<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - 26C3: Here be Dragons (low quality webm)</title>
    <link>https://media.ccc.de/c/26c3</link>
    <description> This feed contains all events from 26c3 as webm</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:45:52 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/congress/2009/folder-26c3.png</url>
      <title>Chaos Computer Club - 26C3: Here be Dragons (low quality webm)</title>
      <link>https://media.ccc.de/c/26c3</link>
    </image>
    <item>
      <title>Why Net Neutrality Matters? (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3501-en-why_net_neutrality_matters</link>
      <description>Net neutrality is an essential safeguard for competition, innovation, and fundamental freedoms. The debate is high in the US with the announce of FCC non discrimination principles (even if they sound irremediably bound to the interests of Hollywood industry). In the EU, the &quot;Telecoms Package&quot; has been the ground of intense debates on the issue. Dangerous provisions were voted, yet a very high level of awareness was raised, giving hope into further positive outcome of the debate. Why one shall care? What one can do about it?

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3501.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3501-en-why_net_neutrality_matters.webm"
        length="677380096"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3501-en-why_net_neutrality_matters.webm?1399728409</guid>
      <dc:identifier>import-b74c9460d5dffcccb1</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Jérémie Zimmermann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Status update on current legislation, campaigns and actions</itunes:subtitle>
      <itunes:summary>Net neutrality is an essential safeguard for competition, innovation, and fundamental freedoms. The debate is high in the US with the announce of FCC non discrimination principles (even if they sound irremediably bound to the interests of Hollywood industry). In the EU, the &quot;Telecoms Package&quot; has been the ground of intense debates on the issue. Dangerous provisions were voted, yet a very high level of awareness was raised, giving hope into further positive outcome of the debate. Why one shall care? What one can do about it?

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3501.en.html
</itunes:summary>
      <itunes:duration>00:57:37</itunes:duration>
    </item>
    <item>
      <title>Playing with the GSM RF Interface (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3608-en-playing_with_the_gsm_rf_interface</link>
      <description>This talk will show what can be done by taking control of the GSM RF part of a mobile phone, for example performing a DoS attack to the GSM network or using the phone as a sniffing device.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3608.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3608-en-playing_with_the_gsm_rf_interface.webm"
        length="563085312"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3608-en-playing_with_the_gsm_rf_interface.webm?1399728409</guid>
      <dc:identifier>import-75b2d58a4dc12e1a88</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Dieter Spaar</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>Doing tricks with a mobile phone</itunes:subtitle>
      <itunes:summary>This talk will show what can be done by taking control of the GSM RF part of a mobile phone, for example performing a DoS attack to the GSM network or using the phone as a sniffing device.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3608.en.html
</itunes:summary>
      <itunes:duration>00:47:55</itunes:duration>
    </item>
    <item>
      <title>Wofür offenes Internet? (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3509-de-wofr_offenes_internet</link>
      <description>Die Diskussion um Netzneutralität steht auch in Europa auf der politischen Agenda. Doch was ist Netzneutralität wirklich? Wofür wird sie gebraucht, wer darf darüber entscheiden? Der Vortrag soll einen Überblick über Problemlage, Player und praktische Politik geben.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3509.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3509-de-wofr_offenes_internet.webm"
        length="648019968"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3509-de-wofr_offenes_internet.webm?1399728408</guid>
      <dc:identifier>import-e395c5dd45fe2eb4d1</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Falk Lueke, Markus Beckedahl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Warum wir klare Regeln für Netzneutralität brauchen </itunes:subtitle>
      <itunes:summary>Die Diskussion um Netzneutralität steht auch in Europa auf der politischen Agenda. Doch was ist Netzneutralität wirklich? Wofür wird sie gebraucht, wer darf darüber entscheiden? Der Vortrag soll einen Überblick über Problemlage, Player und praktische Politik geben.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3509.en.html
</itunes:summary>
      <itunes:duration>00:55:10</itunes:duration>
    </item>
    <item>
      <title>Wolpertinger. Ein verteilter Portscanner. (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3340-de-wolpertinger_ein_verteilter_portscanner</link>
      <description>Wolpertinger ist ein Portscanner. Allerdings kein gewöhnlicher Portscanner, sondern entwickelt um hunderte oder tausende von Adressen schnell scannen zu können. Dazu kann er sowohl &quot;Dronen&quot; zur Aufgabenverteilung verwenden als auch von einem einzelnen System aus sehr schnell fertig werden. Wolpertinger ist ein reiner TCP-Portscanner, der die Verarbeitung der Ergebnisse anderen überlässt. Dazu speichert er die Resultate in einer relationalen Datenbank, und wer auch immer sie entweder anderen Werkzeugen übergeben will und in l33tspeak, Excel oder Kuchengrafiken umwandeln will kann das gerne tun. Wolpertinger basiert auf mehreren Ansätzen, um Portscans zu beschleunigen und gleichzeitig präzise Ergebnisse zu erhalten, welche im Vortrag vorgestellt werden.
Quelle: http://sourceforge.net/projects/wolpertinger

Wolpertinger is a portscanner. However, not your uncle&#39;s portscanner. It has been created to scan either very large networks or a lot of small ones in short time. Very short time. In order to achieve this necessary goal, it can distribute the scanning-work between several drones, controlled by the &quot;Wolpermaster&quot;. However it is also very fast when scanning from a single system. These and other measures to make a fast and reliable scanners are presented in the talk (in german).
Sourceforge: http://sourceforge.net/projects/wolpertinger

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3340.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3340-de-wolpertinger_ein_verteilter_portscanner.webm"
        length="470810624"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3340-de-wolpertinger_ein_verteilter_portscanner.webm?1399728408</guid>
      <dc:identifier>import-5f693514aee8848fb2</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>AltesWecken</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>Schneller scannen!</itunes:subtitle>
      <itunes:summary>Wolpertinger ist ein Portscanner. Allerdings kein gewöhnlicher Portscanner, sondern entwickelt um hunderte oder tausende von Adressen schnell scannen zu können. Dazu kann er sowohl &quot;Dronen&quot; zur Aufgabenverteilung verwenden als auch von einem einzelnen System aus sehr schnell fertig werden. Wolpertinger ist ein reiner TCP-Portscanner, der die Verarbeitung der Ergebnisse anderen überlässt. Dazu speichert er die Resultate in einer relationalen Datenbank, und wer auch immer sie entweder anderen Werkzeugen übergeben will und in l33tspeak, Excel oder Kuchengrafiken umwandeln will kann das gerne tun. Wolpertinger basiert auf mehreren Ansätzen, um Portscans zu beschleunigen und gleichzeitig präzise Ergebnisse zu erhalten, welche im Vortrag vorgestellt werden.
Quelle: http://sourceforge.net/projects/wolpertinger

Wolpertinger is a portscanner. However, not your uncle&#39;s portscanner. It has been created to scan either very large networks or a lot of small ones in short time. Very short time. In order to achieve this necessary goal, it can distribute the scanning-work between several drones, controlled by the &quot;Wolpermaster&quot;. However it is also very fast when scanning from a single system. These and other measures to make a fast and reliable scanners are presented in the talk (in german).
Sourceforge: http://sourceforge.net/projects/wolpertinger

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3340.en.html
</itunes:summary>
      <itunes:duration>00:40:08</itunes:duration>
    </item>
    <item>
      <title>Hacker Jeopardy (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3669-de-hacker_jeopardy</link>
      <description>The Hacker Jeopardy is a quiz show.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3669.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3669-de-hacker_jeopardy.webm"
        length="1048576"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3669-de-hacker_jeopardy.webm?1399728410</guid>
      <dc:identifier>import-65c32b95bca41915d5</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Ray, Stefan &#39;Sec&#39; Zehl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>Number guessing for geeks</itunes:subtitle>
      <itunes:summary>The Hacker Jeopardy is a quiz show.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3669.en.html
</itunes:summary>
      <itunes:duration>02:06:29</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks - Day 1 (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3563-en-lightning_talks_-_day_1</link>
      <description>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3563.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3563-en-lightning_talks_-_day_1.webm"
        length="1048576"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3563-en-lightning_talks_-_day_1.webm?1399728409</guid>
      <dc:identifier>import-38527475d9bfc28b08</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Oliver Pritzkow, Sven Guckes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>4 minutes of fame</itunes:subtitle>
      <itunes:summary>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3563.en.html
</itunes:summary>
      <itunes:duration>01:58:32</itunes:duration>
    </item>
    <item>
      <title>Why Germany Succeeded Where America Has Failed in Achieving Meaningful Voting Computer Changes (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes</link>
      <description>The decision made by the German Constitutional Court is THE definition of what election reform really is and that all democracies (and not just America) should use the basis of this decision in making the case for banning computerized voting. No more arguing security issues with the experts and accepting compromises that still leave citizens on the sidelines.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3714.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.webm"
        length="772800512"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.webm?1399728410</guid>
      <dc:identifier>import-5713b1c2aa9fa185f8</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Kathleen Wynn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle> And Why All Democracies Should Follow</itunes:subtitle>
      <itunes:summary>The decision made by the German Constitutional Court is THE definition of what election reform really is and that all democracies (and not just America) should use the basis of this decision in making the case for banning computerized voting. No more arguing security issues with the experts and accepting compromises that still leave citizens on the sidelines.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3714.en.html
</itunes:summary>
      <itunes:duration>01:05:45</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks - Day 3 (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3644-de-lightning_talks_-_day_3</link>
      <description>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3644.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3644-de-lightning_talks_-_day_3.webm"
        length="1048576"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3644-de-lightning_talks_-_day_3.webm?1399728410</guid>
      <dc:identifier>import-4a407968eac5e028a8</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Oliver Pritzkow, Sven Guckes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>4 minutes of fame</itunes:subtitle>
      <itunes:summary>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3644.en.html
</itunes:summary>
      <itunes:duration>02:16:04</itunes:duration>
    </item>
    <item>
      <title>Tor and censorship: lessons learned (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3554-de-tor_and_censorship_lessons_learned</link>
      <description>Tor was originally designed as a civil liberties tool for people in the West. But if governments can block connections *to* the Tor network, who cares that it provides great anonymity? A few years ago we started adapting Tor to be more robust in countries like China. We streamlined its network communications to look more like ordinary SSL, and we introduced &quot;bridge relays&quot; that are harder for an attacker to find and block than Tor&#39;s public relays.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3554.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3554-de-tor_and_censorship_lessons_learned.webm"
        length="750780416"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3554-de-tor_and_censorship_lessons_learned.webm?1399728410</guid>
      <dc:identifier>import-884b43d141f3f1d521</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Roger Dingledine</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:summary>Tor was originally designed as a civil liberties tool for people in the West. But if governments can block connections *to* the Tor network, who cares that it provides great anonymity? A few years ago we started adapting Tor to be more robust in countries like China. We streamlined its network communications to look more like ordinary SSL, and we introduced &quot;bridge relays&quot; that are harder for an attacker to find and block than Tor&#39;s public relays.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3554.en.html
</itunes:summary>
      <itunes:duration>01:03:52</itunes:duration>
    </item>
    <item>
      <title>Exposing Crypto Bugs through reverse engineering (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering</link>
      <description>Breaking good crypto is hard. It takes a genius to find a flaw in AES or Blowfish. On the other hand, it is also difficult to program cryptography correctly. Thus the simpler way of breaking a cryptographic software is often to reverse engineer it and find the crypto errors that were made by the programmers.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3703.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.webm"
        length="527433728"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.webm?1399728410</guid>
      <dc:identifier>import-1f121bb8aa988ba756</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Philippe Oechslin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:summary>Breaking good crypto is hard. It takes a genius to find a flaw in AES or Blowfish. On the other hand, it is also difficult to program cryptography correctly. Thus the simpler way of breaking a cryptographic software is often to reverse engineer it and find the crypto errors that were made by the programmers.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3703.en.html
</itunes:summary>
      <itunes:duration>00:44:52</itunes:duration>
    </item>
    <item>
      <title>Hacking the universe (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3266-de-hacking_the_universe</link>
      <description>String theory is our best candidate for a &quot;Theory of Everything&quot;. In this final theory, we begin to understand the nature of space and time. This is a light introduction to these ideas for the general nerd.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3266.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3266-de-hacking_the_universe.webm"
        length="727711744"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3266-de-hacking_the_universe.webm?1399728410</guid>
      <dc:identifier>import-f2ec6bce7644d928d4</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Robert Helling</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Science</itunes:keywords>
      <itunes:subtitle>When strings are super and not made of characters</itunes:subtitle>
      <itunes:summary>String theory is our best candidate for a &quot;Theory of Everything&quot;. In this final theory, we begin to understand the nature of space and time. This is a light introduction to these ideas for the general nerd.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3266.en.html
</itunes:summary>
      <itunes:duration>01:01:53</itunes:duration>
    </item>
    <item>
      <title>CKAN: apt-get for the Debian of Data (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3647-de-ckan_apt-get_for_the_debian_of_data</link>
      <description>Componentization – or the atomization of a given resource into &#39;packages&#39; – has greatly contributed towards the ease with which software developers are able to re-use and build upon each other&#39;s work.
We argue that this kind of approach is becoming significantly more important in knowledge development. This talk will discuss the Open Knowledge Foundation&#39;s Comprehensive Knowledge Archive Network (CKAN) – a registry for open data, from sonnets to statistics, genes to geodata. CKAN has recently been used in the UK Government&#39;s beta for a &#39;data.gov.uk&#39; site.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3647.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3647-de-ckan_apt-get_for_the_debian_of_data.webm"
        length="739246080"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3647-de-ckan_apt-get_for_the_debian_of_data.webm?1399728410</guid>
      <dc:identifier>import-a01119ee5cfeb211c5</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Daniel Dietrich, Rufus Pollock</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:summary>Componentization – or the atomization of a given resource into &#39;packages&#39; – has greatly contributed towards the ease with which software developers are able to re-use and build upon each other&#39;s work.
We argue that this kind of approach is becoming significantly more important in knowledge development. This talk will discuss the Open Knowledge Foundation&#39;s Comprehensive Knowledge Archive Network (CKAN) – a registry for open data, from sonnets to statistics, genes to geodata. CKAN has recently been used in the UK Government&#39;s beta for a &#39;data.gov.uk&#39; site.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3647.en.html
</itunes:summary>
      <itunes:duration>01:02:57</itunes:duration>
    </item>
    <item>
      <title>Location tracking does scale up (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3600-de-location_tracking_does_scale_up</link>
      <description>For a long time we warned of the perils of full scale, permanent tracking of persons by the state or corporations. Cell phones, data retention laws and other surveillance techniques close the freedoms of the net. But none can be as pervasive as the permanent location updates sent to Apple and Google via your Smartphone and laptop. With a precision of 10 m to 20 m, BSSID based location tracking has become the ultimative and global tracking of persons. This talk will describe weaknesses and trends in current location tracking methods. The internet learned to locate you in 2009!

