ist.&#13;
&#13;
&lt;strong&gt;Themen sind unter anderem:&lt;/strong&gt;&#13;
&#13;
&lt;strong&gt;Massenüberwachung:&lt;/strong&gt; Kabelaufklärung und Vorratsdatenspeicherung sowie die Beschwerden, welche die Digitale Gesellschaft in der Schweiz führt.&#13;
&#13;
&lt;strong&gt;E-Voting:&lt;/strong&gt; Abstimmungen und Wahlen im Internet sowie der Kampf für das Vertrauen in die Direkte Demokratie in der Schweiz.&#13;
&#13;
&lt;strong&gt;Netzsperren:&lt;/strong&gt; Die Zensur im schweizerischen Internet begann mit «Denkt denn niemand an die Kinder?» und geht nun mit Geldspielen im Internet weiter …&#13;
&#13;
&lt;strong&gt;Urheberrecht:&lt;/strong&gt; Wie die USA im «Piratenstaat» Schweiz ihre Forderungen durchsetzen, unter anderem mit Massenabmahnungen gegen Filesharing.&#13;
&#13;
&lt;strong&gt;Datenschutz:&lt;/strong&gt; Wo war in der Schweiz besonders viel «Datenreichtum» zu beobachten?&#13;
&#13;
&lt;strong&gt;Digitale Gesellschaft in der Schweiz:&lt;/strong&gt; Razzia am «Hort der Linksextremen», Winterkongress und andere Aktivitäten.&#13;
&#13;
Nach dem Vortrag sind alle interessierten Personen eingeladen, die Diskussion an einem Workshop der Digitalen Gesellschaft fortzusetzen. Es werden Aktivisten von verschiedenen aktiven Organisationen der Netzpolitik in der Schweiz anwesend sein (Digitale Gesellschaft, CCC-CH, CCCZH, Piratenpartei Schweiz, Digitale Allmend).&#13;
&#13;
&lt;a href="https://events.ccc.de/congress/2018/wiki/index.php/Session:Follow-up_meeting_to_the_Netzpolitik_in_der_Schweiz_talk"&gt;https://events.ccc.de/congress/2018/wiki/index.php/Session:Follow-up_meeting_to_the_Netzpolitik_in_der_Schweiz_talk&lt;/a&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8033">Martin Steiger</person>
          <person id="6351">Patrick "packi" Stählin</person>
          <person id="7723">Kire</person>
        </persons>
        <links>
          <link href="https://www.digitale-gesellschaft.ch">Digitale Gesellschaft in der Schweiz</link>
          <link href="https://martinsteiger.ch/sharing/35c3/35c3_digitale-gesellschaft_netzpolitik-schweiz.pdf">Folien / Slides</link>
        </links>
        <attachments/>
      </event>
      <event id="9492" guid="86b96f3f-a6b5-49c0-a189-69912c016916">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9492.html</url>
        <logo>/system/events/logos/000/009/492/large/alice_bob.png?1545322020</logo>
        <date>2018-12-28T21:50:00+01:00</date>
        <start>21:50</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9492-wallet_security</slug>
        <title>Wallet Security</title>
        <subtitle>How (not) to protect private keys</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>There are multiple different ways to store cryptocurrency secret keys. This talk will investigate advantages and disadvantages of different methods with regards to cryptographic backdoors known as kleptograms.</abstract>
        <description>With the increasing popularity of cryptocurrencies such as Bitcoin, there is now a variety of different wallet solutions and products available. Wallet in this context refers to any device or piece of software which store secret keys. Those secret keys are typically used to create and sign transactions (payments, smart contracts, etc.) using ECDSA.&#13;
&#13;
Wallet implementations range from simple open-source software to hardware tokens. Some solutions store the keys in files (possibly encrypted with a passphrase), while others use hardware-based cryptography modules. Hardware-based key storage comes with a lot of advantages. The chips are designed to make it hard to extract keys.&#13;
&#13;
What is often overlooked is that it is hard to verify that the wallet actually does what the manufacturer claims it does. One obvious solution is to not connect the wallet to a computer with Internet access in order to avoid exposure of secrets. However, there are possible cryptographic backdoors called kleptograms that can hide the secret information within the published signatures in a way that is provably undetectable.&#13;
&#13;
The kleptographic attacks were first discovered by Adam Young and Moti Yung in 1997 for classic DSA. The author of this talk has investigated the relevance of this attack for ECDSA in the context of Bitcoin. Note that this attack is not limited to Bitcoin and might be relevant for other ECDSA-based protocols as well.&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8297">Stephan Verbücheln</person>
        </persons>
        <links>
          <link href="https://arxiv.org/abs/1501.00447"> How Perfect Offline Wallets Can Still Leak Bitcoin Private Keys</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/727/original/35c3_wallet_security.pdf?1546275895">Slides</attachment>
        </attachments>
      </event>
      <event id="9939" guid="2536bba3-b95f-4cec-9a95-7aa756db7edb">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9939.html</url>
        <logo>/system/events/logos/000/009/939/large/ccc_talk4.jpg?1545941976</logo>
        <date>2018-12-28T22:50:00+01:00</date>
        <start>22:50</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9939-disnovation_org</slug>
        <title>DISNOVATION.ORG</title>
        <subtitle>Disobedient Innovation</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Through the hacking of surveillance techniques, machine learning, and big-data analytics, DISNOVATION.ORG’s trilogy of internet bots is uncovering and repurposing some of the influential and opaque operating systems of our online environment. </abstract>
        <description>Started in 2012 with The Pirate Cinema (exposing the dynamics of peer-to-peer media sharing and its materiality), followed by Predictive Art Bot (a disruption of the normative effects of social media on creativity), and continued with Computational Propaganda (a ‘system test’ of the online political influence apparatus), this series explores black box technologies and the algorithmic governance of our aspirations, decisions, and political views. These three artworks aim to reveal emergent algorithmic imaginaries, expose the inner workings of these systems, and stimulate critical debate.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8671">DISNOVATION.ORG</person>
        </persons>
        <links>
          <link href="https://disnovation.org">DISNOVATION.ORG Art Collective</link>
          <link href="http://predictiveartbot.com">Predictive Art Bot</link>
          <link href="https://thepiratecinema.com">The Pirate Cinema</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/595/original/pab_v4_web.jpg?1539643475">Predictive Art Bot | Online artwork view</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/596/original/pab_02_1920.jpg?1539643475">Predictive Art Bot | Installation view</attachment>
        </attachments>
      </event>
      <event id="10036" guid="1cff41a8-455e-42a6-ab08-d6cb166e7d3b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10036.html</url>
        <logo>/system/events/logos/000/010/036/large/photo_2017-12-25_16-24-33.jpg?1545927390</logo>
        <date>2018-12-28T23:50:00+01:00</date>
        <start>23:50</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-10036-mondnacht</slug>
        <title>Mondnacht</title>
        <subtitle>Lesung</subtitle>
        <track>Art &amp; Culture</track>
        <type>performance</type>
        <language>de</language>
        <abstract>"Mondnacht" von Stanislav Lem. Das berühmte SF Rundfunk-Hörspiel als Lesung mit analogen und digitalen Mitteln. </abstract>
        <description>Drei SchauspielerInnen lassen die letzte Mondnacht einer Raumfahrtbesatzung aufleben. Der Mond sieht still zu, wie sich in der beengten Atmosphäre der Raumstation ein verheerendes Spiel des Misstrauens entfaltet. &#13;
Mit analogen und digitalen Soundeffekten werden die Zuhörer in die Hemisphere entführt. Ein besonderes Ereignis mit dem genialen Text des Meisters der SF Literatur. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8771">Jule Torhorst</person>
          <person id="8784">Tammo Messow</person>
          <person id="8786">Ted Siegert</person>
        </persons>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Lecture room 11"/>
    <room name="Seminar room 14-15"/>
    <room name="Seminar room 13"/>
    <room name="Lecture room M1"/>
    <room name="Lecture room M2"/>
    <room name="Lecture room M3"/>
    <room name="Kidspace"/>
    <room name="CCL Saal 3"/>
    <room name="Chaos West Bühne">
      <event id="157" guid="c557a9ec-5f07-50fd-997f-f6cc568d66c9">
        <logo/>
        <date>2018-12-28T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>02:00</duration>
        <room>Chaos West Bühne</room>
        <slug>X8P8VN</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/X8P8VN</url>
        <title>Tech-House Set ft. VJ Moritz Hilscher</title>
        <subtitle/>
        <track/>
        <type>Klangteppich</type>
        <language>de</language>
        <abstract>Ein DJ Set, gemixed von avocadoom, mit viel Tech-House, mit bekannteren und unbekannteren Tracks, relativ ausgewogen und vielseitig. „Es ist Zeit, den Klangteppich mit 4 on the floor mal ein bisschen auszuklopfen.“.&#13;
+ VJ Moritz Hilscher</abstract>
        <description>Hey, ich bin Thilo (avocadoom) vom CCC-Darmstadt und neben dem ganzen gehacke lege ich ab und zu hobbymäßig House auf. Ich würde dieses Jahr gerne in die Welt des Klangteppichs eintauchen und euch ein bisschen House auf die Ohren geben.&#13;
&#13;
Das Set soll relativ ausgeglichen werden, nicht zu aufgeregt, nicht zu ruhig. Um das ein bisschen zu konkretisieren, hier ein paar Beispiele:&#13;
&#13;
- "La Luna" - Jude &amp; Frank&#13;
- "Crowd Control" - FISHER&#13;
- "The Jam" - Guz, Simun</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="70">
            <name>avocadoom</name>
            <biography>Student, Member@CCCDA, Schlagzeuger, Hobby-DJ</biography>
          </person>
          <person id="58">
            <name>Moritz Hilscher</name>
            <biography>Lorem Ipsum.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="141" guid="1ad87e0f-30be-52be-b939-5e7c0050e59a">
        <logo/>
        <date>2018-12-28T02:00:00+01:00</date>
        <start>02:00</start>
        <duration>02:00</duration>
        <room>Chaos West Bühne</room>
        <slug>BCXFBN</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/BCXFBN</url>
        <title>DJ robelix</title>
        <subtitle/>
        <track/>
        <type>Klangteppich</type>
        <language>de</language>
        <abstract>»Ach, wenn ich alleine rumfahre, höre ich meistens Industrial«, sagt das Auto.&#13;
(aus Qualityland, Marc Uwe Kling)&#13;
&#13;
DJ-set - nicht nur für selbstfahrende Autos.&#13;
Von melodischem Futurepop, Darkwave, Synthwave über stampfenden Industrial Dance, EBM bis krachendem Rhythm'n'Noise, IDM.</abstract>
        <description>»Ach, wenn ich alleine rumfahre, höre ich meistens Industrial«, sagt das Auto.&#13;
(aus Qualityland, Marc Uwe Kling)&#13;
&#13;
DJ-set - nicht nur für selbstfahrende Autos.&#13;
Von melodischem Futurepop, Darkwave, Synthwave über stampfenden Industrial Dance, EBM bis krachendem Rhythm'n'Noise, IDM, gespickt mit etwas Chiptunes.</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="53">
            <name>robelix</name>
            <biography>Hacker, Linuxer, Admin, DJ, Vampir aus Innsbruck&#13;
https://www.robelix.com/</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="148" guid="1cc2086d-bfd7-53fd-8ae2-25efc204bcdf">
        <logo/>
        <date>2018-12-28T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>UZXL7T</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/UZXL7T</url>
        <title>Wie aus einer Wette ein Kiosk System für den Raspi wurde</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>de</language>
        <abstract>Evaluierung  welches Betriebssystem am wenigsten Ressourcen verbraucht  und welcher Browser am Besten geeignet ist. Installation und Konfiguration des OS auf dem RASPI sowie Konfiguration des Kiosk Modus im Browser.</abstract>
        <description>Der eingebaute Browser unserer Fernseher in der IT-Abteilung hatte Probleme, Nagios /Check MK richtig darzustellen.&#13;
Mein Chef wollte einen Tiny PC Mit Windows 10  (Lenovo M920 ca. 1.000,--€)) einsetzten ,&#13;
Ich wollte Geld sparen und habe den RASPI vorschlagen, daraus wurde eine Wette !&#13;
Das hauptsächliche Problem war eine Distri zu finden, die auch auf dem Raspberry PI eine brauchbare Performance erzielt . Es musste aber auch sichergestellt werden, das wir in unserem Windows Umfeld einen Linux PC auch administrieren können (VNC, SSH)</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="62">
            <name>B@lu</name>
            <biography>Fachinformatiker für Systemintegration &#13;
Seit mehr als 40 Jahren setze ich mich intensiv mit den Entwicklungen der IT auseinander.&#13;
2021 - 2004  während des Studiums, Arbeit als First Level Hotliner bei einer Software Firma im Siegerland&#13;
Seit 2016 Arbeit als Second und Third Level, Verantwortlicher bei einem mittelständischen Unternehmen am Niederrhein mit insgesamt  6 Werken auch im europäischen Ausland</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="140" guid="80664626-4764-53b5-8ca3-17014e213f1c">
        <logo/>
        <date>2018-12-28T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>TMPXSJ</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/TMPXSJ</url>
        <title>Exploiting PS4 Video Apps</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Video Apps auf der PS4 sind etwas Herrliches. In diesem Talk zeige ich wie man sie Ausnutzen kann um eigenen unsignierten Code auszuführen (unabhängig von der installierten Firmwareversion). Schritt für Schritt zeige ich dabei vor was für Probleme ich am Anfang meines Einstieges in die PS4 Szene stand und wie ich diese, um ans Ziel zu gelangen, gelöst habe.</abstract>
        <description>Vor knapp drei Jahren hat meine Frau mir eine PS4 zum Geburtstag geschenkt. Sie konnte ja nicht ahnen das ich mit der Konsole alles tun würde, nur nicht zocken. In diesem Talk wird es um das Projekt gehen mit dem ich Fuß in der PS4 Untergrundszene gefasst habe. Schritt für Schritt werden wir sehen was nötig war um auf einem fremden/unbekannten System unsignierten Code ausführen zu können. Ich werde den Exploit und seine Schritte so detailliert wie möglich erklären und somit zeigen das Software-Exploits keine Magie, sondern eine Folge logischer Abläufe sind.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="55">
            <name>m0rph3us1987</name>
            <biography>Reverse engineering fetischist mit einer Vorliebe für Spielekonsolen.&#13;
&#13;
Twitter: @m0rph3us1987</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="150" guid="41e36295-68d2-5c2b-add5-d6b6b58df605">
        <logo/>
        <date>2018-12-28T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>WY9DSX</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/WY9DSX</url>
        <title>Neusprech Crashkurs</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Der Vortrag gibt einen Einblick in das Thema Neusprech. In drei Teilen wird eine Definition im Historischen Kontext erarbeitet, anhand von konkreten Beispielen Neusprech unterschiedlicher Absender betrachtet und schließlich wird die Wirkungsweise von Neusprech anhand von Framing aufgezeigt. &#13;
Teile das Vortrags basieren auf Arbeiten und Talks von Martin Haase.</abstract>
        <description>In der öffentlichen Diskussion wird oft die Verwendung von Neusprech angesprochen, doch was ist Neusprech genau? Im „Neusprech Crashkurs“ möchte ich anhand umfangreicher Beispiele aufzeigen, was Neusprech für Orwell war, was unter heutigem Neusprech zu verstehen ist und welche Strategien dabei eingesetzt werden. Dabei möchte ich mich nicht nur auf politischen Neusprech beschränken, sondern auch Aspekte wie die Public Relation und soziokulturelle Einflüsse beleuchten. Zuletzt möchte ich aufzeigen, was kontinuierlicher Neusprech in unseren Köpfen macht. Dabei möchte ich nicht nur auf Definition und trockene Theorie beschränken, sondern auch die emotionalen Wirkungen aufzeigen, die durch kontinuierliche Wiederholung auch unsere Gedanken verändern kann. &#13;
&#13;
Aktuelle Folien des Vortrags:&#13;
http://www.NerdGirl.de/Download/Neusprech.zip (17,3 MB | .odp-Format)</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7">
            <name>MissInformation</name>
            <biography>Warpzone hackerspace Münster</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="154" guid="83645964-46e8-5f9e-bcbf-14544af3145a">
        <logo/>
        <date>2018-12-28T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>CHEGRS</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/CHEGRS</url>
        <title>Frauen* + NIT Gruppen im Umfeld des CCC: Wo, warum und was sind unsere Projekte</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Das Panel besteht aus Vertreter\*innen der F(NIT)-Gruppen aus mehreren Städten sowie dem Mz\* Baltazar’s Lab (Wien) und den Haecksen. Angedacht ist es, den Bogen von Feminismus im Generellen zur Planung und Umsetzung eines eigenen Spaces oder einer Gruppe zu schlagen. Dabei sollen Probleme, positive Erlebnisse, Strategien und Tipps für eine Neugründung gesammelt werden.</abstract>
        <description>Geplanter Verlauf:&#13;
&#13;
- Welche Probleme in unserer Gesellschaft aus feministischer Sicht seht ihr?&#13;
&#13;
- Was hat euch geholfen, euch zu gründen?&#13;
&#13;
- Welche Probleme gab es, im Space, generell, warum habt ihr euch keinem Space angeschlossen?&#13;
&#13;
- Wie seit ihr gegen diese angegangen, konnten diese gelöst werden?&#13;
&#13;
- Welche Unterstützung bräuchtet ihr, um noch offene Probleme anzugehen in eurem Space?&#13;
&#13;
- Welche Unterstützung bräuchte Mensch, um offene Probleme allgemein anzugehen?&#13;
&#13;
- Gibt es Dinge, Situationen, die euch positiv überrascht haben?&#13;
&#13;
- Was würdet ihr anders, genau so wieder machen um eure Gruppe entstehen zu lassen?&#13;
&#13;
- Welche Tipps habt ihr für Menschen, die eine lokale Gruppe in dieser oder ähnlicher Form gründen möchten?</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="66">
            <name>Haecksen</name>
            <biography>haecksen.org</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="147" guid="bf490104-3595-5d88-a4b1-f39899e768f7">
        <logo/>
        <date>2018-12-28T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>ANCPJM</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/ANCPJM</url>
        <title>Stack Buffer Overflow Exploits - Wie ein "harmloses" Dokument einen Rechner infizieren kann</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Dieser Vortrag ist der Versuch, nicht-Fachleuten anhand eines Stack Buffer Overflows anschaulich zu erklären und zu demonstrieren, warum und wie ein vermeintlich harmloses Dokument wie bspw. ein PDF einen Rechner mit einem Virus oder Wurm infizieren kann.</abstract>
        <description>Hast Du dich schon mal gefragt, wie es eigentlich möglich ist, dass ein PDF, ein Office Dokument oder eine Email einen Rechner lahm legt? In diesem Vortrag gehen wir dieser Frage auf den Grund.&#13;
Hierbei wird versucht, unwichtige Details weg zu lassen, nur die nötigsten Fachwörter zu verwenden und diese auch zu erklären. An einigen technischen Details kommen wir leider nicht vorbei, diese werden aber vereinfacht dargestellt, um möglichst viele erreichen und mitnehmen zu können. Als Beispiel dient ein klassischer Stack Buffer Overflow wie im berühmten Artikel "Smashing the Stack for Fun and Profit" beschrieben.&#13;
Wenn die Demo-Götter gut gelaunt sind, "infiziert" der Vortragende am Ende live seinen eigenen Rechner mit dem vorgestellten Verfahren.&#13;
&#13;
Zielgruppe: Alle außer ITSec ExpertInnen und anderen Menschen, die bereits wissen, wie ein Buffer Overflow funktioniert. :-)  &#13;
Quellcode von Folien und Demo: https://gitlab.com/chaos-siegen/oektion/vortrag/buffer_overflow</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="63">
            <name>haggl</name>
            <biography>* Diplom-Informatiker und Meister der Wissenschaft&#13;
* Anhänger des Hackspace und Chaostreffs Siegen&#13;
* Organisator und Betreuer von CmS in Siegen&#13;
* Lehrkraft für analoge und digitale Selbstverteidigung</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="103" guid="a8605e7e-438f-5fb2-9b16-a054469fba8e">
        <logo/>
        <date>2018-12-28T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>B9JQG9</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/B9JQG9</url>
        <title>Der Strom kommt aus der Steckdose, oder?</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Dieser Talk gibt einen Überblick darüber, wie das deutsche Stromnetz aufgebaut ist und wo die Reise hingeht. Wo stehen die großen Kraftwerke? Was passiert, wenn diese durch dezentrale Erneuerbare Energiequellen ersetzt werden und führt die Energiewende wirklich zu einer dezentraleren Energieversorgung?</abstract>
        <description>Wie ist das Stromnetz in Deutschland aufgebaut? Warum verwendet man Hochspannung? Wieso bauen Netzbetreiber lieber Freileitungen, als ein Kabel in den Boden zu legen? Die Energiewende verändert derzeit das elektrische Netz ungemein. Erneuerbare Energien übernehmen immer mehr die Aufgaben von Großkraftwerken und bringen dadurch völlig neue Herausforderungen mit sich. Plötzlich gibt es zu einigen Zeiten Überkapazitäten, die nicht nur zu absurden Effekten an der Strombörse in Leipzig führen, sondern auch gefährlich für die Netzstabilität werden können. Dann gibt es wiederum Tage, an denen die Erneuerbaren Energien fast nichts zum Strommix beitragen und der Großteil der elektrischen Energie aus Kohle-, Gas- und (noch) Kernkraftwerken kommt. Wir gehen den Fragen nach, ob die neuen dezentralen Energiequellen wirklich so dezentral sind, wie es heiß, ob neue Leitungen wirklich nur wegen der Energiewende gebaut werden oder nicht doch auch aus Profitgründen und warum Kabel oft nicht die bessere Alternative zu Freileitungen sind. Natürlich kommen am Anfang auch nicht die Grundlagen zu kurz.&#13;
All das versucht dieser Vortrag verständlich zu erklären. Vorwissen wird nicht benötigt!</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5">
            <name>bodems</name>
            <biography>Bodems ist Freifunka, Infrastructuralist und hat mal bei so einem Netzbetreiber gearbeitet. Heute sorgt er dafür, dass Elektrofahrzeuge sich mit dem Netz vertragen und therapiert manchmal Katzen.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="125" guid="f42631ca-d3ec-5baf-8642-85c0b1cadc89">
        <logo/>
        <date>2018-12-28T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>NZ38DR</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/NZ38DR</url>
        <title>Track me, if you … oh.</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Sammeln und Verkauf von Bewegungsdaten abseits von Mobilfunk und Smartphone.&#13;
Der Mobilfunkanbieter weiß, wo Du Dich bewegst - no news here. Aber wie steht es mit den Dutzenden anderen Firmen, Marketing Agenturen, Kaufhäusern oder Netzwekausrüstern, die Deine Bewegungsdaten selbst ohne Smartphone-App erfassen und das, ohne dass Du es wissen kannst?</abstract>
        <description>Feature Phones, Smartphones, Laptops, Smartwatches, Bluetooth Kopfhöhrer - sie alle haben eines gemeinsam: sie können Funktechnologien wie WLAN oder Bluetooth. In den letzten Jahren hat sich eine ganze Marktsparte an Firmen entwickelt, deren Geschäftsmodell es ist, die Metadaten dieser Technologien zu erfassen, zu korrelieren und zu verwerten. Dabei ist es unerheblich, ob Du z.B. das öffentliche WLAN dieser Firmen nutzt oder nicht. Die Präsenz Deiner Geräte reicht aus, um sie (wieder)zuerkennen. Und eine automatische Macadressen-Randomisierung hilft nur begrenzt.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="34">
            <name>Clemens Hopfer</name>
            <biography>Elektroniker mit Kommandozeilen-Hintergrund. Busybox alchemist, embedded firmware wrangler. OE1RFC.&#13;
Clemens arbeitet seit über 10 Jahren mit embedded linux systems beschäftigt sich seit einigen Jahren stärker mit dem Thema Datenschutz.</biography>
          </person>
          <person id="37">
            <name>jinxx</name>
            <biography>Autorin, Podcasterin, Dinge mit Datenschutz</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="153" guid="b873392d-f0e7-50ee-a918-770f104efeae">
        <logo/>
        <date>2018-12-28T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>PV98T9</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/PV98T9</url>
        <title>Wertschätzend kommunizieren - durch vier Schritte "in Kontakt kommen"</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>[Rosenberg](https://de.wikipedia.org/wiki/Marshall_B._Rosenberg) hat in der [gewaltfreien Kommunikation (GFK)](https://de.wikipedia.org/wiki/Gewaltfreie_Kommunikation) vier konkrete Schritte formuliert, die jede/n besser kommunizieren lassen sollen. Im Slot werden diese vorgestellt und durch praktische Übungen begleitet.&#13;
Mehr als eine kurze Einführung in die GFK kann der Slot in der knappen Zeit nicht bieten.&#13;
&#13;
Aber Achtung: It's simple, but not easy! :-)</abstract>
        <description>Die GFK ist eine "Erfindung" des amerikanischen Psychologen [M. B. Rosenberg](https://de.wikipedia.org/wiki/Marshall_B._Rosenberg). Er hat verschiedene Ansätze und Ideen zusammengetragen und in ein praktisch anwendbare Handlungsempfehlung gegossen. Seine Ansätze sind nicht neu oder revolutionär, sie betonen nur gewisse Dinge und legen einen Schwerpunkt auf Empathie, Bedürfnisse und Gefühle.&#13;
&#13;
Rosenberg hat die GFK Mitte der 60er Jahre entwickelt. Vor der Jahrtausendwende hat GFK in Deutschland weite Verbreitung gefunden. Mittlerweile gibt es in vielen Regionen Deutschlands lokale Gruppen, die sich der Verbreitung und der praktischen Ausübung der GFK verschrieben haben.&#13;
&#13;
Im Slot werden wir die vier Schritte der GFK kennenlernen und (in kleineren Gruppen) praktisch üben bzw. erfahren. Besondere Voraussetzungen: keine: Offenheit und Neugierde auf Neues und die Auseinandersetzung mit den eigenen Gefühlen sind hilfreich. ;-)</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="67">
            <name>Ludger</name>
            <biography>Ich arbeite in der IT-Branche, liebe Podcasts und habe vor einigen Jahren Basis-Kurse in gewaltfreier Kommunikation besucht. Durch eigenes Erleben weiß ich (für mich), dass GFK ein sinnvoller Weg ist "besser" zu kommunizieren.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="122" guid="600ea8de-65d9-540d-abb1-a4f956e6143f">
        <logo/>
        <date>2018-12-28T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>33CNRG</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/33CNRG</url>
        <title>Network monitoring via SSH und ELK</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>de</language>
        <abstract>Wenn SNMP nicht will, wie kann man Netzwerk Hardware mit SSH überwachen. Welche Tools gibt es, wie kann man diese Tools verbinden und was für Informationen erhält man (plus welche Informationen wirft man besser direkt weg)</abstract>
        <description>Wenn die Netzwerkhardware bestimmte Dinge nicht über SNMP ausgeben will, aber man Daten via SSH erhalten kann zeigt dieser Vortrag wie man die Daten am besten nutzen kann. Es wird zusätzlich eine kurze Übersicht über python paramiko, splunk/ELK Stacks und was im Network Monitoring möglich ist geben, wenn SNMP keine Option ist. Dieser Vortrag ist auch für Personen interessant, die grundlegende Erfahrung sammeln wollen, wie man Python verwenden kann um Netzwerk Hardware zu verwalten.&#13;
Die in den Beispielen verwendeten Quelltexte sind auf Github verfügbar.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="32">
            <name>Heiko Borchers</name>
            <biography>Ehemaliger Azubi an der Heinrich-Heine Universität Düsseldorf. Inzwischen mache ich Dinge mit Wolken</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="160" guid="7ebee226-66bc-558f-b76f-435a8ce91543">
        <logo/>
        <date>2018-12-28T21:30:00+01:00</date>
        <start>21:30</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>K8ABSC</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/K8ABSC</url>
        <title>Die Geschichte vom Biegeradius</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>de</language>
        <abstract>Was passiert mit einer Faser die 10x um einen Bleistift gewickelt wird?&#13;
Was hat es mit dieser Dämpfung auf sich, und warum macht sie mein&#13;
Internet langsam?&#13;
Was ist der unterschied zwischen 1310nm &amp; 1550nm und warum gibt es beides?&#13;
Diese und andere Fragen beantworten wir auf der Bühne.</abstract>
        <description>Was passiert mit einer Faser die 10x um einen Bleistift gewickelt wird?&#13;
Was hat es mit dieser Dämpfung auf sich, und warum macht sie mein&#13;
Internet langsam?&#13;
Was ist der unterschied zwischen 1310nm &amp; 1550nm und warum gibt es beides?&#13;
Diese und andere Fragen beantworten wir auf der Bühne.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="72">
            <name>Thies Mueller (td00)</name>
            <biography>.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="104" guid="0989e077-2c8d-53b4-bc3a-f8323ad38de1">
        <logo/>
        <date>2018-12-28T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>02:00</duration>
        <room>Chaos West Bühne</room>
        <slug>9VD3XJ</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/9VD3XJ</url>
        <title>Chaos-Familien-Duell</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Die chaotische Variante des Familien-Duells, gleiches Spielprinzip nur Chaotischer.&#13;
Gespielt wird in Teams, welche sich vorzugsweise aus Hackerspaces und ähnlichen Gruppierungen bilden. Am Ende ziehen zwei Teams ins Finale ein und haben die Chance auf "tolle Preise".</abstract>
        <description>Dieses Spiel soll sich stark an der Fernseh-Show "Familien-Duell" orientieren, nur mit anderen Fragen.&#13;
Vor dem Spiel werde ich mich darum kümmern, dass sich Teams aus einzelnen Hackerspaces und anderen Hacker-Familien bilden die dann antreten können. Zudem werden die Antworten auf die Fragen die das Spiel voraussetzt aus Chaos-West gesammelt.&#13;
&#13;
Es wird zwei Spiele mit jeweils zwei Teams geben. Aus jedem dieser Spiele wird ein Team siegreich hervorgehen und dieses wird dann im Finale gegen das andere antreten. Das Team, dass im Finale gewinnt wird einige Preise erhalten, was das sein wird steht natürlich noch nicht fest. &#13;
&#13;
Dieses Spiel soll zum einen für ein wenig Entspannung nach Talks und Arbeit auf dem Congress dienen, zum anderen soll durch ein solches Spiel die Kommunikation zwischen einzelnen Hacksen, Hackern und Hackspaces fördern.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8">
            <name>olel</name>
            <biography>Hackt in Münster, alles ist mit seinem Namen beschriftet.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="ChaosZone">
      <event id="719" guid="d1903628-4268-5647-9e46-6515297f53e7">
        <logo/>
        <date>2018-12-28T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>QX9NBX</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/QX9NBX</url>
        <title>Datenguide: Hacking the statistics office!</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>With our project [Datenguide](https://datengui.de), we work on making official statistics data more accessible to normal people. In this session we'll explain why and how we do it.</abstract>
        <description>Official statistics are statistics published by government agencies and other public bodies, usually about economic, environmental, and societal topics. They are commonly used by policy makers and public administrators but are also an important tool for journalists and civil society initiatives. Official statistics can be used for political reporting, for debunking misinformation and "fake news", and for lobbying for social change.&#13;
&#13;
The good news is that official statistics are open data, so at least in theory anyone can download and use them for whatever they like. The bad news is that official statistics are usually made and published by bureaucrats for other bureaucrats. German official statistics are hidden in ancient data portal software and are notorious for being hard to use and to understand. &#13;
&#13;
[Datenguide](https://datengui.de) is a civic tech initiative that aims to make German official statistics accessible to everyone. We work on [Python and JavaScript tools](https://github.com/datenguide/datenguide) for freeing official statistics data and organize events to help people use them. In this talk, we'll give an overview of the technology we are building, explain the problems we are facing, and talk about ways to contribute to the project.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="24">
            <name>Simon Jockers</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="710" guid="45c95b37-47c3-5a75-b6ef-85d6356e2063">
        <logo/>
        <date>2018-12-28T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>7JWW8Q</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/7JWW8Q</url>
        <title>WikiTech</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>How does Wikimedia serve a hundred thousand Wikipedia pages second?</abstract>
        <description>An overview of the technical side of running Wikipedia &amp; Co, from code review and the server farm to the deployment process and scaling storage infrastructure.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="15">
            <name>brightbyte</name>
            <biography>Been here. Done that. Got all the t-shirts.</biography>
          </person>
          <person id="16">
            <name>áč</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="702" guid="64da27c8-9346-59c0-94a5-844d47514384">
        <logo/>
        <date>2018-12-28T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>PHHS7L</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/PHHS7L</url>
        <title>Reversing Industrial Protocols – Real World Use Cases</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>Most PLC protocols are old (older than the entire Ethernet protocol) and by their very nature insecure. I will not be discussing the “known” industrial protocols, such as S7com, TwinCAT and modbusTCP etc … in large detail, but rather the lesser known variants that are used to actually control and/or configure these devices.</abstract>
        <description>Almost every single use case and demonstration during this session are actually zero days and will remain zero days. Since it is a “normal” use of the (unauthenticated protocols) and these devices remain untouched for 20 to 30 years, it is practically impossible to “update the protocols” without closing down a million dollar factory for like a year or so.&#13;
&#13;
We will demonstrate vulnerabilities on Siemens and Beckhoff PLC's. Both patched and non patched (as part of the protocol).</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7">
            <name>Tijl Deneut</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="706" guid="74cf6b9d-8228-5fa7-be7a-a5cda7f69fd8">
        <logo/>
        <date>2018-12-28T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>3L8XYN</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/3L8XYN</url>
        <title>Polizei Gesetz in Sachsen</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>Nein zum neuen saechsichen Polizeigesetz!</abstract>
        <description>Der Referent*innen Entwurf für das neue sächsische Polizeigesetz (Sächsisches Polizeivollzugsdienstgesetz – SächsPVDG) wurde geleaked: download&#13;
&#13;
Einführung&#13;
&#13;
Wenn es nach der sächsischen Polizei geht, sind wir zukünftig alle verdächtig. Wir alle sind eine potenzielle Bedrohung und müssen mit Kameras, Maschinenpistolen und Überwachungstechnik in Schach gehalten werden. Der Staat scheint sich vor uns schützen zu wollen aber wie schützen wir uns eigentlich vor dem Staat?&#13;
&#13;
Im sächsischen Landtag wird derzeit über ein neues Polizeigesetz verhandelt. In Bayern soll ein ähnliches Gesetz verabschiedet werden und stößt auf viel Widerstand.&#13;
Nicht umsonst wird der (bayerische) Entwurf als „schärfstes Polizeigesetz seit 1945“ bezeichnet: Die Polizei soll umfangreiche neue Befugnisse erhalten, selbstständig Grundrechte einschränken und uns alle überwachen und bespitzeln dürfen. Gleichzeitig werden die Einheiten militärisch aufgerüstet und bewaffnet. Hier werden Freiheitsrechte und die Unschuldsvermutung mit Füßen getreten. Es wird verstärkt ein Klima der Angst und des gegenseitigen Misstrauens geschaffen. Der Rechtsstaat verändert sich immer mehr hin zu einem autoritären Polizeistaat. Diese Entwicklung betrifft uns alle!&#13;
&#13;
Angriff auf Grundrechte&#13;
&#13;
Das Gesetz gibt der Polizei Befugnisse bei einer „drohenden Gefahr“ und gegenüber sogenannten Gefährdern. Die sächsische Polizei könnte dann bei bloßen Vermutungen ermitteln, ohne dass überhaupt ein Verbrechen begangen wurde oder ein begründeter Verdacht vorliegt. Das bedeutet: Die Polizei kann quasi gegen jede/n ermitteln. So würde das Polizeigesetz die Unschuldsvermutung außer Kraft setzen.&#13;
Eine Art Hausarrest (Aufenthaltsgebot §21) bis zu drei Monaten kann die Polizei verhängen, auch ohne richterlichen Beschluss. Dies kann sie mittels elektronischer Fußfesseln durchsetzten. Jede Privatsphäre von Betroffenen kann ohne konkreten Vorwurf ausgehebelt werden. Auch Verdächtige und Verurteilte haben Grundrechte. Das unterscheidet einen Rechtsstaat vom Polizeistaat.&#13;
Mit dem neuen Polizeigesetz soll auch der besondere Schutz für Journalist/Innen und Beratungsstellen aufgehoben werden. Die Polizei darf diese dann auch nach eigenem Ermessen abhören und überwachen. Das ist ein drastischer Eingriff in die Pressefreiheit und gefährdet das Vertrauen in diese Institutionen.&#13;
Das neue Polizeigesetz rüttelt an der körperlichen Unversehrtheit, der persönlichen Freiheit, dem Recht auf informationelle Selbstbestimmung, dem Briefgeheimnis, der Unverletztlichkeit der Wohnung. Das Gesetz ist ein Angriff auf unsere Grundrechte und die Grundfesten des Zusammenlebens. Das können wir nicht hinnehmen!&#13;
&#13;
Rassismus und Abschottung&#13;
&#13;
Viele der Maßnahmen, die im Gesetz vorgesehen sind, richten sich offensiv gegen Geflüchtete und Menschen, die nicht in Deutschland geboren sind. Die Einstufung von Refugee-Unterkünften als sogenannte „gefährliche Orte“ stellt alle dort Lebenden unter Generalverdacht und lässt zu sie jederzeit zu kontrollieren. Hausarrest und technische Überwachung erleichtern es, Menschen jederzeit orten und abschieben zu können.&#13;
Stärkere Grenzkontrollen mithilfe von Videoüberwachung und Gesichtserkennung dienen nicht der allgemeinen Sicherheit sondern der Abschottung nach außen.&#13;
Der Staat nimmt sich hier das Recht, Menschen als Kriminelle zu behandeln, sie zu bevormunden und zu schikanieren und das ausschließlich auf Grund ihrer Hautfarbe und Herkunft. Das ist keine Sicherheitspolitik, das ist rassistische Ausgrenzung. Flucht ist kein Verbrechen – Bewegungsfreiheit ist Menschenrecht!&#13;
&#13;
Überwachung um jeden Preis&#13;
&#13;
Das neue Gesetz würde die Videoüberwachung noch mehr ausweiten: Auch die Polizeibehörden, also die Kommunen, sollen künftig mit Kameras überwachen dürfen. Kennzeichen, Ort, Zeit und Fahrtrichtung von Autos soll die Polizei zu bestimmten Anlässen automatisch erfassen dürfen. In grenznahen Gebieten soll sogar automatische Gesichtserkennung ermöglicht werden.&#13;
Der Öffentliche Raum wird so immer mehr überwacht. Der Staat soll überall zuschauen.&#13;
Zusammen mit den vielen digitalen Überwachungsprogrammen führt das zum „gläsernen Menschen“. Wir lassen uns nicht belauschen und überwachen. Wir haben ein Recht auf Privatsphäre!&#13;
&#13;
Grungrechte statt Polizeisonderrechte&#13;
&#13;
Auch Polizeibeamt*innen im Dienst begehen Straftaten. Es kommt jedoch selten zu Prozessen gegen sie und sie werden praktisch nie verurteilt, obwohl Betroffene Anzeige erstatten. . Wir fordern dagegen, auch Polizist*innen zur Verantwortung zu ziehen: Mit einer Kennzeichnungspflicht könnten Beamt*innen nach Straftaten juristisch verfolgt werden. Eine Beschwerdestelle könnte ein Beginn sein, Polizei zu kontrollieren und Missständen entgegenzuwirken – wenn sie unabhängig ist. Das würde die Grundrechte Aller stärken.&#13;
Stattdessen bleiben diese wiederholten Forderungen unbeachtet, Polizist*innen „kontrollieren“ sich gegenseitig und interne Ermittlungen enden weiterhin an einer Mauer des Schweigens. Keine andere Berufs- oder Bevölkerungsgruppe hat solche Sonderrechte.&#13;
&#13;
Paragraphen&#13;
&#13;
Militarisierung, Bewaffnung (§40)&#13;
&#13;
Einige Polizeieinheiten tragen künftig Handgranaten, Maschinengewehre und anderes militärisches Equitment.&#13;
&#13;
Hausarrest &amp; Fußfesseln (§21)&#13;
&#13;
Die Polizei kann dir zukünft verbieten dich an bestimmten Orten aufzuhalten, dir den Kontakt zu bestimmten Menschen untersagen, dich zwingen einen festen Bereich nicht zu verlassen oder dich unter Hausarrest stellen. Dazu darf sie dich auch zwingen eine elektronische Fußfessel zu tragen.&#13;
&#13;
Videoüberwachung, Gesichtserkennung (§ 15, § 58 sowie § 30 PVB)&#13;
&#13;
Zukünftig dar der öffentliche Raum noch stärker videoüberwacht werden. Dazu darf auch Gesichtserkennungstechnik und Kennzeichenerfassung eingesetzt werden. Es kann dadurch genau erfasst werden, wann du dich wo in diesen Bereichen aufgehalten hast. Auch das Ordnungsamt und die Kommunen dürfen diese Technik einsetzen. Sie ist nicht auf konkrete Ermittlungen beschränkt.&#13;
&#13;
Telefon- und Handyüberwachung (§§ 66-70)&#13;
&#13;
Zukünftig dürfen Polizeibeamte nicht nur Telefonate abhören, sondern sie auch unterbrechen. Das gilt auch für ganze Funkmasten. Der Handyempfang kann so etwa in ganzen Gebieten (etwa bei Demos) unterbrochen werden. Außerdem dürfen auch die Bestandsdaten eines Mobiltelefons ausgelesen werden. Also: Name, Adresse, Kontodaten, PIN &amp; PUK Nummer, gespeicherte Passwörter, alles Accountzugänge auf dem Telefon, Mailaccounts und gespeicherte Bilder und Kontakte.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="13">
            <name>Anarchist Black Cross Dresden</name>
            <biography>Anarchist Black Cross Dresden ist ein Kollektiv von Menschen das sich zum Ziel gesetzt hat Ideen über Anarchismus und Solidarität zu verbreiten. Wir organisieren gemeinsame Abende um Briefe an Gefangene zu schreiben, Spendenaktionen und Vortäge, die über verschiedene Orte der Welt informieren. Durch das Verbreiten von Informationen über Gefangene und Repression gegen soziale Bewegungen, hoffen wir Menschen in Dresden Mechanismen von Repression aufzuzeigen, um diese besser bekämpfen zu können und eine Kultur der Solidarität in der Gesellschaft zu entwickeln.&#13;
&#13;
ABC Dresden unterstützt anarchistische und antiauthoritäre Aktivist*innen, deren Ideen anarchistische Grundsätze nicht wiedersprechen. Wir unterstützen auch Menschen, die während ihrere Zeit im Gefängnis Anarchist*innen werden.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="713" guid="8e6aecc6-acbb-52bb-87be-2d06f0ff0640">
        <logo/>
        <date>2018-12-28T20:30:00+01:00</date>
        <start>20:30</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>EQPXLK</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/EQPXLK</url>
        <title>M.A.R.V.I.N.</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>In Chemnitz wurde seit Frühjahr 2016 eine Überwachung der Innenstadt geplant und zum 1. Oktober 2018 umgesetzt. In einem kurzen Abriss werden die Ereignisse zusammengefasst, die eingesetzte Technik vorgestellt und anschließend die parallele Entstehung einer Antwort vorgestellt.</abstract>
        <description>Als es hieß, dass  Chemnitz im großen Stil videoüberwacht werden soll, saßen wir in Chemnitz zusammen und haben über eine Antwort nachgedacht. Langsam entstand die Idee, die Überwacher zu überwachen. In reichlich einem Jahr ist MARVIN entstanden, während parallel immer neue Meldungen und Erklärungen der Stadt zur die Presse geisterten. Am 1. Oktober war es so weit, ein Großteil der Kameras ging online. Pünktlich hatte auch MARVIN seinen Auftritt und rief erste Reaktionen auf den Plan. Eine fernsteuerbare Drohne mit Kamera auf Augenhöhe führ und fährt nun durch die Stadt und soll die Überwachung ins Blickfeld zurückholen. Die Geschichte um die Kameras in der chemnitzer Innenstadt soll aber noch nicht abgeschlossen sein, da Sie nun auch den sächsischen Landtag beschäftigen</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="18">
            <name>DaTa</name>
            <biography>Seit ca. 5 Jahren im Chaostreff Chemnitz aktiv, versuche ich Kunst, Kultur und Technik in einer Stadt mit vielen Potentialen unter einen Hut zu bringen.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="716" guid="0935bbb5-3f02-54f0-ad72-d204de35fbd6">
        <logo/>
        <date>2018-12-28T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>V9T9UR</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/V9T9UR</url>
        <title>livestream - The Ghost in the Machine (Joscha)</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>Livestream from Room Adams</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="20">
            <name>livestream</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Vortrags-Arena">
      <event id="303" guid="ae80ba34-8a38-566f-bf6e-506a525f7a96">
        <logo/>
        <date>2018-12-28T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>00:30</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>ZJ99EX</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/ZJ99EX/</url>
        <title>OIO habour clean up</title>
        <subtitle/>
        <track/>
        <type>OIO Housekeeping</type>
        <language>en</language>
        <abstract>daily habour clean up @ OIO</abstract>
        <description>daily habour clean up @ OIO</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="93">
            <code>HUQ9YA</code>
            <public_name>35c3oio@freifunk.space</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="280" guid="a6bf60a6-dc23-5df1-9eea-eedbe8650994">
        <logo/>
        <date>2018-12-28T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>FCADXP</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/FCADXP/</url>
        <title>OIO Daily Standup day 2</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>Let's start into day 2</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6">
            <code>HFER8G</code>
            <public_name>Andreas Dorfer</public_name>
            <biography>https://forum.freifunk.net/u/adorfer/</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="278" guid="a5cd48d1-6d8c-5be9-a17b-f229db0e3689">
        <logo/>
        <date>2018-12-28T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>V8RTSW</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/V8RTSW/</url>
        <title>Open Prototype Fund</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>en</language>
        <abstract>The Prototype Fund is a funding program for Public Interest Techfirst of its kind in Germany and supports independent software developers, hackers and creative people in implementing their open source ideas from concept to first demo. Since 2016, we (Adriana, Elisa, Fiona, Julia and Katharina) have been working to break down existing structures and narratives in the field of innovation funding and to encourage meaningful digital solutions for society in Software Infrastructure, IT-Security, Data Literacy and Civic Tech. We want to get to know you and your ideas and talk about how we, together with politicians, developers and other initiators from the (active) civil society, can best support, develop and make visible good digital-social innovation practices from the perspective of the community. Which decisions are necessary in the future, what are meaningful political demands? And which are the next big things in Tech? Get to know us, ask us everything, recover from the hustle and bustle of the congress!</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="81">
            <code>BBLK3X</code>
            <public_name>Katharina Meyer</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="292" guid="1e5859eb-8231-57c1-a0b4-083215923cd4">
        <logo/>
        <date>2018-12-28T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>7BRU3D</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/7BRU3D/</url>
        <title>Empowering rural Africa using the freifunk model</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>envisioning a thriving, connected future amidst conflict-struck Nigeria. Creating opportunities for rural women and youth, in a scalable, inclusive way.</abstract>
        <description>###About the presenter&#13;
Paul Henckel from TribeGroup (DK-based) will share his thoughts and plans for an ongoing resilience project with Fantsuam (NG-based) in creating ICT coworking spaces for rural women and youths in Nigeria, using the knowledge from Freifunk communities. &#13;
&#13;
###About TribeGroup&#13;
TribeGroup is a Danish impact investment startup with mission to support or invest in other companies, projects or initiatives that have a potentially high social or environmental impact. It currently directs WorkHive, a flexible, affordable, inclusive and carbon negative coworking space in Copenhagen. The collaboration with Nigerian-based Fantsuam tries to integrate best practices of Freifunk, Fantsuam and WorkHive to create a new coworking space in Kafanchan, Nigeria.&#13;
&#13;
###About Fantsuam&#13;
Our Mission at Fantsuam Foundation (www.fantsuam.org) is to eliminate poverty and disadvantage among rural women and youths in Nigeria through integrated development programs. At our ICT Academy,In 22 years, we have empowered 12,000, and we aim to educate women and youths with relevant digital literacy skills to manage their development priorities, providing opportunities for girls to become developers and deploy ICT solutions for their livelihoods. Our services have become even more imperative as our communities come out of decade long cycles of sectarian violence. We plan to reach 25,000 more by 2020.&#13;
&#13;
Community Network, is a resilient communication platform in which the community owns, manages and maintains its own communication infrastructure provides the opportunities for rural youths to gain the necessary hands-on experience. Fantsuam Foundation hosts the Google Developers Group in Kafanchan, this is another resource that is being deployed to provide ICT skills and knowledge opportunities for our youths.&#13;
&#13;
We are now  engaged in high level policy advocacy for affordable and available internet access for the unconnected in rural Nigeria. Obtaining the TVWS concession for the unconnected in Nigeria will begin to make for an inclusive national telecommunication effort. It is within that context that Fantsuam continues to support the increasing number of youths, particularly females, who now recognise the career opportunities available in ICT. Our ICT Academy provides basic digital literacy training and has expanded to provision of training in computer and network maintenance. In order to optimise the use of resources and make our services more accessible, we have located an office space in the Kafanchan Railway town where we would like to set up an ICT Co-Working space where budding entrepreneurs can have ready access to training and mentoring facilities, office space with assured power and internet access at affordable prices.&#13;
&#13;
Our efforts at tackling poverty through an integrated approach has meant that we also provide social services in public health, menstrual health hygiene, sanitation marketing, peace building, entrepreneurship training supported by microfinance. We currently have 32 full time staff and a large pool of volunteers who are invited to join specific projects and programs, which are usually of short duration. Our work in peace building led us to build six new apartments for victims of recent sectarian crisis, and we continue to explore opportunities to enable our communities to resume their normal lives. Our model of farming cooperatives, called the TIME-AID, empowers individuals and families to engage in commercial farming with the goal of household food security, family health insurance, adequate housing and education for all our children.&#13;
&#13;
Fantsuam Foundation’s integrated approach to develop has enabled it to have an inbuilt resilience to cope with the challenges of rural development, global economic challenges whose effects are usually more devastating at the base of the pyramid, while we continue to develop initiatives that helps the people to assert their humanity and freedom from poverty.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="76">
            <code>EWPH87</code>
            <public_name>Paul Henckel</public_name>
            <biography>Let me cut it short: *I'm basically a care-taker.* &#13;
I care for you, and I care for myself, and I care for our mutual existence on this planet.&#13;
If I should recap my life then this aspect is pretty much the essence of me actually. I grew up with my mum and big sister and times werent always easy, so I learned to care because there was no other option than that to make our life work.&#13;
'Caring for others' became a big part of me, so as I went into adolescence and adulthood I see patterns that I was stressing my self out too much in trying to find new people to 'care for', new relations. We all know where that kind of behavior goes, when 'caring runs rampant' and you try care for people who dont care similarly for you -&gt; stress, depression, anxiety, fear of rejection, etc.&#13;
That was OK too, because that in turn taught me a lot about caring for myself...&#13;
Go read some more on the anthropological and socio-economic aspects of caretaking, it's a very interesting topic if not a form of art/craft in itself.&#13;
&#13;
Giving back to the world&#13;
I'm also a philosopher, software developer, mathematician, statistician, data visualiser, test engineer, consultant, entrepreneur, photographer, inventor, permaculture designer, volunteer, counsellor, , interaction designer, ethnographer, business developer, market analyst, etc. and am truly blessed with many close friends that I can team up with to co-create 'truly good stuff with a focus and a purpose'.&#13;
I'm currently working on WorkHive - the tagline of which is 'Making space for people and plants to be productive'. It's a co-working space for the self-employed, students and 'struggling' (unemployed, seniors, etc) to sit together and work on their own projects, or team up at different workshops and attend seminars. It's a networking platform, enabling people to be more productive on their own things, and to get inspiration from others in the same or different situations and with different perspectives - being able to do short, informal reviews of your own work in a safe space together with an 'unwilling third person' has a huge implication for the success of your work before sending it out to your real audience in the big world.&#13;
(What about the plants? Yeah, I will tell you about it when you have signed up, but as you know I'm into permaculture, sustainable livelihoods, aquaponics and I have quite a few good horticulturist friends and biologists who are helping me do some amazing stuff)&#13;
&#13;
Thank you for your time, create the world you want to live in, today!&#13;
Paul Olutokunbo Kristian Henckel-Ojo</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="310" guid="6d0ea2d9-aa91-5bba-84af-21dd73038d81">
        <logo/>
        <date>2018-12-28T13:30:00+01:00</date>
        <start>13:30</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>SWS3WR</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/SWS3WR/</url>
        <title>Careables: Open Source Hardware in Health+Care [Introduction]</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>Careables</abstract>
        <description>Calling all hackers, designers, makers, carers, and healthcare professionals!&#13;
&#13;
What are challenges you face every day using standard tools for health and wellbeing? Do you have an idea that makes everyday life easier? How could you use your existing hackerspace to foster exchange and collaboration in health and care?&#13;
&#13;
Through Careables, maker and designer collaborate with patients and healthcare professionals to create personalized solutions and open source knowledge that will improve the lives of many patients and professionals.&#13;
&#13;
Accessible, comprehensive and easy to use open source hardware are being documented, collected and shared through the platform Careables.org. This platform is currently being launched and will function as repository for well documented open hardware projects. It offers many different communities a place to connect and exchange knowledge, needs and co-create solutions.&#13;
&#13;
It's easy to think of open hardware that make a difference in people's lives. An example of this is OPEN LIGHTS. This project offers people with wheelchairs an adjustable wheelchair specific light that makes them better visible at night and that can be built with most common DIY technologies.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="96">
            <code>P3GLDY</code>
            <public_name>Sandra GIG</public_name>
            <biography>tl;dr: GIG is the global network of social and technological innovators. #wearegig&#13;
&#13;
Global Innovation Gathering (GIG) is a vibrant, diverse community of innovation hubs, makerspaces, hackerspaces and other grassroot innovation community spaces and initiatives as well as individual innovators, makers, technologists and changemakers. GIG is pursuing a new vision for global cooperation based on equality, openness and sharing. We aim to enable more diversity in the production of technology, and global innovation processes and support open and sustainable solutions developed by grassroot innovators. With strong roots in the global south, we share, collaborate and work together globally. GIG provides a platform for meaningful exchange by fostering knowledge exchange and collaboration between its members.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="231" guid="2ff22102-25a3-5bd9-8e77-ef169442f6a8">
        <logo/>
        <date>2018-12-28T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>00:42</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>WUBRSK</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WUBRSK/</url>
        <title>GSoC 2018 - project presentations</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>Some students will present results of their projects</abstract>
        <description>* zoobab shows "MultipathTCP and Openwrt improvements with eBPF"&#13;
* mwarning talks about the "Meshenger App"</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7">
            <code>USJAK9</code>
            <public_name>Andreas Bräu</public_name>
            <biography>Freifunker since 2006</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="269" guid="eb03cae4-9fb8-5ac6-b3b6-132cd07a7db0">
        <logo/>
        <date>2018-12-28T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>V3XY87</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/V3XY87/</url>
        <title>Project Parker: Klassisches Routing für Freifunk</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Gluon mit BATMAN setzt klassisch auf ein großes Layer 2 Netz, was in den großen Freifunk Communities zu Problemen führt. Mit unseren Bemühungen in "Project Parker" versuchen wir diese Probleme durch den Einsatz von klassischem Routing zu umgehen. In unserem Talk stellen wir unsere Architektur vor und zeigen welchen Stand unsere Umsetzung erreicht hat.</abstract>
        <description>Gluon mit BATMAN setzt klassisch auf ein großes Layer 2 Netz, was in den großen Freifunk Communities zu Problemen führt. Diese Communities begegnen den Problemen i.d.R. mit der Segmentierung des Netzes in Domains. Innerhalb dieser Domains wird allerdings das klassische Netz (BATMAN) eingesetzt.&#13;
&#13;
Mit "Project Parker" versuchen wir diese Probleme durch klassisches Routing in einem hierarchischem Netz zu lösen: Jeder Freifunk-Knoten mit Uplink ist Gateway für sein Netzsegment, macht DHCP und ist DNS-Cache. Das Routing mit BATMAN beschränkt sich nun auf kleine Mesh-Netze innerhalb des gesamten Netzes.&#13;
&#13;
Wir stellen in unserem Talk unsere Architektur vor und zeigen welchen Stand unsere Umsetzung erreicht hat.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="61">
            <code>LWSSPE</code>
            <public_name>Chris Fiege und Jan Lübbe</public_name>
            <biography>Chris Fiege (chrissi^) und Jan Lübbe (shoragan) sind ein Teil der Technik-Abteilung beim Freifunk Braunschweig.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="296" guid="d69cd444-9df3-5e9b-a79f-b70b7b3ec98d">
        <logo/>
        <date>2018-12-28T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>01:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>BBGXPY</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/BBGXPY/</url>
        <title>Wem ist noch zu helfen</title>
        <subtitle/>
        <track/>
        <type>Talk 80min total (etwa 30min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Global NGO Players vs. (linke) Grassroots-Gruppen - wer entscheidet, wem wann wie geholfen wird...und wo verkommt humanitäre Praxis zum politischen Spielfeld</abstract>
