<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - MRMCD 101b (high quality mp4)</title>
    <link>https://media.ccc.de/c/mrmcd101b</link>
    <description> This feed contains all events from mrmcd101b as mp4</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:41:40 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/conferences/mrmcd/mrmcd101b/folder-mrmcd-2006.png</url>
      <title>Chaos Computer Club - MRMCD 101b (high quality mp4)</title>
      <link>https://media.ccc.de/c/mrmcd101b</link>
    </image>
    <item>
      <title>3 ... 2 ... 1 .... meins (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_3_____2_____1_____meins</link>
      <description>
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1468.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - 3 ... 2 ... 1 ... meins.mp4"
        length="41943040"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - 3 ... 2 ... 1 ... meins.mp4?1609613947</guid>
      <dc:identifier>import-b17c23649737fcc712</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>Lexi Pimendis</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:subtitle>Hacken fuer Jedermann</itunes:subtitle>
      <itunes:summary>
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1468.en.html
</itunes:summary>
      <itunes:duration>00:28:43</itunes:duration>
    </item>
    <item>
      <title>X.25 (in)security in 2006: having phun with it (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_X_25_(in)security_in_2006:_having_phun_with_it</link>
      <description>The presentation will focus on X.25 security issues, positioned in nowadays’ contest and problems. The main intention is to bring personal and professional know-hows, backgrounds and X.25 penetration testing experiences to the auditorium, with real-life case studies. You will discover how an airplane flying over the Atlantic Ocean uses X.25 packet switching to communicate with the outside world, as well as why many government institutions around the world still uses the reliable frame-relay X.25 networks.
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1364.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - X.25 (in)security in 2006: having phun with it.mp4"
        length="180355072"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - X.25 (in)security in 2006: having phun with it.mp4?1609614712</guid>
      <dc:identifier>import-c1895fa3f2553ad9fe</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>Raoul Chiesa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:subtitle>Actual present, next future &amp; field experiences analysis of an underestimated (and still actual) security issue.</itunes:subtitle>
      <itunes:summary>The presentation will focus on X.25 security issues, positioned in nowadays’ contest and problems. The main intention is to bring personal and professional know-hows, backgrounds and X.25 penetration testing experiences to the auditorium, with real-life case studies. You will discover how an airplane flying over the Atlantic Ocean uses X.25 packet switching to communicate with the outside world, as well as why many government institutions around the world still uses the reliable frame-relay X.25 networks.
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1364.en.html
</itunes:summary>
      <itunes:duration>01:51:48</itunes:duration>
    </item>
    <item>
      <title>hackers int (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_Hackers_Int</link>
      <description>Der Blick über den Tellerrand - Hacker außerhalb von Deutschland.

about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1408.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Hackers Int.mp4"
        length="148897792"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Hackers Int.mp4?1609614217</guid>
      <dc:identifier>import-08a6d7fa4984bc8a7f</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>mc.fly, Jens Ohlig, b9punk, Raoul Chiesa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:subtitle>der blick ueber den tellerrand - hacker auserhalb von deutschland</itunes:subtitle>
      <itunes:summary>Der Blick über den Tellerrand - Hacker außerhalb von Deutschland.

about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1408.en.html
</itunes:summary>
      <itunes:duration>01:39:10</itunes:duration>
    </item>
    <item>
      <title>Sicherheit und Angreifbarkeit heutiger Applikationen (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_Sicherheit_und_Angreifbarkeit_heutiger_Applikationen</link>
      <description>
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1465.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Sicherheit und Angreifbarkeit heutiger Applikationen.mp4"
        length="79691776"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Sicherheit und Angreifbarkeit heutiger Applikationen.mp4?1609614372</guid>
      <dc:identifier>import-7f543007ea360a56e4</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>FX of Phenoelit</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:summary>
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1465.en.html
</itunes:summary>
      <itunes:duration>00:51:21</itunes:duration>
    </item>
    <item>
      <title>Comparison of WAN IGP protocols (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_Comparison_of_WAN_IGP_protocols</link>
      <description>Most companies with large WANs use either RSTP+flooding/learning or OSPFv2·
for two purposes: to route around network link failures, and to
automatically find the correct path to a destination address on a
large network with many hops.  Including RSTP in the comparison is a
realistic acknowledgement of the way L2 switching is abused these·
days.  Including OSI in the comparison should reveal some habitually
irritating aspects of switched IP networks that are mere accidents of
history, and others that are more fundamental.

