<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - 30C3 (high quality mp4)</title>
    <link>https://media.ccc.de/c/30c3</link>
    <description> This feed contains all events from 30c3 as mp4</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:43:03 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/congress/2013/folder-30c3.png</url>
      <title>Chaos Computer Club - 30C3 (high quality mp4)</title>
      <link>https://media.ccc.de/c/30c3</link>
    </image>
    <item>
      <title>To Protect And Infect (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire</link>
      <description>2013 will be remembered as the year that the Internet lost its innocence for nearly everyone as light was shed on the widespread use of dragnet surveillance by the NSA and intelligence agencies globally. With the uprisings of the Arab Spring where people raided the offices of their regimes to bring evidence to light, we&#39;ve seen a tremendous phenomenon: a large numbers of whistleblowers have taken action to inform the public about important details. The WikiLeaks SpyFiles series also shows us important details to corroborate these claims. There is ample evidence about the use and abuses of a multi-billion dollar industry that have now come to light. This evidence includes increasing use of targeted attacks to establish even more invasive control over corporate, government or other so-called legitimate targets.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5439.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5439-en-To_Protect_And_Infect_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5439-en-To_Protect_And_Infect_h264-hd.mp4?1414847032</guid>
      <dc:identifier>BAKqlbEKHMpBMr22KlDsEg</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Claudio Guarnieri, Morgan Marquis-Boire</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>The militarization of the Internet</itunes:subtitle>
      <itunes:summary>2013 will be remembered as the year that the Internet lost its innocence for nearly everyone as light was shed on the widespread use of dragnet surveillance by the NSA and intelligence agencies globally. With the uprisings of the Arab Spring where people raided the offices of their regimes to bring evidence to light, we&#39;ve seen a tremendous phenomenon: a large numbers of whistleblowers have taken action to inform the public about important details. The WikiLeaks SpyFiles series also shows us important details to corroborate these claims. There is ample evidence about the use and abuses of a multi-billion dollar industry that have now come to light. This evidence includes increasing use of targeted attacks to establish even more invasive control over corporate, government or other so-called legitimate targets.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5439.html
</itunes:summary>
      <itunes:duration>00:45:52</itunes:duration>
    </item>
    <item>
      <title>30C3 Infrastructure Review (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5609_-_en_-_saal_6_-_201312301430_-_infrastructure_review_-_kay_-_peter_stuge_-_florolf_-_sebastian_-_m</link>
      <description>
about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5609.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5609-en-Infrastructure_Review_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5609-en-Infrastructure_Review_h264-hq.mp4?1399728422</guid>
      <dc:identifier>WbqegbTKG5YheKse8X4ZUw</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>kay, Peter Stuge, florolf, Sebastian, *m</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, CCC</itunes:keywords>
      <itunes:subtitle>Presentation of MOC/NOC/VOC/SOC/*OC</itunes:subtitle>
      <itunes:summary>
about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5609.html
</itunes:summary>
      <itunes:duration>01:11:37</itunes:duration>
    </item>
    <item>
      <title>Hacking as Artistic Practice (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5425_-_en_-_saal_6_-_201312281900_-_hacking_as_artistic_practice_-_mediengruppe_bitnik_-_mediengruppe_bitnik</link>
      <description>!Mediengruppe Bitnik are contemporary artists. In their talk they will show two examples of their work, illustrating the translation of hacking from the computer field into an artistic practice. Bitnik will show how to hack the opera in ten easy steps and what happens when you send a parcel with a hidden live webcam to Julian Assange at the Ecuadorian Embassy in London. 

Using the strategies of hacking, !Mediengrupppe Bitnik intervenes into settings with the aim of opening them up to re-evaluation and new perspectives.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5425.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5425-en-Hacking_as_Artistic_Practice_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5425-en-Hacking_as_Artistic_Practice_h264-hq.mp4?1399728421</guid>
      <dc:identifier>nu_IEETazySR5xcJobNckw</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>!Mediengruppe Bitnik, !Mediengruppe Bitnik</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:subtitle>!Mediengruppe Bitnik about their recent works</itunes:subtitle>
      <itunes:summary>!Mediengruppe Bitnik are contemporary artists. In their talk they will show two examples of their work, illustrating the translation of hacking from the computer field into an artistic practice. Bitnik will show how to hack the opera in ten easy steps and what happens when you send a parcel with a hidden live webcam to Julian Assange at the Ecuadorian Embassy in London. 

Using the strategies of hacking, !Mediengrupppe Bitnik intervenes into settings with the aim of opening them up to re-evaluation and new perspectives.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5425.html
</itunes:summary>
      <itunes:duration>00:33:05</itunes:duration>
    </item>
    <item>
      <title>Thwarting Evil Maid Attacks (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5600_-_en_-_saal_1_-_201312301245_-_thwarting_evil_maid_attacks_-_eric_michaud_-_ryan_lackey</link>
      <description> 	Increasingly, users and their computing hardware are exposed a range of software and hardware attacks, ranging from disk imaging to hardware keylogger installation and beyond. Existing methods are inadequate to fully protect users, particularly from covert physical hardware modifications in the &quot;evil maid&quot; scenario, and yet are very inconvenient. Victims include governments and corporations traveling internationally (e.g. China), anti-government activists in places like Syria, and anyone who is a target of a motivated attacker who can gain physical access.

Physically Unclonable Functions, combined with a trusted mobile device and a network service, can be used to mitigate these risks. We present a novel open-source mobile client and network service which can protect arbitrary hardware from many forms of covert modification and attack, and which when integrated with software, firmware, and policy defenses, can provide greater protection to users and limit potential attack surface. We&#39;ll also be showing video of an unreleased tool to the public utilized by surveillance teams.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5600.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hd.mp4?1414847032</guid>
      <dc:identifier>ZYk9lubJJBkqDWJBOZpWyw</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Eric Michaud, Ryan Lackey</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Physically Unclonable Functions for Hardware Tamper Detection</itunes:subtitle>
      <itunes:summary> 	Increasingly, users and their computing hardware are exposed a range of software and hardware attacks, ranging from disk imaging to hardware keylogger installation and beyond. Existing methods are inadequate to fully protect users, particularly from covert physical hardware modifications in the &quot;evil maid&quot; scenario, and yet are very inconvenient. Victims include governments and corporations traveling internationally (e.g. China), anti-government activists in places like Syria, and anyone who is a target of a motivated attacker who can gain physical access.

Physically Unclonable Functions, combined with a trusted mobile device and a network service, can be used to mitigate these risks. We present a novel open-source mobile client and network service which can protect arbitrary hardware from many forms of covert modification and attack, and which when integrated with software, firmware, and policy defenses, can provide greater protection to users and limit potential attack surface. We&#39;ll also be showing video of an unreleased tool to the public utilized by surveillance teams.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5600.html
</itunes:summary>
      <itunes:duration>00:58:27</itunes:duration>
    </item>
    <item>
      <title>Sysadmins of the world, unite! (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5397_-_en_-_saal_1_-_201312292245_-_sysadmins_of_the_world_unite_-_julian_assange_-_jacob</link>
      <description>&lt;p&gt;Finally, the world is aware of the threat of mass surveillance and control, but we still have a fight on our hands, and that fight is both technical and political. Global democracy is not going to protect itself. There has never been a higher demand for a politically-engaged hackerdom. Jacob Appelbaum and Julian Assange discuss what needs to be done if we are going to win.&lt;/p&gt;

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5397.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hd.mp4?1414847031</guid>
      <dc:identifier>Lv-uOMbLZH1T17ZxxJ-TEQ</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Julian Assange, Jacob</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>a call to resistance</itunes:subtitle>
      <itunes:summary>&lt;p&gt;Finally, the world is aware of the threat of mass surveillance and control, but we still have a fight on our hands, and that fight is both technical and political. Global democracy is not going to protect itself. There has never been a higher demand for a politically-engaged hackerdom. Jacob Appelbaum and Julian Assange discuss what needs to be done if we are going to win.&lt;/p&gt;

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5397.html
</itunes:summary>
      <itunes:duration>00:31:37</itunes:duration>
    </item>
    <item>
      <title>Even More Tamagotchis Were Harmed in the Making of this Presentation (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5279_-_en_-_saal_1_-_201312291715_-_even_more_tamagotchis_were_harmed_in_the_making_of_this_presentation_-_natalie_silvanovich</link>
      <description>You might remember Tamagotchi virtual pets from the 1990&#39;s. These toys are still around and just as demanding as ever! At 29C3, I talked about my attempts to reverse engineer the latest Tamagotchis, and this presentation covers my progress since then. It includes methods for executing code on and dumping code from a Tamagotchi, an analysis of the Tamagotchi code dump and a demonstration of Tamagotchi development tools that make use of these capabilities. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5279.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hd.mp4?1414847031</guid>
      <dc:identifier>PtMWK4y18s0TL1Dr8L6VGw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Natalie Silvanovich</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:summary>You might remember Tamagotchi virtual pets from the 1990&#39;s. These toys are still around and just as demanding as ever! At 29C3, I talked about my attempts to reverse engineer the latest Tamagotchis, and this presentation covers my progress since then. It includes methods for executing code on and dumping code from a Tamagotchi, an analysis of the Tamagotchi code dump and a demonstration of Tamagotchi development tools that make use of these capabilities. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5279.html
</itunes:summary>
      <itunes:duration>00:46:05</itunes:duration>
    </item>
    <item>
      <title>Closing Event (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5606_-_en_-_saal_1_-_201312301830_-_closing_event_-_ths</link>
      <description>

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5606.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5606-de-en-Closing_Event_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5606-de-en-Closing_Event_h264-hd.mp4?1414847032</guid>
      <dc:identifier>HsPfR-yh7Zg-N6kQo58UIQ</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>ths</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, CCC</itunes:keywords>
      <itunes:summary>

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5606.html
</itunes:summary>
      <itunes:duration>00:51:03</itunes:duration>
    </item>
    <item>
      <title>The Exploration and Exploitation of an SD Memory Card (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5294_-_en_-_saal_1_-_201312291400_-_the_exploration_and_exploitation_of_an_sd_memory_card_-_bunnie_-_xobs</link>
      <description>All “managed FLASH” devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of reliable, contiguous storage out of FLASH silicon that is fundamentally unreliable and unpredictably fragmented. This controller is an attack surface of interest. First, the ability to modify the block allocation and erasure algorithms introduces the opportunity to perform various MITM attacks in a virtually undetectable fashion. Second, the controller itself is typically powerful, with performance around 50MIPS, yet with a cost of mere pennies, making it an interesting and possibly useful development target for other non-storage related purposes. Finally, understanding the inner workings of the controller enables opportunities for data recovery in cards that are thought to have been erased, or have been partially damaged.

This talk demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5294.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hd.mp4?1414847031</guid>
      <dc:identifier>PuDWTZPratvP-gVrrPScWQ</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>bunnie, Xobs</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>by xobs &amp; bunnie</itunes:subtitle>
      <itunes:summary>All “managed FLASH” devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of reliable, contiguous storage out of FLASH silicon that is fundamentally unreliable and unpredictably fragmented. This controller is an attack surface of interest. First, the ability to modify the block allocation and erasure algorithms introduces the opportunity to perform various MITM attacks in a virtually undetectable fashion. Second, the controller itself is typically powerful, with performance around 50MIPS, yet with a cost of mere pennies, making it an interesting and possibly useful development target for other non-storage related purposes. Finally, understanding the inner workings of the controller enables opportunities for data recovery in cards that are thought to have been erased, or have been partially damaged.

This talk demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5294.html
</itunes:summary>
      <itunes:duration>01:00:25</itunes:duration>
    </item>
    <item>
      <title>Do You Think That&#39;s Funny? (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5376_-_en_-_saal_1_-_201312271130_-_do_you_think_that_s_funny_-_lizvlx</link>
      <description>This lecture shall give a first person account of how circumstances have dramatically changed for actionist art practice over the last 15 years. I will use examples from my own art practice to show the  impossibility to engange in digital and real-life actionism as they are considered criminal under anti-terrorist laws.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5376.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4?1399728422</guid>
      <dc:identifier>T1NjW3fn1odK53hiQSAFKw</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>lizvlx</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:subtitle>Art Practice under the Regime of Anti-Terror Legislation</itunes:subtitle>
      <itunes:summary>This lecture shall give a first person account of how circumstances have dramatically changed for actionist art practice over the last 15 years. I will use examples from my own art practice to show the  impossibility to engange in digital and real-life actionism as they are considered criminal under anti-terrorist laws.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5376.html
</itunes:summary>
      <itunes:duration>00:54:03</itunes:duration>
    </item>
    <item>
      <title>CounterStrike (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5304_-_en_-_saal_1_-_201312292315_-_counterstrike_-_fx</link>
      <description>Lawful Interception is a monitoring access for law enforcement agencies, but also one of the primary data sources of many surveillance programs. (Almost?) every Internet service provider needs to provide LI functionality in its routers. However, LI exposes a larger attack surface to the one being surveilled than any router should. Could this be a mistake?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5304.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5304-en-CounterStrike_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5304-en-CounterStrike_h264-hd.mp4?1414847031</guid>
      <dc:identifier>il4lmTSfWPAY3ks_KW7SHg</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>FX</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Lawful Interception</itunes:subtitle>
      <itunes:summary>Lawful Interception is a monitoring access for law enforcement agencies, but also one of the primary data sources of many surveillance programs. (Almost?) every Internet service provider needs to provide LI functionality in its routers. However, LI exposes a larger attack surface to the one being surveilled than any router should. Could this be a mistake?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5304.html
</itunes:summary>
      <itunes:duration>00:46:35</itunes:duration>
    </item>
    <item>
      <title>25 Jahre Chipkarten-Angriffe (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5548_-_de_-_saal_1_-_201312282030_-_25_jahre_chipkarten-angriffe_-_peter_laackmann_-_marcus_janke</link>
      <description>Eine unterhaltsame, spannende und lehrreiche Reise durch 25 Jahre Chipkarten-Angriffe mit tiefen Einblicken in Amateur- und Profi-Hackerlabore, inklusive eines Ausblicks in neueste Methoden und zukünftige Ansätze.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5548.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hd.mp4?1414847032</guid>
      <dc:identifier>qU7LRRIvEiZBJAvAY5z_Ig</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Peter Laackmann, Marcus Janke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Von der Historie zur Zukunft</itunes:subtitle>
      <itunes:summary>Eine unterhaltsame, spannende und lehrreiche Reise durch 25 Jahre Chipkarten-Angriffe mit tiefen Einblicken in Amateur- und Profi-Hackerlabore, inklusive eines Ausblicks in neueste Methoden und zukünftige Ansätze.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5548.html
</itunes:summary>
      <itunes:duration>01:01:05</itunes:duration>
    </item>
    <item>
      <title>Fnord News Show (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5490_-_de_-_saal_1_-_201312300000_-_fnord_news_show_-_frank_-_fefe</link>
      <description>Im Format einer lockeren Abendshow werden wir die Highlights des Jahres präsentieren, die Meldungen zwischen den Meldungen, die subtilen Sensationen hinter den Schlagzeilen. Kommen Sie, hören Sie, sehen Sie! Lassen Sie sich mitreißen!

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5490.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5490-de-en-Fnord_News_Show_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5490-de-en-Fnord_News_Show_h264-hd.mp4?1414847032</guid>
      <dc:identifier>SQ8Tgi8YgRRsHy76BWIJ3A</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>frank, Fefe</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Entertainment</itunes:keywords>
      <itunes:subtitle>Der schonungslose Realitätsabgleich mit Birzarrometer-Rekalibrierung [The harsh reality check and recalibration of the bizarre-o-meter]</itunes:subtitle>
      <itunes:summary>Im Format einer lockeren Abendshow werden wir die Highlights des Jahres präsentieren, die Meldungen zwischen den Meldungen, die subtilen Sensationen hinter den Schlagzeilen. Kommen Sie, hören Sie, sehen Sie! Lassen Sie sich mitreißen!

