<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - 25C3: nothing to hide (low quality mp4)</title>
    <link>https://media.ccc.de/c/25c3</link>
    <description> This feed contains all events from 25c3 as mp4</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:46:16 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/congress/2008/folder-25c3.png</url>
      <title>Chaos Computer Club - 25C3: nothing to hide (low quality mp4)</title>
      <link>https://media.ccc.de/c/25c3</link>
    </image>
    <item>
      <title>Handschellen hacken (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2963-de-handschellen_hacken</link>
      <description>Jeder kann auf Youtube ansehen, wie man normale Handschellen mit einer Büroklammer öffnet. Aber es gibt verschiedenste Hochsicherheitsmodelle mit deutlich komplizierteren Schlössern, die nur darauf warten, vom Sperrsport entdeckt zu werden...

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2963.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2963-de-handschellen_hacken.mp4"
        length="493879296"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2963-de-handschellen_hacken.mp4?1399728407</guid>
      <dc:identifier>import-cb980fd24831107395</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Ray</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Essentielles Grundwissen für alle, die nichts zu verbergen hatten</itunes:subtitle>
      <itunes:summary>Jeder kann auf Youtube ansehen, wie man normale Handschellen mit einer Büroklammer öffnet. Aber es gibt verschiedenste Hochsicherheitsmodelle mit deutlich komplizierteren Schlössern, die nur darauf warten, vom Sperrsport entdeckt zu werden...

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2963.en.html
</itunes:summary>
      <itunes:duration>01:01:33</itunes:duration>
    </item>
    <item>
      <title>25C3 Opening and Keynote &quot;Nothing to hide&quot; (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3025-en-opening_and_keynote_nothing_to_hide</link>
      <description>
about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3025.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3025-en-opening_and_keynote_nothing_to_hide.mp4"
        length="628097024"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3025-en-opening_and_keynote_nothing_to_hide.mp4?1399728407</guid>
      <dc:identifier>import-57c2428d76aa862a32</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Sandro  Gaycken, John Gilmore</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:summary>
about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3025.en.html
</itunes:summary>
      <itunes:duration>01:18:15</itunes:duration>
    </item>
    <item>
      <title>Flying for free (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2940-en-flying_for_free</link>
      <description>Birds, glider pilots, and recently UAVs can exploit a variety of weather effects in order to gain altitude, remain airborne and travel long distances all with no power input – effectively, hacking the atmosphere to fly for free. This talk will explain the aircraft, techniques, meteorology, hardware and software that we use to achieve this. In the process I will show why the sport of gliding may be of interest to hackers, and explain how you too can get involved in this highly rewarding and low-cost form of flying.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2940.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2940-en-flying_for_free.mp4"
        length="485490688"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2940-en-flying_for_free.mp4?1399728406</guid>
      <dc:identifier>import-7069835bfa533f8d68</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Martin Ling</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Science</itunes:keywords>
      <itunes:subtitle>Exploiting the weather with unpowered aircraft</itunes:subtitle>
      <itunes:summary>Birds, glider pilots, and recently UAVs can exploit a variety of weather effects in order to gain altitude, remain airborne and travel long distances all with no power input – effectively, hacking the atmosphere to fly for free. This talk will explain the aircraft, techniques, meteorology, hardware and software that we use to achieve this. In the process I will show why the sport of gliding may be of interest to hackers, and explain how you too can get involved in this highly rewarding and low-cost form of flying.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2940.en.html
</itunes:summary>
      <itunes:duration>01:00:31</itunes:duration>
    </item>
    <item>
      <title>RF fingerprinting of RFID (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2845-en-rf_fingerprinting_of_rfid</link>
      <description>In the lecture portion of this workshop we will present an overview of existing and our own novel methods for hacking electronic passports and driver&#39;s licenses including novel radio frequency fingerprinting techniques.

In the the hands-on section we will show participants entering with basic radio experience how to conduct experiments with RFID and reverse engineer proprietary protocols.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2845.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2845-en-rf_fingerprinting_of_rfid.mp4"
        length="358612992"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2845-en-rf_fingerprinting_of_rfid.mp4?1399728405</guid>
      <dc:identifier>import-f72c9dbe24e1516d0b</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>cryptocrat, Boris Danev</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>In the lecture portion of this workshop we will present an overview of existing and our own novel methods for hacking electronic passports and driver&#39;s licenses including novel radio frequency fingerprinting techniques.

In the the hands-on section we will show participants entering with basic radio experience how to conduct experiments with RFID and reverse engineer proprietary protocols.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2845.en.html
</itunes:summary>
      <itunes:duration>00:44:35</itunes:duration>
    </item>
    <item>
      <title>Solar-powering your Geek Gear (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2904-en-solar-powering_your_geek_gear</link>
      <description>This talk will show you how to solar-power your laptop, PDA, cell phone, portable fridge or almost any other small device. Topics discussed include choosing the right solar panel, using (or not using) a voltage regulator, buffering the energy, some real applications as well as instructions on how to build a small and simple device to measure your power and energy savings.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2904.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2904-en-solar-powering_your_geek_gear.mp4"
        length="233832448"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2904-en-solar-powering_your_geek_gear.mp4?1399728404</guid>
      <dc:identifier>import-f5bec9e3edc05cc493</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>script</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Making</itunes:keywords>
      <itunes:subtitle>Alternative and mobile power for all your little toys</itunes:subtitle>
      <itunes:summary>This talk will show you how to solar-power your laptop, PDA, cell phone, portable fridge or almost any other small device. Topics discussed include choosing the right solar panel, using (or not using) a voltage regulator, buffering the energy, some real applications as well as instructions on how to build a small and simple device to measure your power and energy savings.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2904.en.html
</itunes:summary>
      <itunes:duration>00:28:59</itunes:duration>
    </item>
    <item>
      <title>Das Grundrecht auf digitale Intimsphäre (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere</link>
      <description>Das Bundesverfassungsgericht hat uns anläßlich der Verfassungsbeschwerde gegen das nordrhein-westfälische Verfassungsschutzgesetz ein neues Grundrecht auf Gewährleistung der Vertraulichkeit und Integrität von informationstechnischen Systemen geschenkt. Damit wurden für den Einsatz des geplanten Bundestrojaners zwar genaue Regelungen getroffen, aber was ist eigentlich mit den tausenden Festplatten, die jedes Jahr in Deutschland beschlagnahmt werden?

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2923.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp4"
        length="444596224"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp4?1399728408</guid>
      <dc:identifier>import-c9fb5ca0b9154e1ba1</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Constanze Kurz, Ulf Buermeyer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Festplattenbeschlagnahme in neuem Licht</itunes:subtitle>
      <itunes:summary>Das Bundesverfassungsgericht hat uns anläßlich der Verfassungsbeschwerde gegen das nordrhein-westfälische Verfassungsschutzgesetz ein neues Grundrecht auf Gewährleistung der Vertraulichkeit und Integrität von informationstechnischen Systemen geschenkt. Damit wurden für den Einsatz des geplanten Bundestrojaners zwar genaue Regelungen getroffen, aber was ist eigentlich mit den tausenden Festplatten, die jedes Jahr in Deutschland beschlagnahmt werden?

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2923.en.html
</itunes:summary>
      <itunes:duration>00:55:18</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day4 (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2973-en-lightning_talks_day4</link>
      <description>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2973.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2973-en-lightning_talks_day4.mp4"
        length="491782144"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2973-en-lightning_talks_day4.mp4?1399728407</guid>
      <dc:identifier>import-e9df7801eb432bf49e</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Sven Guckes, Oliver Pritzkow</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:subtitle>4 minutes of fame</itunes:subtitle>
      <itunes:summary>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2973.en.html
</itunes:summary>
      <itunes:duration>01:01:16</itunes:duration>
    </item>
    <item>
      <title>Mining social contacts with active RFID (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2899-en-mining_social_contacts_with_active_rfid</link>
      <description>We describe the implementation of a distributed proximity detection firmware for the OpenBeacon RFID platform. We report on experiments performed during conference gatherings, where the new feature of proximity detection was used to mine and expose patterns of social contact. We discuss some properties of the networks of social contact, and show how these networks can be analyzed, visualized, and used to infer the underlying social structure.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2899.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2899-en-mining_social_contacts_with_active_rfid.mp4"
        length="477102080"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2899-en-mining_social_contacts_with_active_rfid.mp4?1399728407</guid>
      <dc:identifier>import-dec7979f6876685173</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Ciro Cattuto, Milosch Meriac, aestetix</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>We describe the implementation of a distributed proximity detection firmware for the OpenBeacon RFID platform. We report on experiments performed during conference gatherings, where the new feature of proximity detection was used to mine and expose patterns of social contact. We discuss some properties of the networks of social contact, and show how these networks can be analyzed, visualized, and used to infer the underlying social structure.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2899.en.html
</itunes:summary>
      <itunes:duration>00:59:15</itunes:duration>
    </item>
    <item>
      <title>Pflanzenhacken (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2952-de-pflanzenhacken</link>
      <description>Ob Tomaten, Zitronen oder Cannabis: Nutzpflanzen werden längst nicht mehr konventionell in Erde gezüchtet. Von der Auswahl des Saat- und Erbguts bis zur Ernte ist der Anbau von Pflanzen aller Art ein schwieriges, aber spannendes Thema. Die von der Industrie angestellte Forschung hilft auch dem Hobbyzüchter: Pflanzen, die ohne Erde kultiviert und wenige Wochen nach der &quot;Aussaat&quot; erntereif sind, gehören längst nicht mehr in Science-Fiction-Filme, sondern in den Keller des geneigten Bastlers.
Dieser Vortrag soll aufzeigen, dass nicht nur bei Bits&#39;n&#39;Bytes, sondern auch bei Obst und Gemüse durchaus hackbares Potential besteht.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2952.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2952-de-pflanzenhacken.mp4"
        length="438304768"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2952-de-pflanzenhacken.mp4?1399728407</guid>
      <dc:identifier>import-8f19a40ed78b95df8d</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Paul Asmuth</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Making</itunes:keywords>
      <itunes:subtitle>Züchten 2.0</itunes:subtitle>
      <itunes:summary>Ob Tomaten, Zitronen oder Cannabis: Nutzpflanzen werden längst nicht mehr konventionell in Erde gezüchtet. Von der Auswahl des Saat- und Erbguts bis zur Ernte ist der Anbau von Pflanzen aller Art ein schwieriges, aber spannendes Thema. Die von der Industrie angestellte Forschung hilft auch dem Hobbyzüchter: Pflanzen, die ohne Erde kultiviert und wenige Wochen nach der &quot;Aussaat&quot; erntereif sind, gehören längst nicht mehr in Science-Fiction-Filme, sondern in den Keller des geneigten Bastlers.
Dieser Vortrag soll aufzeigen, dass nicht nur bei Bits&#39;n&#39;Bytes, sondern auch bei Obst und Gemüse durchaus hackbares Potential besteht.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2952.en.html
</itunes:summary>
      <itunes:duration>00:54:28</itunes:duration>
    </item>
    <item>
      <title>Stormfucker: Owning the Storm Botnet (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3000-en-stormfucker_owning_the_storm_botnet</link>
      <description>In the talk we will demonstrate how to own the storm botnet (live demo included).

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3000.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3000-en-stormfucker_owning_the_storm_botnet.mp4"
        length="649068544"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3000-en-stormfucker_owning_the_storm_botnet.mp4?1399728407</guid>
      <dc:identifier>import-a8f4cba930451edf37</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Georg &#39;oxff&#39; Wicherski, Tillmann Werner, Felix Leder, Mark Schlösser</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>In the talk we will demonstrate how to own the storm botnet (live demo included).