        <description>Aus Kritik am humanitären System der UN und seinen beteiligten Groß-NGOs haben sich viele (linke) Grassroots-Gruppen gegründet. Auch diese können natürlich nicht ohne finanzielle Mittel arbeiten, und sind somit auf Spenden, ergo auf Öffentlichkeitsarbeit angewiesen. &#13;
Wie entscheiden die "Großen" wann und wie und wem geholfen wird? Welche Lücken bleiben dabei (zwangsläufig)?&#13;
Und wie werden diese Entscheidungen bei den Grassroots getroffen? Und welche Auswirkungen auf die Wahrnehmung von Krisen hat ihre Öffentlichkeitsarbeit? "Trommeln gehört  zum Handwerk", aber wo läuft linkes humanitäres Engagement Gefahr, in rein politisch motivierten Aktivismus abzudriften? Und wenn das schlimm ist, warum? &#13;
Eine kritische Betrachtungsweise.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="60">
            <code>PFDWBY</code>
            <public_name>Sebastian</public_name>
            <biography>CEO von CADUS e.V.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="267" guid="0519cc1f-4c12-53f0-a83d-5958edcfc148">
        <logo>/media/35c3oio/images/KB9VRZ/who-owns-your-data.png</logo>
        <date>2018-12-28T18:30:00+01:00</date>
        <start>18:30</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>KB9VRZ</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/KB9VRZ/</url>
        <title>Get your data back under control - 200 things you can do with Nextcloud</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>en</language>
        <abstract>We live in a world of data theft and broken clouds and I believe it is time to decentralize, host at home or a local provider we trust. Nextcloud is an option that can take care of many of your file sync'n'share, chat and document editing needs, and I'll show how and why!</abstract>
        <description>The data from many people is floating around on 'clouds', regularly stolen and traded. We need to decentralize, host ourselves or at a large number of small, local providers we can trust! Probably the most used solution for that today is Nextcloud, which through its app ecosystem of almost 200 apps can be extended to do lots of things.&#13;
&#13;
With Nextcloud you can sync and share files, access your calendars and contacts, share holiday pictures with your family or play music. But also manage your passwords, track your phone through GPS, draw, read news, chat and have audio/video calls, read mail, manage tasks and much more.&#13;
&#13;
The community has developed almost 200 apps that do all that and more, and loads of tutorials on how to install Nextcloud on a Nuc, in a VM, on a raspberry Pi and more. If self-hosting isn't realistic for you, we have Simple Signup which sets you up at a Nextcloud hosting provider close to you in a few clicks.&#13;
&#13;
This talk is for people not yet familiar with Nextcloud!</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="59">
            <code>KMKHUZ</code>
            <public_name>Jos Poortvliet</public_name>
            <biography>People person, technology enthusiast and all-things-open evangelist. Doing marketing at Nextcloud, previously Community Manager at ownCloud and SUSE, recovering business consultant with decade long involvement in the KDE community. Enjoys avoiding traffic and public transport on bike through Berlin, but only when the weather is good. Loves cooking for friends and family and playing with the dog.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="214" guid="b0e5ac97-960a-516c-a1ac-5cda9129b0f4">
        <logo/>
        <date>2018-12-28T19:30:00+01:00</date>
        <start>19:30</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>ELUSFV</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/ELUSFV/</url>
        <title>Menschenrechte, Bildung, open infrastructure</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Die 3 Begriffe werden beleutet und Zusammenhänge hergestellt</abstract>
        <description>Heute hat sich eindeutig das Internet durchgesetzt und es stellt sich die Frage, wie gehen wir damit um. Die AkteurInnen im Internet sind Menschen oder von Menschen gemachte Programme. Als Grundlage im Internet sollten die nun schon 70 Jahre alten Menschenrechte gelten. Auch im Bildungsbereich verändert das Internet die bisherigen Strukturen unseres Bildungssystems, mMn sogar weltweit. Menschen begegnen sich auf Augenhöhe. Die open infrastructure hilft dabei Bildung für Menschen zugänglich zu machen und Menschen ein selbstbestimmtes Leben führen zulassen. Die "Hierachien im Kopf" werden von dem realistischen Denken "wir sind alle gerade jetzt auf der Oberfläche von Planet Erde auf Augenhöhe" abgelöst. Dies ist der Prozess, den wir gerade in vielen Bereichen unserer Gesellschaft beobachten.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="16">
            <code>TRQPDR</code>
            <public_name>Peter Babnik (Petergoge)</public_name>
            <biography>Ich komme aus Koblenz und bin "Musik-Peter-goge". Mich interessiert die derzeitige technische Entwicklung und daher mache ich gerne bei 35c3 mit. LG Peter</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="273" guid="ee10b98c-7538-5354-b486-66e363cbb44f">
        <logo>/media/35c3oio/images/W9RHXR/TL-WR841ND-01.png</logo>
        <date>2018-12-28T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>W9RHXR</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/W9RHXR/</url>
        <title>Fight for the bytes! Fun with Four Megabytes Flash</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>The majority of Freifunk mesh routers only have 4mb flash and 32mb memory. The talk wants to start a discussion about possibilities and limits for future support of these devices.</abstract>
        <description>Lot's of mesh communities and even OpenWrt want to drop support for 4mb flash / 32mb memory devices. Where is the size and memory increase coming from? Can we do it in a different way or do we have to accept defeat? &#13;
&#13;
- Forcing OpenWrt to diet: What knobs can we tweak? What gains and tradeoffs can we expect?  &#13;
- A short introduction to ubus over HTTP&#13;
- Stupid ideas and experiments.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="70">
            <code>AFNDA9</code>
            <public_name>mt</public_name>
            <biography>weimarnetz.de</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="312" guid="b4fdd0df-1969-5b9e-9bf1-277eb1411d6b">
        <logo/>
        <date>2018-12-28T22:30:00+01:00</date>
        <start>22:30</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>DAN8AX</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/DAN8AX/</url>
        <title>Wifi4EU - broken by technical specification</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>en</language>
        <abstract>With the Wifi4EU programm the EU is planning to spend 100 million € by 2020 to subsidise a centralized surveillance infrastructure for centers of public life in the EU. The talk will lay out how Wifi4EU is supposed to work both administratively and technically, where there are problems with the later and what is and can be done about it.&#13;
&#13;
Slides: https://zenodo.org/record/2527538#.XCUXplxKjIU</abstract>
        <description>With the Wifi4EU programm [1] the EU is planning to subsidies the installation of free Wi-Fi with 120 million € until 2020. The installations are planned to be "... free of charge, free of advertising and free from commercial re-use of data. ..." [2] and aim "... to equip every European village and every city with free wireless internet access around the main centres of public life. ..." [1]&#13;
&#13;
Unfortunately the technical specifications implemented in the first call on the 7th - 9th of November [3] tell a different story. So far 42 Million € are planned to be spend in a flawed design.&#13;
&#13;
Amongst other problems they include:&#13;
&#13;
* requirements for a centralized authentification infrastructure - like eduroam [4] (FAQ 23),&#13;
* inherent IT security problems - embedded snippets in the captive portals [4] (FAQ 26) and&#13;
* proprietary standards - hotspot 2.0. [4] (FAQ 27)&#13;
&#13;
Following a talk at the wireless community weekend in May this year [5] the talk will include:&#13;
&#13;
* a short introduction to the programm,&#13;
* how it came to be,&#13;
* what happend so far&#13;
* the implications of the programm&#13;
* what can be done to fix things.&#13;
&#13;
Besides contacting the european comission, several members of the european parlament and Klaus Landefeld of the eco [6] we were able to get members of the german Bundestag to get interested in the issue [7]. This led to a "schriftliche Anfrage" towards the Bundesregierung regarding the GDPR compliance of the authentification infrastructure, the situation is currently evolving.&#13;
&#13;
The talk aims to inform about the current state of affairs and hoefully foster a discussion during the congress what can and should be done to prohibit the creation of yet another surveillance infrastructure and what a desirable public Wi-Fi infrastructure should look like.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="22">
            <code>EWR9DF</code>
            <public_name>Gregor Bransky</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="313" guid="8b2ce950-136c-53a5-89ff-7acde44faca2">
        <logo/>
        <date>2018-12-29T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>00:40</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>GYT733</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/GYT733/</url>
        <title>9DoorsOpen - audiivisueller 35min Trip</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>en</language>
        <abstract>10 Jahre Schaffensphase, 20.000.000 Fotodateien, &#13;
9 Doors Open ist ein künstlerisches Langzeitprojekt, eine meditativ psychedelisch, audiovisuelle Reise.</abstract>
        <description>Für Fans von: Ambient, Doom, Dronemusik, visuelle Kunst, psychedelische Trips, Meditation, Bewusstseinserweiterung&#13;
&#13;
Andreas Voland (Musiker) und Steffen Freiling (Fotograf) verschieben in ihrem gemeinsamen Werk die Dimensionen Raum und Zeit und geben so die Möglichkeit, die uns bekannte Realität in vielfälltigsten Formen neu zu entdecken.&#13;
&#13;
Am 2. Februar findet im Friedrichshainer Zukunft am Ostkreuz (Laskerstr. 5, 10245 Berlin die Aufführung statt.&#13;
&#13;
Hier auf dem CCC schon vorab.</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="97">
            <code>U9QGT3</code>
            <public_name>Andreas</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Workshop-Domo">
      <event id="288" guid="c225c6dc-8f35-50e7-b4b1-f83f2022577d">
        <logo/>
        <date>2018-12-28T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>00:45</duration>
        <room>OIO Workshop-Domo</room>
        <slug>RPSCUR</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/RPSCUR/</url>
        <title>Nudeln hacken für Junghacker von 5 Jahren bis ∞ (Session 1)</title>
        <subtitle/>
        <track/>
        <type>Workshop 45min</type>
        <language>de</language>
        <abstract>Spaß am Gerät: Mehrere Teams bauen gleichzeitig mit Nudeln um die Wette.</abstract>
        <description>Was man aus Nudeln alles machen kann ... Junghacker bzw. solche die es werden wollen können alleine oder als Team kommen. Es kann jeder mitmachen, der weiß was eine Nudel ist.&#13;
&#13;
Erwachsene dürfen auch mitmachen - werden aber wahrscheinlich gegen den Nachwuchs verlieren :-D&#13;
&#13;
PS: Erwachsene nur, so lange sie den Junghackern kenen Platz wegnehmen. &#13;
PPS: Man kann auch mit Glutenallergie bedenkenlos teilnehmen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="74">
            <code>73PEWU</code>
            <public_name>Stefan Safari</public_name>
            <biography>Ich bin Nudelfan, dreifacher Vater und freue mich auf den Congress.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="289" guid="ba5c1095-2bc6-5ee7-9493-17fb51091346">
        <logo/>
        <date>2018-12-28T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>00:45</duration>
        <room>OIO Workshop-Domo</room>
        <slug>NXGUVK</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/NXGUVK/</url>
        <title>Nudeln hacken für Junghacker von 5 Jahren bis ∞ (Session 2)</title>
        <subtitle/>
        <track/>
        <type>Workshop 45min</type>
        <language>de</language>
        <abstract>Spaß am Gerät: Mehrere Teams bauen gleichzeitig mit Nudeln um die Wette.</abstract>
        <description>Was man aus Nudeln alles machen kann ... Junghacker bzw. solche die es werden wollen können alleine oder als Team kommen. Es kann jeder mitmachen, der weiß was eine Nudel ist.&#13;
&#13;
Erwachsene dürfen auch mitmachen - werden aber wahrscheinlich gegen den Nachwuchs verlieren :-D&#13;
&#13;
PS: Erwachsene nur, so lange sie den Junghackern kenen Platz wegnehmen. &#13;
PPS: Man kann auch mit Glutenallergie bedenkenlos teilnehmen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="74">
            <code>73PEWU</code>
            <public_name>Stefan Safari</public_name>
            <biography>Ich bin Nudelfan, dreifacher Vater und freue mich auf den Congress.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="295" guid="00b000b4-fd0b-580d-8070-d2e4dd2d03fa">
        <logo>/media/35c3oio/images/QSRLNA/Little_Detritus.jpg</logo>
        <date>2018-12-28T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>01:20</duration>
        <room>OIO Workshop-Domo</room>
        <slug>QSRLNA</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/QSRLNA/</url>
        <title>Wifi4EU - how to fix it?</title>
        <subtitle/>
        <track/>
        <type>Workshop 80min</type>
        <language>en</language>
        <abstract>Wifi4EU is currently broken by technical specifications. Within this workshop session I would like to kick of a discussion what a desireable infrastructure would look like and if it can be realized within the given political boundaries.&#13;
&#13;
The issues with Wifi4EU will be outlined in the following talk:&#13;
https://fahrplan.chaos-west.de/35c3chaoswest/talk/K39NLS/</abstract>
        <description>tba</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="77">
            <code>QZCMD7</code>
            <public_name>Little Detritus</public_name>
            <biography>Freifunka aus Aachen der darüber nachdenkt wie man sowas antiquiertes wie Privatsphäre behalten kann. Diskutiert gerade gerne darüber wieso Wifi4EU - so wie gerade geplant - eine dumme Idee ist [1]. Man sich sonst Gedanken darüber wie Kryptographie im Zeitalter von Quantencomputern aussehen kann [2]. Teilt Albernes und Ernstes auf Twitter unter @LittleDetritus&#13;
&#13;
[1] https://www.youtube.com/watch?v=YbPpK8_X9Qg&#13;
[2] https://video.fsmpi.rwth-aachen.de/cccac/6131</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="307" guid="9ae3ed84-ba3e-5573-87f9-83c5210c1eb8">
        <logo/>
        <date>2018-12-28T18:30:00+01:00</date>
        <start>18:30</start>
        <duration>01:20</duration>
        <room>OIO Workshop-Domo</room>
        <slug>FUL8DG</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/FUL8DG/</url>
        <title>Weimarnetztreffen</title>
        <subtitle/>
        <track/>
        <type>Workshop 80min</type>
        <language>de</language>
        <abstract>Communitytreffen des Weimarnetzes</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="94">
            <code>Z7W7NQ</code>
            <public_name>René Hoffmann</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="315" guid="fe37d6a9-bea6-531b-be70-f2c4d7828a78">
        <logo/>
        <date>2018-12-28T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>01:00</duration>
        <room>OIO Workshop-Domo</room>
        <slug>ZXBCCJ</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/ZXBCCJ/</url>
        <title>SatNOGS meeting (AOS)</title>
        <subtitle/>
        <track/>
        <type>Workshop 45min</type>
        <language>en</language>
        <abstract>...</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="100">
            <code>7VMKDP</code>
            <public_name>bastla</public_name>
            <biography>Sebastian Lange (DL7BST), c3space, SatNOGS, AfuTUB/DK0TU</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="251" guid="072dc1fe-89cc-5387-8405-c7086b0f2687">
        <logo/>
        <date>2018-12-28T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>01:20</duration>
        <room>OIO Workshop-Domo</room>
        <slug>BEWPU3</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/BEWPU3/</url>
        <title>Maritime Technik: How to Schiff</title>
        <subtitle/>
        <track/>
        <type>Workshop 80min</type>
        <language>de</language>
        <abstract>Hier bekommt ihr eine kurze Einführung in die Welt der Nautik und der schwankenden Metallkähne. Was gibt es da für Technik an Bord, wofür wird es gebraucht und wie wird es benutzt. Überblick mit Schwerpunkt auf technischen Details.</abstract>
        <description>Wir fühlen uns auf Schiffen zu Hause. Wir nutzen sie als vielfältiges Mittel zum Retten und Versorgen von Menschen in Not, um Menschenrechtsverletzungen auf See zu dokumentieren oder um gegen das Aussterben von Tierarten zu kämpfen. &#13;
Doch was hält eigentlich so ein Schiff zusammen? Wie steuert mensch es? Warum klingt unsere Kommunikation immer noch nach 19. Jahrhundert? Was ist eigentlich ein Ruderlagenanzeiger und wofür braucht man Stevenrohr und Stopfbuchse?&#13;
Technisch-nerdige Antworten rund ums Schiff und eure Fragen.</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="46">
            <code>7W3VBM</code>
            <public_name>Nico</public_name>
            <biography>Aktivist, Segler und Schiffe.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="WikiPakaWG Esszimmer">
      <event id="501" guid="c1a547d9-2f53-5444-8e3c-6b6ebb26578d">
        <logo/>
        <date>2018-12-28T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>F9NUJT</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/F9NUJT/</url>
        <title>Generative Art with Paper.js</title>
        <subtitle/>
        <track/>
        <type>Workshop mit Standard-Bestuhlung</type>
        <language>de</language>
        <abstract>The heck is Generative Art and what to do with it?&#13;
The workshop will give a short introduction into paper.js and how it can be used to generate art. Please bring your own laptop so we can code together a bit.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="2">
            <code>RBEKZW</code>
            <public_name>bleeptrack</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="516" guid="ded36d57-579c-524e-9bf8-a7477670608f">
        <logo/>
        <date>2018-12-28T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>WFA9YB</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/WFA9YB/</url>
        <title>FragDenStaat User-Treffen</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract>Alle Leute, die FragDenStaat und Informationsfreiheitsgesetze bereits nutzen oder nutzen wollen, sind herzlich eingeladen. Wir sprechen über Neuerungen und Pläner für FragDenStaat.de und nehmen Kritik und Anregungen auf.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="17">
            <code>K38FMT</code>
            <public_name>Arne</public_name>
            <biography/>
          </person>
          <person id="41">
            <code>7U9YY3</code>
            <public_name>Stefan</public_name>
            <biography/>
          </person>
          <person id="40">
            <code>LJNMJA</code>
            <public_name>Filter</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="517" guid="fdf06e81-63a7-5a92-ac5a-053440cdf221">
        <logo/>
        <date>2018-12-28T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>00:30</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>883YLC</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/883YLC/</url>
        <title>Einführung in Kubernetes Deployments für Codefor Labs</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>de</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="18">
            <code>8TKR3G</code>
            <public_name>Tobias</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="534" guid="b87a648f-d84d-5669-b472-3df1a7f8035d">
        <logo/>
        <date>2018-12-28T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>PXFGZ8</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/PXFGZ8/</url>
        <title>Hebocon-Finale</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5">
            <code>BWRH7E</code>
            <public_name>Daniel</public_name>
            <biography/>
          </person>
          <person id="11">
            <code>B9E7PX</code>
            <public_name>Ilona</public_name>
            <biography/>
          </person>
          <person id="10">
            <code>VVLMZ9</code>
            <public_name>Robert</public_name>
            <biography/>
          </person>
          <person id="29">
            <code>MU8SYW</code>
            <public_name>Philip</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="518" guid="a9e3d617-edc2-545f-9271-30f820b1a559">
        <logo/>
        <date>2018-12-28T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>02:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>VX8N7K</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/VX8N7K/</url>
        <title>Legal Documents Hack</title>
        <subtitle/>
        <track/>
        <type>Workshop mit Gruppentischen</type>
        <language>de</language>
        <abstract>Mit OffeneGesetze.de haben wir sämtliche Bundesgesetzblätter seit 1949 frei veröffentlicht. Jetzt sollten wir die Dokumente auch angemessen nutzen. Hier besprechen wir, was man mit den Daten machen kann und was wir als nächstes befreien sollten.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="17">
            <code>K38FMT</code>
            <public_name>Arne</public_name>
            <biography/>
          </person>
          <person id="40">
            <code>LJNMJA</code>
            <public_name>Filter</public_name>
            <biography/>
          </person>
          <person id="41">
            <code>7U9YY3</code>
            <public_name>Stefan</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="521" guid="51af7600-c483-505d-be4b-656a9fd72eac">
        <logo/>
        <date>2018-12-28T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>02:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>V7FCMD</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/V7FCMD/</url>
        <title>Community Treffen Jugend hackt</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="5">
            <code>BWRH7E</code>
            <public_name>Daniel</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="WikiPakaWG Küche">
      <event id="504" guid="b4fda763-216c-5c9d-b850-f049efa09e9b">
        <logo/>
        <date>2018-12-28T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:30</duration>
        <room>WikiPakaWG Küche</room>
        <slug>R9SZCT</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/R9SZCT/</url>
        <title>Orgameeting Tag 2</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="4">
            <code>33UT8A</code>
            <public_name>WikiPaka Orga</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="539" guid="a9053903-cfac-5d45-87d0-6711510c68e4">
        <logo/>
        <date>2018-12-28T15:00:00+01:00</date>
        <start>15:00</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Küche</room>
        <slug>LSDUED</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/LSDUED/</url>
        <title>Ride Sharing, OpenData, Schnittstellen, Mitfahr-Börsen, Fahrgemeinschaften, Trampen und mehr</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract>We meet to talk about ride sharing. How to reduce the ecologic impact of traffic by more people riding in cars together. Some activists of the ride sharing ecosystem will be there and we would like to meet more people to grow. Topics will be tools, data and especiall ahot to imporove ride shraing to and from the Congress.&#13;
&#13;
Inhalte: Ride Sharing, Mitfahren, Fahrgemeinschaften, Trampen&#13;
&#13;
Note there is 35c3.fahrgemeinschaft.de for finding ride to and from the Congress.&#13;
&#13;
The meeting is not exclusively about fahrgemeinschaft.de but open to any other projects, ideas, etc.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="38">
            <code>8GKMBN</code>
            <public_name>Ernesto</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="519" guid="928f8340-4213-5db7-bb4c-05f2187bde49">
        <logo/>
        <date>2018-12-28T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Küche</room>
        <slug>EC9ZRM</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/EC9ZRM/</url>
        <title>Wikibase Quick starter guide</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="19">
            <code>GD7CGL</code>
            <public_name>Matthias</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="520" guid="14be7095-56d4-56b8-ad6e-ef4e08238936">
        <logo/>
        <date>2018-12-28T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Küche</room>
        <slug>JCUCQA</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/JCUCQA/</url>
        <title>Wikidata+Wikibase meetup</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>en</language>
        <abstract>Meetup for all Wikidata and Wikibase enthusiasts. Come and meet the community, ask questions, hack together</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="20">
            <code>FNL9RF</code>
            <public_name>Léa</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="Discodrama">
      <event id="10169" guid="7c665abc-1d20-4c2b-a800-99793b114637">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10169.html</url>
        <logo/>
        <date>2018-12-28T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>03:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10169-fairy_dust_-_day2</slug>
        <title>Fairy Dust - Day2</title>
        <subtitle>Rocket Away</subtitle>
        <track>Music</track>
        <type>other</type>
        <language>en</language>
        <abstract>Modify the Fairy Dust</abstract>
        <description>After standing in the cold rain and snow for too long, the Fairy Dust will find its place this time in the middle of the crowd at hall 5. A video installation will take place on the surface. This is a call for people, who can handle c4d files and have the bravery to put their vision on the symbol of the congress.&#13;
&#13;
The file attached to this event contains all information about the object, as well the position and lenses of the 4 projectors. Fell free to develop whatever you like. Keep in mind that the surface is very glossy and actually eats the light away. Rendered video best with HAP or MP4.&#13;
&#13;
In the hours between 2 pm and 5 pm on the days of the congress, there will be access to the video system, if you come around and have a device with HDMI out.  &#13;
&#13;
Enjoy!&#13;
&#13;
Powered by PENTAKLON und Rico Rose &#13;
&#13;
Contact: privatlehrer[at]gmail[:]com</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/633/original/35C3-template-ROCKET.c4d?1545876636">35C3-template-ROCKET.c4d</attachment>
        </attachments>
      </event>
      <event id="10062" guid="64e1c408-0738-42c8-84ec-c619c0cca73e">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10062.html</url>
        <logo>/system/events/logos/000/010/062/large/avatars-000007922119-cq47oe-t500x500.jpg?1545407521</logo>
        <date>2018-12-28T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10062-lxc</slug>
        <title>LXC</title>
        <subtitle>Dub, Broken Beats, Drum&amp;Bass</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>LXC is an audio tinker from Leipzig, creating pretty much everything between Ambient and Hardcore with a focus on broken beats, dubwise soundscapes and a hefty amount of sub bass.</abstract>
        <description>Early sound research about 8 bit bassdrum sampling started about 1993, leading to a quite noisy Drum&amp;Bass liveact around the years of 2000. The leipzig based label Phantomnoise pressed LXC's pretty harsh debut vinyl entitled Strukturbruch EP in 2002. Further releaes followed up on labels such as Offshore from overseas, Subtle Sudio from Dublin, Death$ucker from London, on the hamburg-based imprints Sozialistischer Plattenbau and Plainaudio and Tübingen's Santorin. These days one can find works on Zamzam's Khaliphonic and the latest compilation of Defrostatica, again from trade fair town. Or bare rave town?&#13;
Beyond exploring unheard music and non-music, the man like LXC is running his own cutting-edge drum&amp;bass/jungle imprint called Alphacut Records, which got expanded into sublabels like 45seven and Alpha Cutauri. Also, LXC is promoting Bassmaessage, Alphacutility and more bassy nights in his home hood, operating Bassmaessage sound system, mastering and cutting lacquers at the RAND Muzik vinyl pressing plant and is looking after an endless amount of smaller projects about audible and visual confusion every now and then. No shit.&#13;
&#13;
LXC sounds like:&#13;
Anti-clockwize-Drum'n'Bass, Scientific Dubber, Fakecore, Noskoolbreaks, Dumbstep, Reggaetomb, Deathhall, Gabbadub, Chip Hop, Phunkrock, Bambient, ...&#13;
&#13;
LXC releases on:&#13;
45seven, Alphacut, Alpha Cutauri, Offshore, Subtle Audio, Bustle Beats, Modern Urban Jazz, Death$ucker, Zamzam's Khaliphonic, Defrostatica, Sozialistischer Plattenbau, Phantomnoise, Santorin, Plainaudio, Dhyana, Minor, Trash Tapes, Moniker Eggplant, ...</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://www.lxc808.com">http://www.lxc808.com</link>
          <link href="https://soundcloud.com/lxc">https://soundcloud.com/lxc</link>
          <link href="http://alphacut.net">http://alphacut.net</link>
        </links>
        <attachments/>
      </event>
      <event id="10069" guid="c88ebe30-c799-46d7-8835-b64b42fd591d">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10069.html</url>
        <logo>/system/events/logos/000/010/069/large/avatars-000361741337-lfts8t-t500x500.jpg?1545407693</logo>
        <date>2018-12-28T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10069-voxel_blue</slug>
        <title>voxel.blue</title>
        <subtitle>Various Styles of Psy</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>DJ from Dresden / Sachsen / Germany&#13;
Styles: zenonesque, uk night psy, darkprog, psybass, psybreaks, psychill, psybient, ambient, ...</abstract>
        <description>"My style changes over the day. The atmosphere of the floor heavy influence the music I find fitting so, zero guarantees ;)"</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/voxel-blue">https://soundcloud.com/voxel-blue</link>
        </links>
        <attachments/>
      </event>
      <event id="10172" guid="d2c0e6fe-3c67-43ab-b330-ea524db86f23">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10172.html</url>
        <logo>/system/events/logos/000/010/172/large/a2020515426_10.jpg?1546021817</logo>
        <date>2018-12-28T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10172-dual_core</slug>
        <title>Dual Core</title>
        <subtitle>nerdcore</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Brought together by the power of the internet (and perhaps a touch of musical providence), California based computer programmer / rapper int eighty and English web designer / music producer c64 have been rocking the more studious side of the hip hop underground since 2007.</abstract>
        <description>Brought together by the power of the internet (and perhaps a touch of musical providence), California based computer programmer / rapper int eighty and English web designer / music producer c64 have been rocking the more studious side of the hip hop underground since 2007.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://dualcoremusic.com/nerdcore/">http://dualcoremusic.com/nerdcore/</link>
        </links>
        <attachments/>
      </event>
      <event id="10041" guid="c6260cf6-e3cc-4f6c-977c-85d22be3b58b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10041.html</url>
        <logo>/system/events/logos/000/010/041/large/avatars-000119756252-ydapyg-t500x500.jpg?1545407986</logo>
        <date>2018-12-28T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10041-kollektiv_turmstrasse</slug>
        <title>Kollektiv Turmstrasse</title>
        <subtitle>Techno/House/Trance</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>There are few artists operating in the house/techno milieu who offer much beyond functionality in their music. Those who bring more than this to the table always stand out from the crowd. Hamburg/Berlin duo Kollektiv Turmstrasse (Christian Hilscher and Nico Plagemann) are one of those rare acts whose music caters for both body and soul.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/kollektivturmstrasse">https://soundcloud.com/kollektivturmstrasse</link>
        </links>
        <attachments/>
      </event>
      <event id="10068" guid="ad4d8964-4f48-44c0-b7ef-0853b77cd4f1">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10068.html</url>
        <logo>/system/events/logos/000/010/068/large/avatars-000109415745-x7apen-t500x500.jpg?1545389220</logo>
        <date>2018-12-29T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10068-dave_dinger</slug>
        <title> Dave Dinger</title>
        <subtitle>Techno/House</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Bachstelzen / KaterBlau, Berlin</abstract>
        <description>Dave Dinger began his illustrious career in Berlins legendary Bar25 in his own, very special way. There, he didn’t just play music, but actually built the DJ booths where the music was played from. This unique blend of passion for music and intrigue in aesthetic concepts has driven him through the mesmerising Berlin underground since the end of the '90s. Dave is personalizing his workspace as a DJ according to his interpretation of what electronic music culture is all about. There is a certain warmth, honesty and depth throughout his work that transcends through both his musicality and his design treatments. As a core member of Berlins famous Bachstelzen Collective, he was one of the founders who blueprinted what got to be known as the typical Berlin style – an architecture of social, musical and aesthetic concepts. Using chaotic, wild and organic scrap wood in his constructions were his distinctive signature well before the term ‘up-cycling‘ became hip. Bar25, the Katerholzig club and the Bachstelzen floor at Fusion Festival were prototypes of this time. His recent works contain a more polarising focus; a love for minimalistic abstract geometry, and years of experience in project management. Nothing shows this development in a greater way than Garbicz Festival — whose natural, albeit utopian habitat has become a homebase for both his music and his design aesthetics. An invitation to create the celebrated Turmbühne Stage at Fusion Festival’s 20th anniversary along with a coveted gig on the stage marked a milestone for both of his careers. For Dave, spacial design and sound are tools for installing an arena for unconventional social interactions. A sphere where common aesthetics are to be challenged and will change therefore constantly. His residency in KaterBlau helped him to build up his reputation as a DJ and to grow into the international realm. In the last years he has worked and played in Australia, New Zealand, India and all around Europe. There is a saying that ‘To talk about music, is like dancing to architecture’ - Dave Dinger takes the latter part as a challenge. So let his music speak for itself — and dance to both.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/dave-dinger">https://soundcloud.com/dave-dinger</link>
        </links>
        <attachments/>
      </event>
      <event id="10083" guid="4fc77737-db51-409d-88bc-ad025d8a3ebf">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10083.html</url>
        <logo>/system/events/logos/000/010/083/large/avatars-000007049727-oyxhri-t500x500.jpg?1545408610</logo>
        <date>2018-12-29T02:00:00+01:00</date>
        <start>02:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10083-akaak</slug>
        <title>akaak</title>
        <subtitle>House</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>akaak is also a member of hamburg-based dj-trio sutsche</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/akaak_klingtsogut">https://soundcloud.com/akaak_klingtsogut</link>
        </links>
        <attachments/>
      </event>
      <event id="10071" guid="0678ee05-7581-4523-a2e3-f1485eb89998">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10071.html</url>
        <logo/>
        <date>2018-12-29T04:00:00+01:00</date>
        <start>04:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10071-404</slug>
        <title>404</title>
        <subtitle>Electronica, Downbeat</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>dj 7000, bidi, 404, köfte, dj abbau, dj closing, ayran, tyskie, dj partner set, and more ...</abstract>
        <description>Unter gewaltigen Opfern, schreibt er eine Reihe von Geschichten mit Ortsnamen, Jahreszahlen und sonstigen Daten, die sich durchaus belegen lassen und in ihrer Wirklichkeit nicht anzuzweifeln sind. Diese Eckdaten sind nur Bruchstücke, die aus einer Summe von Erinnerungen zusammengesetzt wurden. Das tatsächlich gelebte und dies was wir zu erleben glaubten, ist ein Teil seiner Biographie, die lediglich eine nachträgliche Interpretation darstellt.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.mixcloud.com/bambaata/">https://www.mixcloud.com/bambaata/</link>
          <link href="https://vannutt.ch/about/">https://vannutt.ch/about/</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Shutter Island">
      <event id="10100" guid="f4c038b2-fd9c-438b-bf74-2de42bf7a42c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10100.html</url>
        <logo/>
        <date>2018-12-28T10:00:00+01:00</date>
        <start>10:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10100-mr_galonga_-_minmon</slug>
        <title>Mr. Galonga - Minmon</title>
        <subtitle>Minmon Kollektiv</subtitle>
        <track>Music</track>
        <type>other</type>
        <language>en</language>
        <abstract/>
        <description>Mr. Galonga ist Mutti und Vati vom Minmon Kollektiv. Vor allem im Raum Potsdam sind einige Partys und Podcasts auf seinem Mist gewachsen. Ihm geht es nicht um Kohle, sondern um Liebe und deshalb ist er in diesem jahr erstmalig als Dj aufm 35C3.&#13;
---&#13;
Mr. Galonga is mum and dad from the Minmon collective. Especially in the Potsdam area some parties and podcasts he did on his own bat. He is not interested in wonga, but in love and that's why this year for the first time he's a DJ on 35C3.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.minmon.de/">https://www.minmon.de/</link>
        </links>
        <attachments/>
      </event>
      <event id="10162" guid="18e43220-4ede-479a-9fc5-9d43fb2c22f8">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10162.html</url>
        <logo/>
        <date>2018-12-28T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10162-welle</slug>
        <title>welle</title>
        <subtitle>n(e)w</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10102" guid="f28ad5fc-d5cf-411f-a7c2-bb0737d183ea">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10102.html</url>
        <logo/>
        <date>2018-12-28T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10102-mogreens</slug>
        <title>Mogreens</title>
        <subtitle>Vinyls of Funk, Soul and Jazz</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Einer der ersten Stunden. Ein echter Prototyp.&#13;
---&#13;
One of the first. A real prototype.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10103" guid="a95947a0-89ea-4178-b563-4d9c5fcba397">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10103.html</url>
        <logo/>
        <date>2018-12-28T15:00:00+01:00</date>
        <start>15:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10103-fussel</slug>
        <title>Fussel</title>
        <subtitle>Electronic Music</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Fussel, vom Pech verfolgt, ist er nicht nur unser Allrounder für die Umsetzung jeder noch so wahnsinnigen Idee, er hat auch einen ausgeprägten Hang zur endzeitlichen, elektronischen Musik - auf die wir uns sehr freuen. &#13;
---&#13;
Fussel - followed by bad luck, he is not only our all-rounder for the realization of even-the-most-insane-ideas, he also has a pronounced inclination towards electronic music of the last days - to which we are very much looking forward.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10104" guid="0ca8fff6-fb64-467c-89ff-30ca23c430b9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10104.html</url>
        <logo/>
        <date>2018-12-28T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10104-karlakakarl</slug>
        <title>Karlakakarl</title>
        <subtitle>Gute Music von Schallplatte</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Karlakakarl wäre gern mit dem Rad gekommen, muss aber gleich weiter nach Tel Aviv - Karl untersucht den Einfluss guter Musik (vorsicht kann Teile von Jazz enthalten) auf die Bluthirnschranke und teilt seine Erkenntnisse für 2 Stunden mit uns. &#13;
---&#13;
Karlakakarl would have liked to come by bike, but has to go straight on to Tel Aviv - Karl examines the influence of good music (caution may contain parts of Jazz) on the blood-brain barrier and shares his findings for 2h with us.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10105" guid="41b2799f-4e87-4423-be3c-1914e8cdf9a5">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10105.html</url>
        <logo/>
        <date>2018-12-28T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>06:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10105-mr_jb</slug>
        <title>Mr. JB</title>
        <subtitle>The master of mission</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Mr. JB aka monkeyking ist die Geheimwaffe und der wohl am besten vorbereiteteste DJ im Shutterisland, ein wandelndes Musiklexikon und Meister der Übergänge und genau darum bekommt er auch 6h Playtime.&#13;
---&#13;
Mr. JB is the secret weapon and probably the best prepared dj in shutterisland, a walking music encyclopedia and master of transitions and that's exactly why he gets 6h playtime.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/monkeyking/tracks">https://soundcloud.com/monkeyking</link>
        </links>
        <attachments/>
      </event>
      <event id="10106" guid="ee06a7bf-a70d-40be-8b66-83c9c3c914aa">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10106.html</url>
        <logo/>
        <date>2018-12-29T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10106-senor_sib</slug>
        <title>Señor SIB</title>
        <subtitle>More Vinyl</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Señor SIB ist in der (guten) politschen Bildung tätig und er sammelt (gute) Platten und er ist ein (guter) Freund - irgendein Bogen von jazzig zu drum´n bass war mal im Gespräch.&#13;
---&#13;
Señor SIB is active in (good) political education and he collects (good) records and he is a (good) friend - some bow from jazzy to drum´n bass was once in the conversation.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.mixcloud.com/senorsib/">https://www.mixcloud.com/senorsib/</link>
        </links>
        <attachments/>
      </event>
      <event id="10107" guid="760ab0fc-bf67-4625-9860-f8ba4427622a">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10107.html</url>
        <logo/>
        <date>2018-12-29T02:00:00+01:00</date>
        <start>02:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10107-zeerone</slug>
        <title>ZeerOne</title>
        <subtitle>TwittyTwister</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>ZeerOne der Philosoph mit diesem Humor darf nicht fehlen. Er ist der Inbegriff der gut gelaunten Stetigkeit und sein musikalisches Spektrum würde auf kein Display passen.&#13;
---&#13;
ZeerOne the philosopher and with this humor must not be absent. He is the epitome of good-humoured consistency and his musical spectrum he would not fit on any display.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/zeerone-aka-twittytwister/tracks">https://soundcloud.com/zeerone-aka-twittytwister</link>
        </links>
        <attachments/>
      </event>
      <event id="10108" guid="4ba97db1-9a0d-43e3-920e-9460f74fceaf">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10108.html</url>
        <logo/>
        <date>2018-12-29T04:00:00+01:00</date>
        <start>04:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10108-malte_rathmann</slug>
        <title>Malte Rathmann</title>
        <subtitle>Audio / Video Set</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10109" guid="d2bd6f64-1b10-4a7c-b6f0-710db580db89">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10109.html</url>
        <logo/>
        <date>2018-12-29T05:00:00+01:00</date>
        <start>05:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10109-die_snuff_lagune</slug>
        <title>Die Snuff Lagune</title>
        <subtitle>Audio / Video Set</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract/>
        <description>Devon, Franziska, Jan, Malte. elektoinstrumentaler ambient chillcore, Glitchyplatsch meets Rohrschachbrettmuster im Darkroom. Alle können. immer.&#13;
---&#13;
Devon, Franziska, Jan, Malte. electro-instrumental ambient chillcore, Glitchyplatsch meets Rohrschach board pattern in the darkroom. Everyone can. Always.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10110" guid="e16cb096-773e-47d0-86d2-ccdb5ca953bb">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10110.html</url>
        <logo/>
        <date>2018-12-29T06:00:00+01:00</date>
        <start>06:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10110-fussel</slug>
        <title>Fussel</title>
        <subtitle>djset</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Fussel, vom Pech verfolgt, ist er nicht nur unser Allrounder für die Umsetzung jeder noch so wahnsinnigen Idee, er hat auch einen ausgeprägten Hang zur endzeitlichen, elektronischen Musik - auf die wir uns sehr freuen. &#13;
---&#13;
Fussel - followed by bad luck, he is not only our all-rounder for the realization of even-the-most-insane-ideas, he also has a pronounced inclination towards electronic music of the last days - to which we are very much looking forward.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Compeiler">
      <event id="10147" guid="0dcd4053-2b28-4f2a-b462-022f5afa0b58">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10147.html</url>
        <logo/>
        <date>2018-12-28T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10147-rote_schule_music_workshop</slug>
        <title>Rote Schule Music Workshop</title>
        <subtitle>Workshop/Performance</subtitle>
        <track>Music</track>
        <type>workshop</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10129" guid="ff216e54-ddee-4f70-8314-605dfc93a567">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10129.html</url>
        <logo>/system/events/logos/000/010/129/large/avatars-000138623825-tpdxbg-t500x500.jpg?1545595311</logo>
        <date>2018-12-28T15:00:00+01:00</date>
        <start>15:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10129-anna_hauss</slug>
        <title>Anna Hauss</title>
        <subtitle>Singer-Songwriterin</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Anna Hauss ist Sängerin, Texterin und Komponistin und lebt derzeit in Leipzig. Aufgewachsen ist sie in Berlin, wo ihre musikalische Laufbahn schon früh begann. 2013 erschien ihr Solo-Debüt "Summerbreak", ein Jahr später begann sie in Leipzig Jazzgesang zu studieren. In ihren Songs geht es um persönliche Erfahrungen sowie aktuelle Beobachtungen unserer Zeit. Dabei ist sie immer wieder auf der Suche nach neuen Herausforderungen und Sounds. Aktuell ist sie mit ihrer Band STILL IN THE WOODS und deren aktuellem Album "Rootless Tree" unterwegs, spielt Konzerte als Solokünstlerin oder startet Projekte mit Musikern aus der Leipziger Jazzszene.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/haussmusic">https://soundcloud.com/haussmusic</link>
        </links>
        <attachments/>
      </event>
      <event id="10130" guid="10ed2311-451b-44e9-a7fa-58303a6034c3">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10130.html</url>
        <logo>/system/events/logos/000/010/130/large/bio01.png?1545412551</logo>
        <date>2018-12-28T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10130-peter_klohmann</slug>
        <title>Peter Klohmann</title>
        <subtitle>Jazz</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract/>
        <description>Peter Klohmann &#13;
geb. 1986, Frankfurt am Main&#13;
2001-2005 Jungstudent am Peter-Cornelius-Konservatorium Mainz &#13;
2005-2010 Bachelor Studium Jazz Saxophon an der Johannes Gutenberg-Universität Mainz&#13;
2010 bis 2012 Master Studium Jazz Saxophon bei Prof. Bernd Konrad an der Musikhochschule Stuttgart&#13;
ab WS 2012 Master Studium Jazz Komposition bei Prof. Rainer Tempel an der Musikhochschule Stuttgart&#13;
2001-2007 Landesjugenjazzorchesters Rheinland-Pfalz &#13;
2007-2011 Bundesjazzorchester (BujazzO)&#13;
2012 Aushilfe HR-Big Band (Schultour)&#13;
Tourneen führten ihn nach Brasilien, USA, Südafrika, Süd-Korea, Russland, Polen, Indien, Italien und auf den Balkan (Kroatien, Bosnien-Herzegowina, Serbien, Bulgarien, Rumänien)&#13;
 &#13;
Gründet 2009 die Konzertreihe „Junge Szene Frankfurt“&#13;
2013 Arbeitsstipendium Jazz der Stadt Frankfurt am Main&#13;
2014 Eröffnung des 45. Deutsches Jazzfestivals Frankfurt am Main</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://peterklohmann.com">http://peterklohmann.com</link>
        </links>
        <attachments/>
      </event>
      <event id="10088" guid="95f3d4ff-145f-426d-a705-52e67e416c94">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10088.html</url>
        <logo>/system/events/logos/000/010/088/large/avatars-000389452269-8x5ub9-t500x500.jpg?1545412662</logo>
        <date>2018-12-28T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10088-jeanette_tresbien</slug>
        <title>Jeanette Trèsbien</title>
        <subtitle>Part 1</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Moloch, Ringelpietz / Hamburg</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/jeanette-tr-sbien">https://soundcloud.com/jeanette-tr-sbien</link>
        </links>
        <attachments/>
      </event>
      <event id="10131" guid="244005eb-b499-4f13-80e1-ab1ee66db666">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10131.html</url>
        <logo>/system/events/logos/000/010/131/large/sofija.jpg?1545754685</logo>
        <date>2018-12-28T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10131-zso_co</slug>
        <title>Zso &amp; Co.</title>
        <subtitle>live! ukulele</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Zso is the stage name of a young artist Sofia (16) from Novi Sad, Serbia. Her voice is regularly described as “hypnotic”, and her performances as “out-of-this-world”. She started to perform just recently and her sets usually consists of cover songs that the most of you will recognise, but they could hardly be labeled as “hits”. She also writes her own songs and one will be premiered at 35C3.&#13;
&#13;
Currently, she is touring Germany with her dad, _djura_ who is a musician and a DJ. Together, under the name “Zso &amp; Co.”  they will bring you interesting renditions of some popular songs in their own, unique style: combining analogue and acoustic instruments with dirty synths in minimalistic arrangements, accompanying Sofia’s beautiful voice.</abstract>
        <description>Zso is the stage name of a young artist Sofia (16) from Novi Sad, Serbia. Her voice is regularly described as “hypnotic”, and her performances as “out-of-this-world”. She started to perform just recently and her sets usually consists of cover songs that the most of you will recognise, but they could hardly be labeled as “hits”. She also writes her own songs and one will be premiered at 35C3.&#13;
&#13;
Currently, she is touring Germany with her dad, _djura_ who is a musician and a DJ. Together, under the name “Zso &amp; Co.”  they will bring you interesting renditions of some popular songs in their own, unique style: combining analogue and acoustic instruments with dirty synths in minimalistic arrangements, accompanying Sofia’s beautiful voice.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10132" guid="c8a0ca06-f75e-45b9-871b-f48a468df302">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10132.html</url>
        <logo>/system/events/logos/000/010/132/large/avatars-000389452269-8x5ub9-t500x500.jpg?1545412872</logo>
        <date>2018-12-28T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10132-jeanette_tresbien</slug>
        <title>Jeanette Trèsbien</title>
        <subtitle>Part 2</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Moloch, Ringelpietz / Hamburg</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/jeanette-tr-sbien">https://soundcloud.com/jeanette-tr-sbien</link>
        </links>
        <attachments/>
      </event>
      <event id="10053" guid="94a79550-1fef-4ba0-8db6-985c8241b90b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10053.html</url>
        <logo>/system/events/logos/000/010/053/large/35.jpg?1545413155</logo>
        <date>2018-12-28T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10053-air_cushion_finish</slug>
        <title>Air Cushion Finish</title>
        <subtitle>Impromptu, Acousmatic, Ambient, Krautrock,</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Air Cushion Finish do multi-style and real time music. It's created from anything the players come up with at a particular moment. The resulting music defies style definitions.</abstract>
        <description>The slow motion part was referred to as homeopathic punk. before, however ambient, electro-acoustic electronica, dada, soundtrack, radio play, spoken word, impromptu (though preconceived in a certain sense), even jazz or free music could come to mind as well.&#13;
&#13;
Air Cushion Finish formed in Berlin in 2007 and comprised composer/player jayrope and natural vocal synthesizer Lippstueck, who had enjoyed playing Berlin’s underground together since the 1990s. Lippstueck prominently sings, wordless and backwards in time, while his partner jayrope tends to also appreciate any DIY, electronic, string or percussion instrument small enough to fit into a single suitcase altogether. &#13;
Changing setup and subsequently music is programmatic to them, as well as having friends as guest musicians, all resulting into an unforeseeable slow motion cacophony of whispers, bleeps, rhythms and harmonies. &#13;
There’s a notion of Dada, but you never know.&#13;
&#13;
This rather poetic note about their separation from cemented structures &amp; styles took them to places. ACF got to support a number of their own favourite artists along the line. Subsequently ACF’s 8th album FLINK – upon a friendly invitation – was recorded and mixed with Thierry Amar at Montreal’s Hotel2Tango. For the first time in a proper studio, if you will, but nonetheless with an audience present at recording time. The resulting double 12” ‘Flink’ was released on Lullabies for Insominacs in early 2017, telling of ACF’s current state of poetical accident, swaying, swinging and bouncing, boldly careful, like a transparent tattoo on your forehead.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.aircushionfinish.com">https://www.aircushionfinish.com</link>
          <link href="https://aircushionfinish.bandcamp.com/">https://aircushionfinish.bandcamp.com/</link>
        </links>
        <attachments/>
      </event>
      <event id="10079" guid="b2755b2f-1701-42b7-8d2e-61f328f6c2fa">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10079.html</url>
        <logo>/system/events/logos/000/010/079/large/avatars-000023223454-7aeb1i-t500x500.jpg?1545413510</logo>
        <date>2018-12-28T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10079-michelson</slug>
        <title>Michelson</title>
        <subtitle>Part 1</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>..puts compositions together like a dj does &#13;
so that makes him a dj &#13;
in a ambienty, krauty, electronicy way he is&#13;
trtying to tell you something he only knows &#13;
when its time for it. &#13;
magical! &#13;
</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/megamichelson">https://soundcloud.com/megamichelson</link>
        </links>
        <attachments/>
      </event>
      <event id="10060" guid="d22ea0df-965c-4e0a-8254-e1dc16fba4c9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10060.html</url>
        <logo/>
        <date>2018-12-28T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10060-vai</slug>
        <title>Vai</title>
        <subtitle>Experimental Electronics Live Set</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>"This world is so full of love. You are not here by accident. You don’t have to worry about anything. Your being, is so full of love, so full of peace. You don’t have to go to someplace else to find peace. It is right where you are. Trust this, don’t worry about anything at all. Just enter this place and be ."</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://holger-records.bandcamp.com/album/son-of-idaia">Listen: Son of Idaia EP (Holger Records)</link>
        </links>
        <attachments/>
      </event>
      <event id="10133" guid="5b864156-e94c-4935-854b-9a0df97c3564">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10133.html</url>
        <logo>/system/events/logos/000/010/133/large/avatars-000023223454-7aeb1i-t500x500.jpg?1545413633</logo>
        <date>2018-12-28T23:00:00+01:00</date>
        <start>23:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10133-michelson</slug>
        <title>Michelson</title>
        <subtitle>Part 2</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>..puts compositions together like a dj does &#13;
so that makes him a dj &#13;
in a ambienty, krauty, electronicy way he is&#13;
trtying to tell you something he only knows &#13;
when its time for it. &#13;
magical! &#13;
</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/megamichelson">https://soundcloud.com/megamichelson</link>
        </links>
        <attachments/>
      </event>
      <event id="10081" guid="76b1d16f-ca84-4b46-afe5-7932e75fbfbc">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10081.html</url>
        <logo>/system/events/logos/000/010/081/large/Leafar-Legov-.jpg?1545389380</logo>
        <date>2018-12-29T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>02:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10081-leafar_legov</slug>
        <title> Leafar Legov </title>
        <subtitle>Ambient</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Leafar Legov is a quiet but essential member of the Giegling family. Legov's relationship with club music seems purely conditional—he'll follow its guidelines only when they happen to suit his creative impulses. With Kettenkarussell, he makes what could loosely be described as downtempo house. On his solo records, he offsets ambient sketches with somber hip-hop instrumentals. But his personal musical universe is still, for the most part, a mystery—aside from "Blush," an excellent one-off from 2009 he made as Robert Oh, his first solo release was the EP "Talk" on Giegling, which came out in 2016. Abstract and subdued, it's a record that points to Giegling's emotional depth and stylistic open-endedness. </abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/leafarlegov">https://soundcloud.com/leafarlegov</link>
        </links>
        <attachments/>
      </event>
      <event id="10134" guid="fd70f35d-95d9-4fd3-ba93-2d96039f0a9b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10134.html</url>
        <logo/>
        <date>2018-12-29T02:00:00+01:00</date>
        <start>02:00</start>
        <duration>02:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10134-pacheko_b2b_oliotronix</slug>
        <title>Pacheko b2b Oliotronix</title>
        <subtitle>Techno/Rave</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Oliotronix:&#13;
In 2017/18 her new music setup has taken shape in form of energetic performances using Gameboy DMG and various electronic noise machines still combined with an hooligan/techno/rave DJ set.</abstract>
        <description>Few feedbacks from the audience:&#13;
&#13;
“What is exciting about DJ Oliotronix is she doesn't follow the trend but deliver crazy sets following her own taste while keeping it entertaining on a high level of intensity. Prepare to have fun!“&#13;
Madame Claude, Berlin&#13;
&#13;
“Very original and eclectic, with interesting non-standard use of equipment. Also very cool neo-cyber-hip look!”&#13;
Galaxy Wolf, London&#13;
&#13;
“Great! Good energy and selection. Nice to see DJs enjoying themselves too!”&#13;
Crux, London</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/elcapitano">Pacheko: https://soundcloud.com/elcapitano</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Uptime Bar">
      <event id="10061" guid="60b4884f-575e-4849-903c-6403631e70b4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10061.html</url>
        <logo>/system/events/logos/000/010/061/large/avatars-000140974016-n2w1av-t500x500.jpg?1545414123</logo>
