• 4
    watchers
  • 455
    plays
  • 2.4k
    collected
  • 2013-12-27T00:00:00Z
  • 1h
  • 5d 19h (139 episodes)
  • English
The Chaos Communication Congress is an annual meeting of the international hacker scene, organized by the Chaos Computer Club. The congress features a variety of lectures and workshops on technical and political issues. The event takes place regularly at the end of the year since 1984, with the current date and duration (December 27–30) established in 2005.

139 episodes

Season Premiere

2013-12-27T00:00:00Z

30x01 Opening Event (#5605)

Season Premiere

30x01 Opening Event (#5605)

  • 2013-12-27T00:00:00Z1h

Speaker: Tim Pritlove

Welcome to the 30th Chaos Communication Congress

Introductory event to say hello to everybody, give a brief overview of the event's features and look into history and future alike

Speaker: lizvlx

Art Practice under the Regime of Anti-Terror Legislation

This lecture shall give a first person account of how circumstances have dramatically changed for actionist art practice over the last 15 years. I will use examples from my own art practice to show the impossibility to engange in digital and real-life actionism as they are considered criminal under anti-terrorist laws.

Speaker: Stefan Widmann

Techniques - Tools - Tricks

This talk gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be really tricky. After that it introduces the necessary tools, gives tips on how to detect the processor architecture, and explains some more advanced analysis techniques, including how to figure out the offsets where the firmware is loaded to, and how to start the investigation.

2013-12-27T00:00:00Z

30x04 Seidenstraße (#5610)

30x04 Seidenstraße (#5610)

  • 2013-12-27T00:00:00Z1h

Speakers: *m, Jeff Mann, frank, Diani Barreto

The Making of…

Auf dem 30C3 wird es, neben der bisher gewohnten digitalen Infrastruktur mit Netz, Telefon etc. dieses Jahr auch erstmalig ein Rohrpost-System mit dem schönen Namen Seidenstraße geben. Als Inspiration dient die auf geschlossenen Drainagerohren und Staubsaugern basierende Installation OCTO der Künstlergruppe Telekommunisten, die einigen von der letzten transmediale bekannt sein dürfte.

2013-12-27T00:00:00Z

30x05 Der tiefe Staat (#5415)

30x05 Der tiefe Staat (#5415)

  • 2013-12-27T00:00:00Z1h

Speaker: Andreas Lehner

Dieser Vortrag beschreibt Konzept und Idee des tiefen Staates anhand der Geschichte der BRD.

Speaker: josch

How to do things with words

Der Vortrag stellt fortgeschrittene linguistische Methoden des politisch motivierten Internetmonitorings vor. Er gibt keine Anleitung, wie man sich der Überwachung wirkungsvoll entziehen kann, denn das ist ohnehin zwecklos.

Speakers: Martin Haase/maha, khamacherDie Diskussion um NSA, PRISM, Tempora sprachlich und logisch aufgearbeitet

Die Enthüllungen Edward Snowdens haben die deutsche Politik für kurze Zeit in Aufregung gebracht. Für eine Beruhigung reichte es bereits aus, die Enthüllungen in sprachlich-logisch cleverer Weise zu verarbeiten, sie teilweise in ein anderen Kontext zu stellen und so schließlich Entwarnung geben zu können: Die Bundesregierung hat „keine Anhaltspunkte für flächendeckende Überwachung“.

Bei diesem Vorgehen handelt sich um ein Paradebeispiel dafür, wie mit einfachen sprachlich-rhetorischen Tricks die politisch Verantwortlichen die Öffentlichkeit und sich selbst so weit täuschten, dass es ihnen nicht mehr nötig erschien, sich mit den eigentlichen Problemen auseinanderzusetzen, und so das leidige Thema aus dem Wahlkampf herausgehalten werden konnte. Neben den mittlerweile zum Standard gehörenden „Basta“-Floskeln spielte das Phänomen der Modalisierung eine besondere Rolle, wie die genauere Analyse zeigt. Auch logische Fehler wie Zirkelschlüssel und (zu) strikte Einschränkung des thematischen Bezugs erlaubten diese „Flucht-nach-vorne“-Strategie. Die Häufung sprachlicher Tricks und des logisch-inhaltlichen Ausweichens legen eine Inszenierung nahe.

Speaker: Jan Schejbal

It hurts.

We reverse-engineered one implementation of the non-public CHIASMUS cipher designed by the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, short BSI). This did not only give us some insight on the cipher, but also uncovered serious implementation issues in GSTOOL which allow attackers to crack files encrypted with the GSTOOL encryption function with very little effort.

Speaker: nbd

How OpenWrt evolved from a WRT54G firmware to an universal Embedded Linux OS

A review of the 10 year history of the OpenWrt project, current events, and upcoming developments.

Speaker: gannimo

Deep program analysis without the headache

Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths at once. A drawback of many systems is that they need source code access and only scale to few lines of code. This talk explains how SE and binary analysis can be used to (i) reverse-engineer components of binary only applications and (ii) construct specific concrete input that triggers a given condition deep inside the application (think of defining an error condition and the SE engine constructs the input to the application that triggers the error).

Speaker:Alexa O'Brien

Reporting on the secret trial of Chelsea Manning

At Fort George "Orwell" Meade, home of the NSA and the US Defense Information School, managing the message of Chelsea Manning's trial was facilitated by a lack of public access to most of the court filings and rulings until 18 months into her legal proceeding.

Speakers: tw, sb

Stealing Money from ATMs with Malware

This talk will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The successful compromise of an ATM can easily result in the loss of several hundred thousand dollars.

30x13 Rock' em Graphic Cards (#5298)

  • 2013-12-27T00:00:00Z1h

Speaker: mel/ Agnes Meyder

Introduction to Heterogeneous Parallel Programming

This talks introduces programming concepts and languages for parallel programming on accelerator cards.

2013-12-27T00:00:00Z

30x14 IFGINT (#5509)

30x14 IFGINT (#5509)

  • 2013-12-27T00:00:00Z1h

Speaker: Stefan Wehrmeyer

Erkenntnisse aus Informationsfreiheitsanfragen - Hacks, Bugs, Workarounds

Mit Informationsfreiheitsgesetz (IFG) und FragDenStaat.de kann man als Bürger den Staat einfach zurücküberwachen. Was erfährt man, wenn man fragt? Wo sind die Probleme, was sind die Workarounds? Ein Blick zurück auf 2013, nach vorn auf 2014 und ein Aufruf das IFG zu nutzen.

2013-12-27T00:00:00Z

30x15 lasers in space (#5311)

30x15 lasers in space (#5311)

  • 2013-12-27T00:00:00Z1h

Speaker: anja

more than just pew pew!

This talk will give an introduction on lasers and space and it will show the huge diversity of applications for lasers in space.

Speakers: Karsten Nohl, Luca Melette

Mobile networks should protect users on several fronts: Calls need to be encrypted, customer data protected, and SIM cards shielded from malware.

Many networks are still reluctant to implement appropriate protection measures in legacy systems. But even those who add mitigations often fail to fully capture attacks: They target symptoms instead of solving the core issue.

Speaker: ruedi

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit Milliarden-Etat komplett versagt zu haben. Namentlich RC4, MD5 und SHA1 scheinen praxisrelevant brechbar.

Speaker: Clemens Hopfer

introduction to software radio principles

The aim of this talk is to give an understandable insight into wireless communication, using existing systems as examples on why there are different communication systems for different uses.

Speaker: MaTu

Velocipedes and Face Recognition

This talk considers the use of new technology to police large crowds in the Romantic period. We examine ethical aspects of modern surveillance technologies by looking at debates around crowd control and face recognition in the age that first imagined, and reflected on, the surveillance state.

30x20 Bug class genocide (#5412)

  • 2013-12-27T00:00:00Z1h

Speaker: Andreas Bogk

Applying science to eliminate 100% of buffer overflows

Violation of memory safety is still a major source of vulnerabilities in everyday systems. This talk presents the state of the art in compiler instrumentation to completely eliminate such vulnerabilities in C/C++ software.

