<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - SHA2017: Still Hacking Anyway (high quality webm)</title>
    <link>https://media.ccc.de/c/SHA2017</link>
    <description> This feed contains all events from SHA2017 as webm</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:46:12 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/events/SHA2017/logo.png</url>
      <title>Chaos Computer Club - SHA2017: Still Hacking Anyway (high quality webm)</title>
      <link>https://media.ccc.de/c/SHA2017</link>
    </image>
    <item>
      <title>Attacking OpenSSL using Side-channel Attacks (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-169-attacking_openssl_using_side-channel_attacks</link>
      <description>Side channel attacks (SCA) gained attention in the past years. New low cost tools like Chip-Whisperer proved that these attacks are not any more a theoretical, academic risk but a real threat to the security of the embedded systems. Many cryptographic products are now being developed having this attacks in mind and countermeasures are being implemented.  This is the case of the omnipresent OpenSSL, which implement protections against side channel attacks to prevent the extraction of the secret key. 
In our presentation, we will briefly introduce SCA to the audience and discuss later the countermeasures implemented in the OpenSSL RSA and our attack that allows us to bypass them. 
#NetworkSecurity

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-169-eng-Attacking_OpenSSL_using_Side-channel_Attacks_webm-hd.webm"
        length="1715470336"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-169-eng-Attacking_OpenSSL_using_Side-channel_Attacks_webm-hd.webm?1503311554</guid>
      <dc:identifier>d5ad9c64-0e65-4ee2-bc2b-feb9c7faa1c6</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Praveen Vadnala, Lukasz Chmielewski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 169</itunes:keywords>
      <itunes:subtitle>The RSA case study</itunes:subtitle>
      <itunes:summary>Side channel attacks (SCA) gained attention in the past years. New low cost tools like Chip-Whisperer proved that these attacks are not any more a theoretical, academic risk but a real threat to the security of the embedded systems. Many cryptographic products are now being developed having this attacks in mind and countermeasures are being implemented.  This is the case of the omnipresent OpenSSL, which implement protections against side channel attacks to prevent the extraction of the secret key. 
In our presentation, we will briefly introduce SCA to the audience and discuss later the countermeasures implemented in the OpenSSL RSA and our attack that allows us to bypass them. 
#NetworkSecurity

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:49:35</itunes:duration>
    </item>
    <item>
      <title>DNA: More Greatest Hits (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-99942-sha2017_more_greatest_hits</link>
      <description>Part 2 of the presentation &quot;DNA: The Code of Life&quot; at SHA2017. This recording was made by Bart Smit and post-processed to compensate for the bad lighting conditions for the projector. The sound improves after the first few minutes. Part one of the presentation is at https://media.ccc.de/v/SHA2017-31-dna_the_code_of_life - slides and more can be found on https://ds9a.nl/dna/
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-99942-eng-DNA_More_Greatest_Hits_webm-hd.webm"
        length="291504128"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-99942-eng-DNA_More_Greatest_Hits_webm-hd.webm?1503238007</guid>
      <dc:identifier>0c63929e-6b31-44d1-99aa-6a27e5db53d0</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>bert hubert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 99942</itunes:keywords>
      <itunes:summary>Part 2 of the presentation &quot;DNA: The Code of Life&quot; at SHA2017. This recording was made by Bart Smit and post-processed to compensate for the bad lighting conditions for the projector. The sound improves after the first few minutes. Part one of the presentation is at https://media.ccc.de/v/SHA2017-31-dna_the_code_of_life - slides and more can be found on https://ds9a.nl/dna/
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:04:09</itunes:duration>
    </item>
    <item>
      <title>Let&#39;s hack words (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-167-let_s_hack_words</link>
      <description>Within the framework of the &quot;Hacking Words&quot; writing workshop, interested participants will deal with this year&#39;s theme of the Shah2017: resilience. The creative writing principle is written for 30 minutes. There is only one motto: do not think of rules, readers, quality or your inner censor. Instead, it is about putting first ideas to paper and getting into the write flow.

#Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-167-eng-Lets_hack_words_webm-hd.webm"
        length="695205888"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-167-eng-Lets_hack_words_webm-hd.webm?1502655921</guid>
      <dc:identifier>894154c3-eda0-4b17-ad5d-5bd4c0fc72f0</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Barbara Wimmer, jinxx</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 167</itunes:keywords>
      <itunes:subtitle>Creative Writing </itunes:subtitle>
      <itunes:summary>Within the framework of the &quot;Hacking Words&quot; writing workshop, interested participants will deal with this year&#39;s theme of the Shah2017: resilience. The creative writing principle is written for 30 minutes. There is only one motto: do not think of rules, readers, quality or your inner censor. Instead, it is about putting first ideas to paper and getting into the write flow.

#Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:56:58</itunes:duration>
    </item>
    <item>
      <title>Lockpicking and IT Security (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-25-lockpicking_and_it_security</link>
      <description>What do design flaws, implementation errors, 0days etc. look like in physical locks?
#PhysicalSecurity #Software
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-25-eng-Lockpicking_and_IT_Security_webm-hd.webm"
        length="351272960"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-25-eng-Lockpicking_and_IT_Security_webm-hd.webm?1502215933</guid>
      <dc:identifier>22c3d7ca-e490-40d1-b0e4-d321392d53ad</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Walter Belgers</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 25</itunes:keywords>
      <itunes:summary>What do design flaws, implementation errors, 0days etc. look like in physical locks?
#PhysicalSecurity #Software
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:58:10</itunes:duration>
    </item>
    <item>
      <title>SHA2017 Closing (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-252-sha2017_closing</link>
      <description>A summary extraordinaire.

#Community
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-252-eng-SHA2017_Closing_webm-hd.webm"
        length="638582784"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-252-eng-SHA2017_Closing_webm-hd.webm?1502223631</guid>
      <dc:identifier>ce865c40-0cce-4ad5-9c51-f4f1d4aea377</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Elger Jonker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 252</itunes:keywords>
      <itunes:subtitle>Five days of hacking, this is what happened. You wouldn&#39;t believe day 2! *click*</itunes:subtitle>
      <itunes:summary>A summary extraordinaire.

#Community
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:29:28</itunes:duration>
    </item>
    <item>
      <title>Infrastructure review (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-338-infrastructure_review</link>
      <description>Infrastructure talk from Productiehuis, NOC and other interested teams. 

#Making #Sharing #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-338-eng-Infrastructure_review_webm-hd.webm"
        length="520093696"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-338-eng-Infrastructure_review_webm-hd.webm?1502222784</guid>
      <dc:identifier>01d07c5c-8a4e-4dbf-acf5-126d738a1ddf</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Bix</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 338</itunes:keywords>
      <itunes:subtitle>How all the infra teams made SHA2017 possible</itunes:subtitle>
      <itunes:summary>Infrastructure talk from Productiehuis, NOC and other interested teams. 

#Making #Sharing #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:54:25</itunes:duration>
    </item>
    <item>
      <title>Biometric ID cards by the billion (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-190-biometric_id_cards_by_the_billion</link>
      <description>India has rolled out a &#39;voluntary&#39; biometric ID card to all of its billion-plus citizens. Which is fascinating from a social, technical and fundamental rights perspective. This talk is about both intended and unintended consequences of this grand experiment, with a focus on the (implicit) assumptions we tend to make about technology.

#Society #Privacy #SurveillanceState
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-190-eng-Biometric_ID_cards_by_the_billion_webm-hd.webm"
        length="1339031552"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-190-eng-Biometric_ID_cards_by_the_billion_webm-hd.webm?1502220644</guid>
      <dc:identifier>509a87d3-75dd-4ea1-b2ca-79b03ff90749</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Malavika Jayaram</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 190</itunes:keywords>
      <itunes:subtitle>Experiences with Aadhaar in India, or what possibly could go wrong</itunes:subtitle>
      <itunes:summary>India has rolled out a &#39;voluntary&#39; biometric ID card to all of its billion-plus citizens. Which is fascinating from a social, technical and fundamental rights perspective. This talk is about both intended and unintended consequences of this grand experiment, with a focus on the (implicit) assumptions we tend to make about technology.

#Society #Privacy #SurveillanceState
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:57:42</itunes:duration>
    </item>
    <item>
      <title>Hackerspaces Jedi (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-284-hackerspaces_jedi</link>
      <description>We use traceroutes to explore and visualise interconnectedness between devices on the internet (specifically: RIPE Atlas probes). This talk is about exploring the interconnectedness within a country (&quot;are local paths local&quot;), and also about exploring the interconnectedness between hackerspaces.
#NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-284-eng-Hackerspaces_Jedi_webm-hd.webm"
        length="95420416"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-284-eng-Hackerspaces_Jedi_webm-hd.webm?1502212251</guid>
      <dc:identifier>cf9916ac-0cb4-4a61-ae81-5fc40f36b67f</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Emile Aben</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 284</itunes:keywords>
      <itunes:subtitle>Everything is interconnected - but how?</itunes:subtitle>
      <itunes:summary>We use traceroutes to explore and visualise interconnectedness between devices on the internet (specifically: RIPE Atlas probes). This talk is about exploring the interconnectedness within a country (&quot;are local paths local&quot;), and also about exploring the interconnectedness between hackerspaces.
#NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:25:54</itunes:duration>
    </item>
    <item>
      <title>Can quantum physics break cryptography&#39;s curse? (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-179-can_quantum_physics_break_cryptography_s_curse</link>
      <description>The history of cryptography is a history of failures. Stronger ciphers replaced broken ones, to be in turn broken again. Quantum cryptography is offering a hope to end this replacement cycle, for its security premises on the laws of quantum physics and not on limitations of human ingenuity and computing. But, can our nascent quantum technology  implement quantum cryptography securely? The talk introduces today&#39;s quantum cryptography techniques, then shows how to compromise their security by exploiting imperfections in engineering implementations.

#DeviceSecurity #Science #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-179-eng-Can_quantum_physics_break_cryptographys_curse_webm-hd.webm"
        length="464519168"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-179-eng-Can_quantum_physics_break_cryptographys_curse_webm-hd.webm?1502221948</guid>
      <dc:identifier>5f25fc58-113d-4605-9fc0-9e98407cd9a3</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Vadim Makarov</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 179</itunes:keywords>
      <itunes:summary>The history of cryptography is a history of failures. Stronger ciphers replaced broken ones, to be in turn broken again. Quantum cryptography is offering a hope to end this replacement cycle, for its security premises on the laws of quantum physics and not on limitations of human ingenuity and computing. But, can our nascent quantum technology  implement quantum cryptography securely? The talk introduces today&#39;s quantum cryptography techniques, then shows how to compromise their security by exploiting imperfections in engineering implementations.

#DeviceSecurity #Science #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:59:41</itunes:duration>
    </item>
    <item>
      <title>Lightning talks day 5 (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-345-lightning_talks_day_5</link>
      <description>
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-345-eng-Lightning_talks_day_5_webm-hd.webm"
        length="532676608"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-345-eng-Lightning_talks_day_5_webm-hd.webm?1502222907</guid>
      <dc:identifier>a714f23a-ebff-4256-98bf-56ca7b45f669</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Eireann &#39;bsb&#39; Leverett</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 345</itunes:keywords>
      <itunes:summary>
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:55:51</itunes:duration>
    </item>
    <item>
      <title>SHA2017 Badge (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-51-sha2017_badge</link>
      <description>The SHA2017 Badge overview.

#Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-51-eng-SHA2017_Badge_webm-hd.webm"
        length="483393536"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-51-eng-SHA2017_Badge_webm-hd.webm?1502215058</guid>
      <dc:identifier>f284b8f1-f27b-466e-9084-c3de794f8fd3</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Niek Blankers, Sebastius</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 51</itunes:keywords>
      <itunes:summary>The SHA2017 Badge overview.

#Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:46:46</itunes:duration>
    </item>
    <item>
      <title>The Fenrir Project (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-150-the_fenrir_project</link>
      <description>TLS can be limiting, OAuth is a (somewhat working) mess.
What would happen if we redesigned things from scratch?
Fenrir is a federated protocol built with both heavy security and high flexibility in mind, with lots of new and interesting security properties.

#NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-150-eng-The_Fenrir_Project_webm-hd.webm"
        length="338690048"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-150-eng-The_Fenrir_Project_webm-hd.webm?1502212139</guid>
      <dc:identifier>5985d37d-0b6c-4de6-bb26-cdb89ac45eff</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Luca Fulchir</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 150</itunes:keywords>
      <itunes:subtitle>Fixing Authentication and Transport protocols</itunes:subtitle>
      <itunes:summary>TLS can be limiting, OAuth is a (somewhat working) mess.
What would happen if we redesigned things from scratch?
Fenrir is a federated protocol built with both heavy security and high flexibility in mind, with lots of new and interesting security properties.

#NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:34:54</itunes:duration>
    </item>
    <item>
      <title>Hack-a-ble (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-230-hack-a-ble</link>
      <description>Although IoT is already embedded in our everyday lives, our security and privacy are sometime left behind for comfort and other reasons, despite the serious impact that IoT vulnerabilities may have on our digital and physical security.

Bluetooth Low Energy (BLE), also known as Bluetooth Smart is the most popular protocol used for interfacing IoT and smart devices. Broadly used in the healthcare, fitness, security, and home-entertainment industries, nowadays we encounter BLE in almost every aspect of our lives (e.g. in wearables, sensors, medical devices, security products, etc.).

In this lecture I will survey key security issues in the BLE protocol, as well as presenting a possible architecture for BLE Man-in-the-Middle (MitM) attack together with the related necessary equipment. In addition, will introduce some of the available tools and how they can be used to perform penetration-testing on BLE applications and will discuss possible mitigations to secure them.

#NetworkSecurity #IoT
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-230-eng-Hack-a-ble_webm-hd.webm"
        length="271581184"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-230-eng-Hack-a-ble_webm-hd.webm?1502212535</guid>
      <dc:identifier>7b8075fb-aafa-4037-beb9-168b5461c831</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Tal Melamed</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 230</itunes:keywords>
      <itunes:subtitle>Hacking BLE Smart Devices</itunes:subtitle>
      <itunes:summary>Although IoT is already embedded in our everyday lives, our security and privacy are sometime left behind for comfort and other reasons, despite the serious impact that IoT vulnerabilities may have on our digital and physical security.

Bluetooth Low Energy (BLE), also known as Bluetooth Smart is the most popular protocol used for interfacing IoT and smart devices. Broadly used in the healthcare, fitness, security, and home-entertainment industries, nowadays we encounter BLE in almost every aspect of our lives (e.g. in wearables, sensors, medical devices, security products, etc.).

In this lecture I will survey key security issues in the BLE protocol, as well as presenting a possible architecture for BLE Man-in-the-Middle (MitM) attack together with the related necessary equipment. In addition, will introduce some of the available tools and how they can be used to perform penetration-testing on BLE applications and will discuss possible mitigations to secure them.

#NetworkSecurity #IoT
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:56:53</itunes:duration>
    </item>
    <item>
      <title>FaceDancer 2.0 (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-221-facedancer_2_0</link>
      <description>USB connectivity has become ubiquitous. The sheer variety of usb-connected  devices— ranging from computers and game consoles to  resource-constrained embedded systems— has resulted in a wide variety of  vendor-specific protocols and custom USB software stacks. 

Being  able to fuzz, monitor, mitm, or emulate USB can often be a foot in the  door for working with black box systems; whether your goal is to build  tools that work with existing hardware and software, find vendor  interfaces or vulnerabilities to execute custom code, or to play NSA.

We  introduce FaceDancer 2.0, with more supported hardware, higher speeds,  and advanced capabilities for monitoring and mitming USB connections.

#DeviceSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-221-eng-FaceDancer_20_webm-hd.webm"
        length="1074790400"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-221-eng-FaceDancer_20_webm-hd.webm?1502229960</guid>
      <dc:identifier>18911a7a-2c27-419e-86c4-4b4878991379</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Dominic Spill, ktemkin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 221</itunes:keywords>
      <itunes:subtitle>easy USB hacking, sniffing, and spoofing</itunes:subtitle>
      <itunes:summary>USB connectivity has become ubiquitous. The sheer variety of usb-connected  devices— ranging from computers and game consoles to  resource-constrained embedded systems— has resulted in a wide variety of  vendor-specific protocols and custom USB software stacks. 

Being  able to fuzz, monitor, mitm, or emulate USB can often be a foot in the  door for working with black box systems; whether your goal is to build  tools that work with existing hardware and software, find vendor  interfaces or vulnerabilities to execute custom code, or to play NSA.

We  introduce FaceDancer 2.0, with more supported hardware, higher speeds,  and advanced capabilities for monitoring and mitming USB connections.

#DeviceSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:01:30</itunes:duration>
    </item>
    <item>
      <title>Parkour communications (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-53-parkour_communications</link>
      <description>Using encryption and onion routing is all fine and dandy, but both can be detected and both can, at the very least, be severely hampered or even be cut off.&lt;br/&gt;
However, the Internet nowadays is full of services and systems that autonomously, and continuously, send data to users all over the world.&lt;br/&gt;
These messages or interactions are seen as formalities and have become a blind spot, even with security minded people; they are just the fixtures of the Internet.&lt;br/&gt;
In this lecture I want to try and effect a change of mind when looking at these fixtures and to show ways how to hack them.&lt;br/&gt;
Hack them, not to pwn them or to corrupt them, but rather hack them to use as communications method when all else is either watched, broken or blocked.&lt;br/&gt;
Not in the same way as &#39;just sending a few base64 encoded tweets&#39;, but really...
#NetworkSecurity #Privacy
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-53-eng-Parkour_communications_webm-hd.webm"
        length="391118848"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-53-eng-Parkour_communications_webm-hd.webm?1502219145</guid>
      <dc:identifier>6b3c4c2a-45ab-445d-bfc1-8989775235a4</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Adrianus Warmenhoven</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 53</itunes:keywords>
      <itunes:subtitle>How you can communicate, free running style, using nothing but the &#39;fixtures&#39; of the Internet.</itunes:subtitle>
      <itunes:summary>Using encryption and onion routing is all fine and dandy, but both can be detected and both can, at the very least, be severely hampered or even be cut off.&lt;br/&gt;
However, the Internet nowadays is full of services and systems that autonomously, and continuously, send data to users all over the world.&lt;br/&gt;
These messages or interactions are seen as formalities and have become a blind spot, even with security minded people; they are just the fixtures of the Internet.&lt;br/&gt;
In this lecture I want to try and effect a change of mind when looking at these fixtures and to show ways how to hack them.&lt;br/&gt;
Hack them, not to pwn them or to corrupt them, but rather hack them to use as communications method when all else is either watched, broken or blocked.&lt;br/&gt;
Not in the same way as &#39;just sending a few base64 encoded tweets&#39;, but really...
#NetworkSecurity #Privacy
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:36:10</itunes:duration>
    </item>
    <item>
      <title>NSFW: Di[CENSORED]s for privacy (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-49-nsfw_di_censored_s_for_privacy</link>
      <description>History, relevance and future of penis imagery in culture.

A radical way to deter hackers or just a stupid idea.

Using your most private key in new and inventive ways.

#Society #DeviceSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-49-eng-NSFW_Di_CENSORED_s_for_privacy_webm-hd.webm"
        length="246415360"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-49-eng-NSFW_Di_CENSORED_s_for_privacy_webm-hd.webm?1502210817</guid>
      <dc:identifier>67b3b3d4-6098-4694-896c-3e6f76b400d7</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Anus</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 49</itunes:keywords>
      <itunes:subtitle>Why not give hackers and agencies something to look at . .</itunes:subtitle>
      <itunes:summary>History, relevance and future of penis imagery in culture.

A radical way to deter hackers or just a stupid idea.

Using your most private key in new and inventive ways.

#Society #DeviceSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:28:13</itunes:duration>
    </item>
    <item>
      <title>DDoS attack and defense (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-174-ddos_attack_and_defense</link>
      <description>In this talk you&#39;ll be given a very technical overview of DDoS and mitigation techniques; their effectiveness will be evaluated with real-life examples.

#NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-174-eng-DDoS_attack_and_defense_webm-hd.webm"
        length="343932928"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-174-eng-DDoS_attack_and_defense_webm-hd.webm?1502212172</guid>
      <dc:identifier>54fd6dc6-c0c7-46d5-b122-4b94ec8ba635</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Craig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 174</itunes:keywords>
      <itunes:subtitle>for the lulz</itunes:subtitle>
      <itunes:summary>In this talk you&#39;ll be given a very technical overview of DDoS and mitigation techniques; their effectiveness will be evaluated with real-life examples.

#NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:54:17</itunes:duration>
    </item>
    <item>
      <title>Exploiting Twitter with Tinfoleak for investigative purposes (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-269-exploiting_twitter_with_tinfoleak_for_investigative_purposes</link>
      <description>In this talk, I will present a new version of my tool Tinfoleak, the most complete OSINT open-source tool for Twitter. I will show real examples of how to exploit the information in social networks for investigative tasks. The goal is to see, what kind of information can be extracted about a person or a location, and the purpose with which it can be used, with a live demo. Among other information, I will show useful information for security forces, private investigators, pentesters, social engineers, journalists, security analysts and anyone interested in the privacy or analysis of social networks for investigative purposes.

#Privacy #Society
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-269-eng-Exploiting_Twitter_with_Tinfoleak_for_investigative_purposes_webm-hd.webm"
        length="375390208"
        type="video/webm"/>
      <pubDate>Tue, 08 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-269-eng-Exploiting_Twitter_with_Tinfoleak_for_investigative_purposes_webm-hd.webm?1502197583</guid>
      <dc:identifier>159484b6-5989-4e61-b0bb-20f12a8b65d1</dc:identifier>
      <dc:date>2017-08-08T00:00:00+02:00</dc:date>
      <itunes:author>Vicente Aguilera Díaz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 269</itunes:keywords>
      <itunes:summary>In this talk, I will present a new version of my tool Tinfoleak, the most complete OSINT open-source tool for Twitter. I will show real examples of how to exploit the information in social networks for investigative tasks. The goal is to see, what kind of information can be extracted about a person or a location, and the purpose with which it can be used, with a live demo. Among other information, I will show useful information for security forces, private investigators, pentesters, social engineers, journalists, security analysts and anyone interested in the privacy or analysis of social networks for investigative purposes.

#Privacy #Society
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:53:43</itunes:duration>
    </item>
    <item>
      <title>Building A Virtual Reality Website using A-Frame (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-84-building_a_virtual_reality_website_using_a-frame</link>
      <description>A-Frame is an open-source web framework by Mozilla for easily creating VR experiences which work on all platforms. In this session you will learn to use various concepts &amp; APIs of A-Frame and create interactive VR scenes on the web, all you need to get started is a basic knowledge of HTML &amp; JS.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-84-eng-Building_A_Virtual_Reality_Website_using_A-Frame_webm-hd.webm"
        length="376438784"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-84-eng-Building_A_Virtual_Reality_Website_using_A-Frame_webm-hd.webm?1502182236</guid>
      <dc:identifier>561d9e35-f053-43d7-a13c-0c493cf0c527</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Ram</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 84</itunes:keywords>
      <itunes:summary>A-Frame is an open-source web framework by Mozilla for easily creating VR experiences which work on all platforms. In this session you will learn to use various concepts &amp; APIs of A-Frame and create interactive VR scenes on the web, all you need to get started is a basic knowledge of HTML &amp; JS.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:32:31</itunes:duration>
    </item>
    <item>
      <title>Energy Harvesting for Smart Autonomous Electronics 2 (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-488-energy_harvesting_for_smart_autonomous_electronics_2</link>
      <description>Converting ambient energy into electrical energy to power wireless autonomous devices instead of batteries opens up a variety of opportunities to design electronic systems that last a life time, and don&#39;t ever need maintenance. This talk discusses the state of the art in energy harvesting, focusing on light, heat, and vibrations, and elaborating new storage media such as solid state cells and super capacitors. The emphasis is on practical applications and examples rather than theory, aiming to guide the audience on the way to removing batteries from their own creations and replacing them by energy harvesters.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-488-eng-Energy_Harvesting_for_Smart_Autonomous_Electronics_2_webm-hd.webm"
        length="828375040"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-488-eng-Energy_Harvesting_for_Smart_Autonomous_Electronics_2_webm-hd.webm?1502174348</guid>
      <dc:identifier>cb846c22-e62f-457d-b37d-ae97f795d215</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Yannick Verbelen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 488</itunes:keywords>
      <itunes:subtitle>Towards a future of autonomous wireless electronics without batteries</itunes:subtitle>
      <itunes:summary>Converting ambient energy into electrical energy to power wireless autonomous devices instead of batteries opens up a variety of opportunities to design electronic systems that last a life time, and don&#39;t ever need maintenance. This talk discusses the state of the art in energy harvesting, focusing on light, heat, and vibrations, and elaborating new storage media such as solid state cells and super capacitors. The emphasis is on practical applications and examples rather than theory, aiming to guide the audience on the way to removing batteries from their own creations and replacing them by energy harvesters.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:21:12</itunes:duration>
    </item>
    <item>
      <title>Commissioning methods for IoT (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-325-commissioning_methods_for_iot</link>
      <description>Many of the things we use on a daily basis are becoming smart and connected. The Internet of Things (IoT) will improve our lives by helping us reach our fitness goals, reduce resource consumption, increasing productivity, and track and secure our assets. Many embedded developers realize the potential benefits of the IoT and are actively developing various applications, from connected home devices to wearables to home security systems. However, along with these benefits come risks. No one wants to design an application that’s prone to hacking or data theft. One of the most complicated and crucial trade-offs in IoT security is the commissioning of wireless devices onto a network. This lecture presents a review of common commissioning methods and their security tradeoffs.

