<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - 24C3: Volldampf voraus! (high quality mp4)</title>
    <link>https://media.ccc.de/c/24c3</link>
    <description> This feed contains all events from 24c3 as mp4</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:44:34 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/congress/2007/folder-24c3.png</url>
      <title>Chaos Computer Club - 24C3: Volldampf voraus! (high quality mp4)</title>
      <link>https://media.ccc.de/c/24c3</link>
    </image>
    <item>
      <title>Quantum Cryptography and Possible Attacks (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2275-en-quantum_cryptography_and_possible_attacks</link>
      <description>Quantum cryptography is the oldest and best developed application of the field of quantum information science. Although it is frequently perceived as an encryption method, it is really a scheme to securely distribute correlated random numbers between the communicating parties and thus better described as quantum key distribution (QKD). Any attempt at eavesdropping from a third party is guarantied to be detected by the laws of physics (quantum mechanics) and shows up as an increased error rate in the transmission (the QBER).

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2275.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2275-en-quantum_cryptography_and_possible_attacks_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2275-en-quantum_cryptography_and_possible_attacks_high.mp4?1399839472</guid>
      <dc:identifier>import-73e11118205c5b32f0</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Alexander Ling, Antia Lamas, Ilja Gerhardt, Christian Kurtsiefer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Science</itunes:keywords>
      <itunes:summary>Quantum cryptography is the oldest and best developed application of the field of quantum information science. Although it is frequently perceived as an encryption method, it is really a scheme to securely distribute correlated random numbers between the communicating parties and thus better described as quantum key distribution (QKD). Any attempt at eavesdropping from a third party is guarantied to be detected by the laws of physics (quantum mechanics) and shows up as an increased error rate in the transmission (the QBER).

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2275.en.html
</itunes:summary>
      <itunes:duration>01:16:50</itunes:duration>
    </item>
    <item>
      <title>Ruby on Rails Security (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2252-en-ruby_on_rails_security</link>
      <description>This talk will focus on the security of the Ruby on Rails Web Framework. Some dos and don’ts will be presented along with security Best Practices for common attacks like session fixation, XSS, SQL injection, and deployment weaknesses.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2252.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2252-en-ruby_on_rails_security_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2252-en-ruby_on_rails_security_high.mp4?1399839431</guid>
      <dc:identifier>import-a65e30ad2a32152a2d</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Jonathan Weiss</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:summary>This talk will focus on the security of the Ruby on Rails Web Framework. Some dos and don’ts will be presented along with security Best Practices for common attacks like session fixation, XSS, SQL injection, and deployment weaknesses.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2252.en.html
</itunes:summary>
      <itunes:duration>00:45:19</itunes:duration>
    </item>
    <item>
      <title>Elektronische Dokumente und die Zukunft des Lesens (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2192-de-elektronische_dokumente</link>
      <description>E-book devices versuchen seit Ewigkeiten, aus dem Sumpf der Bedeutungslosigkeit den Weg in den Massenmarkt zu finden. Bisher ohne Erfolg.
Warum das so lange ein so großes Problem war und warum das jetzt anders werden wird, behandelt dieser Vortrag

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2192.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2192-de-elektronische_dokumente_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2192-de-elektronische_dokumente_high.mp4?1399839353</guid>
      <dc:identifier>import-656f54962db7349658</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Steini</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Making</itunes:keywords>
      <itunes:subtitle>Warum es so ewig gedauert hat, bis Bücher auf geeigneten Geräten lesbar wurden, und was uns noch erwartet</itunes:subtitle>
      <itunes:summary>E-book devices versuchen seit Ewigkeiten, aus dem Sumpf der Bedeutungslosigkeit den Weg in den Massenmarkt zu finden. Bisher ohne Erfolg.
Warum das so lange ein so großes Problem war und warum das jetzt anders werden wird, behandelt dieser Vortrag