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3000.en.html
</itunes:summary>
      <itunes:duration>01:20:52</itunes:duration>
    </item>
    <item>
      <title>Scalable Swarm Robotics (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2890-en-scalable_swarm_robotics</link>
      <description>The topic of swarm robotics will be introduced, including the current state of the art and some current research platforms. The problems of scalability in robot swarms will be discussed, particularly of programming and maintaining a large group of robots. The Formica platform represents a novel, very low cost approach to swarm robotics. Its design and implementation will be described, and the lecture will culminate in a live demonstration of a swarm of 25 robots cooperating on a task.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2890.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2890-en-scalable_swarm_robotics.mp4"
        length="315621376"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2890-en-scalable_swarm_robotics.mp4?1399728407</guid>
      <dc:identifier>import-e52e7b7421e23b969c</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Jeff Gough</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Making</itunes:keywords>
      <itunes:subtitle>Formica: a cheap, open research platform</itunes:subtitle>
      <itunes:summary>The topic of swarm robotics will be introduced, including the current state of the art and some current research platforms. The problems of scalability in robot swarms will be discussed, particularly of programming and maintaining a large group of robots. The Formica platform represents a novel, very low cost approach to swarm robotics. Its design and implementation will be described, and the lecture will culminate in a live demonstration of a swarm of 25 robots cooperating on a task.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2890.en.html
</itunes:summary>
      <itunes:duration>00:39:15</itunes:duration>
    </item>
    <item>
      <title>Hacker Jeopardy (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2958-de-hacker_jeopardy</link>
      <description>Das bekannte Quizformat - 
aber natürlich mit Themen, die man im Fernsehen nie zu sehen bekäme.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2958.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2958-de-hacker_jeopardy.mp4"
        length="829423616"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2958-de-hacker_jeopardy.mp4?1399728407</guid>
      <dc:identifier>import-a19180493d3c82f29b</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Stefan &#39;Sec&#39; Zehl, Ray</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:subtitle>Die ultimative Hacker-Quizshow</itunes:subtitle>
      <itunes:summary>Das bekannte Quizformat - 
aber natürlich mit Themen, die man im Fernsehen nie zu sehen bekäme.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2958.en.html
</itunes:summary>
      <itunes:duration>01:43:15</itunes:duration>
    </item>
    <item>
      <title>Hacker Jeopardy (English interpretation) (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3057-en-hacker_jeopardy_english_interpretation</link>
      <description>English Interpretation and video transmission of the event in Saal 1

The famous quiz –
of course with topics you will never see in TV.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3057.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3057-en-hacker_jeopardy_english_interpretation.mp4"
        length="826277888"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3057-en-hacker_jeopardy_english_interpretation.mp4?1399728407</guid>
      <dc:identifier>import-ddc891aefc6649bfcf</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Stefan &#39;Sec&#39; Zehl, Ray</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:subtitle>The ultimative Hacker-Quizshow</itunes:subtitle>
      <itunes:summary>English Interpretation and video transmission of the event in Saal 1

The famous quiz –
of course with topics you will never see in TV.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3057.en.html
</itunes:summary>
      <itunes:duration>01:42:55</itunes:duration>
    </item>
    <item>
      <title>Banking Malware 101 (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3020-en-banking_malware_101</link>
      <description>In the recent years, we observed a growing sophistication how credentials are stolen from compromised machines: the attackers use sophisticated keyloggers to control the victim&#39;s machine and use different techniques to steal the actual credentials. In this talk, we present an overview of this threat and empirical measurement results.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3020.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3020-en-banking_malware_101.mp4"
        length="509607936"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3020-en-banking_malware_101.mp4?1399728407</guid>
      <dc:identifier>import-999159d42d326f39e3</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Thorsten Holz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Overview of Current Keylogger Threats</itunes:subtitle>
      <itunes:summary>In the recent years, we observed a growing sophistication how credentials are stolen from compromised machines: the attackers use sophisticated keyloggers to control the victim&#39;s machine and use different techniques to steal the actual credentials. In this talk, we present an overview of this threat and empirical measurement results.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3020.en.html
</itunes:summary>
      <itunes:duration>01:03:20</itunes:duration>
    </item>
    <item>
      <title>Squeezing Attack Traces (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3002-en-squeezing_attack_traces</link>
      <description>This talk will give an overview about how modern attack analysis tools (dynamic honeypots, an automated shellcode analyzer, and an intrusion signature generator) can be used to get a deep understanding about what attacks do and how they work. A live demo will be given to demonstrate the usage of those tools.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3002.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3002-en-squeezing_attack_traces.mp4"
        length="306184192"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3002-en-squeezing_attack_traces.mp4?1399728407</guid>
      <dc:identifier>import-156740b6457fd900b9</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Markus Kötter, Tillmann Werner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>How to get useable information out of your honeypot</itunes:subtitle>
      <itunes:summary>This talk will give an overview about how modern attack analysis tools (dynamic honeypots, an automated shellcode analyzer, and an intrusion signature generator) can be used to get a deep understanding about what attacks do and how they work. A live demo will be given to demonstrate the usage of those tools.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3002.en.html
</itunes:summary>
      <itunes:duration>00:38:02</itunes:duration>
    </item>
    <item>
      <title>Short Attention Span Security (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2734-en-short_attention_span_security</link>
      <description>Working as a security consultant means that you get to see everyone&#39;s dirty laundry. However, it also means a hectic schedule and restrictive confidentiality agreements. Without violating my NDA, here&#39;s a set of turbo-talks looking at some new tricks for some new technologies and a look at some lucrative new attack surfaces that will become much more prevalent in the coming year. Topics will include: Script Injection in Flex, EFI Rootkits, static analysis with Dehydra, and pattern-matching hex editors.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2734.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2734-en-short_attention_span_security.mp4"
        length="430964736"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2734-en-short_attention_span_security.mp4?1399728407</guid>
      <dc:identifier>import-35fc7dfee5f7a75c5f</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Ben Kurtz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>A little of everything</itunes:subtitle>
      <itunes:summary>Working as a security consultant means that you get to see everyone&#39;s dirty laundry. However, it also means a hectic schedule and restrictive confidentiality agreements. Without violating my NDA, here&#39;s a set of turbo-talks looking at some new tricks for some new technologies and a look at some lucrative new attack surfaces that will become much more prevalent in the coming year. Topics will include: Script Injection in Flex, EFI Rootkits, static analysis with Dehydra, and pattern-matching hex editors.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2734.en.html
</itunes:summary>
      <itunes:duration>00:53:38</itunes:duration>
    </item>
    <item>
      <title>Analyzing RFID Security (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3032-en-analyzing_rfid_security</link>
      <description>Many RFID tags have weaknesses, but the security level of different tags varies widely. Using the Mifare Classic cards as an example, we illustrate the complexity of RFID systems and discuss different attack vectors. To empower further analysis of RFID cards, we release an open-source, software-controlled, and extensible RFID reader with support for most common standards.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3032.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3032-en-analyzing_rfid_security.mp4"
        length="434110464"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3032-en-analyzing_rfid_security.mp4?1399728407</guid>
      <dc:identifier>import-b6d9b9d565c00a5acb</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Henryk Plötz, Karsten Nohl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>Many RFID tags have weaknesses, but the security level of different tags varies widely. Using the Mifare Classic cards as an example, we illustrate the complexity of RFID systems and discuss different attack vectors. To empower further analysis of RFID cards, we release an open-source, software-controlled, and extensible RFID reader with support for most common standards.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3032.en.html
</itunes:summary>
      <itunes:duration>00:54:01</itunes:duration>
    </item>
    <item>
      <title>Jahresrückblick (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3024-de-jahresrueckblick</link>
      <description>Es war mal wieder ein bewegtes Jahr für den CCC. Was alles passiert ist, werden wir in der gebotenen Kürze berichten.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3024.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3024-de-jahresrueckblick.mp4"
        length="1003487232"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3024-de-jahresrueckblick.mp4?1399728407</guid>
      <dc:identifier>import-5d3fe535916c811ae9</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rosengart, Frank Rieger, Constanze Kurz, Andy Müller-Maguhn, Erdgeist</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:subtitle>Die Themen des CCC im Jahr 2008</itunes:subtitle>
      <itunes:summary>Es war mal wieder ein bewegtes Jahr für den CCC. Was alles passiert ist, werden wir in der gebotenen Kürze berichten.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3024.en.html
</itunes:summary>
      <itunes:duration>02:05:01</itunes:duration>
    </item>
    <item>
      <title>Crafting and Hacking: Separated at Birth (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2777-en-crafting_and_hacking_separated_at_birth</link>
      <description>What do hackers have in common with crafters? Lots. While crafting is more often about string and glue than bits and electrons, crafters often feel the same need to create things and manipulate materials into something new. The roots of computing are intertwined with craft around the invention of the Jaquard punchcard loom. We&#39;ll look at where the two scenes have gone since then, and what we can gain by reconnecting the hacker world with its softer, more decorative cousin.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2777.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2777-en-crafting_and_hacking_separated_at_birth.mp4"
        length="290455552"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2777-en-crafting_and_hacking_separated_at_birth.mp4?1399728407</guid>
      <dc:identifier>import-cf0912d2436d3c30f4</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Kellbot</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Culture</itunes:keywords>
      <itunes:summary>What do hackers have in common with crafters? Lots. While crafting is more often about string and glue than bits and electrons, crafters often feel the same need to create things and manipulate materials into something new. The roots of computing are intertwined with craft around the invention of the Jaquard punchcard loom. We&#39;ll look at where the two scenes have gone since then, and what we can gain by reconnecting the hacker world with its softer, more decorative cousin.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2777.en.html
</itunes:summary>
      <itunes:duration>00:36:06</itunes:duration>
    </item>
    <item>
      <title>Life is a Holodeck! (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3016-en-life_is_a_holodeck</link>
      <description>This talk will give you an overview of the different techniques for spacial representation and show you how they work. Starting with a brief history on the invention of stereoscopy and lenticular representation we will quickly get into history and invention of holography, the basic principles and milestones during development through to the latest available applications and technologies. Different types of Holograms will be shown and explained.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3016.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3016-en-life_is_a_holodeck.mp4"
        length="542113792"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3016-en-life_is_a_holodeck.mp4?1399728407</guid>
      <dc:identifier>import-db4b2a779513ca227d</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Claus &quot;HoloClaus&quot; Cohnen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Science</itunes:keywords>
      <itunes:subtitle>An overview of holographic techniques</itunes:subtitle>
      <itunes:summary>This talk will give you an overview of the different techniques for spacial representation and show you how they work. Starting with a brief history on the invention of stereoscopy and lenticular representation we will quickly get into history and invention of holography, the basic principles and milestones during development through to the latest available applications and technologies. Different types of Holograms will be shown and explained.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3016.en.html
</itunes:summary>
      <itunes:duration>01:07:27</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day3 - Evening (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3053-en-lightning_talks_day3_-_evening</link>
      <description>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3053.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3053-en-lightning_talks_day3_-_evening.mp4"
        length="448790528"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3053-en-lightning_talks_day3_-_evening.mp4?1399728407</guid>
      <dc:identifier>import-c2a0b8d5489de4d2f6</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Sven Guckes, Oliver Pritzkow</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:subtitle>4 minutes of fame</itunes:subtitle>
      <itunes:summary>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3053.en.html
</itunes:summary>
      <itunes:duration>00:55:14</itunes:duration>
    </item>
    <item>
      <title>Algorithmic Music in a Box (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2843-en-algorithmic_music_in_a_box</link>
      <description>Small devices like microcontrollers, coupled to a few buttons, knobs, encoders and LEDs, allow for a host of interesting and creative musical applications. Solder a few bits together, program a few lines, and you can build a deep device to support your musical exploration. This lecture will show you quickly how the hardware and code works, and then focus on a few interesting applications: controllers, sequencers, sound generators. The workshop will allow you to build your own crazy ideas.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2843.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2843-en-algorithmic_music_in_a_box.mp4"
        length="411041792"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2843-en-algorithmic_music_in_a_box.mp4?1399728406</guid>
      <dc:identifier>import-5e89fe5c21c6e4d891</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>wesen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Making</itunes:keywords>
      <itunes:subtitle>Doing music with microcontrollers</itunes:subtitle>
      <itunes:summary>Small devices like microcontrollers, coupled to a few buttons, knobs, encoders and LEDs, allow for a host of interesting and creative musical applications. Solder a few bits together, program a few lines, and you can build a deep device to support your musical exploration. This lecture will show you quickly how the hardware and code works, and then focus on a few interesting applications: controllers, sequencers, sound generators. The workshop will allow you to build your own crazy ideas.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2843.en.html
</itunes:summary>
      <itunes:duration>00:51:08</itunes:duration>
    </item>
    <item>
      <title>Why were we so vulnerable to the DNS vulnerability? (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability</link>
      <description>SSL wasn&#39;t enough. Encryption is nonexistent. Autoupdaters are horribly broken. Why is all this the case?

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2906.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp4"
        length="584056832"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp4?1399728406</guid>
      <dc:identifier>import-d02ddb495b4b473e05</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Dan Kaminsky</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>SSL wasn&#39;t enough. Encryption is nonexistent. Autoupdaters are horribly broken. Why is all this the case?

