<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - 23C3: Who can you trust? (mp3)</title>
    <link>https://media.ccc.de/c/23c3</link>
    <description> This feed contains all events from 23c3 as mp3</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:44:52 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/congress/2006/folder-23c3.png</url>
      <title>Chaos Computer Club - 23C3: Who can you trust? (mp3)</title>
      <link>https://media.ccc.de/c/23c3</link>
    </image>
    <item>
      <title>Schlossöffnung bei der Staatssicherheit der DDR (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1759-de-schlossoeffnung_staatssicherheit</link>
      <description>Arthur Meister erläutert das operative Vorgehen und die speziellen Werkzeuge zur Schlossöffnung,
die von der Staatssicherheit der DDR verwendet wurden. Von der opartiven Vorbereitung, über die Erstöffnung bis zur Herstellung von Nachschlüsslen werden speziell von der STASI entwicklete Werkzeuge und deren Einsatz gezeigt.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1759.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1759-de-schlossoeffnung_staatssicherheit.mp3"
        length="461373440"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1759-de-schlossoeffnung_staatssicherheit.mp3?1399728402</guid>
      <dc:identifier>import-3f1e79fba7d576051e</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Arthur Meister</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Werkzeuge und Vorgehen der STASI</itunes:subtitle>
      <itunes:summary>Arthur Meister erläutert das operative Vorgehen und die speziellen Werkzeuge zur Schlossöffnung,
die von der Staatssicherheit der DDR verwendet wurden. Von der opartiven Vorbereitung, über die Erstöffnung bis zur Herstellung von Nachschlüsslen werden speziell von der STASI entwicklete Werkzeuge und deren Einsatz gezeigt.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1759.en.html
</itunes:summary>
      <itunes:duration>00:51:09</itunes:duration>
    </item>
    <item>
      <title>OpenPCD / OpenPICC (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1566-en-openpcd_openpicc</link>
      <description>This presentation will introduce and demonstrate OpenPCD and OpenPICC.  The purpose of those projects is to develop free hardware designs and software for 13.56MHz RFID reader and transponder simulator. OpenPICC can be used to e.g. simulate ISO 14443 or ISO 15693 transponders, such as those being used in biometric passports and FIFA worldcup tickets.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1566.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1566-en-openpcd_openpicc.mp3"
        length="429916160"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1566-en-openpcd_openpicc.mp3?1399728402</guid>
      <dc:identifier>import-f1078d534b35506b91</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Milosch Meriac, Harald Welte</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Free RFID reader and emulator</itunes:subtitle>
      <itunes:summary>This presentation will introduce and demonstrate OpenPCD and OpenPICC.  The purpose of those projects is to develop free hardware designs and software for 13.56MHz RFID reader and transponder simulator. OpenPICC can be used to e.g. simulate ISO 14443 or ISO 15693 transponders, such as those being used in biometric passports and FIFA worldcup tickets.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1566.en.html
</itunes:summary>
      <itunes:duration>01:19:06</itunes:duration>
    </item>
    <item>
      <title>JSON RPC (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1568-en-json_rpc</link>
      <description>JSON RPC is a recently fashionable buzzword in the AJAX context. This lecture explains its principles, specifically the same origin policy for cross site scripting and its relation to JSON RPC, and demonstrates the essential implementation details using the example of the geocoding service in the google maps API.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1568.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1568-en-json_rpc.mp3"
        length="93323264"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1568-en-json_rpc.mp3?1399728402</guid>
      <dc:identifier>import-106c6a69092efb9c66</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>(mesch) Steffen Meschkat</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>Cross Site Scripting and Client Side Web Services</itunes:subtitle>
      <itunes:summary>JSON RPC is a recently fashionable buzzword in the AJAX context. This lecture explains its principles, specifically the same origin policy for cross site scripting and its relation to JSON RPC, and demonstrates the essential implementation details using the example of the geocoding service in the google maps API.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1568.en.html
</itunes:summary>
      <itunes:duration>01:02:40</itunes:duration>
    </item>
    <item>
      <title>CCC Jahresrückblick (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1487-de-ccc_jahresrueckblick</link>
      <description>Die Sprecher des CCC stellen die Aktivitäten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vorträge und Konferenzen, an denen CCC-Vertreter teilgenommen haben.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1487.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1487-de-ccc_jahresrueckblick.mp3"
        length="250609664"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1487-de-ccc_jahresrueckblick.mp3?1399728402</guid>
      <dc:identifier>import-6f018026ae6f6434fa</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Constanze Kurz, Frank Rosengart, Lars Weiler, Andreas Lehner, Andy Müller-Maguhn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:subtitle>Ein Überblick über die Aktivitäten des Clubs 2006</itunes:subtitle>
      <itunes:summary>Die Sprecher des CCC stellen die Aktivitäten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vorträge und Konferenzen, an denen CCC-Vertreter teilgenommen haben.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1487.en.html
</itunes:summary>
      <itunes:duration>00:59:43</itunes:duration>
    </item>
    <item>
      <title>Überwachen und Strafen in Entenhausen (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1651-de-ueberwachen_und_strafen_in_entenhausen</link>
      <description>Mit Michel Foucault in Entenhausen: Der Vortrag wird einen Blick auf die Überwachungsmethoden und die Strafpraxis in der Gumpenmetropole werfen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1651.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1651-de-ueberwachen_und_strafen_in_entenhausen.mp3"
        length="125829120"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1651-de-ueberwachen_und_strafen_in_entenhausen.mp3?1399728402</guid>
      <dc:identifier>import-79ae19c603ca8c97ea</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Henriette Fiebig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:summary>Mit Michel Foucault in Entenhausen: Der Vortrag wird einen Blick auf die Überwachungsmethoden und die Strafpraxis in der Gumpenmetropole werfen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1651.en.html
</itunes:summary>
      <itunes:duration>00:49:02</itunes:duration>
    </item>
    <item>
      <title>Sie haben das Recht zu schweigen (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1346-de-sie_haben_das_recht_zu_schweigen</link>
      <description>Wer online lebt und arbeitet, tut dies unter den Augen der Strafverfolger. Der Vortrag schildert, wie Durchsuchungen, Vernehmungen und Ermittlungsverfahren ablaufen. Er erklärt, wie man sich gegenüber Polizei und Staatsanwaltschaft richtig verhält.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1346.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1346-de-sie_haben_das_recht_zu_schweigen.mp3"
        length="365953024"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1346-de-sie_haben_das_recht_zu_schweigen.mp3?1399728402</guid>
      <dc:identifier>import-73f7a87aafc447fa0b</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Udo Vetter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Durchsuchung, Beschlagnahme, Vernehmung - Strategien für den Umgang mit Polizei und Staatsanwalt</itunes:subtitle>
      <itunes:summary>Wer online lebt und arbeitet, tut dies unter den Augen der Strafverfolger. Der Vortrag schildert, wie Durchsuchungen, Vernehmungen und Ermittlungsverfahren ablaufen. Er erklärt, wie man sich gegenüber Polizei und Staatsanwaltschaft richtig verhält.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1346.en.html
</itunes:summary>
      <itunes:duration>01:11:16</itunes:duration>
    </item>
    <item>
      <title>Secure Network Server Programming on Unix (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1446-en-secure_network_server_programming_on_unix</link>
      <description>This talk describes a software system to securely execute predefined commands over an untrusted network, analyzes the potential attack vectors against this system and defines countermeasures to make it impossible for an attacker to use these attack vectors.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1446.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1446-en-secure_network_server_programming_on_unix.mp3"
        length="88080384"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1446-en-secure_network_server_programming_on_unix.mp3?1399728402</guid>
      <dc:identifier>import-d8ab7a89bd5682b6d7</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Andreas Krennmair</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Techniques and best practices to securely code your network server</itunes:subtitle>
      <itunes:summary>This talk describes a software system to securely execute predefined commands over an untrusted network, analyzes the potential attack vectors against this system and defines countermeasures to make it impossible for an attacker to use these attack vectors.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1446.en.html
</itunes:summary>
      <itunes:duration>00:45:50</itunes:duration>
    </item>
    <item>
      <title>Who can you trust? (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1256-en-who_can_you_trust</link>
      <description>Opening event of the 23rd Chaos Communication Congress. After a welcome talk, the 23C3&#39;s keynote will be delivered.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1256.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1256-en-who_can_you_trust.mp3"
        length="312475648"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1256-en-who_can_you_trust.mp3?1399728402</guid>
      <dc:identifier>import-74174aec9e7f633fc0</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Tim Pritlove, John Perry Barlow</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, General</itunes:keywords>
      <itunes:subtitle>Opening Ceremony and Keynote</itunes:subtitle>
      <itunes:summary>Opening event of the 23rd Chaos Communication Congress. After a welcome talk, the 23C3&#39;s keynote will be delivered.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1256.en.html
</itunes:summary>
      <itunes:duration>01:04:49</itunes:duration>
    </item>
    <item>
      <title>Überwachungsdruck - einige Experimente (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1679-de-ueberwachungsdruck</link>
      <description>Wie wirkt Überwachung? Was ändert es am Verhalten von Passanten? Wir haben Experimente im öffentlichen Raum durchgeführt und präsentieren die Ergebnisse.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1679.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1679-de-ueberwachungsdruck.mp3"
        length="239075328"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1679-de-ueberwachungsdruck.mp3?1399728402</guid>
      <dc:identifier>import-a05afcf3d77e5f5471</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Adrian Dabrowski, Martin Slunsky</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Wie wirkt Überwachung?</itunes:subtitle>
      <itunes:summary>Wie wirkt Überwachung? Was ändert es am Verhalten von Passanten? Wir haben Experimente im öffentlichen Raum durchgeführt und präsentieren die Ergebnisse.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1679.en.html
</itunes:summary>
      <itunes:duration>01:08:23</itunes:duration>
    </item>
    <item>
      <title>The Rise and Fall of Open Source (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1523-en-the_rise_and_fall_of_open_source</link>
      <description>This lecture outlines a possible future retrospective on OpenSource built from a simple continuation of current trends.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1523.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1523-en-the_rise_and_fall_of_open_source.mp3"
        length="174063616"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1523-en-the_rise_and_fall_of_open_source.mp3?1399728402</guid>
      <dc:identifier>import-db54e58bf23eac0f57</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Tonnerre Lombard</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:subtitle>The Million Eyeball Principle and forkbombs</itunes:subtitle>
      <itunes:summary>This lecture outlines a possible future retrospective on OpenSource built from a simple continuation of current trends.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1523.en.html
</itunes:summary>
      <itunes:duration>00:46:33</itunes:duration>
    </item>
    <item>
      <title>Counter-Development (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1520-en-counter_development</link>
      <description>Civil disobedience is a fundamental human right in all democracies, and it has to be accessible for everyone.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1520.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1520-en-counter_development.mp3"
        length="254803968"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1520-en-counter_development.mp3?1399728402</guid>
      <dc:identifier>import-c3b0ca4630d7507e90</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Sandro Gaycken</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>The Accessibility of Technology as an Addendum to Engineering Ethics in the Knowledgeable Society</itunes:subtitle>
      <itunes:summary>Civil disobedience is a fundamental human right in all democracies, and it has to be accessible for everyone.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1520.en.html
</itunes:summary>
      <itunes:duration>01:03:22</itunes:duration>
    </item>
    <item>
      <title>Rootkits as Reversing Tools (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1688-en-rootkits_as_reversing_tools</link>
      <description>This talk will cover two rootkits used as reverse engineering tools, one rootkit support library, one IDA plugin, and talk setup material. The talk itself will be given over VOIP and VNC running over the Tor network to demonstrate a proof of concept on anonymous public speech.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1688.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1688-en-rootkits_as_reversing_tools.mp3"
        length="262144000"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1688-en-rootkits_as_reversing_tools.mp3?1399728402</guid>
      <dc:identifier>import-d09b45ac831b75ea90</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Alan Bradley</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>An Anonymous Talk</itunes:subtitle>
      <itunes:summary>This talk will cover two rootkits used as reverse engineering tools, one rootkit support library, one IDA plugin, and talk setup material. The talk itself will be given over VOIP and VNC running over the Tor network to demonstrate a proof of concept on anonymous public speech.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1688.en.html
</itunes:summary>
      <itunes:duration>01:03:15</itunes:duration>
    </item>
    <item>
      <title>Freie Software - Eine Chance für Afrika? (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1638-de-freie_software</link>
      <description>In einem Dokumentationsbericht über ein &quot;Free Software Projekt&quot; erzählt Alex Antener von seinen Reisen nach Malawi in Zentralafrika und berichtet über die Erfahrungen des kulturübergreifenden Engagements an der Universität in Malawi. Der Erfahrungsbericht zeigt Möglichkeiten, Einflüsse und mögliche Alternativlösungen zu den neoimperialistischen Machenschaften der Monopolisten in der dritten Welt.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1638.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1638-de-freie_software.mp3"
        length="190840832"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1638-de-freie_software.mp3?1399728402</guid>
      <dc:identifier>import-aa1a4dc28be69ad7a8</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Alex Antener</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:subtitle>Ein Erfahrungsbericht aus Malawi</itunes:subtitle>
      <itunes:summary>In einem Dokumentationsbericht über ein &quot;Free Software Projekt&quot; erzählt Alex Antener von seinen Reisen nach Malawi in Zentralafrika und berichtet über die Erfahrungen des kulturübergreifenden Engagements an der Universität in Malawi. Der Erfahrungsbericht zeigt Möglichkeiten, Einflüsse und mögliche Alternativlösungen zu den neoimperialistischen Machenschaften der Monopolisten in der dritten Welt.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1638.en.html
</itunes:summary>
      <itunes:duration>00:46:48</itunes:duration>
    </item>
    <item>
      <title>Krypta: DIY Serverhousing (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1593-de-krypta</link>
      <description>Funkfeuer (0xFF), als freie Netzwerkinitiative in Wien eine Schwester von Freifunk, begann vor 2 Jahren damit ein &quot;Community Serverhousing&quot; aufzubauen. Wie beim Aufstellen von WLan Router, stoesst man dabei auf logistische, technische und soziale Aufgaben, die es zu loesen gilt um erfolgreich kostendeckend in Betrieb gehen zu koennen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1593.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1593-de-krypta.mp3"
        length="155189248"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1593-de-krypta.mp3?1399728402</guid>
      <dc:identifier>import-f7d402ba7e693a8783</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Chris Kummerer, Markus Sulzbacher, Andreas Marksteiner, Teemu Schaabl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:summary>Funkfeuer (0xFF), als freie Netzwerkinitiative in Wien eine Schwester von Freifunk, begann vor 2 Jahren damit ein &quot;Community Serverhousing&quot; aufzubauen. Wie beim Aufstellen von WLan Router, stoesst man dabei auf logistische, technische und soziale Aufgaben, die es zu loesen gilt um erfolgreich kostendeckend in Betrieb gehen zu koennen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1593.en.html
</itunes:summary>
      <itunes:duration>01:03:49</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 1 (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1514-en-lightning_talks_day_1</link>
      <description>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1514.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1514-en-lightning_talks_day_1.mp3"
        length="284164096"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1514-en-lightning_talks_day_1.mp3?1399728402</guid>
      <dc:identifier>import-c50f2b33dd2c1a31d6</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>b9punk, Sven Guckes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3</itunes:keywords>
      <itunes:summary>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1514.en.html
</itunes:summary>
      <itunes:duration>00:58:08</itunes:duration>
    </item>
    <item>
      <title>Homegrown Interactive Tables (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1512-de-homegrown_interactive_tables</link>
      <description>Technology to build low-cost touch-sensitive tables with high precision is publicly available since the beginning of 2006. The talk will give a practical introduction on building hard- and software of these tables using FTIR sensing pioneered by Jeff Han (see links), based on our experiences in making a table at the c-base.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1512.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1512-de-homegrown_interactive_tables.mp3"
        length="115343360"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1512-de-homegrown_interactive_tables.mp3?1399728402</guid>
      <dc:identifier>import-9ab6de393c480e625b</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Andre Helwig, Christian Bennat, Andreas Dietrich, Ulrich von Zadow, Mirco Fichtner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>Any Technology Sufficiently Advanced is Indistinguishable from Magic</itunes:subtitle>
      <itunes:summary>Technology to build low-cost touch-sensitive tables with high precision is publicly available since the beginning of 2006. The talk will give a practical introduction on building hard- and software of these tables using FTIR sensing pioneered by Jeff Han (see links), based on our experiences in making a table at the c-base.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1512.en.html
</itunes:summary>
      <itunes:duration>00:45:43</itunes:duration>
    </item>
    <item>
      <title>Nerds und Geeks zwischen Stereotyp und Subkultur (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1616-de-nerds_und_geeks</link>
      <description>In dem Vortrag sollen die Ergebnisse einer kulturwissenschaftlichen Forschungsarbeit vorgestellt und diskutiert werden. Dabei wird der Begriff Nerd eher als Konstrukt, und weniger als gegeben betrachtet. Vorgestellt werden vor allem die Ergebnisse aus Interviews, teilnehmender Beobachtung und einer qualitativen Umfrage.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1616.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1616-de-nerds_und_geeks.mp3"
        length="328204288"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1616-de-nerds_und_geeks.mp3?1399728402</guid>
      <dc:identifier>import-a3c03c2aa98ac4efdc</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Mareike Glöß</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>Eine kulturanthropologische Untersuchung</itunes:subtitle>
      <itunes:summary>In dem Vortrag sollen die Ergebnisse einer kulturwissenschaftlichen Forschungsarbeit vorgestellt und diskutiert werden. Dabei wird der Begriff Nerd eher als Konstrukt, und weniger als gegeben betrachtet. Vorgestellt werden vor allem die Ergebnisse aus Interviews, teilnehmender Beobachtung und einer qualitativen Umfrage.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1616.en.html
</itunes:summary>
      <itunes:duration>00:53:13</itunes:duration>
    </item>
    <item>
      <title>Dying Giraffe Recordings: A non-evil recordlabel (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1492-en-dying_giraffe_recordings</link>
      <description>Todays music industry has created a system that is unfair for both the musicians and the music lover. Combined with an agressive prosecution of downloaders, this causes a very strong polarisation between the industry on one hand and music lovers on the other. Nobody wins. We at dying giraffe recordings are trying to break this impasse and create a system where musicans are rewarded for their work and talent, and where music lovers can enjoy music in a fair way. The key element in this is a breakaway from traditional copyright laws and the use of the creative commons license. This combined with new technologies in the field of internet, audio recording and compression gives us the potency to change te system. Thus building a fighting force of extraordinary magnitude we believe that we can beat the system.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1492.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1492-en-dying_giraffe_recordings.mp3"
        length="156237824"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1492-en-dying_giraffe_recordings.mp3?1399728402</guid>
      <dc:identifier>import-1ef82994c3216bacbc</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Christian Tan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>Using the power of creative commons to create an alternative system which is fair for musicians and their fans</itunes:subtitle>
      <itunes:summary>Todays music industry has created a system that is unfair for both the musicians and the music lover. Combined with an agressive prosecution of downloaders, this causes a very strong polarisation between the industry on one hand and music lovers on the other. Nobody wins. We at dying giraffe recordings are trying to break this impasse and create a system where musicans are rewarded for their work and talent, and where music lovers can enjoy music in a fair way. The key element in this is a breakaway from traditional copyright laws and the use of the creative commons license. This combined with new technologies in the field of internet, audio recording and compression gives us the potency to change te system. Thus building a fighting force of extraordinary magnitude we believe that we can beat the system.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1492.en.html
</itunes:summary>
      <itunes:duration>00:56:25</itunes:duration>
    </item>
    <item>
      <title>Go - Das Spiel für die Menschen (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1685-de-go_menschen</link>
      <description>Primitiv einfache Spielregeln aber komplexeste Zusammenhänge, bei denen Computerprogramme kläglich versagen während Menschen auf wundersame Weise (Denk-)Muster erkennen und diese zu genialen Strategien umzusetzen vermögen - das ist Go. Kann uns umgekehrt Go auch Stärken des menschlichen Intellekts aufzeigen? Es werden Parallelen zur Softwareentwicklung gezogen und den Entscheidungsprozessen, denen sich Entwickler dort ausgesetzt sehen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1685.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1685-de-go_menschen.mp3"
        length="261095424"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1685-de-go_menschen.mp3?1399728402</guid>
      <dc:identifier>import-c14923d592d05db823</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Christoph Gerlach</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>Auch für Computer? - Nicht beim Go!</itunes:subtitle>
      <itunes:summary>Primitiv einfache Spielregeln aber komplexeste Zusammenhänge, bei denen Computerprogramme kläglich versagen während Menschen auf wundersame Weise (Denk-)Muster erkennen und diese zu genialen Strategien umzusetzen vermögen - das ist Go. Kann uns umgekehrt Go auch Stärken des menschlichen Intellekts aufzeigen? Es werden Parallelen zur Softwareentwicklung gezogen und den Entscheidungsprozessen, denen sich Entwickler dort ausgesetzt sehen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1685.en.html
</itunes:summary>
      <itunes:duration>00:58:13</itunes:duration>
    </item>
    <item>
      <title>Inside VMware (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1592-en-inside_vmware</link>
      <description>Virtualization is rocket science. In cooperation with the host operating system, VMware takes over complete control of the machine hundreds of times a second, handles pagetables completely manually, and may chose to wire (make-non-pageable) as much memory as it chooses. This talk explains why it still works.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1592.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1592-en-inside_vmware.mp3"
        length="134217728"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1592-en-inside_vmware.mp3?1399728402</guid>
      <dc:identifier>import-54ac75812fba306f63</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Michael Steil</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>How VMware, VirtualPC and Parallels actually work</itunes:subtitle>
      <itunes:summary>Virtualization is rocket science. In cooperation with the host operating system, VMware takes over complete control of the machine hundreds of times a second, handles pagetables completely manually, and may chose to wire (make-non-pageable) as much memory as it chooses. This talk explains why it still works.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1592.en.html
</itunes:summary>
      <itunes:duration>01:08:40</itunes:duration>
    </item>
    <item>
      <title>Warum wir uns so gerne überwachen lassen… (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen</link>
      <description>Das Phänomen steigender Überwachung und Kontrolle ist vielfach beschrieben und diskutiert wurden. Klagen werden allerorts laut und verklingen meist genauso schnell wieder. Innerhalb des Vortrags soll das Phänomen - jenseits einer bloßen Zustandsbeschreibung - soziologisch-philosophisch betrachtet und auf aktuelle internationale Forschungsergebnisse eingegangen werden.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1714.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen.mp3"
        length="264241152"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen.mp3?1399728402</guid>
      <dc:identifier>import-a8982b9c792b3df8d3</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Christine Ketzer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Erhellendes aus Philosophie und Soziologie zur Klärung des Phänomens steigender Kontrolle und Überwachung</itunes:subtitle>
      <itunes:summary>Das Phänomen steigender Überwachung und Kontrolle ist vielfach beschrieben und diskutiert wurden. Klagen werden allerorts laut und verklingen meist genauso schnell wieder. Innerhalb des Vortrags soll das Phänomen - jenseits einer bloßen Zustandsbeschreibung - soziologisch-philosophisch betrachtet und auf aktuelle internationale Forschungsergebnisse eingegangen werden.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1714.en.html
</itunes:summary>
      <itunes:duration>01:02:23</itunes:duration>
    </item>
    <item>
      <title>Podjournalism (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1257-en-podjournalism</link>
      <description>Throughout the world, major media companies are cutting their budgets for investigative reporting.  Most journalists will soon be freelancers, losing their freedom to investigate the more controversial or difficult topics.  Yet at the same time, podcasting as a form of citizen journalism has risen, free of the constraints of organizations and editors.  But without the funding that the tradional media enjoyed, how are podcasting journalists carrying out their work, and what does it mean for the media consumer?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1257.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1257-en-podjournalism.mp3"
        length="230686720"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1257-en-podjournalism.mp3?1399728402</guid>
      <dc:identifier>import-cb58bfabbea5115d54</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Bicyclemark</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>The Role of Podcasting in Critical and Investigative Journalism</itunes:subtitle>
      <itunes:summary>Throughout the world, major media companies are cutting their budgets for investigative reporting.  Most journalists will soon be freelancers, losing their freedom to investigate the more controversial or difficult topics.  Yet at the same time, podcasting as a form of citizen journalism has risen, free of the constraints of organizations and editors.  But without the funding that the tradional media enjoyed, how are podcasting journalists carrying out their work, and what does it mean for the media consumer?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1257.en.html
</itunes:summary>
      <itunes:duration>01:06:48</itunes:duration>
    </item>
    <item>
      <title>How to squeeze more performance out of your wifi (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi</link>
      <description>Most of today&#39;s long-range wireless mesh or point-to-point links suffer from a high overhead during channel access, frequent link failtures and the lack of taking a real advantage of the mesh network structure. This leads to a really bad performance for TCP-like traffic compared to UDP traffic over this links. We want to present your two different ideas for optimizing throughput and delay without breaking any wifi-standard (or at least not too much ;).