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5490.html
</itunes:summary>
      <itunes:duration>01:57:30</itunes:duration>
    </item>
    <item>
      <title>Seeing The Secret State: Six Landscapes (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5604_-_en_-_saal_1_-_201312282300_-_seeing_the_secret_state_six_landscapes_-_trevor_paglen</link>
      <description>Although people around the world are becoming increasingly aware of the United States&#39; global geography of surveillance, covert action, and other secret programs, much of this landscape is invisible in our everyday lives.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5604.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hd.mp4?1414847032</guid>
      <dc:identifier>3HEv_YYlkY2P_y1pKfU7fA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Trevor Paglen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:summary>Although people around the world are becoming increasingly aware of the United States&#39; global geography of surveillance, covert action, and other secret programs, much of this landscape is invisible in our everyday lives.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5604.html
</itunes:summary>
      <itunes:duration>00:49:05</itunes:duration>
    </item>
    <item>
      <title>07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5634_-__-_saal_1_-_201312271600_-_07kingston25_jamaica_malaria_update_dispatches_from_fort_meade_-_alexa_o_brien</link>
      <description>At Fort George &quot;Orwell&quot; Meade, home of the NSA and the US Defense Information School, managing the message of Chelsea Manning&#39;s trial was facilitated by a lack of public access to most of the court filings and rulings until 18 months into her legal proceeding.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5634.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hd.mp4?1414847032</guid>
      <dc:identifier>d7ZRyNoL-Oceu9NYorKzgA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Alexa O&#39;Brien</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Reporting on the secret trial of Chelsea Manning</itunes:subtitle>
      <itunes:summary>At Fort George &quot;Orwell&quot; Meade, home of the NSA and the US Defense Information School, managing the message of Chelsea Manning&#39;s trial was facilitated by a lack of public access to most of the court filings and rulings until 18 months into her legal proceeding.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5634.html
</itunes:summary>
      <itunes:duration>00:58:10</itunes:duration>
    </item>
    <item>
      <title>Security of the IC Backside (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5459_-__-_saal_1_-_201312282145_-_security_of_the_ic_backside_-_nedos</link>
      <description>In the chain of trust of most secure schemes is an electronic chip that holds secret information. These schemes often employ cryptographically secure protocols. The weakest link of such a scheme is the chip itself. By attacking the chip directly an attacker can gain access to the secret data in its unencrypted form. In this presentation we demonstrate the attack class of the future, backside attacks. This class of attacks mitigate all device countermeasures and can access all signals of the device. As opposed to the attacks of today, these attacks can also be applied to complex systems such as the ARM SoCs of modern smartphones.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5459.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hd.mp4?1414847032</guid>
      <dc:identifier>QQSVk4IwhteVQcAB1CKVpA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>nedos</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>The future of IC analysis</itunes:subtitle>
      <itunes:summary>In the chain of trust of most secure schemes is an electronic chip that holds secret information. These schemes often employ cryptographically secure protocols. The weakest link of such a scheme is the chip itself. By attacking the chip directly an attacker can gain access to the secret data in its unencrypted form. In this presentation we demonstrate the attack class of the future, backside attacks. This class of attacks mitigate all device countermeasures and can access all signals of the device. As opposed to the attacks of today, these attacks can also be applied to complex systems such as the ARM SoCs of modern smartphones.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5459.html
</itunes:summary>
      <itunes:duration>00:59:08</itunes:duration>
    </item>
    <item>
      <title>Baseband Exploitation in 2013 (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5618_-_en_-_saal_1_-_201312272145_-_baseband_exploitation_in_2013_-_rpw_esizkur</link>
      <description>Exploitation of baseband vulnerabilities has become significantly harder on average. With Qualcomm having grabbed 97% of the market share of shipped LTE chipsets in 1Q2013, you see their chipset in every single top-of-the-line smartphone, whether it is an Android, an iPhone, a Windows Phone or a Blackberry.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5618.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hd.mp4?1414847032</guid>
      <dc:identifier>c3Q-MbMX7FDXWv6rYj2bFw</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>RPW, esizkur</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Hexagon challenges</itunes:subtitle>
      <itunes:summary>Exploitation of baseband vulnerabilities has become significantly harder on average. With Qualcomm having grabbed 97% of the market share of shipped LTE chipsets in 1Q2013, you see their chipset in every single top-of-the-line smartphone, whether it is an Android, an iPhone, a Windows Phone or a Blackberry.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5618.html
</itunes:summary>
      <itunes:duration>00:58:43</itunes:duration>
    </item>
    <item>
      <title>The Year in Crypto (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5339_-_en_-_saal_1_-_201312281830_-_the_year_in_crypto_-_nadia_heninger_-_djb_-_tanja_lange</link>
      <description>This was a busy year for crypto.

TLS was broken.  And then broken again.

Discrete logs were computed.  And then computed again.

Is the cryptopocalypse nigh?

Has the NSA backdoored everything in sight?

Also, answers to last year&#39;s exercises will be given.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5339.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5339-en-de-The_Year_in_Crypto_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5339-en-de-The_Year_in_Crypto_h264-hd.mp4?1414847031</guid>
      <dc:identifier>PPVcroSxtnY9RfXjkEmxGA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Nadia Heninger, djb, Tanja Lange</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:summary>This was a busy year for crypto.

TLS was broken.  And then broken again.

Discrete logs were computed.  And then computed again.

Is the cryptopocalypse nigh?

Has the NSA backdoored everything in sight?

Also, answers to last year&#39;s exercises will be given.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5339.html
</itunes:summary>
      <itunes:duration>00:59:54</itunes:duration>
    </item>
    <item>
      <title>Hardware Attacks, Advanced ARM Exploitation, and Android Hacking (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5193_-_en_-_saal_1_-_201312281715_-_hardware_attacks_advanced_arm_exploitation_and_android_hacking_-_stephen_a_ridley</link>
      <description>In this talk (which in part was delivered at Infiltrate 2013 and NoSuchCon 2013) we will discuss our recent research that is being rolled into our Practical ARM Exploitation course (sold out at Blackhat this year and last) on Linux and Android (for embedded applications and mobile devices). We will also demonstrate these techniques and discuss how we were able to discover them using several ARM hardware development platforms that we custom built.  Where relevant we will also discuss ARM exploitation as it related to Android as we wrote about in the &quot;Android Hackers Handbook&quot; which we co-authored and will be released in October 2013.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5193.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hd.mp4?1414847031</guid>
      <dc:identifier>I1Wkt7x8Yy2ZnP2kOGAuXA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Stephen A. Ridley</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:summary>In this talk (which in part was delivered at Infiltrate 2013 and NoSuchCon 2013) we will discuss our recent research that is being rolled into our Practical ARM Exploitation course (sold out at Blackhat this year and last) on Linux and Android (for embedded applications and mobile devices). We will also demonstrate these techniques and discuss how we were able to discover them using several ARM hardware development platforms that we custom built.  Where relevant we will also discuss ARM exploitation as it related to Android as we wrote about in the &quot;Android Hackers Handbook&quot; which we co-authored and will be released in October 2013.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5193.html
</itunes:summary>
      <itunes:duration>00:57:19</itunes:duration>
    </item>
    <item>
      <title>Security Nightmares (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5413_-_de_-_saal_1_-_201312301715_-_security_nightmares_-_frank_-_ron</link>
      <description>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5413.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5413-de-en-Security_Nightmares_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5413-de-en-Security_Nightmares_h264-hd.mp4?1414847032</guid>
      <dc:identifier>0wIAXwCTvHhMFKucqslNxg</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>frank, Ron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Entertainment</itunes:keywords>
      <itunes:subtitle>Damit Sie auch morgen schlecht von Ihrem Computer träumen. [Tomorrow’s computer nightmares, today.]</itunes:subtitle>
      <itunes:summary>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5413.html
</itunes:summary>
      <itunes:duration>01:30:41</itunes:duration>
    </item>
    <item>
      <title>Glass Hacks (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5537_-_en_-_saal_1_-_201312281245_-_glass_hacks_-_stephen_balaban</link>
      <description>A one hour technical lecture that covers everything from machine learning and AI to hardware design and manufacture. Includes demonstrations of applications enabled by an always-on image capturing wearable computer. You&#39;ll leave with a clear understanding of the field&#39;s status quo, how we got here, and insight into what&#39;s around the corner.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5537.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5537-en-Glass_Hacks_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5537-en-Glass_Hacks_h264-hd.mp4?1414847032</guid>
      <dc:identifier>BK1ziXHv5du-_NJN24p9lA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Stephen Balaban</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>Fun and frightening uses of always-on camera enabled wearable computers</itunes:subtitle>
      <itunes:summary>A one hour technical lecture that covers everything from machine learning and AI to hardware design and manufacture. Includes demonstrations of applications enabled by an always-on image capturing wearable computer. You&#39;ll leave with a clear understanding of the field&#39;s status quo, how we got here, and insight into what&#39;s around the corner.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5537.html
</itunes:summary>
      <itunes:duration>01:00:29</itunes:duration>
    </item>
    <item>
      <title>The Four Wars (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5295_-_en_-_saal_1_-_201312292030_-_the_four_wars_-_annie_machon</link>
      <description>Based on her own experiences as an Intelligence Officer for MI5 (the UK domestic security service) and a whistleblower, Annie Machon will talk about the relationships between the wars on &#39;terror&#39;, drugs, whistleblowers, and the internet, and suggest some ideas about what we can do.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5295.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5295-en-The_Four_Wars_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5295-en-The_Four_Wars_h264-hd.mp4?1414847031</guid>
      <dc:identifier>bXlhO9ZYXyqOM_1vcI_WyA</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Annie Machon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Terror, whistleblowers, drugs, internet</itunes:subtitle>
      <itunes:summary>Based on her own experiences as an Intelligence Officer for MI5 (the UK domestic security service) and a whistleblower, Annie Machon will talk about the relationships between the wars on &#39;terror&#39;, drugs, whistleblowers, and the internet, and suggest some ideas about what we can do.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5295.html
</itunes:summary>
      <itunes:duration>00:24:23</itunes:duration>
    </item>
    <item>
      <title>To Protect And Infect, Part 2 (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5713_-_en_-_saal_2_-_201312301130_-_to_protect_and_infect_part_2_-_jacob</link>
      <description>

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5713.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5713-en-To_Protect_And_Infect_Part_2_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5713-en-To_Protect_And_Infect_Part_2_h264-hq.mp4?1420051681</guid>
      <dc:identifier>i5TMBRf_-3TiDrceuY3osQ</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Jacob</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>The militarization of the Internet</itunes:subtitle>
      <itunes:summary>

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5713.html
</itunes:summary>
      <itunes:duration>01:02:51</itunes:duration>
    </item>
    <item>
      <title>Hacker Jeopardy (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5577_-_de_-_saal_1_-_201312280000_-_hacker_jeopardy_-_sec_-_ray</link>
      <description>The Hacker Jeopardy is a quiz show.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5577.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5577-de-en-Hacker_Jeopardy_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5577-de-en-Hacker_Jeopardy_h264-hd.mp4?1414847032</guid>
      <dc:identifier>4xOGbMd8E3ezI9zpD6BO4A</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Sec, Ray</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Entertainment</itunes:keywords>
      <itunes:subtitle>Zahlenraten für Geeks [Number guessing for geeks]</itunes:subtitle>
      <itunes:summary>The Hacker Jeopardy is a quiz show.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5577.html
</itunes:summary>
      <itunes:duration>02:27:31</itunes:duration>
    </item>
    <item>
      <title>Amtliche Datenschützer: Kontrolleure oder Papiertiger? (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5623_-_de_-_saal_1_-_201312301600_-_amtliche_datenschutzer_kontrolleure_oder_papiertiger_-_peter_schaar</link>
      <description>In dem Vortrag beschäftigt sich der Ex-Bundesdatenschützer mit der Rolle der Datenschutzbeauftragten: Welche Durchsetzungsmöglichkeiten haben sie? Wie ist ihr Verhältnis zur Zivilgesellschaft? Welchen Einfluss können sie auf europäischer und internationaler Ebene ausüben?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5623.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hd.mp4?1414847032</guid>
      <dc:identifier>hAXLUoYo1xQHEzFm6HR_SA</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Peter Schaar</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>In dem Vortrag beschäftigt sich der Ex-Bundesdatenschützer mit der Rolle der Datenschutzbeauftragten: Welche Durchsetzungsmöglichkeiten haben sie? Wie ist ihr Verhältnis zur Zivilgesellschaft? Welchen Einfluss können sie auf europäischer und internationaler Ebene ausüben?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5623.html
</itunes:summary>
      <itunes:duration>01:18:38</itunes:duration>
    </item>
    <item>
      <title>The good, the bad, and the ugly - Linux Kernel patches (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5446_-_en_-_saal_g_-_201312282200_-_the_good_the_bad_and_the_ugly_-_linux_kernel_patches_-_wsa</link>
      <description>Companies are often blamed for not working upstream. Surprisingly, the situation is not per se better with community projects. To change the latter for the better, Wolfram will show some examples regarding the Linux Kernel and present ideas to create win-win-win situations.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5446.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4?1399728425</guid>
      <dc:identifier>n-OE9MQoWcUq2LFZB2e6DQ</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>wsa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:summary>Companies are often blamed for not working upstream. Surprisingly, the situation is not per se better with community projects. To change the latter for the better, Wolfram will show some examples regarding the Linux Kernel and present ideas to create win-win-win situations.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5446.html
</itunes:summary>
      <itunes:duration>00:28:41</itunes:duration>
    </item>
    <item>
      <title>Through a PRISM, Darkly (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5255_-_en_-_saal_1_-_201312301400_-_through_a_prism_darkly_-_kurt_opsahl</link>
      <description>From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation&#39;s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5255.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hd.mp4?1414847031</guid>
      <dc:identifier>HimAg2Mox6GCcmhbE0NWkQ</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Kurt Opsahl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Everything we know about NSA spying</itunes:subtitle>
      <itunes:summary>From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation&#39;s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5255.html
</itunes:summary>
      <itunes:duration>01:03:33</itunes:duration>
    </item>
    <item>
      <title>The philosophy of hacking (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5278_-_en_-_saal_6_-_201312301300_-_the_philosophy_of_hacking_-_groente</link>
      <description>Modern society&#39;s use of technology as an instrument for domination is deeply problematic. Are instrumentality and domination inherent to the essence of technology? Can hacking provide an alternative approach to technology which can overcome this? How do art and beauty fit into this approach?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5278.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4?1399728425</guid>
      <dc:identifier>frveytbMWLT-K_WVy3MUYA</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>groente</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:subtitle>Contemplations on the essence of hacking and its implications on hacker ethics</itunes:subtitle>
      <itunes:summary>Modern society&#39;s use of technology as an instrument for domination is deeply problematic. Are instrumentality and domination inherent to the essence of technology? Can hacking provide an alternative approach to technology which can overcome this? How do art and beauty fit into this approach?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5278.html
</itunes:summary>
      <itunes:duration>00:30:10</itunes:duration>
    </item>
    <item>
      <title>Mobile network attack evolution (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5449_-_en_-_saal_1_-_201312271715_-_mobile_network_attack_evolution_-_karsten_nohl_-_luca_melette</link>
      <description>Mobile networks should protect users on several fronts: Calls need to be encrypted, customer data protected, and SIM cards shielded from malware.

Many networks are still reluctant to implement appropriate protection measures in legacy systems. But even those who add mitigations often fail to fully capture attacks: They target symptoms instead of solving the core issue.

This talks discusses mobile network and SIM card attacks that circumvent common protection techniques to illustrate the ongoing mobile attack evolution.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5449.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5449-en-Mobile_network_attack_evolution_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5449-en-Mobile_network_attack_evolution_h264-hd.mp4?1414847032</guid>
      <dc:identifier>xdX27wLbHpeOU_dSgBO4Hg</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Karsten Nohl, Luca Melette</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:summary>Mobile networks should protect users on several fronts: Calls need to be encrypted, customer data protected, and SIM cards shielded from malware.

Many networks are still reluctant to implement appropriate protection measures in legacy systems. But even those who add mitigations often fail to fully capture attacks: They target symptoms instead of solving the core issue.