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2906.en.html
</itunes:summary>
      <itunes:duration>01:12:45</itunes:duration>
    </item>
    <item>
      <title>The Ultimate Commodore 64 Talk (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2874-en-the_ultimate_commodore_64_talk</link>
      <description>Retrocomputing is cool as never before. People play C64 games in emulators and listen to SID music, but few people know much about the C64 architecture. This talk attempts to communicate &quot;everything about the C64&quot; to the listener, including its internals and quirks, as well as the tricks that have been used in the demoscene, trying to revive the spirit of times when programmers counted clock cycles and hardware limitations were seen as a challenge.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2874.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2874-en-the_ultimate_commodore_64_talk.mp4"
        length="492830720"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2874-en-the_ultimate_commodore_64_talk.mp4?1399728406</guid>
      <dc:identifier>import-b5cb111843cef80e01</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Michael Steil</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Everything about the C64 in 64 Minutes</itunes:subtitle>
      <itunes:summary>Retrocomputing is cool as never before. People play C64 games in emulators and listen to SID music, but few people know much about the C64 architecture. This talk attempts to communicate &quot;everything about the C64&quot; to the listener, including its internals and quirks, as well as the tricks that have been used in the demoscene, trying to revive the spirit of times when programmers counted clock cycles and hardware limitations were seen as a challenge.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2874.en.html
</itunes:summary>
      <itunes:duration>01:01:14</itunes:duration>
    </item>
    <item>
      <title>Running your own GSM network (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3007-en-running_your_own_gsm_network</link>
      <description>This presentation will mark the first public release of a new GPL licensed Free Software project implementing the GSM fixed network, including the various minimal necessary functionality of BSC, MSC, HLR. It will introduce the respective standards and protocols, as well as a short demonstration of an actual phone call between two mobile phones registered to the base station.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3007.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3007-en-running_your_own_gsm_network.mp4"
        length="360710144"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3007-en-running_your_own_gsm_network.mp4?1399728406</guid>
      <dc:identifier>import-4e688d68d9cb334a9f</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Dieter Spaar, Harald Welte</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>This presentation will mark the first public release of a new GPL licensed Free Software project implementing the GSM fixed network, including the various minimal necessary functionality of BSC, MSC, HLR. It will introduce the respective standards and protocols, as well as a short demonstration of an actual phone call between two mobile phones registered to the base station.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3007.en.html
</itunes:summary>
      <itunes:duration>00:44:48</itunes:duration>
    </item>
    <item>
      <title>Der elektronische Personalausweis (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2895-de-der_elektronische_personalausweis</link>
      <description>Die Einführung von Fingerabdrücken und biometrischen Gesichtsbildern in den geplanten elektronischen Personalausweis (ePA) ist 2008 beschlossen worden. Versprochen wird uns die sichere Identitätskontrolle, geliefert vom Dienstleister des Vertrauens, der Bundesdruckerei GmbH. Konzeptionelle Fehler aus dem Paßgesetz werden jedoch im neuen Scheckkartenformat des ePA wiederholt.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2895.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2895-de-der_elektronische_personalausweis.mp4"
        length="489684992"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2895-de-der_elektronische_personalausweis.mp4?1399728406</guid>
      <dc:identifier>import-48cba9fbb65a92437f</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Constanze Kurz, starbug</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Endlich wird jeder zum &quot;Trusted Citizen&quot;</itunes:subtitle>
      <itunes:summary>Die Einführung von Fingerabdrücken und biometrischen Gesichtsbildern in den geplanten elektronischen Personalausweis (ePA) ist 2008 beschlossen worden. Versprochen wird uns die sichere Identitätskontrolle, geliefert vom Dienstleister des Vertrauens, der Bundesdruckerei GmbH. Konzeptionelle Fehler aus dem Paßgesetz werden jedoch im neuen Scheckkartenformat des ePA wiederholt.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2895.en.html
</itunes:summary>
      <itunes:duration>01:00:54</itunes:duration>
    </item>
    <item>
      <title>Attacking NFC mobile phones (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2639-en-attacking_nfc_mobile_phones</link>
      <description>Near Field Communication (NFC) based services and mobile phones are starting to appear in the field, therefore it is time to take a look at the security of the services and especially the NFC mobile phones themselves.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2639.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2639-en-attacking_nfc_mobile_phones.mp4"
        length="660602880"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2639-en-attacking_nfc_mobile_phones.mp4?1399728406</guid>
      <dc:identifier>import-ab7c839b128736450c</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Collin Mulliner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>First look at the security of NFC mobile phones</itunes:subtitle>
      <itunes:summary>Near Field Communication (NFC) based services and mobile phones are starting to appear in the field, therefore it is time to take a look at the security of the services and especially the NFC mobile phones themselves.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2639.en.html
</itunes:summary>
      <itunes:duration>01:22:16</itunes:duration>
    </item>
    <item>
      <title>Predictable RNG in the vulnerable Debian OpenSSL package (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package</link>
      <description>Recently, the Debian project announced an OpenSSL package vulnerability which they had been distributing for the last two years. This bug makes the PRNG predictable, affecting the keys generated by openssl and every other system that uses libssl (eg. openssh, openvpn).

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2995.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp4"
        length="406847488"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp4?1399728406</guid>
      <dc:identifier>import-38f4c114ce8c0462f5</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Luciano Bello, Maximiliano Bertacchini</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>the What and the How</itunes:subtitle>
      <itunes:summary>Recently, the Debian project announced an OpenSSL package vulnerability which they had been distributing for the last two years. This bug makes the PRNG predictable, affecting the keys generated by openssl and every other system that uses libssl (eg. openssh, openvpn).

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2995.en.html
</itunes:summary>
      <itunes:duration>00:50:42</itunes:duration>
    </item>
    <item>
      <title>Security Nightmares 2009 (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3021-de-security_nightmares_2009</link>
      <description>Security Nightmares - der jährliche Rückblick auf die IT-Sicherheit und der Security-Glaskugelblick für&#39;s nächste Jahr.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3021.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3021-de-security_nightmares_2009.mp4"
        length="757071872"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3021-de-security_nightmares_2009.mp4?1399728406</guid>
      <dc:identifier>import-85069872c1089c4360</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Ron, Frank Rieger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Oder: worüber wir nächstes Jahr lachen werden</itunes:subtitle>
      <itunes:summary>Security Nightmares - der jährliche Rückblick auf die IT-Sicherheit und der Security-Glaskugelblick für&#39;s nächste Jahr.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3021.en.html
</itunes:summary>
      <itunes:duration>01:34:25</itunes:duration>
    </item>
    <item>
      <title>Kurt Gödel – I do not fit into this century (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century</link>
      <description>Manche bezeichnen ihn als größten Logiker seit Aristoteles: Der 1906 geborene Wiener Mathematiker Kurt Gödel rührte ab 1930 mit seinen Unvollständigkeitssätzen an den Grundfesten der Mathematik. Er wies nach, daß es in jedem formalen logischen System Fragen gibt, die unentscheidbar sind. Sein Arbeitsleben verbrachte der Wissenschaftler, der wie viele Kollegen aus Europa fliehen mußte, am berühmten Institute for Advanced Study in Princeton – dem Mekka der modernen Mathematik. Der introvertierte Mensch Kurt Gödel schwankte dabei Zeit seines Lebens zwischen Genie und Wahnsinn, hatte zahlreiche Neurosen und eine ausgeprägte Paranoia.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3050.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp4"
        length="383778816"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp4?1399728406</guid>
      <dc:identifier>import-ec9465f980d4610552</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Ina  Kwasniewski, Marcus  Richter, Constanze Kurz, Kai  Kittler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Culture</itunes:keywords>
      <itunes:subtitle>Ein audiovisuelles Live-Feature</itunes:subtitle>
      <itunes:summary>Manche bezeichnen ihn als größten Logiker seit Aristoteles: Der 1906 geborene Wiener Mathematiker Kurt Gödel rührte ab 1930 mit seinen Unvollständigkeitssätzen an den Grundfesten der Mathematik. Er wies nach, daß es in jedem formalen logischen System Fragen gibt, die unentscheidbar sind. Sein Arbeitsleben verbrachte der Wissenschaftler, der wie viele Kollegen aus Europa fliehen mußte, am berühmten Institute for Advanced Study in Princeton – dem Mekka der modernen Mathematik. Der introvertierte Mensch Kurt Gödel schwankte dabei Zeit seines Lebens zwischen Genie und Wahnsinn, hatte zahlreiche Neurosen und eine ausgeprägte Paranoia.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3050.en.html
</itunes:summary>
      <itunes:duration>00:47:40</itunes:duration>
    </item>
    <item>
      <title>Methods for Understanding Targeted Attacks with Office Documents (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents</link>
      <description>As more security features and anti-exploitation mechanisms are added to modern operating systems, attackers are changing their targets to higher-level applications. In the last few years, we have seen increasing targeted attacks using malicious Office documents against both government and non-government entities. These attacks are well publicized in the media; unfortunately, there is not much public information on attack details or exploitation mechanisms employed in the attacks themselves. This presentation aims to fill the gap by offering:

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2938.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp4"
        length="411041792"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp4?1399728406</guid>
      <dc:identifier>import-4e23139e8c3b0534b2</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Bruce Dang</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>As more security features and anti-exploitation mechanisms are added to modern operating systems, attackers are changing their targets to higher-level applications. In the last few years, we have seen increasing targeted attacks using malicious Office documents against both government and non-government entities. These attacks are well publicized in the media; unfortunately, there is not much public information on attack details or exploitation mechanisms employed in the attacks themselves. This presentation aims to fill the gap by offering:

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2938.en.html
</itunes:summary>
      <itunes:duration>00:51:07</itunes:duration>
    </item>
    <item>
      <title>SWF and the Malware Tragedy (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2596-en-swf_and_the_malware_tragedy</link>
      <description>This talk rounds up possible web-based attacks using Flash with a particular focus on obfuscation, de-obfuscation and the generic detection of malicious SWF.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2596.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2596-en-swf_and_the_malware_tragedy.mp4"
        length="391118848"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2596-en-swf_and_the_malware_tragedy.mp4?1399728406</guid>
      <dc:identifier>import-70fdf2e68b2b8c4ea2</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>fukami, BeF</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Hide and Seek in A. Flash</itunes:subtitle>
      <itunes:summary>This talk rounds up possible web-based attacks using Flash with a particular focus on obfuscation, de-obfuscation and the generic detection of malicious SWF.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2596.en.html
</itunes:summary>
      <itunes:duration>00:48:39</itunes:duration>
    </item>
    <item>
      <title>Security of MICA*-based wireless sensor networks (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2831-en-security_of_mica-based_wireless_sensor_networks</link>
      <description>Firstly, we mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks. The core of the talk deals with assessing the practical security of the particular COTS system adopted by our team, the Crossbow MICAz motes running TinyOS or XMesh, together with the Stargate gateway: we designed and implemented a variety of attacks on this system and we discuss the security problems we found, together with appropriate fixes where possible. While some of our attacks exploit generally known vulnerabilities, others like selective jamming and power exhaustion through routing table manipulation are original and interesting in their own right. In section we also demonstrate how an attacker can undetectably alter messages in an IEEE 802.15.4 radio environment. 

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2831.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp4"
        length="297795584"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp4?1399728406</guid>
      <dc:identifier>import-a0a826b12360d113a0</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Dan Cvrcek</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>Firstly, we mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks. The core of the talk deals with assessing the practical security of the particular COTS system adopted by our team, the Crossbow MICAz motes running TinyOS or XMesh, together with the Stargate gateway: we designed and implemented a variety of attacks on this system and we discuss the security problems we found, together with appropriate fixes where possible. While some of our attacks exploit generally known vulnerabilities, others like selective jamming and power exhaustion through routing table manipulation are original and interesting in their own right. In section we also demonstrate how an attacker can undetectably alter messages in an IEEE 802.15.4 radio environment. 

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2831.en.html
</itunes:summary>
      <itunes:duration>00:36:59</itunes:duration>
    </item>
    <item>
      <title>Anatomy of smartphone hardware (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3008-en-anatomy_of_smartphone_hardware</link>
      <description>Do you know the architecture of contemporary mobile phone hardware? This presentation will explain about the individual major building blocks and overall architecture of contemporary GSM and UMTS smartphones.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3008.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3008-en-anatomy_of_smartphone_hardware.mp4"
        length="458227712"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3008-en-anatomy_of_smartphone_hardware.mp4?1399728406</guid>
      <dc:identifier>import-8a69e7b1ee3f8cc625</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Harald Welte</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Dissecting contemporary cellphone hardware</itunes:subtitle>
      <itunes:summary>Do you know the architecture of contemporary mobile phone hardware? This presentation will explain about the individual major building blocks and overall architecture of contemporary GSM and UMTS smartphones.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3008.en.html
</itunes:summary>
      <itunes:duration>00:56:57</itunes:duration>
    </item>
    <item>
      <title>Terrorist All-Stars (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2991-en-terrorist_all-stars</link>
      <description>After more than a year of mostly dealing with the terrorism investigation against my partner Andrej Holm, and the resulting total surveillance directed at him and our family, it has become more quiet lately for us. The investigation is *still* going on though.
In the course of my new preoccupation &#39;terrorism&#39; I keep hearing about similarly absurd cases of such investigations. All different, but all with analogies. All hard to bear for those who are subjected tot them. The talk will introduce some cases and search for patterns in cases against &#39;terrorists&#39; who are clearly not terrorists.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2991.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2991-en-terrorist_all-stars.mp4"
        length="524288000"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2991-en-terrorist_all-stars.mp4?1399728406</guid>
      <dc:identifier>import-eac758740ecd962c0b</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Anne Roth</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Some cases of terrorism around the world that are not terrorist at all</itunes:subtitle>
      <itunes:summary>After more than a year of mostly dealing with the terrorism investigation against my partner Andrej Holm, and the resulting total surveillance directed at him and our family, it has become more quiet lately for us. The investigation is *still* going on though.
In the course of my new preoccupation &#39;terrorism&#39; I keep hearing about similarly absurd cases of such investigations. All different, but all with analogies. All hard to bear for those who are subjected tot them. The talk will introduce some cases and search for patterns in cases against &#39;terrorists&#39; who are clearly not terrorists.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2991.en.html
</itunes:summary>
      <itunes:duration>01:05:18</itunes:duration>
    </item>
    <item>
      <title>Cisco IOS attack and defense (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2816-en-cisco_ios_attack_and_defense</link>
      <description>The talk will cover the past, present and future of Cisco IOS hacking, defense and forensics. Starting from the historic attacks that still work on less well managed parts of the Internet, the powerful common bugs, the classes of binary vulnerabilities and how to exploit them down to the latest methods and techniques, this session will try to give everything in one bag.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2816.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2816-en-cisco_ios_attack_and_defense.mp4"
        length="532676608"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2816-en-cisco_ios_attack_and_defense.mp4?1399728406</guid>
      <dc:identifier>import-5fa5d5ff35316aaa6c</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>FX of Phenoelit</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>The State of the Art</itunes:subtitle>
      <itunes:summary>The talk will cover the past, present and future of Cisco IOS hacking, defense and forensics. Starting from the historic attacks that still work on less well managed parts of the Internet, the powerful common bugs, the classes of binary vulnerabilities and how to exploit them down to the latest methods and techniques, this session will try to give everything in one bag.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2816.en.html
</itunes:summary>
      <itunes:duration>01:06:21</itunes:duration>
    </item>
    <item>
      <title>OnionCat – A Tor-based Anonymous VPN (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2828-en-onioncat_a_tor-based_anonymous_vpn</link>
      <description>OnionCat manages to build a complete IP transparent VPN based on Tor&#39;s hidden services, provides a simple well-known interface and has the potential to create an anonymous global network which could evolve to a feature- and information-rich network like we know the plain Internet today.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2828.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp4"
        length="355467264"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp4?1399728406</guid>
      <dc:identifier>import-bad5c7ffff3e2cea52</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Daniel Haslinger, Bernhard Fischer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Building an anonymous Internet within the Internet</itunes:subtitle>
      <itunes:summary>OnionCat manages to build a complete IP transparent VPN based on Tor&#39;s hidden services, provides a simple well-known interface and has the potential to create an anonymous global network which could evolve to a feature- and information-rich network like we know the plain Internet today.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2828.en.html
</itunes:summary>
      <itunes:duration>00:44:06</itunes:duration>
    </item>
    <item>
      <title>Closing Ceremony (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2999-en-closing_ceremony</link>
      <description>