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3600.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3600-de-location_tracking_does_scale_up.webm"
        length="695205888"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3600-de-location_tracking_does_scale_up.webm?1399728410</guid>
      <dc:identifier>import-c8bb0657ed0c8500f1</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>L. Aaron Kaplan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>How skyhook wireless tracks you continously</itunes:subtitle>
      <itunes:summary>For a long time we warned of the perils of full scale, permanent tracking of persons by the state or corporations. Cell phones, data retention laws and other surveillance techniques close the freedoms of the net. But none can be as pervasive as the permanent location updates sent to Apple and Google via your Smartphone and laptop. With a precision of 10 m to 20 m, BSSID based location tracking has become the ultimative and global tracking of persons. This talk will describe weaknesses and trends in current location tracking methods. The internet learned to locate you in 2009!

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3600.en.html
</itunes:summary>
      <itunes:duration>00:59:09</itunes:duration>
    </item>
    <item>
      <title>Closing Event (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3717-en-closing_event</link>
      <description>nil

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3717.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3717-en-closing_event.webm"
        length="403701760"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3717-en-closing_event.webm?1399728410</guid>
      <dc:identifier>import-d226c92ea5f3884368</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rieger, Ron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:summary>nil

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3717.en.html
</itunes:summary>
      <itunes:duration>00:34:23</itunes:duration>
    </item>
    <item>
      <title>Blackbox JTAG Reverse Engineering (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3670-en-blackbox_jtag_reverse_engineering</link>
      <description>JTAG is an industry standard for accessing testmode functionality in almost any complex microchip. While the basics of JTAG are standardized, the exact implementation details are usually undocumented. Nevertheless, JTAG often allows you to interact with the chip very deeply, which makes it very interesting since it is often easily accessible thanks to the small pincount.  This talk covers reverse engineering of JTAG interfaces when no or only limited documentation is available. 

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3670.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3670-en-blackbox_jtag_reverse_engineering.webm"
        length="665845760"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3670-en-blackbox_jtag_reverse_engineering.webm?1399728410</guid>
      <dc:identifier>import-aa97ee865d5e945700</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Felix Domke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>Discovering what the hardware architects try to hide from you</itunes:subtitle>
      <itunes:summary>JTAG is an industry standard for accessing testmode functionality in almost any complex microchip. While the basics of JTAG are standardized, the exact implementation details are usually undocumented. Nevertheless, JTAG often allows you to interact with the chip very deeply, which makes it very interesting since it is often easily accessible thanks to the small pincount.  This talk covers reverse engineering of JTAG interfaces when no or only limited documentation is available. 

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3670.en.html
</itunes:summary>
      <itunes:duration>00:56:38</itunes:duration>
    </item>
    <item>
      <title>Weaponizing Cultural Viruses (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3570-en-weaponizing_cultural_viruses</link>
      <description>What does it mean to fight a culture war? How does culture propagate through a population? What is a meme? And why are some cultural memes more virulent than others?
As the capitalist corporate monoculture further asserts its global hegemony, it is vital that individuals become more skillful in their resistance to it. In a hyper-connected world, the most powerful vector of resistance is that of memetics, the core unit of cultural belief. A culture war is, fundamentally, a memetic war.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3570.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3570-en-weaponizing_cultural_viruses.webm"
        length="800063488"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3570-en-weaponizing_cultural_viruses.webm?1399728409</guid>
      <dc:identifier>import-9e294baeb1da0041c3</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Aaron Muszalski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>A Manual For Engaged Memetic Resistance on The Front Lines of The Culture Wars</itunes:subtitle>
      <itunes:summary>What does it mean to fight a culture war? How does culture propagate through a population? What is a meme? And why are some cultural memes more virulent than others?
As the capitalist corporate monoculture further asserts its global hegemony, it is vital that individuals become more skillful in their resistance to it. In a hyper-connected world, the most powerful vector of resistance is that of memetics, the core unit of cultural belief. A culture war is, fundamentally, a memetic war.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3570.en.html
</itunes:summary>
      <itunes:duration>01:08:05</itunes:duration>
    </item>
    <item>
      <title>Finding the key in the haystack (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3631-en-finding_the_key_in_the_haystack</link>
      <description>The power consumtion of a microcontroller depends on the actual data being processed. This renders current-based side channel attacks possible: By recording and analyzing the current consumption of a microcontroller, one can recover secret keys. This can be done using Differential Power Analysis (DPA).

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3631.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3631-en-finding_the_key_in_the_haystack.webm"
        length="592445440"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3631-en-finding_the_key_in_the_haystack.webm?1399728409</guid>
      <dc:identifier>import-a01a7c6e4a1181923b</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>hunz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>A practical guide to Differential Power Analysis</itunes:subtitle>
      <itunes:summary>The power consumtion of a microcontroller depends on the actual data being processed. This renders current-based side channel attacks possible: By recording and analyzing the current consumption of a microcontroller, one can recover secret keys. This can be done using Differential Power Analysis (DPA).

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3631.en.html
</itunes:summary>
      <itunes:duration>00:50:26</itunes:duration>
    </item>
    <item>
      <title>How you can build an eavesdropper for a quantum cryptosystem (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem</link>
      <description>This presentation will show the first experimental implementation of an eavesdropper for quantum cryptosystem. Although quantum cryptography has been proven unconditionally secure, by exploiting physical imperfections (detector vulnerability) we have successfully built an intercept-resend attack and demonstrated eavesdropping under realistic conditions on an installed quantum key distribution line. The actual eavesdropping hardware we have built will be shown during the conference.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3576.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.webm"
        length="611319808"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.webm?1399728409</guid>
      <dc:identifier>import-85eaa1b78dd15ec225</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Qin Liu, Sebastien Sauge</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>hardware demo during the lecture</itunes:subtitle>
      <itunes:summary>This presentation will show the first experimental implementation of an eavesdropper for quantum cryptosystem. Although quantum cryptography has been proven unconditionally secure, by exploiting physical imperfections (detector vulnerability) we have successfully built an intercept-resend attack and demonstrated eavesdropping under realistic conditions on an installed quantum key distribution line. The actual eavesdropping hardware we have built will be shown during the conference.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3576.en.html
</itunes:summary>
      <itunes:duration>00:52:01</itunes:duration>
    </item>
    <item>
      <title>Black Ops Of PKI (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3658-en-black_ops_of_pki</link>
      <description>nil

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3658.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3658-en-black_ops_of_pki.webm"
        length="924844032"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3658-en-black_ops_of_pki.webm?1399728409</guid>
      <dc:identifier>import-5e05e9fcc28e3e5161</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Dan Kaminsky</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:summary>nil

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3658.en.html
</itunes:summary>
      <itunes:duration>01:18:44</itunes:duration>
    </item>
    <item>
      <title>Stream: Security Nightmares (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3725-en-stream_security_nightmares</link>
      <description>What has happened during the last year in IT-Security? Which things did develop newly? Which new buzzwords and trends appeared?

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3725.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3725-en-stream_security_nightmares.webm"
        length="1005584384"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3725-en-stream_security_nightmares.webm?1399728409</guid>
      <dc:identifier>import-5c5387aa75445aa216</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Public Viewing</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>in english!!11oneeleven (translated on the fly)</itunes:subtitle>
      <itunes:summary>What has happened during the last year in IT-Security? Which things did develop newly? Which new buzzwords and trends appeared?

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3725.en.html
</itunes:summary>
      <itunes:duration>01:25:36</itunes:duration>
    </item>
    <item>
      <title>Im Herz der Bestie (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3685-de-im_herz_der_bestie</link>
      <description>Was haben Friedrich Engels und die Yes Men gemeinsam? Was ist Kommunikationsguerilla und wie unterscheidet sie sich von der Medienguerilla? Wie kann ich den Botschafter der USA mit einer kleinen lancierten Fotomontage zur Absage eines öffentlichen Auftritts zwingen? Medienguerilla kann Aktienkurse rutschen lassen oder einfach nur Spaß machen. Anhand von unterhaltsamen Beispielen werden verschiedene Methoden und Techniken gezeigt, mit denen Mainstream-Medien gehackt werden können. Dabei werden Sicherheitslücken und Einfallstore für Medienhacking demonstriert und Möglichkeiten für Hacks in der Zukunft aufgezeigt. Denn Medienguerilla lebt vom Mit- und Selbermachen...