Speaker: Peter Stuge

Clean boot every boot - rejecting persistence of malicious software and tripping up the evil maid

A commodity laptop is analyzed to identify exposed attack surfaces and is then secured on both the hardware and the firmware level against permanent modifications by malicious software as well as quick drive-by hardware attacks by evil maids, ensuring that the machine always powers up to a known good state and significantly raising the bar for an attacker who wants to use the machine against its owner.

Speaker: C B

Concepts and components for intercontinal communication with single photons.

This talk should introduce the general 30c3 participant with several components of long distance quantum communication.

Speaker: Andrew Reiter (arr,awr)

Software-Defined Radio (SDR) has increased in popularity in recent years due to the decrease in hardware costs and increase in processing power. One example of such a class of devices is the RTL-SDR USB dongles based on the Realtek RTL2832U demodulator. This talk will discuss my experience in building a distributed RF scanner array for monitoring and spectrum mapping using such cheap SDR devices. The goal is to help the audience understand the what, why, and how of building their own RF monitoring array so that they will be able to do it themselves. In this era of increasingly being watched'', we must be prepared to do our ownwatching''.

2013-12-27T00:00:00Z

30x24 30c3 Keynote (#5711)

30x24 30c3 Keynote (#5711)

  • 2013-12-27T00:00:00Z1h

Speakers: Glenn Greenwald, frank

2013-12-27T00:00:00Z

30x25 The Tor Network (#5423)

30x25 The Tor Network (#5423)

  • 2013-12-27T00:00:00Z1h

Speakers: Jacob, arma

We're living in interesting times

Roger Dingledine and Jacob Appelbaum will discuss contemporary Tor Network issues related to censorship, security, privacy and anonymity online.

30x26 Console Hacking 2013 (#5290)

  • 2013-12-27T00:00:00Z1h

Speaker: sven, marcan, Nicholas Allegra (comex)

WiiU

About a year ago Nintendo released their latest video gaming console, the Wii U. Since 2006, the Wii has led to one of the most active homebrew scenes after its security system was completely bypassed. This talk will discuss the improvements made in Wii U's architecture and explain how it was broken in less than 31 days. The talk is targeted at those who hack (or design) embedded system security, but gamers might also find it interesting.

2013-12-27T00:00:00Z

30x27 Forbidden Fruit (#5613)

30x27 Forbidden Fruit (#5613)

  • 2013-12-27T00:00:00Z1h

Speaker: Joe Davis

Vortrag: Forbidden Fruit

Various dietary restrictions are historically associated with human culture and civilization. In addition, millions suffer from eating disorders that have both pathological and cultural origins.

Speaker: Kai

Activity Recognition for the Mind

The talk gives an overview about our work of quantifying knowledge acquisition tasks in real-life environments, focusing on reading. We combine several pervasive sensing approaches (computer vision, motion-based activity recognition etc.) to tackle the problem of recognizing and classifying knowledge acquisition tasks with a special focus on reading. We discuss which sensing modalities can be used for digital and offline reading recognition, as well as how to combine them dynamically.

Speaker: RPW, esizkur

Hexagon challenges

Exploitation of baseband vulnerabilities has become significantly harder on average. With Qualcomm having grabbed 97% of the market share of shipped LTE chipsets in 1Q2013, you see their chipset in every single top-of-the-line smartphone, whether it is an Android, an iPhone, a Windows Phone or a Blackberry.

Speaker: Markus Beckedahl, Thomas Lohninger

Wer kontrolliert das Netz?

Seit Jahren nur in Fachzirkeln diskutiert gab es 2013 den Durchbruch für die Debatte um Netzneutralität. Mit der Ankündigung der Deutschen Telekom im Frühjahr, zukünftig auf Volumentarife umzusteigen und Partnerdienste priorisiert durchzulassen, wurde Netzneutralität eines der meistdiskutierten netzpolitischen Debatten des Jahres.

Auf nationaler Ebene startete das Bundeswirtschaftsminsiterium eine Diskussion über eine Verordnung und auf EU-Ebene legte die Kommission einen Verordnungsvorschlag vor.

30x31 World War II Hackers (#5474)

  • 2013-12-27T00:00:00Z1h

Speaker: Anja Drephal

Stalin's best men, armed with paper and pen

The use of encryption to secure sensitive data from unauthorized eyes is as old as human communication itself. Before the relatively new method of computerized encryption software converting data into a format unintelligible to anyone lacking the necessary key for its decryption, for a long time there was pen and paper and the human brain doing quite a bit of work. Up until the 20th century encryption had to be done literally by hand, to then be transmitted in paper form, via telegraphy or radio. In this context, encryption of data has always been of special importance during times of political conflict and war; subsequently, it saw its major developments during those times in history. This talk will examine and explain common hand encryption methods still employed today using the example of one very successful Soviet espionage group operating in Japan in the 1930s and 1940s: the spy ring centered around Richard Sorge, codenamed “Ramsay”.

30x32 The GNU Name System (#5212)

  • 2013-12-27T00:00:00Z1h

Speaker: grothoff

A Decentralized PKI For Social Movements

DNS, DNSSEC and the X.509 CA system leak private information about users to server operators and fail to provide adequate security against modern adversaries. The fully decentralized GNU Name System provides a privacy-enhancing and censorship-resistant alternative.

Speakers: Quinn Norton, Eleanor Saitta

The news of the past few years is one small ripple in what is a great wave of culture and history, a generational clash of civilizations. If you want to understand why governments are acting and reacting the way they are, and as importantly, how to shift their course, you need to understand what they're reacting to, how they see and fail to see the world, and how power, money, and idea of rule of law actually interact.

2013-12-27T00:00:00Z

30x34 HbbTV Security (#5398)

30x34 HbbTV Security (#5398)

  • 2013-12-27T00:00:00Z1h

Speaker: Martin Herfurt

OMG - my Smart TV got pr0wn3d
10789556_m

HbbTV (Hybrid broadband broadcast TV) is an emerging standard that is implemented in a growing number of smart TV devices. The idea is to bundle broadcast media content with online content which can be retrieved by the TV set through an Internet connection.

Mechanisms that allow the online content to be accessed by the TV set can be attacked and might put the TV user’s privacy at stake. The presentation highlights possible attack vectors of HbbTV-capable TV sets and introduces possible mitigations.

2013-12-27T00:00:00Z

30x35 Breaking Baryons (#5305)

30x35 Breaking Baryons (#5305)

  • 2013-12-27T00:00:00Z1h

Speaker: Michael Büker

On the Awesomeness of Particle Accelerators and Colliders

A light-hearted presentation about many aspects of particle accelerators like the LHC and their particle collision experiments. Aimed at technically interested non-scientists and physics buffs alike.

30x36 Firmware Fat Camp (#5356)

  • 2013-12-27T00:00:00Z1h

Speaker: angcui

Embedded Security Using Binary Autotomy

We present a collection of techniques which aim to automagically remove significant (and unnecessary) portions of firmware binaries from common embedded devices to drastically reduce the attack surface of these devices. We present a brief theoretical explanation of Firmware Fat Camp, a collection of "before" and "after" photos of graduates of FFC, along with a set of live demonstrations of FFC in action on common embedded devices.

Modern embedded systems such as VoIP phones, network printers and routers typically ship with all available features compiled into its firmware image. A small subset of these features is activated at any given time on individual devices based on its specific configuration. An even smaller subset of features is actually used, as some unused and insecure features cannot are typically enabled by default and cannot be disabled. However, all embedded devices still contain a large amount of code and data that should never be executed or read according to its current configuration. This unnecessary binary is not simply a waste of memory; it contains vulnerable code and data that can be used by an attacker to exploit the system. This “dead code” provides an ideal attack surface. Automated minimization of this attack surface will significantly improve the security of the device without any impact to the device’s functionality.