#IoT #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-325-eng-Commissioning_methods_for_IoT_webm-hd.webm"
        length="130023424"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-325-eng-Commissioning_methods_for_IoT_webm-hd.webm?1502174547</guid>
      <dc:identifier>b673cff0-0c26-4316-8885-08a9dffeb335</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Lars Lydersen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 325</itunes:keywords>
      <itunes:summary>Many of the things we use on a daily basis are becoming smart and connected. The Internet of Things (IoT) will improve our lives by helping us reach our fitness goals, reduce resource consumption, increasing productivity, and track and secure our assets. Many embedded developers realize the potential benefits of the IoT and are actively developing various applications, from connected home devices to wearables to home security systems. However, along with these benefits come risks. No one wants to design an application that’s prone to hacking or data theft. One of the most complicated and crucial trade-offs in IoT security is the commissioning of wireless devices onto a network. This lecture presents a review of common commissioning methods and their security tradeoffs.

#IoT #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:23:46</itunes:duration>
    </item>
    <item>
      <title>(In)discrete Music (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-220-in_discrete_music</link>
      <description>In which we experiment with generative music, based on chaotic systems and cellular automata. Continuous sounds will be made using discrete systems, and discrete sounds will be made using continuous systems.

#Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-220-eng-In_discrete_Music_webm-hd.webm"
        length="500170752"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-220-eng-In_discrete_Music_webm-hd.webm?1502160672</guid>
      <dc:identifier>1a7df7a4-a1c0-4cca-975b-3cb52424c874</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Giles Greenway</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 220</itunes:keywords>
      <itunes:subtitle>(mis)adventures in generative art</itunes:subtitle>
      <itunes:summary>In which we experiment with generative music, based on chaotic systems and cellular automata. Continuous sounds will be made using discrete systems, and discrete sounds will be made using continuous systems.

#Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:58:20</itunes:duration>
    </item>
    <item>
      <title>&quot;Information. What are they looking at?&quot; (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-18-information_what_are_they_looking_at</link>
      <description>Our barrier-free documentary &quot;Information. What are they looking at?&quot; takes an inclusive approach to communicating knowledge around privacy violations through mass surveillance by governments and corporations. Addressing a diverse audience our we prioritise shifting the representational power from discourse dominating white men towards the expertise of women and people of color. 

#Privacy #SurveillanceState
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-18-eng-Information_What_are_they_looking_at_webm-hd.webm"
        length="184549376"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-18-eng-Information_What_are_they_looking_at_webm-hd.webm?1502160641</guid>
      <dc:identifier>0f3f0964-b30e-46a3-83e8-2f426ab59bfc</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Theresia</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 18</itunes:keywords>
      <itunes:subtitle>A documentary on privacy for the broad audience.</itunes:subtitle>
      <itunes:summary>Our barrier-free documentary &quot;Information. What are they looking at?&quot; takes an inclusive approach to communicating knowledge around privacy violations through mass surveillance by governments and corporations. Addressing a diverse audience our we prioritise shifting the representational power from discourse dominating white men towards the expertise of women and people of color. 

#Privacy #SurveillanceState
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:17:42</itunes:duration>
    </item>
    <item>
      <title>Let There be Light (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-218-let_there_be_light</link>
      <description>The talk aims to be an introduction to LED lighting, how to create lighting hardware, what regulations and protocols are involved and how lighting can generally improve human wellbeing.

#Society #Making #PhysicalSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-218-eng-Let_There_be_Light_webm-hd.webm"
        length="517996544"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-218-eng-Let_There_be_Light_webm-hd.webm?1502160541</guid>
      <dc:identifier>4f8bb09c-348f-43a7-a29c-891af8b59c0d</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Tim Becker, Matthias Krauß</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 218</itunes:keywords>
      <itunes:subtitle>Adventures in LED Lighting</itunes:subtitle>
      <itunes:summary>The talk aims to be an introduction to LED lighting, how to create lighting hardware, what regulations and protocols are involved and how lighting can generally improve human wellbeing.

#Society #Making #PhysicalSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:02:02</itunes:duration>
    </item>
    <item>
      <title>Car hacking: getting from A to B with Eve (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-154-car_hacking_getting_from_a_to_b_with_eve</link>
      <description>Car security is, not surprisingly, a hot topic; after all they are fast and heavy computer controlled machinery that nowadays come with all kinds of internet connectivity. So we decided to have a look at it. In our presentation, we’ll first cover some theory behind the IT-part of car architecture. We’ll discuss attack vectors and their likelihood of success, and then discuss the various vulnerabilities we found. Finally, we will combine these vulnerabilities into a remote attack. Depending on the disclosure process with the vendor, which is pending, we might be able to demonstrate the attack.

#DeviceSecurity #IoT
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-154-eng-Car_hacking_getting_from_A_to_B_with_Eve_webm-hd.webm"
        length="545259520"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-154-eng-Car_hacking_getting_from_A_to_B_with_Eve_webm-hd.webm?1502160512</guid>
      <dc:identifier>24d83f1e-e578-413a-b406-1dd2244c90fd</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Daan Keuper, Thijs Alkemade</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 154</itunes:keywords>
      <itunes:summary>Car security is, not surprisingly, a hot topic; after all they are fast and heavy computer controlled machinery that nowadays come with all kinds of internet connectivity. So we decided to have a look at it. In our presentation, we’ll first cover some theory behind the IT-part of car architecture. We’ll discuss attack vectors and their likelihood of success, and then discuss the various vulnerabilities we found. Finally, we will combine these vulnerabilities into a remote attack. Depending on the disclosure process with the vendor, which is pending, we might be able to demonstrate the attack.

#DeviceSecurity #IoT
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:50:15</itunes:duration>
    </item>
    <item>
      <title>How an intern hacked the powergrid (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-434-how_an_intern_hacked_the_powergrid</link>
      <description>This talk focuses on the thesis assignment of Willem Westerhof. During this thesis it was discovered that a weak spot exists withing the Powergrid, allowing an attacker to perform a distributed attack using PV-installations to cause massive (nation-wide/continental) power outages. 

#NetworkSecurity #PhysicalSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-434-eng-How_an_intern_hacked_the_powergrid_webm-hd.webm"
        length="589299712"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-434-eng-How_an_intern_hacked_the_powergrid_webm-hd.webm?1502160480</guid>
      <dc:identifier>05007c06-fc8b-468a-b1e9-b4ff9ec8149e</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Willem Westerhof (ITsec)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 434</itunes:keywords>
      <itunes:subtitle>The Horus Scenario</itunes:subtitle>
      <itunes:summary>This talk focuses on the thesis assignment of Willem Westerhof. During this thesis it was discovered that a weak spot exists withing the Powergrid, allowing an attacker to perform a distributed attack using PV-installations to cause massive (nation-wide/continental) power outages. 

#NetworkSecurity #PhysicalSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:53:27</itunes:duration>
    </item>
    <item>
      <title>Black Hat Locksmithing (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-34-black_hat_locksmithing</link>
      <description>From thieves to prison breaks to secret tools, the murky world of the criminal locksmith is explored. It will not be a practical lesson in theft (sorry).

#PhysicalSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-34-eng-Black_Hat_Locksmithing_webm-hd.webm"
        length="402653184"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-34-eng-Black_Hat_Locksmithing_webm-hd.webm?1502160419</guid>
      <dc:identifier>06f3958c-0e2c-4dfc-804c-9493fae7fe9b</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>huxleypig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 34</itunes:keywords>
      <itunes:subtitle>When Locksmiths Go Bad</itunes:subtitle>
      <itunes:summary>From thieves to prison breaks to secret tools, the murky world of the criminal locksmith is explored. It will not be a practical lesson in theft (sorry).

#PhysicalSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:57:44</itunes:duration>
    </item>
    <item>
      <title>When Tech MIMICS Reality (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-79-when_tech_mimics_reality</link>
      <description>Many of us are reliant on the digital communication tools and reference platforms that are created by companies. These platforms - some with more users than the population of any country - are controlled by proprietary algorithms, governed through binding Terms of Services (ToS), allow for access to third-party services.
This talk will take stock of six intrusive forces that exploit invasive data collection that I have coined ‘MIMICS’: Manipulation (of our feeds and search results), Indexing (of our clicks, pageviews and social graphs), Monitoring (our content consumption patterns to shape future results), Interception (of data via upstream surveillance), Censorship (through arbitrarily enforced content moderation policies) and ‘Siloing’ (which forces users to keep their data within the walled gardens of a single platform). 

#Society #Politics #Legal #SurveillanceState
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-79-eng-When_Tech_MIMICS_Reality_webm-hd.webm"
        length="468713472"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-79-eng-When_Tech_MIMICS_Reality_webm-hd.webm?1502160447</guid>
      <dc:identifier>2308618a-a879-470a-ac61-8d163c0b431c</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Mathana Stender</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 79</itunes:keywords>
      <itunes:subtitle>Identity and Agency In the Age of Algorithms</itunes:subtitle>
      <itunes:summary>Many of us are reliant on the digital communication tools and reference platforms that are created by companies. These platforms - some with more users than the population of any country - are controlled by proprietary algorithms, governed through binding Terms of Services (ToS), allow for access to third-party services.
This talk will take stock of six intrusive forces that exploit invasive data collection that I have coined ‘MIMICS’: Manipulation (of our feeds and search results), Indexing (of our clicks, pageviews and social graphs), Monitoring (our content consumption patterns to shape future results), Interception (of data via upstream surveillance), Censorship (through arbitrarily enforced content moderation policies) and ‘Siloing’ (which forces users to keep their data within the walled gardens of a single platform). 

#Society #Politics #Legal #SurveillanceState
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:00:17</itunes:duration>
    </item>
    <item>
      <title>The Hackeboy handheld game console (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-153-the_hackeboy_handheld_game_console</link>
      <description>Hackefuffel is a small indie game label of 8-bit-heads from Hamburg. In late 2016 we decided to build the (open) retro-gaming console we always wanted...modern hardware, but old scholl spirit, and that&#39;s when Hackeboy was born. The first prototype was built at 33c3 and it has come a long way since then. In this talk we&#39;ll show you what we&#39;ve built, what worked, what didn&#39;t and what we learned on the way...and of course invite you to remix the hardware, develop your own games and of course play them! :-)

#Gaming #Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-153-eng-The_Hackeboy_handheld_game_console_webm-hd.webm"
        length="1545601024"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-153-eng-The_Hackeboy_handheld_game_console_webm-hd.webm?1502160390</guid>
      <dc:identifier>936ca1eb-d0c8-488f-96ec-55c8267e38d1</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Axel Theilmann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 153</itunes:keywords>
      <itunes:subtitle>Retro-gaming on open hardware</itunes:subtitle>
      <itunes:summary>Hackefuffel is a small indie game label of 8-bit-heads from Hamburg. In late 2016 we decided to build the (open) retro-gaming console we always wanted...modern hardware, but old scholl spirit, and that&#39;s when Hackeboy was born. The first prototype was built at 33c3 and it has come a long way since then. In this talk we&#39;ll show you what we&#39;ve built, what worked, what didn&#39;t and what we learned on the way...and of course invite you to remix the hardware, develop your own games and of course play them! :-)

#Gaming #Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:48:04</itunes:duration>
    </item>
    <item>
      <title>Resisting Algorithms of Mass Destruction (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-332-resisting_algorithms_of_mass_destruction</link>
      <description>When the Australian media use the word “clusterfuck” in headlines describing a Government data-matching program that’s sending people to debt collectors, you know you have a campaign the community will connect with.

Lyndsey Jackson, instigator of Australia’s #notmydebt, introduces the approach behind this collaborative social media campaign, and discusses some of the challenges, and rewards, of crowdsourced resistance.

#Privacy #Society #SurveillanceState
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-332-eng-Resisting_Algorithms_of_Mass_Destruction_webm-hd.webm"
        length="664797184"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-332-eng-Resisting_Algorithms_of_Mass_Destruction_webm-hd.webm?1502160275</guid>
      <dc:identifier>24112c59-8a55-40ca-a30f-d42a4850a9c6</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Lyndsey Jackson</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 332</itunes:keywords>
      <itunes:subtitle>#NotMyDebt Australia</itunes:subtitle>
      <itunes:summary>When the Australian media use the word “clusterfuck” in headlines describing a Government data-matching program that’s sending people to debt collectors, you know you have a campaign the community will connect with.

Lyndsey Jackson, instigator of Australia’s #notmydebt, introduces the approach behind this collaborative social media campaign, and discusses some of the challenges, and rewards, of crowdsourced resistance.

#Privacy #Society #SurveillanceState
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:01:45</itunes:duration>
    </item>
    <item>
      <title>Life Needs Internet (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-344-life_needs_internet</link>
      <description>How does internet influence your life?
This lecture will be about my ongoing project Life Needs Internet (2012-2017) which documents digital culture through handwritten letters. Recent letters came from Brazil, China, France, India, Ghana and Papua. All handwritten letters are translated and documented on www.lifeneedsinternet.com. Together these letters create an archaeological insight into digital culture. The audience can participate in the project by writing their own handwritten letter during the lecture.

#Society #Sharing
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-344-eng-Life_Needs_Internet_webm-hd.webm"
        length="372244480"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-344-eng-Life_Needs_Internet_webm-hd.webm?1502160155</guid>
      <dc:identifier>bda420f8-f646-43f1-8db6-3b05c2c56d50</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Jeroen van Loon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 344</itunes:keywords>
      <itunes:subtitle>Documenting digital culture through handwritten letters</itunes:subtitle>
      <itunes:summary>How does internet influence your life?
This lecture will be about my ongoing project Life Needs Internet (2012-2017) which documents digital culture through handwritten letters. Recent letters came from Brazil, China, France, India, Ghana and Papua. All handwritten letters are translated and documented on www.lifeneedsinternet.com. Together these letters create an archaeological insight into digital culture. The audience can participate in the project by writing their own handwritten letter during the lecture.

#Society #Sharing
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:44:56</itunes:duration>
    </item>
    <item>
      <title>In The Eye of the Beholder (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-78-in_the_eye_of_the_beholder</link>
      <description>Capitalist underpinnings of advanced technology development threatens individual agency and the notion of self-defined identity. As we are seen by an increasing number of image capture systems, this session will discuss prospects for the degrees of control do we exert over digital representations of our bodies as vision technology becomes more ubiquitous. 

#Privacy #SurveillanceState
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-78-eng-In_The_Eye_of_the_Beholder_webm-hd.webm"
        length="484442112"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-78-eng-In_The_Eye_of_the_Beholder_webm-hd.webm?1502160028</guid>
      <dc:identifier>3533f04d-488e-445c-aff6-9be4117ac0aa</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Mathana Stender</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 78</itunes:keywords>
      <itunes:subtitle> Theories of Governance for a Distributed Machine Vision Ecosystem</itunes:subtitle>
      <itunes:summary>Capitalist underpinnings of advanced technology development threatens individual agency and the notion of self-defined identity. As we are seen by an increasing number of image capture systems, this session will discuss prospects for the degrees of control do we exert over digital representations of our bodies as vision technology becomes more ubiquitous. 

#Privacy #SurveillanceState
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:58:25</itunes:duration>
    </item>
    <item>
      <title>The art of creating an escape room (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-322-the_art_of_creating_an_escape_room</link>
      <description>At the moment of submitting this talk there are 500+ escape rooms in The Netherlands alone. By the time SHA takes place there might be over 600. However, not all rooms are equal, and there is a vast difference in escape room experiences and quality.
This talk, presented by an experienced escape room designer, will go in to all the facets of designing and building an escape room. It will show how to create the best experience for the players, the pitfalls and how to design the puzzles and puzzle flows. 
It will further give an insight in to the technique used behind the sound, lightning and puzzle interactions. 

#PhysicalSecurity #Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-322-eng-The_art_of_creating_an_escape_room_webm-hd.webm"
        length="429916160"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-322-eng-The_art_of_creating_an_escape_room_webm-hd.webm?1502160123</guid>
      <dc:identifier>e856b1b3-ac67-42a4-ab7a-50a8d58d413e</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Thijs Bosschert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 322</itunes:keywords>
      <itunes:summary>At the moment of submitting this talk there are 500+ escape rooms in The Netherlands alone. By the time SHA takes place there might be over 600. However, not all rooms are equal, and there is a vast difference in escape room experiences and quality.
This talk, presented by an experienced escape room designer, will go in to all the facets of designing and building an escape room. It will show how to create the best experience for the players, the pitfalls and how to design the puzzles and puzzle flows. 
It will further give an insight in to the technique used behind the sound, lightning and puzzle interactions. 

#PhysicalSecurity #Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:58:25</itunes:duration>
    </item>
    <item>
      <title>Physical Penetration Testing (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-24-physical_penetration_testing</link>
      <description>Your pentesting goal: getting the data. You decide to do it physically. How to go about?

#PhysicalSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-24-eng-Physical_Penetration_Testing_webm-hd.webm"
        length="665845760"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-24-eng-Physical_Penetration_Testing_webm-hd.webm?1502160066</guid>
      <dc:identifier>57920452-ce5b-4194-a768-fed44de6d779</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Walter Belgers</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 24</itunes:keywords>
      <itunes:summary>Your pentesting goal: getting the data. You decide to do it physically. How to go about?

#PhysicalSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:53:19</itunes:duration>
    </item>
    <item>
      <title>Weaponized Social (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-28-weaponized_social</link>
      <description>We can intentionally build and improve the sociotechnical systems of which we are a part, or we can be haphazard in the worlds we create. The things which we personally find fulfilling and useful may not hold true at scale. This talk lays a framework for approaching societal-level change through being scientifically minded and taking active steps to test and implement greater equality and autonomy while respecting both.

Weaponized Social was a series of events, discussions, actions, and surrounding community over the course of 2015 used to examine the network effects of human interaction, to encourage the healthy and to &lt;strong&gt;de&lt;/strong&gt;weaponize the powerful tools at our fingertips. This talk reviews the lessons we learned about inequalities and institutional violence, the processes and tools for exploiting or combatting it, and personal responsibility.

#Society #Sharing
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-28-eng-Weaponized_Social_webm-hd.webm"
        length="158334976"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-28-eng-Weaponized_Social_webm-hd.webm?1502142751</guid>
      <dc:identifier>b66aab4c-c160-4dc5-8b21-7b4ea21ecb39</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>willowbl00</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 28</itunes:keywords>
      <itunes:subtitle>Understanding and tools to mitigate network-scale violences</itunes:subtitle>
      <itunes:summary>We can intentionally build and improve the sociotechnical systems of which we are a part, or we can be haphazard in the worlds we create. The things which we personally find fulfilling and useful may not hold true at scale. This talk lays a framework for approaching societal-level change through being scientifically minded and taking active steps to test and implement greater equality and autonomy while respecting both.

Weaponized Social was a series of events, discussions, actions, and surrounding community over the course of 2015 used to examine the network effects of human interaction, to encourage the healthy and to &lt;strong&gt;de&lt;/strong&gt;weaponize the powerful tools at our fingertips. This talk reviews the lessons we learned about inequalities and institutional violence, the processes and tools for exploiting or combatting it, and personal responsibility.

#Society #Sharing
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:35:48</itunes:duration>
    </item>
    <item>
      <title>Legacy Crypto Never Dies (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-320-legacy_crypto_never_dies</link>
      <description>In 2012 I released a DES cracking service with Moxie Marlinspike for cracking MSCHAPv2 and quickly started seeing it being used for cracking other things besides MSCHAPv2. In this presentation we&#39;ll take a look at some of the research we&#39;ve done into other widely used protocols and services that still rely on DES for security and provide an quick intro into the https://crack.sh API so you too can use this service for your own projects.

#NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-320-eng-Legacy_Crypto_Never_Dies_webm-hd.webm"
        length="247463936"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-320-eng-Legacy_Crypto_Never_Dies_webm-hd.webm?1502160091</guid>
      <dc:identifier>5c35e3c2-ec03-46f2-901c-90f3bead4a04</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>David Hulton</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 320</itunes:keywords>
      <itunes:subtitle>Cracking DES nearly 20 years after the EFF DES Cracker</itunes:subtitle>
      <itunes:summary>In 2012 I released a DES cracking service with Moxie Marlinspike for cracking MSCHAPv2 and quickly started seeing it being used for cracking other things besides MSCHAPv2. In this presentation we&#39;ll take a look at some of the research we&#39;ve done into other widely used protocols and services that still rely on DES for security and provide an quick intro into the https://crack.sh API so you too can use this service for your own projects.

#NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:44:16</itunes:duration>
    </item>
    <item>
      <title>Neuralscape Bowels (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-387-neuralscape_bowels</link>
      <description>The idea of how to transform brainwaves in images and sounds is not new, but with the new digital technologies, it becomes more accessible. During this lecture, will be present how to get this impulses from cheap sensors, and process it with free/open source tools.

#Making #Sharing
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-387-eng-Neuralscape_Bowels_webm-hd.webm"
        length="723517440"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-387-eng-Neuralscape_Bowels_webm-hd.webm?1502159958</guid>
      <dc:identifier>747948a7-93ab-44ff-bf54-b484a52d928a</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Ricardo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 387</itunes:keywords>
      <itunes:subtitle>How to read brainwaves using cheap toys</itunes:subtitle>
      <itunes:summary>The idea of how to transform brainwaves in images and sounds is not new, but with the new digital technologies, it becomes more accessible. During this lecture, will be present how to get this impulses from cheap sensors, and process it with free/open source tools.

#Making #Sharing
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:08:34</itunes:duration>
    </item>
    <item>
      <title>Gems are truly outrageous (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-235-gems_are_truly_outrageous</link>
      <description>This talk demonstrates how to make fake gemstones and related accessories using only a 3D printer and kitchen, as well as various pointers to make your own designs.

#Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-235-eng-Gems_are_truly_outrageous_webm-hd.webm"
        length="198180864"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-235-eng-Gems_are_truly_outrageous_webm-hd.webm?1502142734</guid>
      <dc:identifier>6f744229-7a02-4642-8230-8bdf2c422ff1</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>(Com)buster</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 235</itunes:keywords>
      <itunes:subtitle>Combining 3D printing and crystallisation techniques</itunes:subtitle>
      <itunes:summary>This talk demonstrates how to make fake gemstones and related accessories using only a 3D printer and kitchen, as well as various pointers to make your own designs.

#Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:30:44</itunes:duration>
    </item>
    <item>
      <title>Race For Root: The Analysis Of The Linux Kernel Race Condition Exploit (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-295-race_for_root_the_analysis_of_the_linux_kernel_race_condition_exploit</link>
      <description>CVE-2017-2636 is a 7-year old race condition in the Linux kernel that was fixed by Alexander Popov in March, 2017. This vulnerability affected all major Linux distributions. It can be exploited to gain a local privilege escalation. In this presentation Alexander will describe the PoC exploit for CVE-2017-2636. He will explain the effective method of hitting the race condition and show the following exploitation techniques: turning double-free into use-after-free, heap spraying and stabilization, SMEP bypass.

#DeviceSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-295-eng-Race_For_Root_The_Analysis_Of_The_Linux_Kernel_Race_Condition_Exploit_webm-hd.webm"
        length="290455552"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-295-eng-Race_For_Root_The_Analysis_Of_The_Linux_Kernel_Race_Condition_Exploit_webm-hd.webm?1502142801</guid>
      <dc:identifier>62a4c312-72d1-42da-a84e-99f97b52d0f6</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Alexander Popov</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 295</itunes:keywords>
      <itunes:summary>CVE-2017-2636 is a 7-year old race condition in the Linux kernel that was fixed by Alexander Popov in March, 2017. This vulnerability affected all major Linux distributions. It can be exploited to gain a local privilege escalation. In this presentation Alexander will describe the PoC exploit for CVE-2017-2636. He will explain the effective method of hitting the race condition and show the following exploitation techniques: turning double-free into use-after-free, heap spraying and stabilization, SMEP bypass.

#DeviceSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:54:41</itunes:duration>
    </item>
    <item>
      <title>Computer crime and criminal law 101 (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-288-computer_crime_and_criminal_law_101</link>
      <description>Legal lecture on Cybercrime for non-legal-experts

#Society #Politics
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-288-eng-Computer_crime_and_criminal_law_101_webm-hd.webm"
        length="767557632"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-288-eng-Computer_crime_and_criminal_law_101_webm-hd.webm?1502159919</guid>
      <dc:identifier>444f2c42-36c5-4cc2-9a1f-2d9894eedd6d</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Noud van Gemert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 288</itunes:keywords>
      <itunes:summary>Legal lecture on Cybercrime for non-legal-experts

#Society #Politics
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:03:37</itunes:duration>
    </item>
    <item>
      <title>Cryptography beyond Encryption and Signatures (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-494-cryptography_beyond_encryption_and_signatures</link>
      <description>This talk will introduce a couple of less well known applications of cryptography. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures_webm-hd.webm"
        length="161480704"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures_webm-hd.webm?1502137599</guid>
      <dc:identifier>962f467f-8c6b-44cc-98cd-673128a9aef5</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>FJW</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 494</itunes:keywords>
      <itunes:summary>This talk will introduce a couple of less well known applications of cryptography. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:23:32</itunes:duration>
    </item>
    <item>
      <title>Good is hard, but try anyway. (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-418-good_is_hard_but_try_anyway</link>
      <description>How do we know what good is. Are we creating something worth making? Are we lost in our own dogma? When do we step back and let the smoke clear before getting back to work? Important questions. Let&#39;s ask them out loud
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-418-eng-Good_is_hard_but_try_anyway_webm-hd.webm"
        length="73400320"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-418-eng-Good_is_hard_but_try_anyway_webm-hd.webm?1502137615</guid>
      <dc:identifier>65dfbd35-6f4b-45f7-8169-fa43253b1e77</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Bilal Ghalib</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 418</itunes:keywords>
      <itunes:subtitle>Ethics, colonialism, technological optimism and the reality of relationships with need.</itunes:subtitle>
      <itunes:summary>How do we know what good is. Are we creating something worth making? Are we lost in our own dogma? When do we step back and let the smoke clear before getting back to work? Important questions. Let&#39;s ask them out loud
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:21:46</itunes:duration>
    </item>
    <item>
      <title>MISP threat sharing platform (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-23-misp_threat_sharing_platform</link>
      <description>Information sharing is a key element in detecting security breaches and proactively protecting information systems and infrastructures, but the practical aspect is often forgotten. Alexandre Dulaunoy offers an overview of MISP, a free software tool that supports information-sharing practices among communities, and shares some lessons learned while building it.