        <date>2018-12-28T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10061-sudseemelodien</slug>
        <title>Südseemelodien</title>
        <subtitle>Finest Hawaii Bar Sounds</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Purest aloha spirit to dream away as you let the sounds transporting you to ocean, beach, surfers and luau riding on the back of a glittering Humuhumunukunukuāpua'a.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/suedseemelodien">https://soundcloud.com/suedseemelodien</link>
        </links>
        <attachments/>
      </event>
      <event id="10063" guid="5f7f1cef-1b23-43f3-8de5-6bf77048fba3">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10063.html</url>
        <logo>/system/events/logos/000/010/063/large/shikoba.jpg?1545329369</logo>
        <date>2018-12-28T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10063-shikoba</slug>
        <title> SHIKOBA</title>
        <subtitle>Krautrock, Experimental, Techno</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>SHIKOBA, real name Adem Zor, creative mind behind the interstellar label Planet Almanac, collaborates with Don't DJ and Iku Sakan, varies in his DJ sets in the hypnotic tension field between Krautrock, Experimental and Techno. Juggling with the sound aesthetics appeals to him the most. Dance Music, which transfers the club night's escapism to a more artistic than functional level.</abstract>
        <description>Loops, rhythms and sound aesthetics are the three key words with which his sets can be described. Natural sounds combined with digital synthesis, using the listener as a medium to close the gap between these two.&#13;
&#13;
He himself understands his sets as experienceable ideas, which are presented and carried forward by the experiencer and be thougt even further.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/shikobamakesnoize">https://soundcloud.com/shikobamakesnoize</link>
        </links>
        <attachments/>
      </event>
      <event id="10073" guid="78b5625a-0af0-494e-bc6b-57edd0138d27">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10073.html</url>
        <logo>/system/events/logos/000/010/073/large/avatars-000539299344-d3tt0s-t500x500.jpg?1545414558</logo>
        <date>2018-12-28T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10073-alexa_d_saster</slug>
        <title> Alexa D!saster </title>
        <subtitle>Musical oxymorons</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>AL-D! (Alexa-D!saster) // electric-guitar //loops &amp; effects // vocals // lo-fi //improv // DAW // drums // bells //&#13;
&#13;
Alexa D Saster is a DJ, musician and crossover artist based in Berlin. &#13;
&#13;
DJ Alexa D!saster is a record collector and sound-explorer. Her dj-sets are between mildstyle and wildstyle and based on underground-music and unheard rarities. She's spinning her sets in Berlin's subculture spots and elsewhere in Germany and Europe. &#13;
&#13;
Alexa is a guitarist and singer and plays in different formations. Under the moniker AL-D! she runs her indie-loop-project, where she combines electronic sounds with vocals and electric-guitar.&#13;
&#13;
She is creator of Golden Disko, resident of mild! open air in Berlin's cutest garden Zuckerzauber and host of Kizamani kisasa radio show on Radio Rixdorf.&#13;
&#13;
In addition to her music, Alexa is working as comic artist  and web designer.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://alexa-dsaster.de">http://alexa-dsaster.de</link>
          <link href="https://soundcloud.com/alexadsaster">https://soundcloud.com/alexadsaster</link>
          <link href="https://www.mixcloud.com/alexadsaster">https://www.mixcloud.com/alexadsaster</link>
          <link href="https://soundcloud.com/alexadisaster">https://soundcloud.com/alexadisaster (spot the difference!)</link>
        </links>
        <attachments/>
      </event>
      <event id="10087" guid="18f08a7c-9481-4928-9ed1-6842d10a40ca">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10087.html</url>
        <logo>/system/events/logos/000/010/087/large/avatars-000449268345-ysghqy-t500x500.jpg?1545414667</logo>
        <date>2018-12-28T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10087-please_talk_softly</slug>
        <title>Please Talk Softly</title>
        <subtitle>Diverse Music</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Con Han Hop, mjut / Leipzig</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/pleasetalksoftly">https://soundcloud.com/pleasetalksoftly</link>
        </links>
        <attachments/>
      </event>
      <event id="10084" guid="9d0bb2cc-9d75-4033-9e27-4b372e8a9cee">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10084.html</url>
        <logo>/system/events/logos/000/010/084/large/unnamed.jpg?1545741830</logo>
        <date>2018-12-28T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10084-cornelius_niki_nebel</slug>
        <title> Cornelius &amp; Niki Nebel</title>
        <subtitle>Diverse Music</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Hamburg in town</abstract>
        <description>Sven. sind Nele und Cornelius. Sie haben Irgendwann in der Vergangenheit gemerkt, dass sie ganz gut musikalisch aufeinander reagieren können. Zusammen lassen sie  ein Amalgam aus gebrochenen Beats, krautigen Wellen und wabernden Flächen enstehen. In einen Genre-Setzkasten lässt sich das alles nicht stellen, muss es ja auch nicht, ganz im Gegenteil. Manchmal wissen sie selbst nicht so ganz genau, wohin die Reise geht, um dann aber trotzdem genau da anzukommen wo sie vielleicht hinwollten. Geradezu übernatürlich, einfach wowi.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/nele-wittler">https://soundcloud.com/nele-wittler</link>
          <link href="https://soundcloud.com/cornelius11">https://soundcloud.com/cornelius11</link>
        </links>
        <attachments/>
      </event>
      <event id="10117" guid="0e0a5472-d260-4936-917a-fcb8063caac1">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10117.html</url>
        <logo/>
        <date>2018-12-29T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10117-dj_samantha</slug>
        <title>DJ Samantha</title>
        <subtitle>Music for non places</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>A selection of dub, african and techno classics will be rearranged for a mix; to park (20 kilogramm) suitcases; find a seat next to the smoking compartment and head off to gate B. Playing a DJ set with mostly vinyl, Samantha is slowly paneling her sound with a diverse selection of&#13;
music.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="OIO Lötarea">
      <event id="308" guid="eda8f6cd-d88a-519d-9d69-4dd5e69a3fb9">
        <logo/>
        <date>2018-12-28T10:00:00+01:00</date>
        <start>10:00</start>
        <duration>06:00</duration>
        <room>OIO Lötarea</room>
        <slug>XHGP3G</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/XHGP3G/</url>
        <title>Löten zum Junghackertag</title>
        <subtitle/>
        <track/>
        <type>Lötarea 110 min</type>
        <language>de</language>
        <abstract>Zum Junghackertag gibt es extra Lötprogramme</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="95">
            <code>UYHAB8</code>
            <public_name>djim</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
  </day>
  <day index="3" date="2018-12-29" start="2018-12-29T11:00:00+01:00" end="2018-12-30T03:00:00+01:00">
    <room name="Adams">
      <event id="9686" guid="a750228d-a37d-43c0-8e2f-d46137a991dc">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9686.html</url>
        <logo/>
        <date>2018-12-29T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9686-die_dreckige_empirie</slug>
        <title>Die dreckige Empirie</title>
        <subtitle>Kann man empirischen Studien trauen?</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Kann man empirischen Studien trauen oder nicht? Wie kann ich gute Studien von schlechten unterscheiden? Und was mache ich, wenn es zu einem Thema Studien mit gegensätzlichen Befunden gibt? Der Vortrag soll helfen, Antworten auf diese Fragen zu finden und empirische Studien besser zu verstehen.</abstract>
        <description>Empirischen Studien begegnet man nicht nur in Vorlesungen und Laboren, auch in den Nachrichten und in Diskussionen werden sie zitiert und oft als unumstößliche Wahrheit dargestellt. Andererseits gibt es ein großes Misstrauen gegenüber diesen Studien. Den Satz „Traue keiner Statistik die du nicht selbst gefälscht hast“ hat wohl jeder schon gehört und beim Congress im letzten Jahr hieß es mit Verweis auf psychologische und sozialwissenschaftliche Methoden „Science is broken“. Aber entspricht das wirklich der Wahrheit? Der Vortrag beschäftigt sich mit der Frage, was die Denkweise hinter empirischen Studien ist und wie man sie besser verstehen kann. Dabei sollen sowohl Grundlagen wie Wahrscheinlichkeiten, verschiedene statistische Testverfahren und Metaanlysen als auch Probleme wie p-Hacking und die Replikationskrise angesprochen werden. Ziel des Vortrags ist es, den Zuhörer*innen einen Eindruck davon zu vermitteln, was empirische Studien aussagen können und was nicht. Dabei liegt besonderes Augenmerk auf der Frage, ob und welchen empirischen Studien man trauen kann. Man benötigt keine Vorkenntnisse zum verfolgen des Vortrages. Als Beispiele werden aktuelle und klassische Studien aus der Psychologie benutzt.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8515">Aiko </person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/693/original/Empirie3.pdf?1546087794">Slides_DieDreckigeEmpirie</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
        </attachments>
      </event>
      <event id="9407" guid="d0d6d058-f117-4ccb-ba6a-c41d9290a287">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9407.html</url>
        <logo/>
        <date>2018-12-29T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9407-die_verborgene_seite_des_mobilfunks</slug>
        <title>Die verborgene Seite des Mobilfunks</title>
        <subtitle>HF-Störquellen im Uplink</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Der Vortrag beleuchtet die Einflüsse auf den geheimnisvollen Teil des Mobilfunks – Störquellen im Uplink und deren Auswirkungen auf die Mobilfunk-Kommunikation sowie Praktiken zum Aufspüren von HF-Störquellen.&#13;
&#13;
Die Feldstärke-Balkenanzeige eines Smartphones (die Downlink-Empfangsfeldstärke) ist nur die Hälfte der Wahrheit zur Bewertung einer Mobilfunkversorgung. Die andere Hälfte ist der weithin unsichtbare aber gegen Störeinflüsse hochempfindliche Uplink, die Richtung vom Endgerät zu den Basisstationen. In diesem Vortrag werden Uplink-Störquellen, deren Auswirkungen sowie Mess- und Analysemöglichkeiten erläutert.</abstract>
        <description>Der Uplink von Mobilfunknetzen ist für die mobile Kommunikation unerlässlich, aber niemand kann ihn wirklich sehen. Der Uplink kann durch Störsender, Repeater und viele andere HF-Quellen gestört werden. Wenn er gestört ist, ist die mobile Kommunikation eingeschränkt. Ich werde zeigen, welche Arten von Störquellen den Uplink stören können und welche Auswirkungen das auf die Nutzung des Mobilfunks hat und wie Interference Hunting durchgeführt werden kann.&#13;
&#13;
Zunächst erläutere ich die notwendige Pegelsymmetrie des Downlinks (von der Mobilfunk-Basisstation - eNodeB zum Endgerät) und dem Uplink (vom Endgerät zurück zur eNodeB). Da die Sendeleistungen von Endgerät und eNodeB sehr unterschiedlich sind, erkläre ich technische Hintergründe zum Erreichen der Symmetrie. Im Folgenden werde ich die Probleme und Möglichkeiten bei der Messung von Uplink-Signalen am eNodeB erläutern, in Empfänger kann man ja schlecht hineinschauen. Der Downlink ist im Vergleich dazu sehr einfach zu messen, man sieht die Balken auf dem Smartphone oder kann APPs dazu nutzen, die detaillierte Feldstärkeinfos etc. liefern. Der Uplink bleibt allerdings weitgehend unsichtbar. Wenn dieser allerdings am eNodeB gestört ist, sagen die Feldstärkebalken am Endgerät gar nichts aus. Dazu werde ich eine Möglichkeit der Beobachtung vorstellen, die einige Endgeräte on Board mitbringen bzw. mit APPs aus dem Chipset herausgelesen werden können. In welcher Form der Uplink gestört werden kann, die Auswirkungen für die Kommunikation und das Suchen von Uplink-Störquellen werden den Vortrag abschließen. Dabei werde ich auch auf das Problem der 'passiven Intermodulation' (PIM), eine (nicht) neue Störquelle in den Bassisstations-Antennenanlagen, deren Bewertung, Messung und Vermeidung eingehen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8197">Peter Schmidt</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9507" guid="787007cf-828d-4409-94b0-90a0b8d727a0">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9507.html</url>
        <logo>/system/events/logos/000/009/507/large/IFG_angriff.jpg?1545231555</logo>
        <date>2018-12-29T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9507-best_of_informationsfreiheit</slug>
        <title>Best of Informationsfreiheit</title>
        <subtitle>Transparenz mit der Brechstange</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Mit (u. a.): Rainer Rehak, Anna Biselli, Andre Meister, ...&#13;
&#13;
Was für die Breitbandversorgung in Deutschland gilt, gilt auch für Transparenz: Überall Demokratie-Funklöcher, die man stopfen muss, am besten mit Klagen. Wir erzählen, was das Informationsfreiheitsgesetz in diesem Jahr für die Demokratie-Infrastruktur getan hat, welche Rolle dabei Klagen gespielt haben und was die IFG-Meisterschaften damit zu tun haben.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5605">Arne Semsrott</person>
          <person id="1642">Rainer Rehak</person>
          <person id="5764">Andre Meister</person>
          <person id="4465">Anna Biselli</person>
        </persons>
        <links>
          <link href="https://media.ccc.de/v/35c3-9507-best_of_informationsfreiheit">VIDEO</link>
        </links>
        <attachments/>
      </event>
      <event id="9858" guid="4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9858.html</url>
        <logo/>
        <date>2018-12-29T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9858-archaologische_studien_im_datenmull</slug>
        <title>Archäologische Studien im Datenmüll</title>
        <subtitle>Welche Daten speichert Amazon über uns?</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Jeder Nutzer hat das Recht bei seinen Dienstanbietern eine Kopie seiner Daten anzufordern. Doch wer macht das schon? Wir haben genau das getan. Das Ergebnis war nicht nur eine intensive und emotionale Brieffreundschaften mit der Datenschutz-Abteilung von Amazon. Das Ganze hat auch sehr viel Datenmüll zu Tage befördert.</abstract>
        <description>Jeder Nutzer hat das Recht bei seinen Dienstanbietern eine Kopie seiner Daten anzufordern. Doch wer macht das schon? Wir haben genau das getan. Das Ergebnis war nicht nur eine intensive und emotionale Brieffreundschaft mit der Datenschutz-Abteilung von Amazon. Das Ganze hat auch sehr viel Datenmüll zu Tage befördert. Amazon schickte eine Tabelle mit den letzten 15.000 Klicks – zu jedem Eintrag gab es bis zu 50 zusätzliche Angaben. &#13;
&#13;
Auf den ersten Blick war klar: In diesen Datenbergen lohnt es sich zu wühlen. Genau das haben wir in den darauf folgenden Monaten getan. Mit einigen Analysen haben wir nach Auffälligkeiten und Mustern gesucht und diese auch gefunden. Amazon weiß, wann wir wo unterwegs waren, wie es um die Qualität unserer Internetverbindung steht, wie es um die Häufigkeit von um Familienbesuchen bestellt ist und und welche Zeitung wir lesen. &#13;
&#13;
Der Vortrag erklärt auf unterhaltsame und kurzweilige Weise, was sich aus unserem Datenmüll mit einfachen Mitteln alles herauslesen lässt. Und warum es problematisch ist, wenn Amazon unsere Vorlieben irgendwann besser kennt, als enge Freunde. Als Bonus geben wir Euch noch die wichtigsten Tipps &amp; Kniffe auf den Weg, wie ihr auch bei unkooperativen Unternehmen an Eure eigene Datenauskunft kommt. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8629">Letty</person>
          <person id="8662">Katharina Nocun</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9761" guid="240fe8a1-ee33-4f07-88d0-34b8bb04db71">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9761.html</url>
        <logo/>
        <date>2018-12-29T17:10:00+01:00</date>
        <start>17:10</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9761-truly_cardless_jackpotting_an_atm_using_auxiliary_devices</slug>
        <title>Truly cardless: Jackpotting an ATM using auxiliary devices.</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Pursuit of “good customers’ experience“ not only leads to new customers, but also attract criminals of all sorts. Presentation will give overview of current security situation of ATMs with different auxiliary devices allowing cardless transactions. Cardless is new sexy for criminals.</abstract>
        <description>Era of ATMs has started in London in 1967. Since time, when the “hole-in-the-wall” cash machine used radiocarbon paper cheques, ATMs became more complex and smart, providing opportunity to withdraw money without cards. Vendors, in accordance to banks and consumer’s demand, create ATMs that replace plastic cards and PINs with smartphones or QR codes. &#13;
Cash withdrawal from an ATM now easier than never before not only for clients, but also for attackers. Jackpotting an ATM via malware or black box are pretty familiar. Countermeasures against such attacks are already in place in many banks. Thus, attackers need to discover new (or well-forgotten) ways to achieve their evil goals. &#13;
We will not chew the fat, telling stories about the old days, because new functionality provides new possibilities. Migration from Windows XP to Windows 7/10 means there is always PowerShell on the ATM. “New” types of input devices allow BadBarcode-like attacks. Legitimate auxiliary device connected to the ATM in pursuit of so-called good customers’ experience may lead to ejection of all money from ATM. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6960">Olga Kochetova</person>
          <person id="7221">Alexey Osipov</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9653" guid="5a8097ad-15c2-492e-8bc4-6b634fd8e963">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9653.html</url>
        <logo>/system/events/logos/000/009/653/large/photo_2018-10-14_15-01-31.jpg?1539524849</logo>
        <date>2018-12-29T18:10:00+01:00</date>
        <start>18:10</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9653-russia_vs_telegram_technical_notes_on_the_battle</slug>
        <title>Russia vs. Telegram: technical notes on the battle</title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>It's time to highlight facts and epic fails that were observed on the wire during attempts to block Telegram in Russia.&#13;
</abstract>
        <description>Russian Federal Service for Supervision of Communications, IT and Mass Media started the process to ban Telegram on April the 16th. Roskomnadzor press-office claimed that the process will take a few hours. Telegram mostly worked in Russia during the incident beginning and still works half a year later.&#13;
&#13;
Russia banned Amazon, Google, Microsoft, DigitalOcean, Hetzner and other networks covering almost 0.5% of Internet Protocol address space, presumably, to put pressure on international businesses to make Telegram persona non-grata on those networks.&#13;
&#13;
Russia also banned IP addresses of major local businesses (VKontakte, Yandex and others), presumably, by mistake. A flaw in the filter was exploited to bring one of the major ISPs down for a while. Moscow Internet exchange point announced that alike flaw of the filter could be used to disrupt peering. Proxy-hunting experiments were observed sniffing live network traffic, both for obfuscated MTProto proxy and good old Socks5.&#13;
&#13;
This talk will &lt;em&gt;not&lt;/em&gt; cover legal aspects of the lawyers fighting for Telegram in court. Also, it will &lt;em&gt;not&lt;/em&gt; show any "insider" information from Telegram team.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8452">Leonid Evdokimov (darkk)</person>
        </persons>
        <links>
          <link href="https://usher2.club/en/">Usher II: having fun with Roskomnadzor's Register of Prohibited sites</link>
          <link href="https://darkk.net.ru/35c3/">Errata &amp; Slides mirror</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/698/original/35c3-russia-vs-telegram.pdf?1546092203">PDF slides</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/699/original/35c3-russia-vs-telegram.odp?1546092203">OpenDocument slides with speaker notes</attachment>
        </attachments>
      </event>
      <event id="9783" guid="94447a62-a3ba-4f6d-a3b7-b5318a954651">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9783.html</url>
        <logo>/system/events/logos/000/009/783/large/Mars_Science_Laboratory_mission_logo.png?1539618594</logo>
        <date>2018-12-29T19:10:00+01:00</date>
        <start>19:10</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9783-the_mars_rover_on-board_computer</slug>
        <title>The Mars Rover On-board Computer</title>
        <subtitle>How Curiosity's Onboard Computer works, and what you can learn from how it was designed</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Mars Rover Curiosity is one of the most sophisticated pieces of hardware ever launched into space. Because of the communication delay from Earth to Mars, it needs to accomplish most of its tasks completely autonomously: landing, navigation, exploration and singing birthday songs to itself. To do all this, it only has one central onboard computer. Let's look at that computer and the software it runs in detail. </abstract>
        <description>&lt;p&gt;While space is a somewhat unique environment, we can still learn a lot by looking at how the pieces hardware and software on board of Curiosity are designed and managed. The spacecraft only has one onboard computer that took over from the second it was launched towards Mars. It navigated the stars and orbits, managed a very complicated landing procedure, and now drives around as a car-sized rover over rocks and slippery ravines, all while collecting samples and analysing them with its on board lab.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;First we'll have a look at the history of the Mars Science Laboratory plans, then in part two we will launch into hardware. What processors do we have, how are the working together? How is redundancy handled, and shielding against radiation?&lt;/p&gt;&#13;
&#13;
&lt;p&gt;As a part three, we'll look closely at the rover's software. Using over the air updates, almost all code running on Curiosity has been pushed there after it had landed on Mars. NASA pushed updates to enable new scientific missions, to make it traverse the environment in a different way, and to route around broken hardware. &lt;/p&gt;&#13;
&#13;
&lt;p&gt;After listening to this talk, you should find yourself inspired to look at problems of software and hardware fault-tolerance and  long-term maintenance in a new light. You should be entertained by a hopefully interesting aspect of computers and space flight.  And you'll get a certain awe of the engineers at JPL and their accomplishments. &lt;/p&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4702">breakthesystem</person>
        </persons>
        <links>
          <link href="https://www.amazon.com/Design-Engineering-Curiosity-Performs-Springer/dp/3319681443">The Design and Engineering of Curiosity: How the Mars Rover Performs Its Job (Springer Praxis Books) 1st ed. 2018 Edition</link>
          <link href="https://www.youtube.com/watch?v=09iTidqkriw">Another Talk by Daniel</link>
        </links>
        <attachments/>
      </event>
      <event id="9716" guid="48ed6dea-e67d-4866-8c35-318e9d892363">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9716.html</url>
        <logo>/system/events/logos/000/009/716/large/lossy-page1-576px-%22WAAC_-_SILENCE_MEANS_SECURITY%22_-_NARA_-_515987.tif.jpg?1545215113</logo>
        <date>2018-12-29T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9716-du_kannst_alles_hacken_du_darfst_dich_nur_nicht_erwischen_lassen</slug>
        <title>Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.</title>
        <subtitle>OpSec für Datenreisende</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Schon Wladimir Wladimirowitsch Putin wusste: "Hacker, das sind freie Menschen, so wie Künstler." Wie wollen dafür sorgen, dass es so bleibt.</abstract>
        <description>Der Hacksport erfreut sich immer größerer Beliebtheit – nicht nur in Russland. &#13;
&#13;
In diesem Einführungs-Talk geben wir einen Überblick über die Risiken des Hobbys: Eingetretene Türen, Hausdurchsuchungen und hohe Anwaltskosten trüben den Genuss des freien Hacksports.&#13;
&#13;
Hier lohnt es sich für den hackenden Nachwuchs, aus den Fehlern anderer zu lernen. Wir geben klassische Beispiele für Fehler in der Operational Security, damit Ihr sie nicht machen müsst.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="3995">Linus Neumann</person>
          <person id="3901">Thorsten Schröder</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="10017" guid="1c64358f-3bdd-484e-a28e-58dc7baa4480">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10017.html</url>
        <logo/>
        <date>2018-12-29T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>00:50</duration>
        <room>Adams</room>
        <slug>35c3-10017-electronic_evicence_in_criminal_matters</slug>
        <title>Electronic Evicence in Criminal Matters</title>
        <subtitle>An introduction and critique of the EC proposal for a regulation</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The lecture will give an introduction into the "EC Proposal for a Regulation on European Production and Preservation Orders for Electronic Evidence in Criminal Matters (COM (2018) 225 final)" and .&#13;
the impact to civil liberties of the users as well as the challenges for service providers of the diverse range of services covered by the proposal.&lt;br&gt;&#13;
Urgent action is required &lt;b&gt;now&lt;/b&gt; by diverse groups to fight the existing proposal and prevent it from becoming binding law throughout the EU..    </abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="174">Klaus Landefeld</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/712/original/35C3_-_e-evidence_20181229.pdf?1546115203">Presentation</attachment>
        </attachments>
      </event>
      <event id="9667" guid="a667d070-483e-4e2b-9bf9-d9a5475b6356">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9667.html</url>
        <logo/>
        <date>2018-12-29T23:10:00+01:00</date>
        <start>23:10</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9667-desinformation_und_fake_news_-_bekampfung_und_verifizierung_leicht_gemacht</slug>
        <title>Desinformation und Fake News - Bekämpfung und Verifizierung leicht gemacht</title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Für Journalisten bieten soziale Netzwerke eine Vielzahl von Quellen und Informationen, in einem Ausmaß, das vor Jahren unvorstellbar war. Doch damit steigt auch das Risiko immer weiter, auf Manipulationen und „Fake News“ hereinzufallen. In Zeiten von „Lügenpresse“-Rufen stellt das Journalisten vor neue Herausforderungen. Der Vortrag zeigt, wie die Verifizierung von Bildmaterial bei großen Medienhäusern abläuft – und warum auch normale Nutzer diese Möglichkeiten kennen und benutzen sollten. </abstract>
        <description>Während Bildmaterial bis vor wenigen Jahren noch hauptsächlich eigenproduziert oder eingekauft wurde oder über Agenturen geliefert wurde, kann dank Smartphones jeder zum Video- und Nachrichtenproduzent werden. Teilweise haben solche Videos eine Reichweite, von der etablierte Medien nur träumen können. Es geschieht kaum eine Breaking News, bei der nicht nach wenigen Minuten bereits Bilder im Netz kursieren. Dass solche Bilder nicht ungeprüft übernommen werden sollten, hat sich zum Glück rumgesprochen. Aber wie kann der Wahrheitsgehalt eines Bildes oder Videos unabhängig und nachvollziehbar verifiziert werden? Viele Medienhäuser haben erkannt, dass traditionelle Recherchemethoden bei diesem Thema schnell an ihre Grenzen stoßen und haben Verifizierungsteams gegründet. Glücklicherweise gibt es viele Programme, Webseiten und Plug-Ins, die einen bei der Verifizierung unterstützen. Der Vortrag zeigt, welche Arten von Fälschungen es gibt und wie man Fälschungen mit welchen Mitteln entlarven kann.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8192">Robert Clausen</person>
        </persons>
        <links>
          <link href="http://verificationhandbook.com">verificationhandbook.com</link>
          <link href="http://osintframework.com">osintframework.com</link>
          <link href="http://suncalc.org">suncalc.org</link>
          <link href="http://invid-project.eu">invid-project.eu</link>
          <link href="http://wikimapia.org">wikimapia.org</link>
          <link href="http://graph.tips">graph.tips</link>
          <link href="http://citizenevidence.amnestyusa.org">citizenevidence.amnestyusa.org</link>
          <link href="http://camopedia.org">camopedia.org</link>
          <link href="http://logos.iti.gr">logos.iti.gr</link>
          <link href="http://worldlicenseplates.com">worldlicenseplates.com</link>
          <link href="https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA/edit">Bellingcat Toolkit (Google Doc)</link>
          <link href="http://geolocatethis.site">geolocatethis.site (aktuell offline)</link>
        </links>
        <attachments/>
      </event>
      <event id="9486" guid="1f290832-c93f-453b-9966-83ecbda4c1c3">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9486.html</url>
        <logo/>
        <date>2018-12-30T00:10:00+01:00</date>
        <start>00:10</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9486-hebocon</slug>
        <title>Hebocon</title>
        <subtitle>The sumo robot fight for the technically ungifted</subtitle>
        <track>Entertainment</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>We let the technically ungifted build robots and to fight each other for the laughs. &#13;
&#13;
Please contact @honky in RocketChat or visit the ChaosZone Hall 2 if you want to participate. We need at least 8 Robots to participate, if we have more, we'll bring this to the battlefield.</abstract>
        <description>Let's build funny robots and let them fight each other as long as we are superior to them :) Please let's dishonor high tech and celebrate everything made out of stuff we usually throw away (and blinks).&#13;
&#13;
Please contact @honky in RocketChat or visit the ChaosZone Hall 2 if you want to participate. We need at least 8 Robots to participate, if we have more, we'll bring this to the battlefield.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8067">honky</person>
        </persons>
        <links>
          <link href="https://media.ccc.de/v/DS2018-9308-hebocon_finale">Datenspuren 2018</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/690/original/hebocon.png?1546085092">Advertisment on Site</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/710/original/Hebocon.pdf?1546113492">Slides for Translators</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
        </attachments>
      </event>
      <event id="9911" guid="e4dbae08-779a-4972-a099-7c85df141fa4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9911.html</url>
        <logo/>
        <date>2018-12-30T01:10:00+01:00</date>
        <start>01:10</start>
        <duration>01:30</duration>
        <room>Adams</room>
        <slug>35c3-9911-chaos_communication_slam</slug>
        <title>Chaos Communication Slam</title>
        <subtitle>Technische Liebesgedichte &amp; Horrorgeschichten im Dichterwettstreit</subtitle>
        <track>Entertainment</track>
        <type>other</type>
        <language>de</language>
        <abstract>Chaos meets Poetry Slam. &#13;
Der humoristische Dichterwettstreit mit Informatikhintergrund. Mitmachen ausdrücklich erwünscht. </abstract>
        <description>Und keine Sorge, ein Poetry Slam hat nichts mit dem Ingeborg-Bachmann-Preis zu tun. Hierbei geht es um einen Wettkampf bei dem selbstgeschriebene Texte live vorgetragen werden. Prosa, Lyrik, lustige Geschichte, das ist eure Wahl. Erzählt von euren Sysadmin Lovestorys, WebDev-f*ckUps oder was auch immer euch auf der Seele liegt.&#13;
Für Kurzentschlossene bieten wir euch davor noch einen Crash Kurs in Slam Poetry an, damit auch ihr das Publikum begeistern könnt und mit in das Finale einzieht. Die Session findet ihr zeitnah im Event-Wiki. Auf dieser Seite findet ihr auch eine Adresse, um euch für das große Event anzumelden.&#13;
Durch den Abend begleitet euch das Slam-erfahrene Team der "Slamigans" aus dem Umfeld des Chaostreff Flensburg. Moderiert von Thorben Dittmar, früherer U20-Local aus dem Kühlhaus und ewiger zweiter Platz, stimmt das Publikum zusammen über die besten Beiträge ab. Das Siegertreppchen darf sich schon auf tolle Preise freuen.&#13;
Also schnell anmelden!</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8386">Thorben Dittmar</person>
        </persons>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Borg">
      <event id="9567" guid="ed525209-a9e5-4082-810a-3bd466ca8ca0">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9567.html</url>
        <logo>/system/events/logos/000/009/567/large/yG2ahUfL_400x400.jpg?1543064844</logo>
        <date>2018-12-29T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>02:20</duration>
        <room>Borg</room>
        <slug>35c3-9567-lightning_talks_day_3</slug>
        <title>Lightning Talks Day 3</title>
        <subtitle/>
        <track>CCC</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!</abstract>
        <description>Did you think that the thrill of sharing your ideas in front of a huge audience at a C3 was something you'd never experience? Do you work on a cool project and want to get the word out? Was your talk one of the hundreds that got rejected? Did you come up with an awesome hack that you need to share? Go ahead and enter your Lightning Talk now!&#13;
&#13;
The 35C3 Lightning Talks consist of three fast paced sessions which are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to get out to a global audience. Even if you don't have an awesome idea or project to share, a Lightning Talk is perfect for pitching your Assembly, your workshop or even a longer talk you'll give as a self-organized session. Your five minutes of fame!&#13;
&#13;
For registration and schedule info, please check out https://c3lt.de/35c3</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5263">gedsic</person>
          <person id="4601">bigalex</person>
        </persons>
        <links>
          <link href="https://c3lt.de/35c3">Registration and schedule</link>
          <link href="https://events.ccc.de/congress/2018/wiki/index.php/Static:Lightning_Talks">Congress Wiki Page</link>
        </links>
        <attachments/>
      </event>
      <event id="9971" guid="a35c6c71-1f67-445c-bf13-11a586dff32c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9971.html</url>
        <logo/>
        <date>2018-12-29T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9971-the_critical_making_movement</slug>
        <title>The Critical Making Movement</title>
        <subtitle>How using critical thinking in technological practice can make a difference</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Critical Thinking + Making = Critical Making. Around the world, academics and grassroots communities alike are engaging in critical making. With roots in critical design and critical engineering, etc., the point is to re-politicise making, help people understand that it needs to be more than printing cheap plastic knickknacks and can be used for activism and social innovation to improve peoples' lives. </abstract>
        <description>Using critical thinking in the DIY culture to look beyond the idealised picture of the maker and "reintroduce a sense of criticality back into post-2010 maker culture to un-sanitize, un-smooth and re-politicize it" (Hertz) is a relatively recent notion. More and more academia introduce Critical Making into their curricula, but bottom-up, grassroots movements also use critical making. Not only to raise awareness and hopefully change the status quo but also to see profit-oriented innovation practices vary, to minimise their adverse effects on society and the environment. &#13;
&#13;
This lecture will explore the notion of using more societal reflection in technology (both hardware and software) and its importance for our future. Insights on political-activist examples and case studies from around the world (Indonesia, Brazil, Germany) will be presented, with a focus on practice, practitioner and motivation. The aim is to explore making movement as a broader, global yet hyper-locally relevant phenomenon. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8256">Regina M. Sipos</person>
          <person id="8529">Saad Chinoy</person>
          <person id="8687">Ricardo Ruiz</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/691/original/Critical_Making_Movement_CCC.pdf?1546086750">Critical Making movement, first part of talk, by Regina</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/692/original/35c3.pdf?1546086848">Engineering Good</attachment>
        </attachments>
      </event>
      <event id="9364" guid="7228f88d-8d6f-40a9-a5dd-b5c91b823ada">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9364.html</url>
        <logo>/system/events/logos/000/009/364/large/molecule.png?1536771644</logo>
        <date>2018-12-29T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9364-viva_la_vita_vida</slug>
        <title>Viva la Vita Vida</title>
        <subtitle>Hacking the most secure handheld console</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Since its release in 2012, the PlayStation Vita has remained one of the most secure consumer devices on the market. We will describe the defenses and mitigations that it got right as well as insights into how we finally defeated it. The talk will be broken into two segments: software and hardware. First, we will give some background on the proprietary security co-processor we deem F00D, how it works, and what we had to do to reverse an architecture with minimal public information. Next, we will talk about hardware attacks on a real world secure hardware and detail the setup process and the attacks we were able to carry out. This talk assumes no prior knowledge in hardware and a basic background in system software. Focus will be on the methods and techniques we've developed along the way.</abstract>
        <description>How do you hack a device running a full featured, security hardened, and completely proprietary operating system executed on a custom designed SoC? Although the PlayStation Vita did not reach the market success of its contemporaries, it was a surprisingly solid device security-wise. Sony learned from the mistakes of PS3 and PSP and there were (mostly) no "FAIL" moments. It carried exploit mitigations that are standard today but groundbreaking for a "popular" device in 2012: SMAP, kernel ASLR, &gt; 2 security domains, and more. Molecule was the first group to run unsigned code on the device as well as the first to hack kernel mode and TrustZone. However, to target the security co-processor (F00D), we need to bring out the big guns. Using a highly customized version of the popular ChipWhisperer hardware, we carried out hardware attacks on the device including fault injection (glitching) and side channel analysis. In a board with twelve layers, dozens of unknown ICs, and hundreds of passives, how do you even begin to attack it without any information? We will start with the basics: a whirlwind tour of the theory behind the attacks. Then we will move to the practical application: mapping out the power domains of a SoC, soldering tips for microscopic points, finding a good trigger signal, finding a glitch target, and searching the right parameters. Finally, if time permits, we will also talk a bit about how to extend our existing setup to perform side channel analysis with a few modifications.&#13;
&#13;
It is unfortunate that the Vita was such a niche device, but we hope this talk will inspire more people to pick it up. The Vita is dead, long live the Vita!</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8138">Yifan Lu</person>
          <person id="8140">Davee</person>
        </persons>
        <links>
          <link href="https://yifan.lu/2016/12/31/state-of-the-vita-2016/">State of the Vita (2016)</link>
          <link href="https://yifan.lu/2017/07/31/henkaku-enso-bootloader-hack-for-vita/">Ensō Bootloader Hack (2017)</link>
          <link href="https://yifan.lu/2016/11/01/taihen-cfw-framework-for-ps-vita/">taiHEN CFW Framework (2016)</link>
          <link href="https://yifan.lu/2016/07/28/henkaku-vita-homebrew-for-everyone/">HENkaku Hack (2016)</link>
          <link href="https://yifan.lu/2013/09/10/why-hacking-the-vita-is-hard-or-a-history-of-first-hacks/">Why hacking the Vita is hard (2013)</link>
          <link href="https://blog.xyz.is/2016/webkit-360.html">Exploiting WebKit on Vita 3.60</link>
          <link href="https://blog.xyz.is/2018/enso.html">Ensō: A PS Vita bootloader exploit</link>
        </links>
        <attachments/>
      </event>
      <event id="9788" guid="83bf042d-7382-4975-a3f8-92229944b8fc">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9788.html</url>
        <logo/>
        <date>2018-12-29T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9788-memsad</slug>
        <title>Memsad</title>
        <subtitle>why clearing memory is hard.</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This presentation will start off with a simple problem (how do you clear memory that holds sensitive content). It explores numerous possible solutions, and presents real live facts and figures. bugs in common applications will be shown. </abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="821">Ilja van Sprundel</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/attachments/original/missing.png">file</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/719/original/memsad.pptx?1546120017">memsad.pptx</attachment>
        </attachments>
      </event>
      <event id="9973" guid="7030e406-2e1f-4d4d-8b1b-c68aa22a3434">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9973.html</url>
        <logo>/system/events/logos/000/009/973/large/GFF_Bildmarke_freigestellt.jpg?1540979362</logo>
        <date>2018-12-29T18:50:00+01:00</date>
        <start>18:50</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9973-freedom_needs_fighters</slug>
        <title>Freedom needs fighters!</title>
        <subtitle>Wie die GFF mit strategischen Klagen für Freiheitsrechte kämpft und was in 2019 auf uns zukommt</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Der Talk gibt einen Überblick über die Arbeit der Gesellschaft für Freiheitsrechte (GFF): Wir klagen, um Grund- und Menschenrechte vor Gesetzgebern und Behörden zu schützen.</abstract>
        <description>Die letzten Jahre waren harte Zeiten für die Bürgerrechte: Im Bund regierten große Koalitionen, die reihenweise Überwachungsgesetze verabschiedeten - etwa die Staatstrojaner im Strafverfahren, das neue BKA-Gesetz oder den Zugriff von Geheimdienste auf die biometrischen Passbildern aller Bürgerinnen und Bürger, selbst wenn sie sich nichts haben zuschulden kommen lassen. Auch in vielen Bundesländern scherten sich die Parlamente nicht viel um Grundrechte, etwa in Bayern, wo seit dem Sommer das härteste Polizeigesetz seit dem Ende der Nazi-Diktatur herrscht - ein Gesetz, das so krass ist, dass sich sogar die Polizeigewerkschaft kritisch äußerte. Diese und viele andere Themen beschäftigen die GFF, die mit strategischen Klagen versucht, Grundrechte und Menschenrechte zu schützen. Unsere Arbeit geht dabei weit hinaus über den Bereich "digitale Grundrechte" hinaus: Derzeit laufen Verfahren bzw. bereiten wir Verfahren vor gegen § 219a StGB (Maulkorb für Ärzt*innen, die Abtreibungen vornehmen), die Polizeigesetze in Bayern, NRW und Hessen, das Verbot von linksunten.indymedia, die Staatstrojaner in der StPO sowie gegen die Internet-Massenüberwachung durch den BND durch das G10 und das BND-Gesetz. Außerdem engagieren wir uns in einem Verfahren für gleiches Gehalt für Frauen und Männer und organisieren gemeinsam mit Frag den Staat eine Serie von Transparenzklagen,  um Informationsfreiheit auch vor Gericht durchzusetzen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="3723">Ulf Buermeyer</person>
          <person id="8688">Nora Markard</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9851" guid="5909125c-6118-4cda-931a-8b936f81dda0">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9851.html</url>
        <logo/>
        <date>2018-12-29T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>00:40</duration>
        <room>Borg</room>
        <slug>35c3-9851-conquering_large_numbers_at_the_lhc</slug>
        <title>Conquering Large Numbers at the LHC</title>
        <subtitle>From 1 000 000 000 000 000 to 10: Breaking down 14 Orders of Magnitude</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>We are going to outline the ingredients necessary to perform measurements at the LHC, starting from an ordinary bottle of hydrogen. Let us take you on a journey following the path of the protons from this bottle to being ready for collisions in one of the detectors. Once the collisions are recorded we show the approaches and tools on how to extract the metaphorical needle in the haystack.</abstract>
        <description>The Large Hadron Collider at CERN is one of the largest and most precise machines mankind has built. As a particle accelerator, it enables us to study proton collisions in large detector experiments such as ATLAS and CMS. These detectors basically work like huge cameras with millions of channels taking up to one billion snapshots of the collisions per second. In a large fraction of these collisions, reactions take place that have been studied and understood for decades now. The very rare processes, however, are those that are especially interesting, but at the same time challenging to extract. &#13;
The probabilities of processes, that have been studied and confirmed so far, span a range of 14 orders of magnitude. Finding the needle in the haystack of events we record at the LHC is like trying to score a field goal in basketball from space.&#13;
The rareness of the interesting phenomena not only calls for pure physics understanding, but it also requires advanced techniques in data mining to find as many events of interest as possible while reducing the number of incorrectly accepted events. Hence, data handling in high energy physics means to dig into petabytes of data to filter out and catch a hand full of interesting reactions. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8540">Carsten Bittrich</person>
          <person id="8622">Stefanie Todt</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/724/original/ConqueringLargeNumbersAtLHC.pdf?1546182066">Slides</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
        </attachments>
      </event>
      <event id="9596" guid="7eac80f4-c999-4c2e-a0de-90eabca7ea7d">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9596.html</url>
        <logo/>
        <date>2018-12-29T21:50:00+01:00</date>
        <start>21:50</start>
        <duration>00:40</duration>
        <room>Borg</room>
        <slug>35c3-9596-no_evidence_of_communication_and_morality_in_protocols_off-the-record_protocol_version_4</slug>
        <title>No evidence of communication and morality in protocols: Off-the-Record protocol version 4</title>
        <subtitle/>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>OTRv4 is the newest version of the Off-The-Record protocol. It is a protocol where the newest academic research intertwines with real-world implementations. It is also one of the first protocols that comes from the global south which makes the political discussion around protocols an urgency.  This newest versions also asks us to revisit our definitions around deniability (online and offline) and how important is it to the world. In this talk we will try to start a discussion around the importance of protocols, its political/moral foundations, the real-world implementation of academic ideas, the importance of securely implementing them, the definition of deniability in the current world and the design of OTRv4.</abstract>
        <description>As we know from past revelations, the Internet has become a place where any action is surveilled and recorded. In the light of this, the OTR protocol was created. But it was created long time ago. In the past years, there have been a increased work on cryptographic primitives, and privacy and security notions. But these thoughts have not been incorporated into projects. OTRv4 is the newest version of the Off-The-Record protocol, which tries to incorporate these new ideas. At the same time, OTRv4 is a protocol that challenges the common thinking around protocols as it comes from the global south, and takes moral questions into its design, as Rogaway tried to defined on his "The Moral Character of Cryptographic Work?" paper. Furthermore, OTRv4 tries to update the notion of deniability and why it is important for the world. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8357">Sofia Celi</person>
          <person id="8736">Jurre van Bergen</person>
        </persons>
        <links>
          <link href="https://petsymposium.org/2018/files/hotpets/7-bini.pdf">No evidence of communication: Off-The-Record Protocol version 4OTRv4: HotPETS paper</link>
          <link href="https://github.com/otrv4/otrv4/blob/master/otrv4.md">OTRv4 specification</link>
          <link href="https://github.com/otrv4/libotr-ng">OTRv4 implementation</link>
          <link href="http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf">"The Moral Character of Cryptographic Work?" paper</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/726/original/CCC.pdf?1546217037">Slides</attachment>
        </attachments>
      </event>
      <event id="9523" guid="3a571c21-31ed-453b-886d-7dea7b5751cd">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9523.html</url>
        <logo>/system/events/logos/000/009/523/large/iod.png?1538977573</logo>
        <date>2018-12-29T22:50:00+01:00</date>
        <start>22:50</start>
        <duration>00:40</duration>
        <room>Borg</room>
        <slug>35c3-9523-internet_of_dongs</slug>
        <title>Internet of Dongs</title>
        <subtitle>A long way to a vibrant future</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>With great pleasure comes great responsibility. A responsibility, which is not taken enough into consideration by the smart sex toy manufacturers as they should, while handling extremely sensitive data. As long as there is no serious breach, there is no problem, right? This was the basis for a research project (Master Thesis) called “Internet of Dildos, a long way to a vibrant future”, dealing with the assessment of smart sex toys and identification of vulnerabilities in those products, including mobile apps, backends and the actual hardware. &#13;
After the assessment of a selection of multiple smart sex toys an abyss of vulnerabilities was revealed. The identified vulnerabilities range from technically interesting vulnerabilities to vulnerabilities which affect the privacy of the users in extreme and explicit ways.&#13;
</abstract>
        <description>In recent years the internet of things has slowly creeped into our daily life and is now an essential part of it, whether you want it or not. A long-existing sub category of the internet of things is a mysterious area called teledildonics. This term got invented about 40 years ago and described (at this time fictional) devices, allowing their users to pleasure themselves, while being interconnected to a global network of plastic dongs. In the 21st century, teledildonics actually exist. Multiple devices are on the (multi-million dollar) market, offering the ability to pleasure an individual, while being connected to the internet. Those devices offer functionalities, like remote pleasuring over local links as well as over the internet. They implement social media-like functionalities such as friends lists, instant messaging, movie chats and explicit-image sharing. &#13;
With great pleasure comes great responsibility. A responsibility, which is not taken enough into consideration by the smart sex toy manufacturers as they should, while handling extremely sensitive data. As long as there is no serious breach, there is no problem, right?&#13;
This was the basis for a research project called “Internet of Dildos, a long way to a vibrant future”, dealing with the assessment of smart sex toys and identification of vulnerabilities in those products, including mobile apps, backends and the actual hardware. &#13;
After the assessment of a selection of multiple smart sex toys an abyss of vulnerabilities was revealed. The identified vulnerabilities range from technically interesting vulnerabilities to vulnerabilities which affect the privacy of the users in extreme and explicit ways. It was possible to gain access to thousands of users’ data records, including cleartext passwords, explicit images, real-world names, real-world addresses, and many more specific facts. Furthermore, we were able to remotely pleasure individuals without their consent over the internet, or over a local link.&#13;
&#13;
Presentation Outline&#13;
1.	Why?&#13;
Explanation as to why it is necessary to conduct penetration tests in the area of teledildonics and why the topic was chosen for further research. &#13;
&#13;
2.	Quick introduction into basics like&#13;
Internet of Things (IoT)&#13;
Sextech&#13;
Teledildonics (History of Smart Sex Toys)&#13;
Internet of Dongs (IoD)&#13;
&#13;
3.	The “Test Devices”&#13;
A quick introduction of the test devices examined during this project.&#13;
Explanation of their feature set including areas of application and use-cases.&#13;
&#13;
4.	Let’s get dirty – An overview of the identified vulnerabilities&#13;
DS_STORE File Information Disclosure&#13;
Customer Database Credential Disclosure&#13;
Unrestricted Access to administrative interfaces&#13;
Weird authentication implementation&#13;
Unauthenticated Bluetooth LE Connections&#13;
Missing Authentication in Remote Control&#13;
And many more…&#13;
&#13;
5.	Bluetooth LE Protocol exploitation&#13;
Brief overview over Bluetooth LE security features&#13;
Brief overview over Bluetooth LE authentication/pairing methods&#13;
Brief overview over Bluetooth LE exploitation Hardware&#13;
Brief overview over Bluetooth LE exploitation Software&#13;
Hands-on example&#13;
&#13;
6.	The “Swinger Club Problem”&#13;
How the manufacturers tried to downplay the vulnerabilities.&#13;
&#13;
7.	Legal Issues – Rape over the wire?&#13;
How are current laws dealing with sexual pleasure without consent over the internet?&#13;
&#13;
8.	Responsible Disclosure Process&#13;
Coordinated vulnerability remediation with the German CERT-Bund&#13;
&#13;
9.	Ongoing/Similar Research&#13;
&#13;
Takeaways&#13;
Attendees are made aware that not a single category of devices in the internet of things is secure, no matter how obscure and outlandish the device might be. This should also raise attention and motivation to test all those devices that are already out there and handle the Internet of Things more cautiously.&#13;
Another important takeaway is to raise attention to how poorly programmed many IoT devices are and how it is still possible to discover vulnerability cases, which should be resolved and extinct. &#13;
Last but not least, we want to take the opportunity to discuss and raise attention to the hot topic of “remote rape” or how our current legislature deals with remote pleasuring without consent.&#13;
&#13;
Why this talk?&#13;
First and foremost, this talk will be a lot of fun while teaching the audience how to assess smart sex toys and penetrate their backends (pun intended). The audience will learn what an attacker is capable of when attacking smart sex toys, nowadays. Furthermore, the audience will get deep insights into Bluetooth LE penetration testing including a hands-on example on a selected smart sex toy.&#13;
Most of the identified vulnerabilities [1, 2, 3, 4] identified to this day include minor backend issues and or the good old exploitation of the Bluetooth LE protocol. The major difference compared to this research is, that the SEC Consult Vulnerability Lab identified a potential massive breach of data, including explicit images, clear text passwords, etc) via the “publicly” accessible database, as well as the issue with the remote pleasuring without consent, which is a so called “Feature”.&#13;
&#13;
[1] https://arstechnica.com/information-technology/2017/10/screwdriving-many-bluetooth-sex-toys-leave-users-vulnerable/&#13;
[2] https://internetofdon.gs/reports/&#13;
[3] https://www.pentestpartners.com/security-blog/screwdriving-locating-and-exploiting-smart-adult-toys/&#13;
[4] https://scubarda.wordpress.com/2017/10/17/hacking-a-bt-low-energy-ble-butt-plug/</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8352">Werner Schober</person>
        </persons>
        <links>
          <link href="https://sec-consult.com/en/blog/2018/02/internet-of-dildos-a-long-way-to-a-vibrant-future-from-iot-to-iod/index.html">IoD Blogpost</link>
        </links>
        <attachments/>
      </event>
      <event id="9941" guid="ea00d1e0-a580-415f-a8cf-f02883d939dc">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9941.html</url>
        <logo>/system/events/logos/000/009/941/large/images.png?1539641148</logo>
        <date>2018-12-29T23:50:00+01:00</date>
        <start>23:50</start>
        <duration>00:40</duration>
        <room>Borg</room>
        <slug>35c3-9941-how_facebook_tracks_you_on_android</slug>
        <title>How Facebook tracks you on Android</title>
        <subtitle>(even if you don’t have a Facebook account)</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>&lt;p&gt;In this talk, we’re looking at third party tracking on Android. We’ve captured and decrypted data in transit between our own devices and Facebook servers. It turns out that some apps routinely send Facebook  information about your device and usage patterns - the second the app is opened. We’ll walk you through the technical part of our analysis and end with a call to action: We believe that both Facebook and developers can do more to avoid oversharing, profiling and damaging the privacy of their users.&lt;/p&gt;</abstract>
        <description>&lt;p&gt;In this talk, we’re looking at third party tracking on Android. We’ve captured and decrypted data in transit between our own devices and Facebook servers. It turns out that some apps routinely send Facebook  information about your device and usage patterns - the second the app is opened. We’ll walk you through the technical part of our analysis and end with a call to action: We believe that both Facebook and developers can do more to avoid oversharing, profiling and damaging the privacy of their users.&lt;/p&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8626">Frederike Kaltheuner</person>
          <person id="8597">Christopher Weatherhead</person>
        </persons>
        <links>
          <link href="https://privacyinternational.org/types-abuse/facebook">Privacy International [Facebook Stories]</link>
          <link href="https://privacyinternational.org">Privacy International Website [Clearnet]</link>
          <link href="https://privacyintyqcroe.onion">Privacy International Website [onion]</link>
        </links>
        <attachments>
          <attachment href="/attachments/original/missing.png">file</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/716/original/How_Facebook_tracks_users_on_Android_%28even_if_they_don't_have_a_Facebook_account%29-3.pdf?1546118360">Slides</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
        </attachments>
      </event>
    </room>
    <room name="Clarke">
      <event id="9657" guid="4e6ab724-8663-456a-ac01-1cfdfc94c27f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9657.html</url>
        <logo/>
        <date>2018-12-29T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9657-from_zero_to_zero_day</slug>
        <title>From Zero to Zero Day</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>In this talk I will share my story of how in a little over a year, a high school student with almost zero knowledge in security research found his first RCE in Edge.</abstract>
        <description>After starting my BSc in CS and Math I picked up a new hobby: solving coding challenges. The next logical step was to try harder challenges, which lead me to participate in CTF competitions. During these CTFs I found that I’m fascinated by vulnerabilities: finding mistakes or things that developers failed to think through. This is how I started going down the rabbit hole. &#13;
&#13;
Fast forward a year later, I found my first 0-day, a critical RCE in Edge. To understand it, we will review the recent trend of JIT Type Confusion vulnerabilities in ChakraCore. I will talk about the vulnerability I found, explain how I discovered it and show similar vulnerabilities recently found by other researchers. Finally, I will demo a working exploit of this vulnerability. &#13;