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2999.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2999-en-closing_ceremony.mp4"
        length="403701760"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2999-en-closing_ceremony.mp4?1399728406</guid>
      <dc:identifier>import-e764d19e33d6433269</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Sandro  Gaycken</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:summary>

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2999.en.html
</itunes:summary>
      <itunes:duration>00:50:09</itunes:duration>
    </item>
    <item>
      <title>Repurposing the TI EZ430U (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2681-en-repurposing_the_ti_ez430u</link>
      <description>USB devices are sometimes composed of little more than a microcontroller and a USB device controller. This lecture describes how to reprogram one such device, greatly expanding its potential.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2681.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2681-en-repurposing_the_ti_ez430u.mp4"
        length="270532608"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2681-en-repurposing_the_ti_ez430u.mp4?1399728405</guid>
      <dc:identifier>import-dc8e99110645a4c62b</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Travis Goodspeed</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Making</itunes:keywords>
      <itunes:subtitle>with msp430static, solder, and syringe</itunes:subtitle>
      <itunes:summary>USB devices are sometimes composed of little more than a microcontroller and a USB device controller. This lecture describes how to reprogram one such device, greatly expanding its potential.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2681.en.html
</itunes:summary>
      <itunes:duration>00:33:35</itunes:duration>
    </item>
    <item>
      <title>Objects as Software: The Coming Revolution (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2781-en-objects_as_software_the_coming_revolution</link>
      <description>How physical compilers (CNC machines, laser cutters, 3D printers, etc) are changing the way we make things, how we think about the nature of objects.  This talk will focus on the future of digital manufacturing, and how self-replicating machines will make this technology accessible to everyone: ushering in a new era of technological advance.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2781.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2781-en-objects_as_software_the_coming_revolution.mp4"
        length="418381824"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2781-en-objects_as_software_the_coming_revolution.mp4?1399728405</guid>
      <dc:identifier>import-67317fc1b3b5c3dc8c</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Zach Hoeken</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Making</itunes:keywords>
      <itunes:subtitle>How RepRap and physical compilers will change the world as we know it (and already have)</itunes:subtitle>
      <itunes:summary>How physical compilers (CNC machines, laser cutters, 3D printers, etc) are changing the way we make things, how we think about the nature of objects.  This talk will focus on the future of digital manufacturing, and how self-replicating machines will make this technology accessible to everyone: ushering in a new era of technological advance.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2781.en.html
</itunes:summary>
      <itunes:duration>00:52:01</itunes:duration>
    </item>
    <item>
      <title>The Infinite Library (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2980-en-the_infinite_library</link>
      <description>Decades ago, Jorge Luis Borges wrote about infinite libraries and perfect memory with the slightly sad air of someone who&#39;d seen those things and knew their faults. Today we work toward infinite libraries and perfect memory with little heed for the possible consequences. How could it be bad to have everything possible stored? To remember everything? I don&#39;t know that it will be bad, but I do know that it will be different from our current lives of loss and forgetting. Right now, storing pornography causes problems even for people who have nothing especially perverted to hide: A collection of pornography gets to the heart of what it means to be a private individual. As we move from mass media to individually produced media, from edited collections of porn (magazines, commercially produced films) to individual snapshots and youtube clips and stored bittorrents, the particularity of a collection of porn will be testimony to its owner&#39;s private set of tastes.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2980.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2980-en-the_infinite_library.mp4"
        length="472907776"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2980-en-the_infinite_library.mp4?1399728405</guid>
      <dc:identifier>import-0d14de57e2a3df27a3</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Rose White</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Storage and Access of Pornographic Information</itunes:subtitle>
      <itunes:summary>Decades ago, Jorge Luis Borges wrote about infinite libraries and perfect memory with the slightly sad air of someone who&#39;d seen those things and knew their faults. Today we work toward infinite libraries and perfect memory with little heed for the possible consequences. How could it be bad to have everything possible stored? To remember everything? I don&#39;t know that it will be bad, but I do know that it will be different from our current lives of loss and forgetting. Right now, storing pornography causes problems even for people who have nothing especially perverted to hide: A collection of pornography gets to the heart of what it means to be a private individual. As we move from mass media to individually produced media, from edited collections of porn (magazines, commercially produced films) to individual snapshots and youtube clips and stored bittorrents, the particularity of a collection of porn will be testimony to its owner&#39;s private set of tastes.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2980.en.html
</itunes:summary>
      <itunes:duration>00:58:43</itunes:duration>
    </item>
    <item>
      <title>Blinkenlights Stereoscope (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2934-en-blinkenlights_stereoscope</link>
      <description>Blinkenlights Stereoscope is the new light installation of Project Blinkenlights, a group that originated form the Chaos Computer Club in 2001. Stereoscope targeted the City Hall in Toronto, Canada and was the biggest and most interactive installation of the group so far. The talk provides insight into how it worked and what technology had been developed to make it all happen.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2934.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2934-en-blinkenlights_stereoscope.mp4"
        length="523239424"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2934-en-blinkenlights_stereoscope.mp4?1399728405</guid>
      <dc:identifier>import-7fdd19a6d7f3fa79ff</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Tim Pritlove</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Behind the scenes of the new light installation</itunes:subtitle>
      <itunes:summary>Blinkenlights Stereoscope is the new light installation of Project Blinkenlights, a group that originated form the Chaos Computer Club in 2001. Stereoscope targeted the City Hall in Toronto, Canada and was the biggest and most interactive installation of the group so far. The talk provides insight into how it worked and what technology had been developed to make it all happen.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2934.en.html
</itunes:summary>
      <itunes:duration>01:05:06</itunes:duration>
    </item>
    <item>
      <title>MD5 considered harmful today (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3023-en-making_the_theoretical_possible</link>
      <description>![We have executed an attack that ...](http://events.ccc.de/congress/2008/Fahrplan/attachments/1207_censored.jpg)

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3023.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3023-en-making_the_theoretical_possible.mp4"
        length="497025024"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3023-en-making_the_theoretical_possible.mp4?1399728405</guid>
      <dc:identifier>import-c3664da0c16eae29c2</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>David Molnar, Marc Stevens, Arjen Lenstra, Benne de Weger, Alexander  Sotirov, Jacob Appelbaum, Dag Arne Osvik</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Creating a rogue CA Certificate</itunes:subtitle>
      <itunes:summary>![We have executed an attack that ...](http://events.ccc.de/congress/2008/Fahrplan/attachments/1207_censored.jpg)

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3023.en.html
</itunes:summary>
      <itunes:duration>01:01:48</itunes:duration>
    </item>
    <item>
      <title>About Cyborgs and Gargoyles (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2892-en-about_cyborgs_and_gargoyles_</link>
      <description>In this talk I present the current state of wearable computing, computing as common and useful as clothes, focusing on activity recognition (the inference of the users current actions) using on-body sensors (accelerometers, gyroscopes and other modalities), explaining possibilities, dealing with challenges and limitations and presenting some perils.


about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2892.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2892-en-about_cyborgs_and_gargoyles_.mp4"
        length="359661568"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2892-en-about_cyborgs_and_gargoyles_.mp4?1399728405</guid>
      <dc:identifier>import-555a982abc9d8b293e</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Kai Kunze</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Science</itunes:keywords>
      <itunes:subtitle>State of the Art in Wearable Computing</itunes:subtitle>
      <itunes:summary>In this talk I present the current state of wearable computing, computing as common and useful as clothes, focusing on activity recognition (the inference of the users current actions) using on-body sensors (accelerometers, gyroscopes and other modalities), explaining possibilities, dealing with challenges and limitations and presenting some perils.


about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2892.en.html
</itunes:summary>
      <itunes:duration>00:44:47</itunes:duration>
    </item>
    <item>
      <title>An introduction to new stream cipher designs (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2875-en-an_introduction_to_new_stream_cipher_designs</link>
      <description>Even with &quot;nothing to hide&quot;, we want to protect the privacy of our bits and bytes. Encryption is an important tool for this, and stream ciphers are a major class of symmetric-key encryption schemes. Algorithms such as RC4 (used in WEP/WPA, bittorrent, SSL), A5/1 (GSM telephony), E0 (bluetooth), as well as AES in counter (CTR) mode, are important examples of stream ciphers used in everyday applications.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2875.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp4"
        length="377487360"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp4?1399728405</guid>
      <dc:identifier>import-f6c40cb6e8f7feb70c</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Tor E. Bjørstad</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Turning data into line noise and back</itunes:subtitle>
      <itunes:summary>Even with &quot;nothing to hide&quot;, we want to protect the privacy of our bits and bytes. Encryption is an important tool for this, and stream ciphers are a major class of symmetric-key encryption schemes. Algorithms such as RC4 (used in WEP/WPA, bittorrent, SSL), A5/1 (GSM telephony), E0 (bluetooth), as well as AES in counter (CTR) mode, are important examples of stream ciphers used in everyday applications.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2875.en.html
</itunes:summary>
      <itunes:duration>00:46:53</itunes:duration>
    </item>
    <item>
      <title>Why technology sucks (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3004-en-why_technology_sucks</link>
      <description>More and more technology is seen as the ultimate solution for many problems. Lack of understanding and bending rules towards the technology show that politicians and managers have an established level of incompetence. Of course this poses a problem. We tend to forget that hacking also means is having fun with things. Let&#39;s ride the incompetence and use technology &#39;concepts&#39; for the things we want.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3004.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3004-en-why_technology_sucks.mp4"
        length="359661568"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3004-en-why_technology_sucks.mp4?1399728405</guid>
      <dc:identifier>import-26776631dc04cd3c55</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Walter van Host</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:subtitle>If technology is the solution, politicians are the problem</itunes:subtitle>
      <itunes:summary>More and more technology is seen as the ultimate solution for many problems. Lack of understanding and bending rules towards the technology show that politicians and managers have an established level of incompetence. Of course this poses a problem. We tend to forget that hacking also means is having fun with things. Let&#39;s ride the incompetence and use technology &#39;concepts&#39; for the things we want.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3004.en.html
</itunes:summary>
      <itunes:duration>00:44:42</itunes:duration>
    </item>
    <item>
      <title>Zehn Big Brother Awards in .at (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2975-de-zehn_big_brother_awards_in_at</link>
      <description>Als erster Big-Brother-Awards-Veranstalter schaffte es Österreich, dieses Jahr die Preise bereits zum zehnten mal zu vergeben. Und obwohl es sich nur um eine Zehnerpotenz handelt, und nicht um eine zur Basis 2, ist es Zeit für einen Rückblick – und einen kleinen Ausblick.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2975.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2975-de-zehn_big_brother_awards_in_at.mp4"
        length="463470592"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2975-de-zehn_big_brother_awards_in_at.mp4?1399728405</guid>
      <dc:identifier>import-f0cf2ac3f073c2d654</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Adrian Dabrowski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Rückblick über eine bewegte Zeit</itunes:subtitle>
      <itunes:summary>Als erster Big-Brother-Awards-Veranstalter schaffte es Österreich, dieses Jahr die Preise bereits zum zehnten mal zu vergeben. Und obwohl es sich nur um eine Zehnerpotenz handelt, und nicht um eine zur Basis 2, ist es Zeit für einen Rückblick – und einen kleinen Ausblick.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2975.en.html
</itunes:summary>
      <itunes:duration>00:57:38</itunes:duration>
    </item>
    <item>
      <title>Security Nightmares 2009 (English interpretation) (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3058-en-security_nightmares_2009_english_interpretation</link>
      <description>English Interpretation and video transmission of the event in Saal 1