Topics include:

    An overview of the information-sharing challenges in cybersecurity
    Best practices in information security
    The history of the MISP platform and the open source/free software community behind 
    How the development of the free software project helps to support information-sharing practices
    How the platform is designed to support analysts, reversers, and ICT professionals in their day-to-day activities
    The ongoing projects in the MISP platform and how you can contribute

#Sharing #Software #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-23-eng-MISP_threat_sharing_platform_webm-hd.webm"
        length="764411904"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-23-eng-MISP_threat_sharing_platform_webm-hd.webm?1502139786</guid>
      <dc:identifier>c4996482-57be-436f-bed5-86398c914bef</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Alexandre Dulaunoy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 23</itunes:keywords>
      <itunes:subtitle>The MISP threat sharing platform is a free and open source software helping information sharing of threat and cyber security indicators. </itunes:subtitle>
      <itunes:summary>Information sharing is a key element in detecting security breaches and proactively protecting information systems and infrastructures, but the practical aspect is often forgotten. Alexandre Dulaunoy offers an overview of MISP, a free software tool that supports information-sharing practices among communities, and shares some lessons learned while building it.

Topics include:

    An overview of the information-sharing challenges in cybersecurity
    Best practices in information security
    The history of the MISP platform and the open source/free software community behind 
    How the development of the free software project helps to support information-sharing practices
    How the platform is designed to support analysts, reversers, and ICT professionals in their day-to-day activities
    The ongoing projects in the MISP platform and how you can contribute

#Sharing #Software #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:49:47</itunes:duration>
    </item>
    <item>
      <title>Ethics in Technology (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-311-ethics_in_technology</link>
      <description>When designing technologies, networked systems, and measurements on the Internet, we must be aware of their implications and consequences for the society and participants. As engineers, scientists, programmers and other experts, we have moral obligations towards our peers, users of technologies we create, and the wider communities.

In this talk I want to talk both about general ethical considerations, and specific examples of moral dilemmas that come from building the RIPE Atlas system, and conducting measurements that reveal workings of Internet infrastructure and services.

#Society #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-311-eng-Ethics_in_Technology_webm-hd.webm"
        length="300941312"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-311-eng-Ethics_in_Technology_webm-hd.webm?1502133644</guid>
      <dc:identifier>72371ec3-fd2d-40f8-88f5-3df3e5503e23</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Vesna Manojlovic (BECHA) </itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 311</itunes:keywords>
      <itunes:subtitle>Internet Measurements&#39; Ethical Dilemmas and RIPE Atlas </itunes:subtitle>
      <itunes:summary>When designing technologies, networked systems, and measurements on the Internet, we must be aware of their implications and consequences for the society and participants. As engineers, scientists, programmers and other experts, we have moral obligations towards our peers, users of technologies we create, and the wider communities.

In this talk I want to talk both about general ethical considerations, and specific examples of moral dilemmas that come from building the RIPE Atlas system, and conducting measurements that reveal workings of Internet infrastructure and services.

#Society #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:00:39</itunes:duration>
    </item>
    <item>
      <title>Let&#39;s stop EU copyright expansion (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-204-let_s_stop_eu_copyright_expansion</link>
      <description>European Commission plans are underway to introduce an extra copyright for news sites and an obligation for internet platforms to surveil all user uploads in the EU. We can still stop these dangerous plans, but not without your help.
#Copyright #Politics
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-204-eng-Lets_stop_EU_copyright_expansion_webm-hd.webm"
        length="487587840"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-204-eng-Lets_stop_EU_copyright_expansion_webm-hd.webm?1502131069</guid>
      <dc:identifier>bfc6a9c6-7182-4b28-8e30-3eec50172b25</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Christopher Clay / c3o</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 204</itunes:keywords>
      <itunes:subtitle>If you like untaxed links and unsurveilled uploads, you have to join the fight now.</itunes:subtitle>
      <itunes:summary>European Commission plans are underway to introduce an extra copyright for news sites and an obligation for internet platforms to surveil all user uploads in the EU. We can still stop these dangerous plans, but not without your help.
#Copyright #Politics
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:14:46</itunes:duration>
    </item>
    <item>
      <title>An academic&#39;s view to incident response (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-316-an_academic_s_view_to_incident_response</link>
      <description>A timely reaction to security incidents is without doubts important. And while the techniques of digital forensics can come pretty close to perfect for single-host systems with small hard drive capacity, things can get easily messy with 10+ systems, a mixture of operating systems &amp; mobile devices of various brands, or gigabit network traffic that is partly encrypted.

This talk contains two parts. For one, the do&#39;s and don’ts for incident response from a forensic examiner’s point of view. Is it better to pull the plug, or gracefully shut the machine down, how to capture network traffic, and what to do if the machine is still running and you’d like to image the RAM. In particular, I’ll present a few methods how to capture network traffic for small networks that don’t have a dedicated monitoring port available, and what to do with them. Secondly, a list of things that went wrong when reality kicked in and good intentions do more harm than good. This will include the problems of tool dependency for specific tasks, free log aggregation using graylog and why there is no such thing a s a free lunch, GRR and the riddle for the perfect toolchain.
#NetworkSecurity #Science
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-316-eng-An_academics_view_to_incident_response_webm-hd.webm"
        length="204472320"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-316-eng-An_academics_view_to_incident_response_webm-hd.webm?1502130749</guid>
      <dc:identifier>6e4cc66d-2edc-41ab-9d9b-6ec921e0944d</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Martin Schmiedecker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 316</itunes:keywords>
      <itunes:subtitle>It&#39;s all fun and games until reality starts kicking you in the nuts ...</itunes:subtitle>
      <itunes:summary>A timely reaction to security incidents is without doubts important. And while the techniques of digital forensics can come pretty close to perfect for single-host systems with small hard drive capacity, things can get easily messy with 10+ systems, a mixture of operating systems &amp; mobile devices of various brands, or gigabit network traffic that is partly encrypted.

This talk contains two parts. For one, the do&#39;s and don’ts for incident response from a forensic examiner’s point of view. Is it better to pull the plug, or gracefully shut the machine down, how to capture network traffic, and what to do if the machine is still running and you’d like to image the RAM. In particular, I’ll present a few methods how to capture network traffic for small networks that don’t have a dedicated monitoring port available, and what to do with them. Secondly, a list of things that went wrong when reality kicked in and good intentions do more harm than good. This will include the problems of tool dependency for specific tasks, free log aggregation using graylog and why there is no such thing a s a free lunch, GRR and the riddle for the perfect toolchain.
#NetworkSecurity #Science
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:52:01</itunes:duration>
    </item>
    <item>
      <title>Lightning talks day 4 (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-348-lightning_talks_day_4</link>
      <description>
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-348-eng-Lightning_talks_day_4_webm-hd.webm"
        length="602931200"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-348-eng-Lightning_talks_day_4_webm-hd.webm?1502133623</guid>
      <dc:identifier>41b63e90-d132-4f20-9437-f64f7d029ac6</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Eireann &#39;bsb&#39; Leverett</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 348</itunes:keywords>
      <itunes:summary>
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:48:48</itunes:duration>
    </item>
    <item>
      <title>Responsible Disclosure; How to make your school a safer place. (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-388-responsible_disclosure_how_to_make_your_school_a_safer_place</link>
      <description>This talk is about the collaboration and Responsible Disclosure in a school environment by a high school hacker.

#Sharing #Training
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-388-eng-Responsible_Disclosure_How_to_make_your_school_a_safer_place_webm-hd.webm"
        length="183500800"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-388-eng-Responsible_Disclosure_How_to_make_your_school_a_safer_place_webm-hd.webm?1502130998</guid>
      <dc:identifier>3e23993c-d4e3-410d-98d3-213e01931876</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>JurreJelle</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 388</itunes:keywords>
      <itunes:subtitle>Story of a 15 year old hacker in collaboration with his school</itunes:subtitle>
      <itunes:summary>This talk is about the collaboration and Responsible Disclosure in a school environment by a high school hacker.

#Sharing #Training
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:24:28</itunes:duration>
    </item>
    <item>
      <title>Regulating Law Enforcement use of Trojans (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-68-regulating_law_enforcement_use_of_trojans</link>
      <description>The complexity of implementing a policy (law) and related operational and technical procedures to regulate the uses of Trojan by Law Enforcement in a way that protect civil rights while not preventing investigations from going on with the right balance of juridical/technical implementation. 

#Legal #Politics #Society
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans_webm-hd.webm"
        length="363855872"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans_webm-hd.webm?1502130979</guid>
      <dc:identifier>236e5191-40f6-4c07-820e-2c5796bcdd20</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Fabio Pietrosanti (naif)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 68</itunes:keywords>
      <itunes:subtitle>Implementing a Law to juridically, operationally and technically regulate the uses of Trojan in Italy</itunes:subtitle>
      <itunes:summary>The complexity of implementing a policy (law) and related operational and technical procedures to regulate the uses of Trojan by Law Enforcement in a way that protect civil rights while not preventing investigations from going on with the right balance of juridical/technical implementation. 

#Legal #Politics #Society
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:49:14</itunes:duration>
    </item>
    <item>
      <title>Digital dissent in Latin America (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-40-digital_dissent_in_latin_america</link>
      <description>The Internet isn&#39;t global. 

Only half of the world is connected to the Internet, English is still the largest language in terms of content and knowledge is increasingly privatized either through patented code (owned mostly by Sillicon Valley companies) or via obscure trade agreements pushed by the United States. 

How is the Internet used in Latin America to organize, resist repression and counter digital colonialism?

#Society #Patents #Politics
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-40-eng-Digital_dissent_in_Latin_America_webm-hd.webm"
        length="404750336"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-40-eng-Digital_dissent_in_Latin_America_webm-hd.webm?1502130864</guid>
      <dc:identifier>afd789c4-9ac1-4b27-adcc-b4c2bad950d3</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Niels ten Oever, gisela</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 40</itunes:keywords>
      <itunes:subtitle>How the Internet is impacting organizing and dissent in Latin America</itunes:subtitle>
      <itunes:summary>The Internet isn&#39;t global. 

Only half of the world is connected to the Internet, English is still the largest language in terms of content and knowledge is increasingly privatized either through patented code (owned mostly by Sillicon Valley companies) or via obscure trade agreements pushed by the United States. 

How is the Internet used in Latin America to organize, resist repression and counter digital colonialism?

#Society #Patents #Politics
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:39:33</itunes:duration>
    </item>
    <item>
      <title>One map to map them all (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-171-one_map_to_map_them_all</link>
      <description>The MissingMaps project started almost three years ago. Since then, all over the world people have contributed to OpenStreetMap in those areas where maps are really needed and mostly missing: right where the Red Cross and Medicin Sans Frontieres have their fieldworkers to help in disaster areas, and areas with disasters waiting to happen.
During SHA there will be an ongoing Mapathon at the Maptime Village. In this talk and introduction to this international maphacking grassroot initiative will be given, along with some of the results from the project. And of course it will be presented in such a way that attendees will really love to help map the world, starting at SHA!
#Community #Sharing
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-171-eng-One_map_to_map_them_all_webm-hd.webm"
        length="356515840"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-171-eng-One_map_to_map_them_all_webm-hd.webm?1502124270</guid>
      <dc:identifier>1b4ced58-cf46-4f36-9ddc-bcb567fa9f47</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Erik Meerburg</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 171</itunes:keywords>
      <itunes:subtitle>Why MissingMaps saves lives, and how to help</itunes:subtitle>
      <itunes:summary>The MissingMaps project started almost three years ago. Since then, all over the world people have contributed to OpenStreetMap in those areas where maps are really needed and mostly missing: right where the Red Cross and Medicin Sans Frontieres have their fieldworkers to help in disaster areas, and areas with disasters waiting to happen.
During SHA there will be an ongoing Mapathon at the Maptime Village. In this talk and introduction to this international maphacking grassroot initiative will be given, along with some of the results from the project. And of course it will be presented in such a way that attendees will really love to help map the world, starting at SHA!
#Community #Sharing
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:37:16</itunes:duration>
    </item>
    <item>
      <title>Ask your candidates and let everyone know about it (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-202-ask_your_candidates_and_let_everyone_know_about_it</link>
      <description>This talk will show and compare different forms of political campaigns during election times, including Free Software tools. Best methods to be used for the different forms of campaigning will be explained in a way for you to pick it up and make it work for your topic. Let&#39;s put pressure bottom-up again!

#Politics
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-202-eng-Ask_your_candidates_and_let_everyone_know_about_it_webm-hd.webm"
        length="353370112"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-202-eng-Ask_your_candidates_and_let_everyone_know_about_it_webm-hd.webm?1502130890</guid>
      <dc:identifier>e5412850-3b73-40f2-98d2-29c51da1fe41</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Erik Albers</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 202</itunes:keywords>
      <itunes:subtitle>How to make use of democratic elections for your own purpose</itunes:subtitle>
      <itunes:summary>This talk will show and compare different forms of political campaigns during election times, including Free Software tools. Best methods to be used for the different forms of campaigning will be explained in a way for you to pick it up and make it work for your topic. Let&#39;s put pressure bottom-up again!

#Politics
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:41:38</itunes:duration>
    </item>
    <item>
      <title>Off Grid: Disclosing your 0days in a videogame mod (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-162-off_grid_disclosing_your_0days_in_a_videogame_mod</link>
      <description>Off Grid is a different kind of hacking game, and it is fully moddable. The game logic runs on Lua under the hood, and all the computers you hack, whether desktop PCs or IoT devices are their own Lua VMs allowing modders and hackers to create their own LUA hackable devices, hacking tools, and data types. This flexibility allows anyone to model real life or cutting edge hacks in the game, so next time you find a bleeding edge exploit, why write a white paper, when you could model it in a mod and pass it on for people to play?

#Games #DeviceSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-162-eng-Off_Grid_Disclosing_your_0days_in_a_videogame_mod_webm-hd.webm"
        length="522190848"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-162-eng-Off_Grid_Disclosing_your_0days_in_a_videogame_mod_webm-hd.webm?1502130833</guid>
      <dc:identifier>18bef8a3-a6de-45df-8708-f0d967f90ecf</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Rich Metson</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 162</itunes:keywords>
      <itunes:summary>Off Grid is a different kind of hacking game, and it is fully moddable. The game logic runs on Lua under the hood, and all the computers you hack, whether desktop PCs or IoT devices are their own Lua VMs allowing modders and hackers to create their own LUA hackable devices, hacking tools, and data types. This flexibility allows anyone to model real life or cutting edge hacks in the game, so next time you find a bleeding edge exploit, why write a white paper, when you could model it in a mod and pass it on for people to play?

#Games #DeviceSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:53:29</itunes:duration>
    </item>
    <item>
      <title>Get your ass (HTTP infrastructure) on TLS (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-63-get_your_ass_http_infrastructure_on_tls</link>
      <description>Helping participants to find the best and most secure tools and configurations to automate acquiring TLS certificates and deploying them to use. 

Bring your own infra ;)

#NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-63-eng-Get_your_ass_HTTP_infrastructure_on_TLS_webm-hd.webm"
        length="393216000"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-63-eng-Get_your_ass_HTTP_infrastructure_on_TLS_webm-hd.webm?1502130919</guid>
      <dc:identifier>df804417-58b7-42fa-a626-83ed1663677f</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>joohoi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 63</itunes:keywords>
      <itunes:subtitle>It&#39;s about the time.</itunes:subtitle>
      <itunes:summary>Helping participants to find the best and most secure tools and configurations to automate acquiring TLS certificates and deploying them to use. 

Bring your own infra ;)

#NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:43:01</itunes:duration>
    </item>
    <item>
      <title>Adventures in Spearphishing: The Good, The Bad, and The Ugly (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-146-adventures_in_spearphishing_the_good_the_bad_and_the_ugly</link>
      <description>This presentation introduces &quot;phishing spam&quot;, an open-source Spearphishing Toolkit, and has a surprising ending with an ethical + philosophical twist.  This is the kindof story that only comes from the trenches..

#Experimental
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-146-eng-Adventures_in_Spearphishing_The_Good_The_Bad_and_The_Ugly_webm-hd.webm"
        length="350224384"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-146-eng-Adventures_in_Spearphishing_The_Good_The_Bad_and_The_Ugly_webm-hd.webm?1502130798</guid>
      <dc:identifier>e41aee32-a8c0-4dce-b55a-a13aac7b5cad</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>MRieback</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 146</itunes:keywords>
      <itunes:summary>This presentation introduces &quot;phishing spam&quot;, an open-source Spearphishing Toolkit, and has a surprising ending with an ethical + philosophical twist.  This is the kindof story that only comes from the trenches..

#Experimental
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:47:37</itunes:duration>
    </item>
    <item>
      <title>Hardware games (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-480-hardware_games</link>
      <description>Making physical games requires a unique knack for creating robust systems. In this talk, Phoenix Perry will share some common strategies for developing DIY artists driven systems which can last through thousands of users and interactions in a museum and installation context. #gaming #hardwarehacking
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-480-eng-Hardware_games_webm-hd.webm"
        length="190840832"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-480-eng-Hardware_games_webm-hd.webm?1502123475</guid>
      <dc:identifier>49c1630b-ec06-4f80-8793-56778a24e1c6</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Phoenix Perry</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 480</itunes:keywords>
      <itunes:subtitle>How to build alternative controllers</itunes:subtitle>
      <itunes:summary>Making physical games requires a unique knack for creating robust systems. In this talk, Phoenix Perry will share some common strategies for developing DIY artists driven systems which can last through thousands of users and interactions in a museum and installation context. #gaming #hardwarehacking
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:38:16</itunes:duration>
    </item>
    <item>
      <title>Ethics in Computing (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-46-ethics_in_computing</link>
      <description>Developments in the last few years have shown that computing can no longer be considered neutral or without morals. Most kinds of programs or services have some hidden or implicit morals in them. Especially when things are published at the Internet scale, you see clashes in what is considered morally acceptable.

There have been several examples of this in the past few years: Facebook and its emotional contagion study where they tried to influence emotions of their users without telling them. Or academic researchers trying to measure censorship by tricking users into attempting to load censored webpages. There are many more of these examples.

Fortunately many academic researchers have realised that this is happening and are calling for action: more ethics education in computer and data science. This is more easily said than done however, but things are moving in the right direction.

This talk will discuss some recent cases to explain how computing and ethics are related. I will also describe developments in the academic and professional field on how to deal with these issues.

#Society
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-46-eng-Ethics_in_Computing_webm-hd.webm"
        length="336592896"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-46-eng-Ethics_in_Computing_webm-hd.webm?1502130948</guid>
      <dc:identifier>1b54848c-c89a-45e5-bb29-f9286aeca60b</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>1sand0s</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 46</itunes:keywords>
      <itunes:summary>Developments in the last few years have shown that computing can no longer be considered neutral or without morals. Most kinds of programs or services have some hidden or implicit morals in them. Especially when things are published at the Internet scale, you see clashes in what is considered morally acceptable.

There have been several examples of this in the past few years: Facebook and its emotional contagion study where they tried to influence emotions of their users without telling them. Or academic researchers trying to measure censorship by tricking users into attempting to load censored webpages. There are many more of these examples.

Fortunately many academic researchers have realised that this is happening and are calling for action: more ethics education in computer and data science. This is more easily said than done however, but things are moving in the right direction.

This talk will discuss some recent cases to explain how computing and ethics are related. I will also describe developments in the academic and professional field on how to deal with these issues.

#Society
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:44:45</itunes:duration>
    </item>
    <item>
      <title>Open networking and hardware/software disaggregation (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-282-open_networking_and_hardware_software_disaggregation</link>
      <description>Open Networking or &quot;Web scale networking&quot; is the concept where you&#39;re no longer tied into a single vendor for a network solution. You&#39;re free to choose you&#39;re own hardware and software.

#NetworkSecurity

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-282-eng-Open_networking_and_hardware_software_disaggregation_webm-hd.webm"
        length="195035136"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-282-eng-Open_networking_and_hardware_software_disaggregation_webm-hd.webm?1502122338</guid>
      <dc:identifier>1b289666-cf9f-4808-9fca-5656f7a2296e</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Attilla de Groot</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 282</itunes:keywords>
      <itunes:summary>Open Networking or &quot;Web scale networking&quot; is the concept where you&#39;re no longer tied into a single vendor for a network solution. You&#39;re free to choose you&#39;re own hardware and software.

#NetworkSecurity

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:38:39</itunes:duration>
    </item>
    <item>
      <title>Nerd-Wrangling 101 (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-324-nerd-wrangling_101</link>
      <description>Neurodiversity is the concept that neurological conditions are variations in the human genome. Therefore Autism, ADHD, and mood- and personality disorders are considered social categories intersecting with other social categories. 
While &quot;Nerd&quot; is very broadly defined, the number of neurodiverse people within our social group is much higher than in the general population. Our social circles, our hackerspaces, our coworkers are assembled from this group. And due to these differences our groups behave differently and encounter different problems that cannot be solved with standard management 101.
Working together with a team of amazing people, nearly all of whom have distinctive cognitive needs, we found that classical management and strict structures are impediments rather than support. So we hacked around them. Like you do.
In this talk we introduce the concept of cognitive empathy: Being able to think into the brain of your peers even though you might lack affective (&quot;classical&quot;) empathy. We will share how we came to new solutions in managing our team by figuring out each others&#39; needs. This talk will be about superpowers and super weaknesses: how to manage them, utilize them, and create an interdependent band of superheroes for which the sum is greater than the parts. 

#Society #Community
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-324-eng-Nerd-Wrangling_101_webm-hd.webm"
        length="741343232"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-324-eng-Nerd-Wrangling_101_webm-hd.webm?1502130128</guid>
      <dc:identifier>341c90d6-aaea-4284-8c8e-c80096cf13d5</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>mlp, Julian Finn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 324</itunes:keywords>
      <itunes:subtitle>Managing Neurodiversity with Cognitive Empathy</itunes:subtitle>
      <itunes:summary>Neurodiversity is the concept that neurological conditions are variations in the human genome. Therefore Autism, ADHD, and mood- and personality disorders are considered social categories intersecting with other social categories. 
While &quot;Nerd&quot; is very broadly defined, the number of neurodiverse people within our social group is much higher than in the general population. Our social circles, our hackerspaces, our coworkers are assembled from this group. And due to these differences our groups behave differently and encounter different problems that cannot be solved with standard management 101.
Working together with a team of amazing people, nearly all of whom have distinctive cognitive needs, we found that classical management and strict structures are impediments rather than support. So we hacked around them. Like you do.
In this talk we introduce the concept of cognitive empathy: Being able to think into the brain of your peers even though you might lack affective (&quot;classical&quot;) empathy. We will share how we came to new solutions in managing our team by figuring out each others&#39; needs. This talk will be about superpowers and super weaknesses: how to manage them, utilize them, and create an interdependent band of superheroes for which the sum is greater than the parts. 

#Society #Community
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:00:39</itunes:duration>
    </item>
    <item>
      <title>Playing defence is complicated (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-109-playing_defence_is_complicated</link>
      <description>What kind of work goes into implementing secure services? Service providers have to comply to the law, protect their users, worry about reputation, need to deal with vulnerability management, patch management and above all: business continuity. Researchers and attackers target the infrastructure for their own gain and suppliers have their own go-to-market drive which limits the amount of QA on their products. Various services are build upon existing or new foundations. They have to comply to the same company wide policies, like the security policy.
In this talk I will give an insight on what goes into the technical analyses, generic preventative measures and provide example on how to use a technical oriented company wide policy to your advantage.

#DeviceSecurity #NetworkSecurity #Politics
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-109-eng-Playing_defence_is_complicated_webm-hd.webm"
        length="377487360"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-109-eng-Playing_defence_is_complicated_webm-hd.webm?1502123383</guid>
      <dc:identifier>a4b24794-ca01-4c99-81a6-c5d95ef15f68</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Oscar Koeroo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 109</itunes:keywords>
      <itunes:subtitle>What goes into playing defence and what can be holding you down</itunes:subtitle>
      <itunes:summary>What kind of work goes into implementing secure services? Service providers have to comply to the law, protect their users, worry about reputation, need to deal with vulnerability management, patch management and above all: business continuity. Researchers and attackers target the infrastructure for their own gain and suppliers have their own go-to-market drive which limits the amount of QA on their products. Various services are build upon existing or new foundations. They have to comply to the same company wide policies, like the security policy.
In this talk I will give an insight on what goes into the technical analyses, generic preventative measures and provide example on how to use a technical oriented company wide policy to your advantage.

#DeviceSecurity #NetworkSecurity #Politics
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:51:46</itunes:duration>
    </item>
    <item>
      <title>On the design of a portable secure filesystem: the crypto bits (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-57-on_the_design_of_a_portable_secure_filesystem_the_crypto_bits</link>
      <description>In this presentation I will present the cryptographic aspects of a new
secure filesystem called SEF. The goals of this project is to create a
filesystem that is secure, robust and easy to understand. The goal of this presentation is two fold. One is to present cryptographic primitive that can be used to design secure filesystems as opposed to the current practice of laying encryption just below or above the filesystem. The second is to solicit feedback on the security of my design.

#DeviceSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-57-eng-On_the_design_of_a_portable_secure_filesystem_the_crypto_bits_webm-hd.webm"
        length="375390208"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-57-eng-On_the_design_of_a_portable_secure_filesystem_the_crypto_bits_webm-hd.webm?1502118037</guid>
      <dc:identifier>e8c84162-43c4-4062-bd6c-90cbae7b847d</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>phicoh</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 57</itunes:keywords>
      <itunes:summary>In this presentation I will present the cryptographic aspects of a new
secure filesystem called SEF. The goals of this project is to create a
filesystem that is secure, robust and easy to understand. The goal of this presentation is two fold. One is to present cryptographic primitive that can be used to design secure filesystems as opposed to the current practice of laying encryption just below or above the filesystem. The second is to solicit feedback on the security of my design.

#DeviceSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:59:22</itunes:duration>
    </item>
    <item>
      <title>The quest for algorithm diversity (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-127-the_quest_for_algorithm_diversity</link>
      <description>Our vision is to increase transparency behind personalization algorithms. &lt;a href=&quot;https://facebook.tracking.exposed&quot; target=&quot;_blank&quot;&gt;facebook.tracking.exposed&lt;/a&gt;, is two things: a web browser add-on that collects the stories visible in your Facebook Newsfeed, and a website that aggregates that data from all the users who have the addon installed.
Our mission is to help researchers and users assessing how current filtering mechanisms work.
Personalization algorithms should be modified in order to minimize the dangerous social effects of which they are indirectly responsible and to maximize the values, both individual and social, that algorithms should incorporate.

#Social
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-127-eng-The_quest_for_algorithm_diversity_webm-hd.webm"
        length="326107136"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-127-eng-The_quest_for_algorithm_diversity_webm-hd.webm?1502118072</guid>
      <dc:identifier>f71c23b4-cf09-4fea-b6eb-d1bfad5d5b76</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Claudio Agosti</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 127</itunes:keywords>
      <itunes:subtitle>facebook.tracking.exposed</itunes:subtitle>
      <itunes:summary>Our vision is to increase transparency behind personalization algorithms. &lt;a href=&quot;https://facebook.tracking.exposed&quot; target=&quot;_blank&quot;&gt;facebook.tracking.exposed&lt;/a&gt;, is two things: a web browser add-on that collects the stories visible in your Facebook Newsfeed, and a website that aggregates that data from all the users who have the addon installed.
Our mission is to help researchers and users assessing how current filtering mechanisms work.
Personalization algorithms should be modified in order to minimize the dangerous social effects of which they are indirectly responsible and to maximize the values, both individual and social, that algorithms should incorporate.

#Social
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:43:29</itunes:duration>
    </item>
    <item>
      <title>I have a dream (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-15-i_have_a_dream</link>
      <description>The ultimate Hackerspace; From Panopticon-prison to Hackervillage-Castle-compound

#Community #Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-15-eng-I_have_a_dream_webm-hd.webm"
        length="707788800"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-15-eng-I_have_a_dream_webm-hd.webm?1502116857</guid>
      <dc:identifier>28382535-b6a4-4a6f-9f36-576285a1b1df</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>jos weyers, jos</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 15</itunes:keywords>
      <itunes:subtitle>The ultimate Hackerspace; From Panopticon-prison to Hackervillage-Castle-compound</itunes:subtitle>
      <itunes:summary>The ultimate Hackerspace; From Panopticon-prison to Hackervillage-Castle-compound

#Community #Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:40:34</itunes:duration>
    </item>
    <item>
      <title>From Project To Kit (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-133-from_project_to_kit</link>
      <description>A talk outlining the process of turning a personal electronic project into a successful kit business.

#Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-133-eng-From_Project_To_Kit_webm-hd.webm"
        length="253755392"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-133-eng-From_Project_To_Kit_webm-hd.webm?1502111286</guid>
      <dc:identifier>e494919d-7b12-4366-bb3a-2e1264fa46ce</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Jenny List</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 133</itunes:keywords>
      <itunes:subtitle>Bringing an electronic project to market in kit form</itunes:subtitle>
      <itunes:summary>A talk outlining the process of turning a personal electronic project into a successful kit business.

#Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:36:40</itunes:duration>
    </item>
    <item>
      <title>Silent Protest (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-286-silent_protest</link>
      <description>Independent observers are noting a decrease in Freedom of speech worldwide. In its 2016 report, Reporter without Borders unveils a &quot;climate of fear and tension combined with increasing control over newsrooms by governments and private-sector interests.&quot;, while Amnesty International&#39;s report on the State of the World Human Rights states that &quot;2016 was the year when the cynical use of &#39;us vs them&#39; narratives of blame, hate and fear took on a global prominence to a level not seen since the 1930s. Too many politicians are answering legitimate economic and security fears with a poisonous and divisive manipulation of identity politics in an attempt to win votes&quot;.

	At the same time, the United Nations Statistics Division insist on the unprecedented literacy rate achieved by Mankind globally. Human beings have more and more things to say.

	With this project, we present Silent Protest : a wearable DIY protest network build of inexpensive network gear and open source software. Its goal is to facilitate Freedom of Speech, enable Art sharing in countries where this Human Right is being challenged by authorities, and offer a customizable portable Anonymous Protest Network platform reliable and affordable enough to be build in third world countries and developed countries alike.
#Privacy #Society #Software #Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-286-eng-Silent_Protest_webm-hd.webm"
        length="277872640"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-286-eng-Silent_Protest_webm-hd.webm?1502111245</guid>
      <dc:identifier>d16501c8-374f-416c-896c-c50daadcc6bc</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>endrazine, lanrat</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 286</itunes:keywords>
      <itunes:subtitle>DIY wearable protest network</itunes:subtitle>
      <itunes:summary>Independent observers are noting a decrease in Freedom of speech worldwide. In its 2016 report, Reporter without Borders unveils a &quot;climate of fear and tension combined with increasing control over newsrooms by governments and private-sector interests.&quot;, while Amnesty International&#39;s report on the State of the World Human Rights states that &quot;2016 was the year when the cynical use of &#39;us vs them&#39; narratives of blame, hate and fear took on a global prominence to a level not seen since the 1930s. Too many politicians are answering legitimate economic and security fears with a poisonous and divisive manipulation of identity politics in an attempt to win votes&quot;.

	At the same time, the United Nations Statistics Division insist on the unprecedented literacy rate achieved by Mankind globally. Human beings have more and more things to say.

	With this project, we present Silent Protest : a wearable DIY protest network build of inexpensive network gear and open source software. Its goal is to facilitate Freedom of Speech, enable Art sharing in countries where this Human Right is being challenged by authorities, and offer a customizable portable Anonymous Protest Network platform reliable and affordable enough to be build in third world countries and developed countries alike.
#Privacy #Society #Software #Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:26:24</itunes:duration>
    </item>
    <item>
      <title>Blockchains for a Better World (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-342-blockchains_for_a_better_world</link>
      <description>The blockchain invention allow us to take our freedom back and save the planet. This talk explains the fundamentals of blockchains, no fluffy talk and no unnecessary details. At the end of the talk you should be able to build your own stateful P2P network. We also demonstrate the Statebox system and some applications.

#BlockchainTech
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-342-eng-Blockchains_for_a_Better_World_webm-hd.webm"
        length="265289728"
        type="video/webm"/>
      <pubDate>Mon, 07 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-342-eng-Blockchains_for_a_Better_World_webm-hd.webm?1502111214</guid>
      <dc:identifier>1159379e-b387-4660-a160-d996c7383c5a</dc:identifier>
      <dc:date>2017-08-07T00:00:00+02:00</dc:date>
      <itunes:author>Jelle Herold</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 342</itunes:keywords>
      <itunes:subtitle>From Napster to Bitcoin to Ethereum to Statebox: saving the planet with category theory</itunes:subtitle>
      <itunes:summary>The blockchain invention allow us to take our freedom back and save the planet. This talk explains the fundamentals of blockchains, no fluffy talk and no unnecessary details. At the end of the talk you should be able to build your own stateful P2P network. We also demonstrate the Statebox system and some applications.

#BlockchainTech
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:56:09</itunes:duration>
    </item>
    <item>
      <title>Cryptowars 2.0: Lessons from the past, for the present (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-336-cryptowars_2_0_lessons_from_the_past_for_the_present</link>
      <description>In the 90&#39;s there was a political struggle about control of the availability of cryptographic technologies. Ultimately, it was won because certain industries aligned with civil society. Or it least it appears as if it was won. Since it is back. Trump, May and Macron have all demanded backdoors. In September the European Commission is slated to come up with a proposal. In this lecture we cover the old cryptowars and focus on lessons for the near future.

#Privacy #Society #Politics
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-336-eng-Cryptowars_20_Lessons_from_the_past_for_the_present_webm-hd.webm"
        length="1296039936"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-336-eng-Cryptowars_20_Lessons_from_the_past_for_the_present_webm-hd.webm?1502122315</guid>
      <dc:identifier>98a24995-17aa-415a-9cf5-906faa0d1475</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Phil Zimmermann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 336</itunes:keywords>
      <itunes:subtitle>It&#39;s not only Hollywood who is out of ideas</itunes:subtitle>
      <itunes:summary>In the 90&#39;s there was a political struggle about control of the availability of cryptographic technologies. Ultimately, it was won because certain industries aligned with civil society. Or it least it appears as if it was won. Since it is back. Trump, May and Macron have all demanded backdoors. In September the European Commission is slated to come up with a proposal. In this lecture we cover the old cryptowars and focus on lessons for the near future.

#Privacy #Society #Politics
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:57:53</itunes:duration>
    </item>
    <item>
      <title>Hormones and Hysteria - what every person should know (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-341-hormones_and_hysteria_-_what_every_person_should_know</link>
      <description>I&#39;d like to discuss with your my experience with hormones and perceived hysteric behaviour and moments one feels extra vulnerable. I have researched this topic for several years and would like to share my experience with you, including the most recent scientific research. 
&lt;/br&gt; &lt;/br&gt;
One time asked the internet &quot;Why am I such a Bitch?&quot;  .. so my quest started.. &lt;/br&gt; &lt;/br&gt;
Because depression, mega reactions, feeling-the-whole-world-is-bad, witch-hunts, suicides, community drama and fears are sometimes more hormone related than we think. 
&lt;/br&gt; &lt;/br&gt;
I also found out what works for me: understanding and hacking your body, sometimes tuning small things like eating Broccoli make a difference. 
&lt;/br&gt; &lt;/br&gt;
I would like to share our ideas.
&lt;/br&gt;&lt;/br&gt;
#Society #Hormones #Drama #Community #Biohacking #Bio #Biology  #Suicides #Suicide #Women #Mensplaining #Science #Chemistry #Prisons #Psychiatry #SelfHacking #BioPunk #Self #Relationships #Love #Food
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-341-eng-Hormones_and_Hysteria_-_what_every_person_should_know_webm-hd.webm"
        length="195035136"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-341-eng-Hormones_and_Hysteria_-_what_every_person_should_know_webm-hd.webm?1502111050</guid>
      <dc:identifier>0fd35c3e-6608-4d5b-a060-000e658730d9</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Viola</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 341</itunes:keywords>
      <itunes:subtitle>are you not curious now? ;)</itunes:subtitle>
      <itunes:summary>I&#39;d like to discuss with your my experience with hormones and perceived hysteric behaviour and moments one feels extra vulnerable. I have researched this topic for several years and would like to share my experience with you, including the most recent scientific research. 
&lt;/br&gt; &lt;/br&gt;
One time asked the internet &quot;Why am I such a Bitch?&quot;  .. so my quest started.. &lt;/br&gt; &lt;/br&gt;
Because depression, mega reactions, feeling-the-whole-world-is-bad, witch-hunts, suicides, community drama and fears are sometimes more hormone related than we think. 
&lt;/br&gt; &lt;/br&gt;
I also found out what works for me: understanding and hacking your body, sometimes tuning small things like eating Broccoli make a difference. 
&lt;/br&gt; &lt;/br&gt;
I would like to share our ideas.
&lt;/br&gt;&lt;/br&gt;
#Society #Hormones #Drama #Community #Biohacking #Bio #Biology  #Suicides #Suicide #Women #Mensplaining #Science #Chemistry #Prisons #Psychiatry #SelfHacking #BioPunk #Self #Relationships #Love #Food
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:29:09</itunes:duration>
    </item>
    <item>
      <title>FILMS (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-64-films</link>
      <description>Last decades I have made 3 films with technological aspects.
Since I am not a nerd, but a writer/ journalist/ filmmaker with an interest in technology, science and, I can offer SHA to show my 3 films (eventually the last one TEETH with a short lecture). For debate and for fun.
You can find more about me and my work on my own company http://poppeenpartners.nl/
#Community #Robot 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-64-eng-FILMS_webm-hd.webm"
        length="3204448256"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-64-eng-FILMS_webm-hd.webm?1502132586</guid>
      <dc:identifier>327bab84-f496-47b1-955c-ff03791c9271</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Ine Poppe</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 64</itunes:keywords>
      <itunes:subtitle>TEETH, Hippis from Hell, Them F*cking Robots</itunes:subtitle>
      <itunes:summary>Last decades I have made 3 films with technological aspects.
Since I am not a nerd, but a writer/ journalist/ filmmaker with an interest in technology, science and, I can offer SHA to show my 3 films (eventually the last one TEETH with a short lecture). For debate and for fun.
You can find more about me and my work on my own company http://poppeenpartners.nl/
#Community #Robot 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>02:21:16</itunes:duration>
    </item>
    <item>
      <title>Cryptokids (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-184-cryptokids</link>
      <description>Talk by Henk (waag Society) and Evelyn Austin (Bits of Freedom).

Cryptokids does just that. In a collaboration with Waag Society, Bits of Freedom and Network Democracy, we develop a series of lessons for kids aged ten to fourteen, in which they gain insight into the technical structure of the Internet, how data works, who is actually in charge online and why privacy matters. But more importantly, we try to empower them and provide tools for them to be more secure and to take charge of their own data when they surf the web.

In this lecture we will explain the project. Why and how we started, where we are now, and what are the lessons learned.

#Kids #Society #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-184-eng-Cryptokids_webm-hd.webm"
        length="270532608"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-184-eng-Cryptokids_webm-hd.webm?1502110932</guid>
      <dc:identifier>c90c0afc-3741-43fd-874f-820076b1c9db</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>henk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 184</itunes:keywords>
      <itunes:subtitle>empower kids and provide tools for them to be more secure and to take charge of their own data</itunes:subtitle>
      <itunes:summary>Talk by Henk (waag Society) and Evelyn Austin (Bits of Freedom).

Cryptokids does just that. In a collaboration with Waag Society, Bits of Freedom and Network Democracy, we develop a series of lessons for kids aged ten to fourteen, in which they gain insight into the technical structure of the Internet, how data works, who is actually in charge online and why privacy matters. But more importantly, we try to empower them and provide tools for them to be more secure and to take charge of their own data when they surf the web.

In this lecture we will explain the project. Why and how we started, where we are now, and what are the lessons learned.

#Kids #Society #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:32:29</itunes:duration>
    </item>
    <item>
      <title>SHOULD I STAY OR SHOULD I GO? (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-137-should_i_stay_or_should_i_go</link>
      <description>Today’s tech companies have enormous power over what we can access and share, and the input we—as users and citizens—have the ability to provide is minimal. Increasingly, algorithms are being deployed to control how information is delivered to us, as well as for the purpose of moderating user-generated content. These algorithms are proprietary, created by human beings at companies that fail on nearly all measures of diversity, and accountable to few. As user-generated content platforms like Facebook and Twitter reach monopolistic proportions, it has become more difficult to “vote with our feet” (or, more accurately, our data) than ever before. This talk will examine the state of the networked public sphere, the actors determining our destinies online and, most importantly, what we can do about it.

#Society #Privacy #SurveillanceState
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-137-eng-SHOULD_I_STAY_OR_SHOULD_I_GO_webm-hd.webm"
        length="422576128"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-137-eng-SHOULD_I_STAY_OR_SHOULD_I_GO_webm-hd.webm?1502102872</guid>
      <dc:identifier>8db39cdd-7700-4123-a22d-22393e282154</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Jillian C. York</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 137</itunes:keywords>
      <itunes:subtitle>THE ALGORITHMIC PUBLIC SPHERE AND YOU</itunes:subtitle>
      <itunes:summary>Today’s tech companies have enormous power over what we can access and share, and the input we—as users and citizens—have the ability to provide is minimal. Increasingly, algorithms are being deployed to control how information is delivered to us, as well as for the purpose of moderating user-generated content. These algorithms are proprietary, created by human beings at companies that fail on nearly all measures of diversity, and accountable to few. As user-generated content platforms like Facebook and Twitter reach monopolistic proportions, it has become more difficult to “vote with our feet” (or, more accurately, our data) than ever before. This talk will examine the state of the networked public sphere, the actors determining our destinies online and, most importantly, what we can do about it.

#Society #Privacy #SurveillanceState
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:46:35</itunes:duration>
    </item>
    <item>
      <title>Certbot &amp; Let&#39;s Encrypt Office Hours (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-214-certbot_let_s_encrypt_office_hours</link>
      <description>You’re trying to turn on https for your site for the first time. You have a certificate, but are sick of renewing it. You’ve set it up before, but now
you’ve grown and want a more advanced setup. Or, you don’t need help but want to understand some of the finer points of certificate theory, use, and management. Come to Certbot &amp; Let&#39;s Encrypt office hours to talk with Certbot developers and fellow users. No question too small or silly, no person too experienced or inexperienced to be worthy of our time.

#NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-214-eng-Certbot_Lets_Encrypt_Office_Hours_webm-hd.webm"
        length="707788800"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-214-eng-Certbot_Lets_Encrypt_Office_Hours_webm-hd.webm?1502111032</guid>
      <dc:identifier>b2b9237b-d45a-4271-9b63-66573c1de3c7</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Erica Portnoy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 214</itunes:keywords>
      <itunes:summary>You’re trying to turn on https for your site for the first time. You have a certificate, but are sick of renewing it. You’ve set it up before, but now
you’ve grown and want a more advanced setup. Or, you don’t need help but want to understand some of the finer points of certificate theory, use, and management. Come to Certbot &amp; Let&#39;s Encrypt office hours to talk with Certbot developers and fellow users. No question too small or silly, no person too experienced or inexperienced to be worthy of our time.

#NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:02:54</itunes:duration>
    </item>
    <item>
      <title>GNU Taler (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-241-gnu_taler</link>
      <description>GNU Taler is an online payment system that uses Chaum&#39;s blind signatures to provide robust unbreakable privacy for customers along with accountability for merchants. Taler avoids the the performance issues that plague Byzantine fault-tolerant consensus-based solutions, and is developed entirely as free software. The talk will cover everything about GNU Taler, including the cryptography, the system architecture and a demonstration.

#Privacy #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-241-eng-GNU_Taler_webm-hd.webm"
        length="624951296"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-241-eng-GNU_Taler_webm-hd.webm?1502110987</guid>
      <dc:identifier>1ae0dba4-beb2-4e06-aff8-49205cbe8138</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>grothoff</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 241</itunes:keywords>
      <itunes:subtitle>Independent One-Click Payments!</itunes:subtitle>
      <itunes:summary>GNU Taler is an online payment system that uses Chaum&#39;s blind signatures to provide robust unbreakable privacy for customers along with accountability for merchants. Taler avoids the the performance issues that plague Byzantine fault-tolerant consensus-based solutions, and is developed entirely as free software. The talk will cover everything about GNU Taler, including the cryptography, the system architecture and a demonstration.

#Privacy #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:01:09</itunes:duration>
    </item>
    <item>
      <title>Anonymous, secure and easy. You can have them all. (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-289-anonymous_secure_and_easy_you_can_have_them_all</link>
      <description>All the pieces to make encryption easy, secure and anonymous are in widespread use. Only we&#39;re not using them properly, making it difficult for the users. In this talk, Guido will show what benefits can be gained by using existing cryptographic protocols in a slightly different configuration. Doing so makes authentication easy, community building possible and truly private messaging between strangers a reality. All without requiring the users to think about cryptography. It just works.

#Privacy #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-289-eng-Anonymous_secure_and_easy_You_can_have_them_all_webm-hd.webm"
        length="658505728"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-289-eng-Anonymous_secure_and_easy_You_can_have_them_all_webm-hd.webm?1502111184</guid>
      <dc:identifier>384839be-beef-4ae4-939f-3c2046199c2b</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Guido Witmond</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 289</itunes:keywords>
      <itunes:subtitle>An authentication protocol that offers security, privacy and ease of use.</itunes:subtitle>
      <itunes:summary>All the pieces to make encryption easy, secure and anonymous are in widespread use. Only we&#39;re not using them properly, making it difficult for the users. In this talk, Guido will show what benefits can be gained by using existing cryptographic protocols in a slightly different configuration. Doing so makes authentication easy, community building possible and truly private messaging between strangers a reality. All without requiring the users to think about cryptography. It just works.

#Privacy #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:51:51</itunes:duration>
    </item>
    <item>
      <title>Human Rights and Internet Infrastructure (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-38-human_rights_and_internet_infrastructure</link>
      <description>Standards bodies, infrastructure providers, internet governance organizations and operators are getting more attention nowadays, but how are these institutions impacting human rights?

In this talk we&#39;ll introduce you to the slippery acronym world of the IETF, ICANN, IEEE, ITU, 3GPP, RFCs, IXPs, RIRs and we promise you won&#39;t be bored!

We&#39;ll try tot uncover parts that are crucial for what is (im)possible on the Internet, but that normally stay hidden. As a bonus we&#39;ll show you what you can do!

#Politics #Society
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-38-eng-Human_Rights_and_Internet_Infrastructure_webm-hd.webm"
        length="464519168"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-38-eng-Human_Rights_and_Internet_Infrastructure_webm-hd.webm?1502102803</guid>
      <dc:identifier>8e9e496f-0bdb-4e5f-82ae-5abebaf3d74d</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Niels ten Oever</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 38</itunes:keywords>
      <itunes:subtitle>standard or substandard?</itunes:subtitle>
      <itunes:summary>Standards bodies, infrastructure providers, internet governance organizations and operators are getting more attention nowadays, but how are these institutions impacting human rights?

In this talk we&#39;ll introduce you to the slippery acronym world of the IETF, ICANN, IEEE, ITU, 3GPP, RFCs, IXPs, RIRs and we promise you won&#39;t be bored!

We&#39;ll try tot uncover parts that are crucial for what is (im)possible on the Internet, but that normally stay hidden. As a bonus we&#39;ll show you what you can do!

#Politics #Society
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:52:35</itunes:duration>
    </item>
    <item>
      <title>Time Stretching BpmDj (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-65-time_stretching_bpmdj</link>
      <description>How to modify the speed of audio without altering its pitch ?

#Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-65-eng-Time_Stretching_BpmDj_webm-hd.webm"
        length="667942912"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-65-eng-Time_Stretching_BpmDj_webm-hd.webm?1502111150</guid>
      <dc:identifier>105bad41-3c75-4095-a9fe-ddfcb9d18892</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Werner Van Belle</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 65</itunes:keywords>
      <itunes:summary>How to modify the speed of audio without altering its pitch ?

#Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:57:45</itunes:duration>
    </item>
    <item>
      <title>Network Traffic Analysis using Deep Packet Inspection and Data Visualization (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-369-network_traffic_analysis_using_deep_packet_inspection_and_data_visualization</link>
      <description>For the protection of (critical) infrastructures against complex virus attacks, deep packet inspection is unavoidable. In our project SpySpot we are developing new tools and techniques to assist analysts in gaining insight and reverse engineering WireShark PCAP files. In this talk we present and demo a new data visualization system Eventpad to study PCAP traffic by visualizing patterns according to user-defined rules. We illustrate the effectiveness of the system on real-world traffic including VoIP communication and Ransomware activity in file systems.

#NetworkSecurity #DeviceSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-369-eng-Network_Traffic_Analysis_using_Deep_Packet_Inspection_and_Data_Visualization_webm-hd.webm"
        length="174063616"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-369-eng-Network_Traffic_Analysis_using_Deep_Packet_Inspection_and_Data_Visualization_webm-hd.webm?1502103312</guid>
      <dc:identifier>d48d1713-333b-4515-b56d-bc12fa2d3c44</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>ArrayX</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 369</itunes:keywords>
      <itunes:subtitle>Eventpad: the Sublime editor for network traffic</itunes:subtitle>
      <itunes:summary>For the protection of (critical) infrastructures against complex virus attacks, deep packet inspection is unavoidable. In our project SpySpot we are developing new tools and techniques to assist analysts in gaining insight and reverse engineering WireShark PCAP files. In this talk we present and demo a new data visualization system Eventpad to study PCAP traffic by visualizing patterns according to user-defined rules. We illustrate the effectiveness of the system on real-world traffic including VoIP communication and Ransomware activity in file systems.

#NetworkSecurity #DeviceSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:25:11</itunes:duration>
    </item>
    <item>
      <title>Malware: From your text editor,  to the United States Government&#39;s Lab (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-370-malware_from_your_text_editor_to_the_united_states_government_s_lab</link>
      <description>Ever wonder where your malware ends up after you deploy it? Are you curious how the United States Government researches Cyber Security on the backs of students? First, this is not a technical talk. This is an informative talk on the insides of how the inner workings of an Information Security Lab in one of the Top Technical Universities in the United States works with its Government to provide insights in the world of, as the feds like to call it, &quot;CyberSecurity&quot;. (All Americans apologize for Trump. We&#39;re sorry.)

#Politics #SurveillanceState
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-370-eng-Malware_From_your_text_editor_to_the_United_States_Governments_Lab_webm-hd.webm"
        length="216006656"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-370-eng-Malware_From_your_text_editor_to_the_United_States_Governments_Lab_webm-hd.webm?1502103341</guid>
      <dc:identifier>63b79857-ca2c-4fb4-b56c-b7807f947c01</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>QuantumCypher</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 370</itunes:keywords>
      <itunes:subtitle>How Universities in the US collaborate with the United States Government to make America stronger, and the rest weaker.</itunes:subtitle>
      <itunes:summary>Ever wonder where your malware ends up after you deploy it? Are you curious how the United States Government researches Cyber Security on the backs of students? First, this is not a technical talk. This is an informative talk on the insides of how the inner workings of an Information Security Lab in one of the Top Technical Universities in the United States works with its Government to provide insights in the world of, as the feds like to call it, &quot;CyberSecurity&quot;. (All Americans apologize for Trump. We&#39;re sorry.)