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1634.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi.mp3"
        length="181403648"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi.mp3?1399728402</guid>
      <dc:identifier>import-c1870c28577ba8fca5</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Achim Friedland</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>Cross-layer optimization strategies for long-range IEEE 802.11e based radio (mesh) networks</itunes:subtitle>
      <itunes:summary>Most of today&#39;s long-range wireless mesh or point-to-point links suffer from a high overhead during channel access, frequent link failtures and the lack of taking a real advantage of the mesh network structure. This leads to a really bad performance for TCP-like traffic compared to UDP traffic over this links. We want to present your two different ideas for optimizing throughput and delay without breaking any wifi-standard (or at least not too much ;).

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1634.en.html
</itunes:summary>
      <itunes:duration>00:58:57</itunes:duration>
    </item>
    <item>
      <title>Funkerspuk (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1563-en-funkerspuk</link>
      <description>The introduction of radio in the USA and Germany is compared, the role amateurs played and how the respective authorities reacted to them. Questions arise as to how those reactions were models for the treatment of younger communications technologies, and the different approaches to uncontrolled communication will be sketched out. Is &quot;everybody can listen in&quot; a scary thing?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1563.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1563-en-funkerspuk.mp3"
        length="135266304"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1563-en-funkerspuk.mp3?1399728402</guid>
      <dc:identifier>import-909ed6ab4ce1e0379c</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Oona Leganovic</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>radio politics in the USA and Germany in the first half of the 20th century</itunes:subtitle>
      <itunes:summary>The introduction of radio in the USA and Germany is compared, the role amateurs played and how the respective authorities reacted to them. Questions arise as to how those reactions were models for the treatment of younger communications technologies, and the different approaches to uncontrolled communication will be sketched out. Is &quot;everybody can listen in&quot; a scary thing?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1563.en.html
</itunes:summary>
      <itunes:duration>00:52:36</itunes:duration>
    </item>
    <item>
      <title>Jabber-Showcase (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1667-de-jabber_showcase</link>
      <description>Jabber wird von vielen nur als &quot;Open-Source&quot;-ICQ-Ersatz wahrgenommen. Dabei kann Jabber bzw. XMPP noch deutlich mehr, es existieren weit über 100 Protokollerweiterungen, und es werden täglich mehr.

Der Vortrag stellt einige interessante Protokoll-Teile sowie Implementationen vor.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1667.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1667-de-jabber_showcase.mp3"
        length="150994944"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1667-de-jabber_showcase.mp3?1399728402</guid>
      <dc:identifier>import-2f2cce0079d30b15b0</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>fh</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>XMPP ist viel mehr als nur Instant Messaging</itunes:subtitle>
      <itunes:summary>Jabber wird von vielen nur als &quot;Open-Source&quot;-ICQ-Ersatz wahrgenommen. Dabei kann Jabber bzw. XMPP noch deutlich mehr, es existieren weit über 100 Protokollerweiterungen, und es werden täglich mehr.

Der Vortrag stellt einige interessante Protokoll-Teile sowie Implementationen vor.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1667.en.html
</itunes:summary>
      <itunes:duration>00:34:19</itunes:duration>
    </item>
    <item>
      <title>TV-B-Gone (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1708-en-tv_b_gone</link>
      <description>It is possible and desirable and fun to invent and create technologies that help our world. Have you ever wanted to shut off a TV that was annoying you in a public place?  My extraordinarily popular invention, TV-B-Gone has made it fun to turn off TVs in restaurants, pubs, airports...

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1708.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1708-en-tv_b_gone.mp3"
        length="271581184"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1708-en-tv_b_gone.mp3?1399728402</guid>
      <dc:identifier>import-dac1df77a68351eb84</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Mitch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Better Living Through Inventing</itunes:subtitle>
      <itunes:summary>It is possible and desirable and fun to invent and create technologies that help our world. Have you ever wanted to shut off a TV that was annoying you in a public place?  My extraordinarily popular invention, TV-B-Gone has made it fun to turn off TVs in restaurants, pubs, airports...

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1708.en.html
</itunes:summary>
      <itunes:duration>01:01:09</itunes:duration>
    </item>
    <item>
      <title>A Probabilistic Trust Model for GnuPG (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1607-de-probabilistic_trust_model_for_gnupg</link>
      <description>Ein Vertrauensnetz beschreibt einen typischen dezentralen PKI-Ansatz, welcher in der Verschlüsselungssoftware PGP sowie GnuPG umgesetzt worden ist. Es werden einige Nachteile und Schwächen des aktuellen PGP-Vertrauensmodells erläutert. Gleichermaßen wird ein neuer Ansatz sowohl für den Umgang mit Vertrauen, als auch für die Evaluation der Schlüssel-Authentizität präsentiert.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1607.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1607-de-probabilistic_trust_model_for_gnupg.mp3"
        length="338690048"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1607-de-probabilistic_trust_model_for_gnupg.mp3?1399728402</guid>
      <dc:identifier>import-811a4a998765dd6d06</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Markus Wüthrich, Jacek Jonczy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>A new way of evaluating a PGP web of trust by using a probabilistic trust metric</itunes:subtitle>
      <itunes:summary>Ein Vertrauensnetz beschreibt einen typischen dezentralen PKI-Ansatz, welcher in der Verschlüsselungssoftware PGP sowie GnuPG umgesetzt worden ist. Es werden einige Nachteile und Schwächen des aktuellen PGP-Vertrauensmodells erläutert. Gleichermaßen wird ein neuer Ansatz sowohl für den Umgang mit Vertrauen, als auch für die Evaluation der Schlüssel-Authentizität präsentiert.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1607.en.html
</itunes:summary>
      <itunes:duration>00:55:32</itunes:duration>
    </item>
    <item>
      <title>Project Sputnik (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1736-en-project_sputnik</link>
      <description>Project Sputnik is the real-time in-building location tracking system present at the 23C3. The Sputnik is a small active 2.4GHz RF Beacon, whose signal is picked up by one or multiple of the 20+ Sputnik base stations installed in the event venue (bcc).  Attendees of the 23C3 are able to voluntarily participate in this system by purchasing an inexpensive Sputnik transponder which they can carry with them during the whole event.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1736.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1736-en-project_sputnik.mp3"
        length="579862528"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1736-en-project_sputnik.mp3?1399728402</guid>
      <dc:identifier>import-c9f7320f170642feee</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Harald Welte, Milosch Meriac</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Realtime in-building location tracking at the 23C3</itunes:subtitle>
      <itunes:summary>Project Sputnik is the real-time in-building location tracking system present at the 23C3. The Sputnik is a small active 2.4GHz RF Beacon, whose signal is picked up by one or multiple of the 20+ Sputnik base stations installed in the event venue (bcc).  Attendees of the 23C3 are able to voluntarily participate in this system by purchasing an inexpensive Sputnik transponder which they can carry with them during the whole event.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1736.en.html
</itunes:summary>
      <itunes:duration>02:15:57</itunes:duration>
    </item>
    <item>
      <title>Automated Botnet Detection and Mitigation (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1342-en-botnet_detection</link>
      <description>Botnets are one of the most buzzy buzzwords out there today in the computer security world. The presented approach allows us to take reliably care of these, such that managers hopefully will not react on ``botnet&#39;&#39; in 2008 any more. This technology allows for automated catching of malware with the now somewhat known nepenthes daemon, automated analysis with CWSandbox and other sandboxes, automated botnet snooping with the botsnoopd daemon and finally (semi-)automated mitigation using various weapons. Hopefully, our autonomous approach will never turn against the human race and begin the final war...

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1342.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1342-en-botnet_detection.mp3"
        length="90177536"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1342-en-botnet_detection.mp3?1399728402</guid>
      <dc:identifier>import-b30b82b19634b974d9</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Georg &#39;oxff&#39; Wicherski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>How to find, invade and kill botnets automated and effectively</itunes:subtitle>
      <itunes:summary>Botnets are one of the most buzzy buzzwords out there today in the computer security world. The presented approach allows us to take reliably care of these, such that managers hopefully will not react on ``botnet&#39;&#39; in 2008 any more. This technology allows for automated catching of malware with the now somewhat known nepenthes daemon, automated analysis with CWSandbox and other sandboxes, automated botnet snooping with the botsnoopd daemon and finally (semi-)automated mitigation using various weapons. Hopefully, our autonomous approach will never turn against the human race and begin the final war...