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2192.en.html
</itunes:summary>
      <itunes:duration>01:05:22</itunes:duration>
    </item>
    <item>
      <title>Hacking ideologies, part 2: Open Source, a capitalist movement (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2311-en-hacking_ideologies_2</link>
      <description>The Open Source initiative re-interpreted Free Software to include it into the neo-liberal ideology and the capitalist economy - whose aims are contrary to the FS starting axioms/freedoms. This platform will focus on ideological and political aspects of this. It will also suggest FS recovery strategies.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2311.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2311-en-hacking_ideologies_2_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2311-en-hacking_ideologies_2_high.mp4?1399839545</guid>
      <dc:identifier>import-2a8d0099b181354d29</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Tomislav Medak, Toni Prug, Marcell Mars, Dmytri Kleiner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Free Software, Free Drugs and an ethics of death</itunes:subtitle>
      <itunes:summary>The Open Source initiative re-interpreted Free Software to include it into the neo-liberal ideology and the capitalist economy - whose aims are contrary to the FS starting axioms/freedoms. This platform will focus on ideological and political aspects of this. It will also suggest FS recovery strategies.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2311.en.html
</itunes:summary>
      <itunes:duration>00:56:30</itunes:duration>
    </item>
    <item>
      <title>Chaos Jahresrückblick (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2203-de-chaos_jahresrueckblick</link>
      <description>Wir stellen die Aktivitäten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen sowohl die Kampagnen des CCC, die Lobbyarbeit sowie Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vorträge und Konferenzen, an denen CCC-Vertreter teilgenommen haben.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2203.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2203-de-chaos_jahresrueckblick_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2203-de-chaos_jahresrueckblick_high.mp4?1399839357</guid>
      <dc:identifier>import-7bc2b53aa12cb15369</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Constanze Kurz, Frank Rieger, Andy Müller-Maguhn, Frank Rosengart</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Community</itunes:keywords>
      <itunes:subtitle>Ein Überblick über die Aktivitäten des Clubs 2007</itunes:subtitle>
      <itunes:summary>Wir stellen die Aktivitäten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen sowohl die Kampagnen des CCC, die Lobbyarbeit sowie Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vorträge und Konferenzen, an denen CCC-Vertreter teilgenommen haben.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2203.en.html
</itunes:summary>
      <itunes:duration>01:27:27</itunes:duration>
    </item>
    <item>
      <title>Modelling Infectious Diseases in Virtual Realities (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2322-en-infectious_diseases</link>
      <description>World of Warcraft is currently one of the most successful and complex virtual realities. Apart from gaming, it simulates personality types, social structures and a whole range of group dynamics.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2322.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2322-en-infectious_diseases_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2322-en-infectious_diseases_high.mp4?1399839554</guid>
      <dc:identifier>import-c3383908932523295b</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>floX</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Science</itunes:keywords>
      <itunes:subtitle>The &quot;corrupted blood&quot; plague of WoW from an epidemiological perspective</itunes:subtitle>
      <itunes:summary>World of Warcraft is currently one of the most successful and complex virtual realities. Apart from gaming, it simulates personality types, social structures and a whole range of group dynamics.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2322.en.html
</itunes:summary>
      <itunes:duration>00:52:24</itunes:duration>
    </item>
    <item>
      <title>OpenStreetMap, the free Wiki world map (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2286-en-openstreetmap</link>
      <description>The OpenStreetMap project has achieved remarkable successes in creating a free world map, and is growing fast. This talk gives an overview of what we do, why we do it, and what our data can be used for.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2286.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2286-en-openstreetmap_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2286-en-openstreetmap_high.mp4?1399839499</guid>
      <dc:identifier>import-0df4f07337d1e9778f</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Frederik Ramm</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Making</itunes:keywords>
      <itunes:subtitle>3 years done - 10 to go?</itunes:subtitle>
      <itunes:summary>The OpenStreetMap project has achieved remarkable successes in creating a free world map, and is growing fast. This talk gives an overview of what we do, why we do it, and what our data can be used for.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2286.en.html
</itunes:summary>
      <itunes:duration>00:57:21</itunes:duration>
    </item>
    <item>
      <title>23 Wege für Deine Rechte zu kämpfen (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2294-de-23_ways_to_fight_for_your_rights</link>
      <description>Bürgerrechtsabbau steht auf der Tagesordnung. Bei der Vielzahl an Vorhaben und Gesetzesinitiativen haben viele mittlerweile das Gefühl, dass sich politisches Engagieren nicht mehr lohnt.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2294.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2294-de-23_ways_to_fight_for_your_rights_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2294-de-23_ways_to_fight_for_your_rights_high.mp4?1399839531</guid>
      <dc:identifier>import-efface9996f81eb8ed</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Markus Beckedahl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Wie man sich selbst mit den eigenen Stärken für unsere Bürgerrechte einsetzen kann</itunes:subtitle>
      <itunes:summary>Bürgerrechtsabbau steht auf der Tagesordnung. Bei der Vielzahl an Vorhaben und Gesetzesinitiativen haben viele mittlerweile das Gefühl, dass sich politisches Engagieren nicht mehr lohnt.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2294.en.html
</itunes:summary>
      <itunes:duration>00:52:56</itunes:duration>
    </item>
    <item>
      <title>Grundlagen der sicheren Programmierung (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2344-de-grundlagen_der_sicheren_programmierung</link>
      <description>Dieser Vortrag bietet eine Übersicht über einige Dinge, welche man im Kopf behalten sollte, wenn man Software schreibt - vorausgesetzt, diese soll nachher nur von der Person benutzt werden, die sie auch betreibt. Die theoretischen Aspekte der Sicherheit werden mit Codebeispielen untermalt.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2344.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2344-de-grundlagen_der_sicheren_programmierung_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2344-de-grundlagen_der_sicheren_programmierung_high.mp4?1399839609</guid>
      <dc:identifier>import-91e5b00343840237ef</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Tonnerre Lombard</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>Typische Sicherheitslücken</itunes:subtitle>
      <itunes:summary>Dieser Vortrag bietet eine Übersicht über einige Dinge, welche man im Kopf behalten sollte, wenn man Software schreibt - vorausgesetzt, diese soll nachher nur von der Person benutzt werden, die sie auch betreibt. Die theoretischen Aspekte der Sicherheit werden mit Codebeispielen untermalt.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2344.en.html
</itunes:summary>
      <itunes:duration>00:59:38</itunes:duration>
    </item>
    <item>
      <title>Wireless Kernel Tweaking (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2292-en-wireless_kernel_tweaking</link>
      <description>We took on the mission to go down the road of kernel hacking and the result is &quot;B.A.T.M.A.N. advanced&quot;, which is a kernel space implementation of the B.A.T.M.A.N. mesh routing protocol, specifically designed to manage Wireless MANs.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2292.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2292-en-wireless_kernel_tweaking_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2292-en-wireless_kernel_tweaking_high.mp4?1399839522</guid>
      <dc:identifier>import-2a485707aa0259974d</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Simon Wunderlich, Marek</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>or how B.A.T.M.A.N. learned to fly</itunes:subtitle>
      <itunes:summary>We took on the mission to go down the road of kernel hacking and the result is &quot;B.A.T.M.A.N. advanced&quot;, which is a kernel space implementation of the B.A.T.M.A.N. mesh routing protocol, specifically designed to manage Wireless MANs.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2292.en.html
</itunes:summary>
      <itunes:duration>01:03:33</itunes:duration>
    </item>
    <item>
      <title>Hamburger Wahlstift (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2371-de-wahlstift</link>
      <description>Am 24. Februar wollte Hamburg als Pilotprojekt mit dem Digitalen Wahlstift wählen.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2371.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2371-de-wahlstift_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2371-de-wahlstift_high.mp4?1399839673</guid>
      <dc:identifier>import-fac887be3731450734</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Jens Muecke, Frank Rieger, Sven Übelacker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:summary>Am 24. Februar wollte Hamburg als Pilotprojekt mit dem Digitalen Wahlstift wählen.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2371.en.html
</itunes:summary>
      <itunes:duration>01:03:45</itunes:duration>
    </item>
    <item>
      <title>Latest trends in Oracle Security (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2354-en-latest_trends_in_oracle_security</link>
      <description>Oracle databases are the leading databases in companies and organizations. In the last 3 years Oracle invested a lot of time and engery to make the databases more secure, adding new features ... but even 2007 most databases are easy to hack.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2354.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2354-en-latest_trends_in_oracle_security_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2354-en-latest_trends_in_oracle_security_high.mp4?1399839636</guid>
      <dc:identifier>import-6ab5554a8f686bec39</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Alexander Kornbrust</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:summary>Oracle databases are the leading databases in companies and organizations. In the last 3 years Oracle invested a lot of time and engery to make the databases more secure, adding new features ... but even 2007 most databases are easy to hack.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2354.en.html
</itunes:summary>
      <itunes:duration>00:58:05</itunes:duration>
    </item>
    <item>
      <title>Just in Time compilers - breaking a VM (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2247-en-breaking_a_vm</link>
      <description>We will present state of the art JIT compiler design based on CACAO, a GPL licensed multiplatform Java VM. After explaining the basics of code generation, we will focus on &quot;problematic&quot; instructions, and point to possible ways to exploit stuff.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2247.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2247-en-breaking_a_vm_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2247-en-breaking_a_vm_high.mp4?1399839417</guid>
      <dc:identifier>import-14815d5b90a0058d10</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Peter Molnar, Roland Lezuo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>Practical VM exploiting based on CACAO</itunes:subtitle>
      <itunes:summary>We will present state of the art JIT compiler design based on CACAO, a GPL licensed multiplatform Java VM. After explaining the basics of code generation, we will focus on &quot;problematic&quot; instructions, and point to possible ways to exploit stuff.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2247.en.html
</itunes:summary>
      <itunes:duration>00:42:03</itunes:duration>
    </item>
    <item>
      <title>Hacker Jeopardy (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2352-de-hacker_jeopardy</link>
      <description>Das bekannte Quizformat - aber natürlich mit Themen, die man im Fernsehen nie zu sehen bekäme.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2352.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2352-de-hacker_jeopardy_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2352-de-hacker_jeopardy_high.mp4?1399839627</guid>
      <dc:identifier>import-d175259861c6ba7d80</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Stefan &#39;Sec&#39; Zehl, Ray</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Community</itunes:keywords>
      <itunes:subtitle>Die ultimative Hacker-Quizshow</itunes:subtitle>
      <itunes:summary>Das bekannte Quizformat - aber natürlich mit Themen, die man im Fernsehen nie zu sehen bekäme.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2352.en.html
</itunes:summary>
      <itunes:duration>01:49:36</itunes:duration>
    </item>
    <item>
      <title>Das Panoptische Prinzip - Filme über die Zeit nach der Privatsphäre (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2241-de-das_panoptische_prinzip</link>
      <description>In den letzten Jahren – nicht zuletzt seit dem 11. September – ist es zu einem Abbau von Bürgerrechten und einer immer umfassender werdenden Überwachung seitens des Staates, aber auch der Wirtschaft gekommen. Erkennungsdienstliche Verfahren, wie z. B. die Abnahme von Fingerabdrücken oder andere biometrische Verfahren, treffen zunehmend auch Normalbürger. Das rechtsstaatlich garantierte Paradigma der Unschuldsvermutung wird demontiert: Jeder ist potenziell verdächtig. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2241.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2241-de-das_panoptische_prinzip_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2241-de-das_panoptische_prinzip_high.mp4?1399839408</guid>
      <dc:identifier>import-1885c7f280b77ff85b</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Stefan Sels, Ralph Kusserow, Yvette Krause, Christine Ketzer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Ergebnisse des Minutenfilmwettbewerbs des C4 und des Kölner Filmhauses</itunes:subtitle>
      <itunes:summary>In den letzten Jahren – nicht zuletzt seit dem 11. September – ist es zu einem Abbau von Bürgerrechten und einer immer umfassender werdenden Überwachung seitens des Staates, aber auch der Wirtschaft gekommen. Erkennungsdienstliche Verfahren, wie z. B. die Abnahme von Fingerabdrücken oder andere biometrische Verfahren, treffen zunehmend auch Normalbürger. Das rechtsstaatlich garantierte Paradigma der Unschuldsvermutung wird demontiert: Jeder ist potenziell verdächtig. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2241.en.html
</itunes:summary>
      <itunes:duration>01:13:30</itunes:duration>
    </item>
    <item>
      <title>Hacking SCADA (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2227-en-hacking_scada</link>
      <description>SCADA acronym stand for “Supervisory Control And Data Acquisition”, and it&#39;s related to industrial automation inside critical infrastructures. This talk will introduce the audience to SCADA environments and its totally different security approaches, outlining the main key differences with typical IT Security best practices.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2227.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2227-en-hacking_scada_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2227-en-hacking_scada_high.mp4?1399839389</guid>
      <dc:identifier>import-27fa6e2b6bb6fbc64d</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>mayhem, Raoul &quot;Nobody&quot; Chiesa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>how to own critical infrastructures</itunes:subtitle>
      <itunes:summary>SCADA acronym stand for “Supervisory Control And Data Acquisition”, and it&#39;s related to industrial automation inside critical infrastructures. This talk will introduce the audience to SCADA environments and its totally different security approaches, outlining the main key differences with typical IT Security best practices.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2227.en.html
</itunes:summary>
      <itunes:duration>00:57:35</itunes:duration>
    </item>
    <item>
      <title>I know who you clicked last summer (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2280-en-i_know_who_you_clicked_last_summer</link>
      <description>This talk introduces some techniques of social network analysis and graph theory. It aims at using simple approaches for getting interesting facts about networks. I will use the data of a popular community to demonstrate some of the techniques.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2280.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2280-en-i_know_who_you_clicked_last_summer_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2280-en-i_know_who_you_clicked_last_summer_high.mp4?1399839486</guid>
      <dc:identifier>import-476755400a574b9fe2</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Svenja Schröder</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>A swiss army knife for automatic social investigation</itunes:subtitle>
      <itunes:summary>This talk introduces some techniques of social network analysis and graph theory. It aims at using simple approaches for getting interesting facts about networks. I will use the data of a popular community to demonstrate some of the techniques.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2280.en.html
</itunes:summary>
      <itunes:duration>00:52:49</itunes:duration>
    </item>
    <item>
      <title>Hacking in the age of declining everything (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2272-en-hacking_in_the_age_of_declining_everything</link>
      <description>It is thought by many that the world may be facing Peaks in fossil fuel production and catastrophic climate change. These huge problems put into question the Industrial Civilisation and call for, at the very least, massive changes to society if humanity is to survive. Do hackers have a role to play in a post transition society? What sort of things should hackers know and prepare for in such a future?

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2272.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2272-en-hacking_in_the_age_of_declining_everything_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2272-en-hacking_in_the_age_of_declining_everything_high.mp4?1399839467</guid>
      <dc:identifier>import-44b95398baaaf72556</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Emerson</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>What can we do when everything we thought turns out to be wrong</itunes:subtitle>
      <itunes:summary>It is thought by many that the world may be facing Peaks in fossil fuel production and catastrophic climate change. These huge problems put into question the Industrial Civilisation and call for, at the very least, massive changes to society if humanity is to survive. Do hackers have a role to play in a post transition society? What sort of things should hackers know and prepare for in such a future?