#Politics #SurveillanceState
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:18:31</itunes:duration>
    </item>
    <item>
      <title>The state of the pretty Easy privacy (p≡p) project and what to expect next (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-228-the_state_of_the_pretty_easy_privacy_p_p_project_and_what_to_expect_next</link>
      <description>The pretty Easy privacy (p≡p) project has the primary goal to make encryption accessible to the masses. By experience, the initiators know from CryptoPartys that regular users -- even after getting everything explained (e.g., basics of public key cryptography) -- continue to be unable to communicate in private on a regular basis in practice. That&#39;s where p≡p jumps in: instead of just providing good privacy, privacy must also be easy to achieve. p≡p automates all steps necessary to engage in end-to-end encryption without hassling the users involved or asking questions. The p≡p project started to provide easy to use OpenPGP-compatible encryption for as many platforms as possible, with the ultimate goal to transfer all written digital communications to the GNUnet, thus not just protecting contents, but also metadata. In this talk, the basic ideas and technologic foundations of p≡p are presented. Furtherly, it&#39;s shown in which cases p≡p is already operational and what&#39;s to be expected next.

#NetworkSecurity #DeviceSecurity #Privacy
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-228-eng-The_state_of_the_pretty_Easy_privacy_pp_project_and_what_to_expect_next_webm-hd.webm"
        length="454033408"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-228-eng-The_state_of_the_pretty_Easy_privacy_pp_project_and_what_to_expect_next_webm-hd.webm?1502103272</guid>
      <dc:identifier>95bd9e9a-af19-4a77-9dad-25bff9069b5c</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>vecirex</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 228</itunes:keywords>
      <itunes:subtitle>Easy to use automatic encryption for the masses</itunes:subtitle>
      <itunes:summary>The pretty Easy privacy (p≡p) project has the primary goal to make encryption accessible to the masses. By experience, the initiators know from CryptoPartys that regular users -- even after getting everything explained (e.g., basics of public key cryptography) -- continue to be unable to communicate in private on a regular basis in practice. That&#39;s where p≡p jumps in: instead of just providing good privacy, privacy must also be easy to achieve. p≡p automates all steps necessary to engage in end-to-end encryption without hassling the users involved or asking questions. The p≡p project started to provide easy to use OpenPGP-compatible encryption for as many platforms as possible, with the ultimate goal to transfer all written digital communications to the GNUnet, thus not just protecting contents, but also metadata. In this talk, the basic ideas and technologic foundations of p≡p are presented. Furtherly, it&#39;s shown in which cases p≡p is already operational and what&#39;s to be expected next.

#NetworkSecurity #DeviceSecurity #Privacy
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:01:52</itunes:duration>
    </item>
    <item>
      <title>Smart, safe &amp; happy (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-242-smart_safe_happy</link>
      <description>Privacy-minded charities have a hard time going up against silicon valley&#39;s army of corporate lawyers. Digital rights are becoming increasingly important in society, but politicians fail to come up with answers. Across the world law after law is being passed, eroding our civil liberties. Ancilla has been fighting to keep our digital rights for the past 5 years. At SHA she will share her lessons and thoughts on what comes next. 

#Politics #Society #Privacy
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-242-eng-Smart_safe_happy_webm-hd.webm"
        length="685768704"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-242-eng-Smart_safe_happy_webm-hd.webm?1502111106</guid>
      <dc:identifier>f0710900-b07f-4dfa-b762-af73aa4dc663</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Ancilla van de Leest </itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 242</itunes:keywords>
      <itunes:subtitle>ensuring civil rights in the digital era</itunes:subtitle>
      <itunes:summary>Privacy-minded charities have a hard time going up against silicon valley&#39;s army of corporate lawyers. Digital rights are becoming increasingly important in society, but politicians fail to come up with answers. Across the world law after law is being passed, eroding our civil liberties. Ancilla has been fighting to keep our digital rights for the past 5 years. At SHA she will share her lessons and thoughts on what comes next. 

#Politics #Society #Privacy
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:53:07</itunes:duration>
    </item>
    <item>
      <title>Rooting the MikroTik routers (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-88-rooting_the_mikrotik_routers</link>
      <description>In this talk I describe my journey into reverse engineering parts of MikroTik system to gain access to hardware features and the shell behind the RouterOS that has no “ls”.

#NetworkSecurity #DeviceSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-88-eng-Rooting_the_MikroTik_routers_webm-hd.webm"
        length="320864256"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-88-eng-Rooting_the_MikroTik_routers_webm-hd.webm?1502103294</guid>
      <dc:identifier>0eff8b32-bd9e-4a69-b704-70171ca0e83e</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Kirils Solovjovs</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 88</itunes:keywords>
      <itunes:summary>In this talk I describe my journey into reverse engineering parts of MikroTik system to gain access to hardware features and the shell behind the RouterOS that has no “ls”.

#NetworkSecurity #DeviceSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:52:57</itunes:duration>
    </item>
    <item>
      <title>Social Enterprises as a Tool for Activism (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-147-social_enterprises_as_a_tool_for_activism</link>
      <description>We have entered the era of President Trump.  Activists, NGOs, and charities thus need to reexamine the stability of (and motives behind) their funding sources.  Surprisingly, business is an excellent tool that one can leverage to change the system. While business is not perceived as sexy by most activist-types, this talk will explain why social enterprises are tactical, lightweight, independent, effective, and why they are now more important than ever.

#Society
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-147-eng-Social_Enterprises_as_a_Tool_for_Activism_webm-hd.webm"
        length="718274560"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-147-eng-Social_Enterprises_as_a_Tool_for_Activism_webm-hd.webm?1502103248</guid>
      <dc:identifier>e242ffd9-7e6b-4a80-83d7-c5cd1ee42ca9</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>MRieback</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 147</itunes:keywords>
      <itunes:summary>We have entered the era of President Trump.  Activists, NGOs, and charities thus need to reexamine the stability of (and motives behind) their funding sources.  Surprisingly, business is an excellent tool that one can leverage to change the system. While business is not perceived as sexy by most activist-types, this talk will explain why social enterprises are tactical, lightweight, independent, effective, and why they are now more important than ever.

#Society
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:00:01</itunes:duration>
    </item>
    <item>
      <title>Digital personal locker (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-149-digital_personal_locker</link>
      <description>Most of our data is held in a fuzzy uncontrollable manner. We propose a totally different solution, a new paradigm in thinking about your data. In this paradigm you know where your data is, you are in control and data losses are a thing of the past. This presentation will introduce the personal locker. A technical reference (and device) that allows you to actually own and control your data. Big data can have many benefits. But until now you had to store your data somewhere in the cloud instead of at home. This idea will show how to combine different open source software and hardware solutions to build a device which complies to regulations but where you own and control the data. Think blockchain, distributed file systems, encryption, PKI and Open mHealth.

#NetworkSecurity #BlockchainTech
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-149-eng-Digital_personal_locker_webm-hd.webm"
        length="226492416"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-149-eng-Digital_personal_locker_webm-hd.webm?1502103212</guid>
      <dc:identifier>56868784-42b9-4648-b313-7ee6c085740d</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>multimho</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 149</itunes:keywords>
      <itunes:subtitle>New paradigm in handling personal (health) data</itunes:subtitle>
      <itunes:summary>Most of our data is held in a fuzzy uncontrollable manner. We propose a totally different solution, a new paradigm in thinking about your data. In this paradigm you know where your data is, you are in control and data losses are a thing of the past. This presentation will introduce the personal locker. A technical reference (and device) that allows you to actually own and control your data. Big data can have many benefits. But until now you had to store your data somewhere in the cloud instead of at home. This idea will show how to combine different open source software and hardware solutions to build a device which complies to regulations but where you own and control the data. Think blockchain, distributed file systems, encryption, PKI and Open mHealth.

#NetworkSecurity #BlockchainTech
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:34:12</itunes:duration>
    </item>
    <item>
      <title>How hackers could have hacked all Dutch elections since 2009 (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-250-how_hackers_could_have_hacked_all_dutch_elections_since_2009</link>
      <description>In this talk I&#39;ll present my findings when researching the security of the Dutch voting system. I quickly found various important security mistakes which would made it very easy to tamper with the results. Based on my research the Dutch government dumped the voting software. 

#NetworkSecurity #DeviceSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-250-eng-How_hackers_could_have_hacked_all_Dutch_elections_since_2009_webm-hd.webm"
        length="742391808"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-250-eng-How_hackers_could_have_hacked_all_Dutch_elections_since_2009_webm-hd.webm?1502103191</guid>
      <dc:identifier>dd774554-e12d-4557-b91c-3f6039cd4aeb</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Sijmen Ruwhof</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 250</itunes:keywords>
      <itunes:summary>In this talk I&#39;ll present my findings when researching the security of the Dutch voting system. I quickly found various important security mistakes which would made it very easy to tamper with the results. Based on my research the Dutch government dumped the voting software. 

#NetworkSecurity #DeviceSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:54:40</itunes:duration>
    </item>
    <item>
      <title>Developments in Coordinated Vulnerability Disclosure (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-45-developments_in_coordinated_vulnerability_disclosure</link>
      <description>There has been much development in recent years on vulnerability disclosure. The Netherlands has taken the lead in 2013 by publishing an official guideline for &quot;Responsible Disclosure&quot;.

Since then much has happened, other countries have shown an interest and there is even a (free!) ISO standard on Coordinated Vulnerability Disclosure. In this talk I&#39;ll summarise the global developments and explain how and why things have gone as they are.

At the end of this talk I&#39;d also like to have an open discussion and collect feedback on how the Dutch government has handled this and can possibly improve this.
#NetworkSecurity #PhysicalSecurity #DeviceSecurity #Politics
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-45-eng-Developments_in_Coordinated_Vulnerability_Disclosure_webm-hd.webm"
        length="368050176"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-45-eng-Developments_in_Coordinated_Vulnerability_Disclosure_webm-hd.webm?1502102754</guid>
      <dc:identifier>8657ddea-1b0d-4312-a362-a89e3b11e5be</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>1sand0s</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 45</itunes:keywords>
      <itunes:subtitle>The government is here to help</itunes:subtitle>
      <itunes:summary>There has been much development in recent years on vulnerability disclosure. The Netherlands has taken the lead in 2013 by publishing an official guideline for &quot;Responsible Disclosure&quot;.

Since then much has happened, other countries have shown an interest and there is even a (free!) ISO standard on Coordinated Vulnerability Disclosure. In this talk I&#39;ll summarise the global developments and explain how and why things have gone as they are.

At the end of this talk I&#39;d also like to have an open discussion and collect feedback on how the Dutch government has handled this and can possibly improve this.
#NetworkSecurity #PhysicalSecurity #DeviceSecurity #Politics
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:59:26</itunes:duration>
    </item>
    <item>
      <title>Build Usable Tools (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-213-build_usable_tools</link>
      <description>You’ve designed and implemented the perfect protocol to keep your target users private and secure. Come make sure that it will be used effectively by real users. In this workshop, you’ll learn the basics of evaluating and improving usability. You’ll gain practical skills in applying usability guidelines, and in designing and carrying out user studies. Your project will become more intuitive and protected from user mishap. If you have a project that users interact with, bring it or printouts of its interface - we’ll be conducting small user studies during the workshop. This is intended for anyone involved in creating tools or products.

#Software
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-213-eng-Build_Usable_Tools_webm-hd.webm"
        length="576716800"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-213-eng-Build_Usable_Tools_webm-hd.webm?1502096086</guid>
      <dc:identifier>4e3e001a-61ad-4f4b-adc8-0ade9a4206bf</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Erica Portnoy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 213</itunes:keywords>
      <itunes:summary>You’ve designed and implemented the perfect protocol to keep your target users private and secure. Come make sure that it will be used effectively by real users. In this workshop, you’ll learn the basics of evaluating and improving usability. You’ll gain practical skills in applying usability guidelines, and in designing and carrying out user studies. Your project will become more intuitive and protected from user mishap. If you have a project that users interact with, bring it or printouts of its interface - we’ll be conducting small user studies during the workshop. This is intended for anyone involved in creating tools or products.

#Software
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:59:53</itunes:duration>
    </item>
    <item>
      <title>We don’t need no security! (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-217-we_don_t_need_no_security</link>
      <description>Of course we will need security - but maybe not in the way we&#39;ve &#39;always&#39; done it. In this session we will explore whether a lot of what we consider to be part of security’s tasks, actually requires a separate organisation. 

#NetworkSecurity #PhysicalSecurity #DeviceSecurity

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-217-eng-We_dont_need_no_security_webm-hd.webm"
        length="411041792"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-217-eng-We_dont_need_no_security_webm-hd.webm?1502103155</guid>
      <dc:identifier>d3c6e873-4426-4c4e-a89d-49c9573f61d1</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Jelle Niemantsverdriet (@jelle_n)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 217</itunes:keywords>
      <itunes:summary>Of course we will need security - but maybe not in the way we&#39;ve &#39;always&#39; done it. In this session we will explore whether a lot of what we consider to be part of security’s tasks, actually requires a separate organisation. 

#NetworkSecurity #PhysicalSecurity #DeviceSecurity

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:53:10</itunes:duration>
    </item>
    <item>
      <title>Building Businesses that we can Buy Into and Believe In (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-139-building_businesses_that_we_can_buy_into_and_believe_in</link>
      <description>In the age of corporate surveillance, invasive ad-driven business models and lucrative zero-days, it is no surprise that the words “profitable business” can sound destructive to internet freedom and human rights. However, if we want to change this trend and have a lasting impact, we need to make sure we can build profitable businesses on privacy-friendly and open source technologies, that respect all humans, without bias. 

#Society #Privacy
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-139-eng-Building_Businesses_that_we_can_Buy_Into_and_Believe_In_webm-hd.webm"
        length="787480576"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-139-eng-Building_Businesses_that_we_can_Buy_Into_and_Believe_In_webm-hd.webm?1502103128</guid>
      <dc:identifier>510c0687-a39e-4426-b9bc-bf75a7cdf0c0</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Liz Steininger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 139</itunes:keywords>
      <itunes:subtitle>What it means to profit from privacy-friendly, open-source technology and mutual respect for our fellow humans</itunes:subtitle>
      <itunes:summary>In the age of corporate surveillance, invasive ad-driven business models and lucrative zero-days, it is no surprise that the words “profitable business” can sound destructive to internet freedom and human rights. However, if we want to change this trend and have a lasting impact, we need to make sure we can build profitable businesses on privacy-friendly and open source technologies, that respect all humans, without bias. 

#Society #Privacy
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:57:27</itunes:duration>
    </item>
    <item>
      <title>My Safe In Your House (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-216-my_safe_in_your_house</link>
      <description>All those shiny cloud services sound tempting, but unfortunately they might mean giving up your private information to someone else. But with modern hardware and crypto, you can have your cake and eat it, too. How does searchable encryption work? What can oblivious RAM protect you from? Where do secure enclaves like Intel SGX shine, and where do they fail? We&#39;ll give an overview of how the latest research and products work, how experimental they are, and what they might be used for.

#DeviceSecurity #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-216-eng-My_Safe_In_Your_House_webm-hd.webm"
        length="236978176"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-216-eng-My_Safe_In_Your_House_webm-hd.webm?1502096028</guid>
      <dc:identifier>6e5a6877-3a72-464f-bf47-4bbd103b41fe</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Erica Portnoy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 216</itunes:keywords>
      <itunes:subtitle>Keeping Secrets On Remote Machines</itunes:subtitle>
      <itunes:summary>All those shiny cloud services sound tempting, but unfortunately they might mean giving up your private information to someone else. But with modern hardware and crypto, you can have your cake and eat it, too. How does searchable encryption work? What can oblivious RAM protect you from? Where do secure enclaves like Intel SGX shine, and where do they fail? We&#39;ll give an overview of how the latest research and products work, how experimental they are, and what they might be used for.

#DeviceSecurity #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:39:28</itunes:duration>
    </item>
    <item>
      <title>A look at TR-06FAIL and other CPE Configuration Management Disasters (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-176-a_look_at_tr-06fail_and_other_cpe_configuration_management_disasters</link>
      <description>In late 2016 a TR-064 (LAN-side CPE management) misconfiguration in a wide range of CPE devices was disclosed that allowed for remote device takeover. Within days, botnets began exploiting a related command injection issue, leading to widespread internet outages for customers of certain ISP&#39;s in the UK and abroad.
This talk will explore the impacts of these issues, along with taking a look at some other, related vulnerabilities related to TR-069 (WAN-side CPE management) protocol implementations that could allow for remote takeover of routers en-masse.

#NetworkSecurity  #DeviceSecurity  
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-176-eng-A_look_at_TR-06FAIL_and_other_CPE_Configuration_Management_Disasters_webm-hd.webm"
        length="143654912"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-176-eng-A_look_at_TR-06FAIL_and_other_CPE_Configuration_Management_Disasters_webm-hd.webm?1502095828</guid>
      <dc:identifier>a3d8af27-783d-4974-8118-8f536651201a</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Darren Martyn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 176</itunes:keywords>
      <itunes:summary>In late 2016 a TR-064 (LAN-side CPE management) misconfiguration in a wide range of CPE devices was disclosed that allowed for remote device takeover. Within days, botnets began exploiting a related command injection issue, leading to widespread internet outages for customers of certain ISP&#39;s in the UK and abroad.
This talk will explore the impacts of these issues, along with taking a look at some other, related vulnerabilities related to TR-069 (WAN-side CPE management) protocol implementations that could allow for remote takeover of routers en-masse.

#NetworkSecurity  #DeviceSecurity  
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:38:56</itunes:duration>
    </item>
    <item>
      <title>Social cooling (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-489-social_cooling</link>
      <description>What does it mean to be free in a world where surveillance is the dominant business model? Databrokers turn our data into thousands of reputation scores, which are increasingly impacting our chances to get a job, a loan, insurance or even a date. As awareness of this grows we see a growing culture of self-censorship and risk-aversion. In the long term these chilling effects could seriously &#39;cool down&#39; society.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-489-eng-Social_cooling_webm-hd.webm"
        length="272629760"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-489-eng-Social_cooling_webm-hd.webm?1502062191</guid>
      <dc:identifier>30b059d7-2809-4fd2-83b8-5e445acdf4ca</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Tijmen Schep</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 489</itunes:keywords>
      <itunes:subtitle>How the reputation economy is turning us into conformists</itunes:subtitle>
      <itunes:summary>What does it mean to be free in a world where surveillance is the dominant business model? Databrokers turn our data into thousands of reputation scores, which are increasingly impacting our chances to get a job, a loan, insurance or even a date. As awareness of this grows we see a growing culture of self-censorship and risk-aversion. In the long term these chilling effects could seriously &#39;cool down&#39; society.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:33:07</itunes:duration>
    </item>
    <item>
      <title>Human body as an electric IO system (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-58-human_body_as_an_electric_io_system</link>
      <description>A lecture about the brain as electrical Input Output system (the What the Hack logo would fit nice). But also other body parts as eyes and muscles will pass the revue.  
Debunking some myths on the way.
This would be for all hackers that dream about connecting computer processing power to themselves. For most of them this dream will be joyfully shattered, but some might become enthusiastic. 

#Making #Experimental
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-58-eng-Human_body_as_an_electric_IO_system_webm-hd.webm"
        length="1020264448"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-58-eng-Human_body_as_an_electric_IO_system_webm-hd.webm?1502102935</guid>
      <dc:identifier>d57cf068-ca2f-4e30-956b-e5149a1be25a</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Loek Gijben</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 58</itunes:keywords>
      <itunes:subtitle>Hacking your brain, and other body parts. Debunking myths on the way.</itunes:subtitle>
      <itunes:summary>A lecture about the brain as electrical Input Output system (the What the Hack logo would fit nice). But also other body parts as eyes and muscles will pass the revue.  
Debunking some myths on the way.
This would be for all hackers that dream about connecting computer processing power to themselves. For most of them this dream will be joyfully shattered, but some might become enthusiastic. 

#Making #Experimental
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:01:05</itunes:duration>
    </item>
    <item>
      <title>Tor &amp; Configuration Management (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-125-tor_configuration_management</link>
      <description>This presentation will explain in detail how the tor network can grow with a minimum of effort. It will also zoom in on the problem of centralisation and how we can evade it and still make the network grow even larger. I&#39;ll try to explain to you how you can do this with configuration management. Even the smallest of organisations can use this way to expand the network and to allow us to browse the internet more securely.

#NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-125-eng-Tor_Configuration_Management_webm-hd.webm"
        length="134217728"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-125-eng-Tor_Configuration_Management_webm-hd.webm?1502102950</guid>
      <dc:identifier>d23d5053-0684-4342-a0a4-7cfc4cd2afe3</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Sebastiaan Provost</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 125</itunes:keywords>
      <itunes:summary>This presentation will explain in detail how the tor network can grow with a minimum of effort. It will also zoom in on the problem of centralisation and how we can evade it and still make the network grow even larger. I&#39;ll try to explain to you how you can do this with configuration management. Even the smallest of organisations can use this way to expand the network and to allow us to browse the internet more securely.

#NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:28:48</itunes:duration>
    </item>
    <item>
      <title>How I made my diesel motorcycle (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-310-how_i_made_my_diesel_motorcycle</link>
      <description>I have made several diesel powered motorcycles and this is a simple talk or walk through of all the things I had to consider and things I had to do to complete the project. 
#Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-310-eng-How_I_made_my_diesel_motorcycle_webm-hd.webm"
        length="383778816"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-310-eng-How_I_made_my_diesel_motorcycle_webm-hd.webm?1502102837</guid>
      <dc:identifier>5032bf24-2db5-492d-9415-c2f05ddf1896</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Russell</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 310</itunes:keywords>
      <itunes:summary>I have made several diesel powered motorcycles and this is a simple talk or walk through of all the things I had to consider and things I had to do to complete the project. 
#Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:58:42</itunes:duration>
    </item>
    <item>
      <title>Because &quot;use urandom&quot; isn&#39;t everything: a deep dive into CSPRNGs in Operating Systems &amp; Programming Languages (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-199-because_use_urandom_isn_t_everything_a_deep_dive_into_csprngs_in_operating_systems_programming_languages</link>
      <description>Over the past year multiple people have been engaging language maintainers and designers to change their use of CSPRNGs (mainly relying on user-land RNGs like the one from OpenSSL, and sometimes suggesting &quot;adding entropy&quot; by various means from user-land daemons like haveged). In this short presentation we&#39;ll survey the struggle of cryptographers, developers and security engineers to change the path various high-profile languages have taken to provide randomness to their userbase. Affected languages include but are not limited to: Ruby, node.js and Erlang. We outline better approaches for language maintainers and implementers as well as coming changes within the Linux kernel crypto subsystem (i.e. /dev/random and /dev/urandom) w.r.t. security and performance. Recently these changes were merged into mainline Linux (4), problems with languages implementations however remain. We&#39;ll also discuss operating system provided randomness testing, attacks/mitigation in embedded and virtualized environments.
#Software #Security
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-199-eng-Because_use_urandom_isnt_everything_a_deep_dive_into_CSPRNGs_in_Operating_Systems_Programming_Languages_webm-hd.webm"
        length="1060110336"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-199-eng-Because_use_urandom_isnt_everything_a_deep_dive_into_CSPRNGs_in_Operating_Systems_Programming_Languages_webm-hd.webm?1502095101</guid>
      <dc:identifier>0c99ddbc-a8e5-44b3-b99e-5528a66b185d</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Aaron Zauner (azet)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 199</itunes:keywords>
      <itunes:subtitle>Implementation, hazards and updates on use of RNGs in programming languages and the Linux Kernel (among others)</itunes:subtitle>
      <itunes:summary>Over the past year multiple people have been engaging language maintainers and designers to change their use of CSPRNGs (mainly relying on user-land RNGs like the one from OpenSSL, and sometimes suggesting &quot;adding entropy&quot; by various means from user-land daemons like haveged). In this short presentation we&#39;ll survey the struggle of cryptographers, developers and security engineers to change the path various high-profile languages have taken to provide randomness to their userbase. Affected languages include but are not limited to: Ruby, node.js and Erlang. We outline better approaches for language maintainers and implementers as well as coming changes within the Linux kernel crypto subsystem (i.e. /dev/random and /dev/urandom) w.r.t. security and performance. Recently these changes were merged into mainline Linux (4), problems with languages implementations however remain. We&#39;ll also discuss operating system provided randomness testing, attacks/mitigation in embedded and virtualized environments.
#Software #Security
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:55:08</itunes:duration>
    </item>
    <item>
      <title>The law and leaky abstractions (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-112-the_law_and_leaky_abstractions</link>
      <description>In this talk I will show positive and negative examples of how laws can influence the security of infrastructures and society for the good and the bad. Without proper attention for lawmakers, security teams, service providers and security researchers could be positively or negatively influenced in their work.

#Legal #Politics
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-112-eng-The_law_and_leaky_abstractions_webm-hd.webm"
        length="268435456"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-112-eng-The_law_and_leaky_abstractions_webm-hd.webm?1502049039</guid>
      <dc:identifier>271f3623-a772-4052-81da-04872d9651ce</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Oscar Koeroo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 112</itunes:keywords>
      <itunes:subtitle>In what ways can laws influence the security of society.</itunes:subtitle>
      <itunes:summary>In this talk I will show positive and negative examples of how laws can influence the security of infrastructures and society for the good and the bad. Without proper attention for lawmakers, security teams, service providers and security researchers could be positively or negatively influenced in their work.