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3685.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3685-de-im_herz_der_bestie.webm"
        length="611319808"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3685-de-im_herz_der_bestie.webm?1399728409</guid>
      <dc:identifier>import-c5cfcdb5af5a7ff87e</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Monty Cantsin, victor dornberger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Medien hacken</itunes:subtitle>
      <itunes:summary>Was haben Friedrich Engels und die Yes Men gemeinsam? Was ist Kommunikationsguerilla und wie unterscheidet sie sich von der Medienguerilla? Wie kann ich den Botschafter der USA mit einer kleinen lancierten Fotomontage zur Absage eines öffentlichen Auftritts zwingen? Medienguerilla kann Aktienkurse rutschen lassen oder einfach nur Spaß machen. Anhand von unterhaltsamen Beispielen werden verschiedene Methoden und Techniken gezeigt, mit denen Mainstream-Medien gehackt werden können. Dabei werden Sicherheitslücken und Einfallstore für Medienhacking demonstriert und Möglichkeiten für Hacks in der Zukunft aufgezeigt. Denn Medienguerilla lebt vom Mit- und Selbermachen...

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3685.en.html
</itunes:summary>
      <itunes:duration>00:52:01</itunes:duration>
    </item>
    <item>
      <title>Exciting Tales of Journalists Getting Spied on, Arrested and Deported (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported</link>
      <description>Stories of journalists who while doing their work and researching stories in countries throughout the world were spied on, arrested, and in some cases had their own data used against them.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3652.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.webm"
        length="574619648"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.webm?1399728409</guid>
      <dc:identifier>import-0c3cc111606f1b7d3b</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Bicyclemark</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>How their own data was taken and used against them</itunes:subtitle>
      <itunes:summary>Stories of journalists who while doing their work and researching stories in countries throughout the world were spied on, arrested, and in some cases had their own data used against them.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3652.en.html
</itunes:summary>
      <itunes:duration>00:48:54</itunes:duration>
    </item>
    <item>
      <title>Understanding Telecommunication Interception: Intelligence Support Systems (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems</link>
      <description>&quot;Intelligence Support Systems&quot; stand for a wide range of hard- and softwareproducts made to intercept and analyze data from telecommunication- and other datastreams as well as data from surveillance technology. The talk will give a brief overview of how this industry works, to whom these products are available and what the capabilities are.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3706.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.webm"
        length="629145600"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.webm?1399728409</guid>
      <dc:identifier>import-88b547b1ad8db477bd</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Andy Müller-Maguhn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Making</itunes:keywords>
      <itunes:subtitle>The Big Brother Services Industry and their tools</itunes:subtitle>
      <itunes:summary>&quot;Intelligence Support Systems&quot; stand for a wide range of hard- and softwareproducts made to intercept and analyze data from telecommunication- and other datastreams as well as data from surveillance technology. The talk will give a brief overview of how this industry works, to whom these products are available and what the capabilities are.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3706.en.html
</itunes:summary>
      <itunes:duration>00:53:34</itunes:duration>
    </item>
    <item>
      <title>Reverse-Engineering DisplayLink devices (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3353-de-reverse-engineering_displaylink_devices</link>
      <description>DisplayLink produces nice, useful USB graphics adapters. Unfortunately, they had no real Linux support. In this talk, we&#39;ll describe how we first reverse-engineered the encryption and basic protocol, prompting DisplayLink to actually release a Linux driver on their own. However, their driver still doesn&#39;t support compression. In the second part, we&#39;ll therefore describe how we reverse-engineered the compression algorithm.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3353.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3353-de-reverse-engineering_displaylink_devices.webm"
        length="437256192"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3353-de-reverse-engineering_displaylink_devices.webm?1399728408</guid>
      <dc:identifier>import-b0be31b1b23b3c488e</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Florian Echtler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>USB to DVI for Hackers</itunes:subtitle>
      <itunes:summary>DisplayLink produces nice, useful USB graphics adapters. Unfortunately, they had no real Linux support. In this talk, we&#39;ll describe how we first reverse-engineered the encryption and basic protocol, prompting DisplayLink to actually release a Linux driver on their own. However, their driver still doesn&#39;t support compression. In the second part, we&#39;ll therefore describe how we reverse-engineered the compression algorithm.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3353.en.html
</itunes:summary>
      <itunes:duration>00:37:15</itunes:duration>
    </item>
    <item>
      <title>Cybernetic Cannibalism (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3592-de-cybernetic_cannibalism</link>
      <description>What is there in common between The Cannibalist Manifesto, written by the Brazilian poet Oswald de Andrade, in 1928, and online file sharing in the 21st century?  What is the cultural diversity of Brazil – a society in constant formation – able to offer us to analyze the remix culture in the digital age?  This work aim to investigate why is Brazil’s culture revealed as an inspiration for concepts as Free Culture and how the country was transformed in a laboratory of experimentation of new roads for the intellectual property debate.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3592.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3592-de-cybernetic_cannibalism.webm"
        length="737148928"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3592-de-cybernetic_cannibalism.webm?1399728408</guid>
      <dc:identifier>import-eb7b78204b540d047c</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Cristiano Marinho, Helena Klang</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Why is Brazil the country of the future?</itunes:subtitle>
      <itunes:summary>What is there in common between The Cannibalist Manifesto, written by the Brazilian poet Oswald de Andrade, in 1928, and online file sharing in the 21st century?  What is the cultural diversity of Brazil – a society in constant formation – able to offer us to analyze the remix culture in the digital age?  This work aim to investigate why is Brazil’s culture revealed as an inspiration for concepts as Free Culture and how the country was transformed in a laboratory of experimentation of new roads for the intellectual property debate.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3592.en.html
</itunes:summary>
      <itunes:duration>01:02:45</itunes:duration>
    </item>
    <item>
      <title>Security Nightmares (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3687-de-security_nightmares</link>
      <description>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3687.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3687-de-security_nightmares.webm"
        length="1007681536"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3687-de-security_nightmares.webm?1399728408</guid>
      <dc:identifier>import-7cf3890d64fd07e22e</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rieger, Ron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:summary>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3687.en.html
</itunes:summary>
      <itunes:duration>01:25:45</itunes:duration>
    </item>
    <item>
      <title>Wikipedia - Wegen Irrelevanz gelöscht (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht</link>
      <description>Die Wikipedia wurde einst als Erfolgsmodell des Internets und des freien Zugangs zu Wissen gefeiert. Doch immer öfter regt sich Kritik wegen ausufernder Löschungen: Alte und neue Autoren werden verprellt, sogar der Vorwurf des Revisionismus wird laut. Ist die Zukunft der Wissensgesellschaft an Gartenzwergzüchtern gescheitert? Wir diskutieren.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3699.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.webm"
        length="1048576"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.webm?1399728408</guid>
      <dc:identifier>import-742d7fc3268f7c4121</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Andreas Bogk, Kurt Jansson, maha/Martin Haase, Mathias Schindler, Tim Weber</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:summary>Die Wikipedia wurde einst als Erfolgsmodell des Internets und des freien Zugangs zu Wissen gefeiert. Doch immer öfter regt sich Kritik wegen ausufernder Löschungen: Alte und neue Autoren werden verprellt, sogar der Vorwurf des Revisionismus wird laut. Ist die Zukunft der Wissensgesellschaft an Gartenzwergzüchtern gescheitert? Wir diskutieren.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3699.en.html
</itunes:summary>
      <itunes:duration>02:19:35</itunes:duration>
    </item>
    <item>
      <title>Photography and the Art of Doing it Wrong (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3579-en-photography_and_the_art_of_doing_it_wrong</link>
      <description>At its heart, photography is a ridiculous hack to make pictures from light.  In the 170 years since Talbot and Daguerre, techniques have been cleaned up and simplified.  A field that once demanded experimentation and had no clear way of doing it right, now attracts many who haven&#39;t a clue why it all works.  Innovation and new techniques occur on the edges - they are the beautiful fragments scattered in disaster, the sloppy chaos of the unknown.  Discovery happens by doing it wrong.  Beyond the traditions, beyond the rules, there be dragons, and they are the best teachers of all.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3579.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3579-en-photography_and_the_art_of_doing_it_wrong.webm"
        length="615514112"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3579-en-photography_and_the_art_of_doing_it_wrong.webm?1399728408</guid>
      <dc:identifier>import-f0dd38629978185349</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Audrey</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Making</itunes:keywords>
      <itunes:summary>At its heart, photography is a ridiculous hack to make pictures from light.  In the 170 years since Talbot and Daguerre, techniques have been cleaned up and simplified.  A field that once demanded experimentation and had no clear way of doing it right, now attracts many who haven&#39;t a clue why it all works.  Innovation and new techniques occur on the edges - they are the beautiful fragments scattered in disaster, the sloppy chaos of the unknown.  Discovery happens by doing it wrong.  Beyond the traditions, beyond the rules, there be dragons, and they are the best teachers of all.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3579.en.html
</itunes:summary>
      <itunes:duration>00:52:23</itunes:duration>
    </item>
    <item>
      <title>Using OpenBSC for fuzzing of GSM handsets (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets</link>
      <description>With the recent availability of more Free Software for GSM protocols such as OpenBSC, GSM protocol hacking is no longer off-limits. Everyone can play with the lower levels of GSM communications.

It&#39;s time to bring the decades of TCP/IP security research into the GSM world, sending packets incompatible with the state machine, sending wrong length fields and actually go all the way to fuzz the various layers of the GSM protocol stack.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3535.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.webm"
        length="701497344"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.webm?1399728408</guid>
      <dc:identifier>import-60706e285c5680928f</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Harald Welte</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:summary>With the recent availability of more Free Software for GSM protocols such as OpenBSC, GSM protocol hacking is no longer off-limits. Everyone can play with the lower levels of GSM communications.

It&#39;s time to bring the decades of TCP/IP security research into the GSM world, sending packets incompatible with the state machine, sending wrong length fields and actually go all the way to fuzz the various layers of the GSM protocol stack.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3535.en.html
</itunes:summary>
      <itunes:duration>00:59:45</itunes:duration>
    </item>
    <item>
      <title>WikiLeaks Release 1.0 (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3567-en-wikileaks_release_10</link>
      <description>During the last 12 months WikiLeaks representatives have been talking at numerous conferences, from technology via human rights to media focused, in an effort to introduce WikiLeaks to the world. WikiLeaks has had major document releases that have spawned attention in all major newspapers by now, it has triggered important reform and has established itself as part of the accepted media reality.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3567.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3567-en-wikileaks_release_10.webm"
        length="741343232"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3567-en-wikileaks_release_10.webm?1399728408</guid>
      <dc:identifier>import-2f5b6d9d75ad65da1d</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>wikileaks</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Insight into vision, motivation and innovation</itunes:subtitle>
      <itunes:summary>During the last 12 months WikiLeaks representatives have been talking at numerous conferences, from technology via human rights to media focused, in an effort to introduce WikiLeaks to the world. WikiLeaks has had major document releases that have spawned attention in all major newspapers by now, it has triggered important reform and has established itself as part of the accepted media reality.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3567.en.html
</itunes:summary>
      <itunes:duration>01:03:03</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks - Day 4 (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3645-en-lightning_talks_-_day_4</link>
      <description>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more. 

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3645.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3645-en-lightning_talks_-_day_4.webm"
        length="1048576"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3645-en-lightning_talks_-_day_4.webm?1399728408</guid>
      <dc:identifier>import-ef7fc8b8e6a5dbedb1</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Oliver Pritzkow, Sven Guckes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>4 minutes of fame</itunes:subtitle>
      <itunes:summary>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more. 