2013-12-28T00:00:00Z

30x37 Hacker Jeopardy (#5577)

30x37 Hacker Jeopardy (#5577)

  • 2013-12-28T00:00:00Z1h

Speakers: Sec, Ray

Number guessing for geeks

The Hacker Jeopardy is a quiz show.

2013-12-28T00:00:00Z

30x38 Sim Gishel (#5544)

30x38 Sim Gishel (#5544)

  • 2013-12-28T00:00:00Z1h

Speaker: Karl Heinz Jeron

A singing and dancing robot build to take part in casting shows

Sim Gishel is a multimedia robot. He sings and dances on request. He will try hard to take part in casting shows to become a popstar.

30x39 The Gospel of IRMA (#5214)

  • 2013-12-28T00:00:00Z1h

Speaker: Jaap-Henk Hoepman

Attribute Based Credentials in Practice

Attribute Based Credentials (ABC) allow users to prove certain properties about themselves (e.g. age, race, license, etc.) without revealing their full identity. ABC are therefore important to protect the privacy of the user. The IRMA (I Reveal My Attributes) project of the Radboud University Nijmegen has created the first full and efficient implementation of this technology on smart cards. This allows ABC technology to be used in practice both on the Internet as well as in the physical world. We will discuss ABCs in general, the IRMA system, it's advantages and pitfalls, and future work.

2013-12-28T00:00:00Z

30x40 Hello World! (#5611)

30x40 Hello World! (#5611)

  • 2013-12-28T00:00:00Z1h

Speaker: Aram Bartholl

How to make art after Snowden?

USB DeadDrops, IRL map marker in public, FUCK 3D glasses or How to vacuum form a guy fawkes mask. I will present an extensive overview of my art projects from over the last 10 years including the Fake Google car by F.A.T. and moar!! It all started here at the CCC congress! :))

2013-12-28T00:00:00Z

30x41 BREACH in Agda (#5394)

30x41 BREACH in Agda (#5394)

  • 2013-12-28T00:00:00Z1h

Speaker: Nicolas Pouillard

Security notions, proofs and attacks using dependently typed functional programming

Software engineering is in a unsustainable state: software is mainly developed in a trial and error fashion, which always leads to vulnerable systems. Several decades ago the correspondence between logics and programming (Curry-Howard) was found. This correspondence is now being used in modern programming languages using dependent types, such as Agda, Coq, and Idris.

In this talk I show our development of attacks and security notions within Agda, using the recent BREACH exploit as an example. Our development is a constructive step towards verified software and bridges a gap between theory and practice.
I will explain the details about the Curry-Howard correspondence.
The target audience are interested people with some programming experience.

30x42 We only have one earth (#5468)

  • 2013-12-28T00:00:00Z1h

Speaker: Drahflow

A case for expansionistic space policy

An abundant number of existential risks threatens humanity. Many of those planetary by nature. Current science already enables us to colonize nearby space, yet nobody bothers to supply the modest financial resources. Hence this call to action.

2013-12-28T00:00:00Z

30x43 Glass Hacks (#5537)

30x43 Glass Hacks (#5537)

  • 2013-12-28T00:00:00Z1h

Speaker Stephen Balaban

Fun and frightening uses of always-on camera enabled wearable computers

A one hour technical lecture that covers everything from machine learning and AI to hardware design and manufacture. Includes demonstrations of applications enabled by an always-on image capturing wearable computer. You'll leave with a clear understanding of the field's status quo, how we got here, and insight into what's around the corner.

Speaker: J. Alex Halderman

Internet-wide network scanning has powerful security applications, including exposing new vulnerabilities, tracking their mitigation, and exposing hidden services. Unfortunately, probing the entire public address space with standard tools like Nmap requires either months of time or large clusters of machines. In this talk, I'll demonstrate ZMap, an open-source network scanner developed by my research group that is designed from the ground up to perform Internet-wide scans efficiently. We've used ZMap with a gigabit Ethernet uplink to survey the entire IPv4 address space in under 45 minutes from a single machine, more than 1300 times faster than Nmap. I'll explain how ZMap's architecture enables such high performance. We'll then work through a series of practical examples that explore the security applications of very fast Internet-scale scanning, both offensive and defensive. I'll talk about results and experiences from conducting more than 300 Internet-wide scans over the past 18 months, including new revelations about the state of the HTTPS CA ecosystem. I'll discuss the reactions our scans have generated--on one occasion we were mistaken for an Iranian attack against U.S. banks and we received a visit from the FBI--and I'll suggest guidelines and best practices for good Internet citizenship while scanning.

Speaker: David

Side-Channel (and other) Attacks in Practice

Side-channel analysis (SCA) and related methods exploit physical characteristics of a (cryptographic) implementations to bypass security mechanisms and extract secret keys. Yet, SCA is often considered a purely academic exercise with no impact on real systems. In this talk, we show that this is not the case: Using the example of several wide-spread real-world devices, we demonstrate that even seemingly secure systems can be attacked by means of SCA with limited effort.

Speaker: Travis Goodspeed

Repurposing an Inmarsat Dish

Satellites in Low Earth Orbit have tons of nifty signals, but they move quickly though the sky and are difficult to track with fine accuracy. This lecture describes a remotely operable satellite tracking system that the author built from a Navy-surplus Inmarsat dish in Southern Appalachia.

Speaker: Jan Philipp Albrecht

Jan Phillip Albrecht is rapporteur of the European Parliament for the EU's General Data Protection Regulation as well as for the EU-US data protection framework agreement.

2013-12-28T00:00:00Z

30x49 Magic Lantern (#5554)

30x49 Magic Lantern (#5554)

  • 2013-12-28T00:00:00Z1h

Speaker: Michael Zöller

Free Software on Your Camera

We present Magic Lantern, a free open software add-on for Canon DSLR cameras, that offers increased functionality aimed mainly at DSLR pro and power users. It runs alongside Canon's own firmware and introduces to consumer-grade DSLRs features usually only found in professional high-end digital (cinema) cameras.

Speaker: Josef Foschepoth

Historische Grundlagen und notwendige Konsequenzen

Seit Monaten hält uns die NS-Affäre in Atem. Immer neue Abhörmaßnahmen und geheimdienstliche Praktiken werden enthüllt. Ein gigantisches Ausmaß an Überwachung durch die Vereinigten Staaten von Amerika tut sich auf, weltweit. In Europa ist die Bundesrepublik Deutschland das am meisten überwachte Land.

2013-12-28T00:00:00Z

30x51 Script Your Car! (#5360)

30x51 Script Your Car! (#5360)

  • 2013-12-28T00:00:00Z1h

Speaker: Felix "tmbinc" Domke

Using existing hardware platforms to integrate python into your dashboard

Almost all higher-end cars come with very beefy in-car entertainment hardware. In this talk, I'll describe how to take advantage of an existing hands-free kit to connect your car to the internet and script your dashboard in python.

30x52 My journey into FM-RDS (#5588)

  • 2013-12-28T00:00:00Z1h

Speaker: Oona Räisänen

How I discovered mysterious hidden signals on a public radio channel and eventually found out their meaning through hardware hacking, reverse engineering and little cryptanalysis.

2013-12-28T00:00:00Z

30x53 Against Metadata (#5453)

30x53 Against Metadata (#5453)

  • 2013-12-28T00:00:00Z1h

Speaker: Robert M Ochshorn

Twisting time and space to explore the unknown

Using case studies of documentary film, Freedom of Information Law document dumps, soundbanks, and a hacker conference, I will demonstrate experiments and results of several years developing open source tools to reorient the idea of documentary around its documents. This is in opposition to a tendancy towards textual and machine-readable metadata, which unduly constrain our wonder, perception, and ability to navigate ambiguous and unknown material.

30x54 The Pirate Cinema (#5607)

  • 2013-12-28T00:00:00Z1h

Speakers: Nicolas Maigret, Brendan Howell

Creating mash-up movies by hidden activity and geography of Peer-to-Peer file sharing

"The Pirate Cinema" reveals Peer-to-Peer information flows. It is a composition generated by the activity on file sharing networks. "The Pirate Cinema" immerses the viewer in network flows.