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2272.en.html
</itunes:summary>
      <itunes:duration>01:10:04</itunes:duration>
    </item>
    <item>
      <title>Spiel, Freude, Eierkuchen? (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2333-de-spiel_freude_eierkuchen</link>
      <description>Der Journalist Rainer Fromm berichtet über seine Erfahrungen mit der Gamerszene, mit Filmbeispielen und anschließender Diskussion.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2333.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2333-de-spiel_freude_eierkuchen_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2333-de-spiel_freude_eierkuchen_high.mp4?1399839581</guid>
      <dc:identifier>import-40f46db34917f8d7da</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rosengart, Rainer Fromm</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Die Gamerszene und ihre Reaktion auf kritische Berichterstattung </itunes:subtitle>
      <itunes:summary>Der Journalist Rainer Fromm berichtet über seine Erfahrungen mit der Gamerszene, mit Filmbeispielen und anschließender Diskussion.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2333.en.html
</itunes:summary>
      <itunes:duration>00:57:37</itunes:duration>
    </item>
    <item>
      <title>Port Scanning improved (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2131-en-port_scanning_improved</link>
      <description>Port-Scanning large networks can take ages. Asking yourself how much
of this time is really necessary and how much you can blame on the
port-scanner, you may find yourself integrating your own scanner into
the linux-kernel. Or at least we did.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2131.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2131-en-port_scanning_improved_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2131-en-port_scanning_improved_high.mp4?1399839324</guid>
      <dc:identifier>import-96406013bfdba8987b</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Fabian Yamaguchi, FX of Phenoelit</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>New ideas for old practices</itunes:subtitle>
      <itunes:summary>Port-Scanning large networks can take ages. Asking yourself how much
of this time is really necessary and how much you can blame on the
port-scanner, you may find yourself integrating your own scanner into
the linux-kernel. Or at least we did.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2131.en.html
</itunes:summary>
      <itunes:duration>00:44:33</itunes:duration>
    </item>
    <item>
      <title>The Arctic Cold War (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2158-en-the_arctic_cold_war</link>
      <description>Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2158.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2158-en-the_arctic_cold_war_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2158-en-the_arctic_cold_war_high.mp4?1399839334</guid>
      <dc:identifier>import-f7c7fc84bd71238e67</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Bicyclemark</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>The silent battle for claiming and controlling the Arctic</itunes:subtitle>
      <itunes:summary>Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2158.en.html
</itunes:summary>
      <itunes:duration>00:58:05</itunes:duration>
    </item>
    <item>
      <title>The history of guerilla knitting (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2358-en-guerilla_knitting</link>
      <description>&quot;Guerrilla knitting&quot; has a couple of meanings in the knitting community - to some, it merely means knitting in public, while to others, it means creating public art by knitted means. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2358.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2358-en-guerilla_knitting_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2358-en-guerilla_knitting_high.mp4?1399839650</guid>
      <dc:identifier>import-84e7d1004fd236a83d</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Rose White</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Making</itunes:keywords>
      <itunes:summary>&quot;Guerrilla knitting&quot; has a couple of meanings in the knitting community - to some, it merely means knitting in public, while to others, it means creating public art by knitted means. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2358.en.html
</itunes:summary>
      <itunes:duration>00:51:43</itunes:duration>
    </item>
    <item>
      <title>Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2279-en-deconstructing_xbox_360_security</link>
      <description>The Xbox 360 probably is the video game console with the most sophisticated security system to date. Nevertheless, is has been hacked, and now Linux can be run on it. This presentation consists of two parts.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2279.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2279-en-deconstructing_xbox_360_security_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2279-en-deconstructing_xbox_360_security_high.mp4?1399839481</guid>
      <dc:identifier>import-ea090c27e22f1eaf1e</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Michael Steil, Felix Domke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>Console Hacking 2007</itunes:subtitle>
      <itunes:summary>The Xbox 360 probably is the video game console with the most sophisticated security system to date. Nevertheless, is has been hacked, and now Linux can be run on it. This presentation consists of two parts.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2279.en.html
</itunes:summary>
      <itunes:duration>00:59:52</itunes:duration>
    </item>
    <item>
      <title>Hacking ICANN (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2389-en-hacking_icann</link>
      <description>The Internet Corporation for Assigned Names and Numbers (ICANN) needs to include users in its policy making: We propose and discuss tactics to hack the individual into the system.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2389.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2389-en-hacking_icann_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2389-en-hacking_icann_high.mp4?1399839705</guid>
      <dc:identifier>import-69283f097dbd279797</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Andy Müller-Maguhn, Annette Muehlberg, Wendy Seltzer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>tactics to hack the individual into the ICANN system</itunes:subtitle>
      <itunes:summary>The Internet Corporation for Assigned Names and Numbers (ICANN) needs to include users in its policy making: We propose and discuss tactics to hack the individual into the system.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2389.en.html
</itunes:summary>
      <itunes:duration>00:58:32</itunes:duration>
    </item>
    <item>
      <title>Unusual Web Bugs (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2212-en-unusual_web_bugs</link>
      <description>While many issues in web apps have been documented, and are fairly well known, I would like to shine some light on mostly unknown issues, and present some new techniques for exploiting previously unexploitable bugs.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2212.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2212-en-unusual_web_bugs_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2212-en-unusual_web_bugs_high.mp4?1399839366</guid>
      <dc:identifier>import-2d90297dec2e7ff4a7</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>kuza55</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>A Web Hacker&#39;s Bag O&#39; Tricks</itunes:subtitle>
      <itunes:summary>While many issues in web apps have been documented, and are fairly well known, I would like to shine some light on mostly unknown issues, and present some new techniques for exploiting previously unexploitable bugs.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2212.en.html
</itunes:summary>
      <itunes:duration>00:44:44</itunes:duration>
    </item>
    <item>
      <title>Introduction in MEMS (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2190-en-introduction_in_mems</link>
      <description>MicroElectroMechanical Systems or MEMS are as part of micro system technology, systems with electrical and mechanical subsystems at the micro scale. It is basically an introduction in the technology and in its potential for hardware hacks and potential ways of homebrew devices.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2190.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2190-en-introduction_in_mems_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2190-en-introduction_in_mems_high.mp4?1399839348</guid>
      <dc:identifier>import-bc8cc3f9450dfddd83</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Jens Kaufmann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Science</itunes:keywords>
      <itunes:subtitle>Skills for very small ninjas</itunes:subtitle>
      <itunes:summary>MicroElectroMechanical Systems or MEMS are as part of micro system technology, systems with electrical and mechanical subsystems at the micro scale. It is basically an introduction in the technology and in its potential for hardware hacks and potential ways of homebrew devices.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2190.en.html
</itunes:summary>
      <itunes:duration>00:40:56</itunes:duration>
    </item>
    <item>
      <title>Reverse Engineering of Embedded Devices (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2166-en-embedded_devices_reverse_engineering</link>
      <description>The event aims on reverse engineering small boxes you can buy at your local Saturn or Media Market like SOHO Routers.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2166.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2166-en-embedded_devices_reverse_engineering_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2166-en-embedded_devices_reverse_engineering_high.mp4?1399839339</guid>
      <dc:identifier>import-ed5bb2398b87bd6661</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>dash</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:summary>The event aims on reverse engineering small boxes you can buy at your local Saturn or Media Market like SOHO Routers.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2166.en.html
</itunes:summary>
      <itunes:duration>00:44:05</itunes:duration>
    </item>
    <item>
      <title>Die Wahrheit und was wirklich passierte (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2334-de-die_wahrheit_und_was_wirklich_passierte</link>
      <description>Jede Geschichte hat vier Seiten. Deine Seite, Ihre Seite, die Wahrheit und das, was wirklich passiert ist.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2334.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2334-de-die_wahrheit_und_was_wirklich_passierte_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2334-de-die_wahrheit_und_was_wirklich_passierte_high.mp4?1399839586</guid>
      <dc:identifier>import-693a7916772f61c4c9</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Ron, Frank Rieger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Jede Geschichte hat vier Seiten. </itunes:subtitle>
      <itunes:summary>Jede Geschichte hat vier Seiten. Deine Seite, Ihre Seite, die Wahrheit und das, was wirklich passiert ist.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2334.en.html
</itunes:summary>
      <itunes:duration>01:03:56</itunes:duration>
    </item>
    <item>
      <title>GPLv3 - Praktische Auswirkungen (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2345-de-gplv3_auswirkungen</link>
      <description>Was der Umstieg auf die GPLv3 an Neuerungen mit sich bringt, welche Fehler beim Wechsel vermieden werden können und an welchen Stellen rechtliche Fragestellungen lauern, für deren Klärung technische Überlegungen nicht ausreichen, schildert dieser Vortrag.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2345.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2345-de-gplv3_auswirkungen_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2345-de-gplv3_auswirkungen_high.mp4?1399839613</guid>
      <dc:identifier>import-8b83be574c5fcc8ac9</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Peter Voigt</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:summary>Was der Umstieg auf die GPLv3 an Neuerungen mit sich bringt, welche Fehler beim Wechsel vermieden werden können und an welchen Stellen rechtliche Fragestellungen lauern, für deren Klärung technische Überlegungen nicht ausreichen, schildert dieser Vortrag.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2345.en.html
</itunes:summary>
      <itunes:duration>01:01:35</itunes:duration>
    </item>
    <item>
      <title>Distributed campaigns for promoting and defending freedom in digital societies (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2271-en-distributed_campaigns</link>
      <description>A presentation of a few successful campaigns in France lead by libre software activists for defending freedom in a digital world: bringing awareness of the politicians about the dangers of the EUCD transposition and DRM, and their economical, social and political impact and influencing the candidates at a presidential election to talk about Libre Software, software patents, DRM, etc. How did we do that? What have we learned? Maybe for political action _too_, sharing is a way of just doing it better.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2271.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2271-en-distributed_campaigns_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2271-en-distributed_campaigns_high.mp4?1399839463</guid>
      <dc:identifier>import-5142f553a22036fc82</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>j. Zimmermann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Sharing experience about campaigning on the political field in France</itunes:subtitle>
      <itunes:summary>A presentation of a few successful campaigns in France lead by libre software activists for defending freedom in a digital world: bringing awareness of the politicians about the dangers of the EUCD transposition and DRM, and their economical, social and political impact and influencing the candidates at a presidential election to talk about Libre Software, software patents, DRM, etc. How did we do that? What have we learned? Maybe for political action _too_, sharing is a way of just doing it better.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2271.en.html
</itunes:summary>
      <itunes:duration>01:02:15</itunes:duration>
    </item>
    <item>
      <title>What can we do to counter the spies? (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2293-en-what_can_we_do_to_counter_the_spies</link>
      <description>A presentation about the role of intelligence agencies in the current era of the unending “war on terror”, how they monitor us, the implications for our democracies, and what we can do to fight back.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2293.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2293-en-what_can_we_do_to_counter_the_spies_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2293-en-what_can_we_do_to_counter_the_spies_high.mp4?1399839527</guid>
      <dc:identifier>import-a69893c7877bfc9463</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Annie Machon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:summary>A presentation about the role of intelligence agencies in the current era of the unending “war on terror”, how they monitor us, the implications for our democracies, and what we can do to fight back.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2293.en.html
</itunes:summary>
      <itunes:duration>01:00:12</itunes:duration>
    </item>
    <item>
      <title>Smartcard protocol sniffing (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2364-en-smartcard_protocol_sniffing</link>
      <description>This talk will introduce you to the theoretical and practical issues involved in cloning/simulating existing smartcards. It is based on the lessons learned from cloning the Postcard (swiss debit card) issued by PostFinance.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2364.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2364-en-smartcard_protocol_sniffing_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2364-en-smartcard_protocol_sniffing_high.mp4?1399839664</guid>
      <dc:identifier>import-28f2251a0a4fa316f6</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Marc-André Beck, Bernd R. Fix</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:summary>This talk will introduce you to the theoretical and practical issues involved in cloning/simulating existing smartcards. It is based on the lessons learned from cloning the Postcard (swiss debit card) issued by PostFinance.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2364.en.html
</itunes:summary>
      <itunes:duration>00:53:18</itunes:duration>
    </item>
    <item>
      <title>Inside the Mac OS X Kernel (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2303-en-inside_the_macosx_kernel</link>
      <description>Many buzzwords are associated with Mac OS X: Mach kernel, microkernel, FreeBSD kernel, C++, 64 bit, UNIX... and while all of these apply in some way, &quot;XNU&quot;, the Mac OS X kernel is neither Mach, nor FreeBSD-based, it&#39;s not a microkernel, it&#39;s not written in C++ and it&#39;s not 64 bit - but it is UNIX... but just since recently.

This talk intends to clear up the confusion by presenting details of the Mac OS X kernel architecture, its components Mach, BSD and I/O-Kit, what&#39;s so different and special about this design, and what the special strengths of it are.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2303.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2303-en-inside_the_macosx_kernel_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2303-en-inside_the_macosx_kernel_high.mp4?1399839540</guid>
      <dc:identifier>import-16fe6a6e95d7c4f819</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>lucy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>Debunking Mac OS Myths</itunes:subtitle>
      <itunes:summary>Many buzzwords are associated with Mac OS X: Mach kernel, microkernel, FreeBSD kernel, C++, 64 bit, UNIX... and while all of these apply in some way, &quot;XNU&quot;, the Mac OS X kernel is neither Mach, nor FreeBSD-based, it&#39;s not a microkernel, it&#39;s not written in C++ and it&#39;s not 64 bit - but it is UNIX... but just since recently.