I&#39;ll provide background about how Ethernet switching works, what is an
IGP, and what the now mostly-abandoned supposed-future OSI world feels
like.

IGP&#39;s are not just for fault-resilience.  They also function as a network
management protocol: like SNMP, it&#39;s impractical to deal with a very
large network without using an IGP.

The talk will not discuss EGP&#39;s, exterior gateway protocols like BGP.
All these IGP&#39;s are used within one administrative domain.  They are
never used between one ISP and another, nor between a customer and his
ISP.

I say ``loosely about&#39;&#39; because I&#39;ll be introducing three protocols,
only one of which is an IGP in common use on today&#39;s Internet:

 * RSTP + flooding/learning.  L2 switches use a combination of RSTP
   and the flooding/learning system to route Ethernet frames.  They
   can route traffic around a failed link, and they can direct traffic
   toward a wireless user that&#39;s roaming among access points.

 * OSPF.  This is the standard routing protocol for IPv4.  There are
   other important/popular ones like &#39;Integrated IS-IS&#39; and &#39;EIGRP&#39;,
   but OSPF is the best example and probably the most popular.  ISP&#39;s
   and big companies use this protocol to route around the failure of
   WAN links within their own networks, and to manage their large
   networks.

 * IS-IS.  This is _the_ routing protocol for the ISO/OSI CLNP
   (ConnectionLess Network Protocol).  OSI networking was designed
   many years ago through expensive necktie conferences in mountain·
   resort towns, and proposed as the replacement for
   IP on the future Internet.  It included CLNP which was analagous to
   IP.  No one fell for it.  At least, no one uses it at the edge,
   although it&#39;s still used ubiquitously, I&#39;m not sure how exactly, on
   most Sonet/SDH rings.  More importantly, almost everything
   complicated and difficult at the core of the modern Internet right
   now is a simplified/adapted version of some earlier OSI Master
   Vision which you can find referenced in the bibliography of the
   relevant IETF RFC.  The difficult algorithmic and conceptual pieces·
   in BGP, OSPF, LDAP, and many other things, are borrowed from OSI·
   standards.

I want to teach people about these three protocols for two reasons.··
First, what&#39;s similar and what&#39;s different about
the three types of routing?  How, and with what limitations, do small
and large networks route around failures?  Second, which limitations
are abstract, essential problems of network routing, and which are
quirks of a particular implementation that has become overwhelmingly
dominant, like IP or L2 switching.

I think most people don&#39;t really understand how L2 switches
work---they just think ``they&#39;re like hubs, only better.&#39;&#39;  Switches
unfortunately fall a bit short of that ideal lego-networking model.··
Now that such a bastard hack has attained such prominence in large·
networks, I think we should have a second look at switches with the·
aim of borrowing ideas from them, like how most of the modern Internet&#39;s·
new ideas are borrowed from OSI.

Also, we&#39;ve become accustomed to IPv4 networks where there is a strict·
rule: if you move to a different part of the L3 network, you have to·
change your end system&#39;s IP address to match the new subnet.  OSI CLNP·
does not work that way.  I think this will surprise and interest many·
people, as it did me.