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3645.en.html
</itunes:summary>
      <itunes:duration>02:20:40</itunes:duration>
    </item>
    <item>
      <title>Fuzzing the Phone in your Phone (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3507-de-fuzzing_the_phone_in_your_phone</link>
      <description>In this talk we show how to find vulnerabilities in smart phones. Not in the browser or mail client or any software you could find on a desktop, but rather in the phone specific software. We present techniques which allow a researcher to inject SMS messages into iPhone, Android, and Windows Mobile devices.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3507.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3507-de-fuzzing_the_phone_in_your_phone.webm"
        length="478150656"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3507-de-fuzzing_the_phone_in_your_phone.webm?1399728408</guid>
      <dc:identifier>import-f9ac90b62273f05d2e</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Collin Mulliner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:summary>In this talk we show how to find vulnerabilities in smart phones. Not in the browser or mail client or any software you could find on a desktop, but rather in the phone specific software. We present techniques which allow a researcher to inject SMS messages into iPhone, Android, and Windows Mobile devices.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3507.en.html
</itunes:summary>
      <itunes:duration>00:40:42</itunes:duration>
    </item>
    <item>
      <title>Privacy-Enhanced Event Scheduling (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3577-de-privacy-enhanced_event_scheduling</link>
      <description>Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This talk distinguishes event scheduling from electronic voting and proposes a privacy-enhanced event scheduling scheme.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3577.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3577-de-privacy-enhanced_event_scheduling.webm"
        length="698351616"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3577-de-privacy-enhanced_event_scheduling.webm?1399728408</guid>
      <dc:identifier>import-b513e0ef809cad89de</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Benjamin Kellermann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Science</itunes:keywords>
      <itunes:summary>Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This talk distinguishes event scheduling from electronic voting and proposes a privacy-enhanced event scheduling scheme.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3577.en.html
</itunes:summary>
      <itunes:duration>00:59:28</itunes:duration>
    </item>
    <item>
      <title>coreboot: Adding support for a system near you (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3661-de-coreboot_adding_support_for_a_system_near_you</link>
      <description>The BIOS and it&#39;s successor EFI are considered by many to be the final frontier for open source software in commodity PCs. This talk briefly describes the BIOS replacement coreboot (formerly LinuxBIOS) and then focuses on what is required to bring up a PC from power on to where an operating system can run, and how coreboot approaches the problem.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3661.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3661-de-coreboot_adding_support_for_a_system_near_you.webm"
        length="829423616"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3661-de-coreboot_adding_support_for_a_system_near_you.webm?1399728408</guid>
      <dc:identifier>import-e99e455606bf183fcf</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Peter Stuge</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>Working with the open source BIOS replacement and getting a PC to boot</itunes:subtitle>
      <itunes:summary>The BIOS and it&#39;s successor EFI are considered by many to be the final frontier for open source software in commodity PCs. This talk briefly describes the BIOS replacement coreboot (formerly LinuxBIOS) and then focuses on what is required to bring up a PC from power on to where an operating system can run, and how coreboot approaches the problem.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3661.en.html
</itunes:summary>
      <itunes:duration>01:10:34</itunes:duration>
    </item>
    <item>
      <title>&quot;Haste ma&#39;n netblock?&quot; (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3688-de-haste_man_netblock</link>
      <description>In times of the omnipresent scare of IPv4 address shortage and price tags on Internet resources that are raised on a yearly basis some people look for creative means of securing themselves parts of &quot;pre-owned&quot; IP space. This space comes from the various early birds on the net. From major corporations to the US Military: Nobody is safe of getting his unused IP assets nicked. This talk will explain the ways IP assignments are made and how clever and not so clever, greedy and not so greedy IP thieves can get into the possession of valuable IP assets.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3688.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3688-de-haste_man_netblock.webm"
        length="380633088"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3688-de-haste_man_netblock.webm?1399728408</guid>
      <dc:identifier>import-bbaef39cd440f712fd</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>nibbler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>Layer 8 based IP Address hijacking in the end of the days of IPv4</itunes:subtitle>
      <itunes:summary>In times of the omnipresent scare of IPv4 address shortage and price tags on Internet resources that are raised on a yearly basis some people look for creative means of securing themselves parts of &quot;pre-owned&quot; IP space. This space comes from the various early birds on the net. From major corporations to the US Military: Nobody is safe of getting his unused IP assets nicked. This talk will explain the ways IP assignments are made and how clever and not so clever, greedy and not so greedy IP thieves can get into the possession of valuable IP assets.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3688.en.html
</itunes:summary>
      <itunes:duration>00:32:22</itunes:duration>
    </item>
    <item>
      <title>Milkymist (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3350-en-milkymist</link>
      <description>An FPGA-based open-hardware video synthesis platform.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3350.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3350-en-milkymist.webm"
        length="493879296"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3350-en-milkymist.webm?1399728411</guid>
      <dc:identifier>import-1a73583f6cd5d4c5bf</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Sébastien Bourdeauducq</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Making</itunes:keywords>
      <itunes:subtitle>An open hardware video synthesis platform</itunes:subtitle>
      <itunes:summary>An FPGA-based open-hardware video synthesis platform.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3350.en.html
</itunes:summary>
      <itunes:duration>00:42:04</itunes:duration>
    </item>
    <item>
      <title>secuBT (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3515-en-secubt</link>
      <description>In the age of coordinated malware distribution and zero-day exploits security becomes ever more important. This paper presents secuBT, a safe execution framework for the execution of
untrusted binary code based on the fastBT dynamic binary translator.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3515.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3515-en-secubt.webm"
        length="670040064"
        type="video/webm"/>
      <pubDate>Wed, 30 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3515-en-secubt.webm?1399728410</guid>
      <dc:identifier>import-b2c5a28cf60629b052</dc:identifier>
      <dc:date>2009-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Mathias Payer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>Hacking the Hackers with User-Space Virtualization</itunes:subtitle>
      <itunes:summary>In the age of coordinated malware distribution and zero-day exploits security becomes ever more important. This paper presents secuBT, a safe execution framework for the execution of
untrusted binary code based on the fastBT dynamic binary translator.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3515.en.html
</itunes:summary>
      <itunes:duration>00:57:01</itunes:duration>
    </item>
    <item>
      <title>After the Hype (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3547-en-after_the_hype</link>
      <description>While One Laptop per Child is a widely known and much discussed and often heavily critized project little is actually known about the current state of its efforts. So it may come as a surprise to many that almost a million children around the world use their Linux powered XO-1 laptop in school on a daily basis. This talk will shed some light on this and other interesting developments and look at how FLOSS and global grassroot communities can make a difference in ICT-supported education around the world.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3547.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3547-en-after_the_hype.webm"
        length="709885952"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3547-en-after_the_hype.webm?1399728410</guid>
      <dc:identifier>import-0d85220ad4a9ae8992</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>ChristophD</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Science</itunes:keywords>
      <itunes:subtitle>The current state of One Laptop per Child and Sugar Labs</itunes:subtitle>
      <itunes:summary>While One Laptop per Child is a widely known and much discussed and often heavily critized project little is actually known about the current state of its efforts. So it may come as a surprise to many that almost a million children around the world use their Linux powered XO-1 laptop in school on a daily basis. This talk will shed some light on this and other interesting developments and look at how FLOSS and global grassroot communities can make a difference in ICT-supported education around the world.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3547.en.html
</itunes:summary>
      <itunes:duration>01:00:22</itunes:duration>
    </item>
    <item>
      <title>ETSI-Vorratsdatenspeicherung 2009 (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3721-de-etsi-vorratsdatenspeicherung_2009</link>
      <description>Die ETSI startete als Ingenieursgremium zum Festschreiben von technischen Standards und hat sich über die Jahre zu einer Tochterfirma der GCHQ entwickelt, des englischen Geheimdienstes für Fernmeldeaufklärung.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3721.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3721-de-etsi-vorratsdatenspeicherung_2009.webm"
        length="740294656"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3721-de-etsi-vorratsdatenspeicherung_2009.webm?1399728410</guid>
      <dc:identifier>import-471cc3975501e96422</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Erich Möchel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>und andere Sockenpuppen der GCHQ</itunes:subtitle>
      <itunes:summary>Die ETSI startete als Ingenieursgremium zum Festschreiben von technischen Standards und hat sich über die Jahre zu einer Tochterfirma der GCHQ entwickelt, des englischen Geheimdienstes für Fernmeldeaufklärung.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3721.en.html
</itunes:summary>
      <itunes:duration>01:02:59</itunes:duration>
    </item>
    <item>
      <title>A Hacker’s Utopia (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3540-en-a_hackers_utopia</link>
      <description>The lecture will explore hacker ideology as a utopian idea. Drawing on utopian theory and technology assessment, it will investigate within which terms hacking can be acknowledge as a utopia, what might be missing for a full-blown societal vision and - most importantly - how technology could actually help to realize utopian ideas (and how not).

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3540.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3540-en-a_hackers_utopia.webm"
        length="752877568"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3540-en-a_hackers_utopia.webm?1399728410</guid>
      <dc:identifier>import-491788383a692aaae6</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Sandro Gaycken</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>What&#39;s There and What&#39;s Missing</itunes:subtitle>
      <itunes:summary>The lecture will explore hacker ideology as a utopian idea. Drawing on utopian theory and technology assessment, it will investigate within which terms hacking can be acknowledge as a utopia, what might be missing for a full-blown societal vision and - most importantly - how technology could actually help to realize utopian ideas (and how not).

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3540.en.html
</itunes:summary>
      <itunes:duration>01:04:03</itunes:duration>
    </item>
    <item>
      <title>I, Internet (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3302-en-i_internet</link>
      <description>The actions of a highly-networked group of individuals cannot be explained as the sum of actions of individuals. Let&#39;s explore how far we are along with evolving collective consciousnesses and what&#39;s on their minds. With the Internet, the individual&#39;s ability for inward and especially outward communication is unprecendented in history. Millions of individuals are sharing thoughts and observations through social networks. The faster and more efficient the information flows within such a network, the harder it becomes to distinguish these processes from the activity in a biological neural network (brain).

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3302.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3302-en-i_internet.webm"
        length="530579456"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3302-en-i_internet.webm?1399728410</guid>
      <dc:identifier>import-8caea0cb6ec40f1246</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Christiane Ruetten</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>We are more Borg than we thought</itunes:subtitle>
      <itunes:summary>The actions of a highly-networked group of individuals cannot be explained as the sum of actions of individuals. Let&#39;s explore how far we are along with evolving collective consciousnesses and what&#39;s on their minds. With the Internet, the individual&#39;s ability for inward and especially outward communication is unprecendented in history. Millions of individuals are sharing thoughts and observations through social networks. The faster and more efficient the information flows within such a network, the harder it becomes to distinguish these processes from the activity in a biological neural network (brain).

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3302.en.html
</itunes:summary>
      <itunes:duration>00:45:09</itunes:duration>
    </item>
    <item>
      <title>Leyen-Rhetorik (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3481-de-leyen-rhetorik</link>
      <description>Ursula von der Leyen machte Wahlkampf mit dem Zugangserschwerungsgesetz. Dabei bediente sie sich vor allem einer Reihe von Scheinargumenten und verschiedener anderer rhetorischer Mittel, um ihr Publikum auf ihre Seite zu ziehen. Ihr Vorgehen soll hier näher beleuchtet werden.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3481.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3481-de-leyen-rhetorik.webm"
        length="722468864"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3481-de-leyen-rhetorik.webm?1399728410</guid>
      <dc:identifier>import-323048cb5a520dac74</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>maha/Martin Haase</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Science</itunes:keywords>
      <itunes:summary>Ursula von der Leyen machte Wahlkampf mit dem Zugangserschwerungsgesetz. Dabei bediente sie sich vor allem einer Reihe von Scheinargumenten und verschiedener anderer rhetorischer Mittel, um ihr Publikum auf ihre Seite zu ziehen. Ihr Vorgehen soll hier näher beleuchtet werden.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3481.en.html
</itunes:summary>
      <itunes:duration>01:01:27</itunes:duration>
    </item>
    <item>
      <title>Advanced microcontroller programming (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3672-de-advanced_microcontroller_programming</link>
      <description>A lecture showing the result of one year of intense programming with the AVR microcontroller family, showing language tricks, showcasing devices like the at90usb* and the xmega families, and lots of entertaining war stories and grizzly technical details.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3672.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3672-de-advanced_microcontroller_programming.webm"
        length="607125504"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3672-de-advanced_microcontroller_programming.webm?1399728410</guid>
      <dc:identifier>import-d7f37b1162046a6dc0</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>wesen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>Getting deeper into AVR programming</itunes:subtitle>
      <itunes:summary>A lecture showing the result of one year of intense programming with the AVR microcontroller family, showing language tricks, showcasing devices like the at90usb* and the xmega families, and lots of entertaining war stories and grizzly technical details.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3672.en.html
</itunes:summary>
      <itunes:duration>00:51:39</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks - Day 2 (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3642-en-lightning_talks_-_day_2</link>
      <description>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more. 