This talk intends to clear up the confusion by presenting details of the Mac OS X kernel architecture, its components Mach, BSD and I/O-Kit, what&#39;s so different and special about this design, and what the special strengths of it are.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2303.en.html
</itunes:summary>
      <itunes:duration>00:42:49</itunes:duration>
    </item>
    <item>
      <title>Konzeptionelle Einführung in Erlang (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2216-de-erlang</link>
      <description>A jump-start into the world of concurrent programming

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2216.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2216-de-erlang_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2216-de-erlang_high.mp4?1399839380</guid>
      <dc:identifier>import-92bdbf3754ee00fffc</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Stefan Strigler, BeF</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:summary>A jump-start into the world of concurrent programming

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2216.en.html
</itunes:summary>
      <itunes:duration>00:45:38</itunes:duration>
    </item>
    <item>
      <title>Dining Cryptographers, The Protocol (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2253-en-dining_cryptographers</link>
      <description>Imi gives an introduction into the idea behind DC networks, how and why they work. With demonstration!

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2253.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2253-en-dining_cryptographers_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2253-en-dining_cryptographers_high.mp4?1399839436</guid>
      <dc:identifier>import-4b94dd0c19479fda5f</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Immanuel Scholz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Science</itunes:keywords>
      <itunes:subtitle>Even slower than Tor and JAP together!</itunes:subtitle>
      <itunes:summary>Imi gives an introduction into the idea behind DC networks, how and why they work. With demonstration!

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2253.en.html
</itunes:summary>
      <itunes:duration>00:54:12</itunes:duration>
    </item>
    <item>
      <title>OpenSER SIP Server (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2256-de-openser_sip_server</link>
      <description>Der Vortrag stellt OpenSER und das Open Source Projekt dahinter vor. OpenSER ist ein flexiber und leistungsfähiger SIP Server, mit dem alle Arten von Voice over IP Infrastrukturen realisiert werden können. Er ist sowohl im DSL Router als Telefonanlage für die Wohngemeinschaft als auch von Carriern mit mehreren Millionen Kunden einsetzbar. Anhand dieser Beispiele werden einige gebräuchliche Einsatzszenarien aufgezeigt. Dafür ist es notwendig, kurz auf die Konfiguration, die Anbindung an Datenbanken und die wichtigsten Module einzugehen. Abschließend wird anhand des aktuellen Release 1.3 und der Roadmap die weitere Entwicklung des Projektes vorgestellt.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2256.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2256-de-openser_sip_server_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2256-de-openser_sip_server_high.mp4?1399839445</guid>
      <dc:identifier>import-b0664b6e45ed4f547d</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Henning Westerholt</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>VoIP-Systeme mit OpenSER</itunes:subtitle>
      <itunes:summary>Der Vortrag stellt OpenSER und das Open Source Projekt dahinter vor. OpenSER ist ein flexiber und leistungsfähiger SIP Server, mit dem alle Arten von Voice over IP Infrastrukturen realisiert werden können. Er ist sowohl im DSL Router als Telefonanlage für die Wohngemeinschaft als auch von Carriern mit mehreren Millionen Kunden einsetzbar. Anhand dieser Beispiele werden einige gebräuchliche Einsatzszenarien aufgezeigt. Dafür ist es notwendig, kurz auf die Konfiguration, die Anbindung an Datenbanken und die wichtigsten Module einzugehen. Abschließend wird anhand des aktuellen Release 1.3 und der Roadmap die weitere Entwicklung des Projektes vorgestellt.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2256.en.html
</itunes:summary>
      <itunes:duration>00:45:06</itunes:duration>
    </item>
    <item>
      <title>To be or I2P (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2260-en-to_be_or_i2p</link>
      <description>I2P is a message-based anonymizing network. It builds a virtual network between the communication endpoints. This talk will introduce the technical details of I2P and show some exemplary applications.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2260.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2260-en-to_be_or_i2p_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2260-en-to_be_or_i2p_high.mp4?1399839454</guid>
      <dc:identifier>import-c69f699231e3cb9b06</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Jens Kubieziel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>An introduction into anonymous communication with I2P</itunes:subtitle>
      <itunes:summary>I2P is a message-based anonymizing network. It builds a virtual network between the communication endpoints. This talk will introduce the technical details of I2P and show some exemplary applications.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2260.en.html
</itunes:summary>
      <itunes:duration>00:50:25</itunes:duration>
    </item>
    <item>
      <title>Sex 2.0 (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2287-de-sex20</link>
      <description>Der lange Schwanz der Dating-Communities sowie die De- und Rekonstruktion von Geschlecht und sexueller Orientierung haben ungeahnte Auswirkungen auf unser Sexualleben. Ein Überblick darüber, was Sex ist, wie Dating-Communities funktionieren und wie man zu einem erfüllten Sexualleben kommen kann.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2287.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2287-de-sex20_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2287-de-sex20_high.mp4?1399839504</guid>
      <dc:identifier>import-8f6a5878fb4c40a1ac</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Florian Bischof</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Hacking Heteronormativity</itunes:subtitle>
      <itunes:summary>Der lange Schwanz der Dating-Communities sowie die De- und Rekonstruktion von Geschlecht und sexueller Orientierung haben ungeahnte Auswirkungen auf unser Sexualleben. Ein Überblick darüber, was Sex ist, wie Dating-Communities funktionieren und wie man zu einem erfüllten Sexualleben kommen kann.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2287.en.html
</itunes:summary>
      <itunes:duration>00:50:27</itunes:duration>
    </item>
    <item>
      <title>Lieber Cyborg als Göttin (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2228-de-lieber_cyborg_als_goettin</link>
      <description>Das Cyborgmanifest verbindet die Analyse der heutigen Gesellschaft als &quot;Informatik der Herrschaft&quot; mit dem Aufruf von politischem, kreativem Umgang mit Technik, der Möglichkeit des Angreifens von Machtstrukturen und mit der Überwindung der starren Grenzen zwischen den Geschlechtern.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2228.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2228-de-lieber_cyborg_als_goettin_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2228-de-lieber_cyborg_als_goettin_high.mp4?1399839394</guid>
      <dc:identifier>import-d8d6d60acc20c3e469</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Cyworg</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Politischer Hacktivismus und Cyborgfeminismus</itunes:subtitle>
      <itunes:summary>Das Cyborgmanifest verbindet die Analyse der heutigen Gesellschaft als &quot;Informatik der Herrschaft&quot; mit dem Aufruf von politischem, kreativem Umgang mit Technik, der Möglichkeit des Angreifens von Machtstrukturen und mit der Überwindung der starren Grenzen zwischen den Geschlechtern.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2228.en.html
</itunes:summary>
      <itunes:duration>00:52:55</itunes:duration>
    </item>
    <item>
      <title>Overtaking Proprietary Software Without Writing Code (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2290-en-overtaking_proprietary_software</link>
      <description>Free or &quot;Open-Source&quot; software, and in particular Linux, is doing extremely well technically. However, it fails to secure a significant portion of the protected, lucrative software market, especially for end-users. 
Can Free Software finally make a full entry into our society? The main obstacles to overcoming the domination of proprietary software, most of them non-technical, require thinking outside of code-writing. &quot;Overtaking Proprietary Software Without Writing Code&quot; will relate experience gained from the activities of the GNU/Linux Matters non-profit, and provide some hands-on advice for community members, taking a handful of relevant examples.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2290.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2290-en-overtaking_proprietary_software_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2290-en-overtaking_proprietary_software_high.mp4?1399839518</guid>
      <dc:identifier>import-b0b44798eb9fe9891c</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Olivier Cleynen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>&quot;a few rough insights on sharpening free software&quot;</itunes:subtitle>
      <itunes:summary>Free or &quot;Open-Source&quot; software, and in particular Linux, is doing extremely well technically. However, it fails to secure a significant portion of the protected, lucrative software market, especially for end-users. 
Can Free Software finally make a full entry into our society? The main obstacles to overcoming the domination of proprietary software, most of them non-technical, require thinking outside of code-writing. &quot;Overtaking Proprietary Software Without Writing Code&quot; will relate experience gained from the activities of the GNU/Linux Matters non-profit, and provide some hands-on advice for community members, taking a handful of relevant examples.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2290.en.html
</itunes:summary>
      <itunes:duration>01:05:13</itunes:duration>
    </item>
    <item>
      <title>10GE monitoring live! (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2285-en-10ge_monitoring_live</link>
      <description>There are many open source tools available to do packet capturing and analysis. Virtually all networkers use these tools. However millions of packets per seconds are just too much for general-purpose hardware. This is a problem as 10 Gigabit networks allow for millions of packets per second. 

The obvious solution for that issue is to lower the data rates by filtering out ’uninteresting’ data out before it gets processed by the general purpose computer hardware.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2285.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2285-en-10ge_monitoring_live_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2285-en-10ge_monitoring_live_high.mp4?1399839495</guid>
      <dc:identifier>import-a1c2e2cf95802d85dd</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Arien Vijn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>How to find that special one out of millions</itunes:subtitle>
      <itunes:summary>There are many open source tools available to do packet capturing and analysis. Virtually all networkers use these tools. However millions of packets per seconds are just too much for general-purpose hardware. This is a problem as 10 Gigabit networks allow for millions of packets per second. 