I think the talk will broaden people&#39;s minds by introducing three
standards central to our Internet heritage of which most people have
vaguely heard, but have no idea how they work or even exactly what
they are.  Optimistically it&#39;ll help them think about new
possibilities for how to design large networks and protocols, and will
help them do it in a more historically grounded way than the usual
creativity-heavy bikeshed moment of ``I&#39;ve just invented this great·
idea for a new kind of peer-to-peer filesharing network!  see, it&#39;s·
shaped like a tetrahedron, and when one node `drops out&#39;, then·
there&#39;s the `discovery phase,&#39; to replace it, and...&#39;&#39;
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1400.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Comparison of WAN IGP protocols.mp4"
        length="154140672"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Comparison of WAN IGP protocols.mp4?1609614067</guid>
      <dc:identifier>import-3936e1a286f3d9ffb2</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>Miles Nordin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:subtitle>RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and IS-IS for CLNP</itunes:subtitle>
      <itunes:summary>Most companies with large WANs use either RSTP+flooding/learning or OSPFv2·
for two purposes: to route around network link failures, and to
automatically find the correct path to a destination address on a
large network with many hops.  Including RSTP in the comparison is a
realistic acknowledgement of the way L2 switching is abused these·
days.  Including OSI in the comparison should reveal some habitually
irritating aspects of switched IP networks that are mere accidents of
history, and others that are more fundamental.

I&#39;ll provide background about how Ethernet switching works, what is an
IGP, and what the now mostly-abandoned supposed-future OSI world feels
like.

IGP&#39;s are not just for fault-resilience.  They also function as a network
management protocol: like SNMP, it&#39;s impractical to deal with a very
large network without using an IGP.

The talk will not discuss EGP&#39;s, exterior gateway protocols like BGP.
All these IGP&#39;s are used within one administrative domain.  They are
never used between one ISP and another, nor between a customer and his
ISP.

I say ``loosely about&#39;&#39; because I&#39;ll be introducing three protocols,
only one of which is an IGP in common use on today&#39;s Internet:

 * RSTP + flooding/learning.  L2 switches use a combination of RSTP
   and the flooding/learning system to route Ethernet frames.  They
   can route traffic around a failed link, and they can direct traffic
   toward a wireless user that&#39;s roaming among access points.

 * OSPF.  This is the standard routing protocol for IPv4.  There are
   other important/popular ones like &#39;Integrated IS-IS&#39; and &#39;EIGRP&#39;,
   but OSPF is the best example and probably the most popular.  ISP&#39;s
   and big companies use this protocol to route around the failure of
   WAN links within their own networks, and to manage their large
   networks.

 * IS-IS.  This is _the_ routing protocol for the ISO/OSI CLNP
   (ConnectionLess Network Protocol).  OSI networking was designed
   many years ago through expensive necktie conferences in mountain·
   resort towns, and proposed as the replacement for
   IP on the future Internet.  It included CLNP which was analagous to
   IP.  No one fell for it.  At least, no one uses it at the edge,
   although it&#39;s still used ubiquitously, I&#39;m not sure how exactly, on
   most Sonet/SDH rings.  More importantly, almost everything
   complicated and difficult at the core of the modern Internet right
   now is a simplified/adapted version of some earlier OSI Master
   Vision which you can find referenced in the bibliography of the
   relevant IETF RFC.  The difficult algorithmic and conceptual pieces·
   in BGP, OSPF, LDAP, and many other things, are borrowed from OSI·
   standards.

I want to teach people about these three protocols for two reasons.··
First, what&#39;s similar and what&#39;s different about
the three types of routing?  How, and with what limitations, do small
and large networks route around failures?  Second, which limitations
are abstract, essential problems of network routing, and which are
quirks of a particular implementation that has become overwhelmingly
dominant, like IP or L2 switching.

I think most people don&#39;t really understand how L2 switches
work---they just think ``they&#39;re like hubs, only better.&#39;&#39;  Switches
unfortunately fall a bit short of that ideal lego-networking model.··
Now that such a bastard hack has attained such prominence in large·
networks, I think we should have a second look at switches with the·
aim of borrowing ideas from them, like how most of the modern Internet&#39;s·
new ideas are borrowed from OSI.

Also, we&#39;ve become accustomed to IPv4 networks where there is a strict·
rule: if you move to a different part of the L3 network, you have to·
change your end system&#39;s IP address to match the new subnet.  OSI CLNP·
does not work that way.  I think this will surprise and interest many·
people, as it did me.