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1342.en.html
</itunes:summary>
      <itunes:duration>00:53:21</itunes:duration>
    </item>
    <item>
      <title>Advanced Attacks Against PocketPC Phones (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1545-en-advanced_attacks_against_pocketpc_phones</link>
      <description>Smart phones are the new favorite target of many attackers. Also most current attacks are harmless, since these mostly rely on user mistake or lack of better knowledge. Current attacks are mostly based on logic errors rather then code inject and often are only found by accident. The talk will show some real attacks against smart phones and the kind of vulnerability analysis which lead to their discovery.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1545.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1545-en-advanced_attacks_against_pocketpc_phones.mp3"
        length="201326592"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1545-en-advanced_attacks_against_pocketpc_phones.mp3?1399728401</guid>
      <dc:identifier>import-81fb5c39090d6797a6</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Collin Mulliner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>0wnd by an MMS</itunes:subtitle>
      <itunes:summary>Smart phones are the new favorite target of many attackers. Also most current attacks are harmless, since these mostly rely on user mistake or lack of better knowledge. Current attacks are mostly based on logic errors rather then code inject and often are only found by accident. The talk will show some real attacks against smart phones and the kind of vulnerability analysis which lead to their discovery.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1545.en.html
</itunes:summary>
      <itunes:duration>00:48:01</itunes:duration>
    </item>
    <item>
      <title>Powerpoint Karaoke (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1683-de-powerpoint_karaoke</link>
      <description>Dieser Wettbewerb hat ein einfaches Prinzip: der Vortragende sieht die Folien seiner Präsentation bei Beginn seines Vortrages zum ersten Mal.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1683.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1683-de-powerpoint_karaoke.mp3"
        length="485490688"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1683-de-powerpoint_karaoke.mp3?1399728401</guid>
      <dc:identifier>import-e7ef1b335f3993af93</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Verena Hafner, Constanze Kurz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:summary>Dieser Wettbewerb hat ein einfaches Prinzip: der Vortragende sieht die Folien seiner Präsentation bei Beginn seines Vortrages zum ersten Mal.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1683.en.html
</itunes:summary>
      <itunes:duration>01:33:43</itunes:duration>
    </item>
    <item>
      <title>Culture Jamming &amp; Discordianism (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1698-en-culture_jamming_discordianism</link>
      <description>Discordianism is somewhere between a joke and a religion, and at the same time manages to be something else entirely: social bricolage. This presentation will cover the roots of culture jamming in early art and theatrical movements, and then move through the history of prankster groups and on to Discordianism where the pranksters are prophets.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1698.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1698-en-culture_jamming_discordianism.mp3"
        length="182452224"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1698-en-culture_jamming_discordianism.mp3?1399728401</guid>
      <dc:identifier>import-c1d9076bebc9186722</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Autumn Tyr-Salvia, Fox Magrathea</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>Illegal Art &amp; Religious Bricolage</itunes:subtitle>
      <itunes:summary>Discordianism is somewhere between a joke and a religion, and at the same time manages to be something else entirely: social bricolage. This presentation will cover the roots of culture jamming in early art and theatrical movements, and then move through the history of prankster groups and on to Discordianism where the pranksters are prophets.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1698.en.html
</itunes:summary>
      <itunes:duration>00:51:14</itunes:duration>
    </item>
    <item>
      <title>Void the warranty! (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1622-en-void_the_warranty</link>
      <description>We&#39;re surrounded by blackboxes containing digital technology nowadays.
There are complex devices like cell phones as well as more simple ones that don&#39;t look very digital at all. This lecture shall motivate the listener to take more electronic things apart, examine the mode of operation and modify it.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1622.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1622-en-void_the_warranty.mp3"
        length="272629760"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1622-en-void_the_warranty.mp3?1399728401</guid>
      <dc:identifier>import-0b0bb700744d6dcda6</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Hunz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>How to start analyzing blackboxes</itunes:subtitle>
      <itunes:summary>We&#39;re surrounded by blackboxes containing digital technology nowadays.
There are complex devices like cell phones as well as more simple ones that don&#39;t look very digital at all. This lecture shall motivate the listener to take more electronic things apart, examine the mode of operation and modify it.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1622.en.html
</itunes:summary>
      <itunes:duration>00:52:51</itunes:duration>
    </item>
    <item>
      <title>Building an Open Source PKI using OpenXPKI (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1596-en-openxpki</link>
      <description>OpenXPKI is an open source trust center software, written by the OpenXPKI Project, which aims to create an enterprise-scale PKI solution. You can see what OpenXPKI is all about, what you can do with it out-of-the-box and how you can hack it to your liking.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1596.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1596-en-openxpki.mp3"
        length="337641472"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1596-en-openxpki.mp3?1399728401</guid>
      <dc:identifier>import-3d147238f2f1434907</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Alexander Klink, Michael Bell</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Take a lot of Perl, add some OpenSSL, sprinkle it with a few HSMs, stir, season to taste, enjoy!</itunes:subtitle>
      <itunes:summary>OpenXPKI is an open source trust center software, written by the OpenXPKI Project, which aims to create an enterprise-scale PKI solution. You can see what OpenXPKI is all about, what you can do with it out-of-the-box and how you can hack it to your liking.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1596.en.html
</itunes:summary>
      <itunes:duration>00:54:41</itunes:duration>
    </item>
    <item>
      <title>Mobile phone call encryption (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1495-en-green_phone</link>
      <description>To encrypt all your mobile phones to protect it from overzealous eavesdroppers, you are currently limited to using special hardware such as the Cryptophone. The disadvantage of cryptophone is that it only works with other cryptophones. To work around this, we turn mobile phones from &quot;voice&quot; phones into VOIP phones. Using the SIP protocol for VOIP and IPsec/L2TP or Openvpn as our VPN, Leigh Honeywell and Paul Wouters connect their mobile phones fully encrypted to an Asterisk PBX server.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1495.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1495-en-green_phone.mp3"
        length="139460608"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1495-en-green_phone.mp3?1399728401</guid>
      <dc:identifier>import-1c9d472a2babaafdf2</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Paul Wouters, Leigh Honeywell</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Encrypting (GSM) mobile phone calls  over VPN with an Asterisk PBX</itunes:subtitle>
      <itunes:summary>To encrypt all your mobile phones to protect it from overzealous eavesdroppers, you are currently limited to using special hardware such as the Cryptophone. The disadvantage of cryptophone is that it only works with other cryptophones. To work around this, we turn mobile phones from &quot;voice&quot; phones into VOIP phones. Using the SIP protocol for VOIP and IPsec/L2TP or Openvpn as our VPN, Leigh Honeywell and Paul Wouters connect their mobile phones fully encrypted to an Asterisk PBX server.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1495.en.html
</itunes:summary>
      <itunes:duration>01:09:00</itunes:duration>
    </item>
    <item>
      <title>Güter und Personen &quot;tracken&quot; - Lokalisierung im Pizzamann-Universum (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1663-de-tracking_goods_and_tracing_people</link>
      <description>Dieser Vortrag gibt einen Überblick und geht auf Details von
unterschiedlichen Tracking &amp; Tracing-Technologien ein. Aufbau und
Funktionsweise von solchen Verfolgungssystemen werden kategorisiert
und aufgezeigt; zudem schafft der Vortrag einen Überblick darüber, 
wo solche Tracking-Systeme heute verwendet werden. Dabei werden
insbesondere diverse Sicherheitsaspekte au detail behandelt.

Nachdem aufgezeigt wurde, was alles stattfindet, werden die sozialen
Konsequenzen solcher Systeme beleuchtet. Dabei wird sowohl auf kommerzielle
Aspekte (Änderungen in der Marktmacht) als auch auf den Aspekt der
Konsumentenverfolgung eingegangen, da Konsumenten üblicherweise zwar
wissen sollten, was mit ihren Daten geschieht, das aber höchst selten
der Fall ist.

Der zweite Teil des Vortrags beschäftigt sich dann mit lokalisierenden
Überwachungssystemen der Staaten, und welche Gefahren des Missbrauchs
hierbei entstehen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1663.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1663-de-tracking_goods_and_tracing_people.mp3"
        length="252706816"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1663-de-tracking_goods_and_tracing_people.mp3?1399728401</guid>
      <dc:identifier>import-63fd9556269ebc5a94</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Volker Birk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Technische Mittel und soziale Aspekte des &quot;Tracking &amp; Tracing&quot;</itunes:subtitle>
      <itunes:summary>Dieser Vortrag gibt einen Überblick und geht auf Details von
unterschiedlichen Tracking &amp; Tracing-Technologien ein. Aufbau und
Funktionsweise von solchen Verfolgungssystemen werden kategorisiert
und aufgezeigt; zudem schafft der Vortrag einen Überblick darüber, 
wo solche Tracking-Systeme heute verwendet werden. Dabei werden
insbesondere diverse Sicherheitsaspekte au detail behandelt.

Nachdem aufgezeigt wurde, was alles stattfindet, werden die sozialen
Konsequenzen solcher Systeme beleuchtet. Dabei wird sowohl auf kommerzielle
Aspekte (Änderungen in der Marktmacht) als auch auf den Aspekt der
Konsumentenverfolgung eingegangen, da Konsumenten üblicherweise zwar
wissen sollten, was mit ihren Daten geschieht, das aber höchst selten
der Fall ist.

Der zweite Teil des Vortrags beschäftigt sich dann mit lokalisierenden
Überwachungssystemen der Staaten, und welche Gefahren des Missbrauchs
hierbei entstehen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1663.en.html
</itunes:summary>
      <itunes:duration>01:03:29</itunes:duration>
    </item>
    <item>
      <title>Design and Implementation of an object-oriented, secure TCP/IP Stack (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1656-en-dylan_network_security</link>
      <description>We present a domain-specific language (DSL) capable to describe ad-hoc defined protocols like TCP/IP.
Additionally we developed other libraries, like a flow graph for packet processing and a layering mechanism for protocol stacking, to get a complete TCP/IP stack.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1656.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1656-en-dylan_network_security.mp3"
        length="254803968"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1656-en-dylan_network_security.mp3?1399728401</guid>
      <dc:identifier>import-7f22cde4ed072fc5b9</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Andreas Bogk, Hannes Mehnert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Ethereal^W Wireshark without remote exploits - a proof of concept</itunes:subtitle>
      <itunes:summary>We present a domain-specific language (DSL) capable to describe ad-hoc defined protocols like TCP/IP.
Additionally we developed other libraries, like a flow graph for packet processing and a layering mechanism for protocol stacking, to get a complete TCP/IP stack.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1656.en.html
</itunes:summary>
      <itunes:duration>01:01:35</itunes:duration>
    </item>
    <item>
      <title>On Free, and the Differences between Culture and Code (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1760-en-on_free</link>
      <description>

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1760.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1760-en-on_free.mp3"
        length="318767104"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1760-en-on_free.mp3?1399728401</guid>
      <dc:identifier>import-a114fda3b438854fec</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Lawrence Lessig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:summary>

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1760.en.html
</itunes:summary>
      <itunes:duration>01:16:24</itunes:duration>
    </item>
    <item>
      <title>Detecting temperature through clock skew (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1513-en-detecting_temperature_through_clock_skew</link>
      <description>By requesting timestamps from a computer, a remote adversary can find out the precise speed of its system clock. As each clock crystal is slightly different, and varies with temperature, this can act as a fingerprint of the computer and its location.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1513-en-detecting_temperature_through_clock_skew.mp3"
        length="243269632"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1513-en-detecting_temperature_through_clock_skew.mp3?1399728401</guid>
      <dc:identifier>import-a1a87b23e3d9657c68</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Steven J. Murdoch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Hot or Not: Defeating anonymity by monitoring clock skew to remotely detect the temperature of a PC</itunes:subtitle>
      <itunes:summary>By requesting timestamps from a computer, a remote adversary can find out the precise speed of its system clock. As each clock crystal is slightly different, and varies with temperature, this can act as a fingerprint of the computer and its location.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html
</itunes:summary>
      <itunes:duration>01:02:48</itunes:duration>
    </item>
    <item>
      <title>Fuzzing in the corporate world (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1758-en-fuzzing_corporate_world</link>
      <description>We will discuss fuzzing uses by software vendors and in the corporate world, for security auditing (&quot;fuzzing before release&quot;) and third party testing (&quot;fuzzing before purchase&quot;). We will look at what contributed to this change in the use of fuzzing tools from home-grown hacking tools to commercial products, as well as how these organizations implement fuzzing into their development cycle.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1758.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1758-en-fuzzing_corporate_world.mp3"
        length="260046848"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1758-en-fuzzing_corporate_world.mp3?1399728401</guid>
      <dc:identifier>import-7f89d23c34c725db07</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Gadi Evron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:subtitle>The use of fuzzing in the corporate world over the years and recent implementation of fuzzing tools into the development cycle and as a requirement before purchase</itunes:subtitle>
      <itunes:summary>We will discuss fuzzing uses by software vendors and in the corporate world, for security auditing (&quot;fuzzing before release&quot;) and third party testing (&quot;fuzzing before purchase&quot;). We will look at what contributed to this change in the use of fuzzing tools from home-grown hacking tools to commercial products, as well as how these organizations implement fuzzing into their development cycle.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1758.en.html
</itunes:summary>
      <itunes:duration>00:53:12</itunes:duration>
    </item>
    <item>
      <title>Security in the cardholder data processing?! (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1457-en-credit_card_security</link>
      <description>MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1457.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1457-en-credit_card_security.mp3"
        length="270532608"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1457-en-credit_card_security.mp3?1399728401</guid>
      <dc:identifier>import-599ee41bb3c5d7aa87</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Manuel Atug</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Experiences and lessons learned with the Payment Card Industry Data Security Standard</itunes:subtitle>
      <itunes:summary>MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1457.en.html
</itunes:summary>
      <itunes:duration>01:11:52</itunes:duration>
    </item>
    <item>
      <title>sFlow (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1644-en-sflow</link>
      <description>The explosion of internet traffic is leading to higher bandwidths and an increased need for high speed networks. To analyze and optimize such networks an efficient monitoring system is required. The sFlow standard describes a mechanism to capture traffic data in switched or routed networks. It uses a sampling technology to collect statistics from the device and is for this reason applicable to high speed connections (at gigabit speeds or higher).

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1644.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1644-en-sflow.mp3"
        length="117440512"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1644-en-sflow.mp3?1399728401</guid>
      <dc:identifier>import-b6012b5b50d2444d03</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Elisa Jasinska</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>I can feel your traffic</itunes:subtitle>
      <itunes:summary>The explosion of internet traffic is leading to higher bandwidths and an increased need for high speed networks. To analyze and optimize such networks an efficient monitoring system is required. The sFlow standard describes a mechanism to capture traffic data in switched or routed networks. It uses a sampling technology to collect statistics from the device and is for this reason applicable to high speed connections (at gigabit speeds or higher).