The obvious solution for that issue is to lower the data rates by filtering out ’uninteresting’ data out before it gets processed by the general purpose computer hardware.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2285.en.html
</itunes:summary>
      <itunes:duration>00:59:40</itunes:duration>
    </item>
    <item>
      <title>Data Retention and PNR (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2383-en-data_retention</link>
      <description>New EU legislation emphasises and in some cases creates new crimes of consumer infringement of intellectual property laws. Consumer Warnings about consumers&#39; requirements to respect copyright could become mandatory; worse, such infringement cases could move from civil cases to criminal ones across the EU. But nowhere is there legislation either clarifying or defending consumers&#39; rights under IP law, in our changing digital environment.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2383.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2383-en-data_retention_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2383-en-data_retention_high.mp4?1399839695</guid>
      <dc:identifier>import-b7baf1a4df94de336d</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Ricardo Cristof Remmert-Fontes, Erik Josefsson</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>The Brussels Workshop</itunes:subtitle>
      <itunes:summary>New EU legislation emphasises and in some cases creates new crimes of consumer infringement of intellectual property laws. Consumer Warnings about consumers&#39; requirements to respect copyright could become mandatory; worse, such infringement cases could move from civil cases to criminal ones across the EU. But nowhere is there legislation either clarifying or defending consumers&#39; rights under IP law, in our changing digital environment.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2383.en.html
</itunes:summary>
      <itunes:duration>01:00:05</itunes:duration>
    </item>
    <item>
      <title>EU Policy on RFID &amp; Privacy (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2396-en-eu_rfid_policy</link>
      <description>Following the public consultation on Radio Frequency Identification (RFID) carried out in 2006 the European Commission set up an RFID Expert Group in July 2007, focussing on Privacy and Security. One of the groups tasks is to provide advice to the Commission on the content of a Recommendation to the member states, which shall set out the principles that public authorities and other stakeholders should apply in respect of RFID usage. European Digital Rights (EDRi) participates in this task as a member of the Expert Group.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2396.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2396-en-eu_rfid_policy_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2396-en-eu_rfid_policy_high.mp4?1399839714</guid>
      <dc:identifier>import-e86bc37f2ac962fc4b</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Andreas Krisch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Developments 2007, Outlook 2008</itunes:subtitle>
      <itunes:summary>Following the public consultation on Radio Frequency Identification (RFID) carried out in 2006 the European Commission set up an RFID Expert Group in July 2007, focussing on Privacy and Security. One of the groups tasks is to provide advice to the Commission on the content of a Recommendation to the member states, which shall set out the principles that public authorities and other stakeholders should apply in respect of RFID usage. European Digital Rights (EDRi) participates in this task as a member of the Expert Group.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2396.en.html
</itunes:summary>
      <itunes:duration>01:00:08</itunes:duration>
    </item>
    <item>
      <title>Agenten des Bösen (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2288-de-verschwoerungstheorien</link>
      <description>Wolfgang Wippermann hat 2007 unter dem Titel &quot;Agenten des Bösen&quot; ein Buch über &quot;Verschwörungstheorien von Luther bis heute&quot; veröffentlicht. Darin geht es unter anderem auch um Verschwörungstheorie, die in Hackerkreisen auf Interesse stoßen (Illuminanten, 9/11...). Interessant ist seine Einordnung solcher Verschwörungstheorien in größere Zusammenhänge.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2288.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2288-de-verschwoerungstheorien_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2288-de-verschwoerungstheorien_high.mp4?1399839508</guid>
      <dc:identifier>import-857941dfbc4586b4f7</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Wolfgang Wippermann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Science</itunes:keywords>
      <itunes:subtitle>Verschwörungstheorien</itunes:subtitle>
      <itunes:summary>Wolfgang Wippermann hat 2007 unter dem Titel &quot;Agenten des Bösen&quot; ein Buch über &quot;Verschwörungstheorien von Luther bis heute&quot; veröffentlicht. Darin geht es unter anderem auch um Verschwörungstheorie, die in Hackerkreisen auf Interesse stoßen (Illuminanten, 9/11...). Interessant ist seine Einordnung solcher Verschwörungstheorien in größere Zusammenhänge.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2288.en.html
</itunes:summary>
      <itunes:duration>00:50:59</itunes:duration>
    </item>
    <item>
      <title>Paparazzi - The Free Autopilot (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2225-en-paparazzi</link>
      <description>Autonomous unmanned aerial vehicles are becoming more and more popular as suitable electronics and sensors are available and affordable. This talk will describe Paparazzi, a complete system enabling you to build and control your own UAV.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2225.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2225-en-paparazzi_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2225-en-paparazzi_high.mp4?1399839385</guid>
      <dc:identifier>import-9153384a8070fdc321</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Martin Müller, Antoine Drouin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Making</itunes:keywords>
      <itunes:subtitle>Build your own UAV</itunes:subtitle>
      <itunes:summary>Autonomous unmanned aerial vehicles are becoming more and more popular as suitable electronics and sensors are available and affordable. This talk will describe Paparazzi, a complete system enabling you to build and control your own UAV.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2225.en.html
</itunes:summary>
      <itunes:duration>01:02:31</itunes:duration>
    </item>
    <item>
      <title>Mifare (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2378-en-mifare_security</link>
      <description>Mifare are the most widely deployed brand of secure RFID chips, but their security relies on proprietary and secret cryptographic primitives. We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2378.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2378-en-mifare_security_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2378-en-mifare_security_high.mp4?1399839677</guid>
      <dc:identifier>import-fc58b881c2cf74003e</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Karsten Nohl, Henryk Plötz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>Little Security, Despite Obscurity</itunes:subtitle>
      <itunes:summary>Mifare are the most widely deployed brand of secure RFID chips, but their security relies on proprietary and secret cryptographic primitives. We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2378.en.html
</itunes:summary>
      <itunes:duration>00:59:03</itunes:duration>
    </item>
    <item>
      <title>From Ring Zero to UID Zero (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2353-en-from_ring_zero_to_uid_zero</link>
      <description>The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2353.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2353-en-from_ring_zero_to_uid_zero_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2353-en-from_ring_zero_to_uid_zero_high.mp4?1399839632</guid>
      <dc:identifier>import-c85278215d58e7ad04</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>sgrakkyu, twiz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>A couple of stories about kernel exploiting </itunes:subtitle>
      <itunes:summary>The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2353.en.html
</itunes:summary>
      <itunes:duration>00:42:20</itunes:duration>
    </item>
    <item>
      <title>C64-DTV Hacking (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2347-en-c64_dtv_hacking</link>
      <description>The C64-DTV is a remake of the classic homecomputer sold as a joystick-contained videogame. The talk gives an overview about the structure of the DTV, and shows different hardware and software modifications that can be done.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2347.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2347-en-c64_dtv_hacking_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2347-en-c64_dtv_hacking_high.mp4?1399839622</guid>
      <dc:identifier>import-fa002ccb6787ebc14f</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Peter Fuhrmann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>Revisiting the legendary computer in a joystick</itunes:subtitle>
      <itunes:summary>The C64-DTV is a remake of the classic homecomputer sold as a joystick-contained videogame. The talk gives an overview about the structure of the DTV, and shows different hardware and software modifications that can be done.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2347.en.html
</itunes:summary>
      <itunes:duration>00:57:35</itunes:duration>
    </item>
    <item>
      <title>Relay attacks on card payment: vulnerabilities and defences (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2289-en-card_payment</link>
      <description>Relay attacks allow criminals to use credit or debit cards for fraudulent transactions, completely bypassing protections in today&#39;s electronic payment systems. This talk will show how using easily available electronics, it is possible to carry out such attacks. Also, we will describe techniques for improving payment systems, developed by Saar Drimer and me, in order to close this vulnerability.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2289.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2289-en-card_payment_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2289-en-card_payment_high.mp4?1399839513</guid>
      <dc:identifier>import-33d008be85a0548e56</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Steven J. Murdoch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>Keeping your enemies close</itunes:subtitle>
      <itunes:summary>Relay attacks allow criminals to use credit or debit cards for fraudulent transactions, completely bypassing protections in today&#39;s electronic payment systems. This talk will show how using easily available electronics, it is possible to carry out such attacks. Also, we will describe techniques for improving payment systems, developed by Saar Drimer and me, in order to close this vulnerability.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2289.en.html
</itunes:summary>
      <itunes:duration>01:02:15</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 4 (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2402-en-lightning_talks_2007_day_4</link>
      <description>

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2402.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2402-en-lightning_talks_2007_day_4_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2402-en-lightning_talks_2007_day_4_high.mp4?1399839719</guid>
      <dc:identifier>import-0776e02dc294b4dfb3</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Hannes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3</itunes:keywords>
      <itunes:summary>

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2402.en.html
</itunes:summary>
      <itunes:duration>02:19:36</itunes:duration>
    </item>
    <item>
      <title>&lt;NO&gt;OOXML - A 12 euros campaign (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2332-en-no_ooxml</link>
      <description>Microsoft is currently trying to buy an ISO stamp for their flawed Office OpenXML (OOXML) specification. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2332.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2332-en-no_ooxml_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2332-en-no_ooxml_high.mp4?1399839577</guid>
      <dc:identifier>import-0cb4adc089215fd488</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Benjamin Henrion</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Against Microsoft Office&#39;s broken standard</itunes:subtitle>
      <itunes:summary>Microsoft is currently trying to buy an ISO stamp for their flawed Office OpenXML (OOXML) specification. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2332.en.html
</itunes:summary>
      <itunes:duration>01:03:41</itunes:duration>
    </item>
    <item>
      <title>FeM-Streaming und Encoding (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2250-de-abschlussbericht_fem</link>
      <description>Das Streaming-Team der FeM e.V. möchte zum Abschluss des 24C3 einen Überblick über die Streaming-Aktivitäten geben, ein paar Statistiken jonglieren und sonstige (Un-)Auffälligkeiten und Stories berichten.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2250.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2250-de-abschlussbericht_fem_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2250-de-abschlussbericht_fem_high.mp4?1399839426</guid>
      <dc:identifier>import-00a47e46bd1e9aad89</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Sway, Felix von Leitner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Making</itunes:keywords>
      <itunes:subtitle>Abschlussbericht</itunes:subtitle>
      <itunes:summary>Das Streaming-Team der FeM e.V. möchte zum Abschluss des 24C3 einen Überblick über die Streaming-Aktivitäten geben, ein paar Statistiken jonglieren und sonstige (Un-)Auffälligkeiten und Stories berichten.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2250.en.html
</itunes:summary>
      <itunes:duration>00:37:59</itunes:duration>
    </item>
    <item>
      <title>After C: D, libd and the Slate project (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2321-en-d_libd_and_the_slate_project</link>
      <description>We present libd, a high-level runtime for the D programming language and the Slate project, an attempt at a high-level OS and environment built upon libd, as the next major step in improving the state of programming environments and operating systems. With high-level abstractions, and sensible design, the state of implementation of open-source OSes can improve. We leverage existing kernels when implementing Slate, and put an extensive (abstraction-oriented) architecture above the kernel to present the user (or programmer) with a system they can use by having to do less to perform a specific function. Our virtual machine approach also allows for security verification on a level not seen in *nix OSes before.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2321.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2321-en-d_libd_and_the_slate_project_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2321-en-d_libd_and_the_slate_project_high.mp4?1399839549</guid>
      <dc:identifier>import-85f6ed1f7f99a5a228</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Vladsharp</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Community</itunes:keywords>
      <itunes:subtitle>A clean slate for operating systems</itunes:subtitle>
      <itunes:summary>We present libd, a high-level runtime for the D programming language and the Slate project, an attempt at a high-level OS and environment built upon libd, as the next major step in improving the state of programming environments and operating systems. With high-level abstractions, and sensible design, the state of implementation of open-source OSes can improve. We leverage existing kernels when implementing Slate, and put an extensive (abstraction-oriented) architecture above the kernel to present the user (or programmer) with a system they can use by having to do less to perform a specific function. Our virtual machine approach also allows for security verification on a level not seen in *nix OSes before.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2321.en.html
</itunes:summary>
      <itunes:duration>00:51:28</itunes:duration>
    </item>
    <item>
      <title>Open Source Lobbying, tips from the trenches (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2387-en-open_source_lobbying</link>
      <description>On January 1st, 2002 I tried to use the website of the Dutch national railway (www.ns.nl) using Linux. The site refused me access, it was IE-only. This sparked a conversation with members of parliament about the need for open standards. Over a five year period I progressed from talking to opposition-MP&#39;s to meeting the economics minister directly and was able to significantly influence national policy despite total lack of funding or any specific mandate.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2387.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2387-en-open_source_lobbying_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2387-en-open_source_lobbying_high.mp4?1399839700</guid>
      <dc:identifier>import-fe79bfae6a59428b78</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Arjen Kamphuis</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>From one angry e-mail to writing national policy on open source</itunes:subtitle>
      <itunes:summary>On January 1st, 2002 I tried to use the website of the Dutch national railway (www.ns.nl) using Linux. The site refused me access, it was IE-only. This sparked a conversation with members of parliament about the need for open standards. Over a five year period I progressed from talking to opposition-MP&#39;s to meeting the economics minister directly and was able to significantly influence national policy despite total lack of funding or any specific mandate.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2387.en.html
</itunes:summary>
      <itunes:duration>01:00:01</itunes:duration>
    </item>
    <item>
      <title>&quot;I can count every star in the heavens above but I have no heart I can&#39;t fall in love…&quot;. (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2356-en-computer_popsongs</link>
      <description>A talk (with examples) by monochrom, presented by Johannes Grenzfurthner