#Legal #Politics
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:27:26</itunes:duration>
    </item>
    <item>
      <title>Data Exploitation (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-267-data_exploitation</link>
      <description>In the world of the &quot;internet of shit&quot; - where it&#39;s not just our computers and phones that gather data about you but also your cars, your pacemaker, the toys you children play with and your fridge among many others - the dramatic growth in data collection has led to a loss of control over data. Who owns the data? How is it processed and collected? And more importantly how is it used to make decisions about you? Those are some of the questions Privacy International has been trying to address in order to help of us reclaim control over our devices. This talk will aim at explaining how data exploitation works and how it has already started affecting our lives so we can be prepared for and start resisting the exploitation.

#Privacy #IoT
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-267-eng-Data_Exploitation_webm-hd.webm"
        length="436207616"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-267-eng-Data_Exploitation_webm-hd.webm?1502048857</guid>
      <dc:identifier>d9bec470-99e4-491a-945c-13311c1f07ec</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Privacy International</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 267</itunes:keywords>
      <itunes:subtitle>how your digital doppelganger has been exploiting you all along</itunes:subtitle>
      <itunes:summary>In the world of the &quot;internet of shit&quot; - where it&#39;s not just our computers and phones that gather data about you but also your cars, your pacemaker, the toys you children play with and your fridge among many others - the dramatic growth in data collection has led to a loss of control over data. Who owns the data? How is it processed and collected? And more importantly how is it used to make decisions about you? Those are some of the questions Privacy International has been trying to address in order to help of us reclaim control over our devices. This talk will aim at explaining how data exploitation works and how it has already started affecting our lives so we can be prepared for and start resisting the exploitation.

#Privacy #IoT
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:03:08</itunes:duration>
    </item>
    <item>
      <title>Lightning talks day 3 (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-347-lightning_talks_day_3</link>
      <description>
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-347-eng-Lightning_talks_day_3_webm-hd.webm"
        length="428867584"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-347-eng-Lightning_talks_day_3_webm-hd.webm?1502048933</guid>
      <dc:identifier>b978e594-367d-461d-8431-a9f69fc83d6b</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Eireann &#39;bsb&#39; Leverett</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 347</itunes:keywords>
      <itunes:summary>
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:55:39</itunes:duration>
    </item>
    <item>
      <title>Hands up, don&#39;t shoot. Unless with a bodycam. (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-27-hands_up_don_t_shoot_unless_with_a_bodycam</link>
      <description>Dutch police officially started using bodycams eight years ago – although the oldest sightings of Dutch police officers outfitted with a ‘bobbycam’ date back twenty years. Such camera’s are another tool of surveillance, unless there is a solid policy governing their use. Of course, at the time of writing this summary, this policy is lacking. In this talk I’ll give an overview of the use of bodycams by the Dutch police in the last twenty years, explain the up- and downside for you and me and I’ll provide a summary of my policy recommendations. 

#Politics #SurveillanceState
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-27-eng-Hands_up_dont_shoot_Unless_with_a_bodycam_webm-hd.webm"
        length="924844032"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-27-eng-Hands_up_dont_shoot_Unless_with_a_bodycam_webm-hd.webm?1502055247</guid>
      <dc:identifier>274f918a-5b44-49d0-b94b-869bcc41d1af</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Rejo Zenger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 27</itunes:keywords>
      <itunes:summary>Dutch police officially started using bodycams eight years ago – although the oldest sightings of Dutch police officers outfitted with a ‘bobbycam’ date back twenty years. Such camera’s are another tool of surveillance, unless there is a solid policy governing their use. Of course, at the time of writing this summary, this policy is lacking. In this talk I’ll give an overview of the use of bodycams by the Dutch police in the last twenty years, explain the up- and downside for you and me and I’ll provide a summary of my policy recommendations. 

#Politics #SurveillanceState
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:59:09</itunes:duration>
    </item>
    <item>
      <title>Flip Feng Shui (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-95-flip_feng_shui</link>
      <description>In 2016, the VUSec system security group from Vrije Universiteit Amsterdam published three top-notch research papers on the topic of Rowhammer exploitation, leading to international media attention and even a prestigious PWNIE award. In this talk, we present key concepts of our research and provide an introduction to Rowhammer exploitation to the public. We describe how attackers can use the Flip Feng Shui exploitation vector to reliably attack cloud, desktop, and mobile platforms.

#DeviceSecurity 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-95-eng-Flip_Feng_Shui_webm-hd.webm"
        length="331350016"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-95-eng-Flip_Feng_Shui_webm-hd.webm?1502049007</guid>
      <dc:identifier>c118a980-7f90-4ff3-bf87-f86082f95982</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Victor van der Veen, Kaveh Razavi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 95</itunes:keywords>
      <itunes:subtitle>Advanced Rowhammer exploitation on cloud, desktop, and mobile</itunes:subtitle>
      <itunes:summary>In 2016, the VUSec system security group from Vrije Universiteit Amsterdam published three top-notch research papers on the topic of Rowhammer exploitation, leading to international media attention and even a prestigious PWNIE award. In this talk, we present key concepts of our research and provide an introduction to Rowhammer exploitation to the public. We describe how attackers can use the Flip Feng Shui exploitation vector to reliably attack cloud, desktop, and mobile platforms.

#DeviceSecurity 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:00:23</itunes:duration>
    </item>
    <item>
      <title>Olmogo - because it&#39;s your data! (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-299-olmogo_-_because_it_s_your_data</link>
      <description>We present “olmogo”, a novel cryptographic, distributed data storage system and end user application that could – within a single platform – replace today’s cloud storage, messaging / chat and social networks with a cryptographically secure alternative in which users can trustfully share their data while the infrastructure itself has no access to the content.

#Privacy #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-299-eng-Olmogo_-_because_its_your_data_webm-hd.webm"
        length="415236096"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-299-eng-Olmogo_-_because_its_your_data_webm-hd.webm?1502048972</guid>
      <dc:identifier>190f2b60-5541-48bd-82ad-239ff97fdba0</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Ralf Schulz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 299</itunes:keywords>
      <itunes:subtitle>A cryptographically secure social network platform</itunes:subtitle>
      <itunes:summary>We present “olmogo”, a novel cryptographic, distributed data storage system and end user application that could – within a single platform – replace today’s cloud storage, messaging / chat and social networks with a cryptographically secure alternative in which users can trustfully share their data while the infrastructure itself has no access to the content.

#Privacy #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:47:14</itunes:duration>
    </item>
    <item>
      <title>Zanshin Tech: the digital martial art (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-195-zanshin_tech_the_digital_martial_art</link>
      <description>&lt;p&gt;What do you get when you cross cybersecurity themes with the mindset and the discipline of martial arts? You get the Zanshin Tech.&lt;/p&gt;
&lt;p&gt;Zanshin Tech is a digital martial art focusing on the digital aggression and teaching how to use mind and technology to avoid, solve or stop the conflict.&lt;/p&gt;
&lt;p&gt;Through continuous practice, both youth and adults learn how to identify and manage Cyberbullying, Child enticement, Cyberstalking and much more.&lt;/p&gt;  
&lt;p&gt;The lecture is intended to introduce the discipline of Zanshin Tech, describing the activities, the educational method and the structure of the art itself.&lt;/p&gt;

#PhysicalSecurity  #Sharing  #Kids  #Training 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-195-eng-Zanshin_Tech_the_digital_martial_art_webm-hd.webm"
        length="382730240"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-195-eng-Zanshin_Tech_the_digital_martial_art_webm-hd.webm?1502048820</guid>
      <dc:identifier>227de42b-dba0-4ef4-9207-96f370155244</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>CoD</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 195</itunes:keywords>
      <itunes:summary>&lt;p&gt;What do you get when you cross cybersecurity themes with the mindset and the discipline of martial arts? You get the Zanshin Tech.&lt;/p&gt;
&lt;p&gt;Zanshin Tech is a digital martial art focusing on the digital aggression and teaching how to use mind and technology to avoid, solve or stop the conflict.&lt;/p&gt;
&lt;p&gt;Through continuous practice, both youth and adults learn how to identify and manage Cyberbullying, Child enticement, Cyberstalking and much more.&lt;/p&gt;  
&lt;p&gt;The lecture is intended to introduce the discipline of Zanshin Tech, describing the activities, the educational method and the structure of the art itself.&lt;/p&gt;

#PhysicalSecurity  #Sharing  #Kids  #Training 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:35:11</itunes:duration>
    </item>
    <item>
      <title>The World in 24 Hours Revisited (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-330-the_world_in_24_hours_revisited</link>
      <description>In this talk we look at The World in 24 Hours, an early computer network art performance from 1982, which took place between 13 different cities around the world in the messaging system of the computer time-sharing, consulting and services firm IP Sharp. Canadian artist and initiator Robert Adrian wanted to explore the way culture can live in computer networks. The recent interest in saving and restoring digital heritage has created the opportunity to re-evaluate this work and to look for ways to re-enact or interpret it in the present day network landscape. A description of the work is presented, along with information about the technical circumstances and the artistic intent behind the work. The audience is invited to join a discussion about what would be the best way to re-enact this event in today&#39;s post-Snowden era as close to the original optimistic spirit of the work as possible.

#Making #Society
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-330-eng-The_World_in_24_Hours_Revisited_webm-hd.webm"
        length="482344960"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-330-eng-The_World_in_24_Hours_Revisited_webm-hd.webm?1502048898</guid>
      <dc:identifier>223561fa-f6f8-4f75-b506-033f0a23d17c</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Josephine Bosma</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 330</itunes:keywords>
      <itunes:subtitle>How to re-enact a 1982 network art performance</itunes:subtitle>
      <itunes:summary>In this talk we look at The World in 24 Hours, an early computer network art performance from 1982, which took place between 13 different cities around the world in the messaging system of the computer time-sharing, consulting and services firm IP Sharp. Canadian artist and initiator Robert Adrian wanted to explore the way culture can live in computer networks. The recent interest in saving and restoring digital heritage has created the opportunity to re-evaluate this work and to look for ways to re-enact or interpret it in the present day network landscape. A description of the work is presented, along with information about the technical circumstances and the artistic intent behind the work. The audience is invited to join a discussion about what would be the best way to re-enact this event in today&#39;s post-Snowden era as close to the original optimistic spirit of the work as possible.

#Making #Society
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:40:52</itunes:duration>
    </item>
    <item>
      <title>Decentralize! Self-hosting in your own home using Sovereign (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-131-decentralize_self-hosting_in_your_own_home_using_sovereign</link>
      <description>Centralized services enable mass surveillance, control and censorship. Decentralization on the other hand can be laborious. The Sovereign project makes it easy to run your own dirt-cheap dedicated server for mail and many other services.

#Making

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-131-eng-Decentralize_Self-hosting_in_your_own_home_using_Sovereign_webm-hd.webm"
        length="343932928"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-131-eng-Decentralize_Self-hosting_in_your_own_home_using_Sovereign_webm-hd.webm?1502048779</guid>
      <dc:identifier>abd8b143-a3d8-4655-bd1c-a355a0bd5d8d</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Sven Neuhaus</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 131</itunes:keywords>
      <itunes:subtitle>act up on decentralization</itunes:subtitle>
      <itunes:summary>Centralized services enable mass surveillance, control and censorship. Decentralization on the other hand can be laborious. The Sovereign project makes it easy to run your own dirt-cheap dedicated server for mail and many other services.

#Making

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:47:25</itunes:duration>
    </item>
    <item>
      <title>Off&lt;&gt;zz Code and Piano Concert (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-211-off_zz_code_and_piano_concert</link>
      <description>For SHA2017, Off&lt;&gt;zz will present a two part music concert of  piano and live coding.
In the first part, we will present “Code Our Glance”:  a 30min musical journey where the audience influences the performance through an interactive  web-application. The second part will feature the beta version of the  CodeKlavier: a new project in which a pianist is able to code through playing the piano.

#Making

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-211-eng-Off_zz_Code_and_Piano_Concert_webm-hd.webm"
        length="695205888"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-211-eng-Off_zz_Code_and_Piano_Concert_webm-hd.webm?1502048745</guid>
      <dc:identifier>541f1772-a6a6-4fe1-904b-2df71b01dec2</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Off&lt;&gt;zz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 211</itunes:keywords>
      <itunes:subtitle>“Code Our Glance” and beta “CodeKlavier”</itunes:subtitle>
      <itunes:summary>For SHA2017, Off&lt;&gt;zz will present a two part music concert of  piano and live coding.
In the first part, we will present “Code Our Glance”:  a 30min musical journey where the audience influences the performance through an interactive  web-application. The second part will feature the beta version of the  CodeKlavier: a new project in which a pianist is able to code through playing the piano.

#Making

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:45:13</itunes:duration>
    </item>
    <item>
      <title>Fermentation Mobile (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-283-fermentation_mobile</link>
      <description>This talk is about setting up mobile fermentation education centers for experimental fermentation as well as means of legal production and vending points of fermented and other products at a variety of events and places.

After a decade of fermenting around the world I have come to the conclusion that having mobile bases, where kvasirs (brewers, fermentors) can do what they love and legally make their living by carrying out their activities, is a sustainable way to promote the fermentation art and science long term.

Being able to meet your needs by choosing and later on keeping working in your profession is one of the founding principles of human society. You can build up experience and knowledge of the persons and groups achieving progress in your field. Establishing fermentation communities guarantees more stable conditions for fermentation related projects, which take time, energy, and resources.

A mobile approach to fermentation helps to reduce efforts and resources to a minimum. This is crucial especially at the first phases of community build up, when least resources are available. Importantly it also allows promotion, exchange, and resource generation by collaboration with other communities and participation at events when the “home community” is not “fermentized”, or strong enough, to support the project fully yet. Fermentation mobile therefore aims to build up stable, local fermentation communities by helping them to achieve their sustainability and self reliance faster and more efficiently, integrating them into a legal framework, and combining collaboration and exchange of resources with other communities and projects.

#Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-283-eng-Fermentation_Mobile_webm-hd.webm"
        length="524288000"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-283-eng-Fermentation_Mobile_webm-hd.webm?1502048686</guid>
      <dc:identifier>6f193592-1fd2-479d-a7f8-cfb46806120b</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Frantisek Apfelbeck</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 283</itunes:keywords>
      <itunes:subtitle>experimental, educational and commercial fermentation everywhere</itunes:subtitle>
      <itunes:summary>This talk is about setting up mobile fermentation education centers for experimental fermentation as well as means of legal production and vending points of fermented and other products at a variety of events and places.

After a decade of fermenting around the world I have come to the conclusion that having mobile bases, where kvasirs (brewers, fermentors) can do what they love and legally make their living by carrying out their activities, is a sustainable way to promote the fermentation art and science long term.

Being able to meet your needs by choosing and later on keeping working in your profession is one of the founding principles of human society. You can build up experience and knowledge of the persons and groups achieving progress in your field. Establishing fermentation communities guarantees more stable conditions for fermentation related projects, which take time, energy, and resources.

A mobile approach to fermentation helps to reduce efforts and resources to a minimum. This is crucial especially at the first phases of community build up, when least resources are available. Importantly it also allows promotion, exchange, and resource generation by collaboration with other communities and participation at events when the “home community” is not “fermentized”, or strong enough, to support the project fully yet. Fermentation mobile therefore aims to build up stable, local fermentation communities by helping them to achieve their sustainability and self reliance faster and more efficiently, integrating them into a legal framework, and combining collaboration and exchange of resources with other communities and projects.

#Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:04:02</itunes:duration>
    </item>
    <item>
      <title>Exploiting The North American Railways (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-270-exploiting_the_north_american_railways</link>
      <description>From 2005 to 2010 I spent my time hopping freight trains all over the United States and Canada. With over 250,000km of railways in the U.S and Canada security is a huge task. With so much space to cover there are many opportunities to enter and ride the trains that move along the North American railways. This talk will cover some of the basics of doing so as well as the legal implications of these actions.

#PhysicalSecurity 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-270-eng-Exploiting_The_North_American_Railways_webm-hd.webm"
        length="291504128"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-270-eng-Exploiting_The_North_American_Railways_webm-hd.webm?1502024355</guid>
      <dc:identifier>c6747c8b-649f-4cad-ae7a-b5bd6138ca3f</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>lazerbeamwizard</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 270</itunes:keywords>
      <itunes:subtitle>Modern Day American Hobo-ism</itunes:subtitle>
      <itunes:summary>From 2005 to 2010 I spent my time hopping freight trains all over the United States and Canada. With over 250,000km of railways in the U.S and Canada security is a huge task. With so much space to cover there are many opportunities to enter and ride the trains that move along the North American railways. This talk will cover some of the basics of doing so as well as the legal implications of these actions.

#PhysicalSecurity 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:28:49</itunes:duration>
    </item>
    <item>
      <title>Cut by the free and open edge (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-240-cut_by_the_free_and_open_edge</link>
      <description>FLOSS seems to be a natural choice for NGOs and not formalized entities (groups of activists, etc) -- evading vendor lock-in, harder to place a back-door, community support, and no licensing costs. And yet many NGOs continue to use closed-source software, even in areas where FLOSS tools are available and considered stable. Reasons are many; one of them can be tracked to papercuts -- small, annoying quirks and imperfections making FLOSS awkward, hard, or impossible to use in a given setting.

#Society #Community
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-240-eng-Cut_by_the_free_and_open_edge_webm-hd.webm"
        length="521142272"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-240-eng-Cut_by_the_free_and_open_edge_webm-hd.webm?1502024312</guid>
      <dc:identifier>35834cbb-0e5a-4035-b5ef-56cac0450e52</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>rysiek, Michał &quot;czesiek&quot; Czyżewski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 240</itunes:keywords>
      <itunes:subtitle>FLOSS, NGOs, Activists, Journalists, and the Pareto Principle</itunes:subtitle>
      <itunes:summary>FLOSS seems to be a natural choice for NGOs and not formalized entities (groups of activists, etc) -- evading vendor lock-in, harder to place a back-door, community support, and no licensing costs. And yet many NGOs continue to use closed-source software, even in areas where FLOSS tools are available and considered stable. Reasons are many; one of them can be tracked to papercuts -- small, annoying quirks and imperfections making FLOSS awkward, hard, or impossible to use in a given setting.

#Society #Community
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:48:44</itunes:duration>
    </item>
    <item>
      <title>How to develop PyQt software (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-76-how_to_develop_pyqt_software</link>
      <description>Qt meets Python and allow you to create a GUI in few minutes. So we will show how this works while live coding.

#Software
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-76-eng-How_to_develop_PyQt_software_webm-hd.webm"
        length="270532608"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-76-eng-How_to_develop_PyQt_software_webm-hd.webm?1502024438</guid>
      <dc:identifier>ba28bb48-0861-4159-a27b-d27b8a3e2ec2</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Daniele Mte90 Scasciafratte</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 76</itunes:keywords>
      <itunes:summary>Qt meets Python and allow you to create a GUI in few minutes. So we will show how this works while live coding.

#Software
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:38:08</itunes:duration>
    </item>
    <item>
      <title>Bypassing Secure Boot using Fault Injection (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-143-bypassing_secure_boot_using_fault_injection</link>
      <description>More and more (secure) embedded systems implement a feature to assure the integrity and confidentiality of all software executed after power-on reset, commonly referred to as secure boot. When not logically flawed, other attack techniques must be used to bypass the provided security. Such an attack technique is fault injection.

#DeviceSecurity 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-143-eng-Bypassing_Secure_Boot_using_Fault_Injection_webm-hd.webm"
        length="195035136"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-143-eng-Bypassing_Secure_Boot_using_Fault_Injection_webm-hd.webm?1502024235</guid>
      <dc:identifier>e02b1946-a7ce-4779-a4c2-d120a43edd19</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>tieknimmers</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 143</itunes:keywords>
      <itunes:subtitle>Bypassing Secure Boot using Fault Injection</itunes:subtitle>
      <itunes:summary>More and more (secure) embedded systems implement a feature to assure the integrity and confidentiality of all software executed after power-on reset, commonly referred to as secure boot. When not logically flawed, other attack techniques must be used to bypass the provided security. Such an attack technique is fault injection.

#DeviceSecurity 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:50:40</itunes:duration>
    </item>
    <item>
      <title>Demolish the web with the Firefox Dev Tools! (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-70-demolish_the_web_with_the_firefox_dev_tools</link>
      <description>Firefox has amazing dev tools that support the last technologies but they can used also with other browser and nodejs.

#Software
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-70-eng-Demolish_the_web_with_the_Firefox_Dev_Tools_webm-hd.webm"
        length="340787200"
        type="video/webm"/>
      <pubDate>Sun, 06 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-70-eng-Demolish_the_web_with_the_Firefox_Dev_Tools_webm-hd.webm?1502024260</guid>
      <dc:identifier>9ba5a35b-0608-40f1-84ec-e02c387cb60b</dc:identifier>
      <dc:date>2017-08-06T00:00:00+02:00</dc:date>
      <itunes:author>Daniele Mte90 Scasciafratte</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 70</itunes:keywords>
      <itunes:subtitle>Do you know what you can do with Firefox for frontend development?</itunes:subtitle>
      <itunes:summary>Firefox has amazing dev tools that support the last technologies but they can used also with other browser and nodejs.

#Software
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:48:54</itunes:duration>
    </item>
    <item>
      <title>Relationship status of technology and legislation: It&#39;s complicated (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-98-relationship_status_of_technology_and_legislation_it_s_complicated</link>
      <description>Legislation is said to be slow to follow technological developments. This not only has an impact on the capacity of the police and intelligence services, but also has negative impact on the freedoms of citizens. In this talk I&#39;ll discuss some of the recurring issues and possibly solutions.
#Politics #Privacy
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-98-eng-Relationship_status_of_technology_and_legislation_Its_complicated_webm-hd.webm"
        length="330301440"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-98-eng-Relationship_status_of_technology_and_legislation_Its_complicated_webm-hd.webm?1502020071</guid>
      <dc:identifier>9b45fac3-3ccb-4778-abf1-cc564467ede1</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Ton Siedsma</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 98</itunes:keywords>
      <itunes:summary>Legislation is said to be slow to follow technological developments. This not only has an impact on the capacity of the police and intelligence services, but also has negative impact on the freedoms of citizens. In this talk I&#39;ll discuss some of the recurring issues and possibly solutions.
#Politics #Privacy
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:50:50</itunes:duration>
    </item>
    <item>
      <title>Art Tech Activism Privacy and Cool Robots (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-340-art_tech_activism_privacy_and_cool_robots</link>
      <description>Viola van Alphen is activist, writer and former director of multimedia event GOGBOT, which was awarded as the Most Innovative Event of the Netherlands. In Oct she organizes Manifestations @ Dutch Design Week, reach: 290.000 visitors. Theme: Will the Future Design Us? sub theme: Internet of Women Things: on Need-driven innovation, what role do we want technology to have?  &lt;/br&gt;
&lt;/br&gt;

With themes like the Googlization of Everything, Japanoiiid, Singularity is Near..Resistance is Futile, Mediapolis, Meme’s, Atompunk, the festival always seems to address one or more issues that create controversy and encourage the visitors to be more actively engaged in technology and the role they want technology to have and definitely to not have in the future. Themes around Privacy, Security and Hacking.
&lt;/br&gt;
&lt;/br&gt;
The festival is free of entrance, taking art out of the museums and presenting it in the public space. With international artists, young talent and collaborations with i.e. VU University and University Twente, European Space Agency, NASA, Nanolab Twente, Mddr_ Lab, WORM, Lebowski StreetArt publishers, Anonymous, FEMEN, Hackerspaces, etc.
&lt;/br&gt;
&lt;/br&gt;
With projects like Google Birth, Baghdad Car Bomb Wrecks of Jonas Staal, Tinkebels underwear-vending-machines, Workspace for “Terrorists” from Atelier van Lieshout, Autonomous Spaceships, etc etc.
&lt;/br&gt;
&lt;/br&gt;
Together with a group of artists, Viola hacked herself into the Museum of Modern Art NYC using A.R. app LAYAR, which afterwards officially got added to the MoMA’s program.&lt;/br&gt;
&lt;/br&gt;

During the presentation she will show several examples of (tech) art, robots and activism.
&lt;/br&gt;
&lt;/br&gt;

One of the goals to show worldwide professional artists active in the field of Security, Privacy and Hacking, but also build bridges between artists and hackers, and to (hopefully) take away previous experiences in seeing bad art and amateur art. &lt;/br&gt;&lt;/br&gt;

Saturday 11-23h you can experience Freerk Wieringa&#39;s exoskeleton: wear this and control a 3m high steel robot. www.freerkwieringa.nl
&lt;/br&gt;&lt;/br&gt;
#Making #Robot #Art #Exoskeleton #Activism #Privacy #DDW #Design #Futurism #WillTheFutureDesignUs
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-340-eng-Art_Tech_Activism_Privacy_and_Cool_Robots_webm-hd.webm"
        length="476053504"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-340-eng-Art_Tech_Activism_Privacy_and_Cool_Robots_webm-hd.webm?1502020124</guid>
      <dc:identifier>06a915a7-14b3-4b3c-b914-066c6d24b228</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Viola</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 340</itunes:keywords>
      <itunes:subtitle>Not only hackers do Security, Privacy and Hacking. Want to see some hacked Industy Robots playing records, Exoskeletons, Power-of-Google-out-of-control, Grindcore Karaoke-bar, Robots and Activism reaching a broad audience? Meet Real Art!</itunes:subtitle>
      <itunes:summary>Viola van Alphen is activist, writer and former director of multimedia event GOGBOT, which was awarded as the Most Innovative Event of the Netherlands. In Oct she organizes Manifestations @ Dutch Design Week, reach: 290.000 visitors. Theme: Will the Future Design Us? sub theme: Internet of Women Things: on Need-driven innovation, what role do we want technology to have?  &lt;/br&gt;
&lt;/br&gt;

With themes like the Googlization of Everything, Japanoiiid, Singularity is Near..Resistance is Futile, Mediapolis, Meme’s, Atompunk, the festival always seems to address one or more issues that create controversy and encourage the visitors to be more actively engaged in technology and the role they want technology to have and definitely to not have in the future. Themes around Privacy, Security and Hacking.
&lt;/br&gt;
&lt;/br&gt;
The festival is free of entrance, taking art out of the museums and presenting it in the public space. With international artists, young talent and collaborations with i.e. VU University and University Twente, European Space Agency, NASA, Nanolab Twente, Mddr_ Lab, WORM, Lebowski StreetArt publishers, Anonymous, FEMEN, Hackerspaces, etc.
&lt;/br&gt;
&lt;/br&gt;
With projects like Google Birth, Baghdad Car Bomb Wrecks of Jonas Staal, Tinkebels underwear-vending-machines, Workspace for “Terrorists” from Atelier van Lieshout, Autonomous Spaceships, etc etc.
&lt;/br&gt;
&lt;/br&gt;
Together with a group of artists, Viola hacked herself into the Museum of Modern Art NYC using A.R. app LAYAR, which afterwards officially got added to the MoMA’s program.&lt;/br&gt;
&lt;/br&gt;

During the presentation she will show several examples of (tech) art, robots and activism.
&lt;/br&gt;
&lt;/br&gt;

One of the goals to show worldwide professional artists active in the field of Security, Privacy and Hacking, but also build bridges between artists and hackers, and to (hopefully) take away previous experiences in seeing bad art and amateur art. &lt;/br&gt;&lt;/br&gt;

Saturday 11-23h you can experience Freerk Wieringa&#39;s exoskeleton: wear this and control a 3m high steel robot. www.freerkwieringa.nl
&lt;/br&gt;&lt;/br&gt;
#Making #Robot #Art #Exoskeleton #Activism #Privacy #DDW #Design #Futurism #WillTheFutureDesignUs
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:50:52</itunes:duration>
    </item>
    <item>
      <title>Computational Thinking (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-234-computational_thinking</link>
      <description>You will get inspiration how you can teach your kids computational thinking. 