Security Nightmares – the yearly review on IT-Security and a look into the crystal ball for next year.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3058.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3058-en-security_nightmares_2009_english_interpretation.mp4"
        length="743440384"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3058-en-security_nightmares_2009_english_interpretation.mp4?1399728405</guid>
      <dc:identifier>import-45de35e744bc8f1d4c</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rieger, Ron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Or: about what we will laugh next year</itunes:subtitle>
      <itunes:summary>English Interpretation and video transmission of the event in Saal 1

Security Nightmares – the yearly review on IT-Security and a look into the crystal ball for next year.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3058.en.html
</itunes:summary>
      <itunes:duration>01:32:41</itunes:duration>
    </item>
    <item>
      <title>Tricks: makes you smile (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2992-en-tricks_makes_you_smile</link>
      <description>A collection of engaging techniques, some unreleased and some perhaps forgotten, to make pentesting fun again. From layer 3 attacks that still work, to user interaction based exploits that aren&#39;t &#39;clickjacking&#39;, to local root privilege escalation without exploits and uncommon web application exploitation techniques.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2992.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2992-en-tricks_makes_you_smile.mp4"
        length="295698432"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2992-en-tricks_makes_you_smile.mp4?1399728405</guid>
      <dc:identifier>import-0e7756e1cf99f3e1c5</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Francesco `ascii` Ongaro</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>A clever or ingenious device or expedient; adroit technique: the tricks of the trade.</itunes:subtitle>
      <itunes:summary>A collection of engaging techniques, some unreleased and some perhaps forgotten, to make pentesting fun again. From layer 3 attacks that still work, to user interaction based exploits that aren&#39;t &#39;clickjacking&#39;, to local root privilege escalation without exploits and uncommon web application exploitation techniques.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2992.en.html
</itunes:summary>
      <itunes:duration>00:35:42</itunes:duration>
    </item>
    <item>
      <title>La Quadrature du Net - Campaigning on Telecoms Package (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package</link>
      <description>La Quadrature du Net (Squaring the Net) is a citizen group informing about legislative projects menacing civil liberties as well as economic and social development in the digital age. Supported by international NGOs (EFF, OSI, ORG, Internautas, Netzwerk Freies Wissen, April, etc.), it aims at providing infrastructure for pan-European activism about such topics as network neutrality, privacy, &quot;graduated response&quot;, etc.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2791.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp4"
        length="532676608"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp4?1399728405</guid>
      <dc:identifier>import-f99954a0c2e5a31e9f</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Jérémie Zimmermann, Markus  Beckedahl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Pan-european activism for patching a &quot;pirated&quot; law</itunes:subtitle>
      <itunes:summary>La Quadrature du Net (Squaring the Net) is a citizen group informing about legislative projects menacing civil liberties as well as economic and social development in the digital age. Supported by international NGOs (EFF, OSI, ORG, Internautas, Netzwerk Freies Wissen, April, etc.), it aims at providing infrastructure for pan-European activism about such topics as network neutrality, privacy, &quot;graduated response&quot;, etc.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2791.en.html
</itunes:summary>
      <itunes:duration>01:06:14</itunes:duration>
    </item>
    <item>
      <title>Attacking Rich Internet Applications (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2893-en-attacking_rich_internet_applications</link>
      <description>This presentation will examine the largely underresearched topic of rich internet applications (RIAs) security in the hopes of illustrating how the complex interactions with their executing environment, and general bad security practices, can lead to exploitable applications.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2893.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2893-en-attacking_rich_internet_applications.mp4"
        length="495976448"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2893-en-attacking_rich_internet_applications.mp4?1399728405</guid>
      <dc:identifier>import-c061c38bfc1a4656a5</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Stefano Di Paola, kuza55</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Not your mother&#39;s XSS bugs</itunes:subtitle>
      <itunes:summary>This presentation will examine the largely underresearched topic of rich internet applications (RIAs) security in the hopes of illustrating how the complex interactions with their executing environment, and general bad security practices, can lead to exploitable applications.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2893.en.html
</itunes:summary>
      <itunes:duration>01:01:41</itunes:duration>
    </item>
    <item>
      <title>Not Soy Fast: Genetically Modified, Resource Greedy, and coming to a Supermarket Near You (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you</link>
      <description>Soy is the magic ingredient that we often look to for our alternative, healthier, and more responsible diets. Yet the soy industry, with its boom in profits and global reach, behaves the exact opposite way.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2680.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp4"
        length="387973120"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp4?1399728405</guid>
      <dc:identifier>import-2d0ce4e9cfeb6f9f7d</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Bicyclemark</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>The silent march of the multinational GMO soy industry and its growing power in South America, the EU, and around the World.</itunes:subtitle>
      <itunes:summary>Soy is the magic ingredient that we often look to for our alternative, healthier, and more responsible diets. Yet the soy industry, with its boom in profits and global reach, behaves the exact opposite way.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2680.en.html
</itunes:summary>
      <itunes:duration>00:48:09</itunes:duration>
    </item>
    <item>
      <title>Security and anonymity vulnerabilities in Tor (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor</link>
      <description>There have been a number of exciting bugs and design flaws in Tor over the years, with effects ranging from complete anonymity compromise to remote code execution. Some of them are our fault, and some are the fault of components (libraries, browsers, operating systems) that we trusted. Further, the academic research community has been coming up with increasingly esoteric – and increasingly effective! – attacks against all anonymity designs, including Tor.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2977.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4"
        length="501219328"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4?1399728405</guid>
      <dc:identifier>import-185c5941b7063fd2b7</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Roger Dingledine</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Past, present, and future </itunes:subtitle>
      <itunes:summary>There have been a number of exciting bugs and design flaws in Tor over the years, with effects ranging from complete anonymity compromise to remote code execution. Some of them are our fault, and some are the fault of components (libraries, browsers, operating systems) that we trusted. Further, the academic research community has been coming up with increasingly esoteric – and increasingly effective! – attacks against all anonymity designs, including Tor.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2977.en.html
</itunes:summary>
      <itunes:duration>01:02:18</itunes:duration>
    </item>
    <item>
      <title>Vertex Hacking (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2942-de-vertex_hacking</link>
      <description>Es geht um die Methoden beim Umgang mit unbekannten Dateiformaten, speziell im Bereich der 3D-Modelle. Vorgestellt werden sollen die Werkzeuge, die Vorgehensweise, ein paar mögliche Fallstricke, interessante Implementierungsdetails und schlussendlich auch das Ergebnis in Form der Bibliothek libg3d.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2942.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2942-de-vertex_hacking.mp4"
        length="394264576"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2942-de-vertex_hacking.mp4?1399728405</guid>
      <dc:identifier>import-497322ce1a89f08a20</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Markus Dahms</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Reverse Engineering von 3D-Dateiformaten</itunes:subtitle>
      <itunes:summary>Es geht um die Methoden beim Umgang mit unbekannten Dateiformaten, speziell im Bereich der 3D-Modelle. Vorgestellt werden sollen die Werkzeuge, die Vorgehensweise, ein paar mögliche Fallstricke, interessante Implementierungsdetails und schlussendlich auch das Ergebnis in Form der Bibliothek libg3d.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2942.en.html
</itunes:summary>
      <itunes:duration>00:48:56</itunes:duration>
    </item>
    <item>
      <title>Wikileaks (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2916-en-wikileaks</link>
      <description>Wikileaks is developing an uncensorable Wikipedia for untraceable mass document leaking and analysis. In the past year, Wikileaks has publicly revealed more sensitive military documents than the entire world&#39;s press combined. Its mission has been quite successful after the launch, spawning reportage worldwide and effectively helping to bring about reform on important matters based on factual information. As of now the effort has spawned thousands of press references in major newspapers like The NY Times, The Guardian and the BBC, and tens of thousands in blog posts.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2916.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2916-en-wikileaks.mp4"
        length="471859200"
        type="video/mp4"/>
      <pubDate>Tue, 30 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2916-en-wikileaks.mp4?1399728405</guid>
      <dc:identifier>import-b01de4e5ea4f6f641f</dc:identifier>
      <dc:date>2008-12-30T01:00:00+01:00</dc:date>
      <itunes:author>wikileaks</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Wikileaks vs. the World</itunes:subtitle>
      <itunes:summary>Wikileaks is developing an uncensorable Wikipedia for untraceable mass document leaking and analysis. In the past year, Wikileaks has publicly revealed more sensitive military documents than the entire world&#39;s press combined. Its mission has been quite successful after the launch, spawning reportage worldwide and effectively helping to bring about reform on important matters based on factual information. As of now the effort has spawned thousands of press references in major newspapers like The NY Times, The Guardian and the BBC, and tens of thousands in blog posts.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2916.en.html
</itunes:summary>
      <itunes:duration>00:58:36</itunes:duration>
    </item>
    <item>
      <title>Messing Around with Garage Doors (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3030-en-messing_around_with_garage_doors</link>
      <description>We demonstrate a complete break of the KeeLoq crypto-system. Thanks to Power Analysis, even non-specialists can gain access to objects secured by a KeeLoq access control system.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3030.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3030-en-messing_around_with_garage_doors.mp4"
        length="615514112"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3030-en-messing_around_with_garage_doors.mp4?1399728404</guid>
      <dc:identifier>import-2d1502d5b973b7f55d</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Timo Kasper, Thomas  Eisenbarth</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Breaking Remote Keyless Entry Systems with Power Analysis</itunes:subtitle>
      <itunes:summary>We demonstrate a complete break of the KeeLoq crypto-system. Thanks to Power Analysis, even non-specialists can gain access to objects secured by a KeeLoq access control system.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3030.en.html
</itunes:summary>
      <itunes:duration>01:16:43</itunes:duration>
    </item>
    <item>
      <title>Collapsing the European security architecture (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2669-en-collapsing_the_european_security_architecture</link>
      <description>At the latest since 9/11, the EU took severe changes in their home affairs policy. New agreements and institutions were created to facilitate police networking (Europol, Frontex, CEPOL, new databases and their shared access). The european &quot;cross border crime fighting&quot; has become an EU framework. Providing that this should help to win a &quot;war on terrorism&quot;, lots of the changes follow the US model of &quot;Homeland Security&quot;. Risks&quot; should be minimized by taking more and more &quot;proactive&quot; measures and foresee possible &quot;threats&quot;. 

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2669.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2669-en-collapsing_the_european_security_architecture.mp4"
        length="470810624"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2669-en-collapsing_the_european_security_architecture.mp4?1399728404</guid>
      <dc:identifier>import-ab5825f2382abe8af8</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Gipfelsoli</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>More security-critical behaviour in Europe!</itunes:subtitle>
      <itunes:summary>At the latest since 9/11, the EU took severe changes in their home affairs policy. New agreements and institutions were created to facilitate police networking (Europol, Frontex, CEPOL, new databases and their shared access). The european &quot;cross border crime fighting&quot; has become an EU framework. Providing that this should help to win a &quot;war on terrorism&quot;, lots of the changes follow the US model of &quot;Homeland Security&quot;. Risks&quot; should be minimized by taking more and more &quot;proactive&quot; measures and foresee possible &quot;threats&quot;. 

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2669.en.html
</itunes:summary>
      <itunes:duration>00:58:33</itunes:duration>
    </item>
    <item>
      <title>DECT (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2937-en-dect</link>
      <description>Digital Enhanced Cordless Telecommunications (DECT) is a synonym for cordless phones today. Although DECT can be found nearly everywhere, only little is known about the security of DECT. Most parts of the DECT standard are public, but all cryptographic algorithms used in DECT (authentication and encryption) are secret and not known to the public. Nevertheless we decided to investigate the security of DECT closer ...

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2937.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2937-en-dect.mp4"
        length="537919488"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2937-en-dect.mp4?1399728404</guid>
      <dc:identifier>import-e12b39e63d03acfbf4</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Erik Tews, Ralf-Philipp Weinmann, Andreas Schuler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>The Digital Enhanced Cordless Telecommunications standard</itunes:subtitle>
      <itunes:summary>Digital Enhanced Cordless Telecommunications (DECT) is a synonym for cordless phones today. Although DECT can be found nearly everywhere, only little is known about the security of DECT. Most parts of the DECT standard are public, but all cryptographic algorithms used in DECT (authentication and encryption) are secret and not known to the public. Nevertheless we decided to investigate the security of DECT closer ...