&#13;
This session could be helpful both for people interested in getting into the security field, and for experienced security researchers who want to learn more about browser vulnerabilities and exploitation.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8362">Jonathan Jacobi</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/735/original/From_Zero_to_Zero_Day.pdf?1547555612">Slides</attachment>
        </attachments>
      </event>
      <event id="9664" guid="cf86e707-27a6-4839-a03f-438413e7756f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9664.html</url>
        <logo/>
        <date>2018-12-29T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9664-kosmische_teilchenbeschleuniger_und_ihre_spuren_in_der_antarktis</slug>
        <title>Kosmische Teilchenbeschleuniger und ihre Spuren in der Antarktis</title>
        <subtitle>Über die Identifikation des ersten kosmischen Teilchenbeschleunigers und den Beginn einer neuen Ära in der Multimessenger-Astronomie</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Vor 5.7 Milliarden Jahren emittierte der Blazar TXS0506+056 eine große Menge schwach wechselwirkender Neutrinos. Von dem durch ein supermassives schwarzes Loch im Zentrum seiner Galaxie angetriebenen kosmischen Teilchenbeschleuniger fand eines dieser Teilchen seinen Weg zur Erde und interagierte mit Wassermolekülen im antarktischen Eis. Durch einen glücklichen Zufall konnte das IceCube Neutrino Observatory, ein Kubikkilometer großer Detektor aus instrumentiertem Eis, am 22. September 2017 eine Lichtspur aufzeichnen, die direkt zur Quelle zurück zeigte. Damit konnte erstmals ein bekanntes astrophysikalisches Objekt mit dem Ursprung eines kosmischen Neutrinos assoziert werden und das Ereignis IceCube-170922A schrieb Geschichte. Ein näherer Blick auf die während 2014-2015 gesammelten Daten zeigte, dass die Neutrino-Emission von TXS0506+056 phasenweise erhöht ist. Dies unterstützt die These, dass das Ereignis von 2017 tatsächlich dem Blazar zugeordnet werden kann und die Entdeckung wurde zu einem großer Erfolg für die Multi-Messenger Astrophysik. </abstract>
        <description>Bereits 1912 entdeckte Viktor Hess die als kosmische Strahlen bekannten hochenergetischen Teilchen, die im Sekundentakt aus dem Weltall auf die Erdatmosphäre treffen. Einige von ihnen stammen aus unserer Sonne, andere von Quellen in unserer eigenen Galaxie – bei den höchsten Energien liegen die Ursprünge allerdings vermutlich in weit entfernten Galaxien. Unglücklicherweise handelt es sich größteils um geladene Ionen, die auf ihrem Weg durch das Universum durch Magnetfelder abgelenkt werden und nicht zu ihren Quellen zurückverfolgt werden können. Deswegen konnte in den mehr als 100 Jahren seit ihrer Entdeckung keine eindeutige Quelle extragalaktischer kosmischer Strahlen identifiziert werden.  &#13;
Trotz allem gibt es dort draußen Objekte, die winzige Teilchen mit den unvorstellbar geringen Massen von 10^-24g auf die Energie beschleunigen, mit der Rafael Nadal seine Tennisbälle aufschlägt. In irgendeiner Form müssen diese Objekte strahlen und neben kosmischen Strahlen auch andere Teilchen emittieren. Hier setzt die Idee von Multi-Messenger Astroteilchenphysik an: Bei der Untersuchung der energiereichsten Objekte unseres Universums werden zugleich Licht, Neutrinos und Gravitationswellen betrachtet, allesamt ungeladene Boten, die Informationen von den Quellen direkt zu unseren Detektoren tragen. Während 2017 Gravtitationswellen eines Gammastrahlenblitzes identifiziert werden konnten, war der diesjährige Durchbruch in der Multi-Messenger Astroteilchenphysik die Assoziation eines von IceCube detektierten Neutrinos mit einem bekannten Blazar in einer weit entfernten Galaxie. &#13;
&#13;
In diesem Vortrag erklären wir, was Menschen zum Bau komplexer Detektoren an den exotischsten Plätzen der Welt motiviert, um hochenergetische Teilchen aus dem Weltall zu jagen. Wir sprechen über die bahnbrechende Entdeckung diesen Jahres und beleuchten, wie der Durchbruch durch twitter-ähnliche Echtzeit-Monitoring-Systeme überhaupt erst möglich wurde.  &#13;
&#13;
5.7 billion years ago, the blazar TXS0506+056, a gigantic particle accelerator driven by the super-massive black hole at the center of its host galaxy, emitted a large number of weakly interacting elementary particles, known as neutrinos. One of these particles found its way to Earth and interacted with water molecules in the South-Antarctic Ice Sheet. Fortunately, the IceCube Observatory, a cubic kilometer of instrumented ice recorded a track of light that pointed directly back to its origin, unlike many other neutrinos captured in the past. This event, called IceCube-170922A writes history, since for the first time a concrete astrophysical object can be associated to the origin of this neutrino and thus the presence of strongly accelerated, interacting matter. A second look at the data recorded in 2014-2015 confirmed that the blazar has indeed periods of high-neutrino emission, strengthening the confidence in the 2017 event to be a real discovery and great success for Multi-Messenger Astrophysics.&#13;
&#13;
As discovered by Victor Hess already in 1912, there are particles impinging the Earth’s atmosphere every couple of seconds called Cosmic Rays. Some of them are accelerated in the sun, others by sources in our galaxy but at the highest energies, these particles are very likely coming from distant galaxies. Unfortunately, most of them are charged ions that are deflected by magnetic fields on their way through the universe and they do not point back to the point where they have been accelerated. Therefore, even 100 years after the discovery of cosmic rays a definite and obvious source has not been discovered. However, there is something out there that can accelerate a tiny particle with a mass as little as 10-24g (this is a number with !23! decimal zeros) to the energy equivalent to a tennis ball served by Rafael Nadal, then it must somehow shine and emit other radiation among the Cosmic Rays. This is the basic idea of multi-messenger astrophysics that aims to study the most violent objects in the universe by looking simultaneously at the emitted light, the neutrinos and the gravitational waves, which are all uncharged messengers carrying the information from the sources directly to our detectors. While n 2017, gravitational waves from a Gamma-Ray Burst were identified, this years major breakthrough in the field of multi-messenger astrophysics was the association  of a high energy neutrino detected by IceCube with a known blazar in a far away galaxy.  &#13;
&#13;
In this lecture, we will aim to explain what motivates mankind to build complex observatories at the most exotic location around the globe to haunt for very high energy particles from space. We will shed light on this brand new detection and highlight that without the recent developments in a real-time monitoring/Twitter-like system the detection would have gone unnoticed.&#13;
&#13;
Image / Video Credits &#13;
&#13;
Titelbild: NASA&#13;
B2	Uni Wien&#13;
B3	NASA&#13;
B4	CERN / LHC&#13;
B5	Auger Collaboration&#13;
B6	Sven Lafebre&#13;
B7	NASA&#13;
B8	 A. Fedynitch DESY&#13;
B9	IceCube Observatory&#13;
B10	freier-grafiker.de&#13;
B11 	IceCube Collaboration&#13;
B12	https://military.id.me/&#13;
B13	Argonne National Laboratory&#13;
B14	IceCube Collaboration&#13;
B15	IceCube Collaboration&#13;
B16	DESY (Renderbild)&#13;
B17	IceCube Collaboration&#13;
B18	IceCube Collaboration&#13;
B19	IceCube Collaboration&#13;
B20		Science Communication Lab und DESY (https://multimessenger.desy.de/ ) &#13;
B21		Science Communication Lab und DESY (https://multimessenger.desy.de/ )&#13;
&#13;
References&#13;
&#13;
R1	https://www.mpi-hd.mpg.de/hfm/HESS/public/vfHess.pdf (DE) ausführliche Diploma-Thesis&#13;
R2	https://arxiv.org/abs/1808.02927 Original-Paper inkl. Kommentare&#13;
R3	https://arxiv.org/abs/1701.07305 Proceedings on electron positron fluxes (AMS Coll. ) &#13;
R4	https://arxiv.org/abs/astro-ph/0609060 Auger Observatory &#13;
R5	https://arxiv.org/abs/1502.01323 ausführliche Detektorbeschreibung&#13;
R6	https://arxiv.org/abs/1604.03637 AugerPrime Design Report, ohne AERA Radio Det.	&#13;
R7	https://arxiv.org/abs/1311.7346  Galactic Cosmic Rays Review&#13;
R8	https://arxiv.org/abs/1804.02331 Galactic CR from young massive stars&#13;
R9	https://arxiv.org/abs/0711.2256 2008 Correlation of UHECR with AGN (Auger Coll.)&#13;
R10	https://arxiv.org/abs/1709.07321	2017 large scale UHECR anisotropy (Auger Coll.)&#13;
R11	https://arxiv.org/abs/0812.3809 High Energy Neutrino Detectors overview&#13;
R12	https://arxiv.org/abs/1412.5106 IceCube Gen2&#13;
R13 	https://arxiv.org/abs/1607.02671 PINGU IceCube&#13;
R14	https://arxiv.org/abs/1612.05093 IceCube Instrumentation and Online Systems (DOM)  &#13;
R15	http://science.sciencemag.org/content/342/6161/1242856.full (https://arxiv.org/abs/1311.5238 )&#13;
R16	https://arxiv.org/abs/1805.11112  Neutrino Astronomy focus IceCube&#13;
R17 	http://science.sciencemag.org/content/361/6398/eaat1378 (open access: https://arxiv.org/abs/1807.08816 ) 	&#13;
R18	http://science.sciencemag.org/content/361/6398/147 (open access: https://arxiv.org/abs/1807.08794 )&#13;
R19	  https://arxiv.org/abs/1807.04275 modeling TXS2&#13;
R20 	http://adsabs.harvard.edu/abs/1993ARA%26A..31..473A AGN Unification scheme 1993&#13;
R21	https://arxiv.org/abs/1107.5576 AGN UHECR&#13;
R22	https://arxiv.org/abs/1812.05939 Historical flare conventional models &#13;
R23	https://arxiv.org/abs/1809.00601 Gas - Jet interaction model for historical flare 	&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7409">Anni</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/733/original/Teilchenbeschleuniger_Antarktis.pdf?1546468006">Presentation</attachment>
        </attachments>
      </event>
      <event id="9648" guid="e66cded3-7336-42bd-a7c8-d77073465ad2">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9648.html</url>
        <logo>/system/events/logos/000/009/648/large/CCC_title.jpg?1539521954</logo>
        <date>2018-12-29T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9648-micropython_python_for_microcontrollers</slug>
        <title>MicroPython – Python for Microcontrollers</title>
        <subtitle>How high-level scripting languages make your hardware project beautifuly easy</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>MicroPython is a lean and efficient implementation of the Python 3 programming language that includes a small subset of the Python standard library and is optimised to run on microcontrollers and in constrained environments.&lt;br&gt;&#13;
This talk will give an overview about the MicroPython hard- and software and introduces the community.</abstract>
        <description>MicroPython is an Open Source project and developed in the open on GitHub. With more than 7000 stars, it ranks in the top 100 of the most popular C/C++ projects.&lt;br&gt;&#13;
The MicroPython pyboard is a compact electronic circuit board that runs MicroPython on the bare metal, giving you a low-level Python operating system that can be used to control all kinds of electronic projects.&lt;br&gt;&#13;
MicroPython is packed full of advanced features such as an interactive prompt, arbitrary precision integers, closures, list comprehension, generators, exception handling and more. Yet it is compact enough to fit and run within just 256k of code space and 16k of RAM.&lt;br&gt;&#13;
MicroPython aims to be as compatible with normal Python as possible to allow you to transfer code with ease from the desktop to a microcontroller or embedded system.&lt;br&gt;&#13;
It's used by educators, makers and professional hard- and software developers around the world. The use cases reach from embedded hardware testing over Industrial Internet of Things into space applications.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8135">Christine Spindler</person>
        </persons>
        <links>
          <link href="micropython.org">MicroPython Website</link>
          <link href="github.com/micropython">MicroPython on Git</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/686/original/MP_CCC_talk.pdf?1546076871">Slides for MicroPython talk</attachment>
        </attachments>
      </event>
      <event id="9346" guid="7ee42591-4f4d-481d-884b-44f5e18e1803">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9346.html</url>
        <logo>/system/events/logos/000/009/346/large/russiancard.png?1545036658</logo>
        <date>2018-12-29T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>00:40</duration>
        <room>Clarke</room>
        <slug>35c3-9346-in_soviet_russia_smart_card_hacks_you</slug>
        <title>In Soviet Russia Smart Card Hacks You</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The classic spy movie hacking sequence: The spy inserts a magic smart card provided by the agency technicians into the enemy's computer, … the screen unlocks … What we all laughed about is possible!</abstract>
        <description>Smartcards are secure and trustworthy. This is the idea smart card driver developers have in mind when developing drivers and smart card software. The work presented in this talk not only challenges, but crushes this assumption by attacking drivers using malicious smart cards.&#13;
&#13;
We will present a fuzzing framework for *nix and Windows along with some interesting bugs found by auditing and fuzzing smart card drivers and middleware. Among them classic stack and heap buffer overflows, double frees, but also a replay attack against smart card authentication.&#13;
&#13;
Since smart cards are used in the authentication process, a lot of vulnerabilities can be triggered by an unauthenticated user, in code running with high privileges. During the author's research, bugs were discovered in OpenSC (EPass, PIV, OpenPGP, CAC, Cryptoflex …), YubiKey drivers, pam_p11, pam_pkc11, Apple's smartcard-services and others.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8085">Eric Sesterhenn</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/512/original/DEFCON-26-Eric-Sesterhenn-Soviet-Russia-Smartcard-Hacks-You.pdf?1539367610">Defcon Slides</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/721/original/slides.pdf?1546148332">35C3 Slides</attachment>
        </attachments>
      </event>
      <event id="9674" guid="089b7fec-3ee1-493c-9b90-782c0514ffb4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9674.html</url>
        <logo/>
        <date>2018-12-29T17:10:00+01:00</date>
        <start>17:10</start>
        <duration>00:40</duration>
        <room>Clarke</room>
        <slug>35c3-9674-domain_name_system</slug>
        <title>Domain Name System</title>
        <subtitle>Hierarchical decentralized naming system used since 30 years</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Whenever you enter a name into your computer, it resolves it to a numerical IP address. This resolution uses the Domain Name System (DNS), which is a hierarchical decentralised naming system used on the Internet. DNS is organised in a way that top-level domain (e.g. .com, .org) are delegated to registrars, which delegate subdomains (e.g. foo.com). This delegation is done as well via the DNS protocol via nameserver (NS) records. Since different types of data are kept in DNS, it can as well be seen as a distributed (and cached!) key-value store - which is fault-tolerant.&#13;
&#13;
I will explain the basic usage of DNS, including stub and recursive resolver, server, various protocol extensions (zone transfer, dynamic updates, authentication, notifications, ...), privacy extensions (query path minimisation, DNS-over-TLS), provisioning let's encrypt certificates. I will talk about attacks (poisoning, amplification, ...) and implementation pitfalls (not get stuck in the recursive resolver). I implemented DNS with above mentioned extensions as minimized MirageOS unikernels over past years.</abstract>
        <description>DNS is used since 1985 for the Internet, and provides useful service for various protocols. Its initial design could not foresee its wide usage 30 years later. DNS is a core dependency of today's Internet usage. Within the &lt;a href="https://mirage.io"&gt;MirageOS&lt;/a&gt; project we re-develop network protocols, and I was eager to learn about all the details of DNS, a protocol which has been around and will be around for more time since a lot of systems depend on it.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="1626">Hannes Mehnert</person>
        </persons>
        <links>
          <link href="https://hannes.nqsb.io/Posts/DNS#What-is-DNS">Re-engineering DNS (blog)</link>
          <link href="https://github.com/roburio/udns">µDNS implementation</link>
          <link href="https://mirage.io">MirageOS</link>
        </links>
        <attachments/>
      </event>
      <event id="9483" guid="955e9c12-cd90-4f48-88f0-b879269a5421">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9483.html</url>
        <logo/>
        <date>2018-12-29T18:10:00+01:00</date>
        <start>18:10</start>
        <duration>00:40</duration>
        <room>Clarke</room>
        <slug>35c3-9483-web-based_cryptojacking_in_the_wild</slug>
        <title>Web-based Cryptojacking in the Wild</title>
        <subtitle>When your browser is mining coins for other people</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>A cryptojacking website abuses the computing resources of its visitors to covertly mine for cryptocurrencies in the browser. In this talk, we explore this phenomenon and answer, amongst others, the following questions: How does the mining script work under the hood? How common is this attack? How much money do the attackers earn? And how can I defend myself against such attacks?</abstract>
        <description>With the introduction of memory-bound cryptocurrencies, such as Monero, the implementation of mining code in browser-based JavaScript has become a worthwhile alternative to running dedicated mining rigs. Based on this technology, a new form of parasitic computing, widely called cryptojacking, has gained momentum in the web.&#13;
&#13;
In this talk, we systematically explore this phenomenon: To begin with, we demonstrate how modern web technologies are used to create an efficient miner solely in JavaScript. We then present our methodology on how to identify mining scripts on real websites at scale, which we use for a study on the Alexa top 1 million websites. In particular, we perform several secondary analyses to gain insight into the cryptojacking landscape, including a measurement of code characteristics, an estimate of expected mining revenue, and an evaluation of current blacklist-based countermeasures.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5643">Marius Musch</person>
        </persons>
        <links>
          <link href="https://arxiv.org/pdf/1808.09474.pdf">Technical Report</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/720/original/cryptojacking.pdf?1546124881">Slides</attachment>
        </attachments>
      </event>
      <event id="9385" guid="1d9c1120-c076-4802-b95b-f35d8396638b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9385.html</url>
        <logo>/system/events/logos/000/009/385/large/publicdomainq-scientist-Isaac_Newton.png?1537050277</logo>
        <date>2018-12-29T19:10:00+01:00</date>
        <start>19:10</start>
        <duration>00:40</duration>
        <room>Clarke</room>
        <slug>35c3-9385-modeling_and_simulation_of_physical_systems_for_hobbyists</slug>
        <title>Modeling and Simulation of Physical Systems for Hobbyists</title>
        <subtitle>Essential Tools for Developing, Testing and Debugging Systems Interacting with the Real World</subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This is a foundations talk about modeling and simulation as tools for development, testing and debugging systems. It requires very little previous knowledge to address all makers and hobbyists interested in creating or modifying hardware that physically interacts with its environment (e.g. robots, drones, etc.). It explains the purpose of modeling and simulation, basic principles, and tips and tricks on a practical level.</abstract>
        <description>During the development of robots, drones or other machines, the individual components are usually not all available at the same time, but are developed and tested separately and then assembled to the final system. Thus, it is often useful to have a placeholder that acts just like the missing components that are not present. Or, for debugging, it might be useful to have a reference configuration, which is known to work, in order to exclude potential sources of error. On the other side, it might be helpful to artificially recreate errors to test the system for robustness to these errors without risking real hardware. This is where modeling and simulation are useful tools to make the development faster and less error-prone.&#13;
&#13;
This talk explains basic modeling and simulation techniques that help even for small project, how to model the physical effects encountered most frequently and to make a simulation of the created model run in a simple way. All examples will be held as practical as possible for community projects, relying only on common hardware and open-source software, in order to make them useful for a broad audience.&#13;
&#13;
Bring your computer with Gnumeric, Python and OMEditor installed to follow the examples, if you want.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8168">Manuel Aiple</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/643/original/interactiverobot.zip?1545914780">Self-balancing robot simulator example</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/644/original/drop-with-drag.gnumeric?1545914880">Drop with drag example</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/645/original/mass-spring-damper.gnumeric?1545914880">Mass spring damper example</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/646/original/electric-motor.gnumeric?1545914880">Electric motor example</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/659/original/script.pdf?1545942710">Script to the talk</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/660/original/slides.pdf?1545942957">Slides to the talk</attachment>
        </attachments>
      </event>
      <event id="9765" guid="35e80689-6330-49fe-b5c5-46972418f5b6">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9765.html</url>
        <logo/>
        <date>2018-12-29T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9765-remo2hbo_-robustes_und_reparierbares_vitalparametermonitoring</slug>
        <title>Remo2hbo -Robustes und reparierbares Vitalparametermonitoring</title>
        <subtitle>Medizingeräte für Alle </subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Moderne Medizintechnik ist teuer und wenn sie kaputt geht, dann kann man sie normalerweise nur durch Servicetechnikerinnen austauschen lassen. Designkriterien orientieren sich an den Gesundheitsversorgung reicher Länder. Wir stellen ein System zur Messung der wichtigsten Vitalparameter vor, das nicht nur open source und frei, sondern auch für den off-road Einsatz ausgelegt ist, wenn die Servicehotline nicht erreichbar ist. </abstract>
        <description>Medizinische Versorgung orientiert sich immer stärker an ökonomischen Aspekten und das gilt auch für Medizingeräte. Insbesondere werden sie für Industrieländer entwickelt. Wie bei Laptops und Smartphones geht der Trend zu unreparierbaren Einmalgeräten. Was aber, wenn man als kleine NGO mit wenig Geld mit dem mobilen Krankenhaus im Krisengebiet ist oder eine Gesundheitsstation in Kirgisien aufbaut? Da hilft dann auch die gutgemeinte Spende von alten Medizingeräten nicht so richtig viel weiter und endet schnell als Elektroschrott. Mit dem Anspruch, dass Medizinische Versorgung überall möglich sein muss und Gesundheit keine Ware ist, bauen wir einen Vitalparametermonitor, der sowohl hard- als auch softwaremäßig open source ist und möglichst robust und reparierbar ist. Im Rahmen des Talks wollen wir Euch die wichtigsten Designkriterien, unsere Tests mit "herkömmlichen" kommerziellen Systemen und unsere Hard- und Softwarelösungen vorstellen und mit Euch disktutieren. Wenn alles läuft wie geplant, gibt es sogar schon Lötkits des Prototypen zum Selbstkostenpreis... &#13;
&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8571">Dagmar Krefting</person>
          <person id="6404">Sebastian Jünemann</person>
        </persons>
        <links>
          <link href="http://remo2hbo.f4.htw-berlin.de/">remo2hbo-Projekt</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/697/original/35C3_remo2hbo.pdf?1546092198">35C3_remo2hbo.pdf</attachment>
        </attachments>
      </event>
      <event id="9972" guid="400622c5-3754-43fd-aaf3-0ca00e9ad551">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9972.html</url>
        <logo>/system/events/logos/000/009/972/large/cellular-tower.jpg?1545130749</logo>
        <date>2018-12-29T22:10:00+01:00</date>
        <start>22:10</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9972-funkzellenabfrage_die_alltagliche_rasterfahndung_unserer_handydaten</slug>
        <title>Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten</title>
        <subtitle>Wie wir alle regelmäßig den Behörden ins Netz gehen und wie man immerhin mehr Transparenz schaffen kann</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Polizei und Geheimdienste sammeln per "Funkzellenabfrage" Tag für Tag Millionen von Standort-Daten. Netzbetreiber liefern den Behörden regelmäßig Datensätze aller Mobilfunknummern, die zu einem bestimmten Zeitpunkt in bestimmten Funkzellen waren. Entgegen den gesetzlichen Bestimmungen erfahren Betroffene nicht davon.</abstract>
        <description>Dieser Talk macht deutlich, was diese Form der Massenüberwachung aus bürgerrechtlicher Sicht bedeutet. Danach stellen die Speaker das Berliner Funkzellenabfragen-Transparenz-System vor, das zumindest ein wenig Licht ins Dunkel dieser Überwachungsmaßnahmen bringen kann.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="3723">Ulf Buermeyer</person>
          <person id="5764">Andre Meister</person>
        </persons>
        <links>
          <link href="https://fts.berlin.de/">Funkzellenabfragen-Transparenz-System des Landes Berlin</link>
        </links>
        <attachments/>
      </event>
      <event id="9943" guid="fb15f53a-ca5b-4c29-b901-89398e9aab72">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9943.html</url>
        <logo>/system/events/logos/000/009/943/large/grafik.jpg?1539640858</logo>
        <date>2018-12-29T23:30:00+01:00</date>
        <start>23:30</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9943-afdwegbassen_protest_club-_kultur_und_antifaschistischer_widerstand</slug>
        <title>#afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand</title>
        <subtitle>Über kreative Organisation, poltische Aktionen und das Bedürfnis nach vernetztem Aktivismus</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Im Mai 2018 initiierte Reclaim Club Culture (RCC) in Berlin einen Protest gegen einen Aufmarsch der AfD und die AFDsierung der Gesellschaft. Zusammen mit mehr als 170 Techno Clubs, Festivals und Veranstalter*innen organisierten wir innerhalb von zwei Wochen drei Demozüge, auf denen sich mehr als 60.000 Demonstrant*innen versammelten. Dies ereignete sich in einem politischen Klima, in dem die Linke von den Erfolgen der Faschist*innen wie gelähmt schien und ein großer Teil der Gesellschaft immer weiter nach rechts abdriftete. Ausgehend von einer selbstkritischen Praxis werden wir der Frage nachgehen, wie und warum dies (scheinbar) plötzlich gelang. </abstract>
        <description>Dieser Impuls war Teil einer Mobilisierung, die in 2018 - zumindest was Großdemos angeht - insgesamt wieder ein wenig Hoffnung macht. Gleichzeitig stellt sich die Frage, wie wir unsere Straßenmobilisation stärker in den gesellschaftlichen Alltag tragen. Auf keinen Fall dürfen wir trotz unserer Paar Erfolge vergessen, wie es unter anderem in Ellwangen und Chemnitz aussieht und dass global und in Europa gerade wieder ein vermehrtes Aufkommen faschistischer Regierungen Realität ist.&#13;
Mit den entsprechenden Folgen für die dort lebenden Menschen.&#13;
Derzeit arbeiten wir an Organisationsstrukturen, wie Infrastruktur, Kommunikation, Netzwerken und Sicherheit, die weitere politische Aktivitäten unterstützen sollen. Während dieser Arbeit und der Durchführung von weiteren Aktionen blieben einige Fragestellungen innerhalb dieser Felder unbeantwortet. Einer der größten Unterstützer*innenkreise der Aktion war der wohl älteste Club Berlins: der CCC.&#13;
Wir werden unsere gegenwärtigen Ansätze vorstellen, untersuchen und daran die Frage knüpfen, wie durch die Hackercommunity der digitale Raum als Unterstützung im Kampf gegen Faschismus besser aktiviert werden kann. Ziel dabei ist gemeinsam ein anderes, vielleicht gar neues Level von Aktivismus zu erreichen. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8570">Reclaim Club Culture</person>
          <person id="8767">Rosa Rave</person>
          <person id="8768">Rosa Rave*</person>
        </persons>
        <links>
          <link href="https://twitter.com/MenschMeier4/status/996775769664868352">Aufruf Tweet zu #afdwegbassen</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Dijkstra">
      <event id="9517" guid="064a7014-a88c-462a-b06f-7d6de62d622f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9517.html</url>
        <logo/>
        <date>2018-12-29T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9517-provable_security</slug>
        <title>Provable Security</title>
        <subtitle>How I learned to stop worrying and love the backdoor</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Modern cryptography is based on security-proofs. We will demonstrate how these work, why they are desirable and what their limitations are.</abstract>
        <description>&lt;p&gt;Even the use of secure primitives like AES or RSA does not guarantee that the end-result is secure as well. In recent years breaks of modern primitives have in fact become exceedingly rare, yet stories like the KRACK-attack or ROBOT keep appearing.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;The obvious answer to these problems would be to proof that our protocols are secure. While that may sound great in theory, there are many issues as well:&lt;/p&gt;&#13;
&#13;
&lt;ul&gt;&#13;
&lt;li&gt;Proving (almost) anything secure, would require to solve a millennium-problem.&lt;/li&gt;&#13;
&lt;li&gt;Given the above, assumptions are required; but which assumptions are reasonable?&lt;/li&gt;&#13;
&lt;li&gt;The word “secure” may seem intuitive, but can we formally define it? And can something be &lt;em&gt;too&lt;/em&gt; secure?&lt;/li&gt;&#13;
&lt;li&gt;Idealizing primitives can solve many problems, but what about over-idealizations?&lt;/li&gt;&#13;
&lt;li&gt;Can backdoors be necessary to prove security?&lt;/li&gt;&#13;
&lt;li&gt;A proof can only show the absence of attacks in a certain model. What about attacks outside those models?&lt;/li&gt;&#13;
&lt;/ul&gt;&#13;
&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8345">FJW</person>
          <person id="8350">Lukas</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/689/original/slides.pdf?1546084427">Final slides</attachment>
        </attachments>
      </event>
      <event id="9670" guid="64d3f3f5-5665-4050-ba15-0db530ecc262">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9670.html</url>
        <logo/>
        <date>2018-12-29T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9670-safe_and_secure_drivers_in_high-level_languages</slug>
        <title>Safe and Secure Drivers in High-Level Languages</title>
        <subtitle>How to write PCIe drivers in Rust, go, C#, Swift, Haskell, and OCaml</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Drivers are usually written in C for historical reasons, this can be bad if you want your driver to be safe and secure. We show that it is possible to write low-level drivers for PCIe devices in modern high-level languages.&#13;
We are working on super-fast user space network drivers for the Intel 82599ES (ixgbe) 10 Gbit/s NICs in different high-level languages. We've got fully working implementations in Rust, C#, go, OCaml, Haskell, and Swift. All of them are written from scratch and require no kernel code.&#13;
&#13;
Check out &lt;a href="https://github.com/ixy-languages/ixy-languages"&gt;our GitHub page&lt;/a&gt; with links to all implementations, performance measurements, and publications for further reading.</abstract>
        <description>Supposedly modern user space drivers (e.g., DPDK or SPDK) are still being written in C in 2018 :(&#13;
&#13;
This comes with all the well-known drawbacks of writing things in C that might be prevented by using safer programming languages.&#13;
Also, did you ever see a kernel panic because a driver did something stupid? It doesn't have to be that way, drivers should not be able to take down the whole system.&#13;
&#13;
There are three steps to building better drivers:&#13;
&#13;
1. Write them in a safer programming language eliminating whole classes of bugs and security problems like bad memory accesses&#13;
&#13;
2. Isolating them from the rest of the operating system: user space drivers that drop privileges&#13;
&#13;
3. Isolating the hardware using the IOMMU&#13;
&#13;
&#13;
We show that it is possible to achieve all of these goals for PCIe drivers on Linux by implementing user space network drivers in all of the aforementioned programming languages. Our techniques are transferable to other drivers that would benefit from more modern implementations. &#13;
&#13;
Our drivers in &lt;a href="https://github.com/ixy-languages/ixy.rs"&gt;Rust&lt;/a&gt;, &lt;a href="https://github.com/ixy-languages/ixy.cs"&gt;C#&lt;/a&gt;, &lt;a href="https://github.com/ixy-languages/ixy.go"&gt;go&lt;/a&gt;, and &lt;a href="https://github.com/ixy-languages/ixy.swift"&gt;Swift&lt;/a&gt; are completely finished, tuned for performance, evaluated, and benchmarked. And all of them except for Swift are about 80-90% as fast as &lt;a href="https://github.com/emmericp/ixy"&gt;our user space C driver&lt;/a&gt; and 6-10 times faster than the kernel C driver. We also investigate how garbage collectod languages affects the latency of a packet forwarder built on top of our drivers.&#13;
&#13;
We also got something for fans of functional languages: our implementations in &lt;a href="https://github.com/ixy-languages/ixy.ml"&gt;OCaml&lt;/a&gt; and &lt;a href="https://github.com/ixy-languages/ixy.hs"&gt;Haskell&lt;/a&gt; are working but not yet tuned for performance. We are also working on Python, Java, and Javascript.&#13;
We take a brief look at Haskell, Swift, OCaml, and C# in the talk and a deeper dive into Rust and Go.&#13;
&#13;
The talk also features a quick summary from &lt;a href="https://media.ccc.de/v/34c3-9159-demystifying_network_cards"&gt;last year's talk about user space driver basics&lt;/a&gt;, so no previous knowledge is required.&#13;
&#13;
&#13;
Another thing to take away from this talk is: writing drivers is neither scary nor hard. You can write one in your favorite programming language, so go ahead and try that :)&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7808">Paul Emmerich</person>
          <person id="8772">Simon Ellmann</person>
          <person id="8808">Sebastian Voit</person>
        </persons>
        <links>
          <link href="https://media.ccc.de/v/34c3-9159-demystifying_network_cards">Talk about the basics of user space drivers</link>
          <link href="https://github.com/ixy-languages/ixy-languages">Project page on GitHub with further links</link>
        </links>
        <attachments/>
      </event>
      <event id="9671" guid="25c54ce3-598c-42ee-8832-52fe9deae7ad">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9671.html</url>
        <logo/>
        <date>2018-12-29T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9671-self-encrypting_deception</slug>
        <title>Self-encrypting deception</title>
        <subtitle>weaknesses in the encryption of solid state drives (SSDs)</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>&lt;p&gt;We have analyzed the hardware full-disk encryption implementation of several Self-Encrypting Drives (SEDs) from Samsung and Crucial (Micron) by reverse engineering their firmwares. The vendors combined cover a majority of the market share of SEDs sold today.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;In theory, the security guarantees offered by hardware encryption are similar to those of software implementations. In reality, we found that many hardware implementations have critical security weaknesses, for many models allowing for complete recovery of the data without knowledge of any secret.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;BitLocker, the encryption software built into Microsoft Windows will rely exclusively on hardware full-disk encryption if the drive advertises supported for it. Thus, for these drives, data protected by BitLocker is also compromised.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;This challenges the view that full-disk encryption implemented in hardware is preferable over software. We conclude that one should not rely solely on hardware encryption offered by SEDs.&lt;/p&gt;</abstract>
        <description>&lt;p&gt;In recent years, protection of sensitive data has received increased attention.&#13;
Protection of digital data has become a necessity, certainly in the light of new European Data Protection Regulation. Technically, encryption is the go to protection mechanism; it may be implemented in software or hardware (or both). It can be applied on the level of individual files, or the entire drive, which is called full-disk encryption. Full-disk encryption is often the solution of choice as it takes away concerns of sensitive data leakage through, for example, temporary files, page files and caches. Several software solutions for full-disk encryption exist, and modern operating systems typically integrate it as a feature. However, purely software-based encryption has inherent weaknesses, such as the encryption key being present in RAM at all times and performance drawbacks.&lt;/p&gt;&#13;
&#13;
&lt;p&gt;In an attempt to address these weaknesses, hardware full-disk encryption is often proposed; the encryption is performed within the drive itself, thereby confining the encryption key exclusively to the drive. Typically, the encryption itself is performed by a dedicated AES co-processor, whereas the software on the drive (firmware) takes care of the key management. It is often regarded as the successor of software full-disk encryption. Full-disk encryption software, including those integrated in modern operating systems, may autonomously decide to rely solely on hardware encryption in case it is supported by the storage device (via the TCG Opal standard). In case the decision is made to rely on hardware encryption, software encryption is disabled. In fact, BitLocker, the full-disk encryption software built into Microsoft Windows, switches off software encryption and completely relies on hardware encryption by default if the drive advertises support.&lt;/p&gt;</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8308">Carlo Meijer</person>
        </persons>
        <links>
          <link href="http://www.cs.ru.nl/~cmeijer/">Author homepage</link>
          <link href="https://www.ru.nl/english/news-agenda/news/vm/icis/cyber-security/2018/radboud-university-researchers-discover-security/">Public Statement</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/616/original/draft-paper_1.pdf?1541600497">Draft Paper</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/684/original/presentation.pdf?1546031613">Slides</attachment>
        </attachments>
      </event>
      <event id="9400" guid="e77ef54a-5dd7-4be1-80c7-42726b273e6f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9400.html</url>
        <logo>/system/events/logos/000/009/400/large/matrix_logo.png?1537273042</logo>
        <date>2018-12-29T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9400-matrix_the_current_status_and_year_to_date</slug>
        <title>Matrix, the current status and year to date</title>
        <subtitle/>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Matrix is an open standard for communication over the Internet. I will talk about the matrix standard, both the technical implementation and the reasons for its creation. We will focus on the changes and progress that has been made in the previous year, particularly getting the specification out of beta, and the growth of the ecosystem. Finally, the Matrix environment continues to develop, and we’ll look at the roadmap for the future.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8193">Ben Parsons from Matrix</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/700/original/2018-12-29_Matrix_35c3.pdf?1546093857">Matrix Slides</attachment>
          <attachment href="/attachments/original/missing.png">file</attachment>
        </attachments>
      </event>
      <event id="9804" guid="9f27a4c2-f957-4bad-81a8-988a37429d5c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9804.html</url>
        <logo>/system/events/logos/000/009/804/large/s_einkaufswagen_tr.png?1542150721</logo>
        <date>2018-12-29T17:10:00+01:00</date>
        <start>17:10</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9804-die_hauser_denen_die_darin_wohnen</slug>
        <title>Die Häuser denen, die darin wohnen!</title>
        <subtitle>Langfristig bezahlbares, gemeinsames „Mieteigentum“ schaffen – 	auch ohne Banken</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Wir wenden uns gegen Gentrifizierung, Luxussanierung und Spekulation mit Häusern. Das Mietshäuser Syndikat ist ein bundesweiter Verbund linker, selbstverwalteter Hausprojekte mit dem Ziel der Initiierung und dauerhaften Erhaltung von gemeinschaftlich genutztem und bezahlbarem Wohn- und Gewerberaum. Der Grundgedanke: Gemeineigentum wird geschaffen und dauerhaft dem Markt entzogen. Die Mieter*innen sind zugleich Besitzer*innen ohne private Gewinnerzielungsabsichten, sie transferieren Knowhow und oft auch Direktkredite an andere Hausprojekte.</abstract>
        <description>In einer Zeit, in der Mieten teilweise die Hälfte des Einkommens verschlingen, wollen wir mit unserer Idee des Mietshäuser Syndikats (MHS) dagegenhalten. Jedes Haus eines MHS-Hausprojektes wird dabei Gemeineigentum, die aktuellen Mieter*innen sind damit auch ihre eigenen Vermieter*innen. Das MHS beruht auf drei Grundpfeilern: Die Gruppen müssen sich selbst organisieren, sie müssen in einen Solidarfonds zur Initialisierung weiterer Hausprojekte einzahlen, und sie dürfen "ihr" Haus nie mehr verkaufen. Die einzelnen Hausprojekte agieren wirtschaftlich eigenständig, der Dachverband (das MHS) hält jedoch Besitzanteile an allen Hausprojekten und hat damit ein Vetorecht bei Verkaufsabsichten. Solvente Hausprojekte fungieren zudem intern oft als Direktkreditgeber mit dem Ziel, die Abhängigkeit von kommerziellen Bankkrediten erheblich zu reduzieren bzw. sie langfristig komplett obsolet zu machen. Die Mieten werden nur soweit erhöht, dass die laufenden Kosten gedeckt werden können. So entstehen bezahlbare Wohnräume und Räume für soziale und politische Initiativen – auch in Städten, in denen Mieten mittlerweile unerschwinglich geworden sind.&#13;
&#13;
Derzeit gibt es 133 MHS-Hausprojekte, in Frankreich, Österreich und den Niederlanden entstehen nach modifiziertem Modell eigene Syndikate und es gibt weltweit Beratungsanfragen. Die Hausprojekte sind in ihrer Vielfalt sehr unterschiedlich, von reinen Wohn- bis hin zu reinen Gewerbehäusern ist alles vorhanden. Oft gibt es Räume für Veranstaltungen oder Treffen von sozialen Gruppen und politischen Initiativen. Das MHS beschränkt sich auf die Organisation von Hausprojekten, denkbar wären auch andere Syndikatsideen wie z.B. Ackerland- und Wagenburgsyndikate oder lokale Energieerzeugersyndikate.&#13;
&#13;
Die anschließende Diskussion beleuchtet Synergien von MHS und CCC, teils am Beispiel des CCC Freiburg, der seit einem Jahr seine Clubräume in einem solchen MHS-Hausprojekt hat und so zum MHS-Mitglied wurde. &#13;
Das MHS benötigt wachstumsbedingt Unterstützung bei der Einrichtung von Tools für Kommunikation, Organisation und Entscheidungsfindung, aber auch bei neuen Partizipationsformen an (teils länder- und sprachübergreifenden) Projekten oder Veranstaltungen, bei denen nur noch ein Teil der Teilnehmer*innen vor Ort ist und die übrigen digital mitwirken. Die Hausprojekte profitieren von freier Kommunikation in digitalen Datennetzen, wie es beispielsweise reudnetz oder freifunk anbieten. Die regionalen CCC-Verbände wiederum finden bezahlbare Clubräume in den Hausprojekten. Eine Zusammenarbeit auf politischer Ebene könnte genutzt werden, um gemeinsamen Kampagnen mehr Durchschlagskraft zu geben. Ganz konkret werden Projekte gegen Rechts immer notwendiger.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8342">Elke Manz</person>
          <person id="6469">fuzzle/fr</person>
          <person id="8737">Schmidt</person>
          <person id="8750">Lina Hurlin</person>
        </persons>
        <links>
          <link href="http://das-ist-unser-haus.de/">Das ist unser Haus (Film cc)</link>
          <link href="https://www.syndikat.org/">Mietshäuser Syndikat</link>
        </links>
        <attachments/>
      </event>
      <event id="9898" guid="020051ff-2594-46ce-b92a-0786743e4624">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9898.html</url>
        <logo>/system/events/logos/000/009/898/large/mehr_slecht_als_recht.png?1546616089</logo>
        <date>2018-12-29T18:10:00+01:00</date>
        <start>18:10</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9898-mehr_schlecht_als_recht_grauzone_sicherheitsforschung</slug>
        <title>Mehr schlecht als Recht: Grauzone Sicherheitsforschung</title>
        <subtitle/>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Reverse Engineering zum Aufspüren von Schwachstellen ist gängige Praxis. Umso überraschender kam für 2 Forschungsteams die Abmahnung durch Rechtsanwälte eines Herstellers. Sie hatten Schwachstellen aufgedeckt und damit, so der Hersteller, seine Rechte verletzt. Vorwurf? Vom Verstoß gegen das Urheberrecht bis zum Verrat von Geschäftsgeheimnissen war alles dabei.&#13;
Nach hunderten Seiten an Schriftsätzen, einem zurückgehaltenen Paper sowie 7 Stunden Marathon-Prozess konnte ein Vergleich geschlossen werden, bei dem wir mit einer Verpflichtung zum Responsible Disclosure davon kamen - die Kernfragen bleiben jedoch offen: Welche Teile des Reverse Engineering sind rechtswidrig? Verstößt Reversing auch zum Zwecke der IT-Sicherheitsforschung gegen das Urheberrechtsgesetz? Was schützt in Zukunft Sicherheitsforscher vor rechtlichen Schritten des Herstellers? Wie können sich Unternehmen verhalten und welche Abwägungen müssen vor der Veröffentlichung getroffen werden? &#13;
Wir berichten vom Ablauf eines solchen Prozesses inklusive Anekdoten, weisen auf die Unklarheiten in geltendem Recht hin und schaffen ein Bewusstsein für die Problematik.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8453">domenukk</person>
          <person id="8782">Fabian Franzen</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/723/original/35c3_MehrSchlechtAlsRecht_.pdf?1546179919">Slides</attachment>
        </attachments>
      </event>
      <event id="9573" guid="07f5d97a-161c-4435-abad-6ef08107df15">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9573.html</url>
        <logo>/system/events/logos/000/009/573/large/chain0.png?1545670378</logo>
        <date>2018-12-29T19:10:00+01:00</date>
        <start>19:10</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9573-a_blockchain_picture_book</slug>
        <title>A Blockchain Picture Book</title>
        <subtitle>Blockchain origins and related buzzwords, described in pictures.</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Where is the blockchain, how long is it, and what does it have to do with cryptography? And is it really something completely new? I spent a lot of time in pubs explaining to people what this blockchain hype is all about. It turns out that the best way to do that is to use images - literally.&#13;
The idea behind this talk is to give you a rough understanding of the scientific background  behind the Blockchain technology.</abstract>
        <description>We make a short excursion into the field of distributed computing where we gain a rough understanding of the origins behind this technology - in a most abstract way.&#13;
We explore how different kinds of Blockchains are formed and what kind of properties we may achieve - good as well as the bad ones.&#13;
Be warned: This is not meant as investment advice. The goal of the talk is to give you an actual basic understanding of the topic so you can teach your uninformed friends at the pub, too.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8154">Alex Dirksen</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9681" guid="a875f05c-5eeb-4478-9e6f-863fc52b8868">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9681.html</url>
        <logo/>
        <date>2018-12-29T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9681-butterbrotdosen-smartphone</slug>
        <title>Butterbrotdosen-Smartphone</title>
        <subtitle>Mein DIY-Smartphone-Bau </subtitle>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Ich möchte euch zeigen, wie ich mir aus einem Raspberry PI ein Smartphone baue. Auf welche Probleme und Schwierigkeiten ich dabei gestoßen bin und welche Lösungen ich gefunden habe. Das Projekt ist noch nicht abgeschlossen, es fehlen noch ein paar Kleinigkeiten. Trotzdem will ich euch schon mal mein Smartphone in der praktischen Butterbrotdose zeigen und euch erzählen wie es entstanden ist.</abstract>
        <description>Ich hab gar nicht gedacht, das der Bau eines Smartphones so kompliziert sein kann. Raspberry Pi + Touchdisplay ist nicht alles, was es zu bedenken gibt, bei diesem Projekt. Im Moment lebt das Smartphoneprojekt in einer Butterbrotdose und zieht in der S-bahn oder U-bahn schon mal die Aufmerksamkeit auf sich. Wenn die Powerbank passthrough kann, ist das vorteilhaft, hab ich feststellen müssen. Die Einrichtung der X und Y Achsen auf dem Touchdisplay, damit man damit auch die OnScreenTastatur bedienen kann, war nicht so einfach. Und ich musste feststellen das Landscape nicht die richtige Größe zum flüssigen arbeiten ist. Die meisten Linux-Programme sind, nicht so direkt Touchfähig oder brauchen zu viel Speicher. Dann gab es auch große Herausforderungen! Löten lernen war so eine. Erst lernen wie man lötet, um dann das entlöten zu lernen, um sich dann an den PI zu trauen. Diese und andere Geschichten zum Bau meines Smartphones möchte ich euch erzählen. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8127">bücherratten</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/626/original/IMG_20181014_202105.jpg?1543185403">Das Butterbrotdosen-Smartphone</attachment>
        </attachments>
      </event>
      <event id="9758" guid="3745513b-c2e6-449a-abd0-2e32f738f168">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9758.html</url>
        <logo>/system/events/logos/000/009/758/large/Logo.png?1539607949</logo>
        <date>2018-12-29T21:50:00+01:00</date>
        <start>21:50</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9758-hacking_the_human_microbiome</slug>
        <title>Hacking the Human Microbiome</title>
        <subtitle/>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The human microbiome is a diverse community of bacteria that lives inside us. Their contribution towards our personal well-being or sickness is controversially discussed within the scientific world and, likewise, in our society. First attempts to rationally (reverse-)engineer the human microbiome are hyped in medicine and within the DIY biohacking scene. The implications of these endeavours potentially concern several aspects of our life: eating habits, fitness state, susceptibility for infections, aging, and cancer. But what about ethical aspects of hacking the human microbiome? How can biosafety be maintained? Are there any data security issues? I will seriously discuss the state-of-the-art and future directions of the research to show whether actual hacking of the human microbiome is rather science or fiction.</abstract>
        <description>First, I will answer some general questions to lay the foundation: What is the human microbiome? How is it studied? Why is there a hype at the moment?&#13;
Subsequently, I will explain fundamental concepts of human microbiome research: Faecal microbiome transplantations (“eating poop”), microbiome enrichment (“taking probiotics”), microbiome depletion (“swallowing antibiotics”), and rational, targeted interventions (“getting or killing a single bug”).&#13;
This will be followed by an introduction into different experimental and computational methods, that are being performed to discern the complex interplay between bacteria and our human body. The data obtained from these analyses are hard to interpret. The conclusions drawn from the data hardly move beyond associations. The advancement of the field from discovered correlations to causations is demanded but rarely achieved. I will outline major challenges in measurement techniques and analysis pipelines. The debate about the proper acquisition, encryption, storage and accessibility of genetic information of the human person itself is still in its infancy. Discussions about the (meta-)genetic information of the human microbiome are lacking even more behind. The talk will be concluded by a speculative but facts-based projection of current microbiome engineering approaches into the future. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8444">LorenzAdlung</person>
        </persons>
        <links>
          <link href="https://lorenzadlung.wordpress.com/socialmedia/scienceslams/">Link to my blog regarding science slams:</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/709/original/20181229_HackingTheHumanMicrobiome_LorenzAdlung.pdf?1546112640">20181229_HackingTheHumanMicrobiome_LorenzAdlung</attachment>
        </attachments>
      </event>
      <event id="9616" guid="84be4017-78a0-444b-8b6f-5a14089bb0f7">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9616.html</url>
        <logo/>
        <date>2018-12-29T22:50:00+01:00</date>
        <start>22:50</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9616-circumventing_video_identification_using_augmented_reality</slug>
        <title>Circumventing video identification using augmented reality</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Video identification is the process of establishing the identity of a person via video chat. The person to be identified has to show his face as well as her official ID card to the camera. This lecture gives a step-by-step tutorial on how such video streams can be augmented with computer-generated official ID cards, including all visible watermarks.</abstract>
        <description>To be specific, we will use a credit-card printed with markers, which will be detected using the Aruco library shipping with OpenCV.&#13;
The resulting position and orientation will then be used to render a 3D representation of an official ID card with arbitrary information.&#13;
The 3D representation will be rendered using OpenGL. A shader will compose its look using several layered textures.&#13;
Additionally, skin detection will be used to create a skin mask in the area of the card to avoid rendering over fingers held in front of it.&#13;
Finally, the input image, the known position and orientation of the card, the rendered fake card and the skin mask will be composed to a convincing output image - ready to be presented to the call center agent.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8439">Jan Garcia</person>
        </persons>
        <links>
          <link href="https://www.deutschepost.de/de/p/postident/identifizierungsverfahren/verfahren-videochat.html">Official Post-Ident Video-Legitimation explanation</link>
        </links>
        <attachments/>
      </event>
      <event id="9680" guid="13d40859-635a-49e6-91bd-0f64bfcfe64c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9680.html</url>
        <logo/>
        <date>2018-12-29T23:50:00+01:00</date>
        <start>23:50</start>
        <duration>00:40</duration>
        <room>Dijkstra</room>
        <slug>35c3-9680-osterreich_uberwachungsstaat_oder_doch_nur_digitalisierung_fur_anfanger</slug>
        <title>Österreich: Überwachungsstaat oder doch nur Digitalisierung für Anfänger?</title>
        <subtitle>Ein Jahr unter der rechtsextremen Regierung</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>In Österreich regiert seit einem Jahr eine Koalition aus der rechtskonservativen ÖVP und der rechtsextremen FPÖ. Eine ihrer ersten Maßnahmen war eine vollkommen überzogene Verschärfung von Überwachungsbefugnissen: Bundestrojaner, Anlassdatenspeicherung, verstärkte Videoüberwachung, Straßenüberwachung. Registrierungspflicht für SIM-Karten, etc. Zugleich wurde versucht, die Datenschutzgrundverordnung (DSGVO) zu untergraben. Betroffenenrechte wurden ausgeschlossen, weite Ausnahmen geschaffen und Strafen sollen am besten gleich gar nicht angewendet werden. In diesem Talk geben wir ein Update über die netzpolitische Lage in Österreich. </abstract>
        <description>Die neue österreichische Regierung steht für mehr Überwachung und weniger Datenschutz. Viele der Maßnahmen treffen alle Menschen in diesem Land und nicht nur Kriminelle. Schutzsuchenden werden die Menschenrechte überhaupt aberkannt. Künftig sollen sie im Asylverfahren ihre Mobiltelefone zur Beweissicherung aushändigen müssen. Diese können dann komplett ausgelesen werden, es kommt zu einer digitalen Hausdurchsuchung. Damit wird stärker in die Rechte von Asylwerbern und Asylwerberinnen eingegriffen, als in die von Menschen, die einer schweren Straftat verdächtigt werden. &#13;
&#13;
Heikle personenbezogene Daten aus öffentlichen Datenbanken sollen zu allen wissenschaftlichen Zwecken – auch kommerziellen –  zur Verfügung stehen, z.B. auch Daten aus der Elektronischen Gesundheitsakte (ELGA). Krankenkassen wurden zur Rasterfahndung in Gesundheitsdaten verpflichtet, um "Missbrauch von Versicherungsleistungen" zu verhindern. Auch eine Vorratsdatenspeicherung von IP-Adressen versuchte die Regierung in einen Gesetzesentwurf zu schmuggeln - als es auffiel und Protest hervorrief, nahm sie den Vorschlag jedoch sofort wieder zurück. &#13;
&#13;
 In unserem Vortrag versuchen wir, einen Überblick darüber zu geben, was sich im letzten Jahr in Österreich netzpolitisch getan hat und was noch alles auf uns zukommen könnte.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4366">Thomas Lohninger</person>
          <person id="7704">Angelika Adensamer</person>
        </persons>
        <links>
          <link href="https://www.epicenter.works">epicenter.works</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Eliza">
      <event id="10019" guid="f16f2242-d265-42d2-91d0-632243013b3f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10019.html</url>
        <logo/>
        <date>2018-12-29T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-10019-internet_the_business_side</slug>
        <title>Internet, the Business Side</title>
        <subtitle>a try to explain the ecosystem</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Net neutrality, a big buzzword in the last years. It is not only a buzzword? There are economic reasons why it is a stake. This talk tries to give an overview and explain how money is made in the "internet" and how it is related to net neutrality.</abstract>
        <description>Topics discussed:&#13;
- Early Days and the Finance behind the Internet / Darpanet&#13;
- "Day 0" of the Internet as we know it today&#13;
- Step By Step Explanation how the internet is built from Access To Backbone To World and back again&#13;
- Add some price tags to the network and a try to explain the ecosystem behind it&#13;
- „Netzneutralität“ a definition?&#13;
- Show the relation between Netzneutralität and the price tags&#13;
- Outlook into the next 24 months&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8754">swaio</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="10012" guid="6d23f2dc-988a-4877-a6e5-3a43ea6dc8bb">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10012.html</url>
        <logo>/system/events/logos/000/010/012/large/selbsportrait1.jpg?1541855191</logo>
        <date>2018-12-29T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-10012-transhuman_expression</slug>
        <title>Transhuman Expression</title>
        <subtitle>Interdisciplinary research in Painting and Robotics. with Prof. Oliver Deussen, PhD candidate Marvin Guelzow, and the Artist Liat Grayver.</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The meeting point of art and science as a place of inspiration, exchange of knowledge and creation is the main focal point of the talk. Together with Prof. Oliver Deussen, the PhD candidate Marvin Guelzow, and Liat Grayver we will discuss both the technical challenges and innovation aspects in the development of the e-David robot, alongside the the social and artistic practice its offers. Topics as such  “paradigms of creativity” under the title “New Materialism / Anthropocentrism / Posthumanism” will be presented with the goal to position and understand machine-assisted creative interfaces within the broader field of media art and painting traditions.</abstract>