#Society #Science #Kids

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-234-eng-Computational_Thinking_webm-hd.webm"
        length="447741952"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-234-eng-Computational_Thinking_webm-hd.webm?1502016476</guid>
      <dc:identifier>1f0b7f14-df46-4076-851d-8b2b3cc57056</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Pauline Maas</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 234</itunes:keywords>
      <itunes:subtitle>How your can teach it. </itunes:subtitle>
      <itunes:summary>You will get inspiration how you can teach your kids computational thinking. 

#Society #Science #Kids

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:48:19</itunes:duration>
    </item>
    <item>
      <title>Best of IoT Fails (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-163-best_of_iot_fails</link>
      <description>The internet of things (IoT) is just at the beginning of its development, but there are already various examples of so-called fails, which are not coming from the pen of science fiction authors. In my talk, I present current examples that I collected as a journalist and did write about that might sound like science fiction, but actually have already taken place. I am also presenting collected solutions on how to make IoT a little bit more failure free and more privacy save. 

#IoT #Privacy #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-163-eng-Best_of_IoT_Fails_webm-hd.webm"
        length="340787200"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-163-eng-Best_of_IoT_Fails_webm-hd.webm?1502016439</guid>
      <dc:identifier>3852e448-f6cf-4bfe-8b14-12d590075bd6</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Barbara Wimmer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 163</itunes:keywords>
      <itunes:subtitle>When reality beats science fiction</itunes:subtitle>
      <itunes:summary>The internet of things (IoT) is just at the beginning of its development, but there are already various examples of so-called fails, which are not coming from the pen of science fiction authors. In my talk, I present current examples that I collected as a journalist and did write about that might sound like science fiction, but actually have already taken place. I am also presenting collected solutions on how to make IoT a little bit more failure free and more privacy save. 

#IoT #Privacy #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:30:54</itunes:duration>
    </item>
    <item>
      <title>Zero to chiptune in one hour (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-175-zero_to_chiptune_in_one_hour</link>
      <description>An in-depth demonstration of the process of creating video game music on an authentic retro computer - namely, the ZX Spectrum. Over the course of an hour I will attempt to create, from scratch, a chiptune cover version of a pop song chosen by the audience. Along the way, I&#39;ll explain the hardware limitations that give rise to the well-known blip-blop sound of chiptunes, and the tricks that musicians have used to overcome those limitations.
#Making #Gaming
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-175-eng-Zero_to_chiptune_in_one_hour_webm-hd.webm"
        length="411041792"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-175-eng-Zero_to_chiptune_in_one_hour_webm-hd.webm?1502016396</guid>
      <dc:identifier>4b37af17-01a3-4bf8-9023-2d55076ebe65</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Matt Westcott</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 175</itunes:keywords>
      <itunes:summary>An in-depth demonstration of the process of creating video game music on an authentic retro computer - namely, the ZX Spectrum. Over the course of an hour I will attempt to create, from scratch, a chiptune cover version of a pop song chosen by the audience. Along the way, I&#39;ll explain the hardware limitations that give rise to the well-known blip-blop sound of chiptunes, and the tricks that musicians have used to overcome those limitations.
#Making #Gaming
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:03:37</itunes:duration>
    </item>
    <item>
      <title>Network concepts introduction &amp; wireshark workshop (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-20-network_concepts_introduction_wireshark_workshop</link>
      <description>&lt;p&gt;&lt;b&gt;BRING YOUR LAPTOPS. CHARGE THEM!&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Ever wondered how webpages arrive in your browser? How zmap works? Want to get your first hands-on experience using wireshark?&lt;/p&gt;
&lt;p&gt;To learn all that you need to learn the basic networking concepts. You&#39;re in luck as this is a hands-on networking workshop preceded by a lecture. We will cover such topics as the ISO/OSI model, Ethernet, IP, TCP, UDP, routing, and wireshark. &lt;p&gt;
&lt;p&gt;The workshop at 33c3 was over-crowded, so this is a chance for those who couldn&#39;t attend, to make it this time.&lt;/p&gt;
#Training
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-20-eng-Network_concepts_introduction_wireshark_workshop_webm-hd.webm"
        length="931135488"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-20-eng-Network_concepts_introduction_wireshark_workshop_webm-hd.webm?1502024213</guid>
      <dc:identifier>b5a645a9-bbdc-433e-a77c-b416074a92ea</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Kirils Solovjovs</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 20</itunes:keywords>
      <itunes:subtitle>The legendary workshop that teaches you how network really works</itunes:subtitle>
      <itunes:summary>&lt;p&gt;&lt;b&gt;BRING YOUR LAPTOPS. CHARGE THEM!&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Ever wondered how webpages arrive in your browser? How zmap works? Want to get your first hands-on experience using wireshark?&lt;/p&gt;
&lt;p&gt;To learn all that you need to learn the basic networking concepts. You&#39;re in luck as this is a hands-on networking workshop preceded by a lecture. We will cover such topics as the ISO/OSI model, Ethernet, IP, TCP, UDP, routing, and wireshark. &lt;p&gt;
&lt;p&gt;The workshop at 33c3 was over-crowded, so this is a chance for those who couldn&#39;t attend, to make it this time.&lt;/p&gt;
#Training
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>02:36:50</itunes:duration>
    </item>
    <item>
      <title>Detecting a breach from an attackers perspective. (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-47-detecting_a_breach_from_an_attackers_perspective</link>
      <description>Detecting a breach is hard, detecting someone who targets your network specifically is even harder. As pentesters, we notice that we often remain undetected and breaching an infrastructure via an external server generally goes unnoticed. However, indications of our breach could definitely have been picked up, we could have been detected. So, why weren’t we? This talk focusses on using simple detection mechanisms that detect specific post exploitation steps. We demonstrate simple tricks that can be used as a final warning mechanism. We choose to focus on the behaviour of an attacker and give them what they want. Is the attacker using Mimikatz? Give them (fake) credentials. Are they using Responder? Broadcast WPAD queries! Port scanning the network? Give them something to port scan! Design small traps from an attackers perspective to detect someone snooping around.

Modern companies have various detection systems and immense amounts of logging. Not every alarm can be followed up, there needs to be a proper justification before starting a full-scale investigation. Indications of an initial breach (exploit-kit/phishing/malspam) do not justify a full-scale investigation. However, indications of post exploitation directs you towards a more focussed investigation. Assuming you don’t have many indications of post exploitation ;).&lt;b&gt;
#NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-47-eng-Detecting_a_breach_from_an_attackers_perspective_webm-hd.webm"
        length="187695104"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-47-eng-Detecting_a_breach_from_an_attackers_perspective_webm-hd.webm?1502016371</guid>
      <dc:identifier>ce7ba341-f44e-4f82-9f67-45e2df6b9c67</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Rik van Duijn, Wesley Neelen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 47</itunes:keywords>
      <itunes:subtitle>We&#39;re gonna regret this</itunes:subtitle>
      <itunes:summary>Detecting a breach is hard, detecting someone who targets your network specifically is even harder. As pentesters, we notice that we often remain undetected and breaching an infrastructure via an external server generally goes unnoticed. However, indications of our breach could definitely have been picked up, we could have been detected. So, why weren’t we? This talk focusses on using simple detection mechanisms that detect specific post exploitation steps. We demonstrate simple tricks that can be used as a final warning mechanism. We choose to focus on the behaviour of an attacker and give them what they want. Is the attacker using Mimikatz? Give them (fake) credentials. Are they using Responder? Broadcast WPAD queries! Port scanning the network? Give them something to port scan! Design small traps from an attackers perspective to detect someone snooping around.

Modern companies have various detection systems and immense amounts of logging. Not every alarm can be followed up, there needs to be a proper justification before starting a full-scale investigation. Indications of an initial breach (exploit-kit/phishing/malspam) do not justify a full-scale investigation. However, indications of post exploitation directs you towards a more focussed investigation. Assuming you don’t have many indications of post exploitation ;).&lt;b&gt;
#NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:27:19</itunes:duration>
    </item>
    <item>
      <title>Improving security with Fuzzing and Sanitizers (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-148-improving_security_with_fuzzing_and_sanitizers</link>
      <description>A bug in Gstreamer could be used to own a Linux Desktop system. TCPDump released a security update fixing 42 CVEs. We have far too many security critical bugs in the free and open source software stack. But we have powerful tools to find them - we just have to use them.

#Software #DeviceSecurity #Sharing
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-148-eng-Improving_security_with_Fuzzing_and_Sanitizers_webm-hd.webm"
        length="260046848"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-148-eng-Improving_security_with_Fuzzing_and_Sanitizers_webm-hd.webm?1501976680</guid>
      <dc:identifier>9f3c556d-5cb0-4b17-a099-3c4626a7e83b</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Hanno</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 148</itunes:keywords>
      <itunes:subtitle>Free and open source software has far too many security critical bugs.</itunes:subtitle>
      <itunes:summary>A bug in Gstreamer could be used to own a Linux Desktop system. TCPDump released a security update fixing 42 CVEs. We have far too many security critical bugs in the free and open source software stack. But we have powerful tools to find them - we just have to use them.

#Software #DeviceSecurity #Sharing
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:40:04</itunes:duration>
    </item>
    <item>
      <title>Lecture Decode: Data-sovereignty back to the citizens (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-152-lecture_decode_data-sovereignty_back_to_the_citizens</link>
      <description>Join this talk on DECODE, a project that provides tools that put individuals in control of whether they keep their personal data private or share it for the public good.

#Privacy #Software
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-152-eng-Lecture_Decode_Data-sovereignty_back_to_the_citizens_webm-hd.webm"
        length="183500800"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-152-eng-Lecture_Decode_Data-sovereignty_back_to_the_citizens_webm-hd.webm?1501976635</guid>
      <dc:identifier>4eb873b3-bf3a-49a7-8c5c-71ebe6fa8dcd</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Marleen Stikker , Tom Demeyer </itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 152</itunes:keywords>
      <itunes:summary>Join this talk on DECODE, a project that provides tools that put individuals in control of whether they keep their personal data private or share it for the public good.

#Privacy #Software
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:47:19</itunes:duration>
    </item>
    <item>
      <title>Smart Home Security with Tor (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-56-smart_home_security_with_tor</link>
      <description>The IoT is emerging as the third wave in the development of the Internet. We have a great danger with IoT because of the surveillance by an individual hacker or a state actor to exploit the very private information of individuals or companies. We can secure our “Smart Homes” by using TOR.
#IoT #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-56-eng-Smart_Home_Security_with_Tor_webm-hd.webm"
        length="251658240"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-56-eng-Smart_Home_Security_with_Tor_webm-hd.webm?1501976594</guid>
      <dc:identifier>ddb12e13-2fb7-4499-bf28-38db6143aa4b</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Kalyan Dikshit</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 56</itunes:keywords>
      <itunes:subtitle>Using TOR for securing Smart Homes from prying eyes</itunes:subtitle>
      <itunes:summary>The IoT is emerging as the third wave in the development of the Internet. We have a great danger with IoT because of the surveillance by an individual hacker or a state actor to exploit the very private information of individuals or companies. We can secure our “Smart Homes” by using TOR.
#IoT #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:36:44</itunes:duration>
    </item>
    <item>
      <title>Beyond the Titanic (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-108-beyond_the_titanic</link>
      <description>Slowly ignorance over dataleaks are vanishing. We start to accept that there are vulnerabilities that affect us on a daily basis. Yet we are terribly slow in learning from these incidents. What would you learn if you were to dig deeper into dataleaks as if it were a disaster? During this presentation we explore some lessons learnt.
#Privacy #Society
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-108-eng-Beyond_the_Titanic_webm-hd.webm"
        length="448790528"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-108-eng-Beyond_the_Titanic_webm-hd.webm?1501976527</guid>
      <dc:identifier>e6957ebe-3682-4ab3-a0f3-26736a57f3a2</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Brenno de Winter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 108</itunes:keywords>
      <itunes:subtitle>Learning from dataleaks</itunes:subtitle>
      <itunes:summary>Slowly ignorance over dataleaks are vanishing. We start to accept that there are vulnerabilities that affect us on a daily basis. Yet we are terribly slow in learning from these incidents. What would you learn if you were to dig deeper into dataleaks as if it were a disaster? During this presentation we explore some lessons learnt.
#Privacy #Society
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:42:10</itunes:duration>
    </item>
    <item>
      <title>Hacking on a boat (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-123-hacking_on_a_boat</link>
      <description>Modern vessels are equipped with all kinds of electronics, to easy navigation, assist in manoevring and -by far the most important- assist in the safety of the ship and its passengers. In this talk, we will evaluate the security principles that have been used to design these systems and how we can break into the onboard systems.
#NetworkSecurity #PhysicalSecurity #DeviceSecurity


about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-123-eng-Hacking_on_a_boat_webm-hd.webm"
        length="397410304"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-123-eng-Hacking_on_a_boat_webm-hd.webm?1501976562</guid>
      <dc:identifier>3662dfba-c409-40d6-9647-e8d8c1e2d773</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Vincent Ossewaarde</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 123</itunes:keywords>
      <itunes:subtitle>Fun with onboard maritime systems</itunes:subtitle>
      <itunes:summary>Modern vessels are equipped with all kinds of electronics, to easy navigation, assist in manoevring and -by far the most important- assist in the safety of the ship and its passengers. In this talk, we will evaluate the security principles that have been used to design these systems and how we can break into the onboard systems.
#NetworkSecurity #PhysicalSecurity #DeviceSecurity


about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:38:18</itunes:duration>
    </item>
    <item>
      <title>Heralds Introduction (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-999-heralds_introduction</link>
      <description>Angels that would like to be a Herald have to attend one of the introductions. This is the third introduction. 

You will learn how to engage and control a crowd, how to handle a microphone.

Heralds are the face of the event and function as a kind of Host on the stage, introducing speakers, moderating Q&amp;As and making sure that everything happends on time
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-999-eng-Heralds_Introduction_webm-hd.webm"
        length="365953024"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-999-eng-Heralds_Introduction_webm-hd.webm?1501976380</guid>
      <dc:identifier>56579910-e430-4897-99f9-eb2116609f01</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>ijon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 999</itunes:keywords>
      <itunes:summary>Angels that would like to be a Herald have to attend one of the introductions. This is the third introduction. 

You will learn how to engage and control a crowd, how to handle a microphone.

Heralds are the face of the event and function as a kind of Host on the stage, introducing speakers, moderating Q&amp;As and making sure that everything happends on time
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:41:34</itunes:duration>
    </item>
    <item>
      <title>Are Whistleblowers safer today than they were at OHM2013? (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-296-are_whistleblowers_safer_today_than_they_were_at_ohm2013</link>
      <description>How does the public view whistleblowers? Would they use social media, blogs or other methods to blow the whistle? We report on gold-standard public polls across 4 European countries. We will present recent cases in Europe, and track the progress - and setbacks - in European protections.

#Privacy #Society #Politics #SurveillanceState
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-296-eng-Are_Whistleblowers_safer_today_than_they_were_at_OHM2013_webm-hd.webm"
        length="834666496"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-296-eng-Are_Whistleblowers_safer_today_than_they_were_at_OHM2013_webm-hd.webm?1502008685</guid>
      <dc:identifier>80bf473f-8f34-4b9b-92be-ccdbf75952e2</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Suelette, Veronika Nad, Cannelle </itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 296</itunes:keywords>
      <itunes:subtitle>Current case studies of whistleblowing in Europe, and how the law is progressing</itunes:subtitle>
      <itunes:summary>How does the public view whistleblowers? Would they use social media, blogs or other methods to blow the whistle? We report on gold-standard public polls across 4 European countries. We will present recent cases in Europe, and track the progress - and setbacks - in European protections.

#Privacy #Society #Politics #SurveillanceState
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:04:32</itunes:duration>
    </item>
    <item>
      <title>Hack North Korea (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-120-hack_north_korea</link>
      <description>HRF North Korea Program team will prepare a presentation to educate SHA 2017 participants about how information is currently brought into the tightly controlled closed regime—whether via leaflets dropped by helium-nitrogen balloons, on USB drives and DVDs, or by shortwave radio. The session will explore how individuals and organizations can
improve current techniques to hack the regime’s information monopoly and accelerate the influx of outside information. 
#Privacy #Politics #Sharing
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-120-eng-Hack_North_Korea_webm-hd.webm"
        length="548405248"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-120-eng-Hack_North_Korea_webm-hd.webm?1501976488</guid>
      <dc:identifier>98f8267c-cad1-4d04-8a52-f7e979e68c00</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Human Rights Foundation </itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 120</itunes:keywords>
      <itunes:subtitle>Flash Drives for Freedom </itunes:subtitle>
      <itunes:summary>HRF North Korea Program team will prepare a presentation to educate SHA 2017 participants about how information is currently brought into the tightly controlled closed regime—whether via leaflets dropped by helium-nitrogen balloons, on USB drives and DVDs, or by shortwave radio. The session will explore how individuals and organizations can
improve current techniques to hack the regime’s information monopoly and accelerate the influx of outside information. 
#Privacy #Politics #Sharing
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:43:10</itunes:duration>
    </item>
    <item>
      <title>DNA: The Code of Life (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-31-dna_the_code_of_life</link>
      <description>DNA is the code of life. It encodes how we are built, how nature operates. Science learns more and more about this uniquely digital language. This talk will excite hackers &amp; anyone who knows a little bit about computing, since it turns out DNA is better explained in terms of bits than in terms of classical biology. Prepare to be blown away!
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-31-eng-DNA_The_Code_of_Life_webm-hd.webm"
        length="585105408"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-31-eng-DNA_The_Code_of_Life_webm-hd.webm?1501976414</guid>
      <dc:identifier>07a55a43-7096-49a9-9f89-38fa00e3cd47</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>bert hubert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 31</itunes:keywords>
      <itunes:subtitle>Surprise: it is fully digital!</itunes:subtitle>
      <itunes:summary>DNA is the code of life. It encodes how we are built, how nature operates. Science learns more and more about this uniquely digital language. This talk will excite hackers &amp; anyone who knows a little bit about computing, since it turns out DNA is better explained in terms of bits than in terms of classical biology. Prepare to be blown away!
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:01:20</itunes:duration>
    </item>
    <item>
      <title>Tor de-anonymization techniques (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-102-tor_de-anonymization_techniques</link>
      <description>Tor offers great anonymity and privacy for millions of people. However, there are some Tor de-anonymization techniques that work. This presentation demonstrates de-anonymization of Tor hidden services and users.
#NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-102-eng-Tor_de-anonymization_techniques_webm-hd.webm"
        length="354418688"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-102-eng-Tor_de-anonymization_techniques_webm-hd.webm?1501976438</guid>
      <dc:identifier>2dd16bb3-657b-41b6-bdec-987ada3f285c</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Juha Nurmi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 102</itunes:keywords>
      <itunes:subtitle>How people have lost their anonymity? Let&#39;s study real-world cases and try to learn how to avoid these errors.</itunes:subtitle>
      <itunes:summary>Tor offers great anonymity and privacy for millions of people. However, there are some Tor de-anonymization techniques that work. This presentation demonstrates de-anonymization of Tor hidden services and users.
#NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:01:06</itunes:duration>
    </item>
    <item>
      <title>How to Defend Cars (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-396-how_to_defend_cars</link>
      <description>For a long time automobile manufacturers designed their cars as closed systems with no security in mind. Recently security researchers have demonstrated how vulnerable vehicles are to cyber-attacks. Once compromised the vehicle is at the mercy of the hackers: by remotely taking over control of the car, they can perform dramatic actions with severe safety-related consequences for the passengers.
This issue comes from the design of automobiles and the communication protocols they use. To function properly a vehicle makes use of different computers called “Electronic Control Units” (ECU) to perform various operations such as breaking or steering. Connected all together on the in-vehicle networks, the ECUs communicate with each other using simple protocols involving no security features, assuming the legitimacy and the trustworthiness of their peers. The lack of security mechanisms makes it difficult to guarantee the confidentiality, integrity and availability of automotive systems. Moreover the complexity of the situation increases with the rise of connected vehicles, communicating with each other (Vehicle-2-Vehicle communications, V2V) and with the infrastructure (Vehicle-2-Infrastructure communications, V2I).
#PhysicalSecurity #DeviceSecurity #NetworkSecurity #IoT
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-396-eng-How_to_Defend_Cars_webm-hd.webm"
        length="535822336"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-396-eng-How_to_Defend_Cars_webm-hd.webm?1501965054</guid>
      <dc:identifier>4313b40d-d798-49ca-b88e-cfb793199c0b</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Guillaume Dupont, Alexios Lekidis</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 396</itunes:keywords>
      <itunes:summary>For a long time automobile manufacturers designed their cars as closed systems with no security in mind. Recently security researchers have demonstrated how vulnerable vehicles are to cyber-attacks. Once compromised the vehicle is at the mercy of the hackers: by remotely taking over control of the car, they can perform dramatic actions with severe safety-related consequences for the passengers.
This issue comes from the design of automobiles and the communication protocols they use. To function properly a vehicle makes use of different computers called “Electronic Control Units” (ECU) to perform various operations such as breaking or steering. Connected all together on the in-vehicle networks, the ECUs communicate with each other using simple protocols involving no security features, assuming the legitimacy and the trustworthiness of their peers. The lack of security mechanisms makes it difficult to guarantee the confidentiality, integrity and availability of automotive systems. Moreover the complexity of the situation increases with the rise of connected vehicles, communicating with each other (Vehicle-2-Vehicle communications, V2V) and with the infrastructure (Vehicle-2-Infrastructure communications, V2I).
#PhysicalSecurity #DeviceSecurity #NetworkSecurity #IoT
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:03:13</itunes:duration>
    </item>
    <item>
      <title>Automotive microcontrollers. Safety != Security (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-168-automotive_microcontrollers_safety_security</link>
      <description>Tesla Model S, Jeep Cherokee, Mitsubishi Outlander, Nissan Leaf… The list of hacked cars grows every day and security has become a priority in the automotive industry. 
Until now, most of the security research and security development has been focusing in the higher layers of the software and in car interfaces like the WiFi, Bluetooth, USB or CAN. We, however, tried to assess security at lowest level possible: the microcontrollers in the ECUs.
#PhysicalSecurity #DeviceSecurity #IoT

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-168-eng-Automotive_microcontrollers_Safety_Security_webm-hd.webm"
        length="459276288"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-168-eng-Automotive_microcontrollers_Safety_Security_webm-hd.webm?1501963383</guid>
      <dc:identifier>87f8200b-822a-4536-ba15-443e27860d2e</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Ramiro Pareja, nils</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 168</itunes:keywords>
      <itunes:summary>Tesla Model S, Jeep Cherokee, Mitsubishi Outlander, Nissan Leaf… The list of hacked cars grows every day and security has become a priority in the automotive industry. 
Until now, most of the security research and security development has been focusing in the higher layers of the software and in car interfaces like the WiFi, Bluetooth, USB or CAN. We, however, tried to assess security at lowest level possible: the microcontrollers in the ECUs.
#PhysicalSecurity #DeviceSecurity #IoT

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:00:33</itunes:duration>
    </item>
    <item>
      <title>Mass Surveillance abusing Computational Linguistics and Human Language Technology (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-227-mass_surveillance_abusing_computational_linguistics_and_human_language_technology</link>
      <description>Even though the Snowden revelations for the first time clearly show that mass surveillance of communications is carried out on a global level, little knowledge seems to be available to the general public as well as the hacker community how these so-called COMINT operations actually work. The talk focuses on mass surveillance based on methods known from research of the interdiscplinary field of Computationanal Linguistics (or Natural Language Processing) and demonstrates how generation of selectors for mass surveilling text messages can occur.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology_webm-hd.webm"
        length="572522496"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology_webm-hd.webm?1501963422</guid>
      <dc:identifier>28840060-781a-4143-a9b3-fe19a0eaf06d</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>vecirex</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 227</itunes:keywords>
      <itunes:subtitle>Mind-sets, state-of-the-art methods and practices according to official documents including leaks</itunes:subtitle>
      <itunes:summary>Even though the Snowden revelations for the first time clearly show that mass surveillance of communications is carried out on a global level, little knowledge seems to be available to the general public as well as the hacker community how these so-called COMINT operations actually work. The talk focuses on mass surveillance based on methods known from research of the interdiscplinary field of Computationanal Linguistics (or Natural Language Processing) and demonstrates how generation of selectors for mass surveilling text messages can occur.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:59:01</itunes:duration>
    </item>
    <item>
      <title>Introducing Talla: An Erlang implementation of Tor (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-304-introducing_talla_an_erlang_implementation_of_tor</link>
      <description>A technical walk-through of a highly concurrent third-party implementation of Tor in the Erlang programming language.
#Software #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-304-eng-Introducing_Talla_An_Erlang_implementation_of_Tor_webm-hd.webm"
        length="181403648"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-304-eng-Introducing_Talla_An_Erlang_implementation_of_Tor_webm-hd.webm?1501962879</guid>
      <dc:identifier>c678a194-0d4a-42a2-b4ef-b19a83459f4c</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Alexander Færøy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 304</itunes:keywords>
      <itunes:summary>A technical walk-through of a highly concurrent third-party implementation of Tor in the Erlang programming language.
#Software #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:31:21</itunes:duration>
    </item>
    <item>
      <title>Mailpile (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-101-mailpile</link>
      <description>Four years ago, in a tent at OHM 2013, the Mailpile project and crowd-funding campaign were launched. Our goal was to create a new Free Software e-mail solution that raised the bar on usability, security and privacy. This talk will discuss what has happened since.