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2937.en.html
</itunes:summary>
      <itunes:duration>01:06:58</itunes:duration>
    </item>
    <item>
      <title>Just Estonia and Georgia? (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2988-en-just_estonia_and_georgia</link>
      <description>Estonia and Georgia are just two examples of where global scale cooperation is required for handling security incidents on the Internet.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2988.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2988-en-just_estonia_and_georgia.mp4"
        length="359661568"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2988-en-just_estonia_and_georgia.mp4?1399728404</guid>
      <dc:identifier>import-8ecd8b7acd149ff6d1</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Gadi Evron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Culture</itunes:keywords>
      <itunes:subtitle>Global-scale Incident Response and Responders</itunes:subtitle>
      <itunes:summary>Estonia and Georgia are just two examples of where global scale cooperation is required for handling security incidents on the Internet.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2988.en.html
</itunes:summary>
      <itunes:duration>00:44:45</itunes:duration>
    </item>
    <item>
      <title>Fnord News Show (English interpretation) (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3056-en-fnord_news_show_english_interpretation</link>
      <description>English Interpretation and video transmission of the event in Saal 1

This year&#39;s apocalyptic Fnord-review will include the war in Georgia and the financial-crisis. We try to web the events into a kind of mega-conspiracy, so that only one group (or probably two or three) are guilty.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3056.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3056-en-fnord_news_show_english_interpretation.mp4"
        length="404750336"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3056-en-fnord_news_show_english_interpretation.mp4?1399728404</guid>
      <dc:identifier>import-8b20cfda021d808986</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Felix von Leitner, Frank Rieger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>We help in seeing teh Fnords</itunes:subtitle>
      <itunes:summary>English Interpretation and video transmission of the event in Saal 1

This year&#39;s apocalyptic Fnord-review will include the war in Georgia and the financial-crisis. We try to web the events into a kind of mega-conspiracy, so that only one group (or probably two or three) are guilty.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3056.en.html
</itunes:summary>
      <itunes:duration>00:50:21</itunes:duration>
    </item>
    <item>
      <title>Climate Change - State of the Science (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2863-en-climate_change_-_state_of_the_science</link>
      <description>We are in the midst of a major global warming, as witnessed not just by temperature measurements, but also for example by the record loss of Arctic sea ice in 2007 and 2008. This year, both the Northwest Passage and the Northeast Passage in the Arctic were open for ships to pass through for the first time in living memory.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2863.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2863-en-climate_change_-_state_of_the_science.mp4"
        length="520093696"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2863-en-climate_change_-_state_of_the_science.mp4?1399728404</guid>
      <dc:identifier>import-29c8513b5ebcac13d0</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Rahmstorf</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Science</itunes:keywords>
      <itunes:summary>We are in the midst of a major global warming, as witnessed not just by temperature measurements, but also for example by the record loss of Arctic sea ice in 2007 and 2008. This year, both the Northwest Passage and the Northeast Passage in the Arctic were open for ships to pass through for the first time in living memory.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2863.en.html
</itunes:summary>
      <itunes:duration>01:04:44</itunes:duration>
    </item>
    <item>
      <title>The Privacy Workshop Project (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2872-en-the_privacy_workshop_project</link>
      <description>The lecture intends to give an overview of the Privacy Workshop project started in Siegen (NRW, Germany) and to animate listeners to participate in the project.

Update 2008-12-30: we finally put the slides online, but there are still some cc-license tags that need to be fixed for the last pictures. The flickr-links are ok though, so please don&#39;t moan and stay tuned :)

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2872.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2872-en-the_privacy_workshop_project.mp4"
        length="390070272"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2872-en-the_privacy_workshop_project.mp4?1399728404</guid>
      <dc:identifier>import-f1d0a60134429a1004</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Christoph Brüning, Kai Schubert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Enhancing the value of privacy in todays students view</itunes:subtitle>
      <itunes:summary>The lecture intends to give an overview of the Privacy Workshop project started in Siegen (NRW, Germany) and to animate listeners to participate in the project.

Update 2008-12-30: we finally put the slides online, but there are still some cc-license tags that need to be fixed for the last pictures. The flickr-links are ok though, so please don&#39;t moan and stay tuned :)

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2872.en.html
</itunes:summary>
      <itunes:duration>00:48:24</itunes:duration>
    </item>
    <item>
      <title>Embracing Post-Privacy (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2979-en-embracing_post-privacy</link>
      <description>The breaking away of privacy in the digital world is often understood as something dangerous, and for good reasons. But could there be opportunities in it, too? Do the current cultural and technological trends only dissolve the protected area of privacy, or could they dissolve as well the pressures that privacy is supposed to liberate us from? What if we witness a transformation of civilization so profound that terms like &quot;private&quot; and &quot;public&quot; lose their meaning altogether? Maybe we won&#39;t need &quot;privacy&quot; at all in the future because we will value other, new liberties more strongly?

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2979.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2979-en-embracing_post-privacy.mp4"
        length="478150656"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2979-en-embracing_post-privacy.mp4?1399728404</guid>
      <dc:identifier>import-0bf8f4e066793d6e49</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Christian Heller / plomlompom</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Optimism towards a future where there is &quot;Nothing to hide&quot;</itunes:subtitle>
      <itunes:summary>The breaking away of privacy in the digital world is often understood as something dangerous, and for good reasons. But could there be opportunities in it, too? Do the current cultural and technological trends only dissolve the protected area of privacy, or could they dissolve as well the pressures that privacy is supposed to liberate us from? What if we witness a transformation of civilization so profound that terms like &quot;private&quot; and &quot;public&quot; lose their meaning altogether? Maybe we won&#39;t need &quot;privacy&quot; at all in the future because we will value other, new liberties more strongly?

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2979.en.html
</itunes:summary>
      <itunes:duration>00:59:31</itunes:duration>
    </item>
    <item>
      <title>Cracking the MSP430 BSL (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2839-en-cracking_the_msp430_bsl</link>
      <description>The Texas Instruments MSP430 low-power microcontroller is used in many medical, industrial, and consumer devices.  When its JTAG fuse is blown, the device&#39;s firmware is kept private only a serial bootstrap loader (BSL), certain revisions of which are vulnerable to a side-channel timing analysis attack.  This talk continues that from Black Hat USA by describing the speaker&#39;s adventures in creating a hardware device for exploiting this vulnerability.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2839.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2839-en-cracking_the_msp430_bsl.mp4"
        length="301989888"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2839-en-cracking_the_msp430_bsl.mp4?1399728407</guid>
      <dc:identifier>import-d5861b6d900f059aee</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Travis Goodspeed</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Part Two</itunes:subtitle>
      <itunes:summary>The Texas Instruments MSP430 low-power microcontroller is used in many medical, industrial, and consumer devices.  When its JTAG fuse is blown, the device&#39;s firmware is kept private only a serial bootstrap loader (BSL), certain revisions of which are vulnerable to a side-channel timing analysis attack.  This talk continues that from Black Hat USA by describing the speaker&#39;s adventures in creating a hardware device for exploiting this vulnerability.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2839.en.html
</itunes:summary>
      <itunes:duration>00:37:27</itunes:duration>
    </item>
    <item>
      <title>Building an international movement: hackerspaces.org (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2806-en-building_an_international_movement_hackerspacesorg</link>
      <description>We live in interesting times to build hacker spaces: physical spaces where hackers make things, inspired by European models, pop up everywhere. Whether you need inspiration to build your own hacker space or want an update on what happened in places like New York City, Washington D.C., San Francisco, or Vienna since last year: This international panel will provide you with insight.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2806.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2806-en-building_an_international_movement_hackerspacesorg.mp4"
        length="527433728"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2806-en-building_an_international_movement_hackerspacesorg.mp4?1399728407</guid>
      <dc:identifier>import-a7dc5a6ad09460f44a</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Bre, Nick Farr, Jens Ohlig, Jacob Appelbaum, Philippe Langlois, Enki</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:subtitle>What we did so far. What will happen in the future.</itunes:subtitle>
      <itunes:summary>We live in interesting times to build hacker spaces: physical spaces where hackers make things, inspired by European models, pop up everywhere. Whether you need inspiration to build your own hacker space or want an update on what happened in places like New York City, Washington D.C., San Francisco, or Vienna since last year: This international panel will provide you with insight.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2806.en.html
</itunes:summary>
      <itunes:duration>01:05:39</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day2 (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3048-en-lightning_talks_day2</link>
      <description>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3048.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3048-en-lightning_talks_day2.mp4"
        length="412090368"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3048-en-lightning_talks_day2.mp4?1399728407</guid>
      <dc:identifier>import-eab00fd4fdb8216e98</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Sven Guckes, Oliver Pritzkow</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:subtitle>4 minutes of fame</itunes:subtitle>
      <itunes:summary>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3048.en.html
</itunes:summary>
      <itunes:duration>00:51:18</itunes:duration>
    </item>
    <item>
      <title>Rapid Prototype Your Life (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3015-en-rapid_prototype_your_life</link>
      <description>The tools are at hand to free you from the bonds of consumer slavery. No longer must you rely on distant and faceless factories or bow down before the false idols of mass produced consumer manufactured items. Never again look into the aisles of oblivion filled with mass produced products. Take rapid prototype manufacturing into your life and return to a time before corporations robbed you of our individualism. A cottage industry paradise awaits those with the digital skills and the means to acquire or build the machines that can actualize the items that exist now only in your imagination.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3015.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3015-en-rapid_prototype_your_life.mp4"
        length="458227712"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3015-en-rapid_prototype_your_life.mp4?1399728407</guid>
      <dc:identifier>import-b35a85644d71ff9bab</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Bre</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Making</itunes:keywords>
      <itunes:subtitle>The time is now to make anything you can imagine</itunes:subtitle>
      <itunes:summary>The tools are at hand to free you from the bonds of consumer slavery. No longer must you rely on distant and faceless factories or bow down before the false idols of mass produced consumer manufactured items. Never again look into the aisles of oblivion filled with mass produced products. Take rapid prototype manufacturing into your life and return to a time before corporations robbed you of our individualism. A cottage industry paradise awaits those with the digital skills and the means to acquire or build the machines that can actualize the items that exist now only in your imagination.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3015.en.html
</itunes:summary>
      <itunes:duration>00:57:00</itunes:duration>
    </item>
    <item>
      <title>All your base(s) are belong to us (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3044-en-all_your_bases_are_belong_to_us</link>
      <description>New DNA genotyping and sequencing technologies have recently advanced the possibilities for both mass and individual genomics by several orders of magnitude. The personal genome on DVD, genetic analysis of entire populations, and government DNA databases are but a few of the results of this process. The field is still accelerating, and the related computational challenges are enormous.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3044.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3044-en-all_your_bases_are_belong_to_us.mp4"
        length="446693376"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3044-en-all_your_bases_are_belong_to_us.mp4?1399728407</guid>
      <dc:identifier>import-1750405b344a79e865</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Magnus Manske</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Science</itunes:keywords>
      <itunes:subtitle>Dawn of the high-throughput DNA sequencing era</itunes:subtitle>
      <itunes:summary>New DNA genotyping and sequencing technologies have recently advanced the possibilities for both mass and individual genomics by several orders of magnitude. The personal genome on DVD, genetic analysis of entire populations, and government DNA databases are but a few of the results of this process. The field is still accelerating, and the related computational challenges are enormous.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3044.en.html
</itunes:summary>
      <itunes:duration>00:55:30</itunes:duration>
    </item>
    <item>
      <title>U23 (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2827-de-u23</link>
      <description>Organize and operate a workshop for young people. Show them how your hackerspace works. Gain their attraction in having fun with hardware, electronics, microprocessors, software or hacking. Become known to new persons. Create networks of brains for new, cool projects.  Let them experience the amazing power of teamwork!

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2827.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2827-de-u23.mp4"
        length="401604608"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2827-de-u23.mp4?1399728407</guid>
      <dc:identifier>import-d1037d2e423d87a070</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>fd0, Lars Weiler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:subtitle>The Hackerspace&#39;s Junior Academy</itunes:subtitle>
      <itunes:summary>Organize and operate a workshop for young people. Show them how your hackerspace works. Gain their attraction in having fun with hardware, electronics, microprocessors, software or hacking. Become known to new persons. Create networks of brains for new, cool projects.  Let them experience the amazing power of teamwork!