This talks discusses mobile network and SIM card attacks that circumvent common protection techniques to illustrate the ongoing mobile attack evolution.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5449.html
</itunes:summary>
      <itunes:duration>00:49:33</itunes:duration>
    </item>
    <item>
      <title>Hacking the Czech Parliament via SMS (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5593_-_en_-_saal_1_-_201312301130_-_hacking_the_czech_parliament_via_sms_-_ztohoven</link>
      <description>The Czech art collective Ztohoven&#39; project “Moral Reform” was accomplished in collaboration with web security experts. Together they created the unique art concept of a mobile phone mass-hack.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5593.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_h264-hd.mp4?1414847032</guid>
      <dc:identifier>shKT8wmGW3LurqOCDmbZyg</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Ztohoven</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>A parliamentary drama of 223 actors</itunes:subtitle>
      <itunes:summary>The Czech art collective Ztohoven&#39; project “Moral Reform” was accomplished in collaboration with web security experts. Together they created the unique art concept of a mobile phone mass-hack.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5593.html
</itunes:summary>
      <itunes:duration>00:39:24</itunes:duration>
    </item>
    <item>
      <title>The Tor Network (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5423_-_en_-_saal_1_-_201312272030_-_the_tor_network_-_jacob_-_arma</link>
      <description>Roger Dingledine and Jacob Appelbaum will discuss contemporary Tor Network issues related to censorship, security, privacy and anonymity online.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5423.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5423-en-The_Tor_Network_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5423-en-The_Tor_Network_h264-hd.mp4?1414847032</guid>
      <dc:identifier>kkMSS4JoEJtzbF9jc2JJ4A</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Jacob, arma</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>We&#39;re living in interesting times</itunes:subtitle>
      <itunes:summary>Roger Dingledine and Jacob Appelbaum will discuss contemporary Tor Network issues related to censorship, security, privacy and anonymity online.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5423.html
</itunes:summary>
      <itunes:duration>01:02:47</itunes:duration>
    </item>
    <item>
      <title>Concepts for global TSCM (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5495_-_en_-_saal_2_-_201312301600_-_concepts_for_global_tscm_-_andy</link>
      <description>After studying the various levels of activities that come together in BuggedPlanet and realizing the scope and level of implementation of NSA´s SIGINT theatre, it´s propably time to step back, summarize the big picture and ask how we handle it properly.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5495.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5495-en-Concepts_for_global_TSCM_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5495-en-Concepts_for_global_TSCM_h264-hq.mp4?1399728424</guid>
      <dc:identifier>iDmPzetx6AuUFOlW1qFWig</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>andy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>getting out of surveillance state mode</itunes:subtitle>
      <itunes:summary>After studying the various levels of activities that come together in BuggedPlanet and realizing the scope and level of implementation of NSA´s SIGINT theatre, it´s propably time to step back, summarize the big picture and ask how we handle it properly.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5495.html
</itunes:summary>
      <itunes:duration>01:00:28</itunes:duration>
    </item>
    <item>
      <title>Die Drohnenkriege (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5532_-_de_-_saal_g_-_201312292300_-_die_drohnenkriege_-_norbert_schepers</link>
      <description>Die Drohnenkriege sind Ausdruck einer rasanten Entwicklung: vom „Krieg gegen den Terror“ nach 9/11 zur Kriegsführung der Zukunft. Einer Zukunft, die gelegentlich der Science Fiction der späten Achtziger zu entstammen scheint, in der Roboter die schmutzigen Kriege der Menschen kämpfen und sich schließlich gegen ihre Schöpfer erheben. Letzteres liegt noch längst nicht im Bereich des Möglichen, aber Wege zur Erschaffung autonomer Kampfroboter werden bereits beschritten. Der Vortrag will das Phänomen des Drohnenkrieges politisch einordnen und einen Ausblick versuchen.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5532.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5532-de-Die_Drohnenkriege_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5532-de-Die_Drohnenkriege_h264-hq.mp4?1420051677</guid>
      <dc:identifier>glr14-wGaYxsV63N4TJZDQ</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Norbert Schepers</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Kriegsführung der Zukunft?</itunes:subtitle>
      <itunes:summary>Die Drohnenkriege sind Ausdruck einer rasanten Entwicklung: vom „Krieg gegen den Terror“ nach 9/11 zur Kriegsführung der Zukunft. Einer Zukunft, die gelegentlich der Science Fiction der späten Achtziger zu entstammen scheint, in der Roboter die schmutzigen Kriege der Menschen kämpfen und sich schließlich gegen ihre Schöpfer erheben. Letzteres liegt noch längst nicht im Bereich des Möglichen, aber Wege zur Erschaffung autonomer Kampfroboter werden bereits beschritten. Der Vortrag will das Phänomen des Drohnenkrieges politisch einordnen und einen Ausblick versuchen.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5532.html
</itunes:summary>
      <itunes:duration>01:06:07</itunes:duration>
    </item>
    <item>
      <title>Human Rights and Technology (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5539_-_en_-_saal_6_-_201312301345_-_human_rights_and_technology_-_seb</link>
      <description>This talk aims to shed some light on recent human rights violations in the context of the use of digital information and communications technology, particularly considering the latest disclosures about the surveillance programmes of Western intelligence services. At the same time, it shall provide information about Amnesty International&#39;s positions and activities in this field and invite anybody interested in our work to get involved.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5539.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4?1399728424</guid>
      <dc:identifier>tbP0pE8M3Do-9jVyC04sXg</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Seb</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>&quot;A New Hope&quot; or &quot;The Empire Strikes Back&quot;?</itunes:subtitle>
      <itunes:summary>This talk aims to shed some light on recent human rights violations in the context of the use of digital information and communications technology, particularly considering the latest disclosures about the surveillance programmes of Western intelligence services. At the same time, it shall provide information about Amnesty International&#39;s positions and activities in this field and invite anybody interested in our work to get involved.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5539.html
</itunes:summary>
      <itunes:duration>00:32:30</itunes:duration>
    </item>
    <item>
      <title>World War II Hackers (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5474_-_en_-_saal_g_-_201312272145_-_world_war_ii_hackers_-_anja_drephal</link>
      <description>The use of encryption to secure sensitive data from unauthorized eyes is as old as human communication itself. Before the relatively new method of computerized encryption software converting data into a format unintelligible to anyone lacking the necessary key for its decryption, for a long time there was pen and paper and the human brain doing quite a bit of work. Up until the 20th century encryption had to be done literally by hand, to then be transmitted in paper form, via telegraphy or radio. In this context, encryption of data has always been of special importance during times of political conflict and war; subsequently, it saw its major developments during those times in history. This talk will examine and explain common hand encryption methods still employed today using the example of one very successful Soviet espionage group operating in Japan in the 1930s and 1940s: the spy ring centered around Richard Sorge, codenamed “Ramsay”.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5474.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5474-en-World_War_II_Hackers_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5474-en-World_War_II_Hackers_h264-hq.mp4?1399728424</guid>
      <dc:identifier>wGEf2KpP3_UU4Qm0vrtz1g</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Anja Drephal</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Stalin&#39;s best men, armed with paper and pen</itunes:subtitle>
      <itunes:summary>The use of encryption to secure sensitive data from unauthorized eyes is as old as human communication itself. Before the relatively new method of computerized encryption software converting data into a format unintelligible to anyone lacking the necessary key for its decryption, for a long time there was pen and paper and the human brain doing quite a bit of work. Up until the 20th century encryption had to be done literally by hand, to then be transmitted in paper form, via telegraphy or radio. In this context, encryption of data has always been of special importance during times of political conflict and war; subsequently, it saw its major developments during those times in history. This talk will examine and explain common hand encryption methods still employed today using the example of one very successful Soviet espionage group operating in Japan in the 1930s and 1940s: the spy ring centered around Richard Sorge, codenamed “Ramsay”.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5474.html
</itunes:summary>
      <itunes:duration>00:54:42</itunes:duration>
    </item>
    <item>
      <title>Das FlipDot-Projekt (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5426_-_de_-_saal_6_-_201312292300_-_das_flipdot-projekt_-_rfguy</link>
      <description>Inbetriebnahme alter Flip-Dot-Anzeigemodule eines
Autobahn-Parkleitsystems zu einer interaktiven Anzeige. Reverse
Engineering des Protokolls und Entwicklung einer Steuerplatine auf
Basis des Raspberry Pi.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5426.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5426-de-Das_FlipDot-Projekt_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5426-de-Das_FlipDot-Projekt_h264-hq.mp4?1420051680</guid>
      <dc:identifier>T9xtagBQuxQqbYH-xXXA2Q</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>RFguy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Spaß mit mechanischer Anzeige</itunes:subtitle>
      <itunes:summary>Inbetriebnahme alter Flip-Dot-Anzeigemodule eines
Autobahn-Parkleitsystems zu einer interaktiven Anzeige. Reverse
Engineering des Protokolls und Entwicklung einer Steuerplatine auf
Basis des Raspberry Pi.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5426.html
</itunes:summary>
      <itunes:duration>00:42:15</itunes:duration>
    </item>
    <item>
      <title>The Internet (Doesn&#39;t) Need Another Security Guide (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5538_-_en_-_saal_2_-_201312292030_-_the_internet_doesn_t_need_another_security_guide_-_evacide</link>
      <description>As Internet privacy/security professionals and amateur enthusiasts, we are often asked to give advice about best practices in this field. Sometimes this takes the form of one-on-one advice to our friends, sometimes it&#39;s training a room full of people, and sometimes you may be asked to write a blog post or a brief guide or an entire curriculum. This talk will survey the current Internet privacy guide landscape and discuss the perils and pitfalls of creating this type of resource, using the Electronic Frontier Foundation&#39;s Surveillance Self Defense project as a case study.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5538.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4?1399728423</guid>
      <dc:identifier>f6NKvCGB1dAhdYpKYouiHw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>evacide</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>Creating Internet Privacy and Security Resources That Don&#39;t Suck</itunes:subtitle>
      <itunes:summary>As Internet privacy/security professionals and amateur enthusiasts, we are often asked to give advice about best practices in this field. Sometimes this takes the form of one-on-one advice to our friends, sometimes it&#39;s training a room full of people, and sometimes you may be asked to write a blog post or a brief guide or an entire curriculum. This talk will survey the current Internet privacy guide landscape and discuss the perils and pitfalls of creating this type of resource, using the Electronic Frontier Foundation&#39;s Surveillance Self Defense project as a case study.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5538.html
</itunes:summary>
      <itunes:duration>01:02:05</itunes:duration>
    </item>
    <item>
      <title>Extracting keys from FPGAs, OTP Tokens and Door Locks (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5417_-_en_-_saal_6_-_201312281245_-_extracting_keys_from_fpgas_otp_tokens_and_door_locks_-_david</link>
      <description>Side-channel analysis (SCA) and related methods exploit physical characteristics of a (cryptographic) implementations to bypass security mechanisms and extract secret keys. Yet, SCA is often considered a purely academic exercise with no impact on real systems. In this talk, we show that this is not the case: Using the example of several wide-spread real-world devices, we demonstrate that even seemingly secure systems can be attacked by means of SCA with limited effort.  

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5417.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4?1399728423</guid>
      <dc:identifier>hWph2wdjII5XK6nCL_1kWA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>David</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Side-Channel (and other) Attacks in Practice</itunes:subtitle>
      <itunes:summary>Side-channel analysis (SCA) and related methods exploit physical characteristics of a (cryptographic) implementations to bypass security mechanisms and extract secret keys. Yet, SCA is often considered a purely academic exercise with no impact on real systems. In this talk, we show that this is not the case: Using the example of several wide-spread real-world devices, we demonstrate that even seemingly secure systems can be attacked by means of SCA with limited effort.  

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5417.html
</itunes:summary>
      <itunes:duration>00:41:28</itunes:duration>
    </item>
    <item>
      <title>Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5380_-_en_-_saal_2_-_201312291830_-_persistent_stealthy_remote-controlled_dedicated_hardware_malware_-_patrick_stewin</link>
      <description>In this work we present a stealthy malware that exploits dedicated hardware on the target system and remains persistant across boot cycles. The malware is capable of gathering valuable information such as passwords. Because the infected hardware can perform arbitrary main memory accesses, the malware can modify kernel data structures and escalate privileges of processes executed on the system.

The malware itself is a DMA malware implementation referred to as DAGGER. DAGGER exploits Intel’s Manageability Engine (ME), that executes firmware code such as Intel’s Active Management Technology (iAMT), as well as its OOB network channel. We have recently improved DAGGER’s capabilites to include support for 64-bit operating systems and a stealthy update mechanism to download new attack code.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5380.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5380-en-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5380-en-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4?1420051678</guid>
      <dc:identifier>bucvwuHzaSgt7x_L06ZcFA</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Patrick Stewin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:summary>In this work we present a stealthy malware that exploits dedicated hardware on the target system and remains persistant across boot cycles. The malware is capable of gathering valuable information such as passwords. Because the infected hardware can perform arbitrary main memory accesses, the malware can modify kernel data structures and escalate privileges of processes executed on the system.

The malware itself is a DMA malware implementation referred to as DAGGER. DAGGER exploits Intel’s Manageability Engine (ME), that executes firmware code such as Intel’s Active Management Technology (iAMT), as well as its OOB network channel. We have recently improved DAGGER’s capabilites to include support for 64-bit operating systems and a stealthy update mechanism to download new attack code.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5380.html
</itunes:summary>
      <itunes:duration>00:54:45</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks, Day 4 (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5564_-_en_-_saal_g_-_201312301245_-_lightning_talks_day_4_-_nickfarr</link>
      <description>

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5564.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5564-en-Lightning_Talks_Day_4_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5564-en-Lightning_Talks_Day_4_h264-hq.mp4?1420051679</guid>
      <dc:identifier>kqFqStFUznnMxkCkIWynPQ</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>nickfarr</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Other</itunes:keywords>
      <itunes:summary>

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5564.html
</itunes:summary>
      <itunes:duration>02:33:07</itunes:duration>
    </item>
    <item>
      <title>The Gospel of IRMA (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5214_-_en_-_saal_1_-_201312281130_-_the_gospel_of_irma_-_jaap-henk_hoepman</link>
      <description>Attribute Based Credentials (ABC) allow users to prove certain properties about themselves (e.g. age, race, license, etc.) without revealing their full identity. ABC are therefore important to protect the privacy of the user. The IRMA (I Reveal My Attributes) project of the Radboud University Nijmegen has created the first full and efficient implementation of this technology on smart cards. This allows ABC technology to be used in practice both on the Internet as well as in the physical world. We will discuss ABCs in general, the IRMA system, it&#39;s advantages and pitfalls, and future work.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5214.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5214-en-The_Gospel_of_IRMA__h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5214-en-The_Gospel_of_IRMA__h264-hd.mp4?1414847031</guid>
      <dc:identifier>CHcRJtYsY2jZ-1HovlXpcQ</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Jaap-Henk Hoepman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Attribute Based Credentials in Practice</itunes:subtitle>
      <itunes:summary>Attribute Based Credentials (ABC) allow users to prove certain properties about themselves (e.g. age, race, license, etc.) without revealing their full identity. ABC are therefore important to protect the privacy of the user. The IRMA (I Reveal My Attributes) project of the Radboud University Nijmegen has created the first full and efficient implementation of this technology on smart cards. This allows ABC technology to be used in practice both on the Internet as well as in the physical world. We will discuss ABCs in general, the IRMA system, it&#39;s advantages and pitfalls, and future work.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5214.html
</itunes:summary>
      <itunes:duration>00:55:38</itunes:duration>
    </item>
    <item>
      <title>Data Mining for Good (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5405_-_en_-_saal_g_-_201312291730_-_data_mining_for_good_-_patrick</link>
      <description>For over thirty years, human rights groups in Guatemala have carefully documented the killing and disappearance of many people in the early 1980s. There are tens of thousands of records in many databases, and over 80 million paper pages of police records available in the Archives of the National Police. Most of the prosecutions of the former military and police officials who committed the atrocities depends on eyewitnesses, specific documents, and forensic anthropologists&#39; examination of exhumed bones. However, data analysis helps to see the big patterns in the violence.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5405.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4?1399728422</guid>
      <dc:identifier>seTBwtIxwEedOMpITZG7EQ</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Patrick</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Using random sampling, entity resolution, communications metadata, and statistical modeling to assist prosecutions for disappearance and genocide in Guatemala</itunes:subtitle>
      <itunes:summary>For over thirty years, human rights groups in Guatemala have carefully documented the killing and disappearance of many people in the early 1980s. There are tens of thousands of records in many databases, and over 80 million paper pages of police records available in the Archives of the National Police. Most of the prosecutions of the former military and police officials who committed the atrocities depends on eyewitnesses, specific documents, and forensic anthropologists&#39; examination of exhumed bones. However, data analysis helps to see the big patterns in the violence.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5405.html
</itunes:summary>
      <itunes:duration>00:26:47</itunes:duration>
    </item>
    <item>
      <title>THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5421_-_en_-_saal_2_-_201312301400_-_the_database_nation_a_k_a_the_state_of_surveillance_-_houndbee</link>
      <description>23rd of December 2008 was a sad day in India for civil liberties. On this day, The Indian Parliament passed the &quot;The Information Technology (Amendment) Act&quot; with no debate in the House, which effectively means is that the government of India now has the power to monitor all digital communications in the country without a court order or a warrant. The &quot;world&#39;s largest democracy&quot; strongly leaning towards becoming a surveillance state raises many questions and poses severe challenges for free speech and economic justice in India and globally. This talk will map and review the current political, socio-cultural and legal landscape of mass-surveillance, data protection and censorship in India and analyse how it ties in to the global landscape of surveillance and censorship. It will also aim to create a discussion space to investigate the deeper effects of these so called &quot;welfare&quot; projects and how citizen-led movements can drive the state towards stronger data protection and privacy laws.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5421.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4?1399728422</guid>
      <dc:identifier>wkZOlAmoT5ydaMLNV0xCSw</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>houndbee</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>23rd of December 2008 was a sad day in India for civil liberties. On this day, The Indian Parliament passed the &quot;The Information Technology (Amendment) Act&quot; with no debate in the House, which effectively means is that the government of India now has the power to monitor all digital communications in the country without a court order or a warrant. The &quot;world&#39;s largest democracy&quot; strongly leaning towards becoming a surveillance state raises many questions and poses severe challenges for free speech and economic justice in India and globally. This talk will map and review the current political, socio-cultural and legal landscape of mass-surveillance, data protection and censorship in India and analyse how it ties in to the global landscape of surveillance and censorship. It will also aim to create a discussion space to investigate the deeper effects of these so called &quot;welfare&quot; projects and how citizen-led movements can drive the state towards stronger data protection and privacy laws.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5421.html
</itunes:summary>
      <itunes:duration>01:02:33</itunes:duration>
    </item>
    <item>
      <title>Warum die Digitale Revolution des Lernens gescheitert ist. (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5467_-_de_-_saal_2_-_201312301245_-_warum_die_digitale_revolution_des_lernens_gescheitert_ist_-_joran_muuss-merholz</link>
      <description>Der digitale Wandel hat uns grandiose Chancen für selbstbestimmtes, kreatives, kollaboratives, kritisches und demokratisches Lernen gebracht. Wir haben sie nicht genutzt.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5467.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5467-de-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5467-de-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4?1420051680</guid>
      <dc:identifier>iGUI8vSrFaU8uQiDfjNt2w</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Jöran Muuß-Merholz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Fünf Desillusionen</itunes:subtitle>
      <itunes:summary>Der digitale Wandel hat uns grandiose Chancen für selbstbestimmtes, kreatives, kollaboratives, kritisches und demokratisches Lernen gebracht. Wir haben sie nicht genutzt.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5467.html
</itunes:summary>
      <itunes:duration>01:01:04</itunes:duration>
    </item>
    <item>
      <title>Dead Man Edition (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5293_-_de_-_saal_6_-_201312301600_-_dead_man_edition_-_sebastian_jekutsch</link>
      <description>Die alarmierenden Zustände beim Abbau der Rohstoffe, die in den Bauteilen (z. B. dem Tantal-Elektrolytkondensator) eines Computers stecken, rufen Menschenrechtler auf den Plan. In den U.S.A. ist es 2010 gelungen, ein umstrittenes Gesetz umzusetzen, das die Finanzierung von Kriegsparteien durch Erzhandel regulieren soll. In der EU soll nun ähnliches geschehen. Der Vortrag klärt über die Geschichte auf, nennt Konsequenzen und formuliert Forderungen. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5293.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5293-en-Dead_Man_Edition_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5293-en-Dead_Man_Edition_h264-hq.mp4?1420051680</guid>
      <dc:identifier>DFXp3YBOM-2eU3_D89TSfQ</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Sebastian Jekutsch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Auf dem Weg zu fairer Elektronik am Beispiel der Elkos  [The way to fair electronics, by example of capacitors]</itunes:subtitle>
      <itunes:summary>Die alarmierenden Zustände beim Abbau der Rohstoffe, die in den Bauteilen (z. B. dem Tantal-Elektrolytkondensator) eines Computers stecken, rufen Menschenrechtler auf den Plan. In den U.S.A. ist es 2010 gelungen, ein umstrittenes Gesetz umzusetzen, das die Finanzierung von Kriegsparteien durch Erzhandel regulieren soll. In der EU soll nun ähnliches geschehen. Der Vortrag klärt über die Geschichte auf, nennt Konsequenzen und formuliert Forderungen. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5293.html
</itunes:summary>
      <itunes:duration>01:01:22</itunes:duration>
    </item>
    <item>
      <title>No Neutral Ground in a Burning World (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5491_-_en_-_saal_1_-_201312272300_-_no_neutral_ground_in_a_burning_world_-_quinn_norton_-_eleanor_saitta</link>
      <description>The news of the past few years is one small ripple in what is a great wave of culture and history, a generational clash of civilizations.  If you want to understand why governments are acting and reacting the way they are, and as importantly, how to shift their course, you need to understand what they&#39;re reacting to, how they see and fail to see the world, and how power, money, and idea of rule of law actually interact.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5491.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hd.mp4?1414847032</guid>
      <dc:identifier>a-xJCEtToBTndlcjWvCAKQ</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Quinn Norton, Eleanor Saitta</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>The news of the past few years is one small ripple in what is a great wave of culture and history, a generational clash of civilizations.  If you want to understand why governments are acting and reacting the way they are, and as importantly, how to shift their course, you need to understand what they&#39;re reacting to, how they see and fail to see the world, and how power, money, and idea of rule of law actually interact.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5491.html
</itunes:summary>
      <itunes:duration>00:45:40</itunes:duration>
    </item>
    <item>
      <title>30C3 Opening Event (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5605_-_en_-_saal_1_-_201312271100_-_opening_event_-_tim_pritlove</link>
      <description>&lt;p&gt;Introductory event to say hello to everybody, give a brief overview of the event&#39;s features and look into history and future alike&lt;/p&gt;
about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5605.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4?1399728422</guid>
      <dc:identifier>0i_XOY92eUOxB3jQO_Zj4g</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Tim Pritlove</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, CCC</itunes:keywords>
      <itunes:subtitle>Welcome to the 30th Chaos Communication Congress</itunes:subtitle>
      <itunes:summary>&lt;p&gt;Introductory event to say hello to everybody, give a brief overview of the event&#39;s features and look into history and future alike&lt;/p&gt;
about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5605.html
</itunes:summary>
      <itunes:duration>00:11:31</itunes:duration>
    </item>
    <item>
      <title>Coding your body (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5289_-_en_-_saal_6_-_201312301215_-_coding_your_body_-_sophie_hiltner</link>
      <description>The average movement habits of a clichè hacker are legendary. Cowering for days in front of unergonomic hardware setups, stoic ignorance of hardly decodeable signs of the body like hunger, eye- and backpains. Probably due to a general disinterest in non-digitally engineered systems.