I think the talk will broaden people&#39;s minds by introducing three
standards central to our Internet heritage of which most people have
vaguely heard, but have no idea how they work or even exactly what
they are.  Optimistically it&#39;ll help them think about new
possibilities for how to design large networks and protocols, and will
help them do it in a more historically grounded way than the usual
creativity-heavy bikeshed moment of ``I&#39;ve just invented this great·
idea for a new kind of peer-to-peer filesharing network!  see, it&#39;s·
shaped like a tetrahedron, and when one node `drops out&#39;, then·
there&#39;s the `discovery phase,&#39; to replace it, and...&#39;&#39;
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1400.en.html
</itunes:summary>
      <itunes:duration>01:43:53</itunes:duration>
    </item>
    <item>
      <title>The Hash Disaster (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_The_Hash_Disaster</link>
      <description>A lot of actual results show that all widely used hash functions (MD4,MD5,SHA,SHA-1) are broken in a cryptographic sense.

Even worse because of some internal design properties even practical attacks against MD*-based hash functions security systems could be shown. In this talk we discuss the cryptographic status and some first-aid workarounds. We also show the impossibility to establish a &quot;Trusted&quot; infrastructure based on a untrustable cryptographic function.
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1490.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - The Hash Disaster.mp4"
        length="99614720"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - The Hash Disaster.mp4?1609614453</guid>
      <dc:identifier>import-0d8239451007504f65</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>Rüdiger Weis</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:subtitle>Recent Results on Cryptanalysis and their Implications on System Security</itunes:subtitle>
      <itunes:summary>A lot of actual results show that all widely used hash functions (MD4,MD5,SHA,SHA-1) are broken in a cryptographic sense.

Even worse because of some internal design properties even practical attacks against MD*-based hash functions security systems could be shown. In this talk we discuss the cryptographic status and some first-aid workarounds. We also show the impossibility to establish a &quot;Trusted&quot; infrastructure based on a untrustable cryptographic function.
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1490.en.html
</itunes:summary>
      <itunes:duration>01:00:38</itunes:duration>
    </item>
    <item>
      <title>Geek Mafia (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_Geek_Mafia</link>
      <description>
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1407.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Geek Mafia.mp4"
        length="60817408"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Geek Mafia.mp4?1609614169</guid>
      <dc:identifier>import-288c74343fbab81c89</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>Rick Dakan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:subtitle>Rick Dakan liest aus seinem Buch Geek Mafia</itunes:subtitle>
      <itunes:summary>
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1407.en.html
</itunes:summary>
      <itunes:duration>00:35:35</itunes:duration>
    </item>
    <item>
      <title>Hacktivismus und die Möglichkeiten politischer Einflussnahme (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_Hacktivismus_und_die_Moeglichkeiten_politischer_Einflussnahme</link>
      <description>

about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1399.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Hacktivismus und die Moeglichkeiten politischer Einflussnahme.mp4"
        length="83886080"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Hacktivismus und die Moeglichkeiten politischer Einflussnahme.mp4?1609614301</guid>
      <dc:identifier>import-ea934ea3b0194459a1</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>fukami</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:summary>

about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1399.en.html
</itunes:summary>
      <itunes:duration>00:58:49</itunes:duration>
    </item>
    <item>
      <title>Nintendo DS (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_Nintendo_DS</link>
      <description>Nintendo DS vorstellen, Flashen, Hacken.  Bringt euren NDS mit!
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1467.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Nintendo DS.mp4"
        length="61865984"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Nintendo DS.mp4?1609613589</guid>
      <dc:identifier>import-2772630a4ef636c476</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>Marcel Klein, Mario Manno</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:subtitle>Fakten und Anderes</itunes:subtitle>
      <itunes:summary>Nintendo DS vorstellen, Flashen, Hacken.  Bringt euren NDS mit!
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1467.en.html
</itunes:summary>
      <itunes:duration>00:42:44</itunes:duration>
    </item>
    <item>
      <title>Eröffnungsveranstaltung (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_Eroeffnungsveranstaltung</link>
      <description>Eroeffnungsveranstaltung der mrmcd101b.