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2827.en.html
</itunes:summary>
      <itunes:duration>00:49:56</itunes:duration>
    </item>
    <item>
      <title>Exploiting Symbian (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2832-en-exploiting_symbian</link>
      <description>SymbianOS is one of the major smart phone operating system and has been around for many years still exploitation has not been researched yet. The lack of proper exploitation techniques is mostly due to the fact that until the recent introduction of PIPS/OpenC (a POSIX API port) SymbianOS did not have the means for programmers to EASILY write insecure code.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2832.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2832-en-exploiting_symbian.mp4"
        length="506462208"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2832-en-exploiting_symbian.mp4?1399728407</guid>
      <dc:identifier>import-917cdb83621321eb8e</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Collin Mulliner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Symbian Exploit and Shellcode Development</itunes:subtitle>
      <itunes:summary>SymbianOS is one of the major smart phone operating system and has been around for many years still exploitation has not been researched yet. The lack of proper exploitation techniques is mostly due to the fact that until the recent introduction of PIPS/OpenC (a POSIX API port) SymbianOS did not have the means for programmers to EASILY write insecure code.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2832.en.html
</itunes:summary>
      <itunes:duration>01:03:04</itunes:duration>
    </item>
    <item>
      <title>Datenpannen (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2814-de-datenpannen</link>
      <description>Wer nichts zu verbergen hat, hat nichts zu befürchten? Die zuständigen Mitarbeiter halten sich strikt an das Gesetz? Überwachung hat für die Betroffenen keine negativen Folgen? Im Jahr 2008 sind diese Irrtümer so häufig widerlegt worden wie noch nie: Datenskandale bei LIDL, Telekom und dutzenden anderen, per Internet zugängliche Meldedaten, Massenverkauf von Bank- und Telefondaten – eine Liste ohne Ende im Datenskandaljahr 2008.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2814.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2814-de-datenpannen.mp4"
        length="425721856"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2814-de-datenpannen.mp4?1399728407</guid>
      <dc:identifier>import-34e9b068fe2dc20234</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Constanze Kurz, Patrick  Breyer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Forderungen nach dem Jahr der Datenverbrechen</itunes:subtitle>
      <itunes:summary>Wer nichts zu verbergen hat, hat nichts zu befürchten? Die zuständigen Mitarbeiter halten sich strikt an das Gesetz? Überwachung hat für die Betroffenen keine negativen Folgen? Im Jahr 2008 sind diese Irrtümer so häufig widerlegt worden wie noch nie: Datenskandale bei LIDL, Telekom und dutzenden anderen, per Internet zugängliche Meldedaten, Massenverkauf von Bank- und Telefondaten – eine Liste ohne Ende im Datenskandaljahr 2008.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2814.en.html
</itunes:summary>
      <itunes:duration>00:52:53</itunes:duration>
    </item>
    <item>
      <title>Advanced memory forensics: The Cold Boot Attacks (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks</link>
      <description>Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2922.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp4"
        length="471859200"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp4?1399728406</guid>
      <dc:identifier>import-0ec6cf83fd3d4ca115</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Jacob Appelbaum</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Recovering keys and other secrets after power off</itunes:subtitle>
      <itunes:summary>Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2922.en.html
</itunes:summary>
      <itunes:duration>00:58:36</itunes:duration>
    </item>
    <item>
      <title>Privacy in the social semantic web (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2873-en-privacy_in_the_social_semantic_web</link>
      <description>[[ Thank you all for your feedback. I currently register some hacking space on berlios.de so we can have a mailing list and maybe a wiki! please contact me at: jan.heuer &lt;&lt;ät&lt;&lt; uni-muenster.de ]]
In the last years the static web has moved towards an interactive web – often referred to as the web2.0. People collaboratively write articles in online encyclopedias like Wikipedia or self-portray themselves with profiles in social networks like Myspace. Delicious allows people to tag their bookmarks and share them with friends. Twitter is a short status message service to tell friends what you&#39;re doing right now. The diversity of applications attracts a huge amount of users and the application can be used from any computer.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2873.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2873-en-privacy_in_the_social_semantic_web.mp4"
        length="370147328"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2873-en-privacy_in_the_social_semantic_web.mp4?1399728406</guid>
      <dc:identifier>import-5ab5826041703c25db</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Jan Torben</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Science</itunes:keywords>
      <itunes:subtitle>Social networks based on XMPP</itunes:subtitle>
      <itunes:summary>[[ Thank you all for your feedback. I currently register some hacking space on berlios.de so we can have a mailing list and maybe a wiki! please contact me at: jan.heuer &lt;&lt;ät&lt;&lt; uni-muenster.de ]]
In the last years the static web has moved towards an interactive web – often referred to as the web2.0. People collaboratively write articles in online encyclopedias like Wikipedia or self-portray themselves with profiles in social networks like Myspace. Delicious allows people to tag their bookmarks and share them with friends. Twitter is a short status message service to tell friends what you&#39;re doing right now. The diversity of applications attracts a huge amount of users and the application can be used from any computer.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2873.en.html
</itunes:summary>
      <itunes:duration>00:45:57</itunes:duration>
    </item>
    <item>
      <title>Beyond Asimov - Laws for Robots (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2815-en-beyond_asimov_-_laws_for_robots</link>
      <description>Robotic systems become more and more autonomous, and telepresence develops very rapidly. But what happens if things go wrong? Who is responsible for that autonomous cleaning car murdering tourists? How can you identify the owner of that spy-drone filming you naked at the pool? This talk outlines some ideas to trigger a debate on how to deal with these problems, without stifling innovation and fun.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2815.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2815-en-beyond_asimov_-_laws_for_robots.mp4"
        length="397410304"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2815-en-beyond_asimov_-_laws_for_robots.mp4?1399728406</guid>
      <dc:identifier>import-8397d9a280bad60e5c</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rieger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Developing rules for autonomous systems</itunes:subtitle>
      <itunes:summary>Robotic systems become more and more autonomous, and telepresence develops very rapidly. But what happens if things go wrong? Who is responsible for that autonomous cleaning car murdering tourists? How can you identify the owner of that spy-drone filming you naked at the pool? This talk outlines some ideas to trigger a debate on how to deal with these problems, without stifling innovation and fun.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2815.en.html
</itunes:summary>
      <itunes:duration>00:49:22</itunes:duration>
    </item>
    <item>
      <title>Console Hacking 2008: Wii Fail (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2799-en-console_hacking_2008_wii_fail</link>
      <description>The Nintendo Wii game console has been one of the most popular of all time, selling almost as many units as all of its competitors combined. Despite being cheaper than the PS3 and Xbox360, it contains a sophisticated security architecture that withstood over a year of concerted effort to hack the device. The design itself is impressive; unfortunately, flaws in the implementation (both subtle and severe) render the device easily hacked, with little chance of recovery.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2799.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2799-en-console_hacking_2008_wii_fail.mp4"
        length="455081984"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2799-en-console_hacking_2008_wii_fail.mp4?1399728406</guid>
      <dc:identifier>import-317788719156ce0058</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>bushing, marcan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Is implementation the enemy of design?</itunes:subtitle>
      <itunes:summary>The Nintendo Wii game console has been one of the most popular of all time, selling almost as many units as all of its competitors combined. Despite being cheaper than the PS3 and Xbox360, it contains a sophisticated security architecture that withstood over a year of concerted effort to hack the device. The design itself is impressive; unfortunately, flaws in the implementation (both subtle and severe) render the device easily hacked, with little chance of recovery.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2799.en.html
</itunes:summary>
      <itunes:duration>00:56:35</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day3 - Morning (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3047-en-lightning_talks_day3_morning</link>
      <description>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3047.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3047-en-lightning_talks_day3_morning.mp4"
        length="478150656"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3047-en-lightning_talks_day3_morning.mp4?1399728406</guid>
      <dc:identifier>import-ca6f5d093629dafe46</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Sven Guckes, Oliver Pritzkow</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Community</itunes:keywords>
      <itunes:subtitle>4 minutes of fame</itunes:subtitle>
      <itunes:summary>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3047.en.html
</itunes:summary>
      <itunes:duration>00:59:29</itunes:duration>
    </item>
    <item>
      <title>FAIFA: A first open source PLC tool (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2901-en-faifa_a_first_open_source_plc_tool</link>
      <description>PLC (PowerLineCommunications) had been widely used currently for the in-home LANs and for Internet access over PowerLineCommunications based on the market standard called HomePlug. Electricity is a great medium to transport data over existing cables in-home and outdoor but gives the network an old-school flavor of the behaviour of the hub where all stations share the medium. In this lecture, we present the freshly released FAIFA open source software that can be used to audit the security of PLC networks and script some flawnesses of the PLC devices.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2901.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2901-en-faifa_a_first_open_source_plc_tool.mp4"
        length="402653184"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2901-en-faifa_a_first_open_source_plc_tool.mp4?1399728406</guid>
      <dc:identifier>import-459d6b860d035d66e1</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Florian, Xavier Carcelle</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>PowerLineCommunications has now their open source tool</itunes:subtitle>
      <itunes:summary>PLC (PowerLineCommunications) had been widely used currently for the in-home LANs and for Internet access over PowerLineCommunications based on the market standard called HomePlug. Electricity is a great medium to transport data over existing cables in-home and outdoor but gives the network an old-school flavor of the behaviour of the hub where all stations share the medium. In this lecture, we present the freshly released FAIFA open source software that can be used to audit the security of PLC networks and script some flawnesses of the PLC devices.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2901.en.html
</itunes:summary>
      <itunes:duration>00:50:03</itunes:duration>
    </item>
    <item>
      <title>The Trust Situation (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2665-en-the_trust_situation</link>
      <description>In many social situations, people start to adjust their behaviour due to surveillance. Inspired by more and more cases of breaches of data protection regulations, an erosion of trust into these regulations and those who forfeit them can be seen. The consequences of this are grim. Either we abolish surveillance technologies or the idea of &quot;informational self-determination&quot;. 

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2665.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2665-en-the_trust_situation.mp4"
        length="488636416"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2665-en-the_trust_situation.mp4?1399728406</guid>
      <dc:identifier>import-4f7a969a95ecf90750</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Sandro  Gaycken</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Why the idea of data protection slowly turns out to be defective</itunes:subtitle>
      <itunes:summary>In many social situations, people start to adjust their behaviour due to surveillance. Inspired by more and more cases of breaches of data protection regulations, an erosion of trust into these regulations and those who forfeit them can be seen. The consequences of this are grim. Either we abolish surveillance technologies or the idea of &quot;informational self-determination&quot;. 

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2665.en.html
</itunes:summary>
      <itunes:duration>01:00:47</itunes:duration>
    </item>
    <item>
      <title>Security Failures in Smart Card Payment Systems (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2953-en-security_failures_in_smart_card_payment_systems</link>
      <description>PIN entry devices (PED) are used in the Chip &amp; PIN (EMV) system to process customers&#39; card details and PINs in stores world-wide. Because of the highly sensitive information they handle, PEDs are subject to an extensive security evaluation procedure. We have demonstrated that the tamper protection of two popular PEDs can be easily circumvented with a paperclip, some basic technical skills, and off-the-shelf electronics.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2953.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2953-en-security_failures_in_smart_card_payment_systems.mp4"
        length="472907776"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2953-en-security_failures_in_smart_card_payment_systems.mp4?1399728406</guid>
      <dc:identifier>import-ec1c4bafaa3e2f5449</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Steven J. Murdoch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Tampering the Tamper-Proof</itunes:subtitle>
      <itunes:summary>PIN entry devices (PED) are used in the Chip &amp; PIN (EMV) system to process customers&#39; card details and PINs in stores world-wide. Because of the highly sensitive information they handle, PEDs are subject to an extensive security evaluation procedure. We have demonstrated that the tamper protection of two popular PEDs can be easily circumvented with a paperclip, some basic technical skills, and off-the-shelf electronics.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2953.en.html
</itunes:summary>
      <itunes:duration>00:58:48</itunes:duration>
    </item>
    <item>
      <title>Der Hackerparagraph 202c StGB (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3028-de-der_hackerparagraph_202c_stgb</link>
      <description>Es wird Zeit, dass wir mal über die Dinge sprechen, die wir seit dem Inkrafttreten des Hackerparagraphen nicht mehr machen können.
Und die Dinge, bei denen wir uns nicht sicher sind, ob wir sie machen können, und daher lieber sein lassen.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3028.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3028-de-der_hackerparagraph_202c_stgb.mp4"
        length="492830720"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3028-de-der_hackerparagraph_202c_stgb.mp4?1399728406</guid>
      <dc:identifier>import-5386a3e6361b34fd2c</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Felix von Leitner, Jürgen Schmidt, Jan Münther, lexi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Bestandsaufnahme und Auswirkungen</itunes:subtitle>
      <itunes:summary>Es wird Zeit, dass wir mal über die Dinge sprechen, die wir seit dem Inkrafttreten des Hackerparagraphen nicht mehr machen können.
Und die Dinge, bei denen wir uns nicht sicher sind, ob wir sie machen können, und daher lieber sein lassen.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3028.en.html
</itunes:summary>
      <itunes:duration>01:01:18</itunes:duration>
    </item>
    <item>
      <title>Hacking the iPhone (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2976-en-hacking_the_iphone</link>
      <description>Apple&#39;s iPhone has made a tremendous impact on the smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing to run third-party applications unauthorized by Apple and using the devices on carriers not approved by Apple.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2976.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2976-en-hacking_the_iphone.mp4"
        length="469762048"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2976-en-hacking_the_iphone.mp4?1399728406</guid>
      <dc:identifier>import-c748bf74c4d26f8d7e</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>MuscleNerd, pytey, planetbeing</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Pwning Apple&#39;s Mobile Internet Device</itunes:subtitle>
      <itunes:summary>Apple&#39;s iPhone has made a tremendous impact on the smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing to run third-party applications unauthorized by Apple and using the devices on carriers not approved by Apple.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2976.en.html
</itunes:summary>
      <itunes:duration>00:58:24</itunes:duration>
    </item>
    <item>
      <title>Erich Mühsams Tagebücher in der Festungshaft (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft</link>
      <description>Während seiner Festungshaft (1920-1924) wurden dem Dichter und Anarchisten Erich Mühsam mehrfach die Tagebücher konfisziert, ausgewertet und (teils öffentlich) gegen ihn verwendet. 