Shouldn’t a true hacker know at least bits and pieces about the codes and signs of the body? We all know bits and pieces.. but are they the correct and helpful ones? We will discuss some technical and biological details of slipped discs, posture disservice and pain. I will show fundamental “red flags” which have to be serviced by a medical geek. But not all medical geeks have a good idea about the body&#39;s code, therefore I will also suggest some helpful therapies for the most common cases.
Bottom line: how to code your body to prevent pain without relying on smattering.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5289.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4?1399728421</guid>
      <dc:identifier>jFlUl2VQF7jfm3M4V2Iuiw</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Sophie Hiltner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>How to decipher the messages of your body</itunes:subtitle>
      <itunes:summary>The average movement habits of a clichè hacker are legendary. Cowering for days in front of unergonomic hardware setups, stoic ignorance of hardly decodeable signs of the body like hunger, eye- and backpains. Probably due to a general disinterest in non-digitally engineered systems.

Shouldn’t a true hacker know at least bits and pieces about the codes and signs of the body? We all know bits and pieces.. but are they the correct and helpful ones? We will discuss some technical and biological details of slipped discs, posture disservice and pain. I will show fundamental “red flags” which have to be serviced by a medical geek. But not all medical geeks have a good idea about the body&#39;s code, therefore I will also suggest some helpful therapies for the most common cases.
Bottom line: how to code your body to prevent pain without relying on smattering.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5289.html
</itunes:summary>
      <itunes:duration>00:32:18</itunes:duration>
    </item>
    <item>
      <title>Keine Anhaltspunkte für flächendeckende Überwachung (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5281_-_de_-_saal_1_-_201312271400_-_keine_anhaltspunkte_fur_flachendeckende_uberwachung_-_martin_haase_maha_-_khamacher</link>
      <description>Die Enthüllungen Edward Snowdens haben die deutsche Politik für kurze Zeit in Aufregung gebracht. Für eine Beruhigung reichte es bereits aus, die Enthüllungen in sprachlich-logisch cleverer Weise zu verarbeiten, sie teilweise in ein anderen Kontext zu stellen und so schließlich Entwarnung geben zu können: Die Bundesregierung hat „keine Anhaltspunkte für flächendeckende Überwachung“.

Bei diesem Vorgehen handelt sich um ein Paradebeispiel dafür, wie mit einfachen sprachlich-rhetorischen Tricks die politisch Verantwortlichen die Öffentlichkeit und sich selbst so weit täuschten, dass es ihnen nicht mehr nötig erschien, sich mit den eigentlichen Problemen auseinanderzusetzen, und so das leidige Thema aus dem Wahlkampf herausgehalten werden konnte. Neben den mittlerweile zum Standard gehörenden „Basta“-Floskeln spielte das Phänomen der Modalisierung eine besondere Rolle, wie die genauere Analyse zeigt. Auch logische Fehler wie Zirkelschlüssel und (zu) strikte Einschränkung des thematischen Bezugs erlaubten diese „Flucht-nach-vorne“-Strategie. Die Häufung sprachlicher Tricks und des logisch-inhaltlichen Ausweichens legen eine Inszenierung nahe.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5281.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hd.mp4?1414847031</guid>
      <dc:identifier>YYw-34ht9mf83cFWsxTCAw</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Martin Haase/maha, khamacher</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Die Diskussion um NSA, PRISM, Tempora sprachlich und logisch aufgearbeitet</itunes:subtitle>
      <itunes:summary>Die Enthüllungen Edward Snowdens haben die deutsche Politik für kurze Zeit in Aufregung gebracht. Für eine Beruhigung reichte es bereits aus, die Enthüllungen in sprachlich-logisch cleverer Weise zu verarbeiten, sie teilweise in ein anderen Kontext zu stellen und so schließlich Entwarnung geben zu können: Die Bundesregierung hat „keine Anhaltspunkte für flächendeckende Überwachung“.

Bei diesem Vorgehen handelt sich um ein Paradebeispiel dafür, wie mit einfachen sprachlich-rhetorischen Tricks die politisch Verantwortlichen die Öffentlichkeit und sich selbst so weit täuschten, dass es ihnen nicht mehr nötig erschien, sich mit den eigentlichen Problemen auseinanderzusetzen, und so das leidige Thema aus dem Wahlkampf herausgehalten werden konnte. Neben den mittlerweile zum Standard gehörenden „Basta“-Floskeln spielte das Phänomen der Modalisierung eine besondere Rolle, wie die genauere Analyse zeigt. Auch logische Fehler wie Zirkelschlüssel und (zu) strikte Einschränkung des thematischen Bezugs erlaubten diese „Flucht-nach-vorne“-Strategie. Die Häufung sprachlicher Tricks und des logisch-inhaltlichen Ausweichens legen eine Inszenierung nahe.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5281.html
</itunes:summary>
      <itunes:duration>01:06:24</itunes:duration>
    </item>
    <item>
      <title>Attacking HomeMatic (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5444_-_en_-_saal_g_-_201312301600_-_attacking_homematic_-_sathya_-_malli</link>
      <description>HomeMatic is a good working, inexpensive and quickly spreading home automation system supporting wired as well as (partly AES handshake protected) wireless communication. The first part of our talk deals with security issues of HomeMatic devices and their wireless communication protocol called BidCoS (Bidirectional Communication Standard). In the second part we introduce Homegear, our own interface software to control HomeMatic devices.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5444.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5444-en-Attacking_HomeMatic_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5444-en-Attacking_HomeMatic_h264-hq.mp4?1399728421</guid>
      <dc:identifier>VFu55BmcslSk-0RC0SZioA</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>sathya, Malli</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:summary>HomeMatic is a good working, inexpensive and quickly spreading home automation system supporting wired as well as (partly AES handshake protected) wireless communication. The first part of our talk deals with security issues of HomeMatic devices and their wireless communication protocol called BidCoS (Bidirectional Communication Standard). In the second part we introduce Homegear, our own interface software to control HomeMatic devices.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5444.html
</itunes:summary>
      <itunes:duration>00:59:21</itunes:duration>
    </item>
    <item>
      <title>Beyond the Tech: Building Internet Freedom Tools for Real People (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5550_-_en_-_saal_g_-_201312301130_-_beyond_the_tech_building_internet_freedom_tools_for_real_people_-_michael_brennan</link>
      <description>Few hackers will disagree that users are not given enough consideration when building Internet Freedom Tools designed to circumvent censorship and surveillance. But how do we do it? This talk will outline a framework for a user-focused approach to the Development and Impact of Internet Freedom Tools through using ethnography, human-centered design, and the practice of research-based product definition. This talk is intended for developers, researchers, and journalists who seek to understand how better tools can be developed to protect anonymity and provide unfettered access to the Internet.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5550.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Mon, 30 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4?1399728420</guid>
      <dc:identifier>JP6OE4tOQIpB0EL8ZGaoKg</dc:identifier>
      <dc:date>2013-12-30T01:00:00+01:00</dc:date>
      <itunes:author>Michael Brennan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:summary>Few hackers will disagree that users are not given enough consideration when building Internet Freedom Tools designed to circumvent censorship and surveillance. But how do we do it? This talk will outline a framework for a user-focused approach to the Development and Impact of Internet Freedom Tools through using ethnography, human-centered design, and the practice of research-based product definition. This talk is intended for developers, researchers, and journalists who seek to understand how better tools can be developed to protect anonymity and provide unfettered access to the Internet.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5550.html
</itunes:summary>
      <itunes:duration>01:02:20</itunes:duration>
    </item>
    <item>
      <title>BREACH in Agda (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5394_-_en_-_saal_g_-_201312281130_-_breach_in_agda_-_nicolas_pouillard</link>
      <description>Software engineering is in a unsustainable state: software is mainly developed in a trial and error fashion, which always leads to vulnerable systems. Several decades ago the correspondence between logics and programming (Curry-Howard) was found. This correspondence is now being used in modern programming languages using dependent types, such as Agda, Coq, and Idris.

In this talk I show our development of attacks and security notions within Agda, using the recent &lt;a href=&quot;https://en.wikipedia.org/wiki/BREACH_%28security_exploit%29&quot;&gt;BREACH&lt;/a&gt; exploit as an example. Our development is a constructive step towards verified software and bridges a gap between theory and practice.
I will explain the details about the Curry-Howard correspondence.
The target audience are interested people with some programming experience.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5394.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5394-BREACH_in_Agda_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5394-BREACH_in_Agda_h264-hq.mp4?1399728420</guid>
      <dc:identifier>-zXtqISaAof8oPTr8SYyTQ</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Nicolas Pouillard</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>Security notions, proofs and attacks using dependently typed functional programming</itunes:subtitle>
      <itunes:summary>Software engineering is in a unsustainable state: software is mainly developed in a trial and error fashion, which always leads to vulnerable systems. Several decades ago the correspondence between logics and programming (Curry-Howard) was found. This correspondence is now being used in modern programming languages using dependent types, such as Agda, Coq, and Idris.

In this talk I show our development of attacks and security notions within Agda, using the recent &lt;a href=&quot;https://en.wikipedia.org/wiki/BREACH_%28security_exploit%29&quot;&gt;BREACH&lt;/a&gt; exploit as an example. Our development is a constructive step towards verified software and bridges a gap between theory and practice.
I will explain the details about the Curry-Howard correspondence.
The target audience are interested people with some programming experience.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5394.html
</itunes:summary>
      <itunes:duration>00:49:00</itunes:duration>
    </item>
    <item>
      <title>Making machines that make (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5587_-_en_-_saal_1_-_201312291130_-_making_machines_that_make_-_nadya_peek</link>
      <description>Making a new control system for a machine is often a slow and tedious task. Maybe you already have a 3 axis stage, and you already know how to move it around. But what if you want to add a camera and use it for position feedback? You&#39;d have to redesign the whole hardware layer. I&#39;ll talk about some ways I&#39;ve built modularity into control systems for machines so that you can quickly iterate on different kinds of machine systems without getting stuck in hardware land forever. This includes connecting synchronized nodes across a network and importing legacy nodes for things like, say, an old pressure box you found in the trash and has rs232 in. Down with gcode! Long live machine control.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5587.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5587-en-Making_machines_that_make_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5587-en-Making_machines_that_make_h264-hd.mp4?1414847032</guid>
      <dc:identifier>DaPb3a3Rv9sG109k4ZBWEw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Nadya Peek</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>rapid prototyping of digital fabrication and instrumentation machines</itunes:subtitle>
      <itunes:summary>Making a new control system for a machine is often a slow and tedious task. Maybe you already have a 3 axis stage, and you already know how to move it around. But what if you want to add a camera and use it for position feedback? You&#39;d have to redesign the whole hardware layer. I&#39;ll talk about some ways I&#39;ve built modularity into control systems for machines so that you can quickly iterate on different kinds of machine systems without getting stuck in hardware land forever. This includes connecting synchronized nodes across a network and importing legacy nodes for things like, say, an old pressure box you found in the trash and has rs232 in. Down with gcode! Long live machine control.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5587.html
</itunes:summary>
      <itunes:duration>00:46:54</itunes:duration>
    </item>
    <item>
      <title>Towards an affordable brain-computer-interface (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5395_-_en_-_saal_6_-_201312291600_-_towards_an_affordable_brain-computer-interface_-_dominic_-_anne</link>
      <description>The brain can be understood as a highly specialized information processing device. Because computers basically do the same thing, it&#39;s not too absurd to try to link these two together. The result is a brain-computer-interface.
This talk explains the core functionality of our brain and how to access the stored data from the outside. Software and hardware have already reached a somewhat hacker-friendly state, and we want to show you how we got there. We&#39;re also here to answer all your questions about the brain.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5395.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4?1399728425</guid>
      <dc:identifier>D27zQV1jKk88oKyXxGBGPQ</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Dominic, Anne</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:summary>The brain can be understood as a highly specialized information processing device. Because computers basically do the same thing, it&#39;s not too absurd to try to link these two together. The result is a brain-computer-interface.
This talk explains the core functionality of our brain and how to access the stored data from the outside. Software and hardware have already reached a somewhat hacker-friendly state, and we want to show you how we got there. We&#39;re also here to answer all your questions about the brain.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5395.html
</itunes:summary>
      <itunes:duration>00:57:57</itunes:duration>
    </item>
    <item>
      <title>Desperately Seeking Susy (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5416_-_en_-_saal_6_-_201312282030_-_desperately_seeking_susy_-_atdotde</link>
      <description>Supersymmetry has been particle theorists&#39; favorite toy for several decades. It predicts a yet unobserved symmetry of nature and implies that to each known type of elementary particle there exists a partner particle none of which has been detected up to today. 

I will explain why it is  an attractive idea nevertheless and what is the current situation after the large hadron collider (LHC) at CERN has looked at many places where supersymmetric partners were expected and did not find them. Is it time to give up hope that susy is a property of nature? 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5416.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5416-en-Desperately_Seeking_Susy_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5416-en-Desperately_Seeking_Susy_h264-hq.mp4?1420051676</guid>
      <dc:identifier>QGyPcWYIZ_R3gRVEh8-KdQ</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>atdotde</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>A farewell to a bold proposal?</itunes:subtitle>
      <itunes:summary>Supersymmetry has been particle theorists&#39; favorite toy for several decades. It predicts a yet unobserved symmetry of nature and implies that to each known type of elementary particle there exists a partner particle none of which has been detected up to today. 