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2356.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2356-en-computer_popsongs_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2356-en-computer_popsongs_high.mp4?1399839645</guid>
      <dc:identifier>import-76fbd1cf41edc25067</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Johannes Grenzfurthner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Culture</itunes:keywords>
      <itunes:subtitle>The image of computers in popular music</itunes:subtitle>
      <itunes:summary>A talk (with examples) by monochrom, presented by Johannes Grenzfurthner

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2356.en.html
</itunes:summary>
      <itunes:duration>01:14:26</itunes:duration>
    </item>
    <item>
      <title>Meine Finger gehören mir (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2346-de-meine_finger_gehoeren_mir</link>
      <description>Zum 1. November 2007 ging der biometrische Reisepass in die nächste Ausbaustufe. Seitdem müssen reisewillige Bürger neben dem frontalen Gesichtsbild auch noch ihre Fingerabdrücke abgeben. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2346.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2346-de-meine_finger_gehoeren_mir_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2346-de-meine_finger_gehoeren_mir_high.mp4?1399839618</guid>
      <dc:identifier>import-abd15b15cfcf4226f9</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Constanze Kurz, starbug</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Die nächste Stufe der biometrischen Vollerfassung</itunes:subtitle>
      <itunes:summary>Zum 1. November 2007 ging der biometrische Reisepass in die nächste Ausbaustufe. Seitdem müssen reisewillige Bürger neben dem frontalen Gesichtsbild auch noch ihre Fingerabdrücke abgeben. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2346.en.html
</itunes:summary>
      <itunes:duration>00:58:45</itunes:duration>
    </item>
    <item>
      <title>Wahlchaos (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2255-de-wahlchaos</link>
      <description>Wahlchaos beschäftigt sich mit Wahlverfahren aus mathematischer und politischer Sicht. So wurden die Wahlen von 1998, 2002 und 2005 betrachtet und a-postpriori manipuliert und ihre Auswirkungen diskutiert.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2255.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2255-de-wahlchaos_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2255-de-wahlchaos_high.mp4?1399839440</guid>
      <dc:identifier>import-093f9267898a1907dd</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Markus Schneider</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Paradoxien des deutschen Wahlsystems</itunes:subtitle>
      <itunes:summary>Wahlchaos beschäftigt sich mit Wahlverfahren aus mathematischer und politischer Sicht. So wurden die Wahlen von 1998, 2002 und 2005 betrachtet und a-postpriori manipuliert und ihre Auswirkungen diskutiert.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2255.en.html
</itunes:summary>
      <itunes:duration>00:57:12</itunes:duration>
    </item>
    <item>
      <title>One Token to Rule Them All (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2235-en-one_token_to_rule_them_all</link>
      <description>The defense techniques employed by large software manufacturers are getting better. This is particularly true of Microsoft who have improved the security of the software they make tremendously since their Trustworthy Computing initiative. Gone are the days of being able to penetrate any Microsoft system by firing off the RPC-DCOM exploit. The consequence of this is that post-exploitation has become increasingly important in order to &quot;squeeze all the juice&quot; out of every compromised system. Windows access tokens are integral to Microsoft&#39;s concept of single sign-on in an active directory environment. Compromising a system that has privileged tokens can allow for both local and domain privilege escalation.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2235.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2235-en-one_token_to_rule_them_all_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2235-en-one_token_to_rule_them_all_high.mp4?1399839403</guid>
      <dc:identifier>import-9e2018993a7386c3b2</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Luke Jennings</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>Post-Exploitation Fun in Windows Environments</itunes:subtitle>
      <itunes:summary>The defense techniques employed by large software manufacturers are getting better. This is particularly true of Microsoft who have improved the security of the software they make tremendously since their Trustworthy Computing initiative. Gone are the days of being able to penetrate any Microsoft system by firing off the RPC-DCOM exploit. The consequence of this is that post-exploitation has become increasingly important in order to &quot;squeeze all the juice&quot; out of every compromised system. Windows access tokens are integral to Microsoft&#39;s concept of single sign-on in an active directory environment. Compromising a system that has privileged tokens can allow for both local and domain privilege escalation.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2235.en.html
</itunes:summary>
      <itunes:duration>00:48:53</itunes:duration>
    </item>
    <item>
      <title>Absurde Mathematik (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2340-de-absurde_mathematik</link>
      <description>Ein kleiner Streifzug durch die Abgründe der Mathematik. 
Eigentlich ist der Mensch mit einer recht gut funktionierenden Intuition ausgerüstet. Dennoch gibt es Paradoxa, welche mathematisch vollkommen korrekt und beweisbar sind, jedoch unserer Intuition widersprechen. Der Vortrag bietet einen Streifzug durch einige dieser Paradoxa, die kurz und anschaulich erklärt werden.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2340.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2340-de-absurde_mathematik_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2340-de-absurde_mathematik_high.mp4?1399839600</guid>
      <dc:identifier>import-f50e40b051718848b9</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Anoushirvan Dehghani</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Science</itunes:keywords>
      <itunes:subtitle>Paradoxa wider die mathematische Intuition</itunes:subtitle>
      <itunes:summary>Ein kleiner Streifzug durch die Abgründe der Mathematik. 
Eigentlich ist der Mensch mit einer recht gut funktionierenden Intuition ausgerüstet. Dennoch gibt es Paradoxa, welche mathematisch vollkommen korrekt und beweisbar sind, jedoch unserer Intuition widersprechen. Der Vortrag bietet einen Streifzug durch einige dieser Paradoxa, die kurz und anschaulich erklärt werden.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2340.en.html
</itunes:summary>
      <itunes:duration>00:32:15</itunes:duration>
    </item>
    <item>
      <title>A Spotter&#39;s Guide to AACS Keys (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2331-en-spotter_guide_to_aacs_keys</link>
      <description>AACS is the DRM system used on HD-DVD and Blu-Ray discs. It is one of the most sophisticated DRM deployments to date. It includes around twelve different kinds of keys (in fact, even counting the different kinds of keys is non-trivial), three optional watermarking schemes, and four revocation mechanisms (for keys, hardware, players, and certain disc images).

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2331.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2331-en-spotter_guide_to_aacs_keys_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2331-en-spotter_guide_to_aacs_keys_high.mp4?1399839572</guid>
      <dc:identifier>import-dbafd960390d3c1330</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Peter Eckersley</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:summary>AACS is the DRM system used on HD-DVD and Blu-Ray discs. It is one of the most sophisticated DRM deployments to date. It includes around twelve different kinds of keys (in fact, even counting the different kinds of keys is non-trivial), three optional watermarking schemes, and four revocation mechanisms (for keys, hardware, players, and certain disc images).

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2331.en.html
</itunes:summary>
      <itunes:duration>01:02:30</itunes:duration>
    </item>
    <item>
      <title>Security Nightmares 2008 (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2336-de-security_nightmares</link>
      <description>Security Nightmares - der jährliche Rückblick auf die IT-Sicherheit und der Security-Glaskugelblick für&#39;s nächste Jahr.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2336.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2336-de-security_nightmares_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2336-de-security_nightmares_high.mp4?1399839590</guid>
      <dc:identifier>import-64027c5bdfa497cfab</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Ron, Frank Rieger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>Oder: worüber wir nächstes Jahr lachen werden</itunes:subtitle>
      <itunes:summary>Security Nightmares - der jährliche Rückblick auf die IT-Sicherheit und der Security-Glaskugelblick für&#39;s nächste Jahr.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2336.en.html
</itunes:summary>
      <itunes:duration>01:30:21</itunes:duration>
    </item>
    <item>
      <title>A collection of random things (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2296-en-random_things</link>
      <description>This talk will be similar to my unusual bugs talk last year. I&#39;ll present a couple of completely unrelated somewhat interesting and unusual things. Hence, a random collection of them.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2296.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2296-en-random_things_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2296-en-random_things_high.mp4?1399839536</guid>
      <dc:identifier>import-3ee182cd32660abeb3</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Ilja</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>Look what I found under the carpet</itunes:subtitle>
      <itunes:summary>This talk will be similar to my unusual bugs talk last year. I&#39;ll present a couple of completely unrelated somewhat interesting and unusual things. Hence, a random collection of them.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2296.en.html
</itunes:summary>
      <itunes:duration>00:46:50</itunes:duration>
    </item>
    <item>
      <title>DIY Survival (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2326-en-diy_survival</link>
      <description>The apocalypse could happen any day. You&#39;re going to need things to survive and your going have to make them yourself.  

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2326.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2326-en-diy_survival_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2326-en-diy_survival_high.mp4?1399839563</guid>
      <dc:identifier>import-ebd1d831811af91559</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Bre</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Making</itunes:keywords>
      <itunes:subtitle>How to survive the apocalypse or a robot uprising</itunes:subtitle>
      <itunes:summary>The apocalypse could happen any day. You&#39;re going to need things to survive and your going have to make them yourself.  

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2326.en.html
</itunes:summary>
      <itunes:duration>00:39:24</itunes:duration>
    </item>
    <item>
      <title>Closing Event (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2367-en-closing_event</link>
      <description>

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2367.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2367-en-closing_event_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2367-en-closing_event_high.mp4?1399839668</guid>
      <dc:identifier>import-5fa00c37cb75885d36</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Tim Pritlove</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Community</itunes:keywords>
      <itunes:summary>

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2367.en.html
</itunes:summary>
      <itunes:duration>00:41:58</itunes:duration>
    </item>
    <item>
      <title>Getting Things Done (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2213-de-getting_things_done</link>
      <description>Eine Einführung ins Antiverpeilen mit Tools und Techniken rund um David Allens &quot;Getting Things Done&quot;-Methodik.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2213.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2213-de-getting_things_done_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2213-de-getting_things_done_high.mp4?1399839371</guid>
      <dc:identifier>import-b30e3e74eed3d62975</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Stephan Schmieder</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Culture</itunes:keywords>
      <itunes:subtitle>Der Antiverpeil-Talk</itunes:subtitle>
      <itunes:summary>Eine Einführung ins Antiverpeilen mit Tools und Techniken rund um David Allens &quot;Getting Things Done&quot;-Methodik.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2213.en.html
</itunes:summary>
      <itunes:duration>00:55:47</itunes:duration>
    </item>
    <item>
      <title>All Tomorrow&#39;s Condensation (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2360-en-all_tomorrows</link>
      <description>A steampunk theatre play extravaganza. With puppets!

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2360.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2360-en-all_tomorrows_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2360-en-all_tomorrows_high.mp4?1399839655</guid>
      <dc:identifier>import-adda7de31fbb67824e</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Johannes Grenzfurthner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Culture</itunes:keywords>
      <itunes:subtitle>A steampunk puppet extravaganza by monochrom and friends</itunes:subtitle>
      <itunes:summary>A steampunk theatre play extravaganza. With puppets!