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2807.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp4"
        length="417333248"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp4?1399728406</guid>
      <dc:identifier>import-c79f29b863ed441daf</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Johannes Ullmaier</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Ein Idylle aus der Analogsteinzeit der Überwachung</itunes:subtitle>
      <itunes:summary>Während seiner Festungshaft (1920-1924) wurden dem Dichter und Anarchisten Erich Mühsam mehrfach die Tagebücher konfisziert, ausgewertet und (teils öffentlich) gegen ihn verwendet. 

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2807.en.html
</itunes:summary>
      <itunes:duration>00:51:49</itunes:duration>
    </item>
    <item>
      <title>Fnord News Show (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2812-de-fnord_news_show</link>
      <description>Das wird dieses Jahr ein apokalyptischer Fnord-Rückblick inklusive Georgien-Krieg und Finanzkrise. Wir versuchen, die Geschehnisse in eine Art Mega-Verschwörungstheorie zu weben, sodass eine Gruppe (oder vielleicht zwei oder drei) an allem schuld sind.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2812.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2812-de-fnord_news_show.mp4"
        length="404750336"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2812-de-fnord_news_show.mp4?1399728406</guid>
      <dc:identifier>import-e1bb0bdd72e1b3b9c2</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rieger, Felix von Leitner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Wir helfen Euch, die Fnords zu sehen</itunes:subtitle>
      <itunes:summary>Das wird dieses Jahr ein apokalyptischer Fnord-Rückblick inklusive Georgien-Krieg und Finanzkrise. Wir versuchen, die Geschehnisse in eine Art Mega-Verschwörungstheorie zu weben, sodass eine Gruppe (oder vielleicht zwei oder drei) an allem schuld sind.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2812.en.html
</itunes:summary>
      <itunes:duration>00:50:17</itunes:duration>
    </item>
    <item>
      <title>TCP Denial of Service Vulnerabilities (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2909-en-tcp_denial_of_service_vulnerabilities</link>
      <description>The Transmission Control Protocol (TCP) is one of the fundamental protocols used in today&#39;s communication networks. Recently, there has been an increased discussion on possible Denial of Service attacks against TCP-based services, which has largely been triggered by the partial disclosure of several vulnerabilities by the security company Outpost24. This talk will present several TCP vulnerabilities in an attempt to find out just what they found.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2909.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp4"
        length="245366784"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp4?1399728405</guid>
      <dc:identifier>import-f363beb3e33d37dcf1</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Fabian Yamaguchi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Accepting the Partial Disclosure Challenge</itunes:subtitle>
      <itunes:summary>The Transmission Control Protocol (TCP) is one of the fundamental protocols used in today&#39;s communication networks. Recently, there has been an increased discussion on possible Denial of Service attacks against TCP-based services, which has largely been triggered by the partial disclosure of several vulnerabilities by the security company Outpost24. This talk will present several TCP vulnerabilities in an attempt to find out just what they found.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2909.en.html
</itunes:summary>
      <itunes:duration>00:30:29</itunes:duration>
    </item>
    <item>
      <title>eVoting after Nedap and Digital Pen (25c3)</title>
      <link>https://media.ccc.de/v/25c3-3041-en-evoting_after_nedap_and_digital_pen</link>
      <description>Cryptographic methods have been suggested as a solution of the transparency and auditability issues in electronic voting. This talk introduces some of the suggested approaches and explains why such methods replace one issue with another, rather than fixing it.  

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3041.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3041-en-evoting_after_nedap_and_digital_pen.mp4"
        length="523239424"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3041-en-evoting_after_nedap_and_digital_pen.mp4?1399728405</guid>
      <dc:identifier>import-344183234c859e8d21</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Ulrich Wiesner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Why cryptography might not fix the issue of transparent elections</itunes:subtitle>
      <itunes:summary>Cryptographic methods have been suggested as a solution of the transparency and auditability issues in electronic voting. This talk introduces some of the suggested approaches and explains why such methods replace one issue with another, rather than fixing it.  

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3041.en.html
</itunes:summary>
      <itunes:duration>01:05:07</itunes:duration>
    </item>
    <item>
      <title>Chip Reverse Engineering (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2896-en-chip_reverse_engineering</link>
      <description>Cryptographic algorithms are often kept secret in the false belief that this provides security. To find and analyze these algorithms, we reverse-engineering the silicon chips that implement them.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2896.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2896-en-chip_reverse_engineering.mp4"
        length="361758720"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2896-en-chip_reverse_engineering.mp4?1399728405</guid>
      <dc:identifier>import-46ee25357ca568906f</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Karsten Nohl, starbug</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>Cryptographic algorithms are often kept secret in the false belief that this provides security. To find and analyze these algorithms, we reverse-engineering the silicon chips that implement them.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2896.en.html
</itunes:summary>
      <itunes:duration>00:44:56</itunes:duration>
    </item>
    <item>
      <title>Neusprech im Überwachungsstaat (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2860-de-neusprech_im_berwachungsstaat</link>
      <description>Politiker wollen ihre Überwachungspläne schmackhaft machen. Neben der inhaltlichen Verharmlosung von Vorratsdatenspeicherung, Onlinedurchsuchung, Videoüberwachung usw. nutzen sie sprachliche Mittel, um ihre Maßnahmen durchzusetzen. Negativ besetzte Wörter werden durch positive ersetzt und rhetorische Muster werden verwendet, um negative Aspekte auszublenden. Der Vortrag beleuchtet Merkmale der Politikersprache, die in Anlehnung an George Orwell als Neusprech bezeichnet werden kann. 

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2860.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2860-de-neusprech_im_berwachungsstaat.mp4"
        length="564133888"
        type="video/mp4"/>
      <pubDate>Mon, 29 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2860-de-neusprech_im_berwachungsstaat.mp4?1399728405</guid>
      <dc:identifier>import-e2aeeda6438ea858f2</dc:identifier>
      <dc:date>2008-12-29T01:00:00+01:00</dc:date>
      <itunes:author>maha/Martin Haase</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Society</itunes:keywords>
      <itunes:subtitle>Politikersprache zwischen Orwell und Online</itunes:subtitle>
      <itunes:summary>Politiker wollen ihre Überwachungspläne schmackhaft machen. Neben der inhaltlichen Verharmlosung von Vorratsdatenspeicherung, Onlinedurchsuchung, Videoüberwachung usw. nutzen sie sprachliche Mittel, um ihre Maßnahmen durchzusetzen. Negativ besetzte Wörter werden durch positive ersetzt und rhetorische Muster werden verwendet, um negative Aspekte auszublenden. Der Vortrag beleuchtet Merkmale der Politikersprache, die in Anlehnung an George Orwell als Neusprech bezeichnet werden kann. 

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2860.en.html
</itunes:summary>
      <itunes:duration>01:10:09</itunes:duration>
    </item>
    <item>
      <title>Locating Mobile Phones using SS7 (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2997-en-locating_mobile_phones_using_ss7</link>
      <description>You are used to your mobile phone number following you around the globe. But the same functionality that makes you reachable worldwide can also be used to track your whereabouts down to city-level – without you ever knowing about it.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2997.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2997-en-locating_mobile_phones_using_ss7.mp4"
        length="391118848"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2997-en-locating_mobile_phones_using_ss7.mp4?1399728405</guid>
      <dc:identifier>import-b24e96b14b74162533</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Tobias Engel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>You are used to your mobile phone number following you around the globe. But the same functionality that makes you reachable worldwide can also be used to track your whereabouts down to city-level – without you ever knowing about it.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2997.en.html
</itunes:summary>
      <itunes:duration>00:48:31</itunes:duration>
    </item>
    <item>
      <title>Full-Disk-Encryption Crash-Course (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2882-en-full-disk-encryption_crash-course</link>
      <description>This is not a hacking presentation, no vulnerabilities are presented. It&#39;s a crash-course in full-disk-encryption (&quot;FDE&quot;) concepts, products and implementation aspects. An overview of both commercial and open-source offerings for Windows, Linux, and MacOSX is given. A (programmer&#39;s) look at the open-source solutions concludes the presentation.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2882.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2882-en-full-disk-encryption_crash-course.mp4"
        length="387973120"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2882-en-full-disk-encryption_crash-course.mp4?1399728405</guid>
      <dc:identifier>import-f8b849a9e3b83d4724</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Juergen Pabel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Everything to hide</itunes:subtitle>
      <itunes:summary>This is not a hacking presentation, no vulnerabilities are presented. It&#39;s a crash-course in full-disk-encryption (&quot;FDE&quot;) concepts, products and implementation aspects. An overview of both commercial and open-source offerings for Windows, Linux, and MacOSX is given. A (programmer&#39;s) look at the open-source solutions concludes the presentation.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2882.en.html
</itunes:summary>
      <itunes:duration>00:48:15</itunes:duration>
    </item>
    <item>
      <title>Soviet Unterzoegersdorf (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2773-en-soviet_unterzoegersdorf</link>
      <description>Join a glorious gala presentation with his Excellency and a battalion of members of the Soviet Unterzoegersdorf Military Enforcement Community. We will present the envious &quot;First World&quot; with the fruits of our techno-labor. Among other triumphs on display will be the second part of an ongoing series of so-called &quot;Computer Games&quot; or &quot;Virtual Hyper-Rooms&quot; glorifying the struggles of the Motherland, Soviet Unterzoegersdorf: Sector II. We promise not to mention the SALT II agreement.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2773.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2773-en-soviet_unterzoegersdorf.mp4"
        length="574619648"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2773-en-soviet_unterzoegersdorf.mp4?1399728405</guid>
      <dc:identifier>import-bb214036a3c1c15d6c</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>monochrom</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Culture</itunes:keywords>
      <itunes:subtitle>A Nation In Transit</itunes:subtitle>
      <itunes:summary>Join a glorious gala presentation with his Excellency and a battalion of members of the Soviet Unterzoegersdorf Military Enforcement Community. We will present the envious &quot;First World&quot; with the fruits of our techno-labor. Among other triumphs on display will be the second part of an ongoing series of so-called &quot;Computer Games&quot; or &quot;Virtual Hyper-Rooms&quot; glorifying the struggles of the Motherland, Soviet Unterzoegersdorf: Sector II. We promise not to mention the SALT II agreement.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2773.en.html
</itunes:summary>
      <itunes:duration>01:11:27</itunes:duration>
    </item>
    <item>
      <title>coreboot: Beyond The Final Frontier (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2970-en-coreboot_beyond_the_final_frontier</link>
      <description>The BIOS and it&#39;s successor EFI are considered by many to be the final frontier for open source software in commodity PCs. This talk describes the BIOS replacement coreboot (formerly LinuxBIOS) and the projects surrounding it.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2970.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2970-en-coreboot_beyond_the_final_frontier.mp4"
        length="408944640"
        type="video/mp4"/>
      <pubDate>Sat, 27 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2970-en-coreboot_beyond_the_final_frontier.mp4?1399728404</guid>
      <dc:identifier>import-0e2138fa323f774636</dc:identifier>
      <dc:date>2008-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Peter Stuge</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:subtitle>Open source BIOS replacement with a radical approach to boot.</itunes:subtitle>
      <itunes:summary>The BIOS and it&#39;s successor EFI are considered by many to be the final frontier for open source software in commodity PCs. This talk describes the BIOS replacement coreboot (formerly LinuxBIOS) and the projects surrounding it.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2970.en.html
</itunes:summary>
      <itunes:duration>00:50:50</itunes:duration>
    </item>
    <item>
      <title>Vulnerability discovery in encrypted closed source PHP applications (25c3)</title>
      <link>https://media.ccc.de/v/25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications</link>
      <description>Security audits of PHP applications are usually performed on a source code basis. However sometimes vendors protect their source code by encrypting their applications with runtime (bytecode-)encryptors. When these tools are used source code analysis is no longer possible and because these tools change how PHP works internally, several greybox security scanning/fuzzing techniques relying on hooks fail, too.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2678.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp4"
        length="483393536"
        type="video/mp4"/>
      <pubDate>Sun, 28 Dec 2008 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp4?1399728404</guid>
      <dc:identifier>import-37514cebcac18da418</dc:identifier>
      <dc:date>2008-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Stefan Esser</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>25c3, Hacking</itunes:keywords>
      <itunes:summary>Security audits of PHP applications are usually performed on a source code basis. However sometimes vendors protect their source code by encrypting their applications with runtime (bytecode-)encryptors. When these tools are used source code analysis is no longer possible and because these tools change how PHP works internally, several greybox security scanning/fuzzing techniques relying on hooks fail, too.

about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2678.en.html
</itunes:summary>
      <itunes:duration>01:00:07</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/congress/2008/folder-25c3.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from 25c3 as mp4</itunes:summary>
  </channel>
</rss>