I will explain why it is  an attractive idea nevertheless and what is the current situation after the large hadron collider (LHC) at CERN has looked at many places where supersymmetric partners were expected and did not find them. Is it time to give up hope that susy is a property of nature? 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5416.html
</itunes:summary>
      <itunes:duration>01:00:43</itunes:duration>
    </item>
    <item>
      <title>WarGames in memory (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5223_-_en_-_saal_6_-_201312292030_-_wargames_in_memory_-_gannimo</link>
      <description>Memory corruption has been around forever but is still one of the most exploited problems on current systems. This talk looks at the past 30 years of memory corruption and systematizes the different existing exploit and defense techniques in a streamlined way. We evaluate (i) how the different attacks evolved, (ii) how researchers came up with defense mechanisms as an answer to new threats, and (iii) what we will have to expect in the future.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5223.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5223-en-WarGames_in_memory_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5223-en-WarGames_in_memory_h264-hq.mp4?1399728425</guid>
      <dc:identifier>uJJPv0R6KJBwRIqiShrwxw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>gannimo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>what is the winning move?</itunes:subtitle>
      <itunes:summary>Memory corruption has been around forever but is still one of the most exploited problems on current systems. This talk looks at the past 30 years of memory corruption and systematizes the different existing exploit and defense techniques in a streamlined way. We evaluate (i) how the different attacks evolved, (ii) how researchers came up with defense mechanisms as an answer to new threats, and (iii) what we will have to expect in the future.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5223.html
</itunes:summary>
      <itunes:duration>00:56:02</itunes:duration>
    </item>
    <item>
      <title>Introduction to Processor Design (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5443_-_en_-_saal_g_-_201312281830_-_introduction_to_processor_design_-_byterazor</link>
      <description>This lecture gives an introduction to processor design.
It is mostly interesting for people new to processor design and does not cover high performance pipelined structures.
Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described here.
Demo:

Create a backdoor in the VHDL Code of a processor core.
Exploit this backdoor to get a root shell in the linux operating system.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5443.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4?1399728425</guid>
      <dc:identifier>tnCge6rYmFPy9O0KjvtBAQ</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>byterazor</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:summary>This lecture gives an introduction to processor design.
It is mostly interesting for people new to processor design and does not cover high performance pipelined structures.
Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described here.
Demo:

Create a backdoor in the VHDL Code of a processor core.
Exploit this backdoor to get a root shell in the linux operating system.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5443.html
</itunes:summary>
      <itunes:duration>01:01:50</itunes:duration>
    </item>
    <item>
      <title>My journey into FM-RDS (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5588_-_en_-_saal_g_-_201312281600_-_my_journey_into_fm-rds_-_oona_raisanen</link>
      <description>How I discovered mysterious hidden signals on a public radio channel and eventually found out their meaning through hardware hacking, reverse engineering and little cryptanalysis.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5588.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5588-en-My_journey_into_FM-RDS_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5588-en-My_journey_into_FM-RDS_h264-hq.mp4?1420051679</guid>
      <dc:identifier>bJDjDUHLd0Y6wLncMd5Unw</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Oona Räisänen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:summary>How I discovered mysterious hidden signals on a public radio channel and eventually found out their meaning through hardware hacking, reverse engineering and little cryptanalysis.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5588.html
</itunes:summary>
      <itunes:duration>00:36:11</itunes:duration>
    </item>
    <item>
      <title>Reverse engineering the Wii U Gamepad (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5322_-_en_-_saal_g_-_201312292030_-_reverse_engineering_the_wii_u_gamepad_-_delroth</link>
      <description>A year ago in November 2012, Nintendo released their latest home video game console: the Wii U. While most video game consoles use controllers that are very basic, the Wii U took the opposite route with a very featureful gamepad: wireless with a fairly high range, touch screen, speakers, accelerometer, video camera, and even NFC are supported by the Wii U gamepad. However, as of today, this interesting piece of hardware can only be used in conjunction with a Wii U: wireless communications are encrypted and obfuscated, and there is no documentation about the protocols used for data exchange between the console and its controller. Around december 2012, I started working with two other hackers in order to reverse engineer, document and implement the Wii U gamepad communication protocols on a PC. This talk will present our findings and show the current state of our reverse engineering efforts.
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4?1399728425</guid>
      <dc:identifier>toykIIIHEXC1x8F7xoiYRw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>delroth</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:summary>A year ago in November 2012, Nintendo released their latest home video game console: the Wii U. While most video game consoles use controllers that are very basic, the Wii U took the opposite route with a very featureful gamepad: wireless with a fairly high range, touch screen, speakers, accelerometer, video camera, and even NFC are supported by the Wii U gamepad. However, as of today, this interesting piece of hardware can only be used in conjunction with a Wii U: wireless communications are encrypted and obfuscated, and there is no documentation about the protocols used for data exchange between the console and its controller. Around december 2012, I started working with two other hackers in order to reverse engineer, document and implement the Wii U gamepad communication protocols on a PC. This talk will present our findings and show the current state of our reverse engineering efforts.
</itunes:summary>
      <itunes:duration>00:56:02</itunes:duration>
    </item>
    <item>
      <title>X Security (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5499_-_en_-_saal_1_-_201312291830_-_x_security_-_ilja_van_sprundel</link>
      <description>For the past year, I&#39;ve been looking at the implementation of X.org code. both client and server. During this presentation, I&#39;ll give an overview of the good, the bad and the ugly. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5499.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5499-en-X_Security_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5499-en-X_Security_h264-hd.mp4?1414847032</guid>
      <dc:identifier>is-GStnCnMQnnba7Nu_pVA</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Ilja van Sprundel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>It&#39;s worse than it looks</itunes:subtitle>
      <itunes:summary>For the past year, I&#39;ve been looking at the implementation of X.org code. both client and server. During this presentation, I&#39;ll give an overview of the good, the bad and the ugly. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5499.html
</itunes:summary>
      <itunes:duration>01:01:08</itunes:duration>
    </item>
    <item>
      <title>FPGA 101 (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5185_-_en_-_saal_g_-_201312281715_-_fpga_101_-_karsten_becker</link>
      <description>In this talk I want to show you around in the mysterious world of
Field Programmable Gate Arrays, or short FPGAs. The aim is to enable you to get a rough understanding on what FPGAs are good at and how they can be used in areas where conventional CPUs and Microcontrollers are failing upon us. FPGAs open up the world of high-speed serial interconnects, nano-second event reactions and hardware fuzzing.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5185.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5185-en-FPGA_101_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5185-en-FPGA_101_h264-hq.mp4?1399728424</guid>
      <dc:identifier>Ae-3k2zOoIDF16EaC2uCWA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Karsten Becker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Making awesome stuff with FPGAs</itunes:subtitle>
      <itunes:summary>In this talk I want to show you around in the mysterious world of
Field Programmable Gate Arrays, or short FPGAs. The aim is to enable you to get a rough understanding on what FPGAs are good at and how they can be used in areas where conventional CPUs and Microcontrollers are failing upon us. FPGAs open up the world of high-speed serial interconnects, nano-second event reactions and hardware fuzzing.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5185.html
</itunes:summary>
      <itunes:duration>00:54:47</itunes:duration>
    </item>
    <item>
      <title>Anonymity and Privacy in Public Space and on the Internet (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5500_-_en_-_saal_g_-_201312291900_-_anonymity_and_privacy_in_public_space_and_on_the_internet_-_aluburka</link>
      <description>How is it possible to participate in a social event anonymously? How can we hide from surveillance in public space? How can we communicate anonymously in real life? 
How can we be private in public?
This talk will give an overview about existing hacks and techniques that allow to be private in public, and compare privacy technologies from the web to anonymity techniques that can be used in real life.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5500.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4?1399728424</guid>
      <dc:identifier>L10c_0Q6XDadTgKo1fzSXQ</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>aluburka</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:summary>How is it possible to participate in a social event anonymously? How can we hide from surveillance in public space? How can we communicate anonymously in real life? 
How can we be private in public?
This talk will give an overview about existing hacks and techniques that allow to be private in public, and compare privacy technologies from the web to anonymity techniques that can be used in real life.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5500.html
</itunes:summary>
      <itunes:duration>00:11:00</itunes:duration>
    </item>
    <item>
      <title>Calafou, postcapitalist ecoindustrial community (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5571_-_en_-_saal_6_-_201312291830_-_calafou_postcapitalist_ecoindustrial_community_-_acracia</link>
      <description>Calafou – the Ecoindustrial Postcapitalist Colony – is a settlement of around three dozen people in the Catalonian countryside. Concrete pylons standing 20 meters high hold a highway passing above the wild forest valley, where hall after dilapidated hall of industrial ruins stretch along the banks of a contaminated stream nurturing a twisted yet lively ecosystem.  Echoes of unseen, passing cars blend into the organic static of wildlife, punctuated by beats booming from the hacklab speakers.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5571.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4?1399728424</guid>
      <dc:identifier>tQIsDXIK4trNIxm5cVv5-Q</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>acracia</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>Building a space for grassroots sustainable technology development near Barcelona</itunes:subtitle>
      <itunes:summary>Calafou – the Ecoindustrial Postcapitalist Colony – is a settlement of around three dozen people in the Catalonian countryside. Concrete pylons standing 20 meters high hold a highway passing above the wild forest valley, where hall after dilapidated hall of industrial ruins stretch along the banks of a contaminated stream nurturing a twisted yet lively ecosystem.  Echoes of unseen, passing cars blend into the organic static of wildlife, punctuated by beats booming from the hacklab speakers.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5571.html
</itunes:summary>
      <itunes:duration>01:02:35</itunes:duration>
    </item>
    <item>
      <title>RFID Treehouse of Horror (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5334_-_en_-_saal_2_-_201312291400_-_rfid_treehouse_of_horror_-_adrian_dabrowski</link>
      <description>In this lecture, we present a black-box analysis of an electronic contact-less system that has been steadily
replacing a conventional mechanical key on multi-party
houses in a big European city. So far, there are est. 10.000 installations of the electronic system. The mechanical key has been introduced about 40 years ago to allow mail delivery services to access multi-party houses but has since then aggregated many additional users, such as garbage collection, police, fire brigade and other emergency services. Over 92% of residential buildings in this city are equipped with such a solution.  

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5334.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4?1399728424</guid>
      <dc:identifier>UukuTtIII9uGXGpeCCgKvg</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Adrian Dabrowski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Hacking City-Wide Access Control Systems</itunes:subtitle>
      <itunes:summary>In this lecture, we present a black-box analysis of an electronic contact-less system that has been steadily
replacing a conventional mechanical key on multi-party
houses in a big European city. So far, there are est. 10.000 installations of the electronic system. The mechanical key has been introduced about 40 years ago to allow mail delivery services to access multi-party houses but has since then aggregated many additional users, such as garbage collection, police, fire brigade and other emergency services. Over 92% of residential buildings in this city are equipped with such a solution.  

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5334.html
</itunes:summary>
      <itunes:duration>00:58:59</itunes:duration>
    </item>
    <item>
      <title>Backdoors, Government Hacking and The Next Crypto Wars (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5478_-_en_-_saal_g_-_201312292145_-_backdoors_government_hacking_and_the_next_crypto_wars_-_christopher_soghoian</link>
      <description>Law enforcement agencies claim they are &quot;going dark&quot;. Encryption technologies have finally been deployed by software companies, and critically, enabled by default, such that emails are flowing over HTTPS, and disk encryption is now frequently used. Friendly telcos, who were once a one-stop-shop for surveillance can no longer meet the needs of our government. What are the FBI and other law enforcement agencies doing to preserve their spying capabilities? 


about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5478.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5478-en-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5478-en-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4?1420051680</guid>
      <dc:identifier>DmBpFwREEQWrsaTmW3zVew</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Christopher Soghoian</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Law enforcement agencies claim they are &quot;going dark&quot;. Encryption technologies have finally been deployed by software companies, and critically, enabled by default, such that emails are flowing over HTTPS, and disk encryption is now frequently used. Friendly telcos, who were once a one-stop-shop for surveillance can no longer meet the needs of our government. What are the FBI and other law enforcement agencies doing to preserve their spying capabilities? 


about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5478.html
</itunes:summary>
      <itunes:duration>00:44:39</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks, Day 2 (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5562_-_en_-_saal_g_-_201312281245_-_lightning_talks_day_2_-_nickfarr</link>
      <description>

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5562.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5562-en-Lightning_Talks_Day_2_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5562-en-Lightning_Talks_Day_2_h264-hq.mp4?1420051681</guid>
      <dc:identifier>us3pkMq65RbFcZPuAO05MA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>nickfarr</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Other</itunes:keywords>
      <itunes:summary>