Speaker: Stephen A. Ridley

In this talk (which in part was delivered at Infiltrate 2013 and NoSuchCon 2013) we will discuss our recent research that is being rolled into our Practical ARM Exploitation course (sold out at Blackhat this year and last) on Linux and Android (for embedded applications and mobile devices). We will also demonstrate these techniques and discuss how we were able to discover them using several ARM hardware development platforms that we custom built. Where relevant we will also discuss ARM exploitation as it related to Android as we wrote about in the "Android Hackers Handbook" which we co-authored and will be released in October 2013.

2013-12-28T00:00:00Z

30x56 FPGA 101 (#5185)

30x56 FPGA 101 (#5185)

  • 2013-12-28T00:00:00Z1h

Speaker: Karsten Becker

Making awesome stuff with FPGAs

In this talk I want to show you around in the mysterious world of
Field Programmable Gate Arrays, or short FPGAs. The aim is to enable you to get a rough understanding on what FPGAs are good at and how they can be used in areas where conventional CPUs and Microcontrollers are failing upon us. FPGAs open up the world of high-speed serial interconnects, nano-second event reactions and hardware fuzzing.

30x57 Turing Complete User (#5547)

  • 2013-12-28T00:00:00Z1h

Speaker: olia lialina

What can be done to protect the term, the notion and the existence of the Users?

With the disappearance of the computer, something else is silently becoming invisible as well — the User. Users are disappearing as both phenomena and term, and this development is either unnoticed or accepted as progress — an evolutionary step. Though the Invisible User is more of an issue than an Invisible Computer.

Speaker: Frantisek Algoldor Apfelbeck

call for participation in project and product development

This is a call for participation in a project aimed to build up an open source based experimental incubator which can be used for variety of food, beverage and bio hacking projects allowing for easy control and monitoring of internal condition like temperature and humidity. Working groups will be established to develop prototypes which can be easily and relatively cheaply assembled. Securing funding and establishing a portal to effectively share the news and knowledge within the groups and wider community will be major part of the first phase.

30x59 The Year in Crypto (#5339)

  • 2013-12-28T00:00:00Z1h

Speaker: Nadia Heninger, djb, Tanja Lange

This was a busy year for crypto.
TLS was broken. And then broken again.
Discrete logs were computed. And then computed again.
Is the cryptopocalypse nigh?
Has the NSA backdoored everything in sight?
Also, answers to last year's exercises will be given.

Speakers: Talke Blase, Asta Nechajute, Felix Höfner ,Mona Mucke

Wer ist eigentlich dieser "Verfassungsschutz", was tut er und brauchen wir ihn überhaupt? Laut Angaben des Verfassungsschutzes beantworten drei Viertel der deutschen Bundesbürger diese Frage mit "Ja.". Das nö-theater Köln stellt diesem jedoch ein klares "NÖ!" entgegen. Auf Basis intensiver Interviews, Beobachtungen und Recherchen entwickelten sie das politische Satirestück "V wie Verfassungsschutz". Es werden die Verstrickungen des deutschen Inlandsgeheimdienstes mit der NSU beleuchtet, die "fünf peinlichsten Fälle für den Verfassungsschutz" neben den Pannen mit prostitutionsähnlichen V-Mann-Praktiken inszeniert. Dazwischen tanzt fröhlich Leo Lupix, das Maskottchen des Verfassungsschutzes. Die Kölner Theatertruppe hebt für uns den Zeigefinger und sagt: V wie... Vertuschung, V wie... Verzweiflung - V wie... Versagen.

Speaker: byterazor

This lecture gives an introduction to processor design.
It is mostly interesting for people new to processor design and does not cover high performance pipelined structures.
Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described here.

Demo:
Create a backdoor in the VHDL Code of a processor core.
Exploit this backdoor to get a root shell in the linux operating system.

Speaker: !Mediengruppe Bitnik

!Mediengruppe Bitnik about their recent works

!Mediengruppe Bitnik are contemporary artists. In their talk they will show two examples of their work, illustrating the translation of hacking from the computer field into an artistic practice. Bitnik will show how to hack the opera in ten easy steps and what happens when you send a parcel with a hidden live webcam to Julian Assange at the Ecuadorian Embassy in London.

Using the strategies of hacking, !Mediengrupppe Bitnik intervenes into settings with the aim of opening them up to re-evaluation and new perspectives.

Speaker: Peter Laackmann, Marcus Janke

Von der Historie zur Zukunft

Eine unterhaltsame, spannende und lehrreiche Reise durch 25 Jahre Chipkarten-Angriffe mit tiefen Einblicken in Amateur- und Profi-Hackerlabore, inklusive eines Ausblicks in neueste Methoden und zukünftige Ansätze.

Speakers: sergeybratus, Julian Bangert, bx

Ken Thompson's classic "Reflections on Trusting Trust" examined the impacts of planted build chain bugs, from an example of a compiler Trojan to a hypothetical "well-placed microcode bug". Once theoretical & remote, such scenarios have lately been revealed as a stark reality.

Speaker: Linus Neumann

So hosten Sie Ihre De-Mail, E-Mail und Cloud direkt beim BND!

Die technischen Probleme der De-Mail ließen sich juristisch lösen, und auch bei der E-Mail setzen deutsche Provider bald Sicherheitsstandards der Neunziger Jahre um. Auch für "die Cloud" hat das BSI einen feinen Standard parat – natürlich ohne Verschlüsselung. Wofür bräuchten wir die auch im Schlandnet?

Speaker: atdotde

A farewell to a bold proposal?

Supersymmetry has been particle theorists' favorite toy for several decades. It predicts a yet unobserved symmetry of nature and implies that to each known type of elementary particle there exists a partner particle none of which has been detected up to today.

I will explain why it is an attractive idea nevertheless and what is the current situation after the large hadron collider (LHC) at CERN has looked at many places where supersymmetric partners were expected and did not find them. Is it time to give up hope that susy is a property of nature?

Speaker: nedos

The future of IC analysis

In the chain of trust of most secure schemes is an electronic chip that holds secret information. These schemes often employ cryptographically secure protocols. The weakest link of such a scheme is the chip itself. By attacking the chip directly an attacker can gain access to the secret data in its unencrypted form. In this presentation we demonstrate the attack class of the future, backside attacks. This class of attacks mitigate all device countermeasures and can access all signals of the device. As opposed to the attacks of today, these attacks can also be applied to complex systems such as the ARM SoCs of modern smartphones.

Speaker: Julian Oliver

In this lecture Julian will introduce projects and interventions made by himself and others that foreground Engineering, rather than Art, in the creative and critical frame, offering highly public insights into the hidden mechanisms and power struggles within our technical environment. Projects such as the Transparency Grenade, Packetbruecke and Newstweek will be covered in detail.

Speaker: Karsten Becker

Let's create the Arduino for FPGAs

Learning to program an FPGA is time consuming. Not just do you need to download and install 20 GB of vendor tools, but you also need to wrap your brain around the strange ideas of hardware description languages like VHDL. PSHDL aims to ease the learning curve significantly and provide more people with the ability to program FPGAs.

Speaker: wsa

Companies are often blamed for not working upstream. Surprisingly, the situation is not per se better with community projects. To change the latter for the better, Wolfram will show some examples regarding the Linux Kernel and present ideas to create win-win-win situations.

30x71 Plants & Machines (#5437)

  • 2013-12-28T00:00:00Z1h

Speaker: mrv, bbuegler

Food replicating Robots from Open Source Technologies

Did you ever feel the need to be in charge of your environment? We did . A detailed story of our experience playing with 220VAC and water to build an automated, digitally controlled ecosystem. A place, where you can be the climate-change. Double the temperature, triple the floods, let it storm or rain. A Tamagotchi that generates food from electricity. All done with Arduino, raspberry Pi and Node.js.