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1644.en.html
</itunes:summary>
      <itunes:duration>00:48:39</itunes:duration>
    </item>
    <item>
      <title>Stealth malware - can good guys win? (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1381-en-stealth_malware</link>
      <description>The presentation will try to present current challenges in detecting advanced forms of stealth malware and explain why current detection approaches, as used in commercial A/V or IDS products, are insufficient.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1381.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1381-en-stealth_malware.mp3"
        length="304087040"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1381-en-stealth_malware.mp3?1399728401</guid>
      <dc:identifier>import-642660b4ee88817288</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Joanna Rutkowska</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Challenges in detecting system compromises and why we’re so far behind the (smart) bad guys</itunes:subtitle>
      <itunes:summary>The presentation will try to present current challenges in detecting advanced forms of stealth malware and explain why current detection approaches, as used in commercial A/V or IDS products, are insufficient.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1381.en.html
</itunes:summary>
      <itunes:duration>01:18:55</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 3 (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1516-en-lightning_talks_day_3</link>
      <description>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1516.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1516-en-lightning_talks_day_3.mp3"
        length="243269632"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1516-en-lightning_talks_day_3.mp3?1399728401</guid>
      <dc:identifier>import-5e422c2c63c5cffb01</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>b9punk, Sven Guckes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3</itunes:keywords>
      <itunes:summary>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1516.en.html
</itunes:summary>
      <itunes:duration>01:09:08</itunes:duration>
    </item>
    <item>
      <title>Black Ops 2006 Viz Edition (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1713-en-black_ops_2006</link>
      <description>Tools for visualizing the genome can be repurposed to visualize code. Visualized code can be used as a map for fuzzing efforts, change identification, and showing your mom what you do for a living. I&#39;m going to demonstrate a series of tools that brings a new, half-automated, half-visually driven approach to data manipulation and destruction.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1713.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1713-en-black_ops_2006.mp3"
        length="249561088"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1713-en-black_ops_2006.mp3?1399728401</guid>
      <dc:identifier>import-ecb0e5ebfd05aa20b9</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Dan Kaminsky</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Pixel Fuzzing and the Bioinformatic Bindiff</itunes:subtitle>
      <itunes:summary>Tools for visualizing the genome can be repurposed to visualize code. Visualized code can be used as a map for fuzzing efforts, change identification, and showing your mom what you do for a living. I&#39;m going to demonstrate a series of tools that brings a new, half-automated, half-visually driven approach to data manipulation and destruction.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1713.en.html
</itunes:summary>
      <itunes:duration>00:55:19</itunes:duration>
    </item>
    <item>
      <title>Unlocking FileVault (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1642-en-unlocking_filevault</link>
      <description>Analysis of the MacOS X storage encryption technology FileVault. Having fun by reverse-engineering private Frameworks under MacOS X.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1642.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1642-en-unlocking_filevault.mp3"
        length="214958080"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1642-en-unlocking_filevault.mp3?1399728401</guid>
      <dc:identifier>import-b44a02e908289fda31</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Ralf-Philipp Weinmann, Jacob Appelbaum</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>An analysis of Apple&#39;s encrypted disk storage system</itunes:subtitle>
      <itunes:summary>Analysis of the MacOS X storage encryption technology FileVault. Having fun by reverse-engineering private Frameworks under MacOS X.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1642.en.html
</itunes:summary>
      <itunes:duration>00:54:17</itunes:duration>
    </item>
    <item>
      <title>Biometrics in Science Fiction (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1600-en-biometrics</link>
      <description>It is a buzzword at the moment: biometrics. Everyone is talking about it and consumers are buying laptops with shiny finger print scanners. This talk will take a look at biometrics in science fiction films.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1600.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1600-en-biometrics.mp3"
        length="218103808"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1600-en-biometrics.mp3?1399728401</guid>
      <dc:identifier>import-a24ed08b895b751d60</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Roland Kubica, Constanze Kurz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>2nd Iteration</itunes:subtitle>
      <itunes:summary>It is a buzzword at the moment: biometrics. Everyone is talking about it and consumers are buying laptops with shiny finger print scanners. This talk will take a look at biometrics in science fiction films.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1600.en.html
</itunes:summary>
      <itunes:duration>01:03:04</itunes:duration>
    </item>
    <item>
      <title>Konrad Zuse - Der rechnende Raum (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1555-de-konrad_zuse_der_rechnende_raum</link>
      <description>Er gilt als der deutsche Pionier der frühen Rechentechnik: Konrad Zuse. Sein Leben, seine Rechenmaschinen und seine Firma Zuse KG werden in diesem live gesprochenen dokumentarischen Feature der Hörspielwerkstatt der Humboldt-Universität zu Berlin porträtiert.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1555.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1555-de-konrad_zuse_der_rechnende_raum.mp3"
        length="101711872"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1555-de-konrad_zuse_der_rechnende_raum.mp3?1399728401</guid>
      <dc:identifier>import-db810b7b54ae90e958</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Marcus Richter, Constanze Kurz, Ina Kwasniewski, Jens-Martin Loebel, Kai Kittler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>Ein audiovisuelles Live-Feature</itunes:subtitle>
      <itunes:summary>Er gilt als der deutsche Pionier der frühen Rechentechnik: Konrad Zuse. Sein Leben, seine Rechenmaschinen und seine Firma Zuse KG werden in diesem live gesprochenen dokumentarischen Feature der Hörspielwerkstatt der Humboldt-Universität zu Berlin porträtiert.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1555.en.html
</itunes:summary>
      <itunes:duration>00:51:45</itunes:duration>
    </item>
    <item>
      <title>How to implement bignum arithmetic (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1658-en-bignum_arithmetic</link>
      <description>Assembly language skills are a bonus, but not strictly required. This lecture will explain how software like OpenSSL and GnuPG do their arithmetic on 1024 bit numbers.  This is not about how RSA works, or about how AES works. This is just about how to add and multiply big numbers. I will explain the algorithms, show some code, and give some timings.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1658.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1658-en-bignum_arithmetic.mp3"
        length="84934656"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1658-en-bignum_arithmetic.mp3?1399728401</guid>
      <dc:identifier>import-6208bdaf46f4c64c2b</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Felix von Leitner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>A short look at my pet project implementation</itunes:subtitle>
      <itunes:summary>Assembly language skills are a bonus, but not strictly required. This lecture will explain how software like OpenSSL and GnuPG do their arithmetic on 1024 bit numbers.  This is not about how RSA works, or about how AES works. This is just about how to add and multiply big numbers. I will explain the algorithms, show some code, and give some timings.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1658.en.html
</itunes:summary>
      <itunes:duration>00:47:43</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 4 (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1517-en-lightning_talks_day_4</link>
      <description>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1517.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1517-en-lightning_talks_day_4.mp3"
        length="652214272"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1517-en-lightning_talks_day_4.mp3?1399728401</guid>
      <dc:identifier>import-519513c2cae6de84b6</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Sven Guckes, b9punk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3</itunes:keywords>
      <itunes:summary>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1517.en.html
</itunes:summary>
      <itunes:duration>02:19:22</itunes:duration>
    </item>
    <item>
      <title>SIP Security (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1459-en-sip_security</link>
      <description>The presentation will give an overview on SIP security issues and show possible weaknesses in current implementations using SIP (Hardphones, Softphones, Gateways). Further, an outlook on the security of future, serverless SIP systems (P2P-SIP) will be given.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1459.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1459-en-sip_security.mp3"
        length="146800640"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1459-en-sip_security.mp3?1399728401</guid>
      <dc:identifier>import-a2f76e0e6e36e4f021</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Jan Seedorf</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>Status Quo and Future Issues</itunes:subtitle>
      <itunes:summary>The presentation will give an overview on SIP security issues and show possible weaknesses in current implementations using SIP (Hardphones, Softphones, Gateways). Further, an outlook on the security of future, serverless SIP systems (P2P-SIP) will be given.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1459.en.html
</itunes:summary>
      <itunes:duration>01:02:39</itunes:duration>
    </item>
    <item>
      <title>Software Reliability in Aerospace (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1627-en-software_reliability</link>
      <description>The challenge of designing reliable is managed different in every
industry. This lecture will give an overview how safety critical and
reliable software is designed and produced in the area of aerospace
industry and why this could also be interesting for other
applications (like web-design)

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1627.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1627-en-software_reliability.mp3"
        length="113246208"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1627-en-software_reliability.mp3?1399728401</guid>
      <dc:identifier>import-4db021b498e759c3e0</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Erwin Erkinger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>An overview on design and generation of safe and reliable Software</itunes:subtitle>
      <itunes:summary>The challenge of designing reliable is managed different in every
industry. This lecture will give an overview how safety critical and
reliable software is designed and produced in the area of aerospace
industry and why this could also be interesting for other
applications (like web-design)

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1627.en.html
</itunes:summary>
      <itunes:duration>00:57:08</itunes:duration>
    </item>
    <item>
      <title>To live outside the law you gotta be honest (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1540-de-learn_to_be_honest</link>
      <description>As a dealer of illegal substances in the late 60s, early 70s, I learned how to work without written contracts and without advertising.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1540.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1540-de-learn_to_be_honest.mp3"
        length="110100480"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1540-de-learn_to_be_honest.mp3?1399728401</guid>
      <dc:identifier>import-3358e29cb284c40d70</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Werner Pieper</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Ist nicht jedes Passwort eine Manifestation des Mißtrauens?</itunes:subtitle>
      <itunes:summary>As a dealer of illegal substances in the late 60s, early 70s, I learned how to work without written contracts and without advertising.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1540.en.html
</itunes:summary>
      <itunes:duration>00:54:53</itunes:duration>
    </item>
    <item>
      <title>Bluetooth Hacking Revisited (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1733-en-bluetooth_hacking_revisited</link>
      <description>Hacking Bluetooth revisited - This talks goes into the depth of Bluetooth security, we&#39;ll show attacks on every possible bluetooth layer including Application Layer, lower layers. We&#39;ll break the drivers, the implementation, the applications and the _protocol itself_. At the end of this talk we hope we have achieved a Prardigm shift with regards on how you perceive Bluetooth Security in General. It&#39;s not only for toys.

On the Operational side, we&#39;ll go into what risks BT poses for your company, why your policies fail and why your current Security Layers aren&#39;t enough.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1733.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1733-en-bluetooth_hacking_revisited.mp3"
        length="246415360"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1733-en-bluetooth_hacking_revisited.mp3?1399728401</guid>
      <dc:identifier>import-1a4080ee807514e9de</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Kevin Finistere, Thierry Zoller</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:summary>Hacking Bluetooth revisited - This talks goes into the depth of Bluetooth security, we&#39;ll show attacks on every possible bluetooth layer including Application Layer, lower layers. We&#39;ll break the drivers, the implementation, the applications and the _protocol itself_. At the end of this talk we hope we have achieved a Prardigm shift with regards on how you perceive Bluetooth Security in General. It&#39;s not only for toys.

On the Operational side, we&#39;ll go into what risks BT poses for your company, why your policies fail and why your current Security Layers aren&#39;t enough.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1733.en.html
</itunes:summary>
      <itunes:duration>01:02:28</itunes:duration>
    </item>
    <item>
      <title>4+2+1 Jahre BigBrotherAwards Deutschland (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1561-de-big_brother_awards</link>
      <description>Vorgestellt wird das &quot;Schwarzbuch Datenschutz&quot;, das in diesem Jahr entstanden ist: Sieben Jahre BigBrotherAwards Deutschland sind gelaufen. Was ist passiert und was bleibt übrig? Eine Rückschau auf die interessantesten Gewinner der ersten sechs Jahre, die im Buch &quot;Schwarzbuch Datenschutz&quot; zusammengefasst wurden, und auf die aktuellen Preisträger.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1561.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1561-de-big_brother_awards.mp3"
        length="256901120"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1561-de-big_brother_awards.mp3?1399728401</guid>
      <dc:identifier>import-18f66a038ddc2f30c7</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Rena Tangens, padeluun</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Eine Lesung aus dem Buch &quot;Schwarzbuch Datenschutz&quot;</itunes:subtitle>
      <itunes:summary>Vorgestellt wird das &quot;Schwarzbuch Datenschutz&quot;, das in diesem Jahr entstanden ist: Sieben Jahre BigBrotherAwards Deutschland sind gelaufen. Was ist passiert und was bleibt übrig? Eine Rückschau auf die interessantesten Gewinner der ersten sechs Jahre, die im Buch &quot;Schwarzbuch Datenschutz&quot; zusammengefasst wurden, und auf die aktuellen Preisträger.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1561.en.html
</itunes:summary>
      <itunes:duration>00:52:56</itunes:duration>
    </item>
    <item>
      <title>Fnord Jahresrückblick (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1429-de-fnord_jahresrueckblick</link>
      <description>This talk will be held in German.

Der Fnord-Jahresrückblick widmet sich der politischen und sozialen Entwicklung der Welt im letzten Jahr im Zeitraffer. Mainstream-Nachrichten finden dabei nur Beachtung, wenn sie besonders schöne Fnords enthalten. Strukturen, Verschwörungen und lustige neue Trends, die Euch sonst entgangen wären oder schon wieder vergessen sind.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1429.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1429-de-fnord_jahresrueckblick.mp3"
        length="228589568"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1429-de-fnord_jahresrueckblick.mp3?1399728401</guid>
      <dc:identifier>import-28470ad4e077177a78</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rieger, Felix von Leitner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:subtitle>Wir helfen Euch, die Fnords zu sehen</itunes:subtitle>
      <itunes:summary>This talk will be held in German.

Der Fnord-Jahresrückblick widmet sich der politischen und sozialen Entwicklung der Welt im letzten Jahr im Zeitraffer. Mainstream-Nachrichten finden dabei nur Beachtung, wenn sie besonders schöne Fnords enthalten. Strukturen, Verschwörungen und lustige neue Trends, die Euch sonst entgangen wären oder schon wieder vergessen sind.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1429.en.html
</itunes:summary>
      <itunes:duration>01:01:49</itunes:duration>
    </item>
    <item>
      <title>Console Hacking 2006 (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1606-en-console_hacking_2006</link>
      <description>&quot;Next Generation&quot; gaming consoles should not be limited to games, they have powerful hardware which we want to exploit for our needs. The talk gives a hardware overview of each of the 3 consoles, an overview of their security systems, as well as an update on hacking the Xbox 360, which has been on the market for about a year.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1606.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1606-en-console_hacking_2006.mp3"
        length="139460608"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1606-en-console_hacking_2006.mp3?1399728401</guid>
      <dc:identifier>import-49fe42523b9cb3d932</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Felix Domke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Xbox 360, Playstation 3, Wii</itunes:subtitle>
      <itunes:summary>&quot;Next Generation&quot; gaming consoles should not be limited to games, they have powerful hardware which we want to exploit for our needs. The talk gives a hardware overview of each of the 3 consoles, an overview of their security systems, as well as an update on hacking the Xbox 360, which has been on the market for about a year.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1606.en.html
</itunes:summary>
      <itunes:duration>00:50:25</itunes:duration>
    </item>
    <item>
      <title>&quot;We are great together, the liberal society and its enemies!&quot; (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1347-en-we_are_great_together</link>
      <description>A talk medley from monochrom, a worldwide operating collective from Vienna dealing with technology, art, context hacking, and philosophy which was founded in 1993. They specialize in an unpeculiar mixture of proto-aesthetic fringe work, pop attitude, subcultural science, and political activism. Their mission is conducted everywhere, but first and foremost &quot;in culture-archaeological digs into the seats (and pockets) of ideology and entertainment&quot;.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1347.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1347-en-we_are_great_together.mp3"
        length="219152384"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1347-en-we_are_great_together.mp3?1399728401</guid>
      <dc:identifier>import-f7a9d70ee5cd203be2</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Johannes Grenzfurthner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>monochrom</itunes:subtitle>
      <itunes:summary>A talk medley from monochrom, a worldwide operating collective from Vienna dealing with technology, art, context hacking, and philosophy which was founded in 1993. They specialize in an unpeculiar mixture of proto-aesthetic fringe work, pop attitude, subcultural science, and political activism. Their mission is conducted everywhere, but first and foremost &quot;in culture-archaeological digs into the seats (and pockets) of ideology and entertainment&quot;.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1347.en.html
</itunes:summary>
      <itunes:duration>01:00:25</itunes:duration>
    </item>
    <item>
      <title>Pornography and Technology (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1422-en-pornography_and_technology</link>
      <description>Pornography is an abstract phenomenon. It cannot exist without a medium to propagate it, and it has very little (if anything at all) to do with sex. The relationship between pornography, which is entirely fictional and sex, which is very real, very sweaty and mostly not a very aesthetic thing is something like the correlation of science-fiction literature and technological innovation: sometimes the ideas are bizarre, completely nuts and would never work without a Heisenberg Compensator - but sometimes some fragment lasts and is taken to the real world.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1422.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1422-en-pornography_and_technology.mp3"
        length="112197632"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1422-en-pornography_and_technology.mp3?1399728401</guid>
      <dc:identifier>import-b59b49e433ecf74450</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Tina Lorenz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>a love affair</itunes:subtitle>
      <itunes:summary>Pornography is an abstract phenomenon. It cannot exist without a medium to propagate it, and it has very little (if anything at all) to do with sex. The relationship between pornography, which is entirely fictional and sex, which is very real, very sweaty and mostly not a very aesthetic thing is something like the correlation of science-fiction literature and technological innovation: sometimes the ideas are bizarre, completely nuts and would never work without a Heisenberg Compensator - but sometimes some fragment lasts and is taken to the real world.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1422.en.html
</itunes:summary>
      <itunes:duration>00:40:14</itunes:duration>
    </item>
    <item>
      <title>Introduction to matrix programming: trance codes (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1619-en-introduction_to_matrix_programming</link>
      <description>The main communication streams in our realities happen besides the exchange of facts and arguments. &quot;The matrix&quot; is built on emotions! Trance coded communication patterns are a natural thing to exchange emotions between individuals. Using them is as normal, as not to be aware of it. But once you recognize the patterns, it is playtime!

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1619.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1619-en-introduction_to_matrix_programming.mp3"
        length="241172480"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1619-en-introduction_to_matrix_programming.mp3?1399728401</guid>
      <dc:identifier>import-7837c4968ac13514ce</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>ulong</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>How to recognize trance coded communication patterns</itunes:subtitle>
      <itunes:summary>The main communication streams in our realities happen besides the exchange of facts and arguments. &quot;The matrix&quot; is built on emotions! Trance coded communication patterns are a natural thing to exchange emotions between individuals. Using them is as normal, as not to be aware of it. But once you recognize the patterns, it is playtime!