        <description>The painting robot developed at the University of Konstanz in southwestern Germany is a pioneer project in this field and is presently the only one with a visual feedback system. Much more than just a printer capable of reproducing a flat image, the e-David creates unique works through the application of paint strokes that are irreproducible in terms of their colour blend and the materiality of their layering. The possibility of visual feedback brings up many questions within the contemporary discourse on deep learning, artificial intelligence and robotic creativity.&#13;
The Collaborating explored further possibilities to exploit the painting robot creatively, and reflected on ideas about the ways in which these could be implemented in the form of software and hardware. A number of questions of wider impact arose as the result of our collaboration: When and why would a semantic method of defining the object in the image be used? Is it an advantage or a disadvantage to paint semantic objects without having a pre-existing cognitive understanding of them? How could I use abstract forms, grammatical structures or mathematic models to achieve more complex surfaces? How would computer language be used to express the intentions of a composition? When and why would different painting styles be used?&#13;
Further, on a technical level, we had to take into consideration how different materials would react with one another. For example, how could different colours be mixed on the canvas or on the palette? How should the size of the brush be set, and when is it necessary to add glaze? We would have to develop a range of distinct, individual brushstrokes (controlling the velocity and the z-axis) whose characteristics are analogous to those made by human painters in the “real world”, in order to be able to pre-define when, in which order and for which tasks each stroke is to be used. In doing so, we are basically defining and categorizing singular parameters within a library of painterly “acts” and “perceptions”, in order to create a grammatical structure for the “language” of robotic painting.&#13;
Constructing e-David has provided many challenges in the realms of engineering, robotics, computer graphics and computer vision. We discuss how we arrived at our current painting set up and highlight the strengths and weaknesses found so far, as well as plans for future extensions. On the robotics side, the main issue is working with machines designed for repetitive, precise tasks and applying them for approximate and dynamic processes. Supervision of a painting process using vision or other sensors is challenging, as well as finding methods to process the data in a meaningful way. Seemingly simple tools like brushes are highly complex in their behaviour and using them precisely is difficult. In the talk, we elaborate on current problems and what future plans are to deal with these issues.&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8722">Liat_Grayver</person>
        </persons>
        <links>
          <link href="https://www.liatgrayver.com/robotic-painting">Breaststrokes at the digital age</link>
          <link href="https://www.liatgrayver.com/robotic-painting-1">Robotic Paintings</link>
          <link href="https://www.liatgrayver.com/traversing-the-threshold">Traversing the Threshold</link>
          <link href="http://graphics.uni-konstanz.de/eDavid/">e-David. A painting process</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/618/original/grayver_brushstrokes_print_18.pdf?1541855201">Brushstrokes in the Digital age </attachment>
          <attachment href="/system/event_attachments/attachments/000/003/619/original/Traversing_the_Threshold_newpdf.pdf?1541855201">Traversing the Threshold</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/621/original/Abstract_Grayver.pdf?1541861917">Abstract-Transhuman Expression. </attachment>
        </attachments>
      </event>
      <event id="9695" guid="4b765099-8cfa-4325-b132-0d9dc9b84267">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9695.html</url>
        <logo/>
        <date>2018-12-29T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9695-planes_and_ships_and_saving_lives</slug>
        <title>Planes and Ships and Saving Lives</title>
        <subtitle>How soft and hardware can play a key role in saving lives at sea and why Frontex doesn´t like it</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The death rate at Europes seaborder reached a historical record: One out of five trying for Europe drowned this September: Main reason is the crackdown on sea rescue by European authorithies who barely pass any information on distress cases to competent rescue workers. The hope of those trying to escape torture, slavery hunger and other forms of violence therefore soleyly lies on the efforts of the civil rescue fleet. &#13;
In the future, a civil society run maritime rescue coordination center could help to significantly reduce the death rate at sea. This talk will focus on the software and hardware components used on the aerial and nautical assets of the civil rescue fleet. &#13;
We´ll talk about the difficulties installing sat com on a moving ship or even an aircraft, how the camera system of the Sea-Watch 3 recorded the evidence that is now challenging the Italian state at the European Court of human rights, how important data is secured if the state challenges you as in the case of the LIFELINE and about a software that will help to join forces in the near future to coordinate rescues in an efficient way. Help is still needed to tear down Europes wall. </abstract>
        <description>The death rate at Europes seaborder reached a historical record this year: One out of five people, who left wartorn libya on flimsy boats, bound for Europe, drowned in September 2018. The main reason for the increasing death rate ist the crackdown on sea rescue by European authorithies. Back in 2015 and 2016, when rescue NGOs took up rescue efforts on the deadliest waters of the world, the Italian Coast Guard, the NGOS and even the European Navy worked hand in hand, to save as many lives as possible. Nowadays European authorithies are trying to turn the central med into a blackbox: As they rather want to watch people drown then to see them arrive at Europes shores, and barely any information on distress cases is passed to competent rescue workers, the hope of those trying to escape torture, slavery hunger and other forms of violence soleyly lies on the efforts of the civil rescue fleet. &#13;
&#13;
Since no rescue coordination center clearly takes responsibility in favor of those in distress, the technical means of communication and such to increase the search capacity or to document incidents at sea, used on the aerial and nautical assets of the civil rescue fleet, do play a key role in the efforts to coordinate rescues d.i.y. &#13;
&#13;
In the future, a civil society run maritime rescue coordination center could help to significantly reduce the death rate at sea. This talk focuses on the software and hardware components necessary to challenge Europes deadly border policy of letting people drown. &#13;
We´ll talk about the difficulties installing sat com on a moving ship or even an aircraft, how the camera system of the Sea-Watch 3 recorded the evidence that is now challenging the Italian state at the European Court of human rights, how important data is secured if the state fights back as in the case of the LIFELINE and about a software that will help to join forces in the near future to be even more efficient. &#13;
&#13;
We will talk about standards (NMEA0183, NMEA2000), Communication technologies (VSAT, IRIDIUM), Positioning and information/communication systems and anti collision systems (RADAR, GPS, AIS) Other interesting devices to be found aboard (Gyrocompass, etc.) and of course our setup (OpenWRT, OLSR, Ansible, Wireguard) and open source applications for nautic purpose (weather, navigation, etc: ZyGRIB, OpenCPN).</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6989">Trollofix</person>
        </persons>
        <links>
          <link href="https://sea-watch.org">Seawatch</link>
          <link href="https://mission-lifeline.de/">Mission Lifeline</link>
        </links>
        <attachments/>
      </event>
      <event id="9611" guid="8703c4a7-981c-4aa5-8f4c-36da54d5b435">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9611.html</url>
        <logo>/system/events/logos/000/009/611/large/35c3-Integrity.png?1539437398</logo>
        <date>2018-12-29T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9611-enclosure-puf</slug>
        <title>Enclosure-PUF</title>
        <subtitle>Tamper Proofing Commodity Hardware and other Applications</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>We are presenting an innovative technology, which allows verifying the authenticity, integrity and/or the physical state of an item by employing the propagation behaviour of electromagnetic waves. In particular, it enables to check for any tamper attempts for larger structures, such as off-the-shelf computers and their periphery. The technology extends existing tamper proof approaches from the chip/PCB to a system level and is easily retrofittable.&#13;
In this presentation, we are demonstrating exemplary tamper proofing in order to protect secret information without an attack-detection or data-deletion circuit (!), which is a known difficult problem and an imperfect undertaking. Therefore, we demonstrate the simplicity and effectiveness using a very cheap self-made testbed (using alumium foil) to protect standard hardware against invasive attacks, such as needle probing through the case. </abstract>
        <description>Cyber-physical systems are ubiquitous and are often located in non-trustworthy environments, in which data is processed that is both sensitive and worth protecting. Despite employed protection, measures such as secured communication an extraction of data and/or manipulation of it are often easily feasible if physical access to the components of the system is given. Or with the words of Brian Gladman: “It is relatively easy to build an encryption system that is secure if it is working as intended and is used correctly but it is still very hard to build a system that does not compromise its security in situations in which it is either misused or one or more of its sub-components fails (or is ’encouraged’ to misbehave) ... this is now the only area where the closed world is still a long way ahead of the open world and the many failures we see in commercial cryptographic systems provide some evidence for this.”&#13;
Our technology is aiming to verify the integrity of such systems in order to detect attempts of an attack and activate appropriate countermeasures. The propagation behaviour of electromagnetic waves allows for an extension of the protection from individual small components to the entire periphery of a system (or even object). This allows detecting attacks, like spudding/drilling into cash terminals. &#13;
By deriving cryptographic key material based on physical disorder and unclonable complexity of an environment, it is possible to create a protection, which protects secret information without an attack-detection or data-deletion circuit. Due to its generic nature it is possible to flexibly use this protection concerning size and application. &#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8459">Christian Zenger</person>
          <person id="8493">David Holin</person>
          <person id="8539">Lars Steinschulte</person>
        </persons>
        <links>
          <link href="http://news.rub.de/vermischtes/2018-10-11-it-sicherheitspreis-die-besten-innovationen-kommen-aus-bochum">[1]</link>
        </links>
        <attachments/>
      </event>
      <event id="9603" guid="5b7f01a6-f762-4c28-961c-7f6ab2f70fb4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9603.html</url>
        <logo/>
        <date>2018-12-29T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9603-sneaking_in_network_security</slug>
        <title>Sneaking In Network Security</title>
        <subtitle>Enforcing strong network segmentation, without anyone noticing</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Highly compartmentalized network segmentation is a long-held goal of most blue teams, but it's notoriously hard to deploy once a system has already been built. We leveraged an existing service discovery framework to deploy a large-scale TLS-based segmentation model that enforces access control while automatically learning authorization rules and staying out of the way of developers. We also did it without scheduling downtime or putting a halt to development. This talk covers how we engineered this, and shares lessons learned throughout the process.</abstract>
        <description>The "hard-shell, soft-center" model of network security has been popular since the invention of networks--building proper internal controls is often skipped when organizations grow quickly, and by the time that scale has been achieved, security teams resort to defending the perimeter. In this talk, I'll show an example of how we took a large modern network to a significantly more secure model by building network segmentation into the existing service discovery framework in use.&#13;
&#13;
Service discovery is a critical part of recent network design, and popular frameworks often offer security features. However, these tend to be difficult to implement after the network has already been established, and don't offer endpoint-to-endpoint solutions. We built a series of extensions to SmartStack, an open-source service discovery framework, that allow it to protect all communications with mutual TLS and offer both authentication and authorization. This was all done in a way that's transparent to the applications on either side, allowing us to migrate to this system without changing any application code or teaching developers the details of the system.&#13;
&#13;
This talk will discuss the technologies used and the challenges encountered in doing this rollout, and will aim to provide useful guidance to other security engineers wishing to make a similar transition.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8389">Maximilian Burkhardt</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9579" guid="4fff6281-e452-4d64-bf9a-bc677614776a">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9579.html</url>
        <logo/>
        <date>2018-12-29T18:50:00+01:00</date>
        <start>18:50</start>
        <duration>01:00</duration>
        <room>Eliza</room>
        <slug>35c3-9579-attacking_chrome_ipc</slug>
        <title>Attacking Chrome IPC</title>
        <subtitle>Reliably finding bugs to escape the Chrome sandbox</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>In this talk, I discuss how to reliably find bugs in the Chrome IPC system with the goal of escaping the sandbox. I show how to enumerate the attack surface, how to identify the weak areas, and how to fuzz those areas efficiently to consistently produce bugs.</abstract>
        <description>Since the win32k lockdown on the Chrome renderer process, full chain Chrome exploits on Windows have become very rare, with the most recent successful competition exploit occurring in 2015.&#13;
&#13;
By applying new fuzzing strategies, I was able to identify many vulnerabilities in the sandbox in the past year, one of which I used to demonstrate a full chain exploit at Hack2Win this year when combined with a teammate's RCE bug.&#13;
&#13;
In this talk I hope to show how I found these bugs by using extremely targeted fuzzing in a way that was easy to setup but reliably had great results, and briefly cover how we leveraged one use after free bug to fully escape the sandbox.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7068">nedwill</person>
        </persons>
        <links>
          <link href="https://twitter.com/NedWilliamson/status/1043150732742946816">Exploit Demo</link>
        </links>
        <attachments/>
      </event>
      <event id="9598" guid="0a4a43e0-2b8d-424c-aaa3-101c843de75c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9598.html</url>
        <logo>/system/events/logos/000/009/598/large/credit_Ana_Caria_Leonor_Fonseca__FBAUL.jpg?1539368387</logo>
        <date>2018-12-29T20:50:00+01:00</date>
        <start>20:50</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9598-a_webpage_in_three_acts</slug>
        <title>A WebPage in Three Acts</title>
        <subtitle>live coding performance</subtitle>
        <track>Art &amp; Culture</track>
        <type>performance</type>
        <language>en</language>
        <abstract>A Web Page in Three Acts is a live coding performance which combines principles of choreography within the formal structures of coding. An assemblage of semi-improvised visuals and composition experiments in web environments. The screen becomes an open stage for the hybrid code which links choreography and web programming as well as body and language.</abstract>
        <description>For the series ‘WebPage Act I, II, III’, Joana Chicau created a specific grammar or vocabulary that links choreographic concepts from post-modern dance with web-coding functions. &#13;
This technique follows the concept of esoteric programming languages, also called esolang, used when writing so ware, integrating a new grammar into an existing one. Although an esolang doesn’t have a proper functionality, it is used in combination with other programming languages to explore alternative ways of composing and writing code. Chicau started using esoteric programming languages as an a empt to overcome the abstractness of algorithmic code, and simultaneously as a way to develop my own design language, which derives from choreographic concepts. &#13;
The performance starts with a standard webpage, followed by the opening of the web console. The screen is now divided in two stages: the ‘frontstage’, the interface a user normally accesses and the ‘backstage’ or the web console in which programming languages can be ran. In the web console Chicau is calling, juxtaposing and manipulating different functions from a glossary of code, while simultaneously displaying the varied outcomes of graphic elements in the screen. These functions are named a er choreographic concepts, which are assigned to specific web actions. While the computer interprets the code, the audience will be interpreting and start wondering about the relation between the ‘choreographic vocabulary’ within the code and its immediate outcome.&#13;
The screen becomes an open stage, providing the audience the access to the methodology and the tools used during the performance. The performative aspect of the act of coding is a way to make more transparent the process of composition and to enhance the nuances and transient character of coding. &#13;
As in choreography, web-design also deals with space, time and movement qualities. It has been defining ways of moving, collectively or individually, through fluid nonetheless complex landscapes of information displays, networked spaces, and multi- media environments. The performance being presented and the notion of ‘choreographic coding’ is a technical as much as social, cultural and aesthetic experiment constantly being expanded.&#13;
Program Code&#13;
The flexibility of code allows for a combination of possibilities, not only for the live performance se ing, but also for the use of the code itself by other designers, just as in any choreography that can be re-interpreted, re-created and adapted. The code serves as a generative tool for new possible outcomes in the creation of graphics for interfaces and a way of playing with the choreographic logic. Therefore, this method promotes disciplinary openness, by sharing ideologies and methodologies and questioning structures of collaboration and of intellectual property.&#13;
The documentation is delivered in an open-ended format, following Free/Libre Open Source (Floss) models/ philosophies. The source code for the project is available on: github.com/JoBCB</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8443">Joana Chicau</person>
        </persons>
        <links>
          <link href="http://joanachicau.com/">Project Website</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/624/original/credit_Ana_Caria_and_Leonor_Fonseca01.jpg?1542546650">Performance by Joana Chicau</attachment>
          <attachment href="/attachments/original/missing.png">Performance image</attachment>
        </attachments>
      </event>
      <event id="9993" guid="70b257cc-d26a-4044-b95e-5d3e6d8c7597">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9993.html</url>
        <logo/>
        <date>2018-12-29T21:50:00+01:00</date>
        <start>21:50</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9993-media_disruption_led_by_the_blind</slug>
        <title>Media Disruption Led By The Blind</title>
        <subtitle>Hacking Visual Culture</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Visual culture dominates our societies, every day encouraging and rewarding corporations and their users to create more visual content to populate their digital spaces and build their digital lives. But what if there was an unseen method of disruption to these powers? What can we learn from the blind and their increased awareness of sound and vibration to disrupt and circumvent these powers without detection?</abstract>
        <description>As we move towards immersive computing (XR) being the primary means of human-computer interaction, are we thinking of the blind and visually impaired? To this date, the simple answer to that question is no. However, through the visual innovations of VR HMDs, we have seen a strong momentum build for improved sonic and tactile computer interfaces. In my project Infinite Observer, I am working directly with blind innovators and content creators to set standards for UX in VR, and to empower the next generation of computing to support accessibility for the blind and visually impaired.&#13;
&#13;
Infinite Observer is the first narrative VR experience designed from the ground up by the blind for the blind. The experience places you in an underground ring of blind hackers called the Infinite Observers. As you discover throughout the experience, the group is filled with members of unique sensory skill sets and a deep understanding of the vibratory qualities that make sound so powerful. They monitor movements using echolocation and build resonant frequency-based weaponry. They can shift tectonic plates, teleport using molecular vibration, and hack into digital communication via sub-frequencies undetectable to the typical human ear. And you (as the user)…your purpose is to learn these skills and secretly take them to the AG to subvert the present, corrupted visual culture. &#13;
&#13;
The goal of the experience is to empower its users, and create a heightened appreciation for the hidden powers of the senses beyond sight. It is also meant to instill clarity around the dominance of the visual in modern culture, and inspire ways to circumvent this. As hackers, I would hope for a discussion surrounding possible techniques that might be used by the Infinite Observers, and how sound/vibration can facilitate either increased privacy/anonimity or direct disruption of dominant visual media in the real world. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8711">Sabio</person>
        </persons>
        <links>
          <link href="http://infiniteobserver.com">Infinite Observer Project Page</link>
          <link href="http://thegladscientist.info">The Glad Scientist</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/706/original/CCC.pdf?1546098678">Presentation Slides</attachment>
        </attachments>
      </event>
      <event id="9882" guid="51bb6adc-c0e7-4675-8f93-cf0e2dbd9587">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9882.html</url>
        <logo>/system/events/logos/000/009/882/large/fsworld.png?1539636379</logo>
        <date>2018-12-29T22:50:00+01:00</date>
        <start>22:50</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9882-the_foodsaving_grassroots_movement</slug>
        <title>The foodsaving grassroots movement</title>
        <subtitle>How cooperative online structures can facilitate sustainable offline activism</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>When you're fighting for a cause, you need tools that reflect your values. While venture capital-backed tools are seductive, especially at the beginning of your movement, they can be harmful in the long-term. This session shows how co-operatively owned, non-hierarchically built Free and Open Source Software (FOSS) provides a more sustainable, and equitable, solution.</abstract>
        <description>Capitalist and consumerist structures have led to reduced incentives to make the most efficient use of food. Wastage is massive and the reasons are many: misshapen vegetables, damaged packaging, mislabeling, forecasting errors, unsold items, etc. These are all symptoms of the structure of our industrialised food production structures, food waste is inherent in these systems.&#13;
&#13;
Many organisations have sprung up to try and access this food, using many approaches. France has tried to outlaw supermarket food waste, apps like Olio and Too Good To Go try and use the startup/funding approach, charities like FareShare in the UK receive massive government funding to redistribute to other charities. Startups and big charities replicate the hierarchical structures and bureaucratic processes of capitalist organisations. Whilst they can achieve much at times, we don't believe this is the sustainable resilient model - profit motives or government objectives dictate the approach to take.&#13;
&#13;
In Germany &lt;a href="https://foodsharing.de"&gt;foodsharing.de&lt;/a&gt; was created as a grassroots volunteer movement with origins in the dumpster diving scene. It has scaled up to co-ordinate the activities of 30k food savers to collect leftovers from supermarkets. This was achieved with almost no external funding. It faced its own organisational scaling issues and expanding beyond German speaking regions has not been possible. In response to this, and working together, we created &lt;a href="https://github.com/yunity/karrot-frontend"&gt;Karrot&lt;/a&gt; to try and alleviate some of these issues. Unlike in foodsharing.de we develop the software independently from any specific group, this has allowed us to build common software to be used across 6 countries by independent groups. We empower local groups with access to high quality software but otherwise leave them to organise themselves.&#13;
&#13;
We believe that for solving a problem you cannot use the very practices that produce it in the first place: Hierarchies lead to passive individuals who wait for their leader's decisions and don't dare to get active on their own accord. For-profit organisations need to make money and will always prioritize this goal. We are not just here to save food, but want to support and encourage self-help, self-responsibility, democracy, equality, equity and solidarity. This brings us inline with the wider co-operative and solidarity economics movement. To reject the capitalist structures that cause the problem in the first place.&#13;
&#13;
However, it's not always easy...</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8307">Tilmann Becker</person>
          <person id="8654">Nick sellen</person>
          <person id="8661">Janina Abels</person>
        </persons>
        <links>
          <link href="https://foodsaving.world">foodsaving.world</link>
          <link href="https://github.com/yunity/karrot-frontend">Karrot</link>
          <link href="https://foodsharing.de">foodsharing.de</link>
          <link href="https://community.foodsaving.world">Foodsaving Community Forum</link>
          <link href="https://www.youtube.com/watch?v=MLWccmvhIlU">Presentation from the beginning of the project (2016)</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/708/original/presentation.pdf?1546106349">Presentation</attachment>
        </attachments>
      </event>
      <event id="9371" guid="b87de377-eb03-4795-b998-7988a63fc239">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9371.html</url>
        <logo>/system/events/logos/000/009/371/large/Repair_Caf%C3%A9_-_Logo_generisch.png?1536821082</logo>
        <date>2018-12-29T23:50:00+01:00</date>
        <start>23:50</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9371-repair-cafes</slug>
        <title>Repair-Cafés</title>
        <subtitle>… und warum ihr dabei mitmachen solltet</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Die Repaircafé-Bewegung rollt über unser Land herein. Wie können wir uns daran beteiligen und Synergien nutzen?</abstract>
        <description>In vielen Städte sind in den letzten Jahren Reparaturtreffs zur festen Institution geworden. Was gibt es für Schnittmengen mit der Hacker- und Makerszene? Warum solltet ihr euch beteiligen, was gibt es dabei zu beachten und zu gewinnen?</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7323">Fraxinas</person>
        </persons>
        <links>
          <link href="https://pads.schaffenburg.org/p/Repaircafe-35C3">Presentation Repair-Cafés</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Lecture room 11"/>
    <room name="Seminar room 14-15"/>
    <room name="Seminar room 13"/>
    <room name="Lecture room M1"/>
    <room name="Lecture room M2"/>
    <room name="Lecture room M3"/>
    <room name="Kidspace"/>
    <room name="CCL Saal 3"/>
    <room name="Chaos West Bühne">
      <event id="163" guid="8f9197a2-06a9-5809-b094-621f95e8d2e7">
        <logo/>
        <date>2018-12-29T01:30:00+01:00</date>
        <start>01:30</start>
        <duration>02:00</duration>
        <room>Chaos West Bühne</room>
        <slug>ALV3XL</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/ALV3XL</url>
        <title>Überraschungsgast</title>
        <subtitle/>
        <track/>
        <type>Klangteppich</type>
        <language>en</language>
        <abstract>Wir bringen einen Überraschungsgast mit. Kommt vorbei, es wird gut werden!</abstract>
        <description>Wir bringen einen Überraschungsgast mit. Kommt vorbei, es wird gut werden!</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="81">
            <name>Überraschungs Gast</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="126" guid="b4850756-d05b-5689-818b-b4b3b233244e">
        <logo/>
        <date>2018-12-29T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>NBCWSE</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/NBCWSE</url>
        <title>pam_panic - A Linux authentication module for people in distress</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>en</language>
        <abstract>pam_panic is an authentication module made for people who think they might get into a distressing situation where they are forced to type in or even tell the password to bad people.&#13;
The idea is to use a password or a media device at a login screen which issues a destruction of the LUKS keyslots.&#13;
There will be a little crash course on what LUKS is to be more clear how and why it works.</abstract>
        <description>## pam_panic ##&#13;
[on github](https://github.com/pampanic/pam_panic)&#13;
&#13;
### Purposes ###&#13;
- Make a LUKS encrypted filesystem inaccessible when in distress&#13;
&#13;
&#13;
### What is the idea? ###&#13;
- Have an encrypted system done by LUKS&#13;
- Have two passwords or two media devices (One of the passwords/media devices is used for regular authentication, the other one is used for issuing a destruction of the LUKS key material slots and have a reboot/shutdown)&#13;
- Ask for a password/media device before your regular user password&#13;
&#13;
&#13;
### Crash course: LUKS ###&#13;
- What do we need to know to get this to work?&#13;
- How does the LUKS header look like?&#13;
&#13;
### Making my data inaccessible ###&#13;
- Using `cryptsetup luksErase` &#13;
&#13;
### Scenarios ###&#13;
Scenarios where it can help:&#13;
&#13;
- Being forced to type/tell your password&#13;
- Raids&#13;
&#13;
&#13;
Scenarios where it doesn't help:&#13;
&#13;
- Letting them make a clone of your hard drive, then having your password/media device forced from you&#13;
&#13;
&#13;
## Demonstration of pam_panic ##&#13;
1. Setup&#13;
2. Show authentication password and media device&#13;
3. Show panic password/media device and show the result of inaccessibility&#13;
&#13;
## Q+A ##&#13;
..if there's enough time.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="36">
            <name>Bandie</name>
            <biography>Home Hackspace: [Chaospott](https://chaospott.de)&#13;
DECT: 2263 (BAND)</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="110" guid="c22707f5-d850-5827-9334-c48446f69fd2">
        <logo/>
        <date>2018-12-29T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>DUAEJC</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/DUAEJC</url>
        <title>p≡p Engine Development - Tales of a MIME Warrior</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>en</language>
        <abstract>p≡p is an end-to-end privacy-focused security architecture, which, in its first incarnation, aims to provide a seamless private, encrypted email solution for everyone. This talk focuses on some of the development challenges in supporting an ambitious product from the inside and lessons-learned that don't appear in software engineering classes.</abstract>
        <description>p≡p is an end-to-end privacy-focused security architecture, which, in its first incarnation, aims to provide a seamless private, encrypted email solution for everyone. We do this without the requirement that the user has any understanding of keys, encryption, protocols, or encryption engines while still maintaining complete transparency at the core by providing the adapters and engine as free software. The p≡p foundation develops and maintains the engine and adapters which allow external app development (including that done by the business arm of p≡p) to securely use the p≡p engine without needing to understand and implement the secure functions of the p≡p protocol. &#13;
&#13;
Moving the complexity of a product to the engine, however, creates a number of challenges relating to ensuring maximal cross-platform compatibility, communication (and often, adaptation) of APIs and usage, determination of where problems should be solved, etc. Doing this with a product that handles email adds the additional entertainment of repeatedly revisiting the less-deterministic-than-desired land of MIME RFCs and the reality that the product has to support all of the violations of those RFCs, even when one would prefer to avoid the egregiously broken. This talk focuses on some of the development challenges in supporting an ambitious product from the inside and lessons-learned that don't appear in software engineering classes.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="21">
            <name>Krista Bennett</name>
            <biography>Krista Bennett is a software developer, researcher and linguist residing in Germany, and is currently the core engine developer at p≡p foundation. She has previously worked at the Technische Universität München, Fraunhofer AISEC, Purdue University, and Hewlett-Packard, and has a Masters in Computer Science from Purdue University and a B.S. in Computer Science from the University of Wisconsin-Milwaukee. She would definitely rather be playing video games right now.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="111" guid="5b7a598e-95a6-58fa-b390-96a66a1cd7b5">
        <logo/>
        <date>2018-12-29T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>ATBYBZ</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/ATBYBZ</url>
        <title>Introduction to Network Security</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>en</language>
        <abstract>Learn about the most common attacks against your network privacy - and how to avoid them. By looking at  things from an attackers perspective, we can get some insight into technical details that provide us with essential knowledge about network protocols.</abstract>
        <description>You will learn about three of the most common attacks against computer network security.  In each of these scenarios, a victim's communication can be monitored and modified at a total loss of privacy. By learning how these attacks are executed, you can defend yourself better.&#13;
&#13;
ARP Spoofing is used to claim any IP address on a local network. This can be the address of the victim's computer or that of the router. I will show you how the possibilities of attacking in both directions.&#13;
 &#13;
DNS Hijacking is a technique to monitor or modify the victim's queries on the Internet Domain System. Even when using encrypted protocols like HTTPS, privacy is at risk. With this scenario, you can apply a number of attacks I will present. &#13;
&#13;
Rogue Access Points on a wireless network are harmful on another layer than previously inspected. In probably most of the installations out there, the attacker can easily add a malicious access point to intercept traffic. I will give some short intro into wi-fi and its protocol design. &#13;
&#13;
Hopefully, you can use this knowledge to protect your own privacy and that of others. With these examples, you will at least get some valuable insight into an area that is the playground of the most commonly known type of hackers.&#13;
&#13;
Only basic knowledge about network protocols is expected.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="23">
            <name>nomaster</name>
            <biography>Studied computer science and philosophy, but never got an academic title. With a practical approach, got some insight into the legacy of operating systems and networks. As an active member of several hackspaces and the Freifunk community, nomaster dedicates his work on the educational perspective on technology.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="161" guid="0a1a58a4-7700-502b-b8f2-405f3e42c1bc">
        <logo/>
        <date>2018-12-29T13:30:00+01:00</date>
        <start>13:30</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>BBPFCJ</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/BBPFCJ</url>
        <title>wirtschaft hacken!</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Was passiert, wenn menschen mit einer hacker_innen-artigen grundhaltung in die wirtschaft gehen? &#13;
sie halten sich nicht an alle regeln. das geht nicht nur, es geht sogar oft viel besser als "normal"...</abstract>
        <description>wirtschaft ist auch nur ein system mit regeln. gesetze, sachzwänge, straßen, bwl, vwl, sowas. dinge sind wie sie sind. &#13;
ja? nicht alle.&#13;
gerade in der wirtschaft lassen sich regeln verbiegen und viele dinge anders machen. nicht die inhabenden treffen die entscheidungen, sondern alle betroffenen. nicht nur in mehrheiten, sondern im konsens. gewinne sind nicht nötig, ja gar nicht erwünscht. werbung ebenso. es gibt anti-mengenrabatte für kleine kunden, aber keine mengenrabatte für große. die umwelt ist wichtiger als der ertrag. einheitslöhne. &#13;
und soweiter  wir haben in den letzten jahren einiges in der wirtschaft verbogen; &#13;
in der getränkebranche,  in der festival-logistik, in beratungen, und in der hausverwaltung. &#13;
und wir erzählen gerne davon, um andere zu ermutigen, auch dinge anders zu machen. &#13;
das geht nicht nur, es geht sogar oft besser als "normal".</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="74">
            <name>Uwe Lübbermann</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="138" guid="208a0d4d-bd15-5795-82aa-563e270001d5">
        <logo/>
        <date>2018-12-29T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>N7LQFX</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/N7LQFX</url>
        <title>Chatbots im Kundenservice - Are we still talking about pink dildos??</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>de</language>
        <abstract>Vortrag über Chatbots im Kundenservice. Eine Inhaltsanalyse mit anschliessender experimenteller Befragung. Was können Chatbots heutzutage und können sie Kunden genauso zufriedenstellen wie ein menschlicher Mitarbeiter?</abstract>
        <description>Chatbots im Kundenservice sind heutzutage nichts mehr aussergewöhnliches. Unternehmen wie ebay, zalando oder H&amp;M setzen für die Beratung ihrer Kunden virtuelle Agenten ein. Chatbots können Kunden 24/7 bedienen, sind billiger im Unterhalt als ein menschlicher Mitarbeiter und nie unfreundlich. Jedoch stellt sich für Unternehmen auch die Frage, ob die virtuellen Berater die Kunden genauso zufrieden stellen können wie ein menschlicher Mitarbeiter. Schliesslich kann es zu technischen Fehlern oder auch zu einem Unverständnis der Eingabe des Kunden seitens des Chatbots kommen. Ausserdem fühlen sich manche Menschen unwohl im Umgang mit einem im Real life nicht existierenden Gesprächspartner. Viele Kunden sind auch der Überzeugung, dass sie mit einer solchen Künstlichen Intelligenz nichts zu tun haben wollen oder Chatbots technisch noch lang nicht so weit sind, um einen guten Service zu leisten.&#13;
In meiner Masterarbeit bin ich genau diesem Thema nachgegangen (zusammen mit meiner Kollegin, die leider nicht am CCC dabei sein kann) und will es nun auf dem CCC vorstellen. Zunächst werde ich vorstellen, wie sich der heutige State of Art der existierenden Service-Chatbots gliedert und welche Fähigkeiten diese besitzen. Zeigen sie Gefühle oder sind sie eher neutral? Sind sie gut darin, meine Wünsche zu berücksichtigen? Welche Umgangsformen herrschen? All dies wurde in einer Inhaltsanalyse erforscht.&#13;
Danach möchte ich vorstellen, wie Menschen darauf reagieren, wenn sie von einem Chatbots oder einem Mensch über Chat bedient werden. Dazu wurde aus dem Material der Inhaltsanaylse ein Stimulus geschaffen, mit dem getestet wurde, wie Kunden auf einen Chatbot im Vergleich zu einem menschlichen Mitarbeiter reagieren. Es wurde eine experimentelle Befragung mit ca. 200 Teilnehmern durchgeführt, wo ihnen ein Kundengespräch mit Chatbots oder menschlichen Mitarbeitern vorgeführt wurde. Daraufhin bewerteten die Kunden das Gespräch auf die Qualität hin.&#13;
Es kam heraus, dass es keinen Unterschied macht, ob man von einem Mensch oder einem Chatbot bedient wird, Hauptsache, der Chatpartner leistet eine hohe Beratungsqualität. Dies bedeutet, dass man Chatbots im Service-Bereich durchaus einsetzen kann, jedoch darauf achten muss, dass diese ihre Aufgabe gut erledigen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="52">
            <name>Silia Nebelstreif</name>
            <biography>Ich studiere Kommunikationswissenschaften und Biologie an der Universität Zürich, und bin zum 4. Mal am CCC dabei. Ich bin am meisten an der sozialwissenschaftlichen Seite des Congresses interessiert, aber finde auch alle anderen Themen sehr spannend. Ich liebe Metal, Wrestling, Tiere und ganz viel Knuddeln :)</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="151" guid="5d64ecaa-6eb6-55a3-8747-74f47b61b7b2">
        <logo/>
        <date>2018-12-29T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>7ZSFL9</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/7ZSFL9</url>
        <title>9 out of 10 x86_64 firmware vendors will hate this talk!</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>en</language>
        <abstract>We'll give a short introduction what you might find in your machines firmware and tell the story of two hackers that magically found tens of thousands x86_64 firmware images in their backyard as well as their journey to explore common configuration fuckups, update frequencies and potential security risks.</abstract>
        <description>24 vendor images that will make you wonder where we all went wrong&#13;
&#13;
2 hackers looked over 5 mins on several thousand firmware images an you'll never guess what they found!&#13;
&#13;
These 6 x86_64 vendors belong in jail&#13;
&#13;
What happens when you suddenly find tenth of thousand firmware images in your backyard&#13;
&#13;
On a level from coreboot to [censored]. How fucked are you?&#13;
&#13;
You won't believe what vendors put in your firmware image.&#13;
&#13;
Everything you need to know if all your friends are apparently????? Having non-free firmware????&#13;
&#13;
42 Facts about vendor firmware that'll probably make you want to start your own coreboot port.&#13;
&#13;
Sorry, but you have to decide between these few firmware vendors.&#13;
&#13;
These are the biggest firmware trends of 2018, according to these two people</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="64">
            <name>bibor</name>
            <biography>bibor is a random hacker with and interest in firmware, hardware and their security.</biography>
          </person>
          <person id="65">
            <name>Mimoja</name>
            <biography>Mimoja is a western german hacker with a focus on firmware, hardware and security.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="121" guid="09ebfa89-8334-5cd8-86e3-c4b6041aa524">
        <logo/>
        <date>2018-12-29T16:30:00+01:00</date>
        <start>16:30</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>BEENSD</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/BEENSD</url>
        <title>Cloudcalypse: It looks like you've reached the end. How to take your data into net2o</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>en</language>
        <abstract>The GPDR allows to take out your data **out** of the collapsing cloud (Google+ sunset: August 2019, Facebook jumping from data breach to breach, github now part of Microsoft), but the challenge is to take it **into** something else.  This talk will show how to move it into net2o, a peer to peer system. #ybti #wefixthenet</abstract>
        <description># Talk structure #&#13;
&#13;
  1. Motivation: The Internet is broken, it needs to be fixed.&#13;
      + Special highlight: Data in the cloud — up at whim to whoever owns that cloud&#13;
      + Nonfree software as a service means your data is useless without the service&#13;
      + Why free software means you have to operate it yourself&#13;
  2. What is net2o:&#13;
      + peer to peer protocol stack&#13;
      + last years' talk: application layer framework.&#13;
      + this year: Let's talk about actual applications.&#13;
  3. The technical challenge&#13;
      + how does data takeouts look like (Examples: Google+, Twitter, Facebook, blogger.com)&#13;
      + What kind of data does net2o want?&#13;
      + Convert the data&#13;
      + Done&#13;
  4. The non-technical challenge&#13;
      + Get your contacts to net2o, too.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="31">
            <name>Bernd Paysan</name>
            <biography>I've done free software for more than 25 years, since I started developing Gforth, the GNU project's Forth system in 1992, and am developing net2o, a peer to peer network protocol stack since 2010.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="117" guid="df01776d-607c-598e-917f-2ffd406c4330">
        <logo/>
        <date>2018-12-29T17:30:00+01:00</date>
        <start>17:30</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>RZ7NWT</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/RZ7NWT</url>
        <title>Nothing new about XSS in impress.js</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>en</language>
        <abstract>I built a small demonstrator for Cross-Site-Scripting (XSS) attacks in impress.js. It would be a waste to let it stay on my computer, because I think it could help you giving a brief lecture on XSS. Much more interesting, probably, is my implementation of the whole thing: the cockpit (a header and footer that provide a visual frame, while the viewpoint navigates the 3-dimensional space of your presentation) and the handling of input to modify contents of successive slides.</abstract>
        <description>While I don't think to tell you anything new about cross-site scripting, I hope you are interested in the two features I add to the impress.js examples. Well the XSS-part also is interesting in itself, but I am astonished every time I find this weakness in the wild, because it is not difficult to prevent. Thus, if you also learn about XSS in the progress, I am happy.&#13;
&#13;
Mostly the presentation will show you two new example techniques for presentations with impress.js&#13;
&#13;
The cockpit: just some fixed headers and footer in the layout. But better graphical artists might actually turn this into a real cockpit view. In the end it is only a wee bitty of css, but it is something that turns a 3-d animation into a flight through the slide-space.&#13;
&#13;
Use my [demo sources](https://gitlab.com/larsipulami/xss-demo) and make me famous!&#13;
Value-transfer: Why using JavaScript to present static slides, it makes no sense to not utilise a fully-fledged, yet tedious, interpreter environment — your web-browser — if you don't make something more dynamic with your slides. For example transferring inputs between slides and execute contents to demonstrate the effects of XSS.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="26">
            <name>inj4n</name>
            <biography>CDA - HASI - CCCHB</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="113" guid="4dca2405-3576-59a5-8bd9-98c9d452eaa5">
        <logo/>
        <date>2018-12-29T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>QR8RPD</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/QR8RPD</url>
        <title>Das Geoportal des Guten Lebens</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>de</language>
        <abstract>Das Forschungsprojekt "Transformationsstadt - BürgerInnen forschen für ein Gutes Leben" (http://www.transformationsstadt.de/geoportal/) hat zum Ziel, ein GeoPortal für georeferenzierte offene Daten zu Themen des Gutes Lebens zu entwickeln. Warum noch ein GeoPortal? Und warum ein GeoPortal des Guten Lebens? Das haben wir uns auch gefragt. Die Antwort darauf erfahrt ihr in unserem Vortrag!</abstract>
        <description>Das GeoPortal des Guten Leben bietet eine Plattform, auf der zum einen georeferenzierbare offene Daten der Städte, Bundesländer und von wissenschaftlichen Einrichtungen fließen und zum anderen BürgerInnen Wissen über ihre Umgebung festhalten können. Alle Daten, die in das GeoPortal des Guten Lebens eingetragen werden, werden nach Dimensionen einer lokalen Adaption des Better Life Index der OECD (https://w-indikatoren.de/) indexiert. Zu den insgesamt 12 Dimensionen gehören beispielsweise Gemeinschaft, Infrastruktur, Wohnen, Engagement, Umwelt oder Sicherheit. Ziel des Portals ist einen dauerhaften Wissensaustausch zwischen Bürgerschaft und zivilgesellschaftlichen Initiativen, Wissenschaft und Kommunen zu diesen Themen zu initiieren. Eine erste Version des Portals wird aktuell entwickelt und im kleineren Rahmen getestet. Perspektivisch kann das Portal weltweit genutzt werden.&#13;
&#13;
Das GeoPortal des Guten Lebens wird gemeinsam von der zivilgesellschaftlichen Organisation Utopiastadt (http://utopiastadt.eu), dem Wuppertal Institut (https://wupperinst.org) und dem Zentrum für Transformationsforschung und Nachhaltigkeit (https://www.transzent.uni-wuppertal.de) entwickelt und verfolgt dabei die Grundgedanken von Open Data, Open Source und Open Access. Das Projekt wird gefördert vom Bundesministerium für Bildung und Forschung im Bereich Bürgerforschung.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="25">
            <name>Benedikt</name>
            <biography>twitter.com/kleinbenny</biography>
          </person>
          <person id="77">
            <name>Jana</name>
            <biography>Jana is an UX, Communication and Public Interest Designer from Wuppertal. She works for the project "GeoPortal des Guten Lebens" at the Center for Transformation Research and Sustainability (TransZent) at the University of Wuppertal.&#13;
&#13;
@JanaGreen |  janapahlkoetter.de</biography>
          </person>
          <person id="78">
            <name>Ralf</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="166" guid="749df06a-df6d-552b-9f5f-defc25fcbded">
        <logo/>
        <date>2018-12-29T18:30:00+01:00</date>
        <start>18:30</start>
        <duration>01:30</duration>
        <room>Chaos West Bühne</room>
        <slug>JGUAGC</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/JGUAGC</url>
        <title>Haecksen Happy Hour</title>
        <subtitle/>
        <track/>
        <type>Klangteppich</type>
        <language>en</language>
        <abstract>Party with the haecksen! Dance and celebrate with an uplifiting drum and base mix by dj shroombab (https://m.soundcloud.com/shroombab).</abstract>
        <description>Party party!</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="49">
            <name>Haecksen</name>
            <biography>Die "Haecksen" sind der Zusammenschluss eines Teils der weiblichen* Mitglieder des Chaos Computer Clubs. Gegründet wurde die Gruppierung 1988 von Rena Tangens und Barbara Thoens. Die Haecksen treffen sich jährlich auf dem Chaos Communication Congress des CCC und veranstalten eigene Projekte. Da sie sich als virtueller Erfa-Kreis des CCC verstehen, ist ihr wichtigstes Kommunikationsmittel eine Mailingliste.&#13;
&#13;
Das Ziel der Haecksen ist es, zu zeigen, dass Mädchen* und Frauen* ganz selbstverständlich kreativ mit Technik umgehen können und dass das Bild in den Köpfen der Menschen - dass Hacker männlich sind - nicht stimmt.&#13;
&#13;
Hierbei verstehen wir unter Haecksen eine Gruppe aus Hackerinnen, die sich als Frauen* identifizieren. Dies umfasst cis und trans Frauen sowie nicht-binäre Menschen, die sich mit dem Label "Frau" wohlfühlen. Der Stern repräsentiert nicht nur diese Personengruppen, sondern auch die Tatsache, dass Geschlecht ein soziales Konstrukt (und damit überaus hackbar) ist. &#13;
&#13;
https://www.haecksen.org/mediawiki/index.php/Main_Page</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="134" guid="ec1f65e0-1333-5bb2-af4c-46f91052467e">
        <logo/>
        <date>2018-12-29T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>U3R3RZ</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/U3R3RZ</url>
        <title>Freitagsfoo gestern, heute, morgen</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>de</language>
        <abstract>Wie organisiert man einen "offenen Abend" mit Vorträgen? Muss man da überhaupt etwas organisieren oder schaffen das die Vortragenden selbst?&#13;
&#13;
Wir erzählen vom [Freitagsfoo](https://wiki.chaosdorf.de/Freitagsfoo) im Chaosdorf und unseren Erfahrungen.</abstract>
        <description>Der Freitagsfoo ist ein wöchentliches Event im Chaosdorf, bei dem u.a. gegessen und vorgetragen wird. Wir berichten über Vergangenheit und Gegenwart und haben Ideen für die Zukunft.&#13;
&#13;
Früher wurde das mit den Vorträgen aber leider etwas schleifen gelassen. Dies hatte viele Gründe. Der Hauptgrund dürfte sein, dass die Moderationsrolle meistens erst spontan zugewiesen wurde - oder auch gar nicht.&#13;
&#13;
Mit unserem neuen Moderationsteam (die Vortragenden hier) und neuer Technik (z.B. unserer [Info-Beamer App](https://github.com/chaosdorf/freitagsfoo-infobeamer) und unserer [Web App](https://github.com/chaosdorf/freitagsfoo-web)) wird das alles besser!&#13;
&#13;
Außerdem berichten wir von einem anderen Anlauf, der in diese Richtung schon 2015 unternommen wurde, aber leider nur sehr kurzfristig (eine Woche) funktioniert hat.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="47">
            <name>ytvwld</name>
            <biography>Ich bin Teil des Freitagsfoo-Moderations-Teams im Chaosdorf und Hauptentwickler unserer Info-Beamer-App und der Webapp.</biography>
          </person>
          <person id="57">
            <name>hanemile</name>
            <biography>{Python, Go} {TFG, HHU, @chaosdorf} {ENERGIE!}</biography>
          </person>
          <person id="23">
            <name>nomaster</name>
            <biography>Studied computer science and philosophy, but never got an academic title. With a practical approach, got some insight into the legacy of operating systems and networks. As an active member of several hackspaces and the Freifunk community, nomaster dedicates his work on the educational perspective on technology.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="123" guid="f4568030-a378-586e-b39a-4fab71027a37">
        <logo/>
        <date>2018-12-29T21:30:00+01:00</date>
        <start>21:30</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>ZZ79BR</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/ZZ79BR</url>
        <title>Bei gleicher Qualifikation werden Männer bevorzugt - Algorithmic Bias &amp; der österreichische Arbeitsmarkt</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>As algorithms are involved or even solely responsible for more and more decisions in our daily lives, there is more and more discussion about algorithms being unfair, biased, even straight-on discriminatory.&#13;
&#13;
The Austrian Public Employment Service (AMS) announced in October that they would start using an algorithmic system (in short, every-day language "algorithm") to decide who will receive more (or less) benefits and support from their system. First analyses in the days after the announcement already predicted that the system would be discriminating against people who are already marginalise</abstract>
        <description>In this talk I want to give people a better understanding of why and how algorithmic systems are biased and how people are trying to solve problems these biases cause. Specifically, we will see how data collection and interpretation, model creation, problem definition, definition of success and even the design of outputs can impact algorithmic systems – or improve justice and equality, if proper thought and care is put into designing them.&#13;
&#13;
As a computer science student, students' rights activist and privacy activist, I have worked on the topic of algorithmic bias at various institutions and with different groups of people. &#13;
A one-page article I co-authored on the topic of algorithmic bias aimed at students in Austria can be found at &lt;a href="https://www.progress-online.at/artikel/wenn-der-algortihmus-zum-unterdr%C3%BCcker-wird"&gt;Progress magazines' website&lt;/a&gt;. &#13;
A write-up for the masters' course "Critical Algorithm Studies" at TU Wien can be found on &lt;a href="https://pascoda.fairydust.space/index.php/2018/09/write-up-bias-in-algorithmic-systems/"&gt;my blog&lt;/a&gt;. It discusses which current issues in algorithmic systems are, in my opinion, the most urgent ones.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="33">
            <name>pascoda</name>
            <biography>I am a CS student and an activist for students' rights, privacy, and social justice.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="133" guid="8de552ac-9a4d-5b37-b4eb-e0576d64dfe5">
        <logo/>
        <date>2018-12-29T22:30:00+01:00</date>
        <start>22:30</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>QHNDRQ</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/QHNDRQ</url>
        <title>Hackspaces: How to conflict eine offene Frage</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Wir beobachten in immer mehr Spaces Konflikte innerhalb der Community die teilweise bis zur Spaltung führen. Wir wollen versuchen die Probleme anhand unseres eigenen Spaces zu ana­ly­sie­ren. Außerdem wollen wir potentielle Lösungsmöglichkeiten, die wir gerade versuchen einzuführen, vorstellen. Schließlich wollen wir Versuchen einen Diskussion darüber innerhalb der gesamten Hacking und Chaos Community anzustoßen anstatt das jeder Space versucht die Probleme alleine und erneut zu lösen</abstract>
        <description>Aktuellen sehen wir immer mehr Gemeinschaften in der Hacking Community in denen es kriselt und sich Konflikte innerhalb der Gemeinschaft auftun. Oft gibt es auf den ersten Blick keinen konkreten Anlass oder Grund dafür. Wir haben das sowohl aus erster Hand in unserem lokalem Space als auch aus der ferne bei mehreren anderen beobachtet. Wir glauben das die Gründe dafür unter anderem in fehlenden Gemeinschaftlichen Identität und Gemeinschaftlichen Werten sowie der Kommunikation liegt. In diesem Talk wollen wir die Probleme die wir glauben Identifiziert zu haben am Beispiel unseres Spaces vorstellen. Außerdem werden wir vorstellen was wir glauben wie man diese Probleme angehen und beheben kann. Da die Ereignisse bei uns sehr aktuell sind ist es aber noch nicht möglich ein Fazit zu sehen ob alle diese Techniken wirklich funktionieren. Wir sehen diesen Talk viel mehr auch als ein Startpunkt das wir als deutsche Hacking bzw Chaosnahe Gemeinschaft darüber eine Diskussion führen sollten wie wir mit solchen Fällen umgehen und was wir hoffentlich proaktiv tun können damit es gar nicht so weit kommt.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="45">
            <name>Sandzwerg</name>
            <biography>Seit Ende 2012 im münsteraner Hackspace, der warpzone aktiv. Seit 2013 im Vorstand, seit 2014 tue ich auch Dinge bei Chaos-West</biography>