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5562.html
</itunes:summary>
      <itunes:duration>02:03:30</itunes:duration>
    </item>
    <item>
      <title>ID Cards in China: Your Worst Nightmare (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5543_-_en_-_saal_2_-_201312291245_-_id_cards_in_china_your_worst_nightmare_-_kate_krauss</link>
      <description>Imagine getting pulled over for running a stop sign and learning for the first time – from the cop – that you are HIV-positive. People in China are required to carry electronic, swipeable ID cards that hold their political views, their HIV status, their mental health situation, and much more.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5543.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5543-en-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5543-en-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4?1420051676</guid>
      <dc:identifier>z2_SbAXdwSQnezj6oPTuIg</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Kate Krauss</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>In China Your ID Card Knows Everything</itunes:subtitle>
      <itunes:summary>Imagine getting pulled over for running a stop sign and learning for the first time – from the cop – that you are HIV-positive. People in China are required to carry electronic, swipeable ID cards that hold their political views, their HIV status, their mental health situation, and much more.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5543.html
</itunes:summary>
      <itunes:duration>00:39:38</itunes:duration>
    </item>
    <item>
      <title>Perfect Paul (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5614_-_en_-_saal_2_-_201312280000_-_perfect_paul_-_artelse</link>
      <description>The facial hacking research presented in this lecture/ performance exploits a well known vulnerability of the human nervous system that it can be easily accessed and controlled by electrodes mounted on the bodies exterior. External digital facial control allows for an unprecedented exploration of human facial expressiveness and has unveiled an unknown expressive potential of the human facial hardware. 
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4?1399728423</guid>
      <dc:identifier>Wb85jYb3IJr8B11bubfibA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>artelse</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:subtitle>On Freedom of Facial Expression</itunes:subtitle>
      <itunes:summary>The facial hacking research presented in this lecture/ performance exploits a well known vulnerability of the human nervous system that it can be easily accessed and controlled by electrodes mounted on the bodies exterior. External digital facial control allows for an unprecedented exploration of human facial expressiveness and has unveiled an unknown expressive potential of the human facial hardware. 
</itunes:summary>
      <itunes:duration>00:29:06</itunes:duration>
    </item>
    <item>
      <title>Jahresrückblick des CCC (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5608_-_de_-_saal_1_-_201312290000_-_jahresruckblick_des_ccc_-_constanze_kurz_-_frank_-_linus_neumann</link>
      <description>Auch das Jahr 2013 geht irgendwann vorbei. Deshalb werfen wir einen Blick zurück auf die für uns besonders relevanten Themen und versuchen abzuschätzen, was im Jahr 2014 auf uns zukommen könnte.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5608.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hd.mp4?1414847032</guid>
      <dc:identifier>H_FrxWgE7lz3DIkh_j8TbA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Constanze Kurz, frank, Linus Neumann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, CCC</itunes:keywords>
      <itunes:summary>Auch das Jahr 2013 geht irgendwann vorbei. Deshalb werfen wir einen Blick zurück auf die für uns besonders relevanten Themen und versuchen abzuschätzen, was im Jahr 2014 auf uns zukommen könnte.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5608.html
</itunes:summary>
      <itunes:duration>01:48:59</itunes:duration>
    </item>
    <item>
      <title>Virtually Impossible: The Reality Of Virtualization Security (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5445_-_en_-_saal_6_-_201312292145_-_virtually_impossible_the_reality_of_virtualization_security_-_gal_diskin</link>
      <description>This talk will demonstrate why it is virtually impossible to secure virtual machines implementations properly. In the talk I will try to give an overview of the basics of hardware virtualization technology, the existing attack techniques against virtualization and also explain why it is such a complex problem to create a secure hypervisor. The talk will focus on the low level interfaces and how it affects all aspects of computer platform security. I will also try to review a few interesting Erratas at the end of the talk.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5445.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4?1399728423</guid>
      <dc:identifier>OJWon_ecrah6bXHuBY__Vw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Gal Diskin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Errata FTW</itunes:subtitle>
      <itunes:summary>This talk will demonstrate why it is virtually impossible to secure virtual machines implementations properly. In the talk I will try to give an overview of the basics of hardware virtualization technology, the existing attack techniques against virtualization and also explain why it is such a complex problem to create a secure hypervisor. The talk will focus on the low level interfaces and how it affects all aspects of computer platform security. I will also try to review a few interesting Erratas at the end of the talk.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5445.html
</itunes:summary>
      <itunes:duration>00:59:13</itunes:duration>
    </item>
    <item>
      <title>Mind-Hacking mit Psychedelika (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5619_-_de_-_saal_2_-_201312292145_-_mind-hacking_mit_psychedelika_-_julia_aksenova</link>
      <description>Substanzen wie MDMA, Psilocybin, LSD und Ketamin besitzen erhebliches therapeutisches Potential, und die Erforschung ihrer Wirkmechanismen erlaubt Einblicke in die Funktionsweise der menschlichen Psyche. Der trotz Illegalität relativ einfachen Verfügbarkeit steht ein Mangel an Aufklärung über Risiken, Effekte und Pharmakologie gegenüber, dem mit dieser Einführung begegnet werden soll.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5619.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5619-de-Mind-Hacking_mit_Psychedelika_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5619-de-Mind-Hacking_mit_Psychedelika_h264-hq.mp4?1420051677</guid>
      <dc:identifier>rglYVLzBOIMfYpF873lgjQ</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Julia Aksënova</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>Eine Einführung in die Wirkungsweise psychedelischer Substanzen</itunes:subtitle>
      <itunes:summary>Substanzen wie MDMA, Psilocybin, LSD und Ketamin besitzen erhebliches therapeutisches Potential, und die Erforschung ihrer Wirkmechanismen erlaubt Einblicke in die Funktionsweise der menschlichen Psyche. Der trotz Illegalität relativ einfachen Verfügbarkeit steht ein Mangel an Aufklärung über Risiken, Effekte und Pharmakologie gegenüber, dem mit dieser Einführung begegnet werden soll.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5619.html
</itunes:summary>
      <itunes:duration>01:05:22</itunes:duration>
    </item>
    <item>
      <title>White-Box Cryptography (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5590_-_en_-_saal_2_-_201312291715_-_white-box_cryptography_-_dmitry_khovratovich</link>
      <description>The goal of white-box cryptography is to protect cryptographic keys in a public implementation of encryption algorithms, primarily in the context of Pay-TV and tamper-resistant software. I present an overview of the white-box cryptography concept along with the most common applications and proposed designs. I discuss the subtle difference between white-box cryptography, public-key cryptography, and obfuscation. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5590.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5590-en-White-Box_Cryptography_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5590-en-White-Box_Cryptography_h264-hq.mp4?1399728423</guid>
      <dc:identifier>X5bQYDGyUSq8KPoTcyahdw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Dmitry Khovratovich</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Survey</itunes:subtitle>
      <itunes:summary>The goal of white-box cryptography is to protect cryptographic keys in a public implementation of encryption algorithms, primarily in the context of Pay-TV and tamper-resistant software. I present an overview of the white-box cryptography concept along with the most common applications and proposed designs. I discuss the subtle difference between white-box cryptography, public-key cryptography, and obfuscation. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5590.html
</itunes:summary>
      <itunes:duration>00:55:33</itunes:duration>
    </item>
    <item>
      <title>Recht auf Remix (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5433_-_de_-_saal_6_-_201312291715_-_recht_auf_remix_-_leonhard_dobusch</link>
      <description>Wir leben in einem Zeitalter des Remix. Kreativität und Kultur bauten schon immer auf bereits Bestehendem auf. Internet und digitale Technologien ermöglichen aber die kreative Nutzung existierender Werke in völlig neuen Dimensionen: Nie zuvor war es so vielen möglich, Werke auf so unterschiedliche Arten zu verändern und so einfach anderen zugänglich zu machen. In dem Maße, in dem die kreative Kopie Teil des kommunikativen Alltags breiter Bevölkerungsschichten wird, ist ein Recht auf Remix eine grundlegende Voraussetzung für die Kunst- und Meinungsfreiheit einer Gesellschaft. Die Gegenwart ist jedoch geprägt von restriktivem Rechtemanagement und entgrenzter Rechtsdurchsetzung. Die Initiative &quot;Recht auf Remix&quot; möchte das ändern.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5433.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5433-de-Recht_auf_Remix_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5433-de-Recht_auf_Remix_h264-hq.mp4?1420051676</guid>
      <dc:identifier>JUiVA82LLuRo_Kypnj5OIg</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Leonhard Dobusch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Wir leben in einem Zeitalter des Remix. Kreativität und Kultur bauten schon immer auf bereits Bestehendem auf. Internet und digitale Technologien ermöglichen aber die kreative Nutzung existierender Werke in völlig neuen Dimensionen: Nie zuvor war es so vielen möglich, Werke auf so unterschiedliche Arten zu verändern und so einfach anderen zugänglich zu machen. In dem Maße, in dem die kreative Kopie Teil des kommunikativen Alltags breiter Bevölkerungsschichten wird, ist ein Recht auf Remix eine grundlegende Voraussetzung für die Kunst- und Meinungsfreiheit einer Gesellschaft. Die Gegenwart ist jedoch geprägt von restriktivem Rechtemanagement und entgrenzter Rechtsdurchsetzung. Die Initiative &quot;Recht auf Remix&quot; möchte das ändern.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5433.html
</itunes:summary>
      <itunes:duration>00:59:21</itunes:duration>
    </item>
    <item>
      <title>Nerds in the news (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5494_-_en_-_saal_g_-_201312291645_-_nerds_in_the_news_-_friedrich_lindenberg</link>
      <description>Knight-Mozilla OpenNews sends coders into news organisations on a ten-month fellowship to make new tools for reporting and measuring the news. We believe that to remain relevant, journalism has to smarten up about tech and data. As a global community, we develop tools to datamine public data, news apps to make information accessible, and visualisations to break down complex stories. In my talk, I want to present the lessons about tech that I&#39;ve learned in a newsroom and the things that still need to be built. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5494.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4?1399728422</guid>
      <dc:identifier>tEudCvm8e6XS2VQP3BR5yw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Friedrich Lindenberg</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Spending a year coding in a newsroom</itunes:subtitle>
      <itunes:summary>Knight-Mozilla OpenNews sends coders into news organisations on a ten-month fellowship to make new tools for reporting and measuring the news. We believe that to remain relevant, journalism has to smarten up about tech and data. As a global community, we develop tools to datamine public data, news apps to make information accessible, and visualisations to break down complex stories. In my talk, I want to present the lessons about tech that I&#39;ve learned in a newsroom and the things that still need to be built. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5494.html
</itunes:summary>
      <itunes:duration>00:31:07</itunes:duration>
    </item>
    <item>
      <title>Structuring open hardware projects (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5594_-_en_-_saal_6_-_201312291300_-_structuring_open_hardware_projects_-_bram_de_vries_-_morris_winkler</link>
      <description>Every successful open hardware project needs a solid organization structure at some point in time, especially when plan to produce and sell your project. In our “i3 Berlin” 3d printer project, we took some elements of the PLM (Product Lifecycle Management) concept and implemented it with open source tools like Github and Blender. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5594.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4?1399728422</guid>
      <dc:identifier>oj6RLVzhV1NHOMbOLvc8yg</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Bram de Vries, Morris Winkler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>experiences from the “i3 Berlin” 3D printer project with Blender and Github</itunes:subtitle>
      <itunes:summary>Every successful open hardware project needs a solid organization structure at some point in time, especially when plan to produce and sell your project. In our “i3 Berlin” 3d printer project, we took some elements of the PLM (Product Lifecycle Management) concept and implemented it with open source tools like Github and Blender. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5594.html
</itunes:summary>
      <itunes:duration>00:33:03</itunes:duration>
    </item>
    <item>
      <title>Android DDI (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5192_-_en_-_saal_1_-_201312291600_-_android_ddi_-_collin_mulliner</link>
      <description>As application security becomes more important on Android we need better tools to analyze and understand them. Android applications are written in Java and a run in the Dalvik VM. Until now most analysis is done via disassembling and monitored execution in an emulator. This talk presents a new technique to instrument Android applications executed in the DVM. The talk will introduce the new technique in great detail including many small examples and a whole attack based on it. We will go step by step to show you what can be achieved using this technique. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5192.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5192-en-Android_DDI_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5192-en-Android_DDI_h264-hd.mp4?1414847031</guid>
      <dc:identifier>UW-GGUBQz587MFHw9yXl6A</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Collin Mulliner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Dynamic Dalvik Instrumentation of Android Applications and the Android Framework</itunes:subtitle>
      <itunes:summary>As application security becomes more important on Android we need better tools to analyze and understand them. Android applications are written in Java and a run in the Dalvik VM. Until now most analysis is done via disassembling and monitored execution in an emulator. This talk presents a new technique to instrument Android applications executed in the DVM. The talk will introduce the new technique in great detail including many small examples and a whole attack based on it. We will go step by step to show you what can be achieved using this technique. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5192.html
</itunes:summary>
      <itunes:duration>00:47:37</itunes:duration>
    </item>
    <item>
      <title>2 Takte später (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5469_-_de_-_saal_g_-_201312291815_-_2_takte_spater_-_m_eik_-_bruder</link>
      <description>Auf dem 29C3 stellten wir euch die Cultural Commons Collecting Society (C3S) als Initiative zur Gründung einer GEMA-Alternative vor. Seit dem ist sehr viel passiert: Unter anderem ist mittlerweile eine Europäische Genossenschaft gegründet, die mit sechsstelligem Kapital aus einer Crowdfunding-Kampagne in das Jahr 2014 geht. Auf Seiten der GEMA sind angesichts der entstehenden Konkurrentin bereits erste Anzeichen für eine Kursänderung wahrnehmbar.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5469.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5469-de-2_Takte_spaeter_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5469-de-2_Takte_spaeter_h264-hq.mp4?1420051679</guid>
      <dc:identifier>Fp5SK2hqNSDN6KeYzLwIRw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>m.eik, bruder</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene </itunes:subtitle>
      <itunes:summary>Auf dem 29C3 stellten wir euch die Cultural Commons Collecting Society (C3S) als Initiative zur Gründung einer GEMA-Alternative vor. Seit dem ist sehr viel passiert: Unter anderem ist mittlerweile eine Europäische Genossenschaft gegründet, die mit sechsstelligem Kapital aus einer Crowdfunding-Kampagne in das Jahr 2014 geht. Auf Seiten der GEMA sind angesichts der entstehenden Konkurrentin bereits erste Anzeichen für eine Kursänderung wahrnehmbar.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5469.html
</itunes:summary>
      <itunes:duration>00:29:09</itunes:duration>
    </item>
    <item>
      <title>Trezor: Bitcoin hardware wallet (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5545_-_en_-_saal_1_-_201312292200_-_trezor_bitcoin_hardware_wallet_-_pavol_stick_rusnak</link>
      <description>TREZOR is a hardware wallet for Bitcoin. We identified security of the end users&#39; computer as one of the main problems that block Bitcoin mass adoption.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5545.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hd.mp4?1414847032</guid>
      <dc:identifier>R5Vdbjtyg_hFVmSLcqSJfg</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Pavol &quot;stick&quot; Rusnak</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:summary>TREZOR is a hardware wallet for Bitcoin. We identified security of the end users&#39; computer as one of the main problems that block Bitcoin mass adoption.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5545.html
</itunes:summary>
      <itunes:duration>00:26:45</itunes:duration>
    </item>
    <item>
      <title>Drones (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5406_-_en_-_saal_1_-_201312291245_-_drones_-_piotr_esden-tempski</link>
      <description>During the last 10 years the technology that was formerly only available to the military, reached the hands of thousands. Researchers, hackers, enthusiasts and hobbyists helped drive the technology further and higher than anyone had imagined just a few years ago. We will recap what the civilian airborne robot community has achieved in the last decade and what the next frontiers are that need to be addressed.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5406.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5406-en-Drones_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5406-en-Drones_h264-hd.mp4?1414847031</guid>
      <dc:identifier>sh_vDLYCDlmW5sFWsI4KSg</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Piotr Esden-Tempski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>Autonomous flying vehicles, where are we and where are we going?</itunes:subtitle>
      <itunes:summary>During the last 10 years the technology that was formerly only available to the military, reached the hands of thousands. Researchers, hackers, enthusiasts and hobbyists helped drive the technology further and higher than anyone had imagined just a few years ago. We will recap what the civilian airborne robot community has achieved in the last decade and what the next frontiers are that need to be addressed.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5406.html
</itunes:summary>
      <itunes:duration>01:00:26</itunes:duration>
    </item>
    <item>
      <title>Disclosure DOs, Disclosure DON&#39;Ts (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5361_-_en_-_saal_6_-_201312282300_-_disclosure_dos_disclosure_don_ts_-_nate_cardozo</link>
      <description>This talk will focus on responsible disclosure best and worst practices from both legal and practical perspectives. I&#39;ll also focus on usable advice, both positive and negative, and answer any questions the audience has on best practices.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5361.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4?1399728422</guid>
      <dc:identifier>NzP8F_rnRMmXIbb6zl1H8Q</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Nate Cardozo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Pragmatic Advice for Security Researchers</itunes:subtitle>
      <itunes:summary>This talk will focus on responsible disclosure best and worst practices from both legal and practical perspectives. I&#39;ll also focus on usable advice, both positive and negative, and answer any questions the audience has on best practices.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5361.html
</itunes:summary>
      <itunes:duration>00:44:13</itunes:duration>
    </item>
    <item>
      <title>How to Build a Mind (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5526_-_en_-_saal_2_-_201312291600_-_how_to_build_a_mind_-_joscha</link>
      <description>A foray into the present, future and ideas of Artificial Intelligence. Are we going to build (beyond) human-level artificial intelligence one day? Very likely. When? Nobody knows, because the specs are not fully done yet. But let me give you some of those we already know, just to get you started.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5526.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5526-en-How_to_Build_a_Mind_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5526-en-How_to_Build_a_Mind_h264-hq.mp4?1399728421</guid>
      <dc:identifier>rP-d3RdgW3DkgejXmeWAeQ</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Joscha</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>Artificial Intelligence Reloaded</itunes:subtitle>
      <itunes:summary>A foray into the present, future and ideas of Artificial Intelligence. Are we going to build (beyond) human-level artificial intelligence one day? Very likely. When? Nobody knows, because the specs are not fully done yet. But let me give you some of those we already know, just to get you started.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5526.html
</itunes:summary>
      <itunes:duration>00:55:56</itunes:duration>
    </item>
    <item>
      <title>Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5502_-_de_-_saal_2_-_201312292300_-_zwischen_supersicherer_verschlusselung_und_klartext_liegt_nur_ein_falsches_bit_-_qbi</link>
      <description>»Lange Schlüssel sind sicherer als kurze.«
»RSA und/oder AES sind einfach zu implementieren.«
»Für Zufallszahlen reicht es, java.util.Random zu nehmen.«
Solche oder ähnliche Aussagen hört man immer mal wieder. Doch was ist da dran? Welche Fehler werden bei der Benutzung und Implementierung von Kryptografie gern gemacht?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5502.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5502-de-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5502-de-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4?1420051675</guid>
      <dc:identifier>ufJTu-pu8QBUtd-bji9tmw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>qbi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Ein Streifzug durch die Fehler in der Kryptografie </itunes:subtitle>
      <itunes:summary>»Lange Schlüssel sind sicherer als kurze.«
»RSA und/oder AES sind einfach zu implementieren.«
»Für Zufallszahlen reicht es, java.util.Random zu nehmen.«
Solche oder ähnliche Aussagen hört man immer mal wieder. Doch was ist da dran? Welche Fehler werden bei der Benutzung und Implementierung von Kryptografie gern gemacht?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5502.html
</itunes:summary>
      <itunes:duration>00:59:55</itunes:duration>
    </item>
    <item>
      <title>The Pirate Cinema (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5607_-_en_-_saal_6_-_201312281645_-_the_pirate_cinema_-_nicolas_maigret_-_brendan_howell</link>
      <description>&quot;The Pirate Cinema&quot; reveals Peer-to-Peer information flows. It is a composition generated by the activity on file sharing networks. &quot;The Pirate Cinema&quot; immerses the viewer in network flows.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5607.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4?1399728421</guid>
      <dc:identifier>Ziraj84D16VJmXakvJGNEg</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Nicolas Maigret, Brendan Howell</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:subtitle>Creating mash-up movies by hidden activity and geography of Peer-to-Peer file sharing</itunes:subtitle>
      <itunes:summary>&quot;The Pirate Cinema&quot; reveals Peer-to-Peer information flows. It is a composition generated by the activity on file sharing networks. &quot;The Pirate Cinema&quot; immerses the viewer in network flows.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5607.html
</itunes:summary>
      <itunes:duration>00:29:32</itunes:duration>
    </item>
    <item>
      <title>Against Metadata (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5453_-_en_-_saal_6_-_201312281600_-_against_metadata_-_robert_m_ochshorn</link>
      <description>Using case studies of documentary film, Freedom of Information Law document dumps, soundbanks, and a hacker conference, I will demonstrate experiments and results of several years developing open source tools to reorient the idea of documentary around its documents. This is in opposition to a tendancy towards textual and machine-readable metadata, which unduly constrain our wonder, perception, and ability to navigate ambiguous and unknown material.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5453.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4?1399728421</guid>
      <dc:identifier>-YZGB3qZIZOBwlhaU_GHrg</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Robert M Ochshorn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:subtitle>Twisting time and space to explore the unknown</itunes:subtitle>
      <itunes:summary>Using case studies of documentary film, Freedom of Information Law document dumps, soundbanks, and a hacker conference, I will demonstrate experiments and results of several years developing open source tools to reorient the idea of documentary around its documents. This is in opposition to a tendancy towards textual and machine-readable metadata, which unduly constrain our wonder, perception, and ability to navigate ambiguous and unknown material.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5453.html
</itunes:summary>
      <itunes:duration>00:26:12</itunes:duration>
    </item>
    <item>
      <title>Art of the Exploit: An Introduction to Critical Engineering (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5440_-_en_-_saal_2_-_201312282145_-_art_of_the_exploit_an_introduction_to_critical_engineering_-_julian_oliver</link>
      <description>In this lecture Julian will introduce projects and interventions made by himself and others that foreground Engineering, rather than Art, in the creative and critical frame, offering highly public insights into the hidden mechanisms and power struggles within our technical environment. Projects such as the &lt;i&gt;Transparency Grenade&lt;/i&gt;, &lt;i&gt;Packetbruecke&lt;/i&gt; and &lt;i&gt;Newstweek&lt;/i&gt; will be covered in detail.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5440.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5440-en-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5440-en-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4?1420051679</guid>
      <dc:identifier>0eXymhGD4B5LSOSwUFnPfg</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Julian Oliver</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:summary>In this lecture Julian will introduce projects and interventions made by himself and others that foreground Engineering, rather than Art, in the creative and critical frame, offering highly public insights into the hidden mechanisms and power struggles within our technical environment. Projects such as the &lt;i&gt;Transparency Grenade&lt;/i&gt;, &lt;i&gt;Packetbruecke&lt;/i&gt; and &lt;i&gt;Newstweek&lt;/i&gt; will be covered in detail.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5440.html
</itunes:summary>
      <itunes:duration>00:58:18</itunes:duration>
    </item>
    <item>
      <title>calc.pw (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5420_-_de_-_saal_6_-_201312291345_-_calc_pw_-_kenneth_newwood</link>
      <description>Bei calc.pw handelt es sich um DIY Hardware, mit deren Hilfe man Passwörter aus einem Masterpasswort und einfach merkbaren Informationen (z. B. &quot;ebay&quot;, &quot;amazon&quot;, etc.) generieren kann. Im Vortrag soll es um die Probleme vorhandener Passwortverfahren (Passwortschemen, Passwortdatenbanken) gehen. Es soll die Theorie hinter der Passwortberechnung erläutert und eine praktische Implementierung dieser Berechnung vorgestellt werden.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5420.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5420-de-calcpw_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5420-de-calcpw_h264-hq.mp4?1420051677</guid>
      <dc:identifier>dIHu8B0QOmvXxUzK3W9dEw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Kenneth Newwood</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Passwortgenerierung mit Arduino  [Generating passwords with Arduino]</itunes:subtitle>
      <itunes:summary>Bei calc.pw handelt es sich um DIY Hardware, mit deren Hilfe man Passwörter aus einem Masterpasswort und einfach merkbaren Informationen (z. B. &quot;ebay&quot;, &quot;amazon&quot;, etc.) generieren kann. Im Vortrag soll es um die Probleme vorhandener Passwortverfahren (Passwortschemen, Passwortdatenbanken) gehen. Es soll die Theorie hinter der Passwortberechnung erläutert und eine praktische Implementierung dieser Berechnung vorgestellt werden.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5420.html
</itunes:summary>
      <itunes:duration>00:30:49</itunes:duration>
    </item>
    <item>
      <title>Technomonopolies (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5319_-_en_-_saal_g_-_201312282330_-_technomonopolies_-_rysiek</link>
      <description>We all know monopolies are bad. We even have laws against them that sometimes get enforced. However, today we have new kinds of monopolies that affect us without us even noticing them for what they truly are. And technology plays a central role.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5319.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5319-en-Technomonopolies_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5319-en-Technomonopolies_h264-hq.mp4?1399728421</guid>
      <dc:identifier>4edFJcqsY3ORA5pyBrkthA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>rysiek</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>How technology is used to subvert and circumvent anti-monopoly laws</itunes:subtitle>
      <itunes:summary>We all know monopolies are bad. We even have laws against them that sometimes get enforced. However, today we have new kinds of monopolies that affect us without us even noticing them for what they truly are. And technology plays a central role.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5319.html
</itunes:summary>
      <itunes:duration>00:26:43</itunes:duration>
    </item>
    <item>
      <title>Europe, the USA and Identity Ecosystems (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5483_-_en_-_saal_2_-_201312291130_-_europe_the_usa_and_identity_ecosystems_-_noisynarrowbanddevice</link>
      <description>Talk introducing NSTIC and COM 238, i.e. the current digital identity policy proposals in the USA and European discussing their similarities, differences and possible conflicts.
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4?1399728421</guid>
      <dc:identifier>Gj_6_iqjs5qRzO3U2wJgoQ</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>NoisyNarrowBandDevice</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Talk introducing NSTIC and COM 238, i.e. the current digital identity policy proposals in the USA and European discussing their similarities, differences and possible conflicts.
</itunes:summary>
      <itunes:duration>01:03:10</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks, Day 3 (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5563_-_en_-_saal_g_-_201312291245_-_lightning_talks_day_3_-_nickfarr</link>
      <description>