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2360.en.html
</itunes:summary>
      <itunes:duration>00:48:57</itunes:duration>
    </item>
    <item>
      <title>Current events in Tor development (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2325-en-current_events_in_tor_development</link>
      <description>Come talk with Roger Dingledine, Tor project leader, about some of the challenges in the anonymity world.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2325.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2325-en-current_events_in_tor_development_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2325-en-current_events_in_tor_development_high.mp4?1399839558</guid>
      <dc:identifier>import-292594cb78d63e1b71</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Roger Dingledine</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:summary>Come talk with Roger Dingledine, Tor project leader, about some of the challenges in the anonymity world.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2325.en.html
</itunes:summary>
      <itunes:duration>01:06:35</itunes:duration>
    </item>
    <item>
      <title>Simulating the Universe on Supercomputers (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2155-en-universe_on_supercomputers</link>
      <description>The evolution of structure in the Universe is one of the hottest topics in Cosmology and Astrophysics. In the last years the so-called $\Lambda$-CDM-model could be established also with great help of very large computer simulations. This model describes a Universe that consists mainly of dark components: 96% are made of dark energy and dark matter. Ordinary matter made up of baryons give only 4% to the total content of the Universe. The talk will present recent results with the main focus on computational methods and challenges in that field. A state-of-the-art computer code for running these calculations will be presented in detail.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2155.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2155-en-universe_on_supercomputers_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2155-en-universe_on_supercomputers_high.mp4?1399839329</guid>
      <dc:identifier>import-b88a5cc02dfd8d1835</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Mark Vogelsberger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Science</itunes:keywords>
      <itunes:subtitle>The evolution of cosmic structure</itunes:subtitle>
      <itunes:summary>The evolution of structure in the Universe is one of the hottest topics in Cosmology and Astrophysics. In the last years the so-called $\Lambda$-CDM-model could be established also with great help of very large computer simulations. This model describes a Universe that consists mainly of dark components: 96% are made of dark energy and dark matter. Ordinary matter made up of baryons give only 4% to the total content of the Universe. The talk will present recent results with the main focus on computational methods and challenges in that field. A state-of-the-art computer code for running these calculations will be presented in detail.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2155.en.html
</itunes:summary>
      <itunes:duration>00:59:30</itunes:duration>
    </item>
    <item>
      <title>Space Communism (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2276-en-space_communism</link>
      <description>Following &quot;Chaos und Kritische Theorie&quot; from 23C3, another verbal battle: Oona Leganovic (aka Ijon Tichy) will promote the idea to sublate the capital relation and bring about communism first and only then to go to Space, because otherwise the earthly problems will be spread everywhere. Daniel Kulla (impersonating Captain Kathryn Janeway) will, on the other hand, defend the exploration humanism that once already ended the middle ages and of which can be expected to do the same to the crusted planetary commodity circus.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2276.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2276-en-space_communism_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2276-en-space_communism_high.mp4?1399839477</guid>
      <dc:identifier>import-38d07191f3dc94d4de</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Oona Leganovic, Daniel Kulla</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Culture</itunes:keywords>
      <itunes:subtitle>Communism or Space first?</itunes:subtitle>
      <itunes:summary>Following &quot;Chaos und Kritische Theorie&quot; from 23C3, another verbal battle: Oona Leganovic (aka Ijon Tichy) will promote the idea to sublate the capital relation and bring about communism first and only then to go to Space, because otherwise the earthly problems will be spread everywhere. Daniel Kulla (impersonating Captain Kathryn Janeway) will, on the other hand, defend the exploration humanism that once already ended the middle ages and of which can be expected to do the same to the crusted planetary commodity circus.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2276.en.html
</itunes:summary>
      <itunes:duration>00:21:56</itunes:duration>
    </item>
    <item>
      <title>Playstation Portable Cracking (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2209-en-playstation_portable_cracking</link>
      <description>The Sony PSP is over 3 years old yet barely a day has gone by without some part of it getting attacked. This lecture will go through how hacker ingenuity and systematic failures in Sony&#39;s hardware, software and business practices ended up completely destroying the hand held&#39;s security including some previously unreleased information about how it was achieved.


about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2209.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2209-en-playstation_portable_cracking_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 30 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2209-en-playstation_portable_cracking_high.mp4?1399839362</guid>
      <dc:identifier>import-80587c27422ce87793</dc:identifier>
      <dc:date>2007-12-30T01:00:00+01:00</dc:date>
      <itunes:author>TyRaNiD</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>How In The End We Got It All!</itunes:subtitle>
      <itunes:summary>The Sony PSP is over 3 years old yet barely a day has gone by without some part of it getting attacked. This lecture will go through how hacker ingenuity and systematic failures in Sony&#39;s hardware, software and business practices ended up completely destroying the hand held&#39;s security including some previously unreleased information about how it was achieved.


about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2209.en.html
</itunes:summary>
      <itunes:duration>00:34:29</itunes:duration>
    </item>
    <item>
      <title>Linguistic Hacking (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2284-en-linguistic_hacking</link>
      <description>It is sometimes necessary to know what a text is about, even if it is written in a language you don&#39;t know. This can be quite problematic, if you do not even know in what language it is written. This talk will show how it is possible to identify the language of a written text and get at least some information about the contents, in order to decide whether a specialist and which specialist is needed to know more.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2284.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2284-en-linguistic_hacking_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 28 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2284-en-linguistic_hacking_high.mp4?1399839490</guid>
      <dc:identifier>import-ea30123926f8b1a081</dc:identifier>
      <dc:date>2007-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Martin Haase/maha</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Science</itunes:keywords>
      <itunes:subtitle>How to know what a text in an unknown language is about?</itunes:subtitle>
      <itunes:summary>It is sometimes necessary to know what a text is about, even if it is written in a language you don&#39;t know. This can be quite problematic, if you do not even know in what language it is written. This talk will show how it is possible to identify the language of a written text and get at least some information about the contents, in order to decide whether a specialist and which specialist is needed to know more.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2284.en.html
</itunes:summary>
      <itunes:duration>00:58:33</itunes:duration>
    </item>
    <item>
      <title>Analysis of Sputnik Data from 23C3 (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2270-en-sputnik_data_analysis</link>
      <description>In December 2006, in BCC 1000 attendees were wearing Sputnik Tags. Data was stored, and then made available for analysis. Unfortunately, all IDs of tags were lost. This lecture presents what was stored, what happened to it, and attempts of reconstructing IDs and sequences of movements.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2270.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2270-en-sputnik_data_analysis_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 29 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2270-en-sputnik_data_analysis_high.mp4?1399839458</guid>
      <dc:identifier>import-b911d815ea63e3bd2f</dc:identifier>
      <dc:date>2007-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Tomasz Rybak</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Science</itunes:keywords>
      <itunes:subtitle>Attempts to regenerate lost sequences</itunes:subtitle>
      <itunes:summary>In December 2006, in BCC 1000 attendees were wearing Sputnik Tags. Data was stored, and then made available for analysis. Unfortunately, all IDs of tags were lost. This lecture presents what was stored, what happened to it, and attempts of reconstructing IDs and sequences of movements.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2270.en.html
</itunes:summary>
      <itunes:duration>00:57:27</itunes:duration>
    </item>
    <item>
      <title>Tracker fahrn (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2355-de-trecker_fahrn</link>
      <description>Bittorrent aus der Sicht von Bittorrent-Tracker Betreibern.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2355.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2355-de-trecker_fahrn_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2355-de-trecker_fahrn_high.mp4?1399839641</guid>
      <dc:identifier>import-0aafe9aa6896dd1f8b</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Denis, Erdgeist, Cristian Yxen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>We Track Harder - We Track More! Take the pain out of running a Bittorrent-Tracker!</itunes:subtitle>
      <itunes:summary>Bittorrent aus der Sicht von Bittorrent-Tracker Betreibern.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2355.en.html
</itunes:summary>
      <itunes:duration>01:15:05</itunes:duration>
    </item>
    <item>
      <title>Steam-Powered Telegraphy (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2338-en-steam_powered_telegraphy</link>
      <description>We have built and modified a steam-powered Telex machine and connected it to the new-fangled invention for modern telegraphy known as &quot;the Internet&quot;. We will present this steampunkish invention in form of a lecture, thus hoping to enlighten interested ladies and gentlemen on the principles of steam engine physics, 5-bit Baudot encoding, and historic telegraphy in general. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2338.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2338-en-steam_powered_telegraphy_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2338-en-steam_powered_telegraphy_high.mp4?1399839595</guid>
      <dc:identifier>import-fb1aefc36f7a295121</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Jens Ohlig, Ingo Schwitters, Sebastian Velke, SkyTee</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Making</itunes:keywords>
      <itunes:subtitle>A League of Telextraordinary Gentlemen present the marvel of Telex on the Net - driven by a steam engine</itunes:subtitle>
      <itunes:summary>We have built and modified a steam-powered Telex machine and connected it to the new-fangled invention for modern telegraphy known as &quot;the Internet&quot;. We will present this steampunkish invention in form of a lecture, thus hoping to enlighten interested ladies and gentlemen on the principles of steam engine physics, 5-bit Baudot encoding, and historic telegraphy in general. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2338.en.html
</itunes:summary>
      <itunes:duration>00:38:50</itunes:duration>
    </item>
    <item>
      <title>Make Cool Things with Microcontrollers (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2214-en-make_cool_things_with_microcontrollers</link>
      <description>Learn how to make cool things with microcontrollers by actually making fun projects at the Congress -- blink lights, hack your brain, move objects, turn off TVs in public places -- microcontrollers can do it all.  Ongoing workshops each day of the Congress.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2214.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2214-en-make_cool_things_with_microcontrollers_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2214-en-make_cool_things_with_microcontrollers_high.mp4?1399839376</guid>
      <dc:identifier>import-747eff9b437e649884</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Mitch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Making</itunes:keywords>
      <itunes:subtitle>Hacking with Microcontrollers</itunes:subtitle>
      <itunes:summary>Learn how to make cool things with microcontrollers by actually making fun projects at the Congress -- blink lights, hack your brain, move objects, turn off TVs in public places -- microcontrollers can do it all.  Ongoing workshops each day of the Congress.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2214.en.html
</itunes:summary>
      <itunes:duration>00:33:01</itunes:duration>
    </item>
    <item>
      <title>DNS Rebinding And More Packet Tricks (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2393-en-dns_rebinding_packet_tricks</link>
      <description>DNS Rebinding has proved itself to be an effective mechanism for turning standard web browsers into proxy servers.  This talk will go into further depth regarding mechanisms for hijacking browser connectivity, and will illustrate some new tricks for measuring network neutrality.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2393.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2393-en-dns_rebinding_packet_tricks_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2393-en-dns_rebinding_packet_tricks_high.mp4?1399839709</guid>
      <dc:identifier>import-79cc8593f4948ee217</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Dan Kaminsky</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:summary>DNS Rebinding has proved itself to be an effective mechanism for turning standard web browsers into proxy servers.  This talk will go into further depth regarding mechanisms for hijacking browser connectivity, and will illustrate some new tricks for measuring network neutrality.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2393.en.html
</itunes:summary>
      <itunes:duration>01:02:30</itunes:duration>
    </item>
    <item>
      <title>Programming DNA (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2329-en-change_me</link>
      <description>Biological engineering does not have to be confined to the laboratories of high-end industry laboratories. Rather, it is desirable to foster a more open culture of biological technology. This talk is an effort to do so; it aims to equip you with basic practical knowledge of biological engineering.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2329.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2329-en-change_me_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2329-en-change_me_high.mp4?1399839568</guid>
      <dc:identifier>import-16ec3c15e8c1912ab4</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Drew Endy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Science</itunes:keywords>
      <itunes:subtitle>A 2-bit language for engineering biology</itunes:subtitle>
      <itunes:summary>Biological engineering does not have to be confined to the laboratories of high-end industry laboratories. Rather, it is desirable to foster a more open culture of biological technology. This talk is an effort to do so; it aims to equip you with basic practical knowledge of biological engineering.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2329.en.html
</itunes:summary>
      <itunes:duration>01:00:58</itunes:duration>
    </item>
    <item>
      <title>VX (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2233-en-vx</link>
      <description>The listeners will be introduced in the world of virus coding. They will understand how this can be seen as a way of expressing yourself and why it is a way of hacking. Furthermore they will get to know, which important groups, authors and viruses have been there in the last years and which are still active nowadays. Important technical terms will be explained as well as trends of the last years and the future. And more.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2233.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2233-en-vx_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2233-en-vx_high.mp4?1399839399</guid>
      <dc:identifier>import-ee82a6cc59c4dbd288</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>SkyOut</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Culture</itunes:keywords>
      <itunes:subtitle>The Virus Underground</itunes:subtitle>
      <itunes:summary>The listeners will be introduced in the world of virus coding. They will understand how this can be seen as a way of expressing yourself and why it is a way of hacking. Furthermore they will get to know, which important groups, authors and viruses have been there in the last years and which are still active nowadays. Important technical terms will be explained as well as trends of the last years and the future. And more.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2233.en.html
</itunes:summary>
      <itunes:duration>01:00:12</itunes:duration>
    </item>
    <item>
      <title>Desperate House-Hackers (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2248-de-desperate_house_hackers</link>
      <description>Wie funktionieren eigentlich diese Pfandflaschenrücknahmeautomaten?