          </person>
          <person id="84">
            <name>Reverend</name>
            <biography>From hackerspace Münster: warpzone</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="119" guid="04c8e1d6-ccde-596c-8d15-1fe758d0bc0e">
        <logo/>
        <date>2018-12-29T23:30:00+01:00</date>
        <start>23:30</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>S98TLU</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/S98TLU</url>
        <title>IMFUC</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>de</language>
        <abstract>Bei diesem Spiel, geht es um Filme und Code. Um nerdige Referenzen und tötlichen Wortwitz. Zwei Teams müssen anhand von Codeschnipseln Filmtitel erraten. Die Teams haben abwechselnd 30 Sekunden Zeit um den richtigen Titel zu finden. Mehr wird noch nicht verraten.</abstract>
        <description>In einem Moment endloser Langeweile schrieb einst Großmeister der Hackerfilme einen Code. Dabei viel ihm auf, dass dieser Code einen echten Handlungsstrang aufwies. Er rätselte über ein halbes Jahrhundert, bis ihm auffiel, dass es sich um den Pseudocode von "V wie Vendetta" handelte. Darauf hin beschloss er allen Code der Welt zu analysieren und auf versteckte Filme zu prüfen. Das Ergebnis von 3,1415 Jahrtausenden Arbeit ist IMFUC. Ein Spiel. Eine Challenge. Ein schmerzhafter Wordwitz.&#13;
&#13;
Auch das Publikum wird mitraten dürfen. Dabei wird die Anzahl der korrekten Antworten auf der Bühne angezeigt. Und das ganz sicher nicht, um die Teams ein wenig zu trollen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="29">
            <name>harmoniemand</name>
            <biography>Nerd und Softwareentwickler aus Heilbronn. Arbeite dort mit Jugendlichen und Technik.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="ChaosZone">
      <event id="709" guid="fc628de1-d13c-5cca-a55e-56bc092c8fb3">
        <logo/>
        <date>2018-12-29T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>8ZNLPJ</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/8ZNLPJ</url>
        <title>Haskell Game Development</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>A short view on my yet early stages of game development in Haskell and the tools I have crafted so far.</abstract>
        <description>In this talk I will give some insights into the programming language Haskell as well as common problems you encounter, when starting game development in this language.&#13;
&#13;
Furthermore You will see my attempts at game programming in this language, being both 2D and 3D applications, and my best attempts in completing a game, of which one is still work in progress.&#13;
&#13;
I will also be presenting "Affection", my own, still minimalist, game engine to the public and seek like-minded people to help advance it further.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="14">
            <name>Nek0</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="722" guid="20dfd0fc-67f7-55aa-bf2f-4e629ff038b5">
        <logo/>
        <date>2018-12-29T15:15:00+01:00</date>
        <start>15:15</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>GAP7W8</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/GAP7W8</url>
        <title>ChaosZone goes Chaos Communication Camp - Hackspaces of the East, let's organize some Outdoor Chaos</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>We need you to make ChaosZone at Chaos Communication Camp 2019 awesome. In this session we would like to start weaving the net between our hackspaces to make it happen.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4">
            <name>bigalex</name>
            <biography/>
          </person>
          <person id="1">
            <name>nilo</name>
            <biography/>
          </person>
          <person id="27">
            <name>honky</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="718" guid="a1139df6-a02e-5d1b-96f3-0a1094909659">
        <logo/>
        <date>2018-12-29T16:45:00+01:00</date>
        <start>16:45</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>UDCQHX</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/UDCQHX</url>
        <title>Hebocon - Regionalliga</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>Weight-In und Vorausscheid für das später staffindende Hebocon-Finale</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="21">
            <name>honky</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="712" guid="14a8a211-a5f3-5495-891d-72392cd0550e">
        <logo/>
        <date>2018-12-29T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>KHLB8Z</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/KHLB8Z</url>
        <title>Aus der Praxis eines studentischen Hackspaces: Selfhosting, Freie Software, Chaos</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>Der Maschinenraum ist ein Hackspace, der seit fast 20 Jahren Teil des studentischen Lebens in Weimar ist. Bei uns läuft einiges anderes - wir erzählen vom Kampf um freie Software, Akzeptanz dezentraler Dienste, und dem allgemeinen Chaos.</abstract>
        <description>Wir betreiben als Initative des Studierendenkonvents u.a. eigene Nextcloud-, Gitlab-, Etherpad-, Wordpress- &amp; Mastodon-Instanzen. Und wir kämpfen für freie Software in der Lehre – manchmal auch einfach nur, weil wir keinen Bock mehr haben 10 mal am Tag gefragt zu werden ob wir Photoshop cracken können.&#13;
Und auch die Bürokratie kann nicht viel mit einem Hackspace anfangen, aktuell sollen wir z.B. der Innenrevision nachweisen, dass wir nicht im kriminelle Machenschaften verstrickt sind – und zwar indem wir Selbstzensur und Totalüberwachung betreiben.&#13;
Wir haben also genug zu erzählen, aber erwartet bitte keinen allzu ernsten und technischen Vortrag. :)</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="17">
            <name>aurora</name>
            <biography/>
          </person>
          <person id="22">
            <name>mt</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="708" guid="886791c2-9ab1-5779-b889-3429d5e4021e">
        <logo/>
        <date>2018-12-29T19:30:00+01:00</date>
        <start>19:30</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>GYDDDD</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/GYDDDD</url>
        <title>DevOps Disasters</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>Abgründe und Gruseligkeiten aus der Operations-Welt</abstract>
        <description>Software will nicht nur gebaut, sondern auch betrieben werden. Spätestens, wenn es sich beim Production Environment nicht länger um Wohnzimmerprovider, Standard-Webspace und FTP handelt, wird schnell deutlich, was ein Stück Code wirklich taugt, ob er skaliert, oder ob das, was in der Entwicklungsumgebung noch ganz nett aussah im Betrieb für ernsthafte Schmerzen sorgt. Doch nicht nur die Software selbst hat Grusel-Potential...</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5">
            <name>Stefan</name>
            <biography>Hacktivism, DevOpse, Guerilla-IT, freies Radio &amp; Co.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="714" guid="806d9394-f19e-512b-9290-91e633e9921d">
        <logo/>
        <date>2018-12-29T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>SPC9JS</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/SPC9JS</url>
        <title>Lightningtalks Overflow</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>You didn't manage to get an official Lightningtalk slot? Here is another chance to deliver your talk. Overflow talks will be managed by the "official" Lightning talk pretalx system. Please do NOT submit lightningtalks directly to ChaosZone.&#13;
&#13;
Detailed program: https://c3lt.de/35c3overflow/schedule/&#13;
&#13;
CfP https://c3lt.de/35c3overflow/cfp</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="19">
            <name>-</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="724" guid="fdb28191-b9f5-5cc0-a3a1-dbb54ffdc527">
        <logo/>
        <date>2018-12-29T22:30:00+01:00</date>
        <start>22:30</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>EWKNEU</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/EWKNEU</url>
        <title>Fucked Up For A Cause</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>When working coding for the Atari 2600 VCS, one can assume that the guys building the hardware did some very crude fuck ups. Let my show you why this is a wrong assumption.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="29">
            <name>SvOlli</name>
            <biography>Award winning demo coder. Favourite system: Atari 2600 VCS as released in 1977 (US) and 1979 (Europe).</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Vortrags-Arena">
      <event id="306" guid="83cb47b2-23fd-5a97-a82f-053469f31640">
        <logo/>
        <date>2018-12-29T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>00:30</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>QMHCUH</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/QMHCUH/</url>
        <title>OIO habour clean up - Day 2</title>
        <subtitle/>
        <track/>
        <type>OIO Housekeeping</type>
        <language>en</language>
        <abstract>daily OIO habour clean up - Day 2</abstract>
        <description>daily OIO habour clean up - Day 2</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="93">
            <code>HUQ9YA</code>
            <public_name>35c3oio@freifunk.space</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="281" guid="e498a961-fe0d-5eb0-b12b-b462061f6edc">
        <logo/>
        <date>2018-12-29T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>CNPSQR</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/CNPSQR/</url>
        <title>OIO Daily Standup day 3</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>Let's start into day 3</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6">
            <code>HFER8G</code>
            <public_name>Andreas Dorfer</public_name>
            <biography>https://forum.freifunk.net/u/adorfer/</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="239" guid="75a12486-070c-539d-b4a9-a9495c86b78d">
        <logo/>
        <date>2018-12-29T12:30:00+01:00</date>
        <start>12:30</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>AVFU8A</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/AVFU8A/</url>
        <title>Freifunk - The Next Generation</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>FF-TNG aims at regrowing a local FF based network community by -on the one hand- going back to the 90's "Bürgernetze" Idea of free communication with others, (focus on VOIP, SMS, Chat, mail) but also by enabling the individual community member to offer services to others and the world (e.g. via DNS zone delegation to individual nodes). For true autonomy we envisage to not only use WIFI and VPN links but also include LORA-based communication to connect local nodes for low bitrate communication (chat, sms).</abstract>
        <description>A small group of FF-Munich people is currently developing a concept called FF-TNG "Freifunk - The Next Generation".&#13;
It came about after FFMUC had grown rapidly but a vast majority of FFMUC nodes is only using FF as a cheap pseudo-VPN gateway to the internet and after the rapid growth has put BATMAN to its limits making FF an only 'so-so' experience.&#13;
The concept aims at regrowing a local network community by -on the one hand- going back to the 90's "Bürgernetze" Idea of free communication with others, (e.g. VOIP, SMS, Chat) and -on the other hand- also by enabling the individual community member to offer services to others and the world (i.e. including DNS zone delegation to individual nodes and ipv6). For parts of the mesh we are looking at Babel. To get to a truly wide ranging individual network our concept includes LORA based communication for low-bitrate communication (Chat, SMS) to reach locations not reachable by simple 2.4 or 5GHz WIFI nodes.&#13;
The talk will be a ride through our first concept of how we think communication power can be put back to people so they can control their communication network. We hope for comments and input from the community - also of the kind "das kannste schon so machen, aber dann isses halt kacke"</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="37">
            <code>JXBP8Z</code>
            <public_name>Peter Buschkamp</public_name>
            <biography>After studying Physics in Bielefeld, I somehow thought getting a PhD in Astrophysics is fun. It was. In part. Now I build optical instruments that get to fly on satellites by day and sometimes stare at the sky by night. In between, I like to discuss and mull over implications of natural and computer sciences for society, hike the alps and help to build the Munich Freifunk wireless backbone.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="263" guid="d3e546e5-f917-51ab-ab5e-a88c89699fcc">
        <logo/>
        <date>2018-12-29T13:30:00+01:00</date>
        <start>13:30</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>EGJW3F</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/EGJW3F/</url>
        <title>Independent Solar Energy Mesh System</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Das Independent Solar Energy Mesh System (ISEMS) knüpft an den Freifunk-OpenMPP-Tracker an. Das System (Lua-Tool, Integration in Luci, Mikrocontroller-Firmware für den OpenMPPT, Web-App) soll es für Nicht-Experten einfacher machen, ihrer eigene drahtlosen Freifunk-Kommunikationsinfrastruktur unabhängig vom Stromnetz zu betreiben.</abstract>
        <description>ISEMS überwacht u.a. den Batteriestand, die Batterietemperatur und die Energiedaten des Moduls und bietet Strategien zum Energiesparen.&#13;
&#13;
Mit der ISEMS-Software können Benutzer eine Übersicht einsehen, wie ihre Solarknoten arbeiten. Die Web-App zeigt eine Übersicht aller Knoten sowie eine Checkliste für die einzelnen Knoten. Wenn etwas aus dem Ruder läuft, liefert sie Warnungen und Hinweise zur Fehlerbehebung.&#13;
&#13;
Dauer: 20 Minuten für unsere Präsentation mit 10 Minuten für Q + A&#13;
&#13;
Zusätzliche Infos / Links / Referenzen:&#13;
&#13;
http://isems.de&#13;
https://www.youtube.com/watch?v=BxFpY2tsPtU&#13;
https://wiki.freifunk.net/Freifunk-MPP-Tracker</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="57">
            <code>HZ9WHF</code>
            <public_name>Elektra</public_name>
            <biography>Free wireless networks since 2001&#13;
Freifunk since 2003</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="291" guid="96770b24-6aa8-53b1-9766-cc72e2e179c1">
        <logo/>
        <date>2018-12-29T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>Q7XT7M</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/Q7XT7M/</url>
        <title>Störerhaftung: Aktuelles aus der juristschen Welt</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Bea gibt einen Überblick über den aktuellen Stand zur Störerhaftung, wie es den Abmahnungen geht und was uns der Gesetzgeber neues bietet.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="75">
            <code>UEK7FN</code>
            <public_name>Bea Hubrig</public_name>
            <biography>.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="266" guid="1535b9d7-2182-53bb-b00d-4697c83bb5fc">
        <logo/>
        <date>2018-12-29T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>WCXEXU</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WCXEXU/</url>
        <title>Seenotrettung und humanitäre Hilfe - was war, was ist, was wird? Kriminalisierung und der Ausblick auf 2019</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Die andauernde Kriminalisierung humanitärer Hilfe hat auch in diesem Jahr unsere Arbeit massiv erschwert, Menschenleben gekostet und die europäische Abschottungspolitik vorangetrieben. In diesem Talk geben wir einen Überblick darüber, welche Auswirkungen die Kriminalisierung humanitärer Hilfe haben kann und was im kommenden Jahr zu erwarten ist.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="55">
            <code>NFL8CT</code>
            <public_name>just humans</public_name>
            <biography>Wir sind eine Gruppe politischer und humanitärer Aktivist*innen aus verschiedenen Organisationen.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="274" guid="175f6e41-1cf4-5733-b656-5c990453fe2c">
        <logo/>
        <date>2018-12-29T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>00:50</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>UFZYAS</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/UFZYAS/</url>
        <title>F-Droid:Pimp your Android(-fork) with the best Free Software apps</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>en</language>
        <abstract>After a short introduction about software freedom on Android and Custom ROMs, I will demonstrate the Free-Software-App-Repository "F-Droid" with its anarchic and anti-censorship features. But as F-Droid offers you access to hundreds of Free-Software-apps and the sheer amount can be overwhelming in the beginning, in a next step I will also come up with the 10 or so most important apps (IMHO!).</abstract>
        <description>F-Droid is a Free-Software-App-only repository for Android systems and every Android-based fork and a powerful client that is designed to be resilient against surveillance and censorship. For its competitive character, F-Droid is not available via other "app stores" (like Google Play). You have to download it via your browser once but then it is easy to install and easy to use - and without the need for any account!&#13;
&#13;
Once installed, F-Droid offers you access to hundreds of Free-Software-apps in compiled form and their sources. It also allows you to share (your) apps in mulitple ways, including offline methods and via onion repositories. You can add your own Free-Software-project to the official F-Droid catalogue or even set-up your own repositories and offer access via F-Droid.&#13;
&#13;
Unfortunately, F-Droid misses any kind of rating system, so the sheer amount of available Free-Software-apps can be overwhelming in the beginning. So, after a short introduction about software freedom on Android and Custom ROMs, I will demonstrate F-Droid with its anarchic and anti-censorship features. Next, I will come up with the 10 or so most important apps (IMHO!).&#13;
&#13;
**Update:** [Slides by Erik Albers, CC-BY-SA](https://web.3rik.cc/Nextcloud13/index.php/s/zRqYoA3TQb97mrP)</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="89">
            <code>AB9QAQ</code>
            <public_name>Erik Albers</public_name>
            <biography>Erik Albers is communication and programme manager for the Free Software Foundation Europe and engages since many years for users' and software freedom. Erik regularly publishes articles about diverse aspects of Free Software on different channels and occasionally writes on Netzpolitik.org.  In his spare time, Erik researches about digital sustainability with a special focus on sustainability of an by software as well as therein implied dependencies or solutions.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="233" guid="465d4b06-089c-571d-af98-5d3c87cf53a3">
        <logo/>
        <date>2018-12-29T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>FS7D9L</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/FS7D9L/</url>
        <title>Vom eingestaubten Teleskop zum High Tech Lieblingsteleskop</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>de</language>
        <abstract>3D-gedruckte Open Source GOTO Steuerung für 0815 Billig Teleskope, oder wer es lieber wissenschaftlich mag die bt³s Open Source und Open Hardware Steuerung zum nachbauen</abstract>
        <description>Open Hardware GOTO Steuerung für Low Budget Teleskope selber bauen. Erfahrungsbericht und Live Demonstration.&#13;
&#13;
Vorstellen der 3D gedruckten Open Hardware GOTO Steuerung für Teleskope (Entwickelt von Roman Hujer).&#13;
&#13;
Technische Details zur Hardware sowie Quellen Empfehlungen zum Nachbau. Konfiguration vorstellen für die GOTO Steuerung (Firmware) und Schnittstellen Konfiguration in Stellarium.&#13;
&#13;
Stellarium Konfiguration detailliert für GOTO Steuerung, GPS Daten via GPS/Glonas USB Stick einpflegen und Sternen und Satelliten Datenbank Repositories aktivieren und erweitern.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="28">
            <code>K93XDG</code>
            <public_name>h3rb3rn</public_name>
            <biography>https://hackover.de/fahrplan/speakers/3958.html</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="234" guid="21ff694c-e8f9-5aed-94bc-0efa78f93132">
        <logo/>
        <date>2018-12-29T18:30:00+01:00</date>
        <start>18:30</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>WA38FQ</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WA38FQ/</url>
        <title>Freifunkinstallationen in Flüchtlingsheimen - Erfahrungsbericht, Empfehlungen</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Am Beispiel einiger Freifunkinstallationen in Flüchtlingsunterkünften in München wird anhand von Best Practices beschrieben, wie am besten vorzugehen ist. Budget, Ansprache der Verantwortlichen, technische Hürden, Umsetzung, Planung, Rückbau.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="30">
            <code>X3XLVM</code>
            <public_name>pkoerner81929</public_name>
            <biography>Freifunker aus Leidenschaft.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="235" guid="8cde9720-65a3-5463-b9e8-aa8bfb6416b4">
        <logo/>
        <date>2018-12-29T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>00:55</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>QHXBFG</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/QHXBFG/</url>
        <title>State of the InterNAT - Freifunk Rheinland Backbone Update</title>
        <subtitle/>
        <track/>
        <type>Talk 50min total (etwa 15min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Was war, was ist, was wird - ein Überblick über die Events der letzten Zeit und unsere Pläne für mehr Selbstverwaltung</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="31">
            <code>LLZPXX</code>
            <public_name>Maximilian Wilhelm</public_name>
            <biography>* Barbarossa&#13;
 * Kevin&#13;
 * Lars&#13;
 * Takt&#13;
 * Thomas</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="246" guid="0f38a37f-f2fe-5a70-9640-2614c3c9e050">
        <logo/>
        <date>2018-12-29T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>3ME8XJ</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/3ME8XJ/</url>
        <title>10 Tops &amp; Flops für den erfolgreichen Aufbau einer Community wie Freifunk München</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Freifunk München wird getrieben vom Freie Netze München e.V.. Jeder Verein hat Höhen und Tiefen. Um ein stabiles Team zu halten sind einige Basics notwendig.</abstract>
        <description>1. Wir reden über die Größten Erfolge.&#13;
2. Über die Durststrecken ... ohne Admins.&#13;
3. Politik die mal will oder nicht in München und Bayern.&#13;
4. NixOS ist genial aber kaum einer kann es.&#13;
5. Segmentierung = Fluch oder Segen?&#13;
6. Warum traut sich keiner an Babel?&#13;
7. Virtualisierung Proxmox oder OpenNebula?&#13;
Fragen....</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="44">
            <code>9SNQSH</code>
            <public_name>Daniel Fussy</public_name>
            <biography>Freifunk München</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="299" guid="bde24074-90b6-511b-8fd8-588149529d8f">
        <logo/>
        <date>2018-12-29T21:30:00+01:00</date>
        <start>21:30</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>ZFQCBB</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/ZFQCBB/</url>
        <title>Mathematische Modellierung informatischer Probleme</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Der Vortrag soll sich hauptsächlich darauf beziehen, wie Mathematik bei der Lösung von informationstechischen Problemen helfen kann, wobei Möglichkeiten und Probleme aufgezeigt werden sollen.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="78">
            <code>8YLAG3</code>
            <public_name>Lukas Schneider</public_name>
            <biography>* Schüler am ASGspez in Erfurt&#13;
* BwInf-Teilnehmer&#13;
* Großes Interesse an Politik&#13;
* Und an Informatik :-D</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="314" guid="fef79e66-cab6-5fc4-b31e-dc802c46f277">
        <logo/>
        <date>2018-12-29T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>01:30</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>QAS33L</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/QAS33L/</url>
        <title>Schwarze Löcher für blutige Anfänger</title>
        <subtitle/>
        <track/>
        <type>Talk 80min total (etwa 30min  Q&amp;A)</type>
        <language>de</language>
        <abstract>Albert Einstein hat sie vorhergesagt, bis in die 90er hinein war ihre Existenz heftig umstritten - die vielleicht verrücktesten Dinger im Universum: Schwarze Löcher.</abstract>
        <description>Eigentlich dürften Schwarze Löcher nicht existieren. Wie kann etwas "unendliche Dichte" haben, "unendlich klein" sein. Und wenn nichts, aber auch gar nichts ein schwarzes Loch verlassen kann, wie kann dann die Gravitation das schwarze Loch verlassen? Und was passiert mit der Zeit in der Nähe schwarzer Löcher, bleibt die da wirklich stehen? Und woher wissen wir, dass sie wirklich existieren? In Schwarzen Löchern krachen zwei unvereinbare Theorien aufeinander, die Quantenphysik und die Relativitätstheorie.  &#13;
Wir beschäftigen uns mit jeder Menge Fragen an den Grenzen der Physik... und manchmal ein wenig darüber hinaus.&#13;
&#13;
Vorkenntnisse sind nicht erforderlich.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="99">
            <code>9ZUND7</code>
            <public_name>Steini</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="302" guid="076b0e7a-4d97-5958-8e02-740f6d8c6456">
        <logo/>
        <date>2018-12-30T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>01:00</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>UVGYXJ</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/UVGYXJ/</url>
        <title>Iuventa counter-investigation</title>
        <subtitle/>
        <track/>
        <type>Movie with Q&amp;A</type>
        <language>en</language>
        <abstract>Documentation and Q&amp;A with crew members of Iuventa and other SAR ships</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="91">
            <code>UPW7QV</code>
            <public_name>Solidarity at Sea</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Workshop-Domo">
      <event id="316" guid="85587d11-2426-5b34-b8cf-7f2a020d4517">
        <logo/>
        <date>2018-12-29T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>02:00</duration>
        <room>OIO Workshop-Domo</room>
        <slug>AQ9TUQ</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/AQ9TUQ/</url>
        <title>SatNOGS meeting (TCA)</title>
        <subtitle/>
        <track/>
        <type>Workshop 110min</type>
        <language>en</language>
        <abstract>...</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="100">
            <code>7VMKDP</code>
            <public_name>bastla</public_name>
            <biography>Sebastian Lange (DL7BST), c3space, SatNOGS, AfuTUB/DK0TU</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="309" guid="b2ec2d49-e698-5858-be0a-2513b4849a01">
        <logo/>
        <date>2018-12-29T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>00:45</duration>
        <room>OIO Workshop-Domo</room>
        <slug>T8NVCS</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/T8NVCS/</url>
        <title>Careables Open Source Hardware in Health+Care [Meetup]</title>
        <subtitle/>
        <track/>
        <type>Workshop 45min</type>
        <language>en</language>
        <abstract>Meetup</abstract>
        <description>Calling all hackers, designers, makers, carers, and healthcare professionals!&#13;
&#13;
We want to discuss: What are challenges you face every day using standard tools for health and wellbeing? Do you have an idea that makes everyday life easier? How could you use your existing hackerspace to foster exchange and collaboration in health and care?&#13;
&#13;
Through Careables, maker and designer collaborate with patients and healthcare professionals to create personalized solutions and open source knowledge that will improve the lives of many patients and professionals.&#13;
&#13;
Accessible, comprehensive and easy to use open source hardware are being documented, collected and shared through the platform Careables.org. This platform is currently being launched and will function as repository for well documented open hardware projects. It offers many different communities a place to connect and exchange knowledge, needs and co-create solutions.&#13;
&#13;
It's easy to think of open hardware that make a difference in people's lives. An example of this is OPEN LIGHTS. This project offers people with wheelchairs an adjustable wheelchair specific light that makes them better visible at night and that can be built with most common DIY technologies.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="96">
            <code>P3GLDY</code>
            <public_name>Sandra GIG</public_name>
            <biography>tl;dr: GIG is the global network of social and technological innovators. #wearegig&#13;
&#13;
Global Innovation Gathering (GIG) is a vibrant, diverse community of innovation hubs, makerspaces, hackerspaces and other grassroot innovation community spaces and initiatives as well as individual innovators, makers, technologists and changemakers. GIG is pursuing a new vision for global cooperation based on equality, openness and sharing. We aim to enable more diversity in the production of technology, and global innovation processes and support open and sustainable solutions developed by grassroot innovators. With strong roots in the global south, we share, collaborate and work together globally. GIG provides a platform for meaningful exchange by fostering knowledge exchange and collaboration between its members.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="318" guid="ae8d646b-83a8-5327-b4bd-d3dab9f544d8">
        <logo/>
        <date>2018-12-29T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>00:45</duration>
        <room>OIO Workshop-Domo</room>
        <slug>PXYMLE</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/PXYMLE/</url>
        <title>Bits &amp; Bäume @ Congress : weiter zusammen(-)wachsen</title>
        <subtitle/>
        <track/>
        <type>Workshop 45min</type>
        <language>de</language>
        <abstract>Bei der Konferenz Bits &amp; Bäume haben im November Aktivist*innen unter&#13;
anderem aus der Hacker- und Ökoszene über ihre Ziele, Utopien und&#13;
Strategien diskutiert. Entstanden sind nicht nur neue Verbindungen&#13;
sondern auch elf Forderungen an die Politik. Wir wollen die Idee und&#13;
Ergebnisse der Konferenz vorstellen und mit euch gemeinsam weiterspinnen.&#13;
&#13;
https://bits-und-baeume.org&#13;
https://bits-und-baeume.org/forderungen&#13;
https://media.ccc.de/v/bub2018-246-eine_andere_digitalisierung_ist_moglich&#13;
(ab 31:00)</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="101">
            <code>RADWLR</code>
            <public_name>Nico</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="286" guid="e2492352-efbd-5b2c-88e6-29f890fc148c">
        <logo/>
        <date>2018-12-29T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>00:45</duration>
        <room>OIO Workshop-Domo</room>
        <slug>KSDGVM</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/KSDGVM/</url>
        <title>Freifunk-Workshop: Community-Vernetzung</title>
        <subtitle/>
        <track/>
        <type>Workshop 45min</type>
        <language>de</language>
        <abstract>Das "Freifunk-Vernetzungsmumble" ist ziemlich tot. Warum? &#13;
Möglichkeiten der Zusammenarbeit auf Community-Ebene?</abstract>
        <description>Es soll hier nicht die x-te Auflage von "warum das ICVPN in Zeiten von Public IPv6 niemand mehr will" und "warum es keine internen Dienste gibt" sein. &#13;
Wir sehen deutlich mehr größere "Festivals", das WCW wird größer obwohl das Leben in vielen lokalen Communities eher weniger wird. Welche Inhaltliche Zusammenarbeit können wir ganz konkret selbst anbieten und wie könnte man es organsiieren, ohne eine Tooldebatte um "Mailingsliste vs. Slack vs Wiki (welches eigentlich?)" zu eröffnen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6">
            <code>HFER8G</code>
            <public_name>Andreas Dorfer</public_name>
            <biography>https://forum.freifunk.net/u/adorfer/</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="311" guid="1e3b8de7-2051-546b-8a89-b5473ec6ac99">
        <logo/>
        <date>2018-12-29T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>01:20</duration>
        <room>OIO Workshop-Domo</room>
        <slug>N7NADC</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/N7NADC/</url>
        <title>Next Generation FOSS Lightning Control - Brainstorming &amp; Kick-Off</title>
        <subtitle/>
        <track/>
        <type>Workshop 80min</type>
        <language>en</language>
        <abstract>Die bisherigen Lösungen für Lichtsteuerung sind in der Regel teuer oder sehr kompliziert/nutzerunfreundlich. Ziel ist es, eine neue Lichtsteuerung zu entwickeln, die auf FOSS-Basis ein gutes Werkzeug für kreative wird.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="12">
            <code>SZWSUS</code>
            <public_name>margau</public_name>
            <biography>Student der Informationstechnik, Freifunk Stuttgart &amp; begeisterter IoT-Bastler.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="254" guid="be48f5dc-8df6-5917-ba56-3e2162202057">
        <logo/>
        <date>2018-12-29T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>00:45</duration>
        <room>OIO Workshop-Domo</room>
        <slug>WXUJ8N</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WXUJ8N/</url>
        <title>Aufbau von Freifunk in Kleingartenanlagen</title>
        <subtitle/>
        <track/>
        <type>Workshop 45min</type>
        <language>de</language>
        <abstract>Diskussionsrunde auf Basis einer Problemstellung (Kartendaten zu einer Anlage) ohne eine Lösung einzubringen.&#13;
Ziel ist: Erfahrungen einzusammeln und auszutauschen, Hinweise und Tips zu bekommen und auszutauschen.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="48">
            <code>NFMZXP</code>
            <public_name>Richard</public_name>
            <biography>Softwareentwickler mit Garten</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="WikiPakaWG Esszimmer">
      <event id="522" guid="14016199-6d4b-5f13-8b2f-a057afeb3abd">
        <logo/>
        <date>2018-12-29T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:45</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>DBVJK7</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/DBVJK7/</url>
        <title>AI in Wikipedia</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>de</language>
        <abstract>A general overview and report on how Wikipedia uses artificial intelligence to improve its efficiency</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7">
            <code>8GDPPA</code>
            <public_name>Amir</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="523" guid="0967f643-013b-57cc-870b-f2d4dfebc442">
        <logo/>
        <date>2018-12-29T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>XRQNHR</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/XRQNHR/</url>
        <title>Building a Wikidata tool</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>de</language>
        <abstract>Much of the work in the Wikimedia universe, and especially on Wikidata, is done using external tools. Here you’ll see how you can build your own! (See also the [behind-the-scenes blog post](https://lucaswerkmeister.de/posts/2019/01/04/speedpatrolling/).)</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6">
            <code>RE9MSE</code>
            <public_name>Lucas</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="540" guid="da94b720-9118-513f-885e-3312c033dfd0">
        <logo/>
        <date>2018-12-29T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>LEFJBC</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/LEFJBC/</url>
        <title>Squarelet - Kooperativ Lernen mit Open Source-Pinboards</title>
        <subtitle/>
        <track/>
        <type>Workshop mit Gruppentischen</type>
        <language>de</language>
        <abstract>Wir entwickeln [squarelet.org](https://www.squarelet.org), ein Open-Source-Pinboard für kooperatives Lernen und Arbeiten. In dem Workshop stellen wir die Alpha-Version vor, erstellen Use Cases und freuen uns über eure Ideen und Anregungen. Agenda: https://hackmd.okfn.de/0Q4h28VDRym0vKKAm7GRxQ#</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="43">
            <code>U9QVUW</code>
            <public_name>Markus</public_name>
            <biography/>
          </person>
          <person id="44">
            <code>EVCNRE</code>
            <public_name>mavo</public_name>
            <biography/>
          </person>
          <person id="45">
            <code>XHBSU3</code>
            <public_name>Edgar</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="542" guid="5dcb6c1b-6016-58cf-820a-534f47b9a778">
        <logo/>
        <date>2018-12-29T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>MJAKJY</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/MJAKJY/</url>
        <title>Hacks/Hackers Meet-Up</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract>“Hacks” (journalists) and “hackers” (technologists) work together to create physical and digital spaces for exploring new ways to tell stories.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="47">
            <code>ZV98N9</code>
            <public_name>fex</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="537" guid="faa0618b-14fe-5542-b160-d6591468a897">
        <logo/>
        <date>2018-12-29T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>UYWYWZ</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/UYWYWZ/</url>
        <title>Jugend hackt Lightning Talks</title>
        <subtitle/>
        <track/>
        <type>Lightning Talk</type>
        <language>de</language>
        <abstract>Android entgooglen (Max)&#13;
Warum ich 1 Mozillian wurde (Jens)&#13;
Android Entwicklung - Nativ vs nicht-Nativ (Abraham)&#13;
Arduino ohne Arduino – bau nur den Microcontroller ein! (noniq)&#13;
Amateurfunk (Janek Gàl und Noah Rullmann)</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5">
            <code>BWRH7E</code>
            <public_name>Daniel</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="526" guid="7956605c-adae-5563-ab8c-c97b6781fefa">
        <logo/>
        <date>2018-12-29T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>X7FPWS</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/X7FPWS/</url>
        <title>Alles was du jemals zu Wikipedia wissen wolltest</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>de</language>
        <abstract>Du kennst Wikipedia. Gibt es ja auch seit 17 Jahren. Du nutzt Wikipedia regelmäßig und weißt alles darüber. Aber wer zur Hölle sind Wikimedia, MediaWiki, Wikidata? Was machen die? Was können sie für dich tun? Menschen, die für Wikipedia Artikel oder Code schreiben, sich politisch oder kulturell oder für die Freiwilligen der Wikipedia einsetzen, können dir in dieser Session deine Fragen beantworten.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="21">
            <code>7TBZJF</code>
            <public_name>Verena</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="527" guid="9a59a736-ef6f-57ec-9261-e632cac8b51c">
        <logo/>
        <date>2018-12-29T21:30:00+01:00</date>
        <start>21:30</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>ZKJDBE</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/ZKJDBE/</url>
        <title>Digital what? Wie man Bildung nicht digitalisieren sollte</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>de</language>
        <abstract>Regierungen und politische Entscheidungstragende setzen auf die Forcierung und den Ausbau von Plattformen, um Bildung "endlich" zu digitalisieren. Doch die Umsetzung widerspricht dem Ziel, Menschen dazu zu befähigen, sich im digitalen Raum sicher und mündig zu bewegen.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="22">
            <code>WRQU7K</code>
            <public_name>Dominik Theis</public_name>
            <biography/>
          </person>
          <person id="34">
            <code>9FJGJ3</code>
            <public_name>Anja Lorenz</public_name>
            <biography/>
          </person>
          <person id="35">
            <code>GJBVT8</code>
            <public_name>Jelisaweta Kamm</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="528" guid="38b1c87c-d474-5d11-8559-df4a1e18b507">
        <logo/>
        <date>2018-12-29T23:00:00+01:00</date>
        <start>23:00</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>7CHZ9V</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/7CHZ9V/</url>
        <title>Operation Mindfuck #2 - Computer, Kunst und Kuriositäten</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>de</language>
        <abstract>Eine bunter Blumenstrauß von Nerdsniping-Themen!</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="2">
            <code>RBEKZW</code>
            <public_name>bleeptrack</public_name>
            <biography/>
          </person>
          <person id="23">
            <code>39LEJR</code>
            <public_name>blinry</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="WikiPakaWG Küche">
      <event id="505" guid="e6151f47-7ed3-5772-bb7f-201102afd00f">
        <logo/>
        <date>2018-12-29T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:15</duration>
        <room>WikiPakaWG Küche</room>
        <slug>BBDTHN</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/BBDTHN/</url>
        <title>Orgameeting Tag 3</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="4">
            <code>33UT8A</code>
            <public_name>WikiPaka Orga</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="524" guid="7527606f-ac7f-58c3-a384-eb86cdc93d90">
        <logo/>
        <date>2018-12-29T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Küche</room>
        <slug>VQP8QS</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/VQP8QS/</url>
        <title>Wikidata: help with building tools</title>
        <subtitle/>
        <track/>
        <type>Workshop mit Gruppentischen</type>
        <language>en</language>
        <abstract>Additional space to help with building tools, if wanted.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="6">
            <code>RE9MSE</code>
            <public_name>Lucas</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="533" guid="6f6b4805-90f8-5c54-bfd7-2ba62839419b">
        <logo/>
        <date>2018-12-29T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Küche</room>
        <slug>B3V7LE</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/B3V7LE/</url>
        <title>🎂🎉</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract>🎉</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="28">
            <code>7AGQRG</code>
            <public_name>Ulrike</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="541" guid="184234c0-f856-58ef-9d1c-a60eaad3b007">
        <logo/>
        <date>2018-12-29T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Küche</room>
        <slug>FDHUCR</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/FDHUCR/</url>
        <title>Zwischenstand der NSU-Aufklärung</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>de</language>
        <abstract>Im NSU-Komplex arbeiten aktuell auf juristischer sowie ausser- wie innerparlamentarischer Ebene verschiedene Akteure an der Aufklärung. Wir wollen uns über den aktuellen Stand und weitere Schritte verständigen. Ziel ist eine bessere Vernetzung und aufzuzeigen, wo auch das Chaos-Umfeld bei der NSU-Aufklärung helfen kann.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="46">
            <code>HVP8H3</code>
            <public_name>noname</public_name>
            <biography/>
          </person>
          <person id="48">
            <code>G3E7Q3</code>
            <public_name>Caro (NSU-Watch)</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="Discodrama">
      <event id="10170" guid="32c6829d-8f43-4c9a-8798-824f914f7934">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10170.html</url>
        <logo/>
        <date>2018-12-29T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>03:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10170-fairy_dust_-_day3</slug>
        <title>Fairy Dust - Day3</title>
        <subtitle>Rocket Away</subtitle>
        <track>Music</track>
        <type>other</type>
        <language>en</language>
        <abstract>Modify the Fairy Dust</abstract>
        <description>After standing in the cold rain and snow for too long, the Fairy Dust will find its place this time in the middle of the crowd at hall 5. A video installation will take place on the surface. This is a call for people, who can handle c4d files and have the bravery to put their vision on the symbol of the congress.&#13;
&#13;
The file attached to this event contains all information about the object, as well the position and lenses of the 4 projectors. Fell free to develop whatever you like. Keep in mind that the surface is very glossy and actually eats the light away. Rendered video best with HAP or MP4.&#13;
&#13;
In the hours between 2 pm and 5 pm on the days of the congress, there will be access to the video system, if you come around and have a device with HDMI out.  &#13;
&#13;
Enjoy!&#13;
&#13;
Powered by PENTAKLON und Rico Rose &#13;
&#13;
Contact: privatlehrer[at]gmail[:]com</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/634/original/35C3-template-ROCKET.c4d?1545876712">35C3-template-ROCKET.c4d</attachment>
        </attachments>
      </event>
      <event id="10048" guid="217f7d18-c837-4e12-aac4-2cf826730252">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10048.html</url>
        <logo>/system/events/logos/000/010/048/large/0007254766_10.jpg?1545415840</logo>
        <date>2018-12-29T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10048-demoscene_time_machine</slug>
        <title>Demoscene Time Machine</title>
        <subtitle>Melodic bleepy &amp; fakebit music</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Demoscene Time Machine (aka David Whiting) has been making melodic bleepy music since 2008. Inspired by old SNES soundtracks, DOS demos and the ever-versatile range of the PC speaker, he’s now in full force producing heavy dancefloor-friendly fakebit music with catchy melodies and infectious beats.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://demoscenetimemachine.com/">https://demoscenetimemachine.com/</link>
          <link href="http://www.thewit.ch">http://www.thewit.ch</link>
          <link href="https://soundcloud.com/demoscenetimemachine">https://soundcloud.com/demoscenetimemachine</link>
          <link href="https://soundcloud.com/vitling">https://soundcloud.com/vitling</link>
          <link href="https://soundcloud.com/davw">https://soundcloud.com/davw</link>
          <link href="http://www.thewit.ch/portfolio/">http://www.thewit.ch/portfolio/</link>
        </links>
        <attachments/>
      </event>
      <event id="10042" guid="b1b875a6-812f-4e6c-86aa-40fff58ff790">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10042.html</url>
        <logo>/system/events/logos/000/010/042/large/avatars-000373881752-5r40p5-t500x500.jpg?1545415685</logo>
        <date>2018-12-29T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10042-viktor_talking_machine</slug>
        <title>Viktor Talking Machine</title>
        <subtitle>House</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Digital is death.&#13;
&#13;
Shortly before the Tibetan Highlands, a small clearing, dressed with black fern which sways to the rhythm of the sun, extends itself. Here you can meet the inhabitants of a sleepy coastal village, who had found the remains of a huge comet years ago. A viscous dark mass that they turned immediately into brownies with ice cream and pickles. The energy that was gained from the process drives huge machines, planting anemones and helps the bees with their mating rituals. Every 1210 years when the planets order in a circular orbit, a child is born into this magical world, who comes to change everything.</abstract>
        <description>Viktor grew up in a musical family on the outskirts of a small mountain village. Early on, he discovered his love for nature and analogue soundscapes. He devoured all the sounds of nature and the vastness of the Antarctic wilderness and distilled from them his deep sound which accompanies him until today.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/viktor-talking-machine">https://soundcloud.com/viktor-talking-machine</link>
          <link href="https://www.residentadvisor.net/dj/viktortalkingmachine">https://www.residentadvisor.net/dj/viktortalkingmachine</link>
        </links>
        <attachments/>
      </event>
      <event id="10052" guid="877f5b00-c744-4c27-930c-cfa9e4e26bbc">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10052.html</url>
        <logo>/system/events/logos/000/010/052/large/avatars-000410038332-aohj1k-t500x500.jpg?1545416337</logo>
        <date>2018-12-29T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10052-maurizio_schmitz</slug>
        <title> Maurizio Schmitz</title>
        <subtitle>Techno/House</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Maurizio Schmitz drives his own bus, dividing his diary effortlessly between work and play and playing.&#13;
&#13;
Half Italian, half German and his is a dizzying ongoing musical journey that flies economy and business all at the same time. Maurizio exploits these contrasts, wearing pinstripes or pyjamas or both - he jams.&#13;
&#13;
We are talking about psychedelic house here. Socks off and sensual. It works on the big stage, it works in the club and it washes all over an after hour. This sound did not happen by accident.&#13;
In 1990 scrambling around some old Thorens decks in a club his mother worked in Maurizio was scooping up all the vinyl lost from the night before – the first Schmitz mixtapes (which actually were not mixed) saw the light of day at this time. Many were to follow and these valuable suckers live amongst 11,000 pieces of vinyl collected and stroked over the years.&#13;
&#13;
When German techno was dynamite, changing the rules and ushering in a whole new world of electronic music Maurizio was not only there – he was smack in the middle of it.&#13;
&#13;
Bonn, Hamburg, Frankfurt, Munich. From the infamous “Labor” club to a 10 years residency at 'FrequenzBerater' to Frankfurt and “U60311”. Many many more but maybe two things stand out and tell you more. Spaldingstreet 43 in Hamburg, the original flat sharing rave. Maurizio presided over 7 years of lovely madness. Today you could create a major art/music festival just from the people who crashed out on the sofas there. Then the tour de force. His very own Mauromusica night founded in Bonn 2004 in the beautiful “Rheingarten”. An octagon shaped glass pavilion. Promoter, resident DJ and mum on the door. Another 10 years.&#13;
&#13;
No need to name names, somewhere in the above paragraph they all passed through.&#13;
&#13;
Perhaps one name, because here comes the other Maurizio Schmitz.&#13;
In a 1994 after hour set in Munich, “Pulvertum” it was called, the raver Maurizio noticed Sven Vath 2 metres high in a tree mid set. You don’t forget stuff like that.&#13;
Their paths were never going to stop crossing.&#13;
&#13;
Event manager, promoter, booker and for some time now the right hand man and frequent support act for the immortal legendary magician Sven Vath. It is a relationship that is not stopping any time soon.&#13;
&#13;
So, to summarise, Sicilan passion met German techno and spat out the Dj Maurizio Schmitz.&#13;
&#13;
(2018, Words by Andrew Gillings)</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/mauromusica/">https://soundcloud.com/mauromusica/</link>
        </links>
        <attachments/>
      </event>
      <event id="10075" guid="1df771b7-17cf-4c3b-9472-251c660f0ef4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10075.html</url>
        <logo>/system/events/logos/000/010/075/large/loungejpg?1546105301</logo>
        <date>2018-12-29T23:00:00+01:00</date>
        <start>23:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10075-marko_morelle</slug>
        <title>Marko Morelle</title>
        <subtitle>Techno/</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>from the family</abstract>
        <description>from the family</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/chaishop-com/dj-marco-morelle-germany">https://soundcloud.com/chaishop-com/dj-marco-morelle-germany</link>
        </links>
        <attachments/>
      </event>
      <event id="10044" guid="2cb3722c-ea32-4f51-8b06-b2c190fe87e9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10044.html</url>
        <logo>/system/events/logos/000/010/044/large/tn04_104__andreas04.jpg?1545417072</logo>
        <date>2018-12-30T01:00:00+01:00</date>
        <start>01:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10044-der_dritte_raum</slug>
        <title>Der Dritte Raum</title>
        <subtitle>Techno/Trance</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Andreas Krüger, aka Der Dritte Raum, is the man behind some of the most stirring electronic music of the past twenty-five years. But he'd rather not talk about himself. "The least important thing in all I do is myself," he says. "It's about the music."</abstract>
        <description>But of course there would be no music -- no epic anthems like "Hale Bopp" nor transcendent tunes like "Electric Friends" without his creativity, vision, and technical virtuosity which has been honed by his lifelong fascination with sound.&#13;
The son of musical parents, Andreas grew up immersed in music. He began to study the piano as a child but quickly tired of rigid instruction. He stopped taking lessons and instead played along to records by The Beatles and Pink Floyd, "trying to understand how they made the songs."&#13;
His main love, though, was electronics and physics. "I never thought I'd be a musician," he says with a chuckle. "I was the boy who built my own circuits, my own AM radio."&#13;
This fascination with electronics helped spark his love for pioneering synth bands like Devo, Human League and Heaven 17. When a friend lent him a synthesizer, Andreas and his brother set it up in their basement, along with a drum machine and organ, and proceeded to "make a lot of noise." He was studying physics at the time but music absorbed more and more of his energy.&#13;
In the early 90s he and a friend opened a "freaky punk New Wave" studio. Suddenly, being a professional musician or recording engineer seemed realistic. About the same time another life-changing experience occurred: Andreas started going to techno parties.&#13;
For the first time, he saw his two great loves, music and technology, wedded to create something unique. "It was music without a standard arrangement, music without vocals," he explains. "Our New Wave and EBM projects always had a standard intro, bridge, verses, etc. Techno was totally new."&#13;
With typical fervour, Andreas dropped his other projects to concentrate on making a "really cool techno record". Much to the delight of electronic music fans, he has been doing so, with surpassing brilliance, ever since.&#13;
The marriage of Andreas's deep musical background and peerless technical skills birthed a unique sound that runs like a high-tensile wire through his prolific output as Der Dritte Raum. In the course of a dozen albums and almost thirty records and EPs, Andreas has never lost his fascination with pushing the boundaries of melody and technology.&#13;
"Commercial music has a very narrow horizon," he says. " It is important for me to make music that can be played with other tracks without copying other ideas or sounds. It is dangerous to maintain a unique direction but that is the basic idea of making art."&#13;
Currently, the artist is at work on multiple projects, including polishing a new techno album for release later this year, playing with a live band, remastering old Der Dritte Raum material, and taking his music to the masses with his DJ/live performance partner Ralf Uhrlandt. As Der Dritte Raum live, Andreas and Ralf have been pushing the boundaries of electronica since the early '90s. They bring the studio to life onstage with an array of computers, synths, desks and effects. "The equipment keeps evolving but it's always about jamming with sounds," says Andreas.&#13;
However far-flung his gigs, or wide-ranging his ideas, Andreas is grounded by a simple truth: "I love music. Not just electronic music. All music.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/derdritteraum">https://soundcloud.com/derdritteraum</link>
          <link href="http://www.der-dritte-raum.de/">http://www.der-dritte-raum.de/</link>
        </links>
        <attachments/>
      </event>
      <event id="10076" guid="ba07707c-a984-4ac5-b6f7-b947a44245b2">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10076.html</url>
        <logo>/system/events/logos/000/010/076/large/31947322_1886358088061796_2297047130939850752_n.jpg?1545417368</logo>
        <date>2018-12-30T02:00:00+01:00</date>
        <start>02:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10076-super_flu</slug>
        <title>Super Flu</title>
        <subtitle>Progressive House</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Willkommen in einer Welt, in der knusprig gebackene Bassdrums den Ton angeben; in der Momratzn zu zwickenden Hihats zucken und dir Sprechblasen sympathische Bässe zuwinken! Du musst eine schwierige Entscheidung treffen? Super Flu empfehlen dir Doppelbrötchen mit Knoblauch und 6-Minuten-Eiern! Dein Equipment ist Schrott? Vertrau auf dein Gefühl, kitzel das Maximale aus der alten Bude und quetsch Inspiration aus allem, das du in die Finger kriegst! Dir fehlen die Ideen? Hör auf deinen Papagei! Mach Urlaub und trink Bier. Probier, (weißt schon, was zu machen, was du sonst nie machen würdest). Hör Jazz. Bastel was aus lustigen Dönerbuden-Namen, exotischen Instrumenten und Kinderspielzeug. Mit deinem besten Kumpel und mindestens einem gemeinsamen Lieblingsbäcker, viel Herzblut und einem großen Traum dahinter kann dir nun nichts mehr passieren…!</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://super-flu.de/">http://super-flu.de/</link>
          <link href="https://soundcloud.com/super-flu-de">https://soundcloud.com/super-flu-de</link>
        </links>
        <attachments/>
      </event>
      <event id="10070" guid="634362fa-d58b-4a76-bf26-5e763619c4f6">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10070.html</url>
        <logo>/system/events/logos/000/010/070/large/avatars-000186202996-mb8pqe-t500x500.jpg?1545417580</logo>
        <date>2018-12-30T04:00:00+01:00</date>
        <start>04:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10070-rk9</slug>
        <title>RK9</title>
        <subtitle>Joeri Jungschlager, EDM/Drum&amp;Bass/Breakcore</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>From reverbnation:&#13;
&#13;
RK9 is an allias for Joeri Jungschlager, he used to play in bands and compose music in gerne's like hardcore (punk), jazz, deathcore &amp; mathcore. in 2012 he first released on his own behave a EP Liquid Mind Fucks/Push this party till dawn later on in 2013 his first own EP murder for reblogs which came out on 2C-Broadcast Recordings and in 2014 a fully 3DS produced single came out through bandcamp 'miss the sky' and later used in a full live set recording avaible through youtube. RK9 is a general work out of the idea of a hybrid between liquid drum &amp; bass and breakcore. Allong the road the hybrid ellements changed from the orginal idea too hardcore drum &amp; bass/breakcore with mathcore. Which have given endless suprises and elements too the act.&#13;
&#13;
With support from around various scené's and different labels doing VIP Remix for various Dubstep &amp; DnB labels. And founded 2C-Broadcast together with the prototype being the only hard DnB label in the Hague but also made several appearnces at District 9, Langweiligkeit, Benchmark Sessions and the PRSPCT stage on Eendracht Festival (Rotterdam)&#13;
His productions since 2015 got several radio plays. And is played on the internet.&#13;
Also he made several podcasts in that year Satanicast for example.&#13;
&#13;
RK9 is the Allias for Joeri Jungschlager also known as the disturbing breakcore panda but that is just a scene name.&#13;
He was born in Drachten, Netherlands but now lives in Rotterdam.&#13;
&#13;
====&#13;
&#13;
From Soundcloud: &#13;
&#13;