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5563.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5563-en-Lightning_Talks_Day_3_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5563-en-Lightning_Talks_Day_3_h264-hq.mp4?1420051676</guid>
      <dc:identifier>jPE10mw8D1DDHa7j4gDcWw</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>nickfarr</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Other</itunes:keywords>
      <itunes:summary>

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5563.html
</itunes:summary>
      <itunes:duration>02:38:07</itunes:duration>
    </item>
    <item>
      <title>Building a safe NFC ticketing system (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5479_-_en_-_saal_6_-_201312291215_-_building_a_safe_nfc_ticketing_system_-_bughardy_-_eagle1753</link>
      <description>NFC technology is becoming more and more relevant in our lives. One of its major uses is in ticketing solutions. However, most of companies use bad implementations of NFC technology. By this talk we will explain a complete solution, analyzing security challenges and outlining the best practices and implementation choices.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5479.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4?1399728421</guid>
      <dc:identifier>6kqN3bqixV2sIU-x92zuEA</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>bughardy, Eagle1753</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:summary>NFC technology is becoming more and more relevant in our lives. One of its major uses is in ticketing solutions. However, most of companies use bad implementations of NFC technology. By this talk we will explain a complete solution, analyzing security challenges and outlining the best practices and implementation choices.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5479.html
</itunes:summary>
      <itunes:duration>00:30:37</itunes:duration>
    </item>
    <item>
      <title>Bullshit made in Germany (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5210_-_de_-_saal_g_-_201312282030_-_bullshit_made_in_germany_-_linus_neumann</link>
      <description>Die technischen Probleme der De-Mail ließen sich juristisch lösen, und auch bei der E-Mail setzen deutsche Provider bald Sicherheitsstandards der Neunziger Jahre um. Auch für &quot;die Cloud&quot; hat das BSI einen feinen Standard parat – natürlich ohne Verschlüsselung. Wofür bräuchten wir die auch im Schlandnet?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5210.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5210-de-Bullshit_made_in_Germany_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5210-de-Bullshit_made_in_Germany_h264-hq.mp4?1420051680</guid>
      <dc:identifier>3poSeUcpc6woNaI5dhATcQ</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Linus Neumann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>So hosten Sie Ihre De-Mail, E-Mail und Cloud direkt beim BND!</itunes:subtitle>
      <itunes:summary>Die technischen Probleme der De-Mail ließen sich juristisch lösen, und auch bei der E-Mail setzen deutsche Provider bald Sicherheitsstandards der Neunziger Jahre um. Auch für &quot;die Cloud&quot; hat das BSI einen feinen Standard parat – natürlich ohne Verschlüsselung. Wofür bräuchten wir die auch im Schlandnet?

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5210.html
</itunes:summary>
      <itunes:duration>01:00:48</itunes:duration>
    </item>
    <item>
      <title>#SOPA, #NSA, and the New Internet &quot;Lobby&quot; (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5475_-_en_-_saal_g_-_201312291600_-_sopa_nsa_and_the_new_internet_lobby_-_elizabeth_stark</link>
      <description>The movement against SOPA in the US was the largest protest in online history, and as one of the core organizers, we learned a lot of lessons on how to build a grassroots movement for internet freedom.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5475.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4?1399728420</guid>
      <dc:identifier>Yag3mXGNWO6pdV6uryzhJA</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Elizabeth Stark</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>The movement against SOPA in the US was the largest protest in online history, and as one of the core organizers, we learned a lot of lessons on how to build a grassroots movement for internet freedom.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5475.html
</itunes:summary>
      <itunes:duration>00:35:35</itunes:duration>
    </item>
    <item>
      <title>India&#39;s Surveillance State (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5552_-_en_-_saal_g_-_201312291130_-_india_s_surveillance_state_-_maria_xynou</link>
      <description>India is currently implementing some of the scariest surveillance schemes in the world. This lecture will shed light on India&#39;s surveillance industry, its UID scheme which aims at the collection of all biometric data and on various controversial surveillance schemes, such as the Central Monitoring System (CMS).  

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5552.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4?1399728420</guid>
      <dc:identifier>BRHpBVii4wmCt1nd94vCYg</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>Maria Xynou</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>India is currently implementing some of the scariest surveillance schemes in the world. This lecture will shed light on India&#39;s surveillance industry, its UID scheme which aims at the collection of all biometric data and on various controversial surveillance schemes, such as the Central Monitoring System (CMS).  

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5552.html
</itunes:summary>
      <itunes:duration>00:51:33</itunes:duration>
    </item>
    <item>
      <title>Policing the Romantic Crowd (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5447_-_en_-_saal_6_-_201312271730_-_policing_the_romantic_crowd_-_matu</link>
      <description>This talk considers the use of new technology to police large crowds in the Romantic period. We examine ethical aspects of modern surveillance technologies by looking at debates around crowd control and face recognition in the age that first imagined, and reflected on, the surveillance state.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5447.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5447-en-Policing_the_Romantic_Crowd_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5447-en-Policing_the_Romantic_Crowd_h264-hq.mp4?1399728425</guid>
      <dc:identifier>_PZbf5bEsVNq9q3vTxAazQ</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>MaTu</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Velocipedes and Face Recognition</itunes:subtitle>
      <itunes:summary>This talk considers the use of new technology to police large crowds in the Romantic period. We examine ethical aspects of modern surveillance technologies by looking at debates around crowd control and face recognition in the age that first imagined, and reflected on, the surveillance state.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5447.html
</itunes:summary>
      <itunes:duration>00:38:38</itunes:duration>
    </item>
    <item>
      <title>Long Distance Quantum Communication (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5536_-_en_-_saal_g_-_201312271830_-_long_distance_quantum_communication_-_c_b</link>
      <description>This talk should introduce the general 30c3 participant with several components of long distance quantum communication.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5536.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4?1399728425</guid>
      <dc:identifier>U-8wOAtiUft8JjHbW-HAEA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>C B</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>Concepts and components for intercontinal communication with single photons.</itunes:subtitle>
      <itunes:summary>This talk should introduce the general 30c3 participant with several components of long distance quantum communication.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5536.html
</itunes:summary>
      <itunes:duration>00:36:44</itunes:duration>
    </item>
    <item>
      <title>30C3 Keynote (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5622_-_en_-_saal_1_-_201312271930_-_30c3_keynote_-_glenn_greenwald_-_frank</link>
      <description>&lt;p&gt;via videolink.&lt;/p&gt;
about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5622.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5622-en-de-30c3_Keynote_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5622-en-de-30c3_Keynote_h264-hd.mp4?1414847032</guid>
      <dc:identifier>47tqlwa7F-wL0kxo11mvgg</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Glenn Greenwald, frank</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, CCC</itunes:keywords>
      <itunes:summary>&lt;p&gt;via videolink.&lt;/p&gt;
about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5622.html
</itunes:summary>
      <itunes:duration>00:55:51</itunes:duration>
    </item>
    <item>
      <title>Der tiefe Staat (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5415_-_de_-_saal_g_-_201312271245_-_der_tiefe_staat_-_andreas_lehner</link>
      <description>Dieser Vortrag beschreibt Konzept und Idee des tiefen Staates anhand der Geschichte der BRD.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5415.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5415-de-Der_tiefe_Staat_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5415-de-Der_tiefe_Staat_h264-hq.mp4?1420051676</guid>
      <dc:identifier>qkjXyXK2qXXjRYOUI9nT0Q</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Andreas Lehner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Dieser Vortrag beschreibt Konzept und Idee des tiefen Staates anhand der Geschichte der BRD.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5415.html
</itunes:summary>
      <itunes:duration>00:59:19</itunes:duration>
    </item>
    <item>
      <title>Turing Complete User (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5547_-_en_-_saal_6_-_201312281730_-_turing_complete_user_-_olia_lialina</link>
      <description>With the disappearance of the computer, something else is silently becoming invisible as well — the User. Users are disappearing as both phenomena and term, and this development is either unnoticed or accepted as progress — an evolutionary step. Though the Invisible User is more of an issue than an Invisible Computer.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5547.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4?1399728425</guid>
      <dc:identifier>zUDh6XccjgDg7g1WP6Kpvw</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>olia lialina</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:subtitle>What can be done to protect the term, the notion and the existence of the Users?</itunes:subtitle>
      <itunes:summary>With the disappearance of the computer, something else is silently becoming invisible as well — the User. Users are disappearing as both phenomena and term, and this development is either unnoticed or accepted as progress — an evolutionary step. Though the Invisible User is more of an issue than an Invisible Computer.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5547.html
</itunes:summary>
      <itunes:duration>00:33:50</itunes:duration>
    </item>
    <item>
      <title>Forbidden Fruit (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5613_-_en_-_saal_g_-_201312272030_-_forbidden_fruit_-_joe_davis</link>
      <description>Various dietary restrictions are historically associated with human culture and civilization. In addition, millions suffer from eating disorders that have both pathological and cultural origins.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5613.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4?1399728425</guid>
      <dc:identifier>wX415KPkBVf8zeBPWdqT2Q</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Joe Davis</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:summary>Various dietary restrictions are historically associated with human culture and civilization. In addition, millions suffer from eating disorders that have both pathological and cultural origins.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5613.html
</itunes:summary>
      <itunes:duration>00:58:45</itunes:duration>
    </item>
    <item>
      <title>Hello World! (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5611_-_en_-_saal_2_-_201312281130_-_hello_world_-_aram_bartholl</link>
      <description>USB DeadDrops, IRL map marker in public, FUCK 3D glasses or How to vacuum form a guy fawkes mask. I will present an extensive overview of my art projects from over the last 10 years including the Fake Google car by F.A.T. and moar!! It all started here at the CCC congress! :)) For more info see link ---&gt;

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5611.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5611-en-Hello_World__h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5611-en-Hello_World__h264-hq.mp4?1399728425</guid>
      <dc:identifier>d9mVPvxx94qGILfKtmCAwA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Aram Bartholl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:subtitle>How to make art after Snowden?</itunes:subtitle>
      <itunes:summary>USB DeadDrops, IRL map marker in public, FUCK 3D glasses or How to vacuum form a guy fawkes mask. I will present an extensive overview of my art projects from over the last 10 years including the Fake Google car by F.A.T. and moar!! It all started here at the CCC congress! :)) For more info see link ---&gt;

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5611.html
</itunes:summary>
      <itunes:duration>00:57:52</itunes:duration>
    </item>
    <item>
      <title>Triggering Deep Vulnerabilities Using Symbolic Execution (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5224_-_en_-_saal_6_-_201312271400_-_triggering_deep_vulnerabilities_using_symbolic_execution_-_gannimo</link>
      <description>Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths at once. A drawback of many systems is that they need source code access and only scale to few lines of code. This talk explains how SE and binary analysis can be used to (i) reverse-engineer components of binary only applications and (ii) construct specific concrete input that triggers a given condition deep inside the application (think of defining an error condition and the SE engine constructs the input to the application that triggers the error).

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5224.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4?1399728425</guid>
      <dc:identifier>SKDne_Zu6SPJc-ADxqiLnA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>gannimo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Deep program analysis without the headache</itunes:subtitle>
      <itunes:summary>Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths at once. A drawback of many systems is that they need source code access and only scale to few lines of code. This talk explains how SE and binary analysis can be used to (i) reverse-engineer components of binary only applications and (ii) construct specific concrete input that triggers a given condition deep inside the application (think of defining an error condition and the SE engine constructs the input to the application that triggers the error).