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1619.en.html
</itunes:summary>
      <itunes:duration>00:45:11</itunes:duration>
    </item>
    <item>
      <title>23C3 Network Review (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1728-en-23c3_network_review</link>
      <description>An Introduction into the structure and design of the congress network -
featuring a description of hardware setup and focusing on the Backbone Network infrastructure and Wireless LAN.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1728.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1728-en-23c3_network_review.mp3"
        length="189792256"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1728-en-23c3_network_review.mp3?1399728400</guid>
      <dc:identifier>import-8f7bed0042eb4f1860</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Stefan Wahl, Niels Bakker, Maxim Salomon, Elisa Jasinska</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:summary>An Introduction into the structure and design of the congress network -
featuring a description of hardware setup and focusing on the Backbone Network infrastructure and Wireless LAN.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1728.en.html
</itunes:summary>
      <itunes:duration>00:58:16</itunes:duration>
    </item>
    <item>
      <title>Tracking von Personen in Videoszenen (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1604-de-tracking_von_personen_in_videoszenen</link>
      <description>Mittels der Computer-Vision-Library OpenCV wird gezeigt, welche Bildverarbeitungsschritte notwendig sind, um bewegte Objekte in Videoszenen zu erkennen und nachzuverfolgen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1604.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1604-de-tracking_von_personen_in_videoszenen.mp3"
        length="229638144"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1604-de-tracking_von_personen_in_videoszenen.mp3?1399728400</guid>
      <dc:identifier>import-575502e1e9906233c7</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>pille</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>Wie trackt man automatisch sich bewegende Objekte?</itunes:subtitle>
      <itunes:summary>Mittels der Computer-Vision-Library OpenCV wird gezeigt, welche Bildverarbeitungsschritte notwendig sind, um bewegte Objekte in Videoszenen zu erkennen und nachzuverfolgen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1604.en.html
</itunes:summary>
      <itunes:duration>01:04:56</itunes:duration>
    </item>
    <item>
      <title>Digitale Bildforensik (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1605-de-digitale_bildforensik</link>
      <description>Mit der mehr und mehr digitalisierten Fototechnik ist es heute ohne Vorwissen nahezu jedem möglich, Bilder zu manipulieren. Bekanntgewordene Fälle in den Medien haben auch die Öffentlichkeit für dieses Thema sensibilisiert. Verfahren der digitalen Bildforensik bieten die Möglichkeit, die Authentizität eines Bildes auch ohne Zugriff auf das Original zu überprüfen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1605.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1605-de-digitale_bildforensik.mp3"
        length="243269632"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1605-de-digitale_bildforensik.mp3?1399728400</guid>
      <dc:identifier>import-b27048411397f630ff</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Matthias Kirchner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>Spuren in Digitalfotos</itunes:subtitle>
      <itunes:summary>Mit der mehr und mehr digitalisierten Fototechnik ist es heute ohne Vorwissen nahezu jedem möglich, Bilder zu manipulieren. Bekanntgewordene Fälle in den Medien haben auch die Öffentlichkeit für dieses Thema sensibilisiert. Verfahren der digitalen Bildforensik bieten die Möglichkeit, die Authentizität eines Bildes auch ohne Zugriff auf das Original zu überprüfen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1605.en.html
</itunes:summary>
      <itunes:duration>01:14:23</itunes:duration>
    </item>
    <item>
      <title>Vehicular Communication and VANETs (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1608-en-vehicular_communication_and_vanets</link>
      <description>Vehicle communication is a major research topic, covered by many national and international research projects. Applications promise to make our driving safer, more efficient, and more fun. The talk presents applications, technology, and also addresses security and privacy issues.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1608.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1608-en-vehicular_communication_and_vanets.mp3"
        length="310378496"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1608-en-vehicular_communication_and_vanets.mp3?1399728400</guid>
      <dc:identifier>import-9bb3adc4750dab7fda</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Frank Kargl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>The future and security of communicating vehicles</itunes:subtitle>
      <itunes:summary>Vehicle communication is a major research topic, covered by many national and international research projects. Applications promise to make our driving safer, more efficient, and more fun. The talk presents applications, technology, and also addresses security and privacy issues.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1608.en.html
</itunes:summary>
      <itunes:duration>01:02:53</itunes:duration>
    </item>
    <item>
      <title>The Story of The Hacker Foundation (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1373-en-hacker_foundation</link>
      <description>Talk will focus on the three year history of the Hacker Foundation
in the USA including the legal, organizational and motivational
hurdles. Ongoing project successes, failures and the reasons behind each
will be covered.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1373.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1373-en-hacker_foundation.mp3"
        length="104857600"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1373-en-hacker_foundation.mp3?1399728400</guid>
      <dc:identifier>import-5104c3e4165a14fde4</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Nick Farr</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:subtitle>Challenges of Organizing a Foundation for Hackers in the USA</itunes:subtitle>
      <itunes:summary>Talk will focus on the three year history of the Hacker Foundation
in the USA including the legal, organizational and motivational
hurdles. Ongoing project successes, failures and the reasons behind each
will be covered.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1373.en.html
</itunes:summary>
      <itunes:duration>01:02:02</itunes:duration>
    </item>
    <item>
      <title>Gäste-Überwachung in Hotels durch staatliche und private Schnüffler (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1505-de-gaeste_ueberwachung</link>
      <description>- Fragwürdige Methoden der Informationsbeschaffung
- Rekonstruktion authentischer Fälle
- Schutz von Geschäftsgeheimnnissen und Privatsphäre

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1505.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1505-de-gaeste_ueberwachung.mp3"
        length="137363456"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1505-de-gaeste_ueberwachung.mp3?1399728400</guid>
      <dc:identifier>import-6e414b43d8c4576d29</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Manfred Fink</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:summary>- Fragwürdige Methoden der Informationsbeschaffung
- Rekonstruktion authentischer Fälle
- Schutz von Geschäftsgeheimnnissen und Privatsphäre