#Privacy #Software
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-101-eng-Mailpile_webm-hd.webm"
        length="462422016"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-101-eng-Mailpile_webm-hd.webm?1501953374</guid>
      <dc:identifier>ac03e1c8-09ea-4063-aea5-a83461ad79e6</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>BjarniRunar</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 101</itunes:keywords>
      <itunes:subtitle>4 years later</itunes:subtitle>
      <itunes:summary>Four years ago, in a tent at OHM 2013, the Mailpile project and crowd-funding campaign were launched. Our goal was to create a new Free Software e-mail solution that raised the bar on usability, security and privacy. This talk will discuss what has happened since.

#Privacy #Software
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:48:28</itunes:duration>
    </item>
    <item>
      <title>How the NSA tracks you (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-402-how_the_nsa_tracks_you</link>
      <description>Bill Binney will talk about his experiences as Technical Director at the NSA where he had a 34 yr career.

#Society #Privacy #SurveillanceState
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-402-eng-How_the_NSA_tracks_you_webm-hd.webm"
        length="1756364800"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-402-eng-How_the_NSA_tracks_you_webm-hd.webm?1501976357</guid>
      <dc:identifier>dec63dd2-d66b-419d-863d-c20fd5ce91dd</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Bill Binney</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 402</itunes:keywords>
      <itunes:subtitle>Perspective from the inside</itunes:subtitle>
      <itunes:summary>Bill Binney will talk about his experiences as Technical Director at the NSA where he had a 34 yr career.

#Society #Privacy #SurveillanceState
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:59:17</itunes:duration>
    </item>
    <item>
      <title>SHA2017 Opening (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-251-sha2017_opening</link>
      <description>Welcome to SHA2017! So much camp, everywhere!

#Community
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-251-eng-SHA2017_Opening_webm-hd.webm"
        length="457179136"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-251-eng-SHA2017_Opening_webm-hd.webm?1501953274</guid>
      <dc:identifier>ee4b6479-4cf9-47c0-b472-b5f52b912893</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Elger Jonker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 251</itunes:keywords>
      <itunes:subtitle>Heaven is imperfect by design</itunes:subtitle>
      <itunes:summary>Welcome to SHA2017! So much camp, everywhere!

#Community
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:23:14</itunes:duration>
    </item>
    <item>
      <title>Famous C&amp;C servers from inside to outside. (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-315-famous_c_c_servers_from_inside_to_outside</link>
      <description>We all are aware of the malware attacks and bot-net&#39;s behind this massive illegal industry which drains out pockets and even take our lives. This criminal organisations have own rules and own secrets that they don&#39;t want us to reveal.  They like to infect hack and control the victims without get caught by law enforcements. We all know that end-point security is not enough for the zero day malware attacks so my research was always focused on their command and control centres. We will never win the malware war if we don&#39;t reveal their dirty job from inside, having this aim i managed to revel more than 10 unique C&amp;C server dirty secrets in past years. This research articles are published in various cybersecurity magazines in Europe and Asia.
#NetworkSecurity

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-315-eng-Famous_C_C_servers_from_inside_to_outside_webm-hd.webm"
        length="625999872"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-315-eng-Famous_C_C_servers_from_inside_to_outside_webm-hd.webm?1501953334</guid>
      <dc:identifier>9ea86f2f-b236-431f-9027-8b31c0b2ad56</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Senad Aruc</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 315</itunes:keywords>
      <itunes:summary>We all are aware of the malware attacks and bot-net&#39;s behind this massive illegal industry which drains out pockets and even take our lives. This criminal organisations have own rules and own secrets that they don&#39;t want us to reveal.  They like to infect hack and control the victims without get caught by law enforcements. We all know that end-point security is not enough for the zero day malware attacks so my research was always focused on their command and control centres. We will never win the malware war if we don&#39;t reveal their dirty job from inside, having this aim i managed to revel more than 10 unique C&amp;C server dirty secrets in past years. This research articles are published in various cybersecurity magazines in Europe and Asia.
#NetworkSecurity

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:32:29</itunes:duration>
    </item>
    <item>
      <title>from glass fiber to fiber glass noodles (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-142-from_glass_fiber_to_fiber_glass_noodles</link>
      <description>Experiments in edible network infrastructures
#Experimental
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-142-eng-from_glass_fiber_to_fiber_glass_noodles_webm-hd.webm"
        length="422576128"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-142-eng-from_glass_fiber_to_fiber_glass_noodles_webm-hd.webm?1501953237</guid>
      <dc:identifier>9e7ae9a9-e1a6-432b-bee1-d37302b19c03</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>dennisdebel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 142</itunes:keywords>
      <itunes:subtitle>towards edible network infrastructures</itunes:subtitle>
      <itunes:summary>Experiments in edible network infrastructures
#Experimental
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:50:42</itunes:duration>
    </item>
    <item>
      <title>The Security and Privacy Implications of AI and Machine Learning (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-323-the_security_and_privacy_implications_of_ai_and_machine_learning</link>
      <description>What will the recent rapid progress in machine learning and AI mean for the fields of computer security and privacy? This talk gives a tour of some answers, and some unanswered questions. It will discuss new types of attacks and surveillance that are becoming possible due with modern neural networks, and some new research problems that the computer security community should be working on.

#MachineLearning #Privacy
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning_webm-hd.webm"
        length="559939584"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning_webm-hd.webm?1501953198</guid>
      <dc:identifier>33e55662-41b7-4e37-ac80-2f3a5c4b27a6</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Peter Eckersley</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 323</itunes:keywords>
      <itunes:summary>What will the recent rapid progress in machine learning and AI mean for the fields of computer security and privacy? This talk gives a tour of some answers, and some unanswered questions. It will discuss new types of attacks and surveillance that are becoming possible due with modern neural networks, and some new research problems that the computer security community should be working on.

#MachineLearning #Privacy
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:04:56</itunes:duration>
    </item>
    <item>
      <title>Moving towards fully encrypted web (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-62-moving_towards_fully_encrypted_web</link>
      <description>In this talk I&#39;m going to go through the problems people are facing in moving from HTTP to HTTPS, why it&#39;s sometimes not seen as worthy of the time investment. Which things are broken in web TLS at the moment, but moreover how we actually already have the tools addressing most of the problems and how to use them effectively. I&#39;ll also cover the plumbing behind the transactions, the protocols used and different possibilities to automate it all...
#Privacy #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-62-eng-Moving_towards_fully_encrypted_web_webm-hd.webm"
        length="421527552"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-62-eng-Moving_towards_fully_encrypted_web_webm-hd.webm?1501953089</guid>
      <dc:identifier>e914d37b-16a4-4529-890d-654a4b22b054</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>joohoi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 62</itunes:keywords>
      <itunes:subtitle>Checkpoint on the road towards inevitable</itunes:subtitle>
      <itunes:summary>In this talk I&#39;m going to go through the problems people are facing in moving from HTTP to HTTPS, why it&#39;s sometimes not seen as worthy of the time investment. Which things are broken in web TLS at the moment, but moreover how we actually already have the tools addressing most of the problems and how to use them effectively. I&#39;ll also cover the plumbing behind the transactions, the protocols used and different possibilities to automate it all...
#Privacy #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:53:10</itunes:duration>
    </item>
    <item>
      <title>OpenINTEL: digging in the DNS with an industrial size digger (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-130-openintel_digging_in_the_dns_with_an_industrial_size_digger</link>
      <description>Since early 2015, the University of Twente, SURFnet and SIDN collaborate in the OpenINTEL project. The goal of this project is to perform long-term, large-scale active measurements of the global DNS namespace. Our current coverage is around 60% of the global DNS and included .com, .net, .org, .nl (and other ccTLDs) and most new gTLDs. This talk will explain how we measure at this scale, collecting some 2.2 billion data points per day, and what we can learn about the evolution of the Internet from this data. Examples include adoption of cloud e-mail services and mail security measures, domains crafted for performing DDoS attacks, domains crafted for spam, and many others.
#NetworkSecurity 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-130-eng-OpenINTEL_digging_in_the_DNS_with_an_industrial_size_digger_webm-hd.webm"
        length="363855872"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-130-eng-OpenINTEL_digging_in_the_DNS_with_an_industrial_size_digger_webm-hd.webm?1501953118</guid>
      <dc:identifier>f471ff12-1889-41c8-b65e-787b87c460db</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Roland van Rijswijk-Deij</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 130</itunes:keywords>
      <itunes:subtitle>I measured 60% of the DNS, and I found this</itunes:subtitle>
      <itunes:summary>Since early 2015, the University of Twente, SURFnet and SIDN collaborate in the OpenINTEL project. The goal of this project is to perform long-term, large-scale active measurements of the global DNS namespace. Our current coverage is around 60% of the global DNS and included .com, .net, .org, .nl (and other ccTLDs) and most new gTLDs. This talk will explain how we measure at this scale, collecting some 2.2 billion data points per day, and what we can learn about the evolution of the Internet from this data. Examples include adoption of cloud e-mail services and mail security measures, domains crafted for performing DDoS attacks, domains crafted for spam, and many others.
#NetworkSecurity 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:58:48</itunes:duration>
    </item>
    <item>
      <title>Privacy Design Strategies (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-335-privacy_design_strategies</link>
      <description>Privacy laws are complex and vague. They offer little concrete guidelines for engineers. Privacy design strategies address this issue. They translate vague legal norms into concrete design goals. These can be used to start the conversation on how to design your system in a privacy friendly way from the very start. The outcome is a system that addresses privacy well, but may not be perfect. But that is good enough!

#Privacy
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-335-eng-Privacy_Design_Strategies_webm-hd.webm"
        length="506462208"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-335-eng-Privacy_Design_Strategies_webm-hd.webm?1501941659</guid>
      <dc:identifier>7ab308d4-9655-483e-95b0-710daa377a1a</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Jaap-Henk Hoepman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 335</itunes:keywords>
      <itunes:subtitle>Doing well is good enough</itunes:subtitle>
      <itunes:summary>Privacy laws are complex and vague. They offer little concrete guidelines for engineers. Privacy design strategies address this issue. They translate vague legal norms into concrete design goals. These can be used to start the conversation on how to design your system in a privacy friendly way from the very start. The outcome is a system that addresses privacy well, but may not be perfect. But that is good enough!

#Privacy
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:52:54</itunes:duration>
    </item>
    <item>
      <title>LDraw: computer-aided design for serious LEGO fans (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-306-ldraw_computer-aided_design_for_serious_lego_fans</link>
      <description>LDraw™ is an open standard for LEGO CAD programs that allow the user to create virtual LEGO models and scenes. You can use it to document models you have physically built, create building instructions just like LEGO, render 3D photo realistic images of your virtual models and even make animations. The possibilities are endless. Unlike real LEGO bricks where you are limited by the number of parts and colors, in LDraw nothing is impossible.
-- http://ldraw.org/
#Software #Kids #Making
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-306-eng-LDraw_computer-aided_design_for_serious_LEGO_fans_webm-hd.webm"
        length="575668224"
        type="video/webm"/>
      <pubDate>Sat, 05 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-306-eng-LDraw_computer-aided_design_for_serious_LEGO_fans_webm-hd.webm?1501953057</guid>
      <dc:identifier>1f60751a-81fd-4a10-aeb6-bbecf6f0b49f</dc:identifier>
      <dc:date>2017-08-05T00:00:00+02:00</dc:date>
      <itunes:author>Jean-Philippe Ouellet</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 306</itunes:keywords>
      <itunes:summary>LDraw™ is an open standard for LEGO CAD programs that allow the user to create virtual LEGO models and scenes. You can use it to document models you have physically built, create building instructions just like LEGO, render 3D photo realistic images of your virtual models and even make animations. The possibilities are endless. Unlike real LEGO bricks where you are limited by the number of parts and colors, in LDraw nothing is impossible.
-- http://ldraw.org/
#Software #Kids #Making
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:59:50</itunes:duration>
    </item>
    <item>
      <title>Building Humanitarian hackers in your communities - How to (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-308-building_humanitarian_hackers_in_your_communities_-_how_to</link>
      <description>This talk will share lessons from the random hacks of kindness community on how best to involve technologists to create solutions  humanitarian and civic issues in a community.
#Community #Society

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-308-eng-Building_Humanitarian_hackers_in_your_communities_-_How_to_webm-hd.webm"
        length="783286272"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-308-eng-Building_Humanitarian_hackers_in_your_communities_-_How_to_webm-hd.webm?1501929951</guid>
      <dc:identifier>64df64c2-5702-4892-8316-4f5ec87aad56</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>chinmayisk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 308</itunes:keywords>
      <itunes:summary>This talk will share lessons from the random hacks of kindness community on how best to involve technologists to create solutions  humanitarian and civic issues in a community.
#Community #Society

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:38:57</itunes:duration>
    </item>
    <item>
      <title>A trip to India (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-233-a_trip_to_india</link>
      <description>We will take you behind the scenes of a call center that placed over 5 million calls to Dutch phone numbers and employed around 60 people. We will show how these call centers operate and how they convince their victims to pay for their ‘services’. You will see the social engineering techniques that are used by the scammers. We will also show that we could easily obtain the list of 5 million potential victims from the call center and how we eventually were able to track down the owner of the call center.

#Society #ContentWarning
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-233-eng-A_trip_to_India_webm-hd.webm"
        length="806354944"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-233-eng-A_trip_to_India_webm-hd.webm?1501929760</guid>
      <dc:identifier>2764cdfd-49ab-4463-a809-198dec7abdf6</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Bart Roos</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 233</itunes:keywords>
      <itunes:subtitle>Hunting down a criminal call center</itunes:subtitle>
      <itunes:summary>We will take you behind the scenes of a call center that placed over 5 million calls to Dutch phone numbers and employed around 60 people. We will show how these call centers operate and how they convince their victims to pay for their ‘services’. You will see the social engineering techniques that are used by the scammers. We will also show that we could easily obtain the list of 5 million potential victims from the call center and how we eventually were able to track down the owner of the call center.

#Society #ContentWarning
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>01:02:20</itunes:duration>
    </item>
    <item>
      <title>Invitation to help build Quantum Internet (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-361-invitation_to_help_build_quantum_internet</link>
      <description>The goal of Quantum Internet project at TU Delft is to build an optically-connected network of many (small) quantum computers. Such a network enables the exchange of quantum bits between any of the connected quantum processors in order to solve problems that are intractable classically. #science #networksecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-361-eng-Invitation_to_help_build_Quantum_Internet_webm-hd.webm"
        length="1022361600"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-361-eng-Invitation_to_help_build_Quantum_Internet_webm-hd.webm?1501929142</guid>
      <dc:identifier>6a40f977-5db3-4051-8257-3c30e84816a4</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Stephanie Wehner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 361</itunes:keywords>
      <itunes:summary>The goal of Quantum Internet project at TU Delft is to build an optically-connected network of many (small) quantum computers. Such a network enables the exchange of quantum bits between any of the connected quantum processors in order to solve problems that are intractable classically. #science #networksecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:58:59</itunes:duration>
    </item>
    <item>
      <title>Life is too short for playing classic sports... (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-54-life_is_too_short_for_playing_classic_sports</link>
      <description>In this presentation, I&#39;ll try to convince the audience how the CTF challenges can be extremely fun and very enlightening. A powerful weapon against the discouragement in the area.
#NetworkSecurity #Gaming
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-54-eng-Life_is_too_short_for_playing_classic_sports_webm-hd.webm"
        length="313524224"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-54-eng-Life_is_too_short_for_playing_classic_sports_webm-hd.webm?1501929777</guid>
      <dc:identifier>991ca003-fcd1-4e28-acc3-50c82ae1d846</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Bruno Oliveira</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 54</itunes:keywords>
      <itunes:summary>In this presentation, I&#39;ll try to convince the audience how the CTF challenges can be extremely fun and very enlightening. A powerful weapon against the discouragement in the area.
#NetworkSecurity #Gaming
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:58:50</itunes:duration>
    </item>
    <item>
      <title>TBM: Trusted boot module (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-280-tbm_trusted_boot_module</link>
      <description>The Trusted Boot Module is an open hardware module that enables all kind of devices (routers, embedded boards, laptops, desktops) to boot to a trusted state by loading only trusted code - while keeping the owner of the hardware in control.
#PhysicalSecurity #DeviceSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-280-eng-TBM_Trusted_boot_module_webm-hd.webm"
        length="564133888"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-280-eng-TBM_Trusted_boot_module_webm-hd.webm?1501929686</guid>
      <dc:identifier>80884192-2031-4559-b1f2-e2f2f7dbe9cb</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Guido van &#39;t Noordende, Merlijn B.W. Wajer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 280</itunes:keywords>
      <itunes:subtitle>NLNet sponsored (open hardware) trusted boot module</itunes:subtitle>
      <itunes:summary>The Trusted Boot Module is an open hardware module that enables all kind of devices (routers, embedded boards, laptops, desktops) to boot to a trusted state by loading only trusted code - while keeping the owner of the hardware in control.
#PhysicalSecurity #DeviceSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:53:00</itunes:duration>
    </item>
    <item>
      <title>Update the updates (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-100-update_the_updates</link>
      <description>Much of today&#39;s technology is said to be disruptive. In most cases, this means that technology can turn around the winners and losers of an entire branch. But recent digital attacks have shown that technology can also disrupt our entire society rather easily. There are many reason for that, one of them being issues surrounding the deployment of patches. Installing the patches that eliminates vulnerabilities seems to be something that has the lowest priority. That has to change. We need to update the way we deal with updates. In this talk I’ll address some of updates we need to apply to the process of updating.

#DeviceSecurity #NetworkSecurity #IoT
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-100-eng-Update_the_updates_webm-hd.webm"
        length="492830720"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-100-eng-Update_the_updates_webm-hd.webm?1501929317</guid>
      <dc:identifier>996095a3-d8e6-4b28-af88-8516048a8acc</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Rejo Zenger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 100</itunes:keywords>
      <itunes:summary>Much of today&#39;s technology is said to be disruptive. In most cases, this means that technology can turn around the winners and losers of an entire branch. But recent digital attacks have shown that technology can also disrupt our entire society rather easily. There are many reason for that, one of them being issues surrounding the deployment of patches. Installing the patches that eliminates vulnerabilities seems to be something that has the lowest priority. That has to change. We need to update the way we deal with updates. In this talk I’ll address some of updates we need to apply to the process of updating.

#DeviceSecurity #NetworkSecurity #IoT
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:41:31</itunes:duration>
    </item>
    <item>
      <title>Failure modes of digital radios (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-35-failure_modes_of_digital_radios</link>
      <description>All consumer electronics have integrated digital radios. Many with standardized specifications like WiFi, 3G/4G modems, but closed source radio base-bands with a mix of dedicated, power-efficient hardware-and software. Proprietary extensions can be implemented, patented and used to prevent others from gaining market share. Some examples will be presented. 
#Sharing #NetworkSecurity
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-35-eng-Failure_modes_of_digital_radios_webm-hd.webm"
        length="173015040"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-35-eng-Failure_modes_of_digital_radios_webm-hd.webm?1501924321</guid>
      <dc:identifier>510789b5-ce0c-427f-9ead-8c7d7ad44b51</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Mark-Jan Bastian</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 35</itunes:keywords>
      <itunes:subtitle>World radio spectrum domination through silicon control</itunes:subtitle>
      <itunes:summary>All consumer electronics have integrated digital radios. Many with standardized specifications like WiFi, 3G/4G modems, but closed source radio base-bands with a mix of dedicated, power-efficient hardware-and software. Proprietary extensions can be implemented, patented and used to prevent others from gaining market share. Some examples will be presented. 
#Sharing #NetworkSecurity
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:23:57</itunes:duration>
    </item>
    <item>
      <title>Ethics and the Events of 9-11 (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-403-ethics_and_the_events_of_9-11</link>
      <description>Kirk Wiebe will talk about his experiences during his 32 year NSA career, specifically about effective intelligence gathering, the failure of mass-surveillance and how to fix it.

#Society #SurveillanceState #Politics
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-403-eng-Ethics_and_the_Events_of_9-11_webm-hd.webm"
        length="806354944"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-403-eng-Ethics_and_the_Events_of_9-11_webm-hd.webm?1501929184</guid>
      <dc:identifier>a59ac068-c147-44a6-8d55-ae35448727b8</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Kirk Wiebe</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 403</itunes:keywords>
      <itunes:summary>Kirk Wiebe will talk about his experiences during his 32 year NSA career, specifically about effective intelligence gathering, the failure of mass-surveillance and how to fix it.

#Society #SurveillanceState #Politics
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:42:33</itunes:duration>
    </item>
    <item>
      <title>Copyfighters (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-210-copyfighters</link>
      <description>Copyright is failing young people and their usage of the internet everyday, but a positive change will not come on its own. We present the outcomes of our copyright campaign so far, discuss how to move forward and engage with young participants of SHA2017.
#Copyright

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-210-eng-Copyfighters_webm-hd.webm"
        length="567279616"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-210-eng-Copyfighters_webm-hd.webm?1501929214</guid>
      <dc:identifier>a275f5ea-9026-48ce-be0f-41e63abf4104</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Bernhard &#39;nini&#39; Hayden</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 210</itunes:keywords>
      <itunes:subtitle>How can we make sure that young people&#39;s voices are heard in the copyright debate</itunes:subtitle>
      <itunes:summary>Copyright is failing young people and their usage of the internet everyday, but a positive change will not come on its own. We present the outcomes of our copyright campaign so far, discuss how to move forward and engage with young participants of SHA2017.
#Copyright

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:33:07</itunes:duration>
    </item>
    <item>
      <title>Mathematics and Video Games (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-319-mathematics_and_video_games</link>
      <description>In this talk, I will talk about some interesting applications of maths to video games, including how the find the shortest possible route to complete Pac-Man and the 3- and 4-dimensional shapes that 2D video game characters spend their time on.

#Gaming #Science
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-319-eng-Mathematics_and_Video_Games_webm-hd.webm"
        length="348127232"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-319-eng-Mathematics_and_Video_Games_webm-hd.webm?1501925431</guid>
      <dc:identifier>bfaf0024-a741-4015-85df-49663c462cf8</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>Matthew Scroggs</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 319</itunes:keywords>
      <itunes:summary>In this talk, I will talk about some interesting applications of maths to video games, including how the find the shortest possible route to complete Pac-Man and the 3- and 4-dimensional shapes that 2D video game characters spend their time on.

#Gaming #Science
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:36:41</itunes:duration>
    </item>
    <item>
      <title>Software Patents v3.0: the Unitary Patent Court (SHA2017)</title>
      <link>https://media.ccc.de/v/SHA2017-334-software_patents_v3_0_the_unitary_patent_court</link>
      <description>In July 2005, after several failed attempts to legalise software patents in Europe, the patent establishment changed its strategy. Instead of explicitly seeking to sanction the patentability of software, they are now seeking to create a central European patent court, which would establish and enforce patentability rules in their favor, without any possibility of correction by competing courts or democratically elected legislators.
#Copyright #Patents
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-334-eng-Software_Patents_v30_the_Unitary_Patent_Court_webm-hd.webm"
        length="450887680"
        type="video/webm"/>
      <pubDate>Fri, 04 Aug 2017 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-334-eng-Software_Patents_v30_the_Unitary_Patent_Court_webm-hd.webm?1501925374</guid>
      <dc:identifier>c4980da2-60ad-459f-a375-3db135641d9f</dc:identifier>
      <dc:date>2017-08-04T00:00:00+02:00</dc:date>
      <itunes:author>zoobab</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>SHA2017, 334</itunes:keywords>
      <itunes:subtitle>Have we silently lost the battle against software patents in Europe?</itunes:subtitle>
      <itunes:summary>In July 2005, after several failed attempts to legalise software patents in Europe, the patent establishment changed its strategy. Instead of explicitly seeking to sanction the patentability of software, they are now seeking to create a central European patent court, which would establish and enforce patentability rules in their favor, without any possibility of correction by competing courts or democratically elected legislators.
#Copyright #Patents
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:41:27</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/events/SHA2017/logo.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from SHA2017 as webm</itunes:summary>
  </channel>
</rss>