Speaker: Trevor Paglen

Although people around the world are becoming increasingly aware of the United States' global geography of surveillance, covert action, and other secret programs, much of this landscape is invisible in our everyday lives.

30x73 SCADA StrangeLove 2 (#5582)

  • 2013-12-28T00:00:00Z1h

Speakers: Gleb Gritsai, Sergey Gordeychik

We already know

SCADA StrangeLove team will present their research on ICS systems for the second time on CCC. Last year we showed current situation with security of industrial world and disclosed a big number of vulnerabilities found in Siemens ICS solutions. Part of vulnerabilities, we can say most notable one, wasn’t disclosed due to Responsible Disclosure. This time we already know. We will speak about several industrial protocols and their weaknesses. During this year we played with new industrial hardware and software – this patitially brings new “We don’t know yet” vulnerability details. Moreover, we’ll mention creepiest bugs undisclosed from last year, tell you about new ones and build attack vectors from them. At last, we will share our experience in pentesting ICS enviroments.

Speaker: Nate Cardozo

Pragmatic Advice for Security Researchers

This talk will focus on responsible disclosure best and worst practices from both legal and practical perspectives. I'll also focus on usable advice, both positive and negative, and answer any questions the audience has on best practices.

2013-12-28T00:00:00Z

30x75 Technomonopolies (#5319)

30x75 Technomonopolies (#5319)

  • 2013-12-28T00:00:00Z1h

Speaker: rysiek

How technology is used to subvert and circumvent anti-monopoly laws

We all know monopolies are bad. We even have laws against them that sometimes get enforced. However, today we have new kinds of monopolies that affect us without us even noticing them for what they truly are. And technology plays a central role.

Speakers: Constanze Kurz, frank, Linus Neumann

Auch das Jahr 2013 geht irgendwann vorbei. Deshalb werfen wir einen Blick zurück auf die für uns besonders relevanten Themen und versuchen abzuschätzen, was im Jahr 2014 auf uns zukommen könnte.

2013-12-29T00:00:00Z

30x77 Googlequiz (#5465)

30x77 Googlequiz (#5465)

  • 2013-12-29T00:00:00Z1h

Speaker: Jöran Muuß-Merholz, Gestatten, it4n6

2013er Edition

Der durchschnittliche User nutzt nur fünf Prozent seines Googlevermögens. Mit dem Googlequiz lässt sich das ausbauen. Eine gewisse Konkurrenzsituation und Kaltgetränke können hilfreich sein.

2013-12-28T00:00:00Z

30x78 Perfect Paul (#5614)

30x78 Perfect Paul (#5614)

  • 2013-12-28T00:00:00Z1h

Speaker: artelse

On Freedom of Facial Expression

The facial hacking research presented in this lecture/ performance exploits a well known vulnerability of the human nervous system that it can be easily accessed and controlled by electrodes mounted on the bodies exterior. External digital facial control allows for an unprecedented exploration of human facial expressiveness and has unveiled an unknown expressive potential of the human facial hardware.

Speaker: Nadya Peek

rapid prototyping of digital fabrication and instrumentation machines

Making a new control system for a machine is often a slow and tedious task. Maybe you already have a 3 axis stage, and you already know how to move it around. But what if you want to add a camera and use it for position feedback? You'd have to redesign the whole hardware layer. I'll talk about some ways I've built modularity into control systems for machines so that you can quickly iterate on different kinds of machine systems without getting stuck in hardware land forever. This includes connecting synchronized nodes across a network and importing legacy nodes for things like, say, an old pressure box you found in the trash and has rs232 in. Down with gcode! Long live machine control.

Speaker: Christoph Engemann

Talk introducing NSTIC and COM 238, i.e. the current digital identity policy proposals in the USA and European discussing their similarities, differences and possible conflicts.

Speaker: Maria Xynou

India is currently implementing some of the scariest surveillance schemes in the world. This lecture will shed light on India's surveillance industry, its UID scheme which aims at the collection of all biometric data and on various controversial surveillance schemes, such as the Central Monitoring System (CMS).

Speaker: taziden

Building and running an ISP is not that difficult. It's hard to say how many people are connected to the Internet by such weird structures, but we know that they are more and more each day.
What is at stake is taking back the control of the Internet infrastructure and showing that a neutral Internet access is natural.

Speakers: bughardy, Eagle1753

NFC technology is becoming more and more relevant in our lives. One of its major uses is in ticketing solutions. However, most of companies use bad implementations of NFC technology. By this talk we will explain a complete solution, analyzing security challenges and outlining the best practices and implementation choices.

2013-12-29T00:00:00Z

30x84 Drones (#5406)

30x84 Drones (#5406)

  • 2013-12-29T00:00:00Z1h

Speaker: Piotr Esden-Tempski

Autonomous flying vehicles, where are we and where are we going?

During the last 10 years the technology that was formerly only available to the military, reached the hands of thousands. Researchers, hackers, enthusiasts and hobbyists helped drive the technology further and higher than anyone had imagined just a few years ago. We will recap what the civilian airborne robot community has achieved in the last decade and what the next frontiers are that need to be addressed.

Speaker: Kate Krauss

In China Your ID Card Knows Everything

Imagine getting pulled over for running a stop sign and learning for the first time – from the cop – that you are HIV-positive. People in China are required to carry electronic, swipeable ID cards that hold their political views, their HIV status, their mental health situation, and much more.

Speakers: Bram de Vries, Morris Winkler

experiences from the “i3 Berlin” 3D printer project with Blender and Github

Every successful open hardware project needs a solid organization structure at some point in time, especially when plan to produce and sell your project. In our “i3 Berlin” 3d printer project, we took some elements of the PLM (Product Lifecycle Management) concept and implemented it with open source tools like Github and Blender.

2013-12-29T00:00:00Z

30x88 calc.pw (#5420)

30x88 calc.pw (#5420)

  • 2013-12-29T00:00:00Z1h

Speaker: Kenneth Newwood

Passwortgenerierung mit Arduino [Generating passwords with Arduino]

Bei calc.pw handelt es sich um DIY Hardware, mit deren Hilfe man Passwörter aus einem Masterpasswort und einfach merkbaren Informationen (z. B. "ebay", "amazon", etc.) generieren kann. Im Vortrag soll es um die Probleme vorhandener Passwortverfahren (Passwortschemen, Passwortdatenbanken) gehen. Es soll die Theorie hinter der Passwortberechnung erläutert und eine praktische Implementierung dieser Berechnung vorgestellt werden.

Speakers: bunnie, Xobs

All “managed FLASH” devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of reliable, contiguous storage out of FLASH silicon that is fundamentally unreliable and unpredictably fragmented. This controller is an attack surface of interest. First, the ability to modify the block allocation and erasure algorithms introduces the opportunity to perform various MITM attacks in a virtually undetectable fashion. Second, the controller itself is typically powerful, with performance around 50MIPS, yet with a cost of mere pennies, making it an interesting and possibly useful development target for other non-storage related purposes. Finally, understanding the inner workings of the controller enables opportunities for data recovery in cards that are thought to have been erased, or have been partially damaged.

This talk demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card.

Speaker: Adrian Dabrowski

Hacking City-Wide Access Control Systems

In this lecture, we present a black-box analysis of an electronic contact-less system that has been steadily
replacing a conventional mechanical key on multi-party
houses in a big European city. So far, there are est. 10.000 installations of the electronic system. The mechanical key has been introduced about 40 years ago to allow mail delivery services to access multi-party houses but has since then aggregated many additional users, such as garbage collection, police, fire brigade and other emergency services. Over 92% of residential buildings in this city are equipped with such a solution.