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1505.en.html
</itunes:summary>
      <itunes:duration>00:54:49</itunes:duration>
    </item>
    <item>
      <title>Revenge of the Female Nerds (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1709-en-revenge_of_the_female_nerds</link>
      <description>Why do media and industry lag behind reality when it comes to estimating
women&#39;s technical and scientific abilities? That women have these
abilities is obvious. The question is how to change social expectations
about them. What are women doing, and what can they do, to combat
pervasive myths about their inferiority as engineers and scientists?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1709.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1709-en-revenge_of_the_female_nerds.mp3"
        length="124780544"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1709-en-revenge_of_the_female_nerds.mp3?1399728400</guid>
      <dc:identifier>import-d92bb58ed116334bd1</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Annalee Newitz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>Busting Myths about Why Women Can&#39;t Be Technical</itunes:subtitle>
      <itunes:summary>Why do media and industry lag behind reality when it comes to estimating
women&#39;s technical and scientific abilities? That women have these
abilities is obvious. The question is how to change social expectations
about them. What are women doing, and what can they do, to combat
pervasive myths about their inferiority as engineers and scientists?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1709.en.html
</itunes:summary>
      <itunes:duration>00:53:42</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 2 (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1515-en-lightning_talks_day_2</link>
      <description>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1515.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1515-en-lightning_talks_day_2.mp3"
        length="127926272"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1515-en-lightning_talks_day_2.mp3?1399728400</guid>
      <dc:identifier>import-760f3fe02dd1e65e6b</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Sven Guckes, b9punk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3</itunes:keywords>
      <itunes:summary>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1515.en.html
</itunes:summary>
      <itunes:duration>00:59:14</itunes:duration>
    </item>
    <item>
      <title>Geschichte der Automaten, Androiden und Homunculi (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1652-de-geschichte_der_automaten</link>
      <description>Die Schachspieler und Musikautomaten des 18. Jahrhunderts sind bekannt: Weniger bekannt sind die Automaten der Antike und des Mittelalters.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1652.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1652-de-geschichte_der_automaten.mp3"
        length="230686720"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1652-de-geschichte_der_automaten.mp3?1399728400</guid>
      <dc:identifier>import-c27ad5734973ec4439</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Henriette Fiebig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:summary>Die Schachspieler und Musikautomaten des 18. Jahrhunderts sind bekannt: Weniger bekannt sind die Automaten der Antike und des Mittelalters.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1652.en.html
</itunes:summary>
      <itunes:duration>00:53:40</itunes:duration>
    </item>
    <item>
      <title>Security Nightmares 2007 (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1682-de-security_nightmares</link>
      <description>Security Nightmares - der jährliche Rückblick auf die IT-Sicherheit und der Security-Glaskugelblick für&#39;s nächste Jahr.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1682.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1682-de-security_nightmares.mp3"
        length="210763776"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1682-de-security_nightmares.mp3?1399728400</guid>
      <dc:identifier>import-a4d9fc832b17c561de</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Frank Rieger, Ron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Oder: worüber wir nächstes Jahr lachen werden</itunes:subtitle>
      <itunes:summary>Security Nightmares - der jährliche Rückblick auf die IT-Sicherheit und der Security-Glaskugelblick für&#39;s nächste Jahr.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1682.en.html
</itunes:summary>
      <itunes:duration>01:12:11</itunes:duration>
    </item>
    <item>
      <title>Ethernet mit Mikrocontrollern (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1554-de-ethernet_mit_mikrocontrollern</link>
      <description>Steuer- und Messaufgaben erledigt am besten ein Mikrocontroller.  Wenn zeitgemäß auf dieses Device zugegriffen werden soll, kommt man um Ethernet eigentlich nicht herum. Aber ist ein Mikrocontroller mit nur 2-4Kb RAM in der Lage, TCP/IP zu sprechen?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1554.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1554-de-ethernet_mit_mikrocontrollern.mp3"
        length="235929600"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1554-de-ethernet_mit_mikrocontrollern.mp3?1399728400</guid>
      <dc:identifier>import-c74e7042968738ecd2</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>fd0</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Wie funktioniert TCP mit 2kb RAM?</itunes:subtitle>
      <itunes:summary>Steuer- und Messaufgaben erledigt am besten ein Mikrocontroller.  Wenn zeitgemäß auf dieses Device zugegriffen werden soll, kommt man um Ethernet eigentlich nicht herum. Aber ist ein Mikrocontroller mit nur 2-4Kb RAM in der Lage, TCP/IP zu sprechen?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1554.en.html
</itunes:summary>
      <itunes:duration>00:49:14</itunes:duration>
    </item>
    <item>
      <title>Juristische Fragen um die Mitbenutzung fremder WLANs (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1416-de-wlan_schwarzsurfen_und_das_recht</link>
      <description>Der Vortrag gibt einen Überblick über den rechtlichen Rahmen des WLAN-Surfens im Zivil- und Strafrecht mit aktueller Rechtsprechungsübersicht.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1416.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1416-de-wlan_schwarzsurfen_und_das_recht.mp3"
        length="251658240"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1416-de-wlan_schwarzsurfen_und_das_recht.mp3?1399728400</guid>
      <dc:identifier>import-d58db20dbd73783f0e</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>soeren</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Zivilrechtliche und strafrechtliche Haftung</itunes:subtitle>
      <itunes:summary>Der Vortrag gibt einen Überblick über den rechtlichen Rahmen des WLAN-Surfens im Zivil- und Strafrecht mit aktueller Rechtsprechungsübersicht.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1416.en.html
</itunes:summary>
      <itunes:duration>00:54:41</itunes:duration>
    </item>
    <item>
      <title>Body hacking (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1629-en-body_hacking</link>
      <description>What happens when we leave behind cosmetics and start to modify our bodies and minds to enhance who we are and what we can do? In this talk, journalist Quinn Norton explores how technology and flesh are coming together.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1629.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1629-en-body_hacking.mp3"
        length="193986560"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1629-en-body_hacking.mp3?1399728400</guid>
      <dc:identifier>import-951bd3b975cd6a7f7e</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Quinn Norton</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Functional body modification</itunes:subtitle>
      <itunes:summary>What happens when we leave behind cosmetics and start to modify our bodies and minds to enhance who we are and what we can do? In this talk, journalist Quinn Norton explores how technology and flesh are coming together.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1629.en.html
</itunes:summary>
      <itunes:duration>01:05:39</itunes:duration>
    </item>
    <item>
      <title>Hacking the Electoral Law (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1692-en-hacking_the_electoral_law</link>
      <description>How the Ministry of the Interior turns fundamental election principals into their opposite, without even asking the parliament.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1692.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1692-en-hacking_the_electoral_law.mp3"
        length="274726912"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1692-en-hacking_the_electoral_law.mp3?1399728400</guid>
      <dc:identifier>import-0690032e133e01561f</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Ulrich Wiesner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:summary>How the Ministry of the Interior turns fundamental election principals into their opposite, without even asking the parliament.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1692.en.html
</itunes:summary>
      <itunes:duration>01:13:01</itunes:duration>
    </item>
    <item>
      <title>Router and Infrastructure Hacking (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1700-en-router_and_infrastructure_hacking</link>
      <description>The security of backbone devices has been under increasing focus for the past few years, but infrastructure hacking techniques remain in
their infancy and are still not even used in most penetration tests.
This talk will discuss how to find and exploit vulnerabilities in infrastructure devices and their service dependencies, including vulnerability development as necessary.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1700.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1700-en-router_and_infrastructure_hacking.mp3"
        length="141557760"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1700-en-router_and_infrastructure_hacking.mp3?1399728400</guid>
      <dc:identifier>import-33fb0d803b5b408751</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Raven</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>&quot;First we take Manhattan, then we take Berlin...&quot;</itunes:subtitle>
      <itunes:summary>The security of backbone devices has been under increasing focus for the past few years, but infrastructure hacking techniques remain in
their infancy and are still not even used in most penetration tests.
This talk will discuss how to find and exploit vulnerabilities in infrastructure devices and their service dependencies, including vulnerability development as necessary.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1700.en.html
</itunes:summary>
      <itunes:duration>00:45:44</itunes:duration>
    </item>
    <item>
      <title>Chaos und Kritische Theorie (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1452-de-critical_theory_and_chaos</link>
      <description>Kritische Theorie, wie sie sich vor allem an Adorno festmachen lässt, und Diskordianismus, der als Philosophie des Chaos zum Namensgeber des veranstaltenden Vereins wurde, gehören zu den am weistesten verbreiteten Elementen des &#39;social hacking&#39;. Jedoch ist gerade in den letzten Jahren des Adbusting und des Hacktivism unübersehbar geworden, daß von beiden Denktraditionen in der Hauptsache stark vereinfachte und oft auch ideologisch abgeschlossene Formen Verwendung finden: Kritische Theorie wird zumeist auf ein unbestimmtes Unbehagen an der Kulturindustrie, der Globalisierung und den technologischen Entwickungen reduziert, während Diskordianismus zur Illustration oft bedenklicher Parteinahmen für irrationale politische Auffassungen dient. Im Vortrag wird der Versuch unternommen, die Kritische Theorie dem diskordischen Witz auszusetzen und den Diskordianismus der Ideologiekritik.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1452.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1452-de-critical_theory_and_chaos.mp3"
        length="311427072"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1452-de-critical_theory_and_chaos.mp3?1399728400</guid>
      <dc:identifier>import-f6a6c03237ef52248e</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Daniel Kulla, Oona Leganovic</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:subtitle>Adorno, Wilson und Diskordianismus</itunes:subtitle>
      <itunes:summary>Kritische Theorie, wie sie sich vor allem an Adorno festmachen lässt, und Diskordianismus, der als Philosophie des Chaos zum Namensgeber des veranstaltenden Vereins wurde, gehören zu den am weistesten verbreiteten Elementen des &#39;social hacking&#39;. Jedoch ist gerade in den letzten Jahren des Adbusting und des Hacktivism unübersehbar geworden, daß von beiden Denktraditionen in der Hauptsache stark vereinfachte und oft auch ideologisch abgeschlossene Formen Verwendung finden: Kritische Theorie wird zumeist auf ein unbestimmtes Unbehagen an der Kulturindustrie, der Globalisierung und den technologischen Entwickungen reduziert, während Diskordianismus zur Illustration oft bedenklicher Parteinahmen für irrationale politische Auffassungen dient. Im Vortrag wird der Versuch unternommen, die Kritische Theorie dem diskordischen Witz auszusetzen und den Diskordianismus der Ideologiekritik.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1452.en.html
</itunes:summary>
      <itunes:duration>00:47:45</itunes:duration>
    </item>
    <item>
      <title>Drones (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1402-de-drones</link>
      <description>I am watching you: drones for private use are getting real. A live presentation of actual devices in real action.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1402.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1402-de-drones.mp3"
        length="225443840"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1402-de-drones.mp3?1399728400</guid>
      <dc:identifier>import-581b252506da8022c4</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Steini</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>Autonomous flying vehicles</itunes:subtitle>
      <itunes:summary>I am watching you: drones for private use are getting real. A live presentation of actual devices in real action.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1402.en.html
</itunes:summary>
      <itunes:duration>00:50:39</itunes:duration>
    </item>
    <item>
      <title>MMORPGs (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1738-en-mmorpgs</link>
      <description>This talk will focus on World of Warcraft, the most popular MMORPG. There will be a brief overview of the game, guilds and guild management, tools and social issues. Other technologies and the possible future of MMORPGs and their impact will be discussed.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1738.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1738-en-mmorpgs.mp3"
        length="267386880"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1738-en-mmorpgs.mp3?1399728400</guid>
      <dc:identifier>import-b6c7f097823adf3c6e</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Joi Ito</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>The state and future of the World of Warcraft</itunes:subtitle>
      <itunes:summary>This talk will focus on World of Warcraft, the most popular MMORPG. There will be a brief overview of the game, guilds and guild management, tools and social issues. Other technologies and the possible future of MMORPGs and their impact will be discussed.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1738.en.html
</itunes:summary>
      <itunes:duration>00:58:56</itunes:duration>
    </item>
    <item>
      <title>Nintendo DS (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1552-en-nintendo_ds</link>
      <description>The Nintendo DS is a mobile gaming console. It was first introduced in
2004. Our talk will give a short introduction of the hardware and
available games. The main focus however lies on homebrew software,
DSLinux, alternative firmware, copy protection, flash cards and online
gaming protocols.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1552.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1552-en-nintendo_ds.mp3"
        length="199229440"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1552-en-nintendo_ds.mp3?1399728400</guid>
      <dc:identifier>import-c5bd70ae7c91327ae4</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Tobias Gruetzmacher, Marcel Klein, mm</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Introduction and hacking</itunes:subtitle>
      <itunes:summary>The Nintendo DS is a mobile gaming console. It was first introduced in
2004. Our talk will give a short introduction of the hardware and
available games. The main focus however lies on homebrew software,
DSLinux, alternative firmware, copy protection, flash cards and online
gaming protocols.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1552.en.html
</itunes:summary>
      <itunes:duration>00:43:48</itunes:duration>
    </item>
    <item>
      <title>Hacking fingerprint recognition systems (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1578-de-hacking_fingerprint_recognition_systems</link>
      <description>Der Vortrag stellt Wege und Werkzeuge vor um aus unterschiedlichen Quellen Bilder für die Herstellung von Fingerabdruckattrappen zu gewinnen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1578.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1578-de-hacking_fingerprint_recognition_systems.mp3"
        length="207618048"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1578-de-hacking_fingerprint_recognition_systems.mp3?1399728400</guid>
      <dc:identifier>import-4a118e414c2784362b</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>starbug</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Kann ich dir ein Bier ausgeben?</itunes:subtitle>
      <itunes:summary>Der Vortrag stellt Wege und Werkzeuge vor um aus unterschiedlichen Quellen Bilder für die Herstellung von Fingerabdruckattrappen zu gewinnen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1578.en.html
</itunes:summary>
      <itunes:duration>01:00:37</itunes:duration>
    </item>
    <item>
      <title>CSRF, the Intranet and You (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1560-en-csrf</link>
      <description>A detailed introduction to Cross Site Request Forgery. This talk presents the fundamental cause of this vulnerability class and examples of potential attack consequences. The second half of the talk is devoted to avoiding and countering CSRF: Implementing CSRF proof session handling, transparent retrofitting of legacy applications and methods for client side protection.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1560.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1560-en-csrf.mp3"
        length="178257920"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1560-en-csrf.mp3?1399728400</guid>
      <dc:identifier>import-823765436f0318a89b</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Justus Winter, Martin Johns</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Causes, Attacks and Countermeasures</itunes:subtitle>
      <itunes:summary>A detailed introduction to Cross Site Request Forgery. This talk presents the fundamental cause of this vulnerability class and examples of potential attack consequences. The second half of the talk is devoted to avoiding and countering CSRF: Implementing CSRF proof session handling, transparent retrofitting of legacy applications and methods for client side protection.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1560.en.html
</itunes:summary>
      <itunes:duration>01:01:22</itunes:duration>
    </item>
    <item>
      <title>Kritik an den Illuminaten zwischen 1787 und 2006 (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1678-de-kritik_an_den_illuminaten</link>
      <description>Bereits 1787 formulierte der Theologe Benedikt Stattler in seiner Schrift &quot;Das Geheimniß der Bosheit des Stifters des Illuminatismus in Baiern zur Warnung der Unvorsichtigen hell aufgedeckt von einem seiner alten Kenner und Freunde&quot; Kritik an dem von Adam Weishaupt gegründeten Illuminatenorden. Der CCC hat sich in vielen Aspekten in seiner Eigenschaft als discordische Vereinigung ebenfalls in kritischer Art und Weise mit Plänen und Aktionen der Illuminaten im Sinne der &quot;New World Order&quot; und Aktionen wie der &quot;Total Information Awareness&quot; auseinandergesetzt.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1678.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1678-de-kritik_an_den_illuminaten.mp3"
        length="156237824"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1678-de-kritik_an_den_illuminaten.mp3?1399728400</guid>
      <dc:identifier>import-2d3f3e91ab482231f6</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Andy Müller-Maguhn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>Der Stand der Auseinandersetzung zwischen Discordiern und Illuminaten</itunes:subtitle>
      <itunes:summary>Bereits 1787 formulierte der Theologe Benedikt Stattler in seiner Schrift &quot;Das Geheimniß der Bosheit des Stifters des Illuminatismus in Baiern zur Warnung der Unvorsichtigen hell aufgedeckt von einem seiner alten Kenner und Freunde&quot; Kritik an dem von Adam Weishaupt gegründeten Illuminatenorden. Der CCC hat sich in vielen Aspekten in seiner Eigenschaft als discordische Vereinigung ebenfalls in kritischer Art und Weise mit Plänen und Aktionen der Illuminaten im Sinne der &quot;New World Order&quot; und Aktionen wie der &quot;Total Information Awareness&quot; auseinandergesetzt.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1678.en.html
</itunes:summary>
      <itunes:duration>00:51:07</itunes:duration>
    </item>
    <item>
      <title>An Introduction to Traffic Analysis (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1478-en-traffic_analysis</link>
      <description>This talk will present an overview of traffic analysis techniques, and
how they can be used to extract data from &#39;secure&#39; systems. We will
consider both state of the art attacks in the academic literature,
but also practical attacks against fielded systems.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1478.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1478-en-traffic_analysis.mp3"
        length="228589568"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1478-en-traffic_analysis.mp3?1399728400</guid>
      <dc:identifier>import-ce6e6cb99ffa1eeecb</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>George Danezis</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Attacks, Defences and Public Policy Issues...</itunes:subtitle>
      <itunes:summary>This talk will present an overview of traffic analysis techniques, and
how they can be used to extract data from &#39;secure&#39; systems. We will
consider both state of the art attacks in the academic literature,
but also practical attacks against fielded systems.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1478.en.html
</itunes:summary>
      <itunes:duration>01:00:28</itunes:duration>
    </item>
    <item>
      <title>Elektronische Reisedokumente (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1655-de-elektronische_reisedokumente</link>
      <description>Auch dieses Jahr gab es wieder eine Menge Wirbel um den ePass. Neue Studien wurden durchgeführt, Entscheidungen wurden getroffen und immer mehr Länder haben begonnen, elektronische Reisedokumente einzusetzen. Der Vortrag wird den neuesten Stand der Diskussion aufzeigen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1655.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1655-de-elektronische_reisedokumente.mp3"
        length="130023424"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1655-de-elektronische_reisedokumente.mp3?1399728400</guid>
      <dc:identifier>import-ed295055914a8eea4a</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>starbug, Constanze Kurz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>Neue Entwicklungen beim ePass</itunes:subtitle>
      <itunes:summary>Auch dieses Jahr gab es wieder eine Menge Wirbel um den ePass. Neue Studien wurden durchgeführt, Entscheidungen wurden getroffen und immer mehr Länder haben begonnen, elektronische Reisedokumente einzusetzen. Der Vortrag wird den neuesten Stand der Diskussion aufzeigen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1655.en.html
</itunes:summary>
      <itunes:duration>00:56:51</itunes:duration>
    </item>
    <item>
      <title>Barrierefreies Web (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1670-de-barrierefreies_web</link>
      <description>In diesem Vortrag geht es um die Problematik des barrierefreien Webs. Der Vortragende ist selber blind und hat somit die notwendige Praxiserfahrung. Es wird nicht auf festgeschriebene Normen und Gesetze eingegangen, vielmehr werden Tips aus der Praxis gegeben und anhand von verschiedenen Internetseiten verdeutlicht. Es wird auf bekannte Internet-Angebote wie Bankingportale usw. zurückgegriffen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1670.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1670-de-barrierefreies_web.mp3"
        length="133169152"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1670-de-barrierefreies_web.mp3?1399728400</guid>
      <dc:identifier>import-0ff5380c0b7ca9062b</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Sebastian Andres</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:summary>In diesem Vortrag geht es um die Problematik des barrierefreien Webs. Der Vortragende ist selber blind und hat somit die notwendige Praxiserfahrung. Es wird nicht auf festgeschriebene Normen und Gesetze eingegangen, vielmehr werden Tips aus der Praxis gegeben und anhand von verschiedenen Internetseiten verdeutlicht. Es wird auf bekannte Internet-Angebote wie Bankingportale usw. zurückgegriffen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1670.en.html
</itunes:summary>
      <itunes:duration>00:56:10</itunes:duration>
    </item>
    <item>
      <title>Kollaboratives Wissensmanagement im Bildungsbereich (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1543-de-kollaboratives_wissenmanagement</link>
      <description>Im Mittelpunkt des Beitrags steht das wissenschaftliche Zitieren der Wikipedia im Kontext der Diskussion um stabile Versionen, Qualitätssicherung und die Sicherung von Expertenwissen; welcher Zusammenhang besteht zwischen wissenschaftlichem Arbeiten und dem Wissenskonsens der Wikipedia? Erlaubt die Wikipedia die Bereitstellung von wissenschaftlich verwertbaren Zitaten und wie kann sie wissenschaftlich zitiert werden?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1543.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1543-de-kollaboratives_wissenmanagement.mp3"
        length="225443840"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1543-de-kollaboratives_wissenmanagement.mp3?1399728400</guid>
      <dc:identifier>import-5c51d2ca6467e8e4a4</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Rüdiger Weis, Martin Haase/maha</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>Die Zitierfähigkeit von Wiki-Wissen</itunes:subtitle>
      <itunes:summary>Im Mittelpunkt des Beitrags steht das wissenschaftliche Zitieren der Wikipedia im Kontext der Diskussion um stabile Versionen, Qualitätssicherung und die Sicherung von Expertenwissen; welcher Zusammenhang besteht zwischen wissenschaftlichem Arbeiten und dem Wissenskonsens der Wikipedia? Erlaubt die Wikipedia die Bereitstellung von wissenschaftlich verwertbaren Zitaten und wie kann sie wissenschaftlich zitiert werden?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1543.en.html
</itunes:summary>
      <itunes:duration>01:01:06</itunes:duration>
    </item>
    <item>
      <title>Know Your Citizens (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1537-en-know_your_citizens</link>
      <description>The balance between effective criminal investigations and the protection of human rights is currently intensively discussed. A number of approaches demonstrate a tendency that state authorities gain for more access to sensitive data. But do these information really help to prevent crimes (e.g. terrorist attacks) and how save are these information in the hands of state authorities&#39;?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1537.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1537-en-know_your_citizens.mp3"
        length="165675008"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1537-en-know_your_citizens.mp3?1399728400</guid>
      <dc:identifier>import-d11d50d901f7d39189</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Marco Gercke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>State Authorities&#39; Access to Sensitive Information</itunes:subtitle>
      <itunes:summary>The balance between effective criminal investigations and the protection of human rights is currently intensively discussed. A number of approaches demonstrate a tendency that state authorities gain for more access to sensitive data. But do these information really help to prevent crimes (e.g. terrorist attacks) and how save are these information in the hands of state authorities&#39;?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1537.en.html
</itunes:summary>
      <itunes:duration>00:57:22</itunes:duration>
    </item>
    <item>
      <title>Data Retention Update (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1609-en-data_retention_update</link>
      <description>The EU adopted a directive on the retention of data regarding the communications, movements and use of media of all 365 mio. EU citizens. The struggle is now continuing on the national levels, and privacy groups are preparing legal, political and technical challenges to this surveillance scheme.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1609.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1609-en-data_retention_update.mp3"
        length="195035136"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1609-en-data_retention_update.mp3?1399728400</guid>
      <dc:identifier>import-579aacb878d51bf5c4</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Rikke Frank Jørgensen, Ralf Bendrath, Patrick Breyer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>News and Perspectives on Implementation and Opposition</itunes:subtitle>
      <itunes:summary>The EU adopted a directive on the retention of data regarding the communications, movements and use of media of all 365 mio. EU citizens. The struggle is now continuing on the national levels, and privacy groups are preparing legal, political and technical challenges to this surveillance scheme.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1609.en.html
</itunes:summary>
      <itunes:duration>01:08:43</itunes:duration>
    </item>
    <item>
      <title>Analysis of a strong Random Number Generator (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1420-en-strong_random_number_generator</link>
      <description>This paper (and slides) will descibe the inner workings of the the random number generator (/dev/{u}random) of Linux. Additionally some possible security flaws are shown (entropy overestimation, zero&#39;izing the pool, etc.)

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1420.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1420-en-strong_random_number_generator.mp3"
        length="703594496"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1420-en-strong_random_number_generator.mp3?1399728400</guid>
      <dc:identifier>import-ed88ca5ebf2520ebf0</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Thomas Biege</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>by anatomizing Linux&#39; CPRNG</itunes:subtitle>
      <itunes:summary>This paper (and slides) will descibe the inner workings of the the random number generator (/dev/{u}random) of Linux. Additionally some possible security flaws are shown (entropy overestimation, zero&#39;izing the pool, etc.)

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1420.en.html
</itunes:summary>
      <itunes:duration>01:35:31</itunes:duration>
    </item>
    <item>
      <title>The gift of sharing (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1502-en-the_gift_of_sharing</link>
      <description>This paper will dive into this complex questionmark through a comparison between primitive hunter-gatherer societies and the everyday life-world of FOSS. The discussion will focus on the thesis that FOSS practice is based on social sharing and not on processes of exchange. This will entail a negation of the paradigm of economic logic and instead pull a quest for valuable relationships to the forefront of the FOSS sociality.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1502.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1502-en-the_gift_of_sharing.mp3"
        length="254803968"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1502-en-the_gift_of_sharing.mp3?1399728400</guid>
      <dc:identifier>import-7957df8d511dddee9d</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Gregers Petersen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>A critical approach to the notion of gift economy within the everyday life-world of free and open source software (FOSS).</itunes:subtitle>
      <itunes:summary>This paper will dive into this complex questionmark through a comparison between primitive hunter-gatherer societies and the everyday life-world of FOSS. The discussion will focus on the thesis that FOSS practice is based on social sharing and not on processes of exchange. This will entail a negation of the paradigm of economic logic and instead pull a quest for valuable relationships to the forefront of the FOSS sociality.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1502.en.html
</itunes:summary>
      <itunes:duration>00:48:17</itunes:duration>
    </item>
    <item>
      <title>Unusual bugs (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1456-en-unusual_bugs</link>
      <description>In this presentation I&#39;ll present a series of unusual security bugs. Things that I&#39;ve ran into at some point and went &quot;There&#39;s gotta be some security consequence here&quot;. None of these are really a secret, and most of them are even documented somewhere. But apparently most people don&#39;t seem to know about them.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1456.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1456-en-unusual_bugs.mp3"
        length="248512512"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1456-en-unusual_bugs.mp3?1399728400</guid>
      <dc:identifier>import-d6e0964fb93469b332</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Ilja</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:summary>In this presentation I&#39;ll present a series of unusual security bugs. Things that I&#39;ve ran into at some point and went &quot;There&#39;s gotta be some security consequence here&quot;. None of these are really a secret, and most of them are even documented somewhere. But apparently most people don&#39;t seem to know about them.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1456.en.html
</itunes:summary>
      <itunes:duration>01:06:35</itunes:duration>
    </item>
    <item>
      <title>Closing Ceremony (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1727-en-closing_ceremony</link>
      <description>

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1727.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1727-en-closing_ceremony.mp3"
        length="134217728"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1727-en-closing_ceremony.mp3?1399728400</guid>
      <dc:identifier>import-501635afc9ab5db2ce</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Tim Pritlove</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, General</itunes:keywords>
      <itunes:subtitle>Who did you trust?</itunes:subtitle>
      <itunes:summary>

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1727.en.html
</itunes:summary>
      <itunes:duration>00:31:47</itunes:duration>
    </item>
    <item>
      <title>Ego Striptease - Ich zeig dir, wer du bist (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1494-de-ego_striptease</link>
      <description>Als Orkut aufkam, gab es zwei Sorten Menschen: die einen wetteiferten um die meisten Invitations, die anderen schüttelten den Kopf ob der Bereitwilligkeit, eine Datenkrake zu füttern. Heute manifestiert sich das Phänomen als flickr, del.icio.us, upcoming.org und blog - kurz gesagt &quot;soziale Web 2.0 Anwendungen&quot;. Wieso lassen wir uns alle so bereitwillig taggen, kommentieren und outen?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1494.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1494-de-ego_striptease.mp3"
        length="211812352"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1494-de-ego_striptease.mp3?1399728400</guid>
      <dc:identifier>import-57e0e95fca3dedeec9</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Teemu Schaabl, Jule Riede-Buechele</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Blogs, flickr, etc: warum machen wir es ihnen so einfach?</itunes:subtitle>
      <itunes:summary>Als Orkut aufkam, gab es zwei Sorten Menschen: die einen wetteiferten um die meisten Invitations, die anderen schüttelten den Kopf ob der Bereitwilligkeit, eine Datenkrake zu füttern. Heute manifestiert sich das Phänomen als flickr, del.icio.us, upcoming.org und blog - kurz gesagt &quot;soziale Web 2.0 Anwendungen&quot;. Wieso lassen wir uns alle so bereitwillig taggen, kommentieren und outen?