about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1263.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Eroeffnungsveranstaltung.mp4"
        length="35651584"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Eroeffnungsveranstaltung.mp4?1609614104</guid>
      <dc:identifier>import-6f6b1744f703730b42</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>mc.fly, Flex, Julian &#39;codemonk&#39;</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:subtitle>Willkommen zu den metarheinmain chaosdays</itunes:subtitle>
      <itunes:summary>Eroeffnungsveranstaltung der mrmcd101b.

about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1263.en.html
</itunes:summary>
      <itunes:duration>00:21:40</itunes:duration>
    </item>
    <item>
      <title>Abschlussveranstaltung (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_Abschlussveranstaltung</link>
      <description>
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1264.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Abschlussveranstaltung.mp4"
        length="26214400"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Abschlussveranstaltung.mp4?1609614017</guid>
      <dc:identifier>import-996cfd6dac2af3492c</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>mc.fly, Flex</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:subtitle>Wie war&#39;s, was ist passiert...</itunes:subtitle>
      <itunes:summary>
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1264.en.html
</itunes:summary>
      <itunes:duration>00:15:08</itunes:duration>
    </item>
    <item>
      <title>Hacking fingerprint recognition systems (mrmcd101b)</title>
      <link>https://media.ccc.de/v/mrmcd101b_-_Hacking_fingerprint_recognition_systems</link>
      <description>Today biometric systems are becoming mainstream. They can be·
found everywhere. In mobile phones, computers, entrance systems even in ATMs.
Because of the low costs, small sizes and the alleged maturity mostly
fingerprint sensors are used. But contrary to the assurance of the
manufacturers they are still very easy to hack with techniques invented
three years ago (see
http://www.ccc.de/biometrie/fingerabdruck_kopieren?language=en).
The capacitive sensors built into the new generation of Thinkpad
computer from IBM / Lenovo were one of the first implementing countermeasures·
against this type of dummies. But counter measures only lead to new types of·
dummies!·
Using this fingerprint system as an Example I want to explain the different
techniques of hacking biometric systems, from the attack on the
communication and the stored reference data to the direct hack of the sensor·
itself. The talk will present tools and ways to extract communication data to
enhance dummy materials and a step by step approach to the final dummy finger·
that will defeat the sensor.
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1471.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Hacking fingerprint recognition systems.mp4"
        length="74448896"
        type="video/mp4"/>
      <pubDate>Mon, 01 Jan 2007 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Hacking fingerprint recognition systems.mp4?1609614257</guid>
      <dc:identifier>import-16b81408b8ec72018e</dc:identifier>
      <dc:date>2007-01-01T01:00:00+01:00</dc:date>
      <itunes:author>starbug</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>mrmcd</itunes:keywords>
      <itunes:summary>Today biometric systems are becoming mainstream. They can be·
found everywhere. In mobile phones, computers, entrance systems even in ATMs.
Because of the low costs, small sizes and the alleged maturity mostly
fingerprint sensors are used. But contrary to the assurance of the
manufacturers they are still very easy to hack with techniques invented
three years ago (see
http://www.ccc.de/biometrie/fingerabdruck_kopieren?language=en).
The capacitive sensors built into the new generation of Thinkpad
computer from IBM / Lenovo were one of the first implementing countermeasures·
against this type of dummies. But counter measures only lead to new types of·
dummies!·
Using this fingerprint system as an Example I want to explain the different
techniques of hacking biometric systems, from the attack on the
communication and the stored reference data to the direct hack of the sensor·
itself. The talk will present tools and ways to extract communication data to
enhance dummy materials and a step by step approach to the final dummy finger·
that will defeat the sensor.
about this event: https://mrmcd101b.metarheinmain.de/fahrplan/events/1471.en.html
</itunes:summary>
      <itunes:duration>00:55:05</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/conferences/mrmcd/mrmcd101b/folder-mrmcd-2006.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from mrmcd101b as mp4</itunes:summary>
  </channel>
</rss>