Started out pretty young in the squat scené around nintencore &amp; breakcore but moved on to breakcore and jungle and a different allias in 2011 RK9 plays and produces a violent combination of Liquid Drum &amp; Bass, Breakcore and crossbreed with support from around various scené's and different labels doing VIP Remix for various Dubstep &amp; DnB labels. And founded 2C-Broadcast together with the prototype being the only hard DnB label in the Hague but also made several appearnces at District 9, Langweiligkeit, Benchmark Sessions and the PRSPCT stage on Eendracht Festival (Rotterdam) His productions since 2015 got several radio plays. And is played on the internet. Also he made several podcasts in that year Satanicast for example.</abstract>
        <description>RK9 is also a Developer of OpenDJ:&#13;
(text from Github)&#13;
Open DJ or oDJ project is a project that aims to build a fully open source tabletop mediaplayer like pioneers X/CDJ or Denon SC5000 allowing DJ's to do more with their equipment than just DJ. The goal so far is to build 3 models one CDJ which contains CD/USB/SD card and ethernet/wifi link up connections, one XDJ which contains USB/SD, ethernet connections, wifi &amp; LoRaWAN and a modular model which will start with an USB/SD but is expandable and get it's own development kit. Since this all can be quite complex and we have a tech community with more knowledge than just me, I want to build a community around this. This topic for a relatively simple device will be heavily cross domain. The goal is to provide an Open Source building block for smart clubs.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.reverbnation.com/rk9">https://www.reverbnation.com/rk9</link>
          <link href="https://soundcloud.com/rk9_dnb">https://soundcloud.com/rk9_dnb</link>
          <link href="https://github.com/sicarii-13/OpenDJ">OpenDJ on Github </link>
          <link href="https://www.mixcloud.com/joeridamianjungschlager">https://www.mixcloud.com/joeridamianjungschlager</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Shutter Island">
      <event id="10149" guid="fa17b7ce-6dcb-49e9-bfae-9d5d517b9ad7">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10149.html</url>
        <logo/>
        <date>2018-12-29T10:00:00+01:00</date>
        <start>10:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10149-rudi_stoher</slug>
        <title>Rudi Stöher</title>
        <subtitle>Ask Ronny Kraftfuttermischwerk.</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/rudi-stoher/tracks">https://soundcloud.com/rudi-stoher/tracks</link>
        </links>
        <attachments/>
      </event>
      <event id="10150" guid="fd7b283b-67f3-4554-b226-83db5a519a87">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10150.html</url>
        <logo/>
        <date>2018-12-29T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>03:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10150-patstyx</slug>
        <title>Patstyx</title>
        <subtitle>Looking forward to Schuppi</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Patstyx aka Schuppi war schon Sysadmin als man noch beim Internet angerufen hat - er zog weg, nach Halle, in Congressnähe. Legte schon immer auf, macht Podcasts und Drum´n Bass Events und wir freuen uns auf Schuppi.&#13;
&#13;
Patstyx was already sysadmin when you called the Internet, by dialing a number on moms phone - he moved away, to Halle, near the congress. Allways deejayed, does podcasts and Drum´n Bass events and we are looking forward to Schuppi.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://hearthis.at/pat-styx/">https://hearthis.at/pat-styx/</link>
        </links>
        <attachments/>
      </event>
      <event id="10151" guid="8b678cb0-a364-41ce-8fb4-1d067168fde6">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10151.html</url>
        <logo/>
        <date>2018-12-29T15:00:00+01:00</date>
        <start>15:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10151-e</slug>
        <title>ë</title>
        <subtitle>Legend AV-set</subtitle>
        <track>Music</track>
        <type>performance</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://raum-e.com/">http://raum-e.com/</link>
        </links>
        <attachments/>
      </event>
      <event id="10163" guid="141a49b4-76a4-48e0-a86d-7c19e6a7821f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10163.html</url>
        <logo/>
        <date>2018-12-29T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10163-umbaumusik</slug>
        <title>Umbaumusik</title>
        <subtitle>Mr. G &amp; Mr. Mo</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10152" guid="3600a06a-6aae-49c3-95e3-da5bc6dd87f6">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10152.html</url>
        <logo/>
        <date>2018-12-29T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10152-eulberg_spock</slug>
        <title>Eulberg &amp; Spock</title>
        <subtitle>Fledermausmusik</subtitle>
        <track>Music</track>
        <type>lecture</type>
        <language>en</language>
        <abstract/>
        <description>Vortrag: Fledermaus Streaming Project&#13;
NABU, CCC und Dominik Eulberg &amp; DJ Spock&#13;
&#13;
Die Geräusche der Fledermäuse werden hörbar in Musik umgewandelt und gestreamt.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10153" guid="cb62321b-fd39-4b11-8668-1384f661a076">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10153.html</url>
        <logo/>
        <date>2018-12-29T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>03:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10153-kfmw</slug>
        <title>kfmw</title>
        <subtitle>Irgendwelche Fragen?</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Das Kraftfuttermischwerk. Srlsy? Ihr kennt Ronny nich? Bester Mumpelkollege, Chillflaggenhochhalter, hat auch ein tollen Myspaceaccount.&#13;
&#13;
Das Kraftfuttermischwerk. Srlsy? You don't know Ronny? Best mate, chilloutmusic clockstone, also has a great myspaceaccount.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.kraftfuttermischwerk.de/blogg/">https://www.kraftfuttermischwerk.de/blogg/</link>
        </links>
        <attachments/>
      </event>
      <event id="10154" guid="57953398-ba71-43d4-ab03-a1a1bc7f66df">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10154.html</url>
        <logo/>
        <date>2018-12-29T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10154-saetchmo</slug>
        <title>Saetchmo.</title>
        <subtitle>1000 Echochambers</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Sätche ist sowas von Teil der Familie - seine Echochamber läuft regelmässig in der c-base, er fährt ne alte Feuerwehr und wer ihm krummkommt, merkt das schon.&#13;
&#13;
Sätchmoe is sooo part of the family - his Echochamber runs regularly in the c-base, he drives an old fire brigade and whoever annoyise him, will notices that.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.saetche.net/blog/">https://www.saetche.net/blog/</link>
        </links>
        <attachments/>
      </event>
      <event id="10155" guid="89e3b2ae-d714-44a5-9e18-6270ce7c3c2b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10155.html</url>
        <logo/>
        <date>2018-12-30T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10155-kons_t_il</slug>
        <title>kons[t]il</title>
        <subtitle>Till &amp; Konsti, zwei Seelenverwandte begegnen einander.</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Till &amp; Konsti, zwei Seelenverwandte begegnen einander. Diese zwei Jungs aus Berlin, finden sich um  einen Sound zu kreieren, ihre Stimmungen und Erfahrungen in unverwechselbare Sounds zu verpacken, durchlaufen verschiedenste Facetten der elektronischen Tanzmusik... Sumseln sich durch das Dickicht des Deep-House Waldes, das Ziel...  Back to the roots, um sich zu einem großen Ganzen zu vereinen, unabhängig von Zeit und Raum tanzen wir schwerelos durch die Unendlichkeit.&#13;
&#13;
Till &amp; Konsti, two soul mates meet each other, these two boys from Berlin find each other to create sound, to wrap their moods and experiences into unmistakable sounds, go through different facets of electronic music... Are humming through the thicket of the deep-house forest, the goal... Back to the roots, to unite to one big whole, independent of time and space we dance weightlessly through Infinity.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.mixcloud.com/konstil/kons[t]il">https://www.mixcloud.com/konstil/kons[t]il</link>
        </links>
        <attachments/>
      </event>
      <event id="10156" guid="55ff173d-84b9-4931-94d0-fc01fc408aba">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10156.html</url>
        <logo/>
        <date>2018-12-30T02:00:00+01:00</date>
        <start>02:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10156-404_tba_aka_marillion</slug>
        <title>404 tba aka Marillion</title>
        <subtitle>More to be and let go.</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Swiss bliss &amp; HH Adel</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10157" guid="b2b637e0-df81-4999-82d4-5d4468f73a5b">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10157.html</url>
        <logo/>
        <date>2018-12-30T04:00:00+01:00</date>
        <start>04:00</start>
        <duration>03:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10157-lord_spreadpoint</slug>
        <title>Lord Spreadpoint</title>
        <subtitle>Audio Visual Set</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description>Siegfried Kärcher (1974/Force Inc.) wurde in die Zeit der Heimcomputer hineingeboren. Nach Atari VCS 2600 folgte der C64 und dann der Commodore Amiga und einige Berühmtheit in der Hacker/Cracker- und Demoszene. Er ist Mitglied des Computerkollektivs Spreadpoint. Der nahe gelegene Techno Club in Frankfurt, wo seit Anfang der 80er Techno erfunden wurde, wirkte ebenso stilprägend.&#13;
In den Anfangstagen gab es noch keine strikte Trennung der elektronischen Musikstile und so erlebte Kärcher von piepsenden Konsolen und chiptunigen Heimcomputern wie dem C64, harter EBM, über Midifizierung der Tonstudios durch den Atari ST, Harddiskrecording, Kommerzialisierung und Ausverkauf des Technos eigentlich alle wichtigen Entwicklungsschritte mit.&#13;
Seit einem Hochbegabtenstudium der freien bildenden Kunst entwickelt er Werke im Bereich bildender Kunst und Musik. Er lebt und arbeitet in Frankfurt am Main und Berlin. &#13;
Auf dem 35c3 nimmt uns Siegfried Kärcher mit auf eine Klangreise in technoide Ambientgefilde, die musikalisch mal historische Leuchttürme aufblinken lassen aber auch in die Zukunft schauen lassen oder einfach nur zur Kontemplation einladen.&#13;
&#13;
Siegfried Kärcher (1974/Force Inc.) was born into the time of home computers. After Atari VCS 2600 followed the C64 and then the Commodore Amiga and some celebrity in the hacker/cracker and demo scene. He is a member of the computer collective Spreadpoint. The nearby Techno Club in Frankfurt, where Techno was invented since the beginning of the 80's, also had a style shaping effect.&#13;
In the early days there was no strict separation of the electronic music styles and so Kärcher experienced all important development steps from beeping consoles and chiptuning home computers like the C64, hard EBM, via midification of the recording studios by the Atari ST, hard disk recording, commercialization and sell out of the techno.&#13;
He has been developing works in the field of fine arts and music since he studied free visual arts as a highly gifted student. He lives and works in Frankfurt am Main and Berlin. &#13;
On the 35c3 Siegfried Kärcher takes us on a journey of sound into technoid ambient environments, which musically blink historical lighthouses but also let us look into the future or simply invite us to contemplation.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="www.4sk.de">www.4sk.de</link>
          <link href="https://www.youtube.com/watch?v=MEZcpR4aG9k">https://www.youtube.com/watch?v=MEZcpR4aG9k</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Compeiler">
      <event id="10148" guid="91b4a4c3-98e0-49f6-a3fc-621140621c7f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10148.html</url>
        <logo/>
        <date>2018-12-29T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10148-rote_schule_music_workshop</slug>
        <title>Rote Schule Music Workshop</title>
        <subtitle>Workshop/Performance</subtitle>
        <track>Music</track>
        <type>workshop</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10135" guid="6f0d635e-7483-4e6a-8ed3-05c39df5546d">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10135.html</url>
        <logo/>
        <date>2018-12-29T15:00:00+01:00</date>
        <start>15:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10135-riley</slug>
        <title>Riley</title>
        <subtitle>Dance performance</subtitle>
        <track>Music</track>
        <type>performance</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10057" guid="f6457dfe-a669-453d-ad9f-ddecdd261feb">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10057.html</url>
        <logo>/system/events/logos/000/010/057/large/47163654_2020787697968002_5431537559463264256_n.jpg?1545417900</logo>
        <date>2018-12-29T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10057-window_magic</slug>
        <title> Window Magic</title>
        <subtitle>Ambient/Experimental</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Window Magic is the ambient/tape music project of Andreas Bonkowski. With an arsenal of cassettes, tape loops, analog synths, trusty fx units and escapist tunes he creates lo-fi collages and mystical soundscapes.</abstract>
        <description>Sometimes you hear a sound and may be not quite sure what it is. Or what it was. If you are fascinated by the mystery of noise, tape music is an artichoke, a rough diamond, a welcome phantom with many faces. Window Magic melts found sounds, manipulated source material and field recordings into tape deck ghosts and drones that haunt, flutter and sing. From a very early age growing up in East-Berlin, Andreas Bonkowski was fascinated by tape recorders and shortwave radio stations, filling C60s of his late night finds and experimenting with cutting techniques to make his own versions of songs and broadcasts. This fascination never left, though his other musical adventures with Corwood Manual or Siva. somehow took very different routes to explore other territories. Window Magic opens a portal to someplace else, channeling sounds that move outside the workings of time.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://windowmagic.pm/">http://windowmagic.pm/</link>
          <link href="https://soundcloud.com/windowmagic">https://soundcloud.com/windowmagic</link>
          <link href="https://twitter.com/window_magic">https://twitter.com/window_magic</link>
          <link href="https://store.windowmagic.pm/">https://store.windowmagic.pm/</link>
        </links>
        <attachments/>
      </event>
      <event id="10050" guid="a4d093fc-aa2f-4edb-86ea-a9d149ba75a9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10050.html</url>
        <logo>/system/events/logos/000/010/050/large/22730453_1809696109060321_4866779364793401634_n.jpg?1545419292</logo>
        <date>2018-12-29T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10050-sevensol</slug>
        <title>Sevensol</title>
        <subtitle>Part 1</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Alex is one third of esteemed label Kann and 1/2 of DJ Duo Manamana together with Map.ache.&#13;
&#13;
Aside from his former work in recordshops, Dj-ing since ages and releasing new music (Mana-All-Nite, Kann) Alex has also been quietly issuing out his own music (together with Bender) and remixes as well.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/sevensol">https://soundcloud.com/sevensol</link>
          <link href="https://kann-records.com/">https://kann-records.com/</link>
        </links>
        <attachments/>
      </event>
      <event id="10080" guid="003d5cf1-efd6-47e5-b01f-4b49e81271c4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10080.html</url>
        <logo>/system/events/logos/000/010/080/large/maxresdefault.jpg?1545419128</logo>
        <date>2018-12-29T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10080-ana_bogner</slug>
        <title>Ana Bogner</title>
        <subtitle>Experimental/Ambient</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Ana Bogner is an electronic musician and sound artist.&#13;
Her artistic content revolves around the theme of imaginary space: poetic realities as a state of human consciousness. She works both compositionally and installatively - architecturally.&#13;
She layers spheres, dreams of utopian urban ambience, built on ethereal light-heartedness through which stories float.</abstract>
        <description>She received a honorary mention "Digital Musics and Sound Art" for "sounds from the white box" (as part of the exhibition Pulse 'Lab II: Works for Wave Field Synthesis', initiated by Robert Henke), Ars Electronica, AUS&#13;
In 2014 her EP multiple proportions was published on headphonica.&#13;
In 2019 there will be the release of 1967/People in collaboration with Arpen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://anabogner.de">http://anabogner.de</link>
          <link href="https://soundcloud.com/anabogner">https://soundcloud.com/anabogner</link>
        </links>
        <attachments/>
      </event>
      <event id="10136" guid="220c710c-e4f9-4dda-9bd4-a9416acc2901">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10136.html</url>
        <logo>/system/events/logos/000/010/136/large/22730453_1809696109060321_4866779364793401634_n.jpg?1545419446</logo>
        <date>2018-12-29T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10136-sevensol</slug>
        <title>Sevensol</title>
        <subtitle>Part 2</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Alex is one third of esteemed label Kann and 1/2 of DJ Duo Manamana together with Map.ache.&#13;
&#13;
Aside from his former work in recordshops, Dj-ing since ages and releasing new music (Mana-All-Nite, Kann) Alex has also been quietly issuing out his own music (together with Bender) and remixes as well.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/sevensol">https://soundcloud.com/sevensol</link>
          <link href="https://kann-records.com">https://kann-records.com</link>
        </links>
        <attachments/>
      </event>
      <event id="10090" guid="e7ee2001-53cc-4c0f-9e8b-84159da6633f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10090.html</url>
        <logo>/system/events/logos/000/010/090/large/Esmark_MG_0497_bw.jpg?1545250908</logo>
        <date>2018-12-29T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10090-esmark</slug>
        <title>Esmark</title>
        <subtitle>Dark Drone Landscapes </subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Esmark is the latest musical vehicle of sound architect Nikolai von Sallwitz and experimental artist Alsen Rau. They’ve worked together on a variety of experimental and performative projects since 2001. Their latest project was recorded in late 2016, in Scandinavia, where they beautiful surroundings and solitude inspired them to record enough music for two albums. Rather than save some of the music for a followup album, a decision was made to release two albums simultaneously.</abstract>
        <description>Both Nikolai von Sallwitz and Alsen Rau are experienced musicians, who have enjoyed lengthy and successful careers. They’ve both previously worked together, and have also worked with a variety of different artists in a variety of roles.&#13;
In the case of sound architect Nikolai von Sallwitz he was mastered Scheich In China first two albums and has written for the Karachi Files’ 2016 debut eponymous album and Scheich In China. However, Nikolai von Sallwitz is best known as known as Taprikk Sweezee, which is the moniker he has been using since 2006.&#13;
Since then, Taprikk Sweezee has worked in a variety of capacities, ranging from singer and songwriter, to recordist remixer and producer. His career as Taprikk Sweezee started in 2006 as a vocalist and since then, he has served what is akin to a musical apprentice. That is only part of the Taprikk Sweezee story.&#13;
Taprikk Sweezee has written music and has been involved with sound design for film, theatre and a variety of art and pop projects. Somehow, Taprikk Sweezee has found time to collaborate with a number of visual artists, including Chris Hoffmann, Andreas Nicholas Fischer and Robert Seidel. There are it seems, many strings to Taprikk Sweezee’s bow.&#13;
In 2010, Taprikk Sweezee released his debut EP Conversea. A year later, and Taprikk Sweezee returned with his sophomore EP Poly. Taprikk Sweezee also finds time to work on projects with his friend Alsen Rau, including on the Barabass, Scheich in China and their most recent project Esmark.&#13;
Just like Nikolai von Sallwitz, Alsen Rau has a wealth of musical experience. Over the years, he has been a member of various groups including Barabass, who released an EP in 2006. On + Brr followed in 2010, who released their debut album Peace and Love in 2010. This was followed by a quartet of singles. Alsen Rau’s next project was Scheich in China, who have released five albums between 2014 and 2016. However, this is just part of the story of Alsen Rau.&#13;
He’s also one of the founders and curators of Kraniche, a Hamburg-based club, that is renowned for exhibitions of experimental art. They’ve received praise and plaudits from critics and cultural commentators. There’s also been performances of experimental music at Kraniche, which has gained a reputation as a place that is&#13;
  &#13;
unafraid to showcase ambitious and inventive music. Away from Kraniche, Alsen Rau has also curated a number of exhibitions, performances and readings, and is heavily involved with city’s art scene. However, much of Alsen Rau’s time is spent making music.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://www.bureau-b.com/esmark.php">http://www.bureau-b.com/esmark.php</link>
          <link href="https://e-s-m-a-r-k.tumblr.com">https://e-s-m-a-r-k.tumblr.com</link>
        </links>
        <attachments/>
      </event>
      <event id="10056" guid="c1d78229-225b-44fd-a087-b6acd77601c0">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10056.html</url>
        <logo>/system/events/logos/000/010/056/large/avatars-000118314231-989ats-t500x500.jpg?1545419962</logo>
        <date>2018-12-29T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>02:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10056-electric_kool_aid</slug>
        <title> Electric Kool Aid</title>
        <subtitle>Deeptech</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Electric Kool Aid is the atmospheric deeptech outfit of label head, studiogeek and dj extraordinaire Peer Schmid.</abstract>
        <description>Looking back on an intimate personal relationship with more than fifteen years of electrosonic art, Peer has been able to make himself a name – both as an artist and a remixer, with a great hand for unique and diverse atmospheres - as well as a witty producer, with the ability to capture and further refine the magic studio moment. With his dj residency @ "Zoo" in Hamburg's world famous "Villa Nova" club - he is regularly warming up for some of the biggest names in the industry like Dave Seaman, Robert Babicz, Extrawelt, Oliver Schories, Butch, Namito, Thomas Schumacher or D-Nox &amp; Beckers with his praised musical and atmospheric blend of deephouse and groovy deeptech. You should also try to catch one of his acclaimed radio mixes on Frisky radio with a more listening oriented, couch-esque approach.&#13;
&#13;
Having worked in event-, label- and artist management, in both the underground and the mainstream music industry alike, his music proves a mature sense for the outstanding and fresh. Apart from his solo works as Electric Kool Aid, he has released more than 60 tracks under diverse names and further collaborated in diverse styles with various artists on dozens of different projects.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/electrickoolaid">https://soundcloud.com/electrickoolaid</link>
        </links>
        <attachments/>
      </event>
      <event id="10119" guid="402a0c16-edf5-4f1a-8315-3955383292b9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10119.html</url>
        <logo/>
        <date>2018-12-29T23:00:00+01:00</date>
        <start>23:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10119-crasser_sauer</slug>
        <title>Crasser &amp; Sauer</title>
        <subtitle>Experimental Electronics</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Electroaccoustic interplay between the Leipzig-based musicians Judith Crasser &amp; Adam Sauer, both representing the local Pracht collective, an association and venue dedicated to extraordinarities in sound and beyond. In their dialogic live-perfomance they investigate the relations between sonic reality and synthesized fiction, dynamically combining elements of Musique Concrete, Industrial, Glitch and Free Improvisation.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/judithcrasser">https://soundcloud.com/judithcrasser</link>
          <link href="https://soundcloud.com/zond21">https://soundcloud.com/zond21</link>
        </links>
        <attachments/>
      </event>
      <event id="10089" guid="7d635c88-125c-4798-9e23-987aae04db30">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10089.html</url>
        <logo>/system/events/logos/000/010/089/large/A-4388736-1517147016-1439.jpeg.jpg?1545387098</logo>
        <date>2018-12-30T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10089-rodion_levin</slug>
        <title>Rodion Levin</title>
        <subtitle>Techno</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>One half of On+Brr and Brenz Hold (both with Alsen Rau), known for their infamous Hamburg club "Kraniche" (R.I.P.).</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.discogs.com/de/artist/4388736-Rodion-Levin">https://www.discogs.com/de/artist/4388736-Rodion-Levin</link>
        </links>
        <attachments/>
      </event>
      <event id="10047" guid="c61626b4-4b8c-45cd-ac46-90176071ab43">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10047.html</url>
        <logo>/system/events/logos/000/010/047/large/26239498_140042200002882_4900957278046703016_n.jpg?1545420767</logo>
        <date>2018-12-30T01:00:00+01:00</date>
        <start>01:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10047-niklas_wandt</slug>
        <title>Niklas Wandt</title>
        <subtitle>Part 1</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Deeply inhaling rock music, then hiphop and, maybe most significantly jazz from an early age, collecting music has been Niklas’ favorite pastime since way back when. Starting to dj was then really just a process of making public and formatting a bit what had been going on at home anyways – with as little care for genre and imposed boundaries as possible, you’ll find Niklas aka Franco DJ play a diverse range of fringe dance musics from percussion and library records, disco and boogie tunes, spiritual jazz, No Wave, far out Kosmische and, yes, some roughed up house music. In Berlin, he regularly throws a party dedicated to genre-defying dances named SMELLS in various locations such as Sameheads and Loophole.&#13;
Guests thus far include Jan Schulte, Retrogott, Basso, Philipp Otterbach, Jules, Twit One, Katzele among others. As a DJ, Niklas was heard at the Salon Des Amateurs, Düsseldorf, in Berlin at KaterBlau, JohnnyKnüppel, Klunkerkranich and Sisyphos, at the Teder/Romano in Tel Aviv and over the airwaves of LYL Radio, Redlight Radio and Cashmere Radio.&#13;
&#13;
Also catch him at his monthly bar residencies at Heiner/Weserstr. 58 in Berlin-Neukölln and at King Georg in Cologne.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://niklaswandt.com">https://niklaswandt.com</link>
          <link href="https://soundcloud.com/niklaswandtmusik">https://soundcloud.com/niklaswandtmusik</link>
        </links>
        <attachments/>
      </event>
      <event id="10078" guid="d41b8215-69f0-442c-8c77-c8f5871bce22">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10078.html</url>
        <logo>/system/events/logos/000/010/078/large/48416970_718041131928965_6199364178822561792_n.jpg?1545402577</logo>
        <date>2018-12-30T02:00:00+01:00</date>
        <start>02:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10078-nkls</slug>
        <title>nkls</title>
        <subtitle>Synths &amp; Stuff</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>walking on tounges of drums,&#13;
writing melodic textures - &#13;
why not crying for a miracle ?</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/n_kl_s">https://soundcloud.com/n_kl_s</link>
        </links>
        <attachments/>
      </event>
      <event id="10092" guid="57f5b48a-2337-44e8-abf2-b5e3bf96ea1f">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10092.html</url>
        <logo>/system/events/logos/000/010/092/large/26239498_140042200002882_4900957278046703016_n.jpg?1545420917</logo>
        <date>2018-12-30T03:00:00+01:00</date>
        <start>03:00</start>
        <duration>01:00</duration>
        <room>Compeiler</room>
        <slug>35C3-ABFahrplan-10092-niklas_wandt</slug>
        <title>Niklas Wandt</title>
        <subtitle>Part 2</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Deeply inhaling rock music, then hiphop and, maybe most significantly jazz from an early age, collecting music has been Niklas’ favorite pastime since way back when. Starting to dj was then really just a process of making public and formatting a bit what had been going on at home anyways – with as little care for genre and imposed boundaries as possible, you’ll find Niklas aka Franco DJ play a diverse range of fringe dance musics from percussion and library records, disco and boogie tunes, spiritual jazz, No Wave, far out Kosmische and, yes, some roughed up house music. In Berlin, he regularly throws a party dedicated to genre-defying dances named SMELLS in various locations such as Sameheads and Loophole. &#13;
Guests thus far include Jan Schulte, Retrogott, Basso, Philipp Otterbach, Jules, Twit One, Katzele among others. As a DJ, Niklas was heard at the Salon Des Amateurs, Düsseldorf, in Berlin at KaterBlau, JohnnyKnüppel, Klunkerkranich and Sisyphos, at the Teder/Romano in Tel Aviv and over the airwaves of LYL Radio, Redlight Radio and Cashmere Radio.&#13;
&#13;
Also catch him at his monthly bar residencies at Heiner/Weserstr. 58 in Berlin-Neukölln and at King Georg in Cologne.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://niklaswandt.com">https://niklaswandt.com</link>
          <link href="https://soundcloud.com/niklaswandtmusik">https://soundcloud.com/niklaswandtmusik</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Uptime Bar">
      <event id="10138" guid="c743b3a8-aaf7-4458-8eb8-400ea9870a53">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10138.html</url>
        <logo/>
        <date>2018-12-29T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10138-chiara</slug>
        <title>Chiara</title>
        <subtitle/>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10139" guid="0b24a14d-f414-4fec-990c-fa5154072925">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10139.html</url>
        <logo/>
        <date>2018-12-29T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10139-faheus</slug>
        <title>faheus</title>
        <subtitle/>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.mixcloud.com/matthiasdamasty/">https://www.mixcloud.com/matthiasdamasty/</link>
        </links>
        <attachments/>
      </event>
      <event id="10140" guid="e1d5950b-3278-4e04-aa4e-919ea48860bf">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10140.html</url>
        <logo/>
        <date>2018-12-29T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10140-morellion</slug>
        <title>Morellion</title>
        <subtitle>Techno</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>From the family...</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10055" guid="6e2d531c-b9ea-4801-b7ee-388c6c5657d1">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10055.html</url>
        <logo/>
        <date>2018-12-29T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10055-dj_t_shaba</slug>
        <title>DJ T´shaba</title>
        <subtitle>Electro-Kraut &amp; Cosmic-Shit</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>„Welche Rolle spielt Musik bei der Identitätsbildung? Müssen Punker Punk hören? Dürfen Rocker nur Gitarre? Raver nur Techno? Rastas Reggae? Oder lässt sich da was extrahieren, gibt es sowas wie eine universale Musik? Aus einer in 30 Jahren in viele Richtungen gewachsenen Plattensammlung mit Subkulturaffinität werden im berliner underground, auf festivals wie fusion und eben auch hier Antworten versucht, Vinyl only, alles analoge Handarbeit.“</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10054" guid="b9a5df83-302b-4e7d-8dd2-4599b3df2e9a">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10054.html</url>
        <logo>/system/events/logos/000/010/054/large/avatars-000373142309-25ak0t-t500x500.jpg?1545421325</logo>
        <date>2018-12-29T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10054-naroma</slug>
        <title>Naroma</title>
        <subtitle>Downtempo</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>people also called her sets n°aromatherapy.&#13;
it assumes that movement and emotion are directly related.</abstract>
        <description>Dance has been used therapeutically for thousands of years,&#13;
its an expressive therapy for cognitive, social, behavioral and physical conditions. I’ve been hearing about Naroma from the beginning of my time working with artists from Europe. She’s a bit of a legend as an organizer - Urubu Marinka reported she traveled to Leipzig to play one of Naroma’s parties and stayed an extra night, and then another, and basically just moved to Leipzig, in large part due to Naroma’s warmth as a host.&#13;
And then as a performer, there are Naroma’s 8-hour closing sets at Fusion. That’s some serious business. But, there’s a twist - for years she performed these marathons on two iPods. You know, with the wheels. This is entirely bonkers, borderline impossible. But don’t worry,  since 2 years she uses a computer to play on and she loves all the new possibilities. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="http://www.naroma.net/">http://www.naroma.net/</link>
          <link href="https://soundcloud.com/naroma">https://soundcloud.com/naroma</link>
          <link href="https://www.mixcloud.com/naroma/">https://www.mixcloud.com/naroma/</link>
        </links>
        <attachments/>
      </event>
      <event id="10072" guid="3b31d22c-33dc-48d4-b81f-38c81e8f28c9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10072.html</url>
        <logo/>
        <date>2018-12-30T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10072-bambi_de_luxe</slug>
        <title>bambi de luxe</title>
        <subtitle>Electronica/Downtempo</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Hailing from Geneva to Falken, bambi de luxe has been haunting Zurich's underground scene for many years. She cultivates an alternative vision of living in occupied places promoting community spirit and rejecting materialism in the centre of capitalism and consumption.&#13;
Plays only on best PA’s.&#13;
On a couch.&#13;
Never calls the police.&#13;
LOVE FREEDOM EVERYTHING</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://www.mixcloud.com/bambideluxe/">https://www.mixcloud.com/bambideluxe/</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="OIO Lötarea">
      <event id="290" guid="3c8fb2e5-b752-524f-b9b1-d3393929976d">
        <logo/>
        <date>2018-12-29T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>04:00</duration>
        <room>OIO Lötarea</room>
        <slug>HPHDXC</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/HPHDXC/</url>
        <title>Solder your own MPP tracker</title>
        <subtitle/>
        <track/>
        <type>Lötarea 110 min</type>
        <language>en</language>
        <abstract>Elektra prepares some kits of her MPP tracker, you'll finish them with her help.</abstract>
        <description>See details here: https://wiki.freifunk.net/Freifunk-MPP-Tracker&#13;
&#13;
You can participate on a first come first serve base.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="57">
            <code>HZ9WHF</code>
            <public_name>Elektra</public_name>
            <biography>Free wireless networks since 2001&#13;
Freifunk since 2003</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
  </day>
  <day index="4" date="2018-12-30" start="2018-12-30T11:00:00+01:00" end="2018-12-30T19:00:00+01:00">
    <room name="Adams">
      <event id="9989" guid="54c671a2-1803-4085-a923-a875ca11723a">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9989.html</url>
        <logo>/system/events/logos/000/009/989/large/espr_35c3.jpg?1545253268</logo>
        <date>2018-12-30T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9989-what_the_flag_is_ctf</slug>
        <title>What the flag is CTF?</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Every year since 2011 on the 28C3 we organize a Capture the Flag contest for people on the Congress and from all over the world. This year we want to give you an overview about what a CTF is, the challenges, the players, the community and how much fun it is to play (not only our) CTF.</abstract>
        <description>Capture the Flag competitions started to become a thing in the infosec community more than 20 years ago. When we started playing they were casual games to improve our skill set every now and then on weekends with a bunch of friends. In recent years, the CTF community grew much bigger and nowadays you can play a CTF every weekend if you want to. So what is it all about?&#13;
&#13;
For the past 7 years, we organized the C3 CTF with a variety of challenges that try to be oriented towards real-world scenarios. The range of topics include reverse engineering, crypto(graphy) and web, and of course good old binary exploitation. If you solve a task, you get a flag. As simple as that. For the second time this year, we also run a separate, entry-level CTF designed for folks who do not like spending 48 hours on a single challenge. We are honored that over a thousand teams are playing with us every year from every corner of the world, and trolling our IRC channels.&#13;
&#13;
We will present some challenges from this year's contest to give you an idea what you are up to when you decide to play. You will see how to solve our challenges even if you never played a CTF before. We realize that everybody needs to start somewhere and would love to motivate even more people to join our lovely community.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="2545">Andy</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="10037" guid="36635330-55d6-4297-abcd-6d22fd2d22df">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10037.html</url>
        <logo>/system/events/logos/000/010/037/large/dollar.jpg?1544663679</logo>
        <date>2018-12-30T12:30:00+01:00</date>
        <start>12:30</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-10037-microtargeting_und_manipulation</slug>
        <title>Microtargeting und Manipulation</title>
        <subtitle>Von Cambridge Analytica zur EU-Wahl</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Die Möglichkeiten des Microtargetings, aber auch der Desinformation mit Hilfe von Werbeplattformen wie Facebook sind vielfältiger, als man vor dem Cambridge-Analytica-Skandal vielleicht vermutet hätte. Darauf wollen wir auch angesichts der anstehenden Wahlen in Europa einen Blick werfen.</abstract>
        <description>Seit dem US-Präsidentschaftswahlkampf und dem Brexit-Entscheid sind Details ans Licht gekommen, wie politische Propaganda heute praktisch durchgeführt wird. Was die noch nicht einmal beendeten Untersuchungen bisher ergeben haben, wollen wir zusammenfassen. Denn dass sie mindestens dazu beitrugen, die Wahlergebnisse zu beeinflussen, ist nun  nachvollziehbar.&#13;
&#13;
Entsprechend werden in Brüssel derzeit Gegenmaßnahmen geplant, die die Wahlen zum Europäischen Parlament vor ungebetenen verdeckten Manipulationen schützen sollen. Aber halten sich die zur Wahl Stehenden selber an ihre Forderungen und Vorschläge?</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="810">Ingo Dachwitz</person>
          <person id="1630">Constanze Kurz</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9727" guid="623fd999-d7dd-4fd8-896c-75e51a21df1e">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9727.html</url>
        <logo/>
        <date>2018-12-30T13:30:00+01:00</date>
        <start>13:30</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9727-netzpolitischer_wetterbericht_2018</slug>
        <title>Netzpolitischer Wetterbericht 2018</title>
        <subtitle>Die Höhen und Tiefen der deutschen und europäischen Netzpolitik</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Das Jahr 2018 bietete wieder zahlreiche Beispiele für einen netzpolitischen Wetterbericht. Die Große Koalition lief sich mit der Bundesregierung warm und am Ende des Jahres droht man den Überblick über zahlreiche Kommissionen und Arbeitsgruppen zur Digitalisierung zu verlieren.&#13;
&#13;
Die gute Nachricht ist: Netzpolitik ist angekommen und geht nicht mehr so schnell weg. Die schlechte Nachricht ist: Beispiele für eine bessere Netzpolitik, Wert auf den Schutz und Ausbau von Grund- und Verbraucherrechte legt, gibt es leider eher weniger.&#13;
&#13;
</abstract>
        <description>Während die Urheberrechtsrichtlinie wahrscheinlich Uploadfilter und Leistungsschutzrecht auf EU-Ebene verankert, bringen die Innenminister Uploadfilter gegen Terrorpropaganda voran.&#13;
&#13;
Die ePrivacy-Verordnung hatte im Parlament zuviele Fans von Verbraucherrechten, deshalb wird sich jetzt im EU-Rat gestoppt. Der Skandal um Cambridge Analytica führte dazu, dass Geschäftsmodelle und Datenschutz bei Facebook und Co in der Öffentlichkeit stärker diskutiert wurden und nebenbei erblickte die Datenschutzgrundverordnung das Licht der Öffentlichkeit. Fast alles in der Netzpolitik dreht sich derzeit um Künstliche Intelligenz, wobei immer noch unklar ist, was sich Politikerinnen und Politiker darunter vorstellen, wenn sie davon sprechen. Irgendwas mit Arbeitsplätzen auf jeden Fall, vielleicht auch noch was mit Ethik und Regulierung. Je nach Perspektive.&#13;
&#13;
Dafür gibt es natürlich mehr Überwachung. Es gibt neue Behörden und Agenturen für den Bau von Staatstrojanern und am Bahnhof Südkreuz wurden erfolgreich/erfolgslos biometrische Videoüberwachungssysteme getestet, die demnächst überall ausgerollt werden könnten. Neue Polizeigesetze bringen mehr Überwachungsbefugnisse auf Länderebene.&#13;
&#13;
Es gibt aber auch gute Nachrichten aus diesem Jahr. Mehr dazu dann gerne live vor Ort.&#13;
&#13;
Es ist viel passiert in 2018 und die längeren Linien helfen dabei, einen Blick in die Debatten des kommenden Jahres zu werfen.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="1595">Markus Beckedahl</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9498" guid="8bd222ad-34a7-468a-9e83-11767dcfa809">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9498.html</url>
        <logo>/system/events/logos/000/009/498/large/bug.png?1546169738</logo>
        <date>2018-12-30T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>00:40</duration>
        <room>Adams</room>
        <slug>35c3-9498-dissecting_broadcom_bluetooth</slug>
        <title>Dissecting Broadcom Bluetooth</title>
        <subtitle/>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Broadcom's Bluetooth firmware on popular devices – such as Nexus 5, Nexus 6P, Raspberry Pi 3, and Raspberry Pi 3+ – shares the same firmware update mechanisms, which allows for local firmware modifications. With InternalBlue we published a framework to change lower Bluetooth layers. In this talk we go even further and demonstrate a remote exploit in the Broadcom firmware.</abstract>
        <description>In the first part of this talk we present the InternalBlue framework, which allows to experiment with Broadcom-based Bluetooth chips. On Nexus 5 and 6P, it already supports monitoring and injection tools for the lower layers of the Bluetooth protocol stack.&#13;
&#13;
The second part of this talk focuses on security. We show how behavior during pairing can be modified, e.g. by setting other device features or IO capabilities. We also demonstrate an implementation of the recent publicly known ECDH key exchange attack.&#13;
&#13;
Last, we demonstrate a new attack (CVE-2018-19860) that can crash the Bluetooth stack and execute a limited set of functions – only requiring knowledge of the Bluetooth MAC address of the device under attack. This vulnerability has silently been patched in newer firmware versions, but it applies to Broadcom chips in popular devices such as Nexus 5, Raspberry Pi 3, iPhone 6, Xperia Z5, Samsung Galaxy Note 3, MacBook Pro 2016 and more.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="4927">jiska</person>
          <person id="8329">mantz</person>
        </persons>
        <links>
          <link href="https://media.ccc.de/v/2018-154-internalblue-a-deep-dive-into-bluetooth-controller-firmware">MRMCD talk on InternalBlue (more details on how to use it)</link>
          <link href="https://github.com/seemoo-lab/internalblue">InternalBlue on GitHub</link>
        </links>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/722/original/2018-12-30_bluetooth_%284%29.pdf?1546169669">Presentation Slides</attachment>
        </attachments>
      </event>
      <event id="9685" guid="b1b28bd0-5279-4950-8385-9ee8a57187f9">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9685.html</url>
        <logo/>
        <date>2018-12-30T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9685-security_nightmares_0x13</slug>
        <title>Security Nightmares 0x13</title>
        <subtitle/>
        <track>CCC</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?</abstract>
        <description>Wie immer wagen wir den IT-Security-Alptraum-Ausblick auf das Jahr 2019 und darüber hinaus. Denn was wir wirklich wissen wollen, ist ja schließlich: Welche artifiziell intelligenten Poltergeister werden in unseren Geräten herumspuken, welchen Meistern werden sie gehorchen und wie werden wir sie wieder los?</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="1633">frank</person>
          <person id="384">Ron</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9986" guid="46b7c5d8-318d-4f6c-a17e-73f2638ab46a">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9986.html</url>
        <logo/>
        <date>2018-12-30T17:10:00+01:00</date>
        <start>17:10</start>
        <duration>01:00</duration>
        <room>Adams</room>
        <slug>35c3-9986-closing_event</slug>
        <title>Closing Event</title>
        <subtitle/>
        <track>CCC</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Hier hört es auf.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8759">rufus</person>
          <person id="5638">rixx</person>
        </persons>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Borg">
      <event id="9568" guid="8580bb67-f3f8-4978-aba8-abad02ecceec">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9568.html</url>
        <logo>/system/events/logos/000/009/568/large/yG2ahUfL_400x400.jpg?1543064831</logo>
        <date>2018-12-30T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>02:20</duration>
        <room>Borg</room>
        <slug>35c3-9568-lightning_talks_day_4</slug>
        <title>Lightning Talks Day 4</title>
        <subtitle/>
        <track>CCC</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!</abstract>
        <description>Did you think that the thrill of sharing your ideas in front of a huge audience at a C3 was something you'd never experience? Do you work on a cool project and want to get the word out? Was your talk one of the hundreds that got rejected? Did you come up with an awesome hack that you need to share? Go ahead and enter your Lightning Talk now!&#13;
&#13;
The 35C3 Lightning Talks consist of three fast paced sessions which are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to get out to a global audience. Even if you don't have an awesome idea or project to share, a Lightning Talk is perfect for pitching your Assembly, your workshop or even a longer talk you'll give as a self-organized session. Your five minutes of fame!&#13;
&#13;
For registration and schedule info, please check out https://c3lt.de/35c3</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5263">gedsic</person>
          <person id="4601">bigalex</person>
        </persons>
        <links>
          <link href="https://c3lt.de/35c3">Registration and schedule</link>
          <link href="https://events.ccc.de/congress/2018/wiki/index.php/Static:Lightning_Talks">Congress Wiki Page</link>
        </links>
        <attachments/>
      </event>
      <event id="9925" guid="c293b397-9fad-45ff-9ffe-716503c6c095">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9925.html</url>
        <logo>/system/events/logos/000/009/925/large/IMG_20181225_232912.jpg?1545778008</logo>
        <date>2018-12-30T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9925-let_s_reverse_engineer_the_universe</slug>
        <title>Let's reverse engineer the Universe</title>
        <subtitle>exploring the dark</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>There is four times more dark matter and over fifteen times more dark energy than regular matter in the universe. And we have absolutely no idea what these invisible dark substances might be. This talk will show how we know that dark energy and dark matter exist, although we cannot see them directly. This kind of reverse enigneering of the universe already revealed some interesting features of the dark parts. However, the true nature of dark matter and dark energy are literally in the dark.</abstract>
        <description>When it comes to dark matter, cosmology is facing a crisis. Many theories that can be tested nowadays where falsified and dark matter particle candidates still haven't been found in most of the predicted energy ranges. Whatever dark matter and dark energy will turn out to be, it will be stunning. So stay tuned and explore the dark. </description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8670">Sara Konrad</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9576" guid="9e340a17-98f7-4ac2-8fd4-2f195c60c212">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9576.html</url>
        <logo/>
        <date>2018-12-30T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>01:00</duration>
        <room>Borg</room>
        <slug>35c3-9576-35c3_infrastructure_review</slug>
        <title>35C3 Infrastructure Review</title>
        <subtitle>Up and to the right: All the statistics about this event you could wish for</subtitle>
        <track>CCC</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>35C3 is run by teams of volunteers. In this event, they will provide some insight into the challenges they faced while building the GSM, DECT and IP networks, running video streams, or organizing ticket sales. All graphs will be pointing up and to the right.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="2042">Leon</person>
          <person id="5126">Kévin Redon</person>
        </persons>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Clarke">
      <event id="9370" guid="49fe1044-4038-4cec-8e80-71621c9e7d6e">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9370.html</url>
        <logo>/system/events/logos/000/009/370/large/newLogoEyeSkills.png?1543078784</logo>
        <date>2018-12-30T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9370-hacking_how_we_see</slug>
        <title>Hacking how we see</title>
        <subtitle>A way to fix lazy eye?</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>We mostly see with the mind, and the mind is flexible. For the four hundred million people with amblyopia (lazy eye), their brain encountered an installation error when linking both eyes as babies.  As a "Plan B", their brain switched one eye off.&#13;
&#13;
I'll talk a bit about how the visual system works, and how our open-source virtual reality software (backed by social impact lab Leipzig and the prototypefund.de) can hack through that suppression and provide a chance to "re-install" full sight with two eyes. </abstract>
        <description>By providing an open set of tools for creating comparable experiments, our goal is not just to provide a tool, and a set of tools for building more tools, but to provide the basis for one of the world's largest open-science experiments.&#13;
&#13;
Nobody claims to have predictive scientific models of how the visual system works in its entirety, and that means there is still so much more to discover. In the case of Lazy Eye, some aspects of the visual system are de-activated and/or dormant. What we can do is to comparatively explore which techniques and approaches have which effects on opening visual perceptions, and thereby drive our understanding of the system forward on a theoretical and practical level.&#13;
&#13;
If you'd like to know more, check out www.eyeskills.org and come along to this talk. :-) &#13;
&#13;
&#13;
&#13;
</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8142">Ben Senior</person>
        </persons>
        <links>
          <link href="www.eyeskills.org">EyeSkills</link>
        </links>
        <attachments/>
      </event>
      <event id="9768" guid="75b955c7-3e7c-463d-9d31-5b1e1745a5b2">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9768.html</url>
        <logo>/system/events/logos/000/009/768/large/0865eb00acd7dc00c592fd205d3f93de_preview_featured.jpg?1545500740</logo>
        <date>2018-12-30T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Clarke</room>
        <slug>35c3-9768-open_source_orgelbau</slug>
        <title>Open Source Orgelbau</title>
        <subtitle/>
        <track>Hardware &amp; Making</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Spaß und ein kleines Bisschen Wissenschaft mit 3D-gedruckten Orgelteilen</abstract>
        <description>Musikinstrumentenbau ist überwiegend geheim-by-accident, es wird persönlich weiter gegeben und ist nicht ohne weiteres öffentlich zugänglich. Das ist für musik- und handwerklich interessierte Nerds natürlich unbefriedigend.  &#13;
3D-gedruckte Pfeifen werden ich mitbringen.&#13;
&#13;
## Ablauf &#13;
* Kurze Einführung, was ist eine Orgel eigentlich &#13;
* Was kann man heute cooler machen mit 3D-Druck und modischer Elektronik, Erläuterungen zu Funktionsweisen und CAD-Files&#13;
* Überlegungen über Tastatur-Dynamik &#13;
&#13;
## Links &#13;
Das Spektrogramm auf dem Mac: &#13;
ffmpeg -f avfoundation -i ":0" -lavfi showspectrum=s=1440x900:slide=rscroll -c:v rawvideo -r 25 -pix_fmt yuv420p -f matroska - | mpv - &#13;
Linux: ffplay -f pulse -i "default"&#13;
&#13;
Previously auf media.ccc.de &#13;
* https://media.ccc.de/v/MRMCD15-7058-die_pfeifenorgel_im_zeitraffer&#13;
* https://media.ccc.de/v/WHTT3V&#13;
&#13;
Parametrische Orgelpfeifen-Files (FreeCAD und OpenSCAD):&#13;
* https://github.com/benjaminwand/3d-printed-labial-pipe &#13;
* https://github.com/benjaminwand/3d-printed-reversed-free-reed-pipe&#13;
* https://github.com/benjaminwand/3d-printed-organ-parts&#13;
&#13;
Fachwörter-pdf: https://www.walcker.com/downloads/dictionnaire-des-orgues.pdf</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8577">Benjamin Wand</person>
          <person id="8818">Jannik Beyerstedt</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/730/original/35C3_Orgelbau_Talk.pdf?1546384027">Folien Jannik Beyerstedt</attachment>
          <attachment href="/system/event_attachments/attachments/000/003/731/original/35C3_Vortrag.pdf?1546384027">Folien Benjamin Wand </attachment>
        </attachments>
      </event>
      <event id="9964" guid="b11ac9c0-8a4d-47ae-a584-f5c01fa2a01c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9964.html</url>
        <logo>/system/events/logos/000/009/964/large/Untitled-11.png?1539703024</logo>
        <date>2018-12-30T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>00:50</duration>
        <room>Clarke</room>
        <slug>35c3-9964-cat_mouse_evading_the_censors_in_2018</slug>
        <title>Cat &amp; Mouse: Evading the Censors in 2018</title>
        <subtitle>Preserving access to the open Internet with circumvention technology</subtitle>
        <track>Resilience</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The deepening of global Internet infrastructure comes accompanied with an invigorated capacity and intent by adversaries to control the information that flows across it. Inextricably, political motivations and embedded power structures underlie the networks through which we interpret and understand our societies and our world - censorship threatens the integrity of the public sphere itself. The increasing technical sophistication of information controls deployed by censors in adversarial network environments around the world can be uniquely viewed and researched by circumvention tool providers, whose work continues to preserve access to the open Internet for all communities. Through this presentation, we endeavour to share insights gained from the front lines of this technical contest.</abstract>
        <description>The deepening of global Internet infrastructure comes accompanied with an invigorated capacity and intent by adversaries to control the information that flows across it. Inextricably, political motivations and embedded power structures underlie the networks through which we interpret and understand our societies and our world - censorship threatens the integrity of the public sphere itself. The increasing technical sophistication of information controls deployed by censors in adversarial network environments around the world can be uniquely viewed and researched by circumvention tool providers, whose work continues to preserve access to the open Internet for all communities. Through this presentation, we endeavour to share insights gained from the front lines of this technical contest.&#13;
&#13;
The following key questions will be answered in this session:&#13;
- What are circumvention tools conceptually and how do they work?&#13;
- How have the techniques of adversaries evolved?&#13;
- What are the latest innovations in circumvention technology?&#13;
- How have emerging economies been affected, where censorship and and surveillance hardware and software are built-in to newly established ICT infrastructure?&#13;
- How do circumvention trends follow censorship events and social/political movements?&#13;
- Where do we see these technical advances leading the next generation of censorship and circumvention technology?&#13;
&#13;
This is a Foundations talk. No prior understanding of circumvention technology is required to enjoy this, but the presentation will hopefully be enjoyable to all experience levels.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8668">kmc</person>
        </persons>
        <links>
          <link href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3244046">A recently published paper by this presenter: Censorship and Collateral Damage: Analyzing the Telegram Ban in Iran</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Dijkstra">
      <event id="9905" guid="093eca9c-c084-462a-8ed2-b95954782b06">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9905.html</url>
        <logo>/system/events/logos/000/009/905/large/talk_logo.png?1545853700</logo>
        <date>2018-12-30T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9905-are_machines_feminine</slug>
        <title>Are machines feminine?</title>
        <subtitle>exploring the relations between design and perception of machines and the dynamics in between</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Why do navigation systems have feminine voices? We know Tay, Eliza, Siri not only as female names, but also as chatbots and software, which directly interact with humans. Although computer programs are per se genderless, gender seems not to be cancelled out in human-machine interaction, but why? </abstract>
        <description>This talk aims to examine how we map gender on computers and machines. This includes looking at software in machine-human interaction, as well as digging deeper into a cultural history of imagining and building human-like machines. &#13;
To look at this, two view points are taken; &#13;
In the examples of the virtual assistants; What do the responses these devices give in conversation reveal about their design? What are the expectations and projections users map onto a machine when they interact with it? &#13;
This connects to the cultural imagining of machines as subjects, which has been pondered in literature and film before and parallel to technical research. From 18th century clockwork powered figures, that wrote and played music, to 19th century literature, in which young men fall in love with piano playing automata to A.I. characters in movie series and cinema.&#13;
This talk tries to explore the relations between design and perception of machines and the dynamics in between.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8405">Polaris</person>
        </persons>
        <links/>
        <attachments/>
      </event>
      <event id="9532" guid="362172c1-b637-48e8-ae2a-1fa40391b160">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9532.html</url>