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1494.en.html
</itunes:summary>
      <itunes:duration>01:00:44</itunes:duration>
    </item>
    <item>
      <title>Hackerspaces (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1500-en-hackerspaces</link>
      <description>Hackerspaces are community-run places where you can meet, work on projects, organize events and workshops, or just generally hang out with other hackers. More and more of those open spaces are being created all the time. Some of them are more than a decade old already, some just started out recently, and yet others might become a reality soon.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1500.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1500-en-hackerspaces.mp3"
        length="187695104"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1500-en-hackerspaces.mp3?1399728400</guid>
      <dc:identifier>import-278b33c334c7d98406</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>bruder, t, Jens Ohlig, Paul Böhm</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:subtitle>How we built ours - How you can build yours</itunes:subtitle>
      <itunes:summary>Hackerspaces are community-run places where you can meet, work on projects, organize events and workshops, or just generally hang out with other hackers. More and more of those open spaces are being created all the time. Some of them are more than a decade old already, some just started out recently, and yet others might become a reality soon.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1500.en.html
</itunes:summary>
      <itunes:duration>00:56:20</itunes:duration>
    </item>
    <item>
      <title>Fudging with Firmware (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1610-en-fudging_with_firmware</link>
      <description>This lecture aims at providing ideas and practical techniques about the reverse-engineering process of equipment firmware images. It touches upon data encoding, compression, bootstraps, deciphering, disassembly, and emulation.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1610.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1610-en-fudging_with_firmware.mp3"
        length="176160768"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1610-en-fudging_with_firmware.mp3?1399728400</guid>
      <dc:identifier>import-80ef475e269e070ff8</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>khorben</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Firmware reverse-engineering tactics</itunes:subtitle>
      <itunes:summary>This lecture aims at providing ideas and practical techniques about the reverse-engineering process of equipment firmware images. It touches upon data encoding, compression, bootstraps, deciphering, disassembly, and emulation.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1610.en.html
</itunes:summary>
      <itunes:duration>00:43:05</itunes:duration>
    </item>
    <item>
      <title>In the Absence of Trust (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1740-en-in_the_absence_of_trust</link>
      <description>In 1996, The Surveillance Camera Players started manifesting their
opposition to the culture of surveillance by performing silent, specially
adapted plays directly in front of CCTV cameras. 10 years after, their
work is more relevant than ever. This talk will take you through artists&#39;
strategies to raise the debate on privacy, the society of the spectacle,
the aftermath of September 11th, face recognition software, panopticism,
electronic tagging, etc.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1740.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1740-en-in_the_absence_of_trust.mp3"
        length="142606336"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1740-en-in_the_absence_of_trust.mp3?1399728400</guid>
      <dc:identifier>import-48b970c65ea1ddb27b</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Régine Débatty</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:summary>In 1996, The Surveillance Camera Players started manifesting their
opposition to the culture of surveillance by performing silent, specially
adapted plays directly in front of CCTV cameras. 10 years after, their
work is more relevant than ever. This talk will take you through artists&#39;
strategies to raise the debate on privacy, the society of the spectacle,
the aftermath of September 11th, face recognition software, panopticism,
electronic tagging, etc.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1740.en.html
</itunes:summary>
      <itunes:duration>00:44:17</itunes:duration>
    </item>
    <item>
      <title>The Grim Meathook Future (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1461-en-the_grim_meathook_future</link>
      <description>Most modern futurism describes technology-driven futures: the nanotech future, the biotech future, etc. But there&#39;s also another future, just as or more possible: the future where technology is marginalized by social and cultural forces (such as the rise of fundamentalism as a political force in the US and Middle East). This lecture talks about how technology and design can help humanity avoid a grim future.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1461.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1461-en-the_grim_meathook_future.mp3"
        length="347078656"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1461-en-the_grim_meathook_future.mp3?1399728400</guid>
      <dc:identifier>import-a60aea0b597609400e</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Joshua Ellis</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Culture</itunes:keywords>
      <itunes:subtitle>How The Tech Culture Can Maintain Relevance In The 21st Century</itunes:subtitle>
      <itunes:summary>Most modern futurism describes technology-driven futures: the nanotech future, the biotech future, etc. But there&#39;s also another future, just as or more possible: the future where technology is marginalized by social and cultural forces (such as the rise of fundamentalism as a political force in the US and Middle East). This lecture talks about how technology and design can help humanity avoid a grim future.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1461.en.html
</itunes:summary>
      <itunes:duration>01:38:10</itunes:duration>
    </item>
    <item>
      <title>How To Design A Decent User Interface (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1433-en-design_a_decent_user_interface</link>
      <description>Prepare to be brainwashed! This talk wants you to switch from the developer&#39;s perspective to that of an average user to design better UIs.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1433.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1433-en-design_a_decent_user_interface.mp3"
        length="303038464"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1433-en-design_a_decent_user_interface.mp3?1399728399</guid>
      <dc:identifier>import-08b5f79a93224f180b</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>pallas (Corinna Habets)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Take a look at software from a user&#39;s point of view and improve your applications</itunes:subtitle>
      <itunes:summary>Prepare to be brainwashed! This talk wants you to switch from the developer&#39;s perspective to that of an average user to design better UIs.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1433.en.html
</itunes:summary>
      <itunes:duration>00:57:41</itunes:duration>
    </item>
    <item>
      <title>Transparency and Privacy (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1724-en-transparency_and_privacy</link>
      <description>Microsoft has proposed architectural principles (&quot;7 Laws of Identity&quot;) to support convergence towards an inter-operable, secure, and privacy-enhancing plurality of identity systems - an &quot;Identity Metasystem&quot;. This new concept presupposes that a single monolithic identity system for the Internet is neither practicable nor desirable.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1724.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1724-en-transparency_and_privacy.mp3"
        length="310378496"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1724-en-transparency_and_privacy.mp3?1399728399</guid>
      <dc:identifier>import-c2248d7798bcff363c</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Caspar Bowden</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>The 7 Laws of Identity and the Identity Metasystem</itunes:subtitle>
      <itunes:summary>Microsoft has proposed architectural principles (&quot;7 Laws of Identity&quot;) to support convergence towards an inter-operable, secure, and privacy-enhancing plurality of identity systems - an &quot;Identity Metasystem&quot;. This new concept presupposes that a single monolithic identity system for the Internet is neither practicable nor desirable.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1724.en.html
</itunes:summary>
      <itunes:duration>01:03:22</itunes:duration>
    </item>
    <item>
      <title>Das neue gesetzliche Verbot des Hackings (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1680-de-neues_gesetzliches_verbot_des_hackings</link>
      <description>Entwickler, Administratoren und gewisse Internet-Nutzer treffen die Auswirkungen eines aktuellen Gesetzesvorhabens auf dem kaltem Fuß. Eine ganze Klasse von Systemwerkzeugen, die &quot;Hackertools&quot;, soll verboten werden.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1680.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1680-de-neues_gesetzliches_verbot_des_hackings.mp3"
        length="267386880"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1680-de-neues_gesetzliches_verbot_des_hackings.mp3?1399728399</guid>
      <dc:identifier>import-5d344713a4331b21b2</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Peter Voigt</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Praktische Auswirkungen des neuen Strafrechtes, das in wenigen Monaten in Kraft treten wird</itunes:subtitle>
      <itunes:summary>Entwickler, Administratoren und gewisse Internet-Nutzer treffen die Auswirkungen eines aktuellen Gesetzesvorhabens auf dem kaltem Fuß. Eine ganze Klasse von Systemwerkzeugen, die &quot;Hackertools&quot;, soll verboten werden.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1680.en.html
</itunes:summary>
      <itunes:duration>01:04:45</itunes:duration>
    </item>
    <item>
      <title>Trust Your Eyes (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1418-de-trust_your_eyes</link>
      <description>Vorgestellt werden theoretische Grundlagen der Visualisierung und der menschlichen Wahrnehmung sowie einige Visualisierungstechniken. Im Anschluss wird exemplarisch dargestellt, wie leicht man durch geschickt gewählte Visualisierungen verfälschte Eindrücke suggerieren kann.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1418.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1418-de-trust_your_eyes.mp3"
        length="81788928"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1418-de-trust_your_eyes.mp3?1399728399</guid>
      <dc:identifier>import-cef704a060af9873ef</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Sonja</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>Grundlagen der Visualisierung und wie man mit Visualisierungen „faken“ kann</itunes:subtitle>
      <itunes:summary>Vorgestellt werden theoretische Grundlagen der Visualisierung und der menschlichen Wahrnehmung sowie einige Visualisierungstechniken. Im Anschluss wird exemplarisch dargestellt, wie leicht man durch geschickt gewählte Visualisierungen verfälschte Eindrücke suggerieren kann.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1418.en.html
</itunes:summary>
      <itunes:duration>00:36:34</itunes:duration>
    </item>
    <item>
      <title>DVB-T - From Pixeldata to COFDM Transmission (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1646-en-dvb_t</link>
      <description>As DVB-T is the key technology for terrestrial broadcasting for the next decades, this lecture tries to explain how it works: It covers the way of raw pixel data over MPEG2 video and audio encoding and via multiplexing of several streams and programs to the actual generation of the COFDM signal used for transmission. As the team has built a DVB-T transmitter, we will give a in-depth insight in how things are really done - including a demonstration of the transmitter.
-&gt; For that we plan to stream the content of the 23C3 lectures locally on Alexanderplatz using TV channel 22. Don&#39;t forget to bring your DVB-T stick. For more information look at &lt;a href=&quot;http://events.ccc.de/congress/2006/DVB-T&quot;&gt;the DVB-T project description.&lt;/a&gt;

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1646.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1646-en-dvb_t.mp3"
        length="148897792"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1646-en-dvb_t.mp3?1399728399</guid>
      <dc:identifier>import-3c00fc2cd16ed6e9f9</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Thomas Kleffel, Christian Daniel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>How to build a complete FPGA-based DVB-T transmitter</itunes:subtitle>
      <itunes:summary>As DVB-T is the key technology for terrestrial broadcasting for the next decades, this lecture tries to explain how it works: It covers the way of raw pixel data over MPEG2 video and audio encoding and via multiplexing of several streams and programs to the actual generation of the COFDM signal used for transmission. As the team has built a DVB-T transmitter, we will give a in-depth insight in how things are really done - including a demonstration of the transmitter.
-&gt; For that we plan to stream the content of the 23C3 lectures locally on Alexanderplatz using TV channel 22. Don&#39;t forget to bring your DVB-T stick. For more information look at &lt;a href=&quot;http://events.ccc.de/congress/2006/DVB-T&quot;&gt;the DVB-T project description.&lt;/a&gt;

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1646.en.html
</itunes:summary>
      <itunes:duration>00:58:08</itunes:duration>
    </item>
    <item>
      <title>We don&#39;t trust voting computers (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1423-en-we_dont_trust_voting_computers</link>
      <description>This talk covers the dutch campaign against unverifiable voting on computers, which is part of a growing movement world-wide to reject these computers. Successes in Ireland and (surprise) the US seem to indicate that media, law-makers and the general public are beginning to wake up.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1423.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1423-en-we_dont_trust_voting_computers.mp3"
        length="350224384"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1423-en-we_dont_trust_voting_computers.mp3?1399728399</guid>
      <dc:identifier>import-bb84670204b0b48b3f</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Rop Gonggrijp</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>The story of the dutch campaign against black-box voting to date</itunes:subtitle>
      <itunes:summary>This talk covers the dutch campaign against unverifiable voting on computers, which is part of a growing movement world-wide to reject these computers. Successes in Ireland and (surprise) the US seem to indicate that media, law-makers and the general public are beginning to wake up.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1423.en.html
</itunes:summary>
      <itunes:duration>02:18:17</itunes:duration>
    </item>
    <item>
      <title>DRM comes to European digital TV (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1699-en-drm_comes_to_european_digital_tv</link>
      <description>European digital television standards (both free-to-air broadcast and
pay TV) developed by the DVB project are exemplary for including
no digital rights management.  But now DVB is rushing to change that
and impose new restrictions on receiving equipment.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1699.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1699-en-drm_comes_to_european_digital_tv.mp3"
        length="148897792"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1699-en-drm_comes_to_european_digital_tv.mp3?1399728399</guid>
      <dc:identifier>import-c872b9c2f9c5b49694</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Seth Schoen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>How the DVB project is locking down TV standards and importing U.S. mistakes.</itunes:subtitle>
      <itunes:summary>European digital television standards (both free-to-air broadcast and
pay TV) developed by the DVB project are exemplary for including
no digital rights management.  But now DVB is rushing to change that
and impose new restrictions on receiving equipment.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1699.en.html
</itunes:summary>
      <itunes:duration>00:48:12</itunes:duration>
    </item>
    <item>
      <title>A not so smart card (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1449-en-not_so_smart_card</link>
      <description>This lecture will introduce you to the the Postcard, a widely used debit card issued by FostFinance in Switzerland. As other debit cards like the &quot;EC&quot; card it is used for shopping payments at POS terminals or to draw money from ATMs in Switzerland and many other countries. It&#39;s widely used by its 2&#39;000&#39;000 users, producing a total transaction volume of around 8&#39;000&#39;000&#39;000 Swiss Francs a year.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1449.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1449-en-not_so_smart_card.mp3"
        length="85983232"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1449-en-not_so_smart_card.mp3?1399728399</guid>
      <dc:identifier>import-95d8bc2858a58621e6</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Bernd R. Fix</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>How bad security decisions can ruin a debit card design</itunes:subtitle>
      <itunes:summary>This lecture will introduce you to the the Postcard, a widely used debit card issued by FostFinance in Switzerland. As other debit cards like the &quot;EC&quot; card it is used for shopping payments at POS terminals or to draw money from ATMs in Switzerland and many other countries. It&#39;s widely used by its 2&#39;000&#39;000 users, producing a total transaction volume of around 8&#39;000&#39;000&#39;000 Swiss Francs a year.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1449.en.html
</itunes:summary>
      <itunes:duration>00:47:26</itunes:duration>
    </item>
    <item>
      <title>Subverting AJAX (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1602-en-subverting_ajax</link>
      <description>Ajax and the new dynamic extensions leverage new threats that lead to innovative attack scenarios against web applications.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1602.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1602-en-subverting_ajax.mp3"
        length="296747008"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1602-en-subverting_ajax.mp3?1399728399</guid>
      <dc:identifier>import-54c4b43eca648fcd38</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Stefano Di Paola, Giorgio Fedon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Next generation vulnerabilities in 2.0 Web Applications</itunes:subtitle>
      <itunes:summary>Ajax and the new dynamic extensions leverage new threats that lead to innovative attack scenarios against web applications.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1602.en.html
</itunes:summary>
      <itunes:duration>00:53:49</itunes:duration>
    </item>
    <item>
      <title>Hacker Jeopardy (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1567-en-hacker_jeopardy</link>
      <description>The well known quizshow format, but of course covering topics not usually seen on television

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1567.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1567-en-hacker_jeopardy.mp3"
        length="412090368"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1567-en-hacker_jeopardy.mp3?1399728399</guid>
      <dc:identifier>import-802f5484cabc4b8027</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Stefan &#39;Sec&#39; Zehl, Ray</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:subtitle>The one and only hacker quizshow</itunes:subtitle>
      <itunes:summary>The well known quizshow format, but of course covering topics not usually seen on television