2013-12-29T00:00:00Z

30x91 The ArduGuitar (#5595)

30x91 The ArduGuitar (#5595)

  • 2013-12-29T00:00:00Z1h

Speaker: gratefulfrog

An Arduino Powered Electric Guitar

The ArduGuitar is an electric guitar with no physical controls, i.e. no buttons or knobs to adjust volume, tone or to select the pickups. All of these functions are performed remotely via a bluetooth device such as an Android phone, or via a dedicated Arduino powered blutetooth footpedal. The musician still plucks the strings, of course! This talk will give an overview of the technology and particularly the voyage that took me from nearly no knowledge about anything electronic to enough know-how to make it all work.I will explain what I learned by collaborating on forums, with Hackerspaces and with component providers: "How to ask the right questions." The guitar with its Arduino powered circuit and an Android tablet will be available for demo; the code is all available on the github arduguitar repo with the associated Arduino footpedal libraries.

2013-12-29T00:00:00Z

30x92 Android DDI (#5192)

30x92 Android DDI (#5192)

  • 2013-12-29T00:00:00Z1h

Speaker: Collin Mulliner

Dynamic Dalvik Instrumentation of Android Applications and the Android Framework

As application security becomes more important on Android we need better tools to analyze and understand them. Android applications are written in Java and a run in the Dalvik VM. Until now most analysis is done via disassembling and monitored execution in an emulator. This talk presents a new technique to instrument Android applications executed in the DVM. The talk will introduce the new technique in great detail including many small examples and a whole attack based on it. We will go step by step to show you what can be achieved using this technique.

30x93 How to Build a Mind (#5526)

  • 2013-12-29T00:00:00Z1h

Speaker: Joscha

Artificial Intelligence Reloaded

A foray into the present, future and ideas of Artificial Intelligence. Are we going to build (beyond) human-level artificial intelligence one day? Very likely. When? Nobody knows, because the specs are not fully done yet. But let me give you some of those we already know, just to get you started.

Speaker: Elizabeth Stark

The movement against SOPA in the US was the largest protest in online history, and as one of the core organizers, we learned a lot of lessons on how to build a grassroots movement for internet freedom.

Speakers: Dominic, Anne

The brain can be understood as a highly specialized information processing device. Because computers basically do the same thing, it's not too absurd to try to link these two together. The result is a brain-computer-interface.
This talk explains the core functionality of our brain and how to access the stored data from the outside. Software and hardware have already reached a somewhat hacker-friendly state, and we want to show you how we got there. We're also here to answer all your questions about the brain.

30x96 Nerds in the news (#5494)

  • 2013-12-29T00:00:00Z1h

Speaker: Friedrich Lindenberg

Spending a year coding in a newsroom

Knight-Mozilla OpenNews sends coders into news organisations on a ten-month fellowship to make new tools for reporting and measuring the news. We believe that to remain relevant, journalism has to smarten up about tech and data. As a global community, we develop tools to datamine public data, news apps to make information accessible, and visualisations to break down complex stories. In my talk, I want to present the lessons about tech that I've learned in a newsroom and the things that still need to be built.

Speaker: Natalie Silvanovich

You might remember Tamagotchi virtual pets from the 1990's. These toys are still around and just as demanding as ever! At 29C3, I talked about my attempts to reverse engineer the latest Tamagotchis, and this presentation covers my progress since then. It includes methods for executing code on and dumping code from a Tamagotchi, an analysis of the Tamagotchi code dump and a demonstration of Tamagotchi development tools that make use of these capabilities.

30x98 White-Box Cryptography (#5590)

  • 2013-12-29T00:00:00Z1h

Speaker: Dmitry Khovratovich

Survey

The goal of white-box cryptography is to protect cryptographic keys in a public implementation of encryption algorithms, primarily in the context of Pay-TV and tamper-resistant software. I present an overview of the white-box cryptography concept along with the most common applications and proposed designs. I discuss the subtle difference between white-box cryptography, public-key cryptography, and obfuscation.

2013-12-29T00:00:00Z

30x99 Recht auf Remix (#5433)

30x99 Recht auf Remix (#5433)

  • 2013-12-29T00:00:00Z1h

Speaker: Leonhard Dobusch

Wir leben in einem Zeitalter des Remix. Kreativität und Kultur bauten schon immer auf bereits Bestehendem auf. Internet und digitale Technologien ermöglichen aber die kreative Nutzung existierender Werke in völlig neuen Dimensionen: Nie zuvor war es so vielen möglich, Werke auf so unterschiedliche Arten zu verändern und so einfach anderen zugänglich zu machen. In dem Maße, in dem die kreative Kopie Teil des kommunikativen Alltags breiter Bevölkerungsschichten wird, ist ein Recht auf Remix eine grundlegende Voraussetzung für die Kunst- und Meinungsfreiheit einer Gesellschaft. Die Gegenwart ist jedoch geprägt von restriktivem Rechtemanagement und entgrenzter Rechtsdurchsetzung. Die Initiative "Recht auf Remix" möchte das ändern.

30x100 Data Mining for Good (#5405)

  • 2013-12-29T00:00:00Z1h

Speaker: Patrick

Using random sampling, entity resolution, communications metadata, and statistical modeling to assist prosecutions for disappearance and genocide in Guatemala

For over thirty years, human rights groups in Guatemala have carefully documented the killing and disappearance of many people in the early 1980s. There are tens of thousands of records in many databases, and over 80 million paper pages of police records available in the Archives of the National Police. Most of the prosecutions of the former military and police officials who committed the atrocities depends on eyewitnesses, specific documents, and forensic anthropologists' examination of exhumed bones. However, data analysis helps to see the big patterns in the violence.

2013-12-29T00:00:00Z

30x101 2 Takte später (#5469)

30x101 2 Takte später (#5469)

  • 2013-12-29T00:00:00Z1h

Speakers: m.eik, bruder

30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene

Auf dem 29C3 stellten wir euch die Cultural Commons Collecting Society (C3S) als Initiative zur Gründung einer GEMA-Alternative vor. Seit dem ist sehr viel passiert: Unter anderem ist mittlerweile eine Europäische Genossenschaft gegründet, die mit sechsstelligem Kapital aus einer Crowdfunding-Kampagne in das Jahr 2014 geht. Auf Seiten der GEMA sind angesichts der entstehenden Konkurrentin bereits erste Anzeichen für eine Kursänderung wahrnehmbar.

2013-12-28T00:00:00Z

30x102 X Security (#5499)

30x102 X Security (#5499)

  • 2013-12-28T00:00:00Z1h

Speaker: Ilja van Sprundel

It's worse than it looks

For the past year, I've been looking at the implementation of X.org code. both client and server. During this presentation, I'll give an overview of the good, the bad and the ugly.

Speaker: Patrick Stewin

In this work we present a stealthy malware that exploits dedicated hardware on the target system and remains persistant across boot cycles. The malware is capable of gathering valuable information such as passwords. Because the infected hardware can perform arbitrary main memory accesses, the malware can modify kernel data structures and escalate privileges of processes executed on the system.

The malware itself is a DMA malware implementation referred to as DAGGER. DAGGER exploits Intel’s Manageability Engine (ME), that executes firmware code such as Intel’s Active Management Technology (iAMT), as well as its OOB network channel. We have recently improved DAGGER’s capabilites to include support for 64-bit operating systems and a stealthy update mechanism to download new attack code.

Speaker: acracia

Building a space for grassroots sustainable technology development near Barcelona

Calafou – the Ecoindustrial Postcapitalist Colony – is a settlement of around three dozen people in the Catalonian countryside. Concrete pylons standing 20 meters high hold a highway passing above the wild forest valley, where hall after dilapidated hall of industrial ruins stretch along the banks of a contaminated stream nurturing a twisted yet lively ecosystem. Echoes of unseen, passing cars blend into the organic static of wildlife, punctuated by beats booming from the hacklab speakers.

Speaker: aluburka

How is it possible to participate in a social event anonymously? How can we hide from surveillance in public space? How can we communicate anonymously in real life?
How can we be private in public?
This talk will give an overview about existing hacks and techniques that allow to be private in public, and compare privacy technologies from the web to anonymity techniques that can be used in real life.