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3642.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3642-en-lightning_talks_-_day_2.webm"
        length="1048576"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3642-en-lightning_talks_-_day_2.webm?1399728410</guid>
      <dc:identifier>import-a6ca475086a8b1df0e</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Oliver Pritzkow, Sven Guckes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>4 minutes of fame</itunes:subtitle>
      <itunes:summary>4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more. 

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3642.en.html
</itunes:summary>
      <itunes:duration>02:12:12</itunes:duration>
    </item>
    <item>
      <title>Fnord-Jahresrückblick 2009 (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3613-de-fnord-jahresrckblick_2009</link>
      <description>Auch dieses Jahr werden wir Euch wieder aus den Fnords des Jahres eine beschauliche Abendveranstaltung konstruieren, auf dass ihr Euch daran delektiert. 2009 war wieder ein ergiebiges Jahr.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3613.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3613-de-fnord-jahresrckblick_2009.webm"
        length="922746880"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3613-de-fnord-jahresrckblick_2009.webm?1399728410</guid>
      <dc:identifier>import-74d1d018eb33d0d9ba</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Felix von Leitner, Frank Rieger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>Von Abwrackprämie bis Zensursula</itunes:subtitle>
      <itunes:summary>Auch dieses Jahr werden wir Euch wieder aus den Fnords des Jahres eine beschauliche Abendveranstaltung konstruieren, auf dass ihr Euch daran delektiert. 2009 war wieder ein ergiebiges Jahr.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3613.en.html
</itunes:summary>
      <itunes:duration>01:18:27</itunes:duration>
    </item>
    <item>
      <title>Die Verwaltung rüstet auf - der digitale Steuerbürger (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger</link>
      <description>Automatisierter Kontenabruf, digitale Außenprüfung, Benford-Test, Chi-Quadrat-Test, Bußgeld für GDPdU-Verweigerer: Die Steuerverwaltung hat in den letzten Jahren digital aufgerüstet. Wo wann werden wie welche Daten eingesammelt und verwertet?

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3533.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.webm"
        length="744488960"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.webm?1399728410</guid>
      <dc:identifier>import-5c9815bf98ccc8a92a</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Kai Kobschätzki (/bengoshi), Keune</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Gefahren, Nutzen, Risiken für Jedermann</itunes:subtitle>
      <itunes:summary>Automatisierter Kontenabruf, digitale Außenprüfung, Benford-Test, Chi-Quadrat-Test, Bußgeld für GDPdU-Verweigerer: Die Steuerverwaltung hat in den letzten Jahren digital aufgerüstet. Wo wann werden wie welche Daten eingesammelt und verwertet?

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3533.en.html
</itunes:summary>
      <itunes:duration>01:03:20</itunes:duration>
    </item>
    <item>
      <title>UNBILD – Pictures and Non-Pictures (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3713-de-unbild__pictures_and_non-pictures</link>
      <description>Mit seinen Projekten arbeitet Christoph Faulhaber an einer Fortschreibung von Konzeptkunst, Performance und Sozialer Skulptur.
In &quot;Ich wie es wirklich war&quot; berichtet Faulhaber über die Folgen des Projektes Mister Security. „Der Ausgangspunkt für Mister Security ist die Frage, ob es verboten ist, die amerikanische Botschaft zu fotografieren.“ Verkleidet als Angestellter einer Sicherheitsfirma observierte Faulhaber mit seinem Künstlerkollegen Lukasz Chobrok verschiedene Botschaften und gab auf Nachfrage an, den öffentlichen Raum zu überwachen, um die Sicherheit zu erhöhen. Tatsächlich führte die erhöhte Sicherheit zu großen Verunsicherungen. Sie wurde gar als Bedrohung wahrgenommen, wie die Ausweisung des Künstlers aus den USA, mit der das Projekt einen vorläufigen Höhepunkt erlebte, zeigt.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3713.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3713-de-unbild__pictures_and_non-pictures.webm"
        length="715128832"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3713-de-unbild__pictures_and_non-pictures.webm?1399728410</guid>
      <dc:identifier>import-0f434213c10a4ded91</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Christoph Faulhaber</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Culture</itunes:keywords>
      <itunes:subtitle>Reterritorialisierung und Globalisierung</itunes:subtitle>
      <itunes:summary>Mit seinen Projekten arbeitet Christoph Faulhaber an einer Fortschreibung von Konzeptkunst, Performance und Sozialer Skulptur.
In &quot;Ich wie es wirklich war&quot; berichtet Faulhaber über die Folgen des Projektes Mister Security. „Der Ausgangspunkt für Mister Security ist die Frage, ob es verboten ist, die amerikanische Botschaft zu fotografieren.“ Verkleidet als Angestellter einer Sicherheitsfirma observierte Faulhaber mit seinem Künstlerkollegen Lukasz Chobrok verschiedene Botschaften und gab auf Nachfrage an, den öffentlichen Raum zu überwachen, um die Sicherheit zu erhöhen. Tatsächlich führte die erhöhte Sicherheit zu großen Verunsicherungen. Sie wurde gar als Bedrohung wahrgenommen, wie die Ausweisung des Künstlers aus den USA, mit der das Projekt einen vorläufigen Höhepunkt erlebte, zeigt.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3713.en.html
</itunes:summary>
      <itunes:duration>01:00:52</itunes:duration>
    </item>
    <item>
      <title>“Yes We Can’t!” - on kleptography and cryptovirology (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology</link>
      <description>In this talk I will survey some of the results (with Adam Young) on Cryptovirology (the art of employing public key cryptography maliciously as part of a malware attack, such as in ransomware) and the related Kleptography (the art of embedding cryptographic Trojans inside tamper-proof cryptosystems).

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3702.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.webm"
        length="654311424"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.webm?1399728410</guid>
      <dc:identifier>import-712831a77a45a2e53f</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Moti Yung</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:summary>In this talk I will survey some of the results (with Adam Young) on Cryptovirology (the art of employing public key cryptography maliciously as part of a malware attack, such as in ransomware) and the related Kleptography (the art of embedding cryptographic Trojans inside tamper-proof cryptosystems).

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3702.en.html
</itunes:summary>
      <itunes:duration>00:55:40</itunes:duration>
    </item>
    <item>
      <title>our darknet and its bright spots (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3504-en-our_darknet_and_its_bright_spots</link>
      <description>Building a private network to connect your neighbourhood. Why we feel common solutions are terrible on resources and what we think is better.

Get on board.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3504.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3504-en-our_darknet_and_its_bright_spots.webm"
        length="612368384"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3504-en-our_darknet_and_its_bright_spots.webm?1399728410</guid>
      <dc:identifier>import-15e012cd8c759b0240</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>aestetix, equinox, Eric Michaud, mc.fly</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>building connections for spaces and people</itunes:subtitle>
      <itunes:summary>Building a private network to connect your neighbourhood. Why we feel common solutions are terrible on resources and what we think is better.

Get on board.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3504.en.html
</itunes:summary>
      <itunes:duration>00:52:04</itunes:duration>
    </item>
    <item>
      <title>Fußgängernavigation mit Augmented Reality (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3496-de-fugngernavigation_mit_augmented_reality</link>
      <description>Augmented Reality oder Erweiterte Realität (ER) beschreibt die Synthese von detailreichen realen Bilddaten mit virtuellen Routeninformationen. Der Vorteil besteht in der klaren und unmissverständlichen Darstellung der Anweisungen, so dass ER besonders für Fußgänger geeignet ist. Um die Darstellung von Kamerabildern und Virtuellem Modell nahezu deckungsgleich zu überlagern, werden verschiedene Sensoren benötigt. So wird neben GPS ein elektronischer Kompass und ein Bewegungssensor verwendet. Damit ausgestattet ist das Gerät in der Lage, die Position und die Ausrichtung zu erkennen und in die Anzeige anzupassen.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3496.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3496-de-fugngernavigation_mit_augmented_reality.webm"
        length="484442112"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3496-de-fugngernavigation_mit_augmented_reality.webm?1399728410</guid>
      <dc:identifier>import-e3fcaa02eb8239d225</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Martin Schallaer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Science</itunes:keywords>
      <itunes:subtitle>Navit - Navigationssystem</itunes:subtitle>
      <itunes:summary>Augmented Reality oder Erweiterte Realität (ER) beschreibt die Synthese von detailreichen realen Bilddaten mit virtuellen Routeninformationen. Der Vorteil besteht in der klaren und unmissverständlichen Darstellung der Anweisungen, so dass ER besonders für Fußgänger geeignet ist. Um die Darstellung von Kamerabildern und Virtuellem Modell nahezu deckungsgleich zu überlagern, werden verschiedene Sensoren benötigt. So wird neben GPS ein elektronischer Kompass und ein Bewegungssensor verwendet. Damit ausgestattet ist das Gerät in der Lage, die Position und die Ausrichtung zu erkennen und in die Anzeige anzupassen.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3496.en.html
</itunes:summary>
      <itunes:duration>00:41:12</itunes:duration>
    </item>
    <item>
      <title>Die Ereignisse des 12.9. und ihre Folgen (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen</link>
      <description>Im Rahmen der Demonstration gegen Überwachungswahn, Vorratsdatenspeicherung und die Einschränkung bürgerlicher Freiheitsrechte am 12. September 2009 kam es in den frühen Abendstunden zu gewalttätigen Ausschreitungen von Polizisten gegen Demonstrationsteilnehmer. Den proaktiv gewalttättig agierenden Beamten war dabei offenbar nicht bewußt, daß sie sich den falschen Ort ausgesucht hatten: In unmittelbarer Nähe des CCC-Wagens entstand dabei eine beeindruckend gute Videodokumentation durch mehrere Teilnehmer und ihre mitgebrachten Gerätschaften. Das Video landete noch am Abend im Netz und kurzfristig auch in den konventionellen Medien.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3705.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.webm"
        length="1001390080"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.webm?1399728410</guid>
      <dc:identifier>import-c6222a12f8ee22d1e4</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Andy Müller-Maguhn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Watching them watching us: Videoüberwachung staatlichen Handelns</itunes:subtitle>
      <itunes:summary>Im Rahmen der Demonstration gegen Überwachungswahn, Vorratsdatenspeicherung und die Einschränkung bürgerlicher Freiheitsrechte am 12. September 2009 kam es in den frühen Abendstunden zu gewalttätigen Ausschreitungen von Polizisten gegen Demonstrationsteilnehmer. Den proaktiv gewalttättig agierenden Beamten war dabei offenbar nicht bewußt, daß sie sich den falschen Ort ausgesucht hatten: In unmittelbarer Nähe des CCC-Wagens entstand dabei eine beeindruckend gute Videodokumentation durch mehrere Teilnehmer und ihre mitgebrachten Gerätschaften. Das Video landete noch am Abend im Netz und kurzfristig auch in den konventionellen Medien.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3705.en.html
</itunes:summary>
      <itunes:duration>01:25:15</itunes:duration>
    </item>
    <item>
      <title>Here be dragons (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3700-de-here_be_dragons</link>
      <description>nil