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2248.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2248-de-desperate_house_hackers_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2248-de-desperate_house_hackers_high.mp4?1399839421</guid>
      <dc:identifier>import-476a1a21f28a910dbd</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Nils Magnus</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>How to Hack the Pfandsystem</itunes:subtitle>
      <itunes:summary>Wie funktionieren eigentlich diese Pfandflaschenrücknahmeautomaten?

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2248.en.html
</itunes:summary>
      <itunes:duration>00:56:03</itunes:duration>
    </item>
    <item>
      <title>NEDAP-Wahlcomputer in Deutschland (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2380-de-nedap_wahlcomputer_in_deutschland</link>
      <description>Wir bringen Euch auf den neuesten Stand, was den Einsatz der NEDAP-Wahlcomputer in Deutschland betrifft.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2380.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2380-de-nedap_wahlcomputer_in_deutschland_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2380-de-nedap_wahlcomputer_in_deutschland_high.mp4?1399839682</guid>
      <dc:identifier>import-dae971198d23eea37b</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rieger, Constanze Kurz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:summary>Wir bringen Euch auf den neuesten Stand, was den Einsatz der NEDAP-Wahlcomputer in Deutschland betrifft.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2380.en.html
</itunes:summary>
      <itunes:duration>01:05:34</itunes:duration>
    </item>
    <item>
      <title>Digital Sustainability (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2245-en-how_to_reach_digital_sustainability</link>
      <description>Happy digital world: Everything is information, and it grows by sharing. Scarcity seems to be a problem of the &quot;meatspace&quot;. On the internet, there is space for everybody, for every activity and for every opinion. Really? This lectures explores the power of intellectual property rights, the principle of net neutrality and surveillance issues and explains their impact on everyday (digital) life. The net as we know it is in danger. What is needed to make it stay a resource which is valuable, open and free for everybody? How could a concept of digital sustainability look like?

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2245.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2245-en-how_to_reach_digital_sustainability_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2245-en-how_to_reach_digital_sustainability_high.mp4?1399839412</guid>
      <dc:identifier>import-693b29282c663c0ebb</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Meike Richter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Scarcity is Entering the Net</itunes:subtitle>
      <itunes:summary>Happy digital world: Everything is information, and it grows by sharing. Scarcity seems to be a problem of the &quot;meatspace&quot;. On the internet, there is space for everybody, for every activity and for every opinion. Really? This lectures explores the power of intellectual property rights, the principle of net neutrality and surveillance issues and explains their impact on everyday (digital) life. The net as we know it is in danger. What is needed to make it stay a resource which is valuable, open and free for everybody? How could a concept of digital sustainability look like?

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2245.en.html
</itunes:summary>
      <itunes:duration>00:58:21</itunes:duration>
    </item>
    <item>
      <title>TOR (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2382-de-tor</link>
      <description>Die Vortragenden berichten über den Betrieb und das Abuse-Handling des Anonymisierers. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2382.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2382-de-tor_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2382-de-tor_high.mp4?1399839691</guid>
      <dc:identifier>import-67fcc17551c8eeefd2</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Julius Mittenzwei, Erdgeist, Andreas Lehner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:summary>Die Vortragenden berichten über den Betrieb und das Abuse-Handling des Anonymisierers. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2382.en.html
</itunes:summary>
      <itunes:duration>01:12:37</itunes:duration>
    </item>
    <item>
      <title>It was a bad idea anyway... (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2342-en-it_was_a_bad_idea_anyway</link>
      <description>2007 has been yet another a turbulent year in The Netherlands with regard to electronic voting. If you remember the presentation at 23c3, 2006 saw the emergence of a campaign against the use of non-auditable voting systems. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2342.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2342-en-it_was_a_bad_idea_anyway_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2342-en-it_was_a_bad_idea_anyway_high.mp4?1399839604</guid>
      <dc:identifier>import-3f3079b556a96366d4</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Rop Gonggrijp</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>The demise of electronic voting in The Netherlands</itunes:subtitle>
      <itunes:summary>2007 has been yet another a turbulent year in The Netherlands with regard to electronic voting. If you remember the presentation at 23c3, 2006 saw the emergence of a campaign against the use of non-auditable voting systems. 

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2342.en.html
</itunes:summary>
      <itunes:duration>00:59:43</itunes:duration>
    </item>
    <item>
      <title>Der Bundestrojaner (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2363-de-der_bundestrojaner</link>
      <description>Der Bundestrojaner wird von politischer, juristischer und technischer Seite beleuchtet.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2363.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2363-de-der_bundestrojaner_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2363-de-der_bundestrojaner_high.mp4?1399839659</guid>
      <dc:identifier>import-c6c52b89d377695a6a</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Andreas Bogk, Constanze Kurz, Felix von Leitner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>Die Wahrheit haben wir auch nicht, aber gute Mythen</itunes:subtitle>
      <itunes:summary>Der Bundestrojaner wird von politischer, juristischer und technischer Seite beleuchtet.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2363.en.html
</itunes:summary>
      <itunes:duration>01:10:33</itunes:duration>
    </item>
    <item>
      <title>Design Noir (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2258-en-design_noir</link>
      <description>Design noir is what happens when engineers, artists and hackers get together to design consumer electronics.
I&#39;ll present some examples, including my own projects and collaborations
Cell phone jammers, TV-B-Gone devices, high-voltage jackets...lots of fun!

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2258.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2258-en-design_noir_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2258-en-design_noir_high.mp4?1399839449</guid>
      <dc:identifier>import-8787f59e50a6816bed</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>ladyada</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Culture</itunes:keywords>
      <itunes:subtitle>The seedy underbelly of electronic engineering</itunes:subtitle>
      <itunes:summary>Design noir is what happens when engineers, artists and hackers get together to design consumer electronics.
I&#39;ll present some examples, including my own projects and collaborations
Cell phone jammers, TV-B-Gone devices, high-voltage jackets...lots of fun!

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2258.en.html
</itunes:summary>
      <itunes:duration>00:50:36</itunes:duration>
    </item>
    <item>
      <title>What is terrorism? (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2381-en-what_is_terrorism</link>
      <description>Life as the partner of a terrorism suspect means living with police and secret service surveillance: phone tapping, video cameras pointing at your doors, plain-clothed police following your every step, e-mail and internet access being monitored etc etc.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2381.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2381-en-what_is_terrorism_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2381-en-what_is_terrorism_high.mp4?1399839686</guid>
      <dc:identifier>import-aeca1d442393997d98</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Anne Roth</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Society</itunes:keywords>
      <itunes:subtitle>And who is terrorising whom?</itunes:subtitle>
      <itunes:summary>Life as the partner of a terrorism suspect means living with police and secret service surveillance: phone tapping, video cameras pointing at your doors, plain-clothed police following your every step, e-mail and internet access being monitored etc etc.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2381.en.html
</itunes:summary>
      <itunes:duration>01:11:46</itunes:duration>
    </item>
    <item>
      <title>Crouching Powerpoint, Hidden Trojan (24c3)</title>
      <link>https://media.ccc.de/v/24c3-2189-en-hidden_trojan</link>
      <description>Targeted trojan attacks first attracted attention in early 2005, when the UK NISCC warned of their wide spread use in attacks on UK national infrastructure. Incidents such as &quot;Titan Rain&quot; and the compromise of US Department of State computer systems have increased their profile in the last two years. This presentation will consist of hard, technical information on attacks in the form of a case study of an actual attack ongoing since 2005. It covers exploitation techniques, draws general conclusions on attack methodologies and focuses on how to defend against the dark arts.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2189.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2007/mp4/24c3-2189-en-hidden_trojan_high.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Thu, 27 Dec 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2007/mp4/24c3-2189-en-hidden_trojan_high.mp4?1399839343</guid>
      <dc:identifier>import-9393bb30f24ac7a9d4</dc:identifier>
      <dc:date>2007-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Maarten Van Horenbeeck</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>24c3, Hacking</itunes:keywords>
      <itunes:subtitle>An analysis of targeted attacks from 2005 to 2007</itunes:subtitle>
      <itunes:summary>Targeted trojan attacks first attracted attention in early 2005, when the UK NISCC warned of their wide spread use in attacks on UK national infrastructure. Incidents such as &quot;Titan Rain&quot; and the compromise of US Department of State computer systems have increased their profile in the last two years. This presentation will consist of hard, technical information on attacks in the form of a case study of an actual attack ongoing since 2005. It covers exploitation techniques, draws general conclusions on attack methodologies and focuses on how to defend against the dark arts.

about this event: http://events.ccc.de/congress/2007/Fahrplan/events/2189.en.html
</itunes:summary>
      <itunes:duration>00:53:51</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/congress/2007/folder-24c3.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from 24c3 as mp4</itunes:summary>
  </channel>
</rss>