2013-12-29T00:00:00Z

30x106 The Four Wars (#5295)

30x106 The Four Wars (#5295)

  • 2013-12-29T00:00:00Z1h

Speaker: Annie Machon

Terror, whistleblowers, drugs, internet

Based on her own experiences as an Intelligence Officer for MI5 (the UK domestic security service) and a whistleblower, Annie Machon will talk about the relationships between the wars on 'terror', drugs, whistleblowers, and the internet, and suggest some ideas about what we can do.

Speaker: evacide

Creating Internet Privacy and Security Resources That Don't Suck

As Internet privacy/security professionals and amateur enthusiasts, we are often asked to give advice about best practices in this field. Sometimes this takes the form of one-on-one advice to our friends, sometimes it's training a room full of people, and sometimes you may be asked to write a blog post or a brief guide or an entire curriculum. This talk will survey the current Internet privacy guide landscape and discuss the perils and pitfalls of creating this type of resource, using the Electronic Frontier Foundation's Surveillance Self Defense project as a case study.

Speaker: delroth, shuffle2

A year ago in November 2012, Nintendo released their latest home video game console: the Wii U. While most video game consoles use controllers that are very basic, the Wii U took the opposite route with a very featureful gamepad: wireless with a fairly high range, touch screen, speakers, accelerometer, video camera, and even NFC are supported by the Wii U gamepad. However, as of today, this interesting piece of hardware can only be used in conjunction with a Wii U: wireless communications are encrypted and obfuscated, and there is no documentation about the protocols used for data exchange between the console and its controller. Around december 2012, I started working with two other hackers in order to reverse engineer, document and implement the Wii U gamepad communication protocols on a PC. This talk will present our findings and show the current state of our reverse engineering efforts.

30x109 WarGames in memory (#5223)

  • 2013-12-29T00:00:00Z1h

Speaker: gannimo

what is the winning move?

Memory corruption has been around forever but is still one of the most exploited problems on current systems. This talk looks at the past 30 years of memory corruption and systematizes the different existing exploit and defense techniques in a streamlined way. We evaluate (i) how the different attacks evolved, (ii) how researchers came up with defense mechanisms as an answer to new threats, and (iii) what we will have to expect in the future.

30x110 To Protect And Infect (#5439)

  • 2013-12-29T00:00:00Z1h

Speakers: Claudio Guarnieri, Morgan Marquis-Boire

The militarization of the Internet

2013 will be remembered as the year that the Internet lost its innocence for nearly everyone as light was shed on the widespread use of dragnet surveillance by the NSA and intelligence agencies globally. With the uprisings of the Arab Spring where people raided the offices of their regimes to bring evidence to light, we've seen a tremendous phenomenon: a large numbers of whistleblowers have taken action to inform the public about important details. The WikiLeaks SpyFiles series also shows us important details to corroborate these claims. There is ample evidence about the use and abuses of a multi-billion dollar industry that have now come to light. This evidence includes increasing use of targeted attacks to establish even more invasive control over corporate, government or other so-called legitimate targets.

Speaker: Julia Aksënova

Eine Einführung in die Wirkungsweise psychedelischer Substanzen

Substanzen wie MDMA, Psilocybin, LSD und Ketamin besitzen erhebliches therapeutisches Potential, und die Erforschung ihrer Wirkmechanismen erlaubt Einblicke in die Funktionsweise der menschlichen Psyche. Der trotz Illegalität relativ einfachen Verfügbarkeit steht ein Mangel an Aufklärung über Risiken, Effekte und Pharmakologie gegenüber, dem mit dieser Einführung begegnet werden soll.

Speaker: Christopher Soghoian

Backdoors, Government Hacking and The Next Crypto Wars

Law enforcement agencies claim they are "going dark". Encryption technologies have finally been deployed by software companies, and critically, enabled by default, such that emails are flowing over HTTPS, and disk encryption is now frequently used. Friendly telcos, who were once a one-stop-shop for surveillance can no longer meet the needs of our government. What are the FBI and other law enforcement agencies doing to preserve their spying capabilities?

Speaker: Gal Diskin

Errata FTW

This talk will demonstrate why it is virtually impossible to secure virtual machines implementations properly. In the talk I will try to give an overview of the basics of hardware virtualization technology, the existing attack techniques against virtualization and also explain why it is such a complex problem to create a secure hypervisor. The talk will focus on the low level interfaces and how it affects all aspects of computer platform security. I will also try to review a few interesting Erratas at the end of the talk.

Speaker: Pavol "stick" Rusnak

TREZOR is a hardware wallet for Bitcoin. We identified security of the end users' computer as one of the main problems that block Bitcoin mass adoption.

Speakers: Julian Assange, Jacob

a call to resistance

Finally, the world is aware of the threat of mass surveillance and control, but we still have a fight on our hands, and that fight is both technical and political. Global democracy is not going to protect itself. There has never been a higher demand for a politically-engaged hackerdom. Jacob Appelbaum and Julian Assange discuss what needs to be done if we are going to win.

Speaker: qbi

Ein Streifzug durch die Fehler in der Kryptografie

»Lange Schlüssel sind sicherer als kurze.«
»RSA und/oder AES sind einfach zu implementieren.«
»Für Zufallszahlen reicht es, java.util.Random zu nehmen.«
Solche oder ähnliche Aussagen hört man immer mal wieder. Doch was ist da dran? Welche Fehler werden bei der Benutzung und Implementierung von Kryptografie gern gemacht?

30x117 Die Drohnenkriege (#5532)

  • 2013-12-29T00:00:00Z1h

Speaker: Norbert Schepers

Kriegsführung der Zukunft?

Die Drohnenkriege sind Ausdruck einer rasanten Entwicklung: vom „Krieg gegen den Terror“ nach 9/11 zur Kriegsführung der Zukunft. Einer Zukunft, die gelegentlich der Science Fiction der späten Achtziger zu entstammen scheint, in der Roboter die schmutzigen Kriege der Menschen kämpfen und sich schließlich gegen ihre Schöpfer erheben. Letzteres liegt noch längst nicht im Bereich des Möglichen, aber Wege zur Erschaffung autonomer Kampfroboter werden bereits beschritten. Der Vortrag will das Phänomen des Drohnenkrieges politisch einordnen und einen Ausblick versuchen.

30x118 Das FlipDot-Projekt (#5426)

  • 2013-12-29T00:00:00Z1h

Speaker: RFguy

Spaß mit mechanischer Anzeige

Inbetriebnahme alter Flip-Dot-Anzeigemodule eines
Autobahn-Parkleitsystems zu einer interaktiven Anzeige. Reverse
Engineering des Protokolls und Entwicklung einer Steuerplatine auf
Basis des Raspberry Pi.

2013-12-29T00:00:00Z

30x119 CounterStrike (#5304)

30x119 CounterStrike (#5304)

  • 2013-12-29T00:00:00Z1h

Speaker: FX

Lawful Interception

Lawful Interception is a monitoring access for law enforcement agencies, but also one of the primary data sources of many surveillance programs. (Almost?) every Internet service provider needs to provide LI functionality in its routers. However, LI exposes a larger attack surface to the one being surveilled than any router should. Could this be a mistake?

2013-12-29T00:00:00Z

30x120 Fnord News Show (#5490)

30x120 Fnord News Show (#5490)

  • 2013-12-29T00:00:00Z1h

Speakers: frank, Fefe

Der schonungslose Realitätsabgleich mit Birzarrometer-Rekalibrierung

Im Format einer lockeren Abendshow werden wir die Highlights des Jahres präsentieren, die Meldungen zwischen den Meldungen, die subtilen Sensationen hinter den Schlagzeilen. Kommen Sie, hören Sie, sehen Sie! Lassen Sie sich mitreißen!

2013-12-29T00:00:00Z

30x121 Decoder (#5712)

30x121 Decoder (#5712)

  • 2013-12-29T00:00:00Z1h

Speaker: Klaus Maeck

DECODER is a legendary German film from 1984, based on the themes of William S. Burroughs. Burroughs himself acts in a key scene in the film, along with F.M. Einheit, Christiane F., Genesis P. Orridge a.o.