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3700.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3700-de-here_be_dragons.webm"
        length="581959680"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3700-de-here_be_dragons.webm?1399728410</guid>
      <dc:identifier>import-b7cf56b6bbe50e728c</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rieger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Keynote</itunes:subtitle>
      <itunes:summary>nil

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3700.en.html
</itunes:summary>
      <itunes:duration>00:49:29</itunes:duration>
    </item>
    <item>
      <title>DECT (part II) (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3648-en-dect_part_ii</link>
      <description>After dedected.org was published on 25C3, lots has changed in DECT security.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3648.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3648-en-dect_part_ii.webm"
        length="721420288"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3648-en-dect_part_ii.webm?1399728410</guid>
      <dc:identifier>import-15119c2da9228b1ecf</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Erik Tews</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>What has changed in DECT security after one year</itunes:subtitle>
      <itunes:summary>After dedected.org was published on 25C3, lots has changed in DECT security.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3648.en.html
</itunes:summary>
      <itunes:duration>01:01:24</itunes:duration>
    </item>
    <item>
      <title>GSM: SRSLY? (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3654-en-gsm_srsly</link>
      <description>The worlds most popular radio system has over 3 billion handsets in 212 countries and not even strong encryption. Perhaps due to cold-war era laws, GSM&#39;s security hasn&#39;t received the scrutiny it deserves given its popularity. This bothered us enough to take a look; the results were surprising.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3654-en-gsm_srsly.webm"
        length="813694976"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3654-en-gsm_srsly.webm?1399728410</guid>
      <dc:identifier>import-9a084512d1ad9e7a7a</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Chris Paget, Karsten Nohl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:summary>The worlds most popular radio system has over 3 billion handsets in 212 countries and not even strong encryption. Perhaps due to cold-war era laws, GSM&#39;s security hasn&#39;t received the scrutiny it deserves given its popularity. This bothered us enough to take a look; the results were surprising.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html
</itunes:summary>
      <itunes:duration>01:09:14</itunes:duration>
    </item>
    <item>
      <title>Liquid Democracy (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3464-de-liquid_democracy</link>
      <description>Wir arbeiten an einer Umsetzung der Liquid-Democracy-Idee. Dabei ist es für uns wichtig, keine Ja/Nein-Demokratie, sondern eine diskursorientierte Basisdemokratie zu etablieren: Alle können Parlamentarierinnen sein und mit allen anderen Ideen entwickeln, diskutieren, streiten, Bündnisse eingehen, Kompromisse schließen und Konsens finden. Im direkten Parlamentarismus setzt sich die beste Idee, das beste Argument durch; die verbindliche Entscheidung entsteht aus dem gemeinsamen Diskurs.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3464.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3464-de-liquid_democracy.webm"
        length="743440384"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3464-de-liquid_democracy.webm?1399728409</guid>
      <dc:identifier>import-0b96652be2bbb6a699</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Daniel Reichert, dwt</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Direkter Parlamentarismus – gemeinsam verbindlich entscheiden</itunes:subtitle>
      <itunes:summary>Wir arbeiten an einer Umsetzung der Liquid-Democracy-Idee. Dabei ist es für uns wichtig, keine Ja/Nein-Demokratie, sondern eine diskursorientierte Basisdemokratie zu etablieren: Alle können Parlamentarierinnen sein und mit allen anderen Ideen entwickeln, diskutieren, streiten, Bündnisse eingehen, Kompromisse schließen und Konsens finden. Im direkten Parlamentarismus setzt sich die beste Idee, das beste Argument durch; die verbindliche Entscheidung entsteht aus dem gemeinsamen Diskurs.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3464.en.html
</itunes:summary>
      <itunes:duration>01:03:12</itunes:duration>
    </item>
    <item>
      <title>Wireless power transfer (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3696-en-wireless_power_transfer</link>
      <description>Wireless power is a most wanted technology. It has already been invented by Nikola Tesla in 1888. The speaker read the papers, reproduced the theoretical and practical results. The theoretical idea to get highly efficient wireless power transmission is to separate the electric from the magnetic field, because magnetic field lines are closed curves near the device, while the electric field lines reach to infinity and receiver only needs common ground (the earth). This is done by special requirements to the sender and receiver antennas (form of the coil). The antenna form has been modeled in the software nec2 (variant xnec2c on debian). A lowcost PET bottle serves as the hull of the coil. Around 200 windings of insulated copper wire are manually applied to the bottle. A transmission in the range of 10 meters was reached, the power used is 100mW, from signal generator amplitude 10V and 1 MHz frequency. This will be shown.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3696.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3696-en-wireless_power_transfer.webm"
        length="703594496"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3696-en-wireless_power_transfer.webm?1399728409</guid>
      <dc:identifier>import-ca7f98bebd89e24485</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Davor Emard</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Making</itunes:keywords>
      <itunes:subtitle>Forgotten knowledge: Tesla invented wireless power</itunes:subtitle>
      <itunes:summary>Wireless power is a most wanted technology. It has already been invented by Nikola Tesla in 1888. The speaker read the papers, reproduced the theoretical and practical results. The theoretical idea to get highly efficient wireless power transmission is to separate the electric from the magnetic field, because magnetic field lines are closed curves near the device, while the electric field lines reach to infinity and receiver only needs common ground (the earth). This is done by special requirements to the sender and receiver antennas (form of the coil). The antenna form has been modeled in the software nec2 (variant xnec2c on debian). A lowcost PET bottle serves as the hull of the coil. Around 200 windings of insulated copper wire are manually applied to the bottle. A transmission in the range of 10 meters was reached, the power used is 100mW, from signal generator amplitude 10V and 1 MHz frequency. This will be shown.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3696.en.html
</itunes:summary>
      <itunes:duration>00:59:53</itunes:duration>
    </item>
    <item>
      <title>Building a Debugger (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3490-en-building_a_debugger</link>
      <description>The GoodFET is an open source tool for programming microcontrollers and memories by SPI, I2C, JTAG, and a slew of vendor-proprietary protocols. In this lecture, the design of the GoodFET will be explained in detail, and various semi-proprietary protocols will be discussed in depth. Leading toward the future, methods of packet sniffing proprietary protocols will be discussed. Finally, the BadFET – a voltage glitching variant of the GoodFET – will be introduced.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3490.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3490-en-building_a_debugger.webm"
        length="650117120"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3490-en-building_a_debugger.webm?1399728409</guid>
      <dc:identifier>import-4cd820d77b40b4b492</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Travis Goodspeed</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>Open JTAG with Voltage Glitching</itunes:subtitle>
      <itunes:summary>The GoodFET is an open source tool for programming microcontrollers and memories by SPI, I2C, JTAG, and a slew of vendor-proprietary protocols. In this lecture, the design of the GoodFET will be explained in detail, and various semi-proprietary protocols will be discussed in depth. Leading toward the future, methods of packet sniffing proprietary protocols will be discussed. Finally, the BadFET – a voltage glitching variant of the GoodFET – will be introduced.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3490.en.html
</itunes:summary>
      <itunes:duration>00:55:22</itunes:duration>
    </item>
    <item>
      <title>Die Schlacht um die Vorratsdatenspeicherung (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung</link>
      <description>Das Bundesverfassungsgericht berät derzeit über die Verfassungsbeschwerden gegen die Vorratsdatenspeicherung. Nachdem das Gericht im letzten Jahr bereits mit dem neuen Grundrecht auf eine digitale Intimsphäre einen dicken Pflock eingeschlagen hat, wird das Urteil zur Vorratsdatenspeicherung erneut Grundsätzliches im Spannungsverhältnis zwischen Bürgerrechten und Strafverfolgung klären.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3708.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.webm"
        length="710934528"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.webm?1399728409</guid>
      <dc:identifier>import-4137bcc9f19cd11ed9</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Constanze Kurz, Frank Rieger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Der Stand der Debatte nach der Anhörung beim Bundesverfassungsgericht</itunes:subtitle>
      <itunes:summary>Das Bundesverfassungsgericht berät derzeit über die Verfassungsbeschwerden gegen die Vorratsdatenspeicherung. Nachdem das Gericht im letzten Jahr bereits mit dem neuen Grundrecht auf eine digitale Intimsphäre einen dicken Pflock eingeschlagen hat, wird das Urteil zur Vorratsdatenspeicherung erneut Grundsätzliches im Spannungsverhältnis zwischen Bürgerrechten und Strafverfolgung klären.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3708.en.html
</itunes:summary>
      <itunes:duration>01:00:32</itunes:duration>
    </item>
    <item>
      <title>Europäische Biometriestrategien (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3590-de-europische_biometriestrategien</link>
      <description>Der Vortrag beschäftigt sich mit der Frage der technischen und gesellschaftlichen Implikationen von Identifizierungstechniken, die Prozesse der In- und Exklusion von Menschen in Nationen zu automatisieren suchen.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3590.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3590-de-europische_biometriestrategien.webm"
        length="761266176"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3590-de-europische_biometriestrategien.webm?1399728409</guid>
      <dc:identifier>import-4e9c0ca8ed477893c1</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>kosmo_k</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Science</itunes:keywords>
      <itunes:subtitle>Die Automatisierung von Personenidentifizierung an der Grenze und die damit einhergehenden kontrollpolitischen Veränderungen</itunes:subtitle>
      <itunes:summary>Der Vortrag beschäftigt sich mit der Frage der technischen und gesellschaftlichen Implikationen von Identifizierungstechniken, die Prozesse der In- und Exklusion von Menschen in Nationen zu automatisieren suchen.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3590.en.html
</itunes:summary>
      <itunes:duration>01:04:44</itunes:duration>
    </item>
    <item>
      <title>Peanut Butter and Plastic: Industrial Revolution (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3637-de-peanut_butter_and_plastic_industrial_revolution</link>
      <description>The future of manufacturing will purring next to your computer and plasticizing digital designs into 3D objects. We&#39;re at the dawn of the diamond age with portable 3D printers, decentralized manufacturing, digital design and the rise of personal fabrication. Now is the time to join Industrial Revolution 2 and make that dream a reality.

Accompanying this presentation will be a digital design workshop to show designers how to go from digital designs to physical objects.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3637.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.webm"
        length="513802240"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.webm?1399728409</guid>
      <dc:identifier>import-8117d0b302c63a9832</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Bre</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Making</itunes:keywords>
      <itunes:subtitle>Decentralized Manufacturing and Desktop Fabrication</itunes:subtitle>
      <itunes:summary>The future of manufacturing will purring next to your computer and plasticizing digital designs into 3D objects. We&#39;re at the dawn of the diamond age with portable 3D printers, decentralized manufacturing, digital design and the rise of personal fabrication. Now is the time to join Industrial Revolution 2 and make that dream a reality.