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1567.en.html
</itunes:summary>
      <itunes:duration>01:47:50</itunes:duration>
    </item>
    <item>
      <title>Open Source Machine Translation (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1701-en-open_source_machine_translation</link>
      <description>Today two revolutions are pushing the machine translation field forward: the open source movement, and the broader application of statistical methods.  This talk is at the intersection of the two: centering around the applications and contributions to be made to Moses, a state of the art open source toolkit for statistical machine translation developed by researchers from MIT, Edinburgh, Cornell, and Aachen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1701.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1701-en-open_source_machine_translation.mp3"
        length="134217728"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1701-en-open_source_machine_translation.mp3?1399728399</guid>
      <dc:identifier>import-1352ddbdeebc2fb2b6</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Christine Corbett Moran</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>From tools, to tricks, to projects: build a translation engine from Klingon to Finnish in an hour</itunes:subtitle>
      <itunes:summary>Today two revolutions are pushing the machine translation field forward: the open source movement, and the broader application of statistical methods.  This talk is at the intersection of the two: centering around the applications and contributions to be made to Moses, a state of the art open source toolkit for statistical machine translation developed by researchers from MIT, Edinburgh, Cornell, and Aachen.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1701.en.html
</itunes:summary>
      <itunes:duration>00:44:29</itunes:duration>
    </item>
    <item>
      <title>Faster PwninG Assured (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1735-en-faster_pwning_assured</link>
      <description>This talk will go in depth into methods for breaking crypto faster using FPGAs.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1735.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1735-en-faster_pwning_assured.mp3"
        length="116391936"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1735-en-faster_pwning_assured.mp3?1399728399</guid>
      <dc:identifier>import-22ec4cc95bcb201ed0</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>David Hulton</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Hardware Hacks and Cracks with FPGAs</itunes:subtitle>
      <itunes:summary>This talk will go in depth into methods for breaking crypto faster using FPGAs.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1735.en.html
</itunes:summary>
      <itunes:duration>01:00:22</itunes:duration>
    </item>
    <item>
      <title>Privacy, Identity, and Anonymity in Web 2.0 (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1611-en-privacy_identity_and_anonymity_in_web_20</link>
      <description>The presentation will show the hidden privacy implications of some web2.0 and identity2.0 services, standards and applications and discuss the underlying trend here.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1611.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1611-en-privacy_identity_and_anonymity_in_web_20.mp3"
        length="184549376"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1611-en-privacy_identity_and_anonymity_in_web_20.mp3?1399728399</guid>
      <dc:identifier>import-38355af6e03d054ba5</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Ralf Bendrath, Jan Schallaböck, Udo Neitzel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:summary>The presentation will show the hidden privacy implications of some web2.0 and identity2.0 services, standards and applications and discuss the underlying trend here.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1611.en.html
</itunes:summary>
      <itunes:duration>01:00:05</itunes:duration>
    </item>
    <item>
      <title>Tor and China (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1444-en-tor_and_china</link>
      <description>Websites like Wikipedia and Blogspot are increasingly being blocked by government-level firewalls around the world. Although many people use the Tor anonymity network to get around this censorship, the current Tor network is not designed to withstand a government-level censor. In this talk we describe a design for providing access to the Tor network that is harder to block.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1444-en-tor_and_china.mp3"
        length="371195904"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1444-en-tor_and_china.mp3?1399728399</guid>
      <dc:identifier>import-20a6b9aac8f72f4d2c</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Roger Dingledine</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Design of a blocking-resistant anonymity system</itunes:subtitle>
      <itunes:summary>Websites like Wikipedia and Blogspot are increasingly being blocked by government-level firewalls around the world. Although many people use the Tor anonymity network to get around this censorship, the current Tor network is not designed to withstand a government-level censor. In this talk we describe a design for providing access to the Tor network that is harder to block.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html
</itunes:summary>
      <itunes:duration>01:27:46</itunes:duration>
    </item>
    <item>
      <title>The worst part of censorship is XXXXX (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1473-en-large_scale_internet_content_filtering</link>
      <description>This talk analyzes large-scale, countrywide Internet content filtering from a technical point of view and investigates the current situation in the People’s Republic of China. Additionally it discusses techniques to effectively defeat censorship and based on various tests conducted by the author, comments on their applicability in the Chinese part of the Internet.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1473.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1473-en-large_scale_internet_content_filtering.mp3"
        length="209715200"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1473-en-large_scale_internet_content_filtering.mp3?1399728399</guid>
      <dc:identifier>import-d93f6f776ff5e0bf3d</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Sebastian Wolfgarten</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>Investigating large-scale Internet content filtering</itunes:subtitle>
      <itunes:summary>This talk analyzes large-scale, countrywide Internet content filtering from a technical point of view and investigates the current situation in the People’s Republic of China. Additionally it discusses techniques to effectively defeat censorship and based on various tests conducted by the author, comments on their applicability in the Chinese part of the Internet.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1473.en.html
</itunes:summary>
      <itunes:duration>01:00:07</itunes:duration>
    </item>
    <item>
      <title>A 10GE monitoring system (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1640-en-10ge_monitoring_system</link>
      <description>Capturing network packets is a valuable technique for troubleshooting network problems. Capturing at network speeds less, or up to one gigabit per second is feasible with a fast general purpose computer hardware. 

But that hardware is to slow for Ten gigabit per second ethernet (10GE). Hence, special hardware is required. 

This topic describes the modification of a commercially available 10GE  networks security system, into a network analyser.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1640.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1640-en-10ge_monitoring_system.mp3"
        length="114294784"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1640-en-10ge_monitoring_system.mp3?1399728399</guid>
      <dc:identifier>import-c515ec9dc323e5bdd3</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Arien Vijn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Hacking a 10 Gigabit Intrusion detection and prevention system into a network troubleshooting tool.</itunes:subtitle>
      <itunes:summary>Capturing network packets is a valuable technique for troubleshooting network problems. Capturing at network speeds less, or up to one gigabit per second is feasible with a fast general purpose computer hardware. 

But that hardware is to slow for Ten gigabit per second ethernet (10GE). Hence, special hardware is required. 

This topic describes the modification of a commercially available 10GE  networks security system, into a network analyser.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1640.en.html
</itunes:summary>
      <itunes:duration>00:52:48</itunes:duration>
    </item>
    <item>
      <title>A Natural Language Database Interface using Fuzzy Semantics (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1454-en-natural_language_database_interface</link>
      <description>We give a thorough exposition of our natural language database interface that
produces result sets ranked according to the degree to which database records
fulfill our intuitions about vague expressions in natural language such as
`a small rainy city near San Francisco&#39;. We present our toolset supporting the
rapid prototyping of such database interfaces by means of a meta-level
description of a data model and a lexicon for a query language.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1454.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1454-en-natural_language_database_interface.mp3"
        length="256901120"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1454-en-natural_language_database_interface.mp3?1399728399</guid>
      <dc:identifier>import-7ec4d5ccef835f7fdf</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Richard Bergmair</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:summary>We give a thorough exposition of our natural language database interface that
produces result sets ranked according to the degree to which database records
fulfill our intuitions about vague expressions in natural language such as
`a small rainy city near San Francisco&#39;. We present our toolset supporting the
rapid prototyping of such database interfaces by means of a meta-level
description of a data model and a lexicon for a query language.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1454.en.html
</itunes:summary>
      <itunes:duration>01:02:28</itunes:duration>
    </item>
    <item>
      <title>Java wird Groovy (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1419-de-java_wird_groovy</link>
      <description>Groovy ist eine neue, dynamische Sprache für die Java-VM. 
Sie greift Konzepte von Smalltalk, Python und Ruby auf und integriert Sie nach Java.
Die Integration ist leichtgängig, da die Syntax hinreichend ähnlich zu Java ist und
reibungslos bestehende Java-Bibliotheken genutzt werden können.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1419.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1419-de-java_wird_groovy.mp3"
        length="400556032"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1419-de-java_wird_groovy.mp3?1399728399</guid>
      <dc:identifier>import-4be8d960e783fac67d</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>tof (Christof Vollrath)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Eine Einführung in die neue, dynamische Sprache für das Java-Ökosystem</itunes:subtitle>
      <itunes:summary>Groovy ist eine neue, dynamische Sprache für die Java-VM. 
Sie greift Konzepte von Smalltalk, Python und Ruby auf und integriert Sie nach Java.
Die Integration ist leichtgängig, da die Syntax hinreichend ähnlich zu Java ist und
reibungslos bestehende Java-Bibliotheken genutzt werden können.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1419.en.html
</itunes:summary>
      <itunes:duration>00:50:30</itunes:duration>
    </item>
    <item>
      <title>RFID hacking (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1576-en-rfid_hacking</link>
      <description>This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1576.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1576-en-rfid_hacking.mp3"
        length="228589568"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1576-en-rfid_hacking.mp3?1399728399</guid>
      <dc:identifier>import-6809edc70e003b4ece</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Karsten Nohl, Henryk Plötz, z0ccor</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:summary>This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1576.en.html
</itunes:summary>
      <itunes:duration>00:58:22</itunes:duration>
    </item>
    <item>
      <title>Information Operations (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1439-en-information_operations</link>
      <description>The use of information technology has brought a lot of new functionality and efficiency with it. But due to the fact that enterprises are totally dependant on IT, they are vulnerable to theft or destruction of information assets, a process described as information operations. This is the presentation of a one-year Postgraduate Infosec Research Project conducted in New Zealand.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1439.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1439-en-information_operations.mp3"
        length="180355072"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1439-en-information_operations.mp3?1399728399</guid>
      <dc:identifier>import-22db6c85faa2782a96</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Sebastian Schroeder</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>Sector-Oriented Analysis of the Potential Impact and Possible Countermeasures</itunes:subtitle>
      <itunes:summary>The use of information technology has brought a lot of new functionality and efficiency with it. But due to the fact that enterprises are totally dependant on IT, they are vulnerable to theft or destruction of information assets, a process described as information operations. This is the presentation of a one-year Postgraduate Infosec Research Project conducted in New Zealand.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1439.en.html
</itunes:summary>
      <itunes:duration>01:16:04</itunes:duration>
    </item>
    <item>
      <title>Hacking a Country: FOSS in India (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1603-en-foss_in_india</link>
      <description>This talk is about the growth of Free Software in India. It includes an overview of how Free Software has spread not only within the industry but also with in the Government and Education. Includes examples of Indian innovation based on Free Software, including the Simputer.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1603.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1603-en-foss_in_india.mp3"
        length="152043520"
        type="audio/mpeg"/>
      <pubDate>Wed, 27 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1603-en-foss_in_india.mp3?1399728399</guid>
      <dc:identifier>import-4cc0be04257f4b5318</dc:identifier>
      <dc:date>2006-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Atul Chitnis</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Community</itunes:keywords>
      <itunes:subtitle>An Overview Free and Open Source Software efforts and projects in India</itunes:subtitle>
      <itunes:summary>This talk is about the growth of Free Software in India. It includes an overview of how Free Software has spread not only within the industry but also with in the Government and Education. Includes examples of Indian innovation based on Free Software, including the Simputer.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1603.en.html
</itunes:summary>
      <itunes:duration>01:01:41</itunes:duration>
    </item>
    <item>
      <title>Automated Exploit Detection in Binaries (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1694-en-automated_exploit_detection_in_binaries</link>
      <description>In this talk, we will introduce the audience to the concepts
involved in static analysis, and different implementations of those concepts
with advantages and disadvantages of each. We will show how the open source
tool bugreport (http://bugreport.sf.net) implements these concepts and will
demonstrate the tool finding exploitable bugs in real-world binaries.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1694.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1694-en-automated_exploit_detection_in_binaries.mp3"
        length="213909504"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1694-en-automated_exploit_detection_in_binaries.mp3?1399728399</guid>
      <dc:identifier>import-68c94579cb323fe39d</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Luis Miras</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Finding exploitable vulnerabilities in binaries</itunes:subtitle>
      <itunes:summary>In this talk, we will introduce the audience to the concepts
involved in static analysis, and different implementations of those concepts
with advantages and disadvantages of each. We will show how the open source
tool bugreport (http://bugreport.sf.net) implements these concepts and will
demonstrate the tool finding exploitable bugs in real-world binaries.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1694.en.html
</itunes:summary>
      <itunes:duration>00:46:50</itunes:duration>
    </item>
    <item>
      <title>Tap the Electronic Frontier Foundation (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1710-en-tap_the_eff</link>
      <description>EFF staffers answer your questions about American wiretapping, the
latest moves of the *AA, the spread of the DMCA through free trade
agreements, what&#39;s up at WIPO, and other dispatches from the US and
elsewhere.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1710.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1710-en-tap_the_eff.mp3"
        length="649068544"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1710-en-tap_the_eff.mp3?1399728399</guid>
      <dc:identifier>import-4d0f52c0d863e63b49</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Peter Eckersley, Seth Schoen, Danny O&#39;Brien</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Society</itunes:keywords>
      <itunes:subtitle>EFF staffers answer your questions!</itunes:subtitle>
      <itunes:summary>EFF staffers answer your questions about American wiretapping, the
latest moves of the *AA, the spread of the DMCA through free trade
agreements, what&#39;s up at WIPO, and other dispatches from the US and
elsewhere.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1710.en.html
</itunes:summary>
      <itunes:duration>01:37:16</itunes:duration>
    </item>
    <item>
      <title>Software Protection and the TPM (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1721-en-software_protection_and_the_tpm</link>
      <description>Ever since Apple announced the x86 version of Mac OS X, people have been obsessed with running the operating system on non-Apple hardware. The media has given this topic more than its fair share of coverage, with nary a week going by without some discussion of the tussle between Apple and system attackers attempting to &quot;crack&quot; Mac OS X.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1721.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1721-en-software_protection_and_the_tpm.mp3"
        length="295698432"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1721-en-software_protection_and_the_tpm.mp3?1399728399</guid>
      <dc:identifier>import-63b6e70b859a1b152d</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Amit Singh</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>The Mac OS X Story</itunes:subtitle>
      <itunes:summary>Ever since Apple announced the x86 version of Mac OS X, people have been obsessed with running the operating system on non-Apple hardware. The media has given this topic more than its fair share of coverage, with nary a week going by without some discussion of the tussle between Apple and system attackers attempting to &quot;crack&quot; Mac OS X.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1721.en.html
</itunes:summary>
      <itunes:duration>01:08:59</itunes:duration>
    </item>
    <item>
      <title>Virtuelle Sicherheit (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1493-de-virtuelle_sicherheit</link>
      <description>Xen bietet aufregende neue Sicherheitsfunktionen: Mandatory Access Control und virtuelle TPMs. Der Vortrag stellt diese Funktionen vor, berichtet von ersten Erfahrungen und zeigt ihre Grenzen auf.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1493.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1493-de-virtuelle_sicherheit.mp3"
        length="120586240"
        type="audio/mpeg"/>
      <pubDate>Sat, 30 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1493-de-virtuelle_sicherheit.mp3?1399728399</guid>
      <dc:identifier>import-9a29d7fecce7ac000e</dc:identifier>
      <dc:date>2006-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Ralf Spenneberg</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:subtitle>Mandatory Access Control und TPM in Xen</itunes:subtitle>
      <itunes:summary>Xen bietet aufregende neue Sicherheitsfunktionen: Mandatory Access Control und virtuelle TPMs. Der Vortrag stellt diese Funktionen vor, berichtet von ersten Erfahrungen und zeigt ihre Grenzen auf.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1493.en.html
</itunes:summary>
      <itunes:duration>01:03:51</itunes:duration>
    </item>
    <item>
      <title>A Hacker&#39;s Toolkit for RFID Emulation and Jamming (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming</link>
      <description>Radio Frequency Identification (RFID) tags are remotely-powered data carriers, that are often touted as a &quot;computer of the future&quot;, bringing intelligence to our homes and offices, optimizing our supply chains, and keeping a watchful eye on our pets, livestock, and kids.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1597.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.mp3"
        length="265289728"
        type="audio/mpeg"/>
      <pubDate>Thu, 28 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.mp3?1399728399</guid>
      <dc:identifier>import-c39609eaa4f8ce253f</dc:identifier>
      <dc:date>2006-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Melanie Rieback</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Hacking</itunes:keywords>
      <itunes:summary>Radio Frequency Identification (RFID) tags are remotely-powered data carriers, that are often touted as a &quot;computer of the future&quot;, bringing intelligence to our homes and offices, optimizing our supply chains, and keeping a watchful eye on our pets, livestock, and kids.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1597.en.html
</itunes:summary>
      <itunes:duration>01:05:22</itunes:duration>
    </item>
    <item>
      <title>Mining Search Queries (23c3)</title>
      <link>https://media.ccc.de/v/23C3-1498-en-mining_aol_search_queries</link>
      <description>AOL recently published over 34M weakly anonymized search queries from their users by intension. This lecture gives an overview on the results of an extensive statistical analysis and data mining procedure on this dataset. Thereby, a methodology for frequency analysis, search trend mining, topic detection and even user profiling and identification will be presented.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1498.en.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2006/audio/23C3-1498-en-mining_aol_search_queries.mp3"
        length="199229440"
        type="audio/mpeg"/>
      <pubDate>Fri, 29 Dec 2006 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2006/audio/23C3-1498-en-mining_aol_search_queries.mp3?1399728399</guid>
      <dc:identifier>import-0a063c79bad4fefe45</dc:identifier>
      <dc:date>2006-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Robert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>23c3, Science</itunes:keywords>
      <itunes:subtitle>How to discover additional knowledge in the AOL query logs</itunes:subtitle>
      <itunes:summary>AOL recently published over 34M weakly anonymized search queries from their users by intension. This lecture gives an overview on the results of an extensive statistical analysis and data mining procedure on this dataset. Thereby, a methodology for frequency analysis, search trend mining, topic detection and even user profiling and identification will be presented.

about this event: http://events.ccc.de/congress/2006/Fahrplan/events/1498.en.html
</itunes:summary>
      <itunes:duration>00:49:38</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/congress/2006/folder-23c3.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from 23c3 as mp3</itunes:summary>
  </channel>
</rss>