Speaker: Ztohoven

A parliamentary drama of 223 actors
Moralni_reforma1-462x349

The Czech art collective Ztohoven' project “Moral Reform” was accomplished in collaboration with web security experts. Together they created the unique art concept of a mobile phone mass-hack.

Speaker: Jacob

The militarization of the Internet

Speaker: Michael Brennan

Few hackers will disagree that users are not given enough consideration when building Internet Freedom Tools designed to circumvent censorship and surveillance. But how do we do it? This talk will outline a framework for a user-focused approach to the Development and Impact of Internet Freedom Tools through using ethnography, human-centered design, and the practice of research-based product definition. This talk is intended for developers, researchers, and journalists who seek to understand how better tools can be developed to protect anonymity and provide unfettered access to the Internet.

30x125 Coding your body (#5289)

  • 2013-12-30T00:00:00Z1h

Speaker: Sophie Hiltner

How to decipher the messages of your body

The average movement habits of a clichè hacker are legendary. Cowering for days in front of unergonomic hardware setups, stoic ignorance of hardly decodeable signs of the body like hunger, eye- and backpains. Probably due to a general disinterest in non-digitally engineered systems.

Shouldn’t a true hacker know at least bits and pieces about the codes and signs of the body? We all know bits and pieces.. but are they the correct and helpful ones? We will discuss some technical and biological details of slipped discs, posture disservice and pain. I will show fundamental “red flags” which have to be serviced by a medical geek. But not all medical geeks have a good idea about the body's code, therefore I will also suggest some helpful therapies for the most common cases.
Bottom line: how to code your body to prevent pain without relying on smattering.

Speakers: Eric Michaud, Ryan Lackey

Physically Unclonable Functions for Hardware Tamper Detection

Increasingly, users and their computing hardware are exposed a range of software and hardware attacks, ranging from disk imaging to hardware keylogger installation and beyond. Existing methods are inadequate to fully protect users, particularly from covert physical hardware modifications in the "evil maid" scenario, and yet are very inconvenient. Victims include governments and corporations traveling internationally (e.g. China), anti-government activists in places like Syria, and anyone who is a target of a motivated attacker who can gain physical access.

Physically Unclonable Functions, combined with a trusted mobile device and a network service, can be used to mitigate these risks. We present a novel open-source mobile client and network service which can protect arbitrary hardware from many forms of covert modification and attack, and which when integrated with software, firmware, and policy defenses, can provide greater protection to users and limit potential attack surface. We'll also be showing video of an unreleased tool to the public utilized by surveillance teams.

Speaker: Jöran Muuß-Merholz

Fünf Desillusionen

Der digitale Wandel hat uns grandiose Chancen für selbstbestimmtes, kreatives, kollaboratives, kritisches und demokratisches Lernen gebracht. Wir haben sie nicht genutzt.

Speaker: groente

Contemplations on the essence of hacking and its implications on hacker ethics

Modern society's use of technology as an instrument for domination is deeply problematic. Are instrumentality and domination inherent to the essence of technology? Can hacking provide an alternative approach to technology which can overcome this? How do art and beauty fit into this approach?

Speaker: Seb

"A New Hope" or "The Empire Strikes Back"?

This talk aims to shed some light on recent human rights violations in the context of the use of digital information and communications technology, particularly considering the latest disclosures about the surveillance programmes of Western intelligence services. At the same time, it shall provide information about Amnesty International's positions and activities in this field and invite anybody interested in our work to get involved.

Speaker: Kurt Opsahl

Everything we know about NSA spying

From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation's Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.

Speaker: Kaustubh Srikanth

23rd of December 2008 was a sad day in India for civil liberties. On this day, The Indian Parliament passed the "The Information Technology (Amendment) Act" with no debate in the House, which effectively means is that the government of India now has the power to monitor all digital communications in the country without a court order or a warrant. The "world's largest democracy" strongly leaning towards becoming a surveillance state raises many questions and poses severe challenges for free speech and economic justice in India and globally. This talk will map and review the current political, socio-cultural and legal landscape of mass-surveillance, data protection and censorship in India and analyse how it ties in to the global landscape of surveillance and censorship. It will also aim to create a discussion space to investigate the deeper effects of these so called "welfare" projects and how citizen-led movements can drive the state towards stronger data protection and privacy laws.

30x133 Infrastructure Review (#5609)

  • 2013-12-30T00:00:00Z1h

Speakers: kay, Peter Stuge, florolf, Sebastian, *m, Andi

Presentation of MOC/NOC/VOC/SOC/*OC

Speaker: Peter Schaar

In dem Vortrag beschäftigt sich der Ex-Bundesdatenschützer mit der Rolle der Datenschutzbeauftragten: Welche Durchsetzungsmöglichkeiten haben sie? Wie ist ihr Verhältnis zur Zivilgesellschaft? Welchen Einfluss können sie auf europäischer und internationaler Ebene ausüben?

Speaker: andy

getting out of surveillance state mode

After studying the various levels of activities that come together in BuggedPlanet and realizing the scope and level of implementation of NSA´s SIGINT theatre, it´s propably time to step back, summarize the big picture and ask how we handle it properly.

30x136 Attacking HomeMatic (#5444)

  • 2013-12-30T00:00:00Z1h

Speaker: sathya, Malli

HomeMatic is a good working, inexpensive and quickly spreading home automation system supporting wired as well as (partly AES handshake protected) wireless communication. The first part of our talk deals with security issues of HomeMatic devices and their wireless communication protocol called BidCoS (Bidirectional Communication Standard). In the second part we introduce Homegear, our own interface software to control HomeMatic devices.

In the past few years wireless home automation systems have become increasingly available as a good alternative to wired systems. Since wireless devices are installable without ripping open walls, it is now possible to easily integrate them into an existing building infrastructure. We chose to work with HomeMatic, because we think that through its affordable prices, its good quality and its fast growing portfolio it will become the most widely spread wireless home automation system in Germany.
In this live hacking presentation we will introduce different mechanisms to attack a HomeMatic system. We will show how to sniff BidCoS packets, how to send arbitrary packets in order to emulate a device (e. g. a HomeMatic central) and to control devices.
Some devices use an AES handshake to verify the sender of a command. But not all devices support the handshake and for many devices it is disabled by default. We will demonstrate several attacks making use of this security issue.
After the live hacking part we will give a short introduction into Homegear. Homegear is an interface software, which directly communicates with BidCoS devices and is controllable through XML RPC (XML Remote Procedure Call). It is possible to fully control most HomeMatic devices. We developed it to add features which are not integrated into the official system like controlling valve drives directly to implement custom room temperature control algorithms.

30x137 Dead Man Edition (#5293)

  • 2013-12-30T00:00:00Z1h

Speaker: Sebastian Jekutsch

Auf dem Weg zu fairer Elektronik am Beispiel der Elkos

Die alarmierenden Zustände beim Abbau der Rohstoffe, die in den Bauteilen (z. B. dem Tantal-Elektrolytkondensator) eines Computers stecken, rufen Menschenrechtler auf den Plan. In den U.S.A. ist es 2010 gelungen, ein umstrittenes Gesetz umzusetzen, das die Finanzierung von Kriegsparteien durch Erzhandel regulieren soll. In der EU soll nun ähnliches geschehen. Der Vortrag klärt über die Geschichte auf, nennt Konsequenzen und formuliert Forderungen.

30x138 Security Nightmares (#5413)

  • 2013-12-30T00:00:00Z1h

Speakers: frank, Ron

Damit Sie auch morgen schlecht von Ihrem Computer träumen.

Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?

2013-12-30T00:00:00Z

30x139 Closing Event (#5606)

30x139 Closing Event (#5606)

  • 2013-12-30T00:00:00Z1h

Speaker: ths

Loading...