Accompanying this presentation will be a digital design workshop to show designers how to go from digital designs to physical objects.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3637.en.html
</itunes:summary>
      <itunes:duration>00:43:47</itunes:duration>
    </item>
    <item>
      <title>The Lost Cosmonauts (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3710-en-the_lost_cosmonauts</link>
      <description>I&#39;m going to talk about the benefits of applying critical thinking stories that we hear in the popular media, and the example I&#39;ll be focusing on is the story of the Lost Cosmonauts: Soviet Cosmonauts supposed to have died in space, but who were erased from history. We have audio recordings, allegedly from these dying Cosmonauts, and we&#39;ll apply critical thinking to learn what the real source was.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3710.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3710-en-the_lost_cosmonauts.webm"
        length="577765376"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3710-en-the_lost_cosmonauts.webm?1399728409</guid>
      <dc:identifier>import-9c82dc5bc5ce9b2674</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Brian Dunning</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Culture</itunes:keywords>
      <itunes:subtitle>Critical Thinking</itunes:subtitle>
      <itunes:summary>I&#39;m going to talk about the benefits of applying critical thinking stories that we hear in the popular media, and the example I&#39;ll be focusing on is the story of the Lost Cosmonauts: Soviet Cosmonauts supposed to have died in space, but who were erased from history. We have audio recordings, allegedly from these dying Cosmonauts, and we&#39;ll apply critical thinking to learn what the real source was.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3710.en.html
</itunes:summary>
      <itunes:duration>00:49:12</itunes:duration>
    </item>
    <item>
      <title>Chaos-Familien-Duell (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3550-de-chaos-familien-duell</link>
      <description>Zwei Chaos-Familien treten gegeneinander an, doch es kann nur eine geben. Team-Anmeldungen sind begrenzt! Meldet Euch im Event-Wiki an: http://events.ccc.de/congress/2009/wiki/Chaos-Familien-Duell

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3550.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3550-de-chaos-familien-duell.webm"
        length="1048576"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3550-de-chaos-familien-duell.webm?1399728409</guid>
      <dc:identifier>import-167f9375430135c300</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Alexander Brock, Marcel Ackermann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:summary>Zwei Chaos-Familien treten gegeneinander an, doch es kann nur eine geben. Team-Anmeldungen sind begrenzt! Meldet Euch im Event-Wiki an: http://events.ccc.de/congress/2009/wiki/Chaos-Familien-Duell

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3550.en.html
</itunes:summary>
      <itunes:duration>01:58:12</itunes:duration>
    </item>
    <item>
      <title>Vier Fäuste für ein Halleluja (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3691-de-vier_fuste_fr_ein_halleluja</link>
      <description>Wenn die API Aushängeschild eines Softwareprojekts ist, ist es um die Open-Source-Szene schlecht bestellt. openssl, X11, gnupg, BSD sockets, HTTP, racoon, ldap, errno – die Liste gewachsener und letztendlich mißglückter APIs ist lang. Wir stellen haarsträubende Beispiele vor, zeigen Spätfolgen in abhängigen Projekten und versuchen zu ergründen, wie es dazu kommen konnte.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3691.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3691-de-vier_faeuste_fuer_ein_halleluja.webm"
        length="637534208"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3691-de-vier_faeuste_fuer_ein_halleluja.webm?1399728409</guid>
      <dc:identifier>import-889bf7d4f546181efe</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Erdgeist, Felix von Leitner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>Geschichten aus dem API-und Protokollkrieg von zwei glorreichen Halunken</itunes:subtitle>
      <itunes:summary>Wenn die API Aushängeschild eines Softwareprojekts ist, ist es um die Open-Source-Szene schlecht bestellt. openssl, X11, gnupg, BSD sockets, HTTP, racoon, ldap, errno – die Liste gewachsener und letztendlich mißglückter APIs ist lang. Wir stellen haarsträubende Beispiele vor, zeigen Spätfolgen in abhängigen Projekten und versuchen zu ergründen, wie es dazu kommen konnte.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3691.en.html
</itunes:summary>
      <itunes:duration>00:54:15</itunes:duration>
    </item>
    <item>
      <title>Legic Prime: Obscurity in Depth (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3709-en-legic_prime_obscurity_in_depth</link>
      <description>Legic Prime is an artifact from the time when proprietary cryptography in RFID was considered secure enough. We will demonstrate a break for basically any aspect of Legic Prime&#39;s claimed security features. If you rely on Legic Prime&#39;s security for anything, start migrating.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3709.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3709-en-legic_prime_obscurity_in_depth.webm"
        length="734003200"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3709-en-legic_prime_obscurity_in_depth.webm?1399728409</guid>
      <dc:identifier>import-60fab54854e0de0861</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Henryk Plötz, Karsten Nohl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:summary>Legic Prime is an artifact from the time when proprietary cryptography in RFID was considered secure enough. We will demonstrate a break for basically any aspect of Legic Prime&#39;s claimed security features. If you rely on Legic Prime&#39;s security for anything, start migrating.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3709.en.html
</itunes:summary>
      <itunes:duration>01:02:27</itunes:duration>
    </item>
    <item>
      <title>Internetsperren (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3594-de-internetsperren</link>
      <description>In dem Vortrag werden kurz die Geschichte und Argumente gegen die Sperren zusammengefasst. Es sollen außerdem konkrete Forderungen an Politik und Gesellschaft gestellt werden. Den Abschluss soll eine Diskussion über die Entwicklung von nicht zensierbaren Protokollen und der dazugehörigen Software bilden.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3594.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3594-de-internetsperren.webm"
        length="544210944"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3594-de-internetsperren.webm?1399728409</guid>
      <dc:identifier>import-325794d76ea5a4bdd6</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>MOGiS</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>#zensursula and beyond</itunes:subtitle>
      <itunes:summary>In dem Vortrag werden kurz die Geschichte und Argumente gegen die Sperren zusammengefasst. Es sollen außerdem konkrete Forderungen an Politik und Gesellschaft gestellt werden. Den Abschluss soll eine Diskussion über die Entwicklung von nicht zensierbaren Protokollen und der dazugehörigen Software bilden.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3594.en.html
</itunes:summary>
      <itunes:duration>00:46:21</itunes:duration>
    </item>
    <item>
      <title>Der Hackerparagraph beim Bundesverfassungsgericht (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht</link>
      <description>Das Bundesverfassungsgericht hat mit seiner Entscheidung vom 18. Mai 2009 drei gegen den Hackerparagraphen (§§ 202c i.V.m. 202a StGB) gerichtete Verfassungsbeschwerden als unzulässig verworfen. In dem ablehnenden 
Beschluss wird allerdings eine ausführliche Begründung für diese Entscheidung gegeben.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3674.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.webm"
        length="752877568"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.webm?1399728409</guid>
      <dc:identifier>import-2150e50b98311dd2f6</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Dominik Boecker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:summary>Das Bundesverfassungsgericht hat mit seiner Entscheidung vom 18. Mai 2009 drei gegen den Hackerparagraphen (§§ 202c i.V.m. 202a StGB) gerichtete Verfassungsbeschwerden als unzulässig verworfen. In dem ablehnenden 
Beschluss wird allerdings eine ausführliche Begründung für diese Entscheidung gegeben.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3674.en.html
</itunes:summary>
      <itunes:duration>01:04:04</itunes:duration>
    </item>
    <item>
      <title>Homewreckery (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3664-en-homewreckery</link>
      <description>Integrating technology into fiber arts continues to be an intensely popular subject – in the words of an old teacher: &quot;Fashion will always be a good market, because everyone loves clothes.&quot; With the creation of things like Lilypad Arduinos and flex resistors the medium is moving forward in leaps and bounds.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3664.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3664-en-homewreckery.webm"
        length="490733568"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3664-en-homewreckery.webm?1399728409</guid>
      <dc:identifier>import-f62972ee26d8e418a1</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>eli skipp</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Making</itunes:keywords>
      <itunes:subtitle>Electrifying the Thread out of Clothing</itunes:subtitle>
      <itunes:summary>Integrating technology into fiber arts continues to be an intensely popular subject – in the words of an old teacher: &quot;Fashion will always be a good market, because everyone loves clothes.&quot; With the creation of things like Lilypad Arduinos and flex resistors the medium is moving forward in leaps and bounds.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3664.en.html
</itunes:summary>
      <itunes:duration>00:41:46</itunes:duration>
    </item>
    <item>
      <title>A part time scientists&#39; perspective of getting to the moon (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_</link>
      <description>We want to use the opportunity the 26C3 presents as a venue to introduce our team.
The Part-Time-Scientists are the first German team participating in the Google Lunar X PRIZE.
Our presentation would kick off with a quick explanation of what the X PRIZE is, the challenges and gains.

The main part of the presentation will then focus on our progress.
That includes a showcase of some hard- and software we&#39;re using. 
Additionally pictures and videos specifically created for the 26C3.
And a brief overview of the GoogleLunarXPrize and it&#39;s overall progress.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3332.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.webm"
        length="1048576"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.webm?1399728408</guid>
      <dc:identifier>import-613c31891add515c96</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Arne Reiners, Juergen Brandner, Michael Mussler, Robert Boehme</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>presenting the first German Team participating in the GoogleLunarXPrize</itunes:subtitle>
      <itunes:summary>We want to use the opportunity the 26C3 presents as a venue to introduce our team.
The Part-Time-Scientists are the first German team participating in the Google Lunar X PRIZE.
Our presentation would kick off with a quick explanation of what the X PRIZE is, the challenges and gains.