        <logo/>
        <date>2018-12-30T12:50:00+01:00</date>
        <start>12:50</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9532-kernel_tracing_with_ebpf</slug>
        <title>Kernel Tracing With eBPF</title>
        <subtitle>Unlocking God Mode on Linux</subtitle>
        <track>Security</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Have you ever wanted to trace all syscalls or dump all IPC traffic across a Linux system? Until recently, doing so may have required some significant setup involving a half-baked tracing kernel module, a custom kernel module, or even using a kernel debugger. This talk will introduce the eBPF functionality of the Linux kernel and cover practical uses of the technology beyond mere code profiling. We will show how eBPF can be used both defensively and offensively to protect, or compromise, a system.&#13;
&#13;
This talk will primarily focus on using eBPF to dynamically instrument kernel functionality and gain deep insight on the workings of both kernel and userspace code across a running system. Attendees will leave with practical knowledge for using eBPF to (performantly) watch every action taken on a running system and make processes reveal their secrets.</abstract>
        <description>eBPF (or "extended" Berkeley Packet Filter) is a bytecode and virtual machine used as a safe computing environment within the Linux kernel to perform arbitrary programmatic actions. It is a redesign of the original BPF bytecode VM used, typically in userspace, to power features like tcpdump filters. eBPF has an entirely different set of capabilities and instructions, with its primary goal being to serve as a JIT-able virtual machine instruction set that can be targeted by compilers of a memory-safe "restricted C" language. In the Linux kernel BPF and eBPF have been applied to various different kernel features, from programmatic syscall filtering (for sandboxing) to performing efficient custom packet processing inline on the kernel's network data plane.&#13;
&#13;
In this talk, we will first introduce and briefly discuss the internals of the eBPF implementation in the Linux kernel, its features, and the current set of components that it may be integrated with. We will also briefly cover how eBPF does not intrinsically make C code secure and demonstrate how using eBPF instead of other, more mature, technologies may introduce vulnerabilities.&#13;
&#13;
The majority of this talk will focus on using eBPF to trace kernel functions to inspect both kernel and userland code and the data that flows through them. In line with this goal, this talk will cover pragmatic approaches to using eBPF and the non-idiomatic coding styles required to perform useful tasks in eBPF's sandbox. Additionally, while the aim of this talk is to cover the capabilities of "vanilla" eBPF, we will also demonstrate how the kernel may be trivially modified to lift the constraints of the eBPF sandbox when one does not have the time to tiptoe around the bytecode validator (or seeks to use eBPF as a drop-in replacement for kernel modules).&#13;
&#13;
Lastly, this talk will show that while eBPF may generally be "safe" for the kernel itself, it is decidedly not when applied to userspace code. We will conclude this talk by demonstrating a general purpose privilege escalation technique that may be used by privileged users to hop namespacing and escape certain container configurations using nothing but eBPF.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7551">Jeff Dileo</person>
          <person id="8366">Andy Olsen</person>
        </persons>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/729/original/Kernel_Tracing_With_eBPF.pdf?1546315681">Slides</attachment>
        </attachments>
      </event>
      <event id="9623" guid="ba68f092-89bd-4348-9f81-7a05317a0497">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9623.html</url>
        <logo/>
        <date>2018-12-30T14:10:00+01:00</date>
        <start>14:10</start>
        <duration>01:00</duration>
        <room>Dijkstra</room>
        <slug>35c3-9623-augmented_reality_bridging_the_gap_between_the_physical_and_the_digital_world</slug>
        <title>Augmented Reality: Bridging the gap between the physical and the digital world</title>
        <subtitle/>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>There has been a lot of talk about Virtual Reality (VR), but still there are very little applications to enhance our everyday lives outside of entertainment. Augmented Reality (AR), the less known sibling of VR, has the power to have a more profound impact on our lives than VR ever could. Instead of replacing the real world with a virtual one, AR enhances the reality with virtual content. Therefore, AR can be a gateway for people in accessing and understanding todays technology and could provide vast possibilities to support our everyday lives, e.g., for navigation, traveling, or education.&#13;
This talk will give an overview on AR in general and explain its possible benefits and use cases, as well as the issues that may arise, e.g., regarding privacy, data security, as well as psychological and sociological challenges. The talk requires no special knowledge and is suited for people with little exposure to AR and mixed reality, but it will also give insights into current relevant research and development.</abstract>
        <description>The recent renaissance and the technical advance brought Virtual Reality (VR) into the spotlight of the mainstream media and led to many promises of a upcoming VR revolution. But despite the abundance of VR headsets, the profund impact into our everyday lives is still not on the horizon. However, hidden in the shadows of VR, Augmented Reality (AR) has a much higher potential to change our lives. In contrast to VR, which aims to replace our physical reality with a virtual one, AR expands our physical world with virtual content. While VR disconnects us from the world, AR bridges the gap between the real and the digital world.&#13;
&#13;
Research in last decades focused mostly on specialized and professional use, e.g., in medicine or the industry. Nonetheless, there are a lot of applications for everyday usage, like navigation, traveling, education, and others. Probably the most important promise of AR is that it can help mend the ever increasing breach between humans and technology. Todays technical systems are often to complex, processes to distributed for humans to fully understand the function and state of systems. With AR we can superimpose these information directly on our physical world, visualizing data flows and connections, and make technology understandable again.&#13;
&#13;
Despite these opportunities to improve our lives, AR also harbors possible dangers for our society. Looking at the development of the smartphone ecosystems, there will very likely be a few closed systems controlled by their respective globally operating manufacturer. The Microsoft HoloLens is an early example of this likely trend with supporting only  applications of windows universal platform. This implies the danger that these concerns have a vast control over the devices itself and with AR could literally dictate what we are allowed to see and what not. Privacy is also an important factor. To function in a satisfactory manner, AR headsets need a very good positional tracking and a video feed of what the user is currently seeing. To make sense of these informations, cloud-services will very likely be involved. This means sending what is basically a live feed of a persons live to somewhere in the vast expanse of the web. It's very hard to think of data that is any more sensitive than this. Therefore the challenge is how to make sure the data is handled responsibly and remains in the control of the user. Furthermore, AR can also be used for services, which are not in the best interest of the user, like personalized advertisements that, in a worst case scenario, could be superimposed on any surface. Last but not least, there are also some psychological and sociological challenges in the regard of how AR could influence our understanding of the world and how we interact which each other. This is an important question with our current use of smartphones, it becomes even more important when AR has entered our everyday lives.&#13;
&#13;
All of this makes Augmented Reality one of the most interesting areas of the current technical development. Therefore, it is important to get an understanding of what it is all about, which is exactly the goal of this talk. Besides a short definition and overview of the historical context and the current state-of-the-art, the talk will introduce a possible scenario of how AR can influence our everyday lives, which is based on the raise of the smartphone to the ubiquitous device it is today. We will hopefully close with an interesting question and answer session, where we can discuss some aspects even further.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8081">preip</person>
        </persons>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Eliza">
      <event id="9774" guid="29febf04-4e28-4420-b159-d22634c6817e">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9774.html</url>
        <logo>/system/events/logos/000/009/774/large/9.jpg?1539613952</logo>
        <date>2018-12-30T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9774-radical_digital_painting</slug>
        <title>Radical Digital Painting</title>
        <subtitle>Fantastic Media Manipulation</subtitle>
        <track>Art &amp; Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Radical Digital Painting groups and presents several ideas and artifacts related to contemporary painting and contextualizes its connection to historical processes and digital technology. It is inspired by and is a continuation of Radical Computer Music.</abstract>
        <description>Through demonstrative, interactive performance lectures, American artist and educator Jeffrey Alan Scudder presents homegrown software inventions and new theories about painting and picture making. &#13;
&#13;
He has performed 60 times since 2016 across the US and Europe, mostly in art schools for students, and often with collaborators Goodiepal, Casey REAS, Julia Yerger, and Artur Erman.&#13;
&#13;
A Google search for “digital painting” today mostly brings up Photoshop tutorials related to translating age old representational painting techniques to computational media, but the topic of digital painting has much more to offer fine arts in terms of poetry and theory.&#13;
&#13;
Painting software today has largely developed out of a need for traditional artists to keep up pace of work in large scale mass media production pipelines, like those of video games and movies. Few systems have been developed to explore the spontaneity and spirituality present in modernism and contemporary art and further develop the language of painting in general. &#13;
&#13;
Jeffrey has created several programs that highlight abstract expressivity, play, and improvisation over production quality and technical control.&#13;
&#13;
In addition to software demos, new theoretical models of image resolution, computer literacy, and picture making are illustrated, described, and connected to the history of abstraction in drawing and painting. New ways of approaching drawing are also presented. &#13;
&#13;
He presently spends all his time traveling, performing, and continuing to develop his software and media performances.&#13;
&#13;
As of Summer and Fall 2018 he is traveling and lecturing with the Danish composer Goodiepal and his band GP&amp;PLS throughout Europe. Jeffrey’s work Ten Minute Painting is now a part of the International Goodiepal Collection at the SMK Statens Museum for Kunst in Copenhagen, Denmark.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8584">Jeffrey Alan Scudder</person>
        </persons>
        <links>
          <link href="https://docs.google.com/document/d/170R26_4n3uQ_tlhGEWZZbsWssnwz6441ndqEQDSah2U/edit?usp=sharing">Summary / Media</link>
        </links>
        <attachments/>
      </event>
      <event id="9343" guid="52ce1398-fa9b-4bd3-aa9e-6a49a764ac2c">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9343.html</url>
        <logo>/system/events/logos/000/009/343/large/logo-weiss.jpg?1536683965</logo>
        <date>2018-12-30T12:30:00+01:00</date>
        <start>12:30</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9343-court_in_the_akten</slug>
        <title>Court in the Akten</title>
        <subtitle>OpenSchufa und OffeneGesetze</subtitle>
        <track>Ethics, Society &amp; Politics</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Private Unternehmen müssen nicht so transparent sein wie Behörden - selbst wenn sie sich wie Behörden benehmen. &#13;
Welche Mittel können wir nutzen, um trotzdem Lichts ins Dunkel der Konzerne zu bringen? Wir stellen zwei Projekte mit unterschiedlichen Herangehensweise vor: Zum einen OpenSchufa, das das Scoring-Verfahren der Schufa rekonstruieren soll und erste Ergebnisse vorstellen kann. Zum anderen OffeneGesetze, das alle Bundesgesetzblätter seit 1949 erstmals kostenfrei und zur freien Weiterverwendung bereitstellt und jetzt dafür möglicherweise verklagt wird.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="5605">Arne Semsrott</person>
        </persons>
        <links>
          <link href="FragDenStaat.de">FragDenStaat</link>
        </links>
        <attachments/>
      </event>
      <event id="9868" guid="23d0c7cd-5472-4e73-ace6-94209981ecf8">
        <url>https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9868.html</url>
        <logo/>
        <date>2018-12-30T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>00:40</duration>
        <room>Eliza</room>
        <slug>35c3-9868-kickstart_the_chaos_hackerspace_grunden_fur_anfanger</slug>
        <title>Kickstart the Chaos: Hackerspace gründen für Anfänger</title>
        <subtitle>Ein Erfahrungsbericht aus unbetreuter Vereinsmeierei</subtitle>
        <track>CCC</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Laut Mythos wurde der CCC nur zu einem Verein, weil als einzige andere Rechtsform nur noch die kriminelle Vereinigung zur Alternative stand. Damit es bei euch nicht soweit kommt zeigen wir euch wie ihr bequem aus eurem Interessensverband, der Brettspielgruppe oder dem Nerdstammtisch einen guten deutschen e.V. macht. Alles mit einer Prise Humor aus unserem eigenen Versagen und einer Gemeinnützigkeit als Kirsche obendrauf.</abstract>
        <description>Was macht eigentlich ein Vorstand? Ist Kassenwart sein nicht voll viel Papierkram? Wie mache ich jetzt richtige Beitrittserklärungen?&#13;
Alles Fragen die unser eins gerne davon abhalten einen richtigen Verein zu gründen. Wenn man sich aber kurz in das Abenteuer Vereinsrecht stürzt hat man am Ende ein klasse Tool in der Werkzeugkiste um noch fantastischer im Hackerspace zusammen an Projekten arbeiten zu können.&#13;
Wir sprechen dabei aus teilweise schmerzlicher, teilweise lustiger Erfahrung. Samuel und Thorben waren beteiligt an der Gründung und Entwicklung mehrerer Vereine. In den letzteren Versuchen dann auch mit mehr Erfolg. So existiert und floriert bis heute auch der Chaostreff Flensburg e. V., an dessen Geschichte wir euch zeigen wollen wie ihr einen Hackerspace oder ähnliches auf die Beine stellen könnt, wo ihr ihn beheimatet, wie ihr Mitglieder gewinnt, eine Community schafft und auch das nötige Kleingeld für eure Projekte zusammenkratzt. Was für Tools und Technik könnt ihr auf eure Probleme werfen und wo hilft der Gang zum befreundeten Steuerberater? Und wie kann man überhaupt ein Teil des großen Chaos werden, ohne überhaupt nur eine Seele dabei zu haben die weiß worum es geht? Und wie kann ich mein erstes kleines Event starten?&#13;
Den nötigen Papierkram für Gründung, Beitritte und Versammlungen bringen wir euch natürlich zum Kopieren und benutzen mit.&#13;
Freut euch auf eine humoristische Mischung aus gut gemeinter Inkompetenz und gemeinnützigen Papierschlachten. Danach wollt auch ihr Vereinsmeier werden.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="8386">Thorben Dittmar</person>
          <person id="8651">Samuel Brinkmann</person>
        </persons>
        <links/>
        <attachments/>
      </event>
    </room>
    <room name="Lecture room 11"/>
    <room name="Seminar room 14-15"/>
    <room name="Seminar room 13"/>
    <room name="Lecture room M1"/>
    <room name="Lecture room M2"/>
    <room name="Lecture room M3"/>
    <room name="Kidspace"/>
    <room name="CCL Saal 3"/>
    <room name="Chaos West Bühne">
      <event id="116" guid="94644686-b92d-5c42-bfdc-0a10a5a62672">
        <logo/>
        <date>2018-12-30T00:00:00+01:00</date>
        <start>00:00</start>
        <duration>02:00</duration>
        <room>Chaos West Bühne</room>
        <slug>KCQ7PR</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/KCQ7PR</url>
        <title>CTF Afterparty: Project Poltergeist ft. VJ Pyree</title>
        <subtitle/>
        <track/>
        <type>Klangteppich</type>
        <language>de</language>
        <abstract>Wie letztes Jahr wird es wieder ein spezielles Set auf der Chaos West Bühne zur CTF Afterparty geben. &#13;
Es wird intensiv elektronisch und tanzbar mit Techno, Hard Electro, Psytrance, Drum and Bass und ähnlichem.&#13;
&amp;&#13;
Real-time generated visuals combined with live (shader) coding. I use a self-written OpenGL engine written in Python that can hotload both python and shader code to create an ever evolving visual landscape.</abstract>
        <description>Herzlich Willkommen zur dieses Jahr erstmals offiziellen CTF-Aftershowparty. &#13;
Nachdem letztes Jahr so ein Erfolg war, ist die Wiederholung dieses Jahr selbstverständlich.&#13;
Statt dem Hirn und Augen sind jetzt Ohren und Füße gefragt: Mit einem Mix aus Techno, Psytrance, Hard Dance und Artverwandtem.&#13;
Lasst euch ein bisschen überraschen, es wird auf jeden Fall elektronisch und auf jeden Fall extrem tanzbar. &#13;
Als coolen Zusatz gibt es Live Shaderprogrammierung von VJ Pyree obendrauf. &#13;
Kommt also zur Chaos-West Bühne und lasst die Nacht voller Energie ausklingen zu lassen!</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="28">
            <name>Alexeyan</name>
            <biography>CTF-Spieler und DJ&#13;
https://twitter.com/Alexeyan2&#13;
https://www.mixcloud.com/Alexeyan/</biography>
          </person>
          <person id="10">
            <name>DrLuke</name>
            <biography>I am VJ Pyree</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="115" guid="513a294c-0102-5ccb-83e5-a0788c1107bf">
        <logo/>
        <date>2018-12-30T02:00:00+01:00</date>
        <start>02:00</start>
        <duration>02:00</duration>
        <room>Chaos West Bühne</room>
        <slug>FE8ABF</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/FE8ABF</url>
        <title>Techno/Techhouse Set</title>
        <subtitle/>
        <track/>
        <type>Klangteppich</type>
        <language>de</language>
        <abstract>Techno/Techhouse Set by dray</abstract>
        <description>Techno/Techhouse Set, vermutlich vom Stil zwischen Johnny Aemkel und Tiari, könnte sich aber auch noch ein wenig ändern.</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="27">
            <name>dray</name>
            <biography>TBD</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="146" guid="b05b0e85-eb2a-509f-b87b-0a00fcec76d0">
        <logo/>
        <date>2018-12-30T04:00:00+01:00</date>
        <start>04:00</start>
        <duration>02:00</duration>
        <room>Chaos West Bühne</room>
        <slug>9YUVFS</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/9YUVFS</url>
        <title>Technoid mit Juli Jane</title>
        <subtitle/>
        <track/>
        <type>Klangteppich</type>
        <language>de</language>
        <abstract>Technoide Musik live gemixt von Juli Jane.</abstract>
        <description>Technoide Musik im Live-DJ-Mix von Juli Jane&#13;
&#13;
Eine bunte Mischung von Techno, Tech-House, Deep-House und/oder ähnlichen elektronischen Genres. &#13;
&#13;
* Set vom 34C3 im Electric Cube: https://soundcloud.com/juli_jane/nerds-can-dance&#13;
* Set vom EMF Camp 2018: https://soundcloud.com/juli_jane/roadtrip&#13;
* Mehr Sets und eigenproduzierte Tracks: https://soundcloud.com/juli_jane&#13;
&#13;
Zuvor zu hören u.a. bei:&#13;
&#13;
* CCC Camp 2015 - Chaos West&#13;
* 32C3 - Chaos West Klangteppich&#13;
* SHA2017 - Chaos West,  GeraFFel und Mainfloor&#13;
* 34C3 - Electric Cube&#13;
* EMF Camp 2018 - Null Sector</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="61">
            <name>Juli Jane</name>
            <biography>CCC-Veteranin, Nerdette und DJane/Produzentin.&#13;
&#13;
Mehr chaosrelevante Details: https://wiki.das-labor.org/w/Benutzerin:Julijane</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="107" guid="f106b309-ffa8-5800-b9bf-00acb573e48c">
        <logo/>
        <date>2018-12-30T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>00:20</duration>
        <room>Chaos West Bühne</room>
        <slug>THQZWQ</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/THQZWQ</url>
        <title>Eine Einführung in Bildschirmtext</title>
        <subtitle/>
        <track/>
        <type>Einfacher Slot mit optionalen Q+A</type>
        <language>de</language>
        <abstract>Bildschirmtext war der Onlinedienst für Konsumenten bei der Post. Dieser Talk führt in die Technik dahinter ein und soll auch zeigen war man daraus für einen Web-Nachfolger wiederverwenden kann, und was man ändern müsste.</abstract>
        <description>Bildschirmtext ist nun schon seit 15 Jahre abgeschaltet. Wie bei jeder alten Technik spiegelt die Technik jedoch ihre Zeit wieder und zeigt gleichzeitig Möglichkeiten für die Zukunft auf.&#13;
&#13;
Bildschirmtext ist einerseits simpel genug, dass es von Einzelpersonen weitgehend implementiert werden kann, andererseits jedoch vielseitig genug um moderne Features einzubetten. Die Standards hinter Bildschirmtext sahen bereits hoch aufgelöste Fotos, Vektorgraphiken, Dateiübertragungen und Audio vor. Mit den gleichen Mechanismen von damals könnte man heute Video realisieren. Im Gegensatz zum Web, bei dem die Browser inzwischen Gigabytes an RAM benötigen, kann man ein simples Videotextterminal in einem mittelgroßen AT-Mega implementieren.&#13;
&#13;
Dafür muss man natürlich irgendwo anfangen. Deshalb habe ich vor ein kleines BTX-System aufzusetzen . Der Code dafür ist hier https://github.com/Casandro/cas_btx und wird dann (hoffentlich) per IP und DECT erreichbar sein. Dieses System hat einen primitiven Editor für BTX-Seiten und ist als Startpunkt für weitere Entwicklungen gedacht.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="14">
            <name>Christian Berger</name>
            <biography>Elektroingenieur der Nachrichtentechnik aus Leidenschaft mit einem Hang zur Technikgeschichte.&#13;
&#13;
Bislang habe ich 5 Artikel von unterschiedlicher Qualität in 2600 veröffentlicht. (Pseudonym Casandro) In der übernächsten Datenschleuder wird voraussichtlich ein Artikel von mir über den T.30 Faxstandard sein.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="143" guid="afa54ff4-f64e-5426-b822-50342f5d4ce9">
        <logo/>
        <date>2018-12-30T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>RDVAAZ</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/RDVAAZ</url>
        <title>Informationssicherheit &amp; IT-Risikomanagement am Beispiel der Bank B</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Gerade im Bereich der IT halten externe Berater (und auch Mitarbeiter) sich oft mehr oder weniger an den Vorgaben der Aufsicht fest. So manch einer hat keine Ahnung, ob das eigentlich zielführend ist - und von was redet der Techniker am anderen Ende des Tisches da eigentlich?!?!!!??? Garniert mit eigenen Anekdoten, kleinen fiktiven Beispielen und absolut tauglich für Anfänger: Informationssicherheit &amp; IT-Risikomanagement am Beispiel der Bank B!</abstract>
        <description>Zum Aufwärmen: Datenschutz und Informationssicherheit. Wo ist der Unterschied? Dann die drei Schutzziele Vertrautlichkeit / Integrität / Verfügbarkeit am Anfang des Regelkreises zur Informationssicherheit: welchen Schutzbedarf haben meine Informationen? Welche Prozesse wirken darauf ein? Auf welchem Server liegen die Informationen eigentlich? Hat meine Anwendung eine Schnittstelle? Warum stellen diese Leute immer so viele Fragen? Bisher ist doch auch nichts passiert? Dann mach ich halt mal was.... spätestens an dieser Stelle atme ich normalerweise tief durch. Dann kommt nämlich der Part, an dem erklärt wird: nö, ist nicht. &#13;
&#13;
Wenn dann weißer Rauch aufsteigt, und alle irgendwie zufrieden sind, kommt das Restrisiko. Wie, noch mehr zu tun?! Ja! Dann werden Risiken eingestellt, bewertet, und "gemanaged", berichtet, abgelehnt, verloren, wiedergefunden, mitigiert und irgendwie zu einem eigenen Süppchen gekocht. Dabei könnte es so schön sein (vollständiges, adressatengerechtes Reporting *hüstel*). Der zweite Teil beinhaltet dann also die Risikoanalyse. Über die Klärung, was eigentlich ein Risiko und eine Bedrohung ist, quantifizierter vs. qualifiziertes Ansatz, Risikobehandlung, Eintrittswahrscheinlichkeit &amp; Schadenshöhe.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="59">
            <name>Diula</name>
            <biography>Chaosdorf-Member &lt;3 mit Vorliebe für Informationssicherheit, Prozesse und Anweisungen. Findet gerne heraus wie Dinge funktionieren, stellt Fragen und dokumentiert die Ergebnisse. Im Finanzbereich unterwegs.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="137" guid="166b7efd-99a0-5105-bc44-6aaa1abea911">
        <logo/>
        <date>2018-12-30T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>ER9F8B</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/ER9F8B</url>
        <title>Hacker eG - Genossenschaft für chaosnahes Wirtschaften</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract># Hacker eG&#13;
* Eine Genossenschaft für chaosnahes Wirtschaften&#13;
&#13;
Viele von uns brauchen neben ihrem alltäglichen Broterwerb eine Genossenschaft, die uns gehört und uns bei Bedarf sogar nebenbei anstellt. Viele von uns wissen nicht, dass das so ist und warum. Dieser Vortrag erklärt die Zusammenhänge und das Vorhaben.</abstract>
        <description>Viele von uns haben einen Voll- oder Teilzeitjob zum täglichen Broterwerb und tun daneben gutes im Chaos und darüber hinaus. Manchmal würde man dafür auch gern etwas Geld nehmen und auch gern bekommen - und nimmt dann doch keins, weil man dann ja ein Gewerbe anmelden, ein Unternehmen gründen, Nebentätigkeiten genehmigen lassen müsste, Steuerberater beschäftigen usw. usf.&#13;
So mancher von uns braucht nur mal zwischendurch eine Firma. Für ein cooles Projekt, den Containerimport aus China, oder zur Überbrückung zwischen zwei Jobs. Erst gründen und dann wieder abwickeln lohnt sich oft nicht. &#13;
Oder man möchte das zugeworfene Kleingeld für gefällige Dienste rechtssicher und steuerehrlich in einen solidarischen Topf geben.&#13;
Manchmal kann man auch Fördermittel für Projekte bekommen - wenn man denn nicht "nur" ein kleiner Freelancer ist.&#13;
&#13;
Für alles das gibt es seit 150 Jahren eine Lösung. Nennt sich Genossenschaft. Ist ein bisschen aufwändig. Jedenfalls für einen alleine. Auch für 10 Leute. Aber nicht für 100 von uns. &#13;
&#13;
Tun wir uns zusammen.&#13;
&#13;
Grundsatzinfos: [https://de.wikipedia.org/wiki/Genossenschaft](https://de.wikipedia.org/wiki/Genossenschaft)&#13;
&#13;
und bald auch konkret hier: [hkbl.de](http://hkbl.de)&#13;
&#13;
Registrierung als Gründungsinteressent: Leere Mail mit Betreff "Interesse" an geno@damals-tm-podcast.de</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="50">
            <name>ajuvo</name>
            <biography>## Privatier und Zeitzeuge. &#13;
&#13;
*Ich mache ehrenamtlich Vorträge, Workshops, Bücher, Radio und Podcasts.  Lange Jahre habe ich international Unternehmen, Organisationen und Regierungen beraten, war Diplomat, Lobbyist, Wissenschaftler, akademischer Lehrer und Radiomacher. Alter Sack (tm). &#13;
&#13;
Radio Hyperbandrauschen auf Berlin 88.4 ;  Podcaster damals-tm-podcast.de ; c-base; c3d2; 0x56686607E8A7D407; Z6X3DTSM; DECT 3370; @ajuvo@chaos.social ; &#13;
&#13;
zur Zeit Chaospate für Chaos Potsdam &#13;
&#13;
URL: [crew.c-base.org](https://ajuvo.crew.c-base.org/)</biography>
          </person>
          <person id="51">
            <name>therojam</name>
            <biography>Bone shortly after. The Wallmanns down in the ChaosZone near Elbe.&#13;
Today working in Linux &amp; OpenSource branch as Consultant &amp; Supporter.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="156" guid="68619725-72ae-5645-8b6c-8e645e5d9c47">
        <logo/>
        <date>2018-12-30T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>MRKBBU</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/MRKBBU</url>
        <title>It's not rocket science</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>en</language>
        <abstract>Space is hard, but not that hard. Despite progress in technology, and cheaper rockets, science in space is becoming ever more expensive. Even copies of old missions now cost 2-4x as much. Better solutions are available, some taken straight from smartphones and consumer cameras.</abstract>
        <description>Satellite hardware is not magic dust. It's a piece of electronics in a somewhat exotic environment. These days, hardware development has progressed to the point where off-the-shelf hardware can be used in space.  Improving performance, while cutting costs to a fraction. &#13;
&#13;
Professional star trackers cost several hundred thousand dollars a piece. But it is just a simple camera and the necessary software to find and track star constellations. Consumer hardware, like CPUs and camera chips, is essentially space-rated by default. Silicon-on-insulator used to be special hardware for radiation environments, but is now used in consumer electronics. &#13;
&#13;
Cheaper rockets became possible by pragmatic rocket engineering, notably by SpaceX but also Russian rockets still flying today. The ideas had been around for a long time. European, Chinese and Indian Launcher provide some examples on how to achieve reductions in launch cost and how not to achieve them.&#13;
&#13;
Cheaper rockets in many cases also allow higher mass to be traded for lower prices. Larger margins reduce work for quality control and modular systems reuse old engineering hardware in new missions. Higher satellite mass become increasingly acceptable, if they reduce development and manufacturing cost. And none of this is rocket science.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="69">
            <name>Frank Wunderlich-Pfeiffer</name>
            <biography>I'm a journalist working for [Golem.de] (https://www.golem.de/specials/autor-frank-wunderlich-pfeiffer/) Covering spaceflight and other topics in science and technology.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="165" guid="c5f243d8-21be-5ee9-8cae-5310dc689191">
        <logo/>
        <date>2018-12-30T16:10:00+01:00</date>
        <start>16:10</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>7DQX77</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/7DQX77</url>
        <title>Security Nightmares [Streaming]</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Security Nightmares Streaming</abstract>
        <description>Security Nightmares Streaming</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="82">
            <name>35C3</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="135" guid="e1b0a80b-4da3-5a16-983f-97ea88b56d1e">
        <logo/>
        <date>2018-12-30T17:10:00+01:00</date>
        <start>17:10</start>
        <duration>00:50</duration>
        <room>Chaos West Bühne</room>
        <slug>RMQHYM</slug>
        <url>https://fahrplan.chaos-west.de/35c3chaoswest/talk/RMQHYM</url>
        <title>Closing [Streaming]</title>
        <subtitle/>
        <track/>
        <type>Doppelter Slot 40 Minuten + 10 Minuten Q+A</type>
        <language>de</language>
        <abstract>Streaming des offiziellen Closing Events</abstract>
        <description>Streaming des offiziellen Closing Events</description>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="82">
            <name>35C3</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="ChaosZone">
      <event id="723" guid="2020b8e5-6239-56db-a943-08d739bb83ed">
        <logo/>
        <date>2018-12-30T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>CR8PGP</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/CR8PGP</url>
        <title>Die Alpha</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>de</language>
        <abstract>Demo einer Alphastation mit 21064 Prozessor. Dazu Infos über die Geschichte des Alpha-Prozessors und wie digital drin hängt/gehangen ist. Sowie Eckdaten zum Alpha</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="26">
            <name>robert0k</name>
            <biography>Softwareentwickler, Informatiker und Mitglied des chch.it Chemnitz</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="717" guid="a3f657ab-f9d6-5af0-9f54-2121dc894491">
        <logo/>
        <date>2018-12-30T17:10:00+01:00</date>
        <start>17:10</start>
        <duration>01:00</duration>
        <room>ChaosZone</room>
        <slug>L8MWNG</slug>
        <url>https://cfp.chaoszone.cz/35c3/talk/L8MWNG</url>
        <title>livestream - Closing Ceremony</title>
        <subtitle/>
        <track/>
        <type>Session 60min</type>
        <language>en</language>
        <abstract>Livestream from the 35C3 Closing Ceremony</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="20">
            <name>livestream</name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Vortrags-Arena">
      <event id="304" guid="7db71e6b-183a-55cf-b1eb-4bbf104ec505">
        <logo/>
        <date>2018-12-30T11:00:00+01:00</date>
        <start>11:00</start>
        <duration>00:30</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>R3DGAF</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/R3DGAF/</url>
        <title>OIO habour clean up  - Day 3</title>
        <subtitle/>
        <track/>
        <type>OIO Housekeeping</type>
        <language>en</language>
        <abstract>OIO habour clean up</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="93">
            <code>HUQ9YA</code>
            <public_name>35c3oio@freifunk.space</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="282" guid="07ca3e82-b108-5267-9c00-6aa584c24a12">
        <logo/>
        <date>2018-12-30T11:30:00+01:00</date>
        <start>11:30</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>SQXVCE</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/SQXVCE/</url>
        <title>OIO Daily Standup day 4</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>Let's start into day 4</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="6">
            <code>HFER8G</code>
            <public_name>Andreas Dorfer</public_name>
            <biography>https://forum.freifunk.net/u/adorfer/</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="262" guid="9ae91188-8de6-5003-83b1-0c2e6efc9cc5">
        <logo/>
        <date>2018-12-30T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>M9VQA9</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/M9VQA9/</url>
        <title>Why VPN? Freifunk via L2-BSA.</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>Why hassle with the VPN-Overhead. With the availability of commodity SV-VDSL Hardware in Gluon , it’s now possible to replace Mesh-VPN with Mesh-DSL. What we learned in the process and how major projects and wireless backbone networks in particular can benefit from a "VPN-free" solution.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="53">
            <code>SB9DGB</code>
            <public_name>skorpy</public_name>
            <biography>Below 1GE? Do not touch it!</biography>
          </person>
          <person id="54">
            <code>C9EY9L</code>
            <public_name>herrbett</public_name>
            <biography>Freifunk Karlsruhe</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="215" guid="fcf859a5-a914-5ac2-98c6-66af0328bd6f">
        <logo/>
        <date>2018-12-30T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>AYUMLK</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/AYUMLK/</url>
        <title>Distributed DHCP</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>In mesh networks clients stay in separated ethernets. We developed and implemented a distributed dhcp algorithm so our mesh nodes now can serve dhcp directly while maintaining a consensus about leases of the same subnet.</abstract>
        <description>In mesh networks, you can either run central dhcp servers or run them on the mesh nodes and have some administrative control about the served subnets, but those then scattered dhcp servers have no consensus&#13;
about the whole lease state and thus are not able to renew leases of roamed clients.&#13;
&#13;
Our algorithm, implemented in the ddhcpd addresses these problems:&#13;
It coordinates the served leases automatically, so you need no administrative control entity. And&#13;
it allows roamed clients to renew and keep their IP addresses, through a forwarding mechanism.&#13;
&#13;
The talk will be about the theoretical concept, the state of our implementation in ddhcpd and practical experience. &#13;
&#13;
DDHCPD: https://github.com/sargon/ddhcpd&#13;
Gluon Packet: https://github.com/sargon/gluon-sargon/tree/v2018.x/ddhcpd</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="15">
            <code>KMR7N8</code>
            <public_name>Daniel Ehlers</public_name>
            <biography>informatics network guy with interests in combinatoric algorithms.</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="284" guid="065f190a-06ca-5a79-8190-4abc4fd4f8be">
        <logo/>
        <date>2018-12-30T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>00:20</duration>
        <room>OIO Vortrags-Arena</room>
        <slug>CEMDER</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/CEMDER/</url>
        <title>OIO Closing Session</title>
        <subtitle/>
        <track/>
        <type>Talk 20min total (etwa 5min  Q&amp;A)</type>
        <language>en</language>
        <abstract>Shutdown notice</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="7">
            <code>USJAK9</code>
            <public_name>Andreas Bräu</public_name>
            <biography>Freifunker since 2006</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="OIO Workshop-Domo">
      <event id="319" guid="adb46547-e787-500d-807b-d373fad6cde9">
        <logo/>
        <date>2018-12-30T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>01:00</duration>
        <room>OIO Workshop-Domo</room>
        <slug>FTFSBU</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/FTFSBU/</url>
        <title>ELECTRIC CARS, USE IT, HACK IT, TALK ABOUT IT</title>
        <subtitle/>
        <track/>
        <type>Workshop 45min</type>
        <language>en</language>
        <abstract>Let's talk about computers on wheels. Electric cars. Let talk about experiences, hardware, software, hacking cars, coding cars.&#13;
&#13;
No presentation, just talk about experiences, ideas, problems and solutions.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="104">
            <code>SAXFNS</code>
            <public_name>Morris Jobke</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="285" guid="9fbdc7f9-97d6-56b9-a082-f2581a307401">
        <logo/>
        <date>2018-12-30T15:30:00+01:00</date>
        <start>15:30</start>
        <duration>01:20</duration>
        <room>OIO Workshop-Domo</room>
        <slug>WNYZ7A</slug>
        <url>https://pretalx.35c3oio.freifunk.space/35c3oio/talk/WNYZ7A/</url>
        <title>Freifunk-Workshop: bessere Vorschläge als "weiter so" für 2019?</title>
        <subtitle/>
        <track/>
        <type>Workshop 80min</type>
        <language>de</language>
        <abstract>Eine Diskussion: Weniger Nachfrage, unzeitgemäße Performance, Adminfrust, erklärungsbedürftige Hardware-Situation: Was können wir anders machen in den etablierten Communities. Visionen oder schlicht Ansätze</abstract>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="6">
            <code>HFER8G</code>
            <public_name>Andreas Dorfer</public_name>
            <biography>https://forum.freifunk.net/u/adorfer/</biography>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="WikiPakaWG Esszimmer">
      <event id="529" guid="2ef1d870-f2b1-583b-98c6-09574123a90f">
        <logo/>
        <date>2018-12-30T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:45</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>K7G8NX</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/K7G8NX/</url>
        <title>HackspaceDesignPatterns</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>de</language>
        <abstract>"Wir brauchen einen Hackspace."&#13;
Mit dieser Aussage beginnt alles.&#13;
Aber was ist notwendig, um diese Idee Wirklichkeit werden zu lassen? Einen geeigneten Ort finden, bürokratische und finanzielle Hürden, Raumgestaltung, die Gemeinschaft in Ihrem Raum zusammenhalten ... Es gibt eine Menge Dinge, die man beachten sollte.&#13;
Mit Hilfe von Design Patterns zeigen wir Euch, wie Ihr Euren eigenen Hackspace aufbauen könnt.&#13;
&#13;
Der Hackspace Design Pattern Catalogue wurde erstmals auf der 24C3 vorgestellt. Seitdem sind die HackspaceDesignPatterns DAS Handbuch zum Einrichten eines eigenen Hackspace geworden. Jetzt, über 10 Jahre später, glauben wir ist es an der Zeit, einige dieser Pattern zu aktualisieren.&#13;
Was ist noch gültig? Was hat sich verändert? Brauchen wir neue Pattern? Brauchen wir Patterns für Makerspaces? etc...&#13;
Kommt zu diesem Vortrag, wenn ihr im Begriff seid, euren lokalen Chaos Computer Club oder Hackspace an irgendeinem Ort der Welt zu gründen und um von unseren Erfahrungen zu lernen!</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="24">
            <code>BDSWFX</code>
            <public_name>Felix</public_name>
            <biography/>
          </person>
          <person id="36">
            <code>YMCYGT</code>
            <public_name>Lars Weiler</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="532" guid="966fb613-e266-560b-be19-ab6b8aad1db8">
        <logo/>
        <date>2018-12-30T13:00:00+01:00</date>
        <start>13:00</start>
        <duration>01:00</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>RGU9XL</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/RGU9XL/</url>
        <title>Datenguide / Statistik für alle!</title>
        <subtitle/>
        <track/>
        <type>Workshop mit Gruppentischen</type>
        <language>de</language>
        <abstract>Mit unserem Projekt Datengui.de machen wir die Daten der statistischen Ämter zugänglich für alle! In unserer Präsentation zeigen wir, wie wir die Daten aus der amtlichen Statistik saugen und für euch so aufbereiten, dass ihr sie verstehen und weiterbenutzten könnt.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="27">
            <code>YMYTMP</code>
            <public_name>Simon</public_name>
            <biography/>
          </person>
          <person id="37">
            <code>NKKBZK</code>
            <public_name>P3nny</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="531" guid="ff31429a-f7bd-5c10-a816-6c5bfb1295e2">
        <logo/>
        <date>2018-12-30T14:30:00+01:00</date>
        <start>14:30</start>
        <duration>01:30</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>A9QYBU</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/A9QYBU/</url>
        <title>How To Become a (Media)Wiki Hacker</title>
        <subtitle/>
        <track/>
        <type>Talk</type>
        <language>en</language>
        <abstract>Basic introduction how to get started to hack on Wikimedia software projects with Q&amp;A</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons>
          <person id="25">
            <code>RVGZKL</code>
            <public_name>Daniel</public_name>
            <biography/>
          </person>
          <person id="26">
            <code>DXJG8B</code>
            <public_name>Andre</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
      <event id="508" guid="386ef762-a66a-5cc2-b6bd-3bd139cb9b07">
        <logo/>
        <date>2018-12-30T17:00:00+01:00</date>
        <start>17:00</start>
        <duration>00:15</duration>
        <room>WikiPakaWG Esszimmer</room>
        <slug>RXZ3FE</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/RXZ3FE/</url>
        <title>Abbau-Meeting</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="4">
            <code>33UT8A</code>
            <public_name>WikiPaka Orga</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="WikiPakaWG Küche">
      <event id="506" guid="60b68950-57f5-5ca9-880d-9b1a732b2ad1">
        <logo/>
        <date>2018-12-30T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>00:15</duration>
        <room>WikiPakaWG Küche</room>
        <slug>XXY8Q7</slug>
        <url>https://cfp.verschwoerhaus.de/35c3/talk/XXY8Q7/</url>
        <title>Orgameeting Tag 4</title>
        <subtitle/>
        <track/>
        <type>Meetup</type>
        <language>de</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>true</optout>
        </recording>
        <persons>
          <person id="4">
            <code>33UT8A</code>
            <public_name>WikiPaka Orga</public_name>
            <biography/>
          </person>
        </persons>
        <links/>
        <attachments/>
        <answers/>
      </event>
    </room>
    <room name="Discodrama">
      <event id="10171" guid="020fed02-b4b2-472a-a4fc-bf4d4ede4e51">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10171.html</url>
        <logo/>
        <date>2018-12-30T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>03:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10171-fairy_dust_-_day4</slug>
        <title>Fairy Dust - Day4</title>
        <subtitle>Rocket Away</subtitle>
        <track>Music</track>
        <type>other</type>
        <language>en</language>
        <abstract>Modify the Fairy Dust</abstract>
        <description>After standing in the cold rain and snow for too long, the Fairy Dust will find its place this time in the middle of the crowd at hall 5. A video installation will take place on the surface. This is a call for people, who can handle c4d files and have the bravery to put their vision on the symbol of the congress.&#13;
&#13;
The file attached to this event contains all information about the object, as well the position and lenses of the 4 projectors. Fell free to develop whatever you like. Keep in mind that the surface is very glossy and actually eats the light away. Rendered video best with HAP or MP4.&#13;
&#13;
In the hours between 2 pm and 5 pm on the days of the congress, there will be access to the video system, if you come around and have a device with HDMI out.  &#13;
&#13;
Enjoy!&#13;
&#13;
Powered by PENTAKLON und Rico Rose &#13;
&#13;
Contact: privatlehrer[at]gmail[:]com</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments>
          <attachment href="/system/event_attachments/attachments/000/003/635/original/35C3-template-ROCKET.c4d?1545876786">35C3-template-ROCKET.c4d</attachment>
        </attachments>
      </event>
      <event id="10141" guid="097ca083-59b5-4b79-885e-76c3cfe285d3">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10141.html</url>
        <logo/>
        <date>2018-12-30T18:00:00+01:00</date>
        <start>18:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10141-bobopk</slug>
        <title>BoboPK</title>
        <subtitle>Game Boy Live!</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>From the family...</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10142" guid="22702740-7748-46c5-84c4-7fd05aeba5c4">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10142.html</url>
        <logo>/system/events/logos/000/010/142/large/avatars-000311048113-9dewz4-t500x500.jpg?1545422530</logo>
        <date>2018-12-30T19:00:00+01:00</date>
        <start>19:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10142-exoboom</slug>
        <title>Exoboom</title>
        <subtitle>Techno</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>We were deeply into research, &#13;
together with a mad cartoon scientist,&#13;
when shit hit the fan!&#13;
..However, we got stuck in your dimension.&#13;
And we brought you something very special.&#13;
Our Quantum Techno Generator - EXOBOOM.&#13;
You don´t want to miss us firing up that thing!</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/exoboom">https://soundcloud.com/exoboom</link>
        </links>
        <attachments/>
      </event>
      <event id="10143" guid="ec9d20a1-1795-4ec7-9f34-116b180be603">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10143.html</url>
        <logo/>
        <date>2018-12-30T20:00:00+01:00</date>
        <start>20:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10143-onetake_perm</slug>
        <title>Onetake &amp; Perm</title>
        <subtitle>Part 1</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Since years OneTake &amp; Perm share a faible for heavyweight and spacey Dub 7inches. Every once in a while they get together for a rare b2b set.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/onetake">https://soundcloud.com/onetake</link>
          <link href="https://soundcloud.com/perm-3">https://soundcloud.com/perm-3</link>
        </links>
        <attachments/>
      </event>
      <event id="10064" guid="1b66a579-3b51-4306-ae97-2eccc8a086a1">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10064.html</url>
        <logo>/system/events/logos/000/010/064/large/disrupt_Cliona1.jpg?1545422990</logo>
        <date>2018-12-30T21:00:00+01:00</date>
        <start>21:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10064-disrupt</slug>
        <title>Disrupt</title>
        <subtitle>DigiDub</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>With a background in breakcore, weirdo electronic music and a love for video game soundtracks disrupt and a trashy laptop set out on a mission to unite bits and bytes with the goodness of DUB back in 2003.&#13;
&#13;
Starting the Jahtari imprint as an outlet for those humble but fun experiments helped to gain momentum for the sound and DIY approach the label is now known for.</abstract>
        <description>A fair heap of releases followed since 2007: “Foundation Bit” (on Werk Discs), “The Bass Has Left The Bilding” (LP), “Dot Matrix With Stereo Sound” and many ruffneck dancehall EPs and 7″s alongside Maffi and Naram.&#13;
&#13;
Disrupt also produced the cosmic enka LP “Karma No Kusari” by Kiki Hitomi, and the dub poetry epics “Dis Side Ah Town” and “Dog Heart City” by Roger Robinson.&#13;
&#13;
With his highly immersive SciFi adventure album “Omega Station” disrupt is setting out towards a new era of space exploration for the Jahtari label.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://jahtari.org/artists/disrupt/">https://jahtari.org/artists/disrupt/</link>
          <link href="https://soundcloud.com/jahtari_records">https://soundcloud.com/jahtari_records</link>
        </links>
        <attachments/>
      </event>
      <event id="10144" guid="1c784f88-981b-4174-a58c-4692112cc373">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10144.html</url>
        <logo/>
        <date>2018-12-30T22:00:00+01:00</date>
        <start>22:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10144-onetake_perm</slug>
        <title>Onetake &amp; Perm</title>
        <subtitle>Part 2</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Since years OneTake &amp; Perm share a faible for heavyweight and spacey Dub 7inches. Every once in a while they get together for a rare b2b set.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/onetake">https://soundcloud.com/onetake</link>
          <link href="https://soundcloud.com/perm-3">https://soundcloud.com/perm-3</link>
        </links>
        <attachments/>
      </event>
      <event id="10059" guid="b284e621-c3d1-42b5-925b-5380b3eb9c77">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10059.html</url>
        <logo>/system/events/logos/000/010/059/large/avatars-000529235811-z36gbq-t500x500.jpg?1545423475</logo>
        <date>2018-12-30T23:00:00+01:00</date>
        <start>23:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10059-t-data</slug>
        <title>T-Data</title>
        <subtitle>Bass</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Clear Memory member, future record store owner and Data Wrangler based in Leipzig. Transforming Breaks, UK Bass, Footwork, bossy Electro and Jungle into another format with the intent of making it more appropriate and valuable for a variety of listeners.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/tdata">https://soundcloud.com/tdata</link>
        </links>
        <attachments/>
      </event>
      <event id="10065" guid="301217de-d81e-42e8-ae95-cd7428f5c04a">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10065.html</url>
        <logo>/system/events/logos/000/010/065/large/avatars-000189510234-u4rq4y-t500x500.jpg?1545423354</logo>
        <date>2018-12-31T01:00:00+01:00</date>
        <start>01:00</start>
        <duration>01:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10065-ruz</slug>
        <title>RUZ</title>
        <subtitle>Jungle/Bass/Rave</subtitle>
        <track>Music</track>
        <type>concert</type>
        <language>en</language>
        <abstract>Leipzig based Artist and Producer Sebastian G. aka RUZ.&#13;
Associated with: ALPHACUT | 45SEVEN | BASSMÆSSAGE&#13;
Original Junglist, Soundscape lover and musical Madness searching Vinylist from Leipzig, Germany.</abstract>
        <description>From ruff &amp; rugged Breakbeat fiddlin' over smooth Oldschool Reggae Dub Vibes to dark, psychotic and melancholic Soundspheres.&#13;
For fans of 90's oldschool Jungle &amp; newly modern Drum and Bass movements.</description>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/ruzztle">https://soundcloud.com/ruzztle</link>
          <link href="https://www.mixcloud.com/TaRUZ/">https://www.mixcloud.com/TaRUZ/</link>
        </links>
        <attachments/>
      </event>
      <event id="10043" guid="1e1d04bd-c5b7-41a0-b330-532ee2c85af7">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10043.html</url>
        <logo>/system/events/logos/000/010/043/large/avatars-000154450404-yn2uz6-t500x500.jpg?1545423670</logo>
        <date>2018-12-31T02:00:00+01:00</date>
        <start>02:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10043-ingo_boss</slug>
        <title>Ingo Boss</title>
        <subtitle>Techno</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>Ingo Boss was born in 1979 in Frankfurt am Main. At the tender age of 11, Ingo was already entranced by the new sound called techno that he had heard on the radio – two years later he already became acquainted with the wonderful things one can do with two decks and a mixer. As so many others, he was inspired by the music Sven Väth played at the legendary „Omen“ in Frankfurt where Ingo used to turn the night into day at the age of 15. In 1998 he had his first gig at the short-lived „U-Bahnstation Miquelallee“ in Frankfurt. In 2000, Ingo became a resident at a series of events called „Spectrum@MTW“, organized by the German music magazine GROOVE. That same year he published his first production „modes“ in cooperation with his studio partner Denis Engemann on PV Records and later on two mix CDs.&#13;
&#13;
In 2001, Ingo went on a tour which also led him abroad for the first time: with PV Records and with the Delirium Recordstore on the occasion of their 10 year anniversary. In 2002, he began his residency at the „U60311“ in Frankfurt and he held it until he gave it up in 2004 in favour of Cocoonclub. Ingo’s breakthrough as a producer came in the form of his EP „Transistor“, which was released on Cocoon Recordings in 2003 and which contained the goosebump track „Little Eternity“. The track made it onto Sven Väth’s mix CD „Sound of the Fourth Season“.&#13;
&#13;
On Christmas Eve 2004, Ingo made his debut at Cocoonclub where he played side by side with Sven Väth and 2Raumwohnung – he became a regular at Cocoonclub and pretty soon, he hosted the „micromized“ night with Chris Tietjen as co-host. In 2006, he and REBOOT made the successful remix of G-Man’s techno classic „Quo Vadis“. In november 2010, the industrious musician finally released his first album on TopModel Records. Ingo has been part of the Cocoon roster since 2009. In 2011 he launched his BEATPORT label called EUREKA Frankfurt. In February 2012 he released "Same Mind" - his second artist album - on Eureka. Later on followed by the „Same Mind Remixes“ abum incl. Remixes by Mark Reeve, Johannes Heil, Romano Alfieri, Dr. Shingo and many more artist. In this year he launched also his „insane“ Techno Release „Freakshow EP“ with a Neil Landstrumm Remix (EURK006). And a Co-Op Production with Mark Reeve on Cocoon Recordings („Initial Spark“ – COR12099). In August 2013 he decide to be an artist of CONTACT Booking agency.</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/ingoboss">https://soundcloud.com/ingoboss</link>
        </links>
        <attachments/>
      </event>
      <event id="10040" guid="2b0865f1-0b78-492c-b4b5-53c0e3442094">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10040.html</url>
        <logo/>
        <date>2018-12-31T04:00:00+01:00</date>
        <start>04:00</start>
        <duration>02:00</duration>
        <room>Discodrama</room>
        <slug>35C3-ABFahrplan-10040-tschunkelmusik</slug>
        <title>Tschunkelmusik</title>
        <subtitle>Techno/House</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>two guys from the family, Erna Besen &amp; Rosa Luxus, helping you to dance goodbye to 35C3</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/tschunkelmusik/gpn18-live-set-feat-arne-bense-edited-version">Tschunkelmusik @ GPN18</link>
          <link href="https://tschunkelmusik.de/ethik.html">Tschunkelmusik Ethik</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Shutter Island">
      <event id="10158" guid="22915806-0177-4f94-9213-5a0890f6f17d">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10158.html</url>
        <logo/>
        <date>2018-12-30T10:00:00+01:00</date>
        <start>10:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10158-nuts</slug>
        <title>Nuts.</title>
        <subtitle>Let*s go ahead.</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10159" guid="3c01716d-191d-4094-8d24-a990033b612e">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10159.html</url>
        <logo/>
        <date>2018-12-30T12:00:00+01:00</date>
        <start>12:00</start>
        <duration>02:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10159-franz</slug>
        <title>Franz</title>
        <subtitle>Not knowing (ich weiß es doch auch nicht)</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links/>
        <attachments/>
      </event>
      <event id="10160" guid="30f8b579-119f-4869-8648-2b4e65ac5db6">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10160.html</url>
        <logo/>
        <date>2018-12-30T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>03:00</duration>
        <room>Shutter Island</room>
        <slug>35C3-ABFahrplan-10160-lord_spreadpoint</slug>
        <title>Lord/Spreadpoint</title>
        <subtitle>Closing</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="www.4sk.de">www.4sk.de</link>
        </links>
        <attachments/>
      </event>
    </room>
    <room name="Compeiler"/>
    <room name="Uptime Bar">
      <event id="10145" guid="e5985477-ef56-4e96-8b4a-24dd775570db">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10145.html</url>
        <logo>/system/events/logos/000/010/145/large/avatars-000059086552-x8yvq5-t500x500.jpg?1545424436</logo>
        <date>2018-12-30T14:00:00+01:00</date>
        <start>14:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10145-jaycee</slug>
        <title>Jaycee</title>
        <subtitle>House/Techno</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract/>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/jaycieh">https://soundcloud.com/jaycieh</link>
        </links>
        <attachments/>
      </event>
      <event id="10046" guid="3c8a875f-0d6b-42c5-8c7c-8891ea66c06d">
        <url>https://fahrplan.events.ccc.de/congress/2018/Lineup/events/10046.html</url>
        <logo>/system/events/logos/000/010/046/large/avatars-000384533228-52qa9w-t500x500.jpg?1545424204</logo>
        <date>2018-12-30T16:00:00+01:00</date>
        <start>16:00</start>
        <duration>02:00</duration>
        <room>Uptime Bar</room>
        <slug>35C3-ABFahrplan-10046-juli_jane</slug>
        <title>Juli Jane</title>
        <subtitle>Techno/Tech House/Deep House</subtitle>
        <track>Music</track>
        <type>djset</type>
        <language>en</language>
        <abstract>I love music and I mix and create tracks which make me happy. I do my thing and if you like it, it makes me even happier :)</abstract>
        <description/>
        <recording>
          <license/>
          <optout>false</optout>
        </recording>
        <persons/>
        <links>
          <link href="https://soundcloud.com/juli_jane">https://soundcloud.com/juli_jane</link>
        </links>
        <attachments/>
      </event>
    </room>
  </day>
</schedule>