The main part of the presentation will then focus on our progress.
That includes a showcase of some hard- and software we&#39;re using. 
Additionally pictures and videos specifically created for the 26C3.
And a brief overview of the GoogleLunarXPrize and it&#39;s overall progress.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3332.en.html
</itunes:summary>
      <itunes:duration>02:08:46</itunes:duration>
    </item>
    <item>
      <title>cat /proc/sys/net/ipv4/fuckups (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3596-de-cat_procsysnetipv4fuckups</link>
      <description>We will be presenting a number of previously undisclosed network-related design errors, ranging from data-link-layer bugs in Ethernet-drivers across issues in TCP/IP stacks all the way up to communication infrastructure components on layer 5.
Our focus is on subtle mistakes, which do not fall into the memory-corruption category and yet in combination provide an attacker with a powerful bag of tricks.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3596-de-cat_procsysnetipv4fuckups.webm"
        length="492830720"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3596-de-cat_procsysnetipv4fuckups.webm?1399728408</guid>
      <dc:identifier>import-79c42ca7a3a36179d3</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Fabian Yamaguchi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:summary>We will be presenting a number of previously undisclosed network-related design errors, ranging from data-link-layer bugs in Ethernet-drivers across issues in TCP/IP stacks all the way up to communication infrastructure components on layer 5.
Our focus is on subtle mistakes, which do not fall into the memory-corruption category and yet in combination provide an attacker with a powerful bag of tricks.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html
</itunes:summary>
      <itunes:duration>00:41:57</itunes:duration>
    </item>
    <item>
      <title>Stream: Fnord-Jahresrückblick 2009 (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3723-en-stream_fnord-jahresrckblick_2009</link>
      <description>This will be a stream of the Fnord-Jahresrückblick 2009, as it will be too crowded in Saal 1.
We try to get a translation, but there is no guarantee yet, so a German version might be possible, too.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3723.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3723-en-stream_fnord-jahresrckblick_2009.webm"
        length="930086912"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3723-en-stream_fnord-jahresrckblick_2009.webm?1399728408</guid>
      <dc:identifier>import-71e21240c5411bc6a6</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>guide</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>German / English version of the Fnord-Jahresrückblick 2009.</itunes:subtitle>
      <itunes:summary>This will be a stream of the Fnord-Jahresrückblick 2009, as it will be too crowded in Saal 1.
We try to get a translation, but there is no guarantee yet, so a German version might be possible, too.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3723.en.html
</itunes:summary>
      <itunes:duration>01:19:06</itunes:duration>
    </item>
    <item>
      <title>Conlanging 101 (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3520-en-conlanging_101</link>
      <description>Learn about the art/craft of language creation (&quot;conlanging&quot;), and participate in making up a new language on the spot.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3520.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3520-en-conlanging_101.webm"
        length="866123776"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3520-en-conlanging_101.webm?1399728408</guid>
      <dc:identifier>import-4d61c156a091d746c4</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Sai</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Making</itunes:keywords>
      <itunes:subtitle>I make languages (and you can too)</itunes:subtitle>
      <itunes:summary>Learn about the art/craft of language creation (&quot;conlanging&quot;), and participate in making up a new language on the spot.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3520.en.html
</itunes:summary>
      <itunes:duration>01:13:41</itunes:duration>
    </item>
    <item>
      <title>Die neokonservativen Thinktanks in der BRD (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd</link>
      <description>Putin ist ein &quot;lupenreiner Demokrat&quot;, so Gerhard Schröder 2004 bei Beckmann. Wie sehr das dem Demokratieverständnis der abgewählten SPD und der immer noch nicht ausreichend weggewählten CDU entspricht, zeigt dieser Vortrag. Er beleuchtet dabei Gedankengut und Arbeit von Thinktanks wie des &quot;Frankfurter Zukunftsrats&quot;, der &quot;Initiative Neue Marktwirtschaft&quot; und des &quot;Konvents für Deutschland&quot; und die Auswirkungen auf die aktuelle Politik.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3622.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.webm"
        length="796917760"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.webm?1399728408</guid>
      <dc:identifier>import-0c9237b79e075b6815</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Volker Birk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Wie SPD und CDU die gelenkte Demokratie einführen wollen</itunes:subtitle>
      <itunes:summary>Putin ist ein &quot;lupenreiner Demokrat&quot;, so Gerhard Schröder 2004 bei Beckmann. Wie sehr das dem Demokratieverständnis der abgewählten SPD und der immer noch nicht ausreichend weggewählten CDU entspricht, zeigt dieser Vortrag. Er beleuchtet dabei Gedankengut und Arbeit von Thinktanks wie des &quot;Frankfurter Zukunftsrats&quot;, der &quot;Initiative Neue Marktwirtschaft&quot; und des &quot;Konvents für Deutschland&quot; und die Auswirkungen auf die aktuelle Politik.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3622.en.html
</itunes:summary>
      <itunes:duration>01:07:49</itunes:duration>
    </item>
    <item>
      <title>Das Zugangserschwerungsgesetz (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3495-de-das_zugangserschwerungsgesetz</link>
      <description>Das Zugangserschwerungsgesetz soll einer umfassenden polizei- und verfassungsrechtlichen Analyse und Kritik unterzogen werden.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3495.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3495-de-das_zugangserschwerungsgesetz.webm"
        length="687865856"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3495-de-das_zugangserschwerungsgesetz.webm?1399728408</guid>
      <dc:identifier>import-52dc8679e690b2bfdc</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Matthias Bäcker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:summary>Das Zugangserschwerungsgesetz soll einer umfassenden polizei- und verfassungsrechtlichen Analyse und Kritik unterzogen werden.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3495.en.html
</itunes:summary>
      <itunes:duration>00:58:34</itunes:duration>
    </item>
    <item>
      <title>Here Be Electric Dragons (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3452-en-here_be_electric_dragons</link>
      <description>Unnoticed by average Joe we are currently experiencing the advent of autonomous machines. This development will undoubtedly result in epochal change of our way of live. Naturally this has the potential to cause enormous problems. Two key issues will be how to tame the risks these autonomous machines pose and how to deal with the impact their wide proliferation will have on societies. A few years ago these questions were only important in science fiction. Today “killer” applications are no longer an academic topic. Now it is on us to start thinking about this questions and to preemptively develop new practices. Curiously, what might be a large part of the solution has already been central to the hacker community for decades: hacker ethic.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3452.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3452-en-here_be_electric_dragons.webm"
        length="703594496"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3452-en-here_be_electric_dragons.webm?1399728408</guid>
      <dc:identifier>import-014f898cf2db41888a</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Lorenz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Preparing for the Emancipation of Machines</itunes:subtitle>
      <itunes:summary>Unnoticed by average Joe we are currently experiencing the advent of autonomous machines. This development will undoubtedly result in epochal change of our way of live. Naturally this has the potential to cause enormous problems. Two key issues will be how to tame the risks these autonomous machines pose and how to deal with the impact their wide proliferation will have on societies. A few years ago these questions were only important in science fiction. Today “killer” applications are no longer an academic topic. Now it is on us to start thinking about this questions and to preemptively develop new practices. Curiously, what might be a large part of the solution has already been central to the hacker community for decades: hacker ethic.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3452.en.html
</itunes:summary>
      <itunes:duration>00:59:55</itunes:duration>
    </item>
    <item>
      <title>CCC-Jahresrückblick (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3690-de-ccc-jahresrckblick</link>
      <description>Auch aus dem Jahr 2009 gibt es wieder über ein wahres Mammutprogramm zu berichten. Wir werden – in aller gebotenen Kürze – erzählen, was für Aktivitäten wir entfaltet haben. Wir rechnen ab.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3690.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3690-de-ccc-jahresrckblick.webm"
        length="1029701632"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3690-de-ccc-jahresrckblick.webm?1399728408</guid>
      <dc:identifier>import-573de9e545c1cb82dd</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Andy Müller-Maguhn, Constanze Kurz, Frank Rieger, maha/Martin Haase</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:summary>Auch aus dem Jahr 2009 gibt es wieder über ein wahres Mammutprogramm zu berichten. Wir werden – in aller gebotenen Kürze – erzählen, was für Aktivitäten wir entfaltet haben. Wir rechnen ab.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3690.en.html
</itunes:summary>
      <itunes:duration>01:27:37</itunes:duration>
    </item>
    <item>
      <title>Computer.Spiele.Politik. (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3711-de-computerspielepolitik</link>
      <description>Beim Thema Computerspiele scheiden sich die Geister. Während einige beim Gedanken an spielesüchtige arbeitslose männliche Soziopathen den Untergang des Abendlands proklamieren, sehen andere Computerspiele als das Normalste auf der Welt an, als Wirtschaftsfaktor und soziale Instanz, und sprechen jedem Spieler ein Höchstmaß an Mündigkeit zu. Beim Streit um das Kulturgut Computerspiel geht es aber um mehr, als nur um das Spiel oder den Spieler. Dieser Vortrag soll die Hintergründe, Konfliktlinien und Nebenkriegsschauplätze beleuchten.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3711.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3711-de-computerspielepolitik.webm"
        length="838860800"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3711-de-computerspielepolitik.webm?1399728408</guid>
      <dc:identifier>import-4e056a1904ace168ae</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Bastian Dietz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:subtitle>Die Computerspieldebatte und wie man darin überlebt</itunes:subtitle>
      <itunes:summary>Beim Thema Computerspiele scheiden sich die Geister. Während einige beim Gedanken an spielesüchtige arbeitslose männliche Soziopathen den Untergang des Abendlands proklamieren, sehen andere Computerspiele als das Normalste auf der Welt an, als Wirtschaftsfaktor und soziale Instanz, und sprechen jedem Spieler ein Höchstmaß an Mündigkeit zu. Beim Streit um das Kulturgut Computerspiel geht es aber um mehr, als nur um das Spiel oder den Spieler. Dieser Vortrag soll die Hintergründe, Konfliktlinien und Nebenkriegsschauplätze beleuchten.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3711.en.html
</itunes:summary>
      <itunes:duration>01:11:25</itunes:duration>
    </item>
    <item>
      <title>Technik des neuen ePA (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3510-de-technik_des_neuen_epa</link>
      <description>Brave new eID world: PACE, TA/CA, RI, eID, younameit.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3510.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3510-de-technik_des_neuen_epa.webm"
        length="703594496"
        type="video/webm"/>
      <pubDate>Tue, 29 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3510-de-technik_des_neuen_epa.webm?1399728408</guid>
      <dc:identifier>import-79abc6678b832816fd</dc:identifier>
      <dc:date>2009-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Henryk Plötz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:summary>Brave new eID world: PACE, TA/CA, RI, eID, younameit.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3510.en.html
</itunes:summary>
      <itunes:duration>00:59:52</itunes:duration>
    </item>
    <item>
      <title>Eine Zensur findet statt (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3523-de-eine_zensur_findet_statt</link>
      <description>Der Vortrag stellt die Zensurmaßnahmen in ausgewählten Ländern der Welt vor. Wir sagen Euch, wo welche Inhalte zensiert werden und wie die Technik hierzu aussieht.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3523.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3523-de-eine_zensur_findet_statt.webm"
        length="637534208"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3523-de-eine_zensur_findet_statt.webm?1399728408</guid>
      <dc:identifier>import-9ccb7a83f51f1522a1</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Jens Kubieziel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Community</itunes:keywords>
      <itunes:subtitle>Eine Rundreise durch die Welt der Zensur – Wo, Was und Wie?</itunes:subtitle>
      <itunes:summary>Der Vortrag stellt die Zensurmaßnahmen in ausgewählten Ländern der Welt vor. Wir sagen Euch, wo welche Inhalte zensiert werden und wie die Technik hierzu aussieht.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3523.en.html
</itunes:summary>
      <itunes:duration>00:54:17</itunes:duration>
    </item>
    <item>
      <title>Das Recht am eigenen Bild und das Ende der &quot;Street Photography&quot; (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography</link>
      <description>Die immer stärkere Inanspruchnahme des Rechtes am eigenen Bild führt nicht nur zu einem souveräneren Bürger, sondern auch zum Tod eines fotografischen Sujets. Aus der Sicht eines Fotografen und Mitarbeiters der deutschen Nachrichtenagentur ddp soll hier berichtet werden.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3551.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.webm"
        length="689963008"
        type="video/webm"/>
      <pubDate>Sun, 27 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.webm?1399728408</guid>
      <dc:identifier>import-9d2e94f5baf5c7ceaf</dc:identifier>
      <dc:date>2009-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Axel Schmidt</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Society</itunes:keywords>
      <itunes:summary>Die immer stärkere Inanspruchnahme des Rechtes am eigenen Bild führt nicht nur zu einem souveräneren Bürger, sondern auch zum Tod eines fotografischen Sujets. Aus der Sicht eines Fotografen und Mitarbeiters der deutschen Nachrichtenagentur ddp soll hier berichtet werden.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3551.en.html
</itunes:summary>
      <itunes:duration>00:58:41</itunes:duration>
    </item>
    <item>
      <title>Defending the Poor (26c3)</title>
      <link>https://media.ccc.de/v/26c3-3494-de-defending_the_poor</link>
      <description>The talk will discuss a class of in-the-wild malware and exploits, reasons for it&#39;s success as well as reasons why protecting against it in common ways is not effective. This will be done by examining the internals of the attacked subject. Following this, the second part of the talk will present an alternative protection mechanism, which the presenter believes prevents large parts of this class of attacks. The mechanisms and code to do this will be presented and released.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3494.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2009/webm/26c3-3494-de-defending_the_poor.webm"
        length="840957952"
        type="video/webm"/>
      <pubDate>Mon, 28 Dec 2009 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2009/webm/26c3-3494-de-defending_the_poor.webm?1399728408</guid>
      <dc:identifier>import-86ae3abe6a434f4cec</dc:identifier>
      <dc:date>2009-12-28T01:00:00+01:00</dc:date>
      <itunes:author>FX of Phenoelit</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>26c3, Hacking</itunes:keywords>
      <itunes:subtitle>Preventing Flash Exploits</itunes:subtitle>
      <itunes:summary>The talk will discuss a class of in-the-wild malware and exploits, reasons for it&#39;s success as well as reasons why protecting against it in common ways is not effective. This will be done by examining the internals of the attacked subject. Following this, the second part of the talk will present an alternative protection mechanism, which the presenter believes prevents large parts of this class of attacks. The mechanisms and code to do this will be presented and released.

about this event: http://events.ccc.de/congress/2009/Fahrplan/events/3494.en.html
</itunes:summary>
      <itunes:duration>01:11:33</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/congress/2009/folder-26c3.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from 26c3 as webm</itunes:summary>
  </channel>
</rss>