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5224.html
</itunes:summary>
      <itunes:duration>00:45:52</itunes:duration>
    </item>
    <item>
      <title>Überwachen und Sprache (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5377_-_de_-_saal_6_-_201312271245_-_uberwachen_und_sprache_-_josch</link>
      <description>Der Vortrag stellt fortgeschrittene linguistische Methoden des politisch motivierten Internetmonitorings vor. Er gibt keine Anleitung, wie man sich der Überwachung wirkungsvoll entziehen kann, denn das ist ohnehin zwecklos.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5377.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5377-de-UEberwachen_und_Sprache_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5377-de-UEberwachen_und_Sprache_h264-hq.mp4?1420051681</guid>
      <dc:identifier>8h6abIcZ9FOaWm7N3o3v9g</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>josch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>How to do things with words</itunes:subtitle>
      <itunes:summary>Der Vortrag stellt fortgeschrittene linguistische Methoden des politisch motivierten Internetmonitorings vor. Er gibt keine Anleitung, wie man sich der Überwachung wirkungsvoll entziehen kann, denn das ist ohnehin zwecklos.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5377.html
</itunes:summary>
      <itunes:duration>00:58:47</itunes:duration>
    </item>
    <item>
      <title>Breaking Baryons (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5305_-_en_-_saal_g_-_201312272300_-_breaking_baryons_-_michael_buker</link>
      <description>A light-hearted presentation about many aspects of particle accelerators like the LHC and their particle collision experiments. Aimed at technically interested non-scientists and physics buffs alike.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5305.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4?1399728424</guid>
      <dc:identifier>n4vgYDc2e8tbtF6g9mZIlA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Michael Büker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>On the Awesomeness of Particle Accelerators and Colliders</itunes:subtitle>
      <itunes:summary>A light-hearted presentation about many aspects of particle accelerators like the LHC and their particle collision experiments. Aimed at technically interested non-scientists and physics buffs alike.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5305.html
</itunes:summary>
      <itunes:duration>01:00:39</itunes:duration>
    </item>
    <item>
      <title>Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5142_-_en_-_saal_6_-_201312271900_-_monitoring_the_spectrum_building_your_own_distributed_rf_scanner_array_-_andrew_reiter_arr_awr</link>
      <description>Software-Defined Radio (SDR) has increased in popularity in recent years due to the decrease in hardware costs and increase in processing power. One example of such a class of devices is the RTL-SDR USB dongles based on the Realtek RTL2832U demodulator. This talk will discuss my experience in building a distributed RF scanner array for monitoring and spectrum mapping using such cheap SDR devices. The goal is to help the audience understand the what, why, and how of building their own RF monitoring array so that they will be able to do it themselves. In this era of increasingly being ``watched&#39;&#39;, we must be prepared to do our own ``watching&#39;&#39;.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5142.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4?1399728424</guid>
      <dc:identifier>xidDecyvb8dGAXEWacQrRw</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Andrew Reiter (arr,awr)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:summary>Software-Defined Radio (SDR) has increased in popularity in recent years due to the decrease in hardware costs and increase in processing power. One example of such a class of devices is the RTL-SDR USB dongles based on the Realtek RTL2832U demodulator. This talk will discuss my experience in building a distributed RF scanner array for monitoring and spectrum mapping using such cheap SDR devices. The goal is to help the audience understand the what, why, and how of building their own RF monitoring array so that they will be able to do it themselves. In this era of increasingly being ``watched&#39;&#39;, we must be prepared to do our own ``watching&#39;&#39;.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5142.html
</itunes:summary>
      <itunes:duration>00:58:52</itunes:duration>
    </item>
    <item>
      <title>Magic Lantern (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5554_-_en_-_saal_6_-_201312281400_-_magic_lantern_-_michael_zoller</link>
      <description>We present Magic Lantern, a free open software add-on for Canon DSLR cameras, that offers increased functionality aimed mainly at DSLR pro and power users. It runs alongside Canon&#39;s own firmware and introduces to consumer-grade DSLRs features usually only found in professional high-end digital (cinema) cameras.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5554.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5554-en-Magic_Lantern_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5554-en-Magic_Lantern_h264-hq.mp4?1399728424</guid>
      <dc:identifier>juhvY3wvW_i3TTb8KDEyeQ</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Michael Zöller</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Free Software on Your Camera</itunes:subtitle>
      <itunes:summary>We present Magic Lantern, a free open software add-on for Canon DSLR cameras, that offers increased functionality aimed mainly at DSLR pro and power users. It runs alongside Canon&#39;s own firmware and introduces to consumer-grade DSLRs features usually only found in professional high-end digital (cinema) cameras.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5554.html
</itunes:summary>
      <itunes:duration>01:04:03</itunes:duration>
    </item>
    <item>
      <title>The ArduGuitar (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5595_-_en_-_saal_6_-_201312291430_-_the_arduguitar_-_gratefulfrog</link>
      <description>The &lt;a href=&quot;http://www.arduguitar.org&quot;&gt;ArduGuitar&lt;/a&gt; is an electric guitar with &lt;i&gt;no physical controls,&lt;/i&gt; i.e. no buttons or knobs to adjust volume, tone or to select the pickups. All of these functions are performed remotely via a bluetooth device such as an Android phone, or via a dedicated Arduino powered blutetooth footpedal. The musician still plucks the strings, of course! This talk will give an overview of the technology and particularly the voyage that took me from nearly no knowledge about anything electronic to enough know-how to make it all work.I will explain what I learned by collaborating on forums, with Hackerspaces and with component providers: &quot;How to ask the right questions.&quot; The guitar with its Arduino powered circuit and an Android tablet will be available for demo; the code is all available on the github &lt;a href=&quot;https://github.com/gratefulfrog/ArduGuitar&quot;&gt;arduguitar repo&lt;/a&gt; with the associated &lt;a href=&quot;https://github.com/gratefulfrog/lib&quot;&gt;Arduino footpedal libraries&lt;/a&gt;.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5595.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4?1399728424</guid>
      <dc:identifier>T9YItdVO2WSP8VbAczAqjQ</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>gratefulfrog</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>An Arduino Powered Electric Guitar</itunes:subtitle>
      <itunes:summary>The &lt;a href=&quot;http://www.arduguitar.org&quot;&gt;ArduGuitar&lt;/a&gt; is an electric guitar with &lt;i&gt;no physical controls,&lt;/i&gt; i.e. no buttons or knobs to adjust volume, tone or to select the pickups. All of these functions are performed remotely via a bluetooth device such as an Android phone, or via a dedicated Arduino powered blutetooth footpedal. The musician still plucks the strings, of course! This talk will give an overview of the technology and particularly the voyage that took me from nearly no knowledge about anything electronic to enough know-how to make it all work.I will explain what I learned by collaborating on forums, with Hackerspaces and with component providers: &quot;How to ask the right questions.&quot; The guitar with its Arduino powered circuit and an Android tablet will be available for demo; the code is all available on the github &lt;a href=&quot;https://github.com/gratefulfrog/ArduGuitar&quot;&gt;arduguitar repo&lt;/a&gt; with the associated &lt;a href=&quot;https://github.com/gratefulfrog/lib&quot;&gt;Arduino footpedal libraries&lt;/a&gt;.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5595.html
</itunes:summary>
      <itunes:duration>00:30:06</itunes:duration>
    </item>
    <item>
      <title>Basics of Digital Wireless Communication (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5527_-_en_-_saal_g_-_201312271715_-_basics_of_digital_wireless_communication_-_clemens_hopfer</link>
      <description>The aim of this talk is to give an understandable insight into wireless communication, using existing systems as examples on why there are different communication systems for different uses.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5527.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4?1399728424</guid>
      <dc:identifier>rSMcCR_40Gu8XhIBpMapxQ</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Clemens Hopfer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>introduction to software radio principles</itunes:subtitle>
      <itunes:summary>The aim of this talk is to give an understandable insight into wireless communication, using existing systems as examples on why there are different communication systems for different uses.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5527.html
</itunes:summary>
      <itunes:duration>00:46:42</itunes:duration>
    </item>
    <item>
      <title>Y U NO ISP, taking back the Net (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5391_-_en_-_saal_6_-_201312291130_-_y_u_no_isp_taking_back_the_net_-_taziden</link>
      <description>Building and running an ISP is not that difficult. It&#39;s hard to say how many people are connected to the Internet by such weird structures, but we know that they are more and more each day.
What is at stake is taking back the control of the Internet infrastructure and showing that a neutral Internet access is natural.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5391.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5391-en-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sun, 29 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5391-en-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4?1420051678</guid>
      <dc:identifier>hsTftEgTn8vhPMLEZF2DVA</dc:identifier>
      <dc:date>2013-12-29T01:00:00+01:00</dc:date>
      <itunes:author>taziden</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:summary>Building and running an ISP is not that difficult. It&#39;s hard to say how many people are connected to the Internet by such weird structures, but we know that they are more and more each day.
What is at stake is taking back the control of the Internet infrastructure and showing that a neutral Internet access is natural.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5391.html
</itunes:summary>
      <itunes:duration>00:31:59</itunes:duration>
    </item>
    <item>
      <title>Revisiting &quot;Trusting Trust&quot; for binary toolchains (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5542_-_en_-_saal_2_-_201312282030_-_revisiting_trusting_trust_for_binary_toolchains_-_sergeybratus_-_julian_bangert_-_bx</link>
      <description>Ken Thompson&#39;s classic &quot;Reflections on Trusting Trust&quot; examined the impacts of planted build chain bugs, from an example of a compiler Trojan to a hypothetical &quot;well-placed microcode bug&quot;. Once theoretical &amp; remote, such scenarios have lately been revealed as a stark reality.

But what if we could have every individual piece of software or firmware in the binary toolchain bug-free, performing just as their programmers intended? Would we be safe from run-away computation if only well-formed inputs to each of the individual tools were allowed? Not so. Potential for malicious computation lurks in a variety of input formats along all steps of the binary runtime process construction and execution. Until the &quot;glue&quot; data of an ABI and the binary toolchains in general is reduced to predictable, statically analyzable power, plenty of room for bug-less Trojans remains.

We will discuss our latest work in constructing Turing-complete computation out of different levels of metadata, present tools to normalize and disambiguate these metadata, and conclude with proposals for criteria to trust binary toolchains beyond &quot;Trusting trust&quot; compilers and planted bugs.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5542.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4?1399728424</guid>
      <dc:identifier>GjMyYKOlFIvTVBV1gI_1SA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>sergeybratus, Julian Bangert, bx</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:summary>Ken Thompson&#39;s classic &quot;Reflections on Trusting Trust&quot; examined the impacts of planted build chain bugs, from an example of a compiler Trojan to a hypothetical &quot;well-placed microcode bug&quot;. Once theoretical &amp; remote, such scenarios have lately been revealed as a stark reality.

But what if we could have every individual piece of software or firmware in the binary toolchain bug-free, performing just as their programmers intended? Would we be safe from run-away computation if only well-formed inputs to each of the individual tools were allowed? Not so. Potential for malicious computation lurks in a variety of input formats along all steps of the binary runtime process construction and execution. Until the &quot;glue&quot; data of an ABI and the binary toolchains in general is reduced to predictable, statically analyzable power, plenty of room for bug-less Trojans remains.

We will discuss our latest work in constructing Turing-complete computation out of different levels of metadata, present tools to normalize and disambiguate these metadata, and conclude with proposals for criteria to trust binary toolchains beyond &quot;Trusting trust&quot; compilers and planted bugs.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5542.html
</itunes:summary>
      <itunes:duration>01:00:35</itunes:duration>
    </item>
    <item>
      <title>Plants &amp; Machines (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5437_-_en_-_saal_g_-_201312282245_-_plants_machines_-_mrv_-_bbuegler</link>
      <description>Did you ever feel the need to be in charge of your environment? We did . A detailed story of our experience playing with 220VAC and water to build an automated, digitally controlled ecosystem. A place, where you can be the climate-change. Double the temperature, triple the floods, let it storm or rain. A Tamagotchi that generates food from electricity. All done with Arduino, raspberry Pi and Node.js. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5437.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4?1399728424</guid>
      <dc:identifier>d3O96YnMHkiPLhp50TPJAA</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>mrv, bbuegler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Food replicating Robots from Open Source Technologies</itunes:subtitle>
      <itunes:summary>Did you ever feel the need to be in charge of your environment? We did . A detailed story of our experience playing with 220VAC and water to build an automated, digitally controlled ecosystem. A place, where you can be the climate-change. Double the temperature, triple the floods, let it storm or rain. A Tamagotchi that generates food from electricity. All done with Arduino, raspberry Pi and Node.js. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5437.html
</itunes:summary>
      <itunes:duration>00:26:57</itunes:duration>
    </item>
    <item>
      <title>An introduction to Firmware Analysis (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5477_-_en_-_saal_1_-_201312271245_-_an_introduction_to_firmware_analysis_-_stefan_widmann</link>
      <description>This talk gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be really tricky. After that it introduces the necessary tools, gives tips on how to detect the processor architecture, and explains some more advanced analysis techniques, including how to figure out the offsets where the firmware is loaded to, and how to start the investigation.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5477.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hd.mp4?1414847032</guid>
      <dc:identifier>IE5aOu8FUaPfpFv5v4rtJg</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Stefan Widmann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Techniques - Tools - Tricks</itunes:subtitle>
      <itunes:summary>This talk gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be really tricky. After that it introduces the necessary tools, gives tips on how to detect the processor architecture, and explains some more advanced analysis techniques, including how to figure out the offsets where the firmware is loaded to, and how to start the investigation.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5477.html
</itunes:summary>
      <itunes:duration>00:40:11</itunes:duration>
    </item>
    <item>
      <title>Sim Gishel (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5544_-_de_-_saal_2_-_201312280030_-_sim_gishel_-_karl_heinz_jeron</link>
      <description>Sim Gishel is a multimedia robot. He sings and dances on request. He will try hard to take part in casting shows to become a popstar.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5544.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5544-de-Sim_Gishel_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5544-de-Sim_Gishel_h264-hq.mp4?1420051677</guid>
      <dc:identifier>Ke3PM9oLXsvxKK450uSAtg</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Karl Heinz Jeron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:subtitle>A singing and dancing robot build to take part in casting shows </itunes:subtitle>
      <itunes:summary>Sim Gishel is a multimedia robot. He sings and dances on request. He will try hard to take part in casting shows to become a popstar.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5544.html
</itunes:summary>
      <itunes:duration>00:36:30</itunes:duration>
    </item>
    <item>
      <title>Console Hacking 2013 (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5290_-_en_-_saal_2_-_201312272030_-_console_hacking_2013_-_sven_-_marcan_-_nicholas_allegra_comex</link>
      <description>About a year ago Nintendo released their latest video gaming console, the Wii U. Since 2006, the Wii has led to one of the most active homebrew scenes after its security system was completely bypassed. This talk will discuss the improvements made in Wii U&#39;s architecture and explain how it was broken in less than 31 days. The talk is targeted at those who hack (or design) embedded system security, but gamers might also find it interesting.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5290.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5290-en-Console_Hacking_2013_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5290-en-Console_Hacking_2013_h264-hq.mp4?1399728423</guid>
      <dc:identifier>gL8lRFVpn8NFFfATsOn7Bw</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>sven, marcan, Nicholas Allegra (comex)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>WiiU</itunes:subtitle>
      <itunes:summary>About a year ago Nintendo released their latest video gaming console, the Wii U. Since 2006, the Wii has led to one of the most active homebrew scenes after its security system was completely bypassed. This talk will discuss the improvements made in Wii U&#39;s architecture and explain how it was broken in less than 31 days. The talk is targeted at those who hack (or design) embedded system security, but gamers might also find it interesting.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5290.html
</itunes:summary>
      <itunes:duration>00:59:08</itunes:duration>
    </item>
    <item>
      <title>Bug class genocide (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5412_-_en_-_saal_1_-_201312271830_-_bug_class_genocide_-_andreas_bogk</link>
      <description>Violation of memory safety is still a major source of vulnerabilities in everyday systems. This talk presents the state of the art in compiler instrumentation to completely eliminate such vulnerabilities in C/C++ software.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5412.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5412-en-Bug_class_genocide_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5412-en-Bug_class_genocide_h264-hd.mp4?1414847031</guid>
      <dc:identifier>z7M48Tb_4vtI0BBFVqe_ag</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Andreas Bogk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Applying science to eliminate 100% of buffer overflows</itunes:subtitle>
      <itunes:summary>Violation of memory safety is still a major source of vulnerabilities in everyday systems. This talk presents the state of the art in compiler instrumentation to completely eliminate such vulnerabilities in C/C++ software.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5412.html
</itunes:summary>
      <itunes:duration>00:47:03</itunes:duration>
    </item>
    <item>
      <title>We only have one earth (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5468_-_en_-_saal_6_-_201312281130_-_we_only_have_one_earth_-_drahflow</link>
      <description>An abundant number of existential risks threatens humanity. Many of those planetary by nature. Current science already enables us to colonize nearby space, yet nobody bothers to supply the modest financial resources. Hence this call to action.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5468.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5468-en-We_only_have_one_earth_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5468-en-We_only_have_one_earth_h264-hq.mp4?1399728423</guid>
      <dc:identifier>iG5wn8T9LzGJFpnHZBjVwg</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Drahflow</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>A case for expansionistic space policy</itunes:subtitle>
      <itunes:summary>An abundant number of existential risks threatens humanity. Many of those planetary by nature. Current science already enables us to colonize nearby space, yet nobody bothers to supply the modest financial resources. Hence this call to action.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5468.html
</itunes:summary>
      <itunes:duration>01:04:32</itunes:duration>
    </item>
    <item>
      <title>Hillbilly Tracking of Low Earth Orbit (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5463_-_en_-_saal_1_-_201312281400_-_hillbilly_tracking_of_low_earth_orbit_-_travis_goodspeed</link>
      <description>Satellites in Low Earth Orbit have tons of nifty signals, but they move quickly though the sky and are difficult to track with fine accuracy.  This lecture describes a remotely operable satellite tracking system that the author built from a Navy-surplus Inmarsat dish in Southern Appalachia.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5463.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hd.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hd.mp4?1414847032</guid>
      <dc:identifier>-isG7Swsi8DaA62qztr0Kw</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Travis Goodspeed</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>Repurposing an Inmarsat Dish</itunes:subtitle>
      <itunes:summary>Satellites in Low Earth Orbit have tons of nifty signals, but they move quickly though the sky and are difficult to track with fine accuracy.  This lecture describes a remotely operable satellite tracking system that the author built from a Navy-surplus Inmarsat dish in Southern Appalachia.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5463.html
</itunes:summary>
      <itunes:duration>00:47:02</itunes:duration>
    </item>
    <item>
      <title>Firmware Fat Camp (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5356_-_en_-_saal_6_-_201312272300_-_firmware_fat_camp_-_angcui</link>
      <description>We present a collection of techniques which aim to automagically remove significant (and unnecessary) portions of firmware binaries from common embedded devices to drastically reduce the attack surface of these devices. We present a brief theoretical explanation of Firmware Fat Camp, a collection of &quot;before&quot; and &quot;after&quot; photos of graduates of FFC, along with a set of live demonstrations of FFC in action on common embedded devices.

Modern embedded systems such as VoIP phones, network printers and routers typically ship with all available features compiled into its firmware image. A small subset of these features is activated at any given time on individual devices based on its specific configuration. An even smaller subset of features is actually used, as some unused and insecure features cannot are typically enabled by default and cannot be disabled. However, all embedded devices still contain a large amount of code and data that should never be executed or read according to its current configuration. This unnecessary binary is not simply a waste of memory; it contains vulnerable code and data that can be used by an attacker to exploit the system. This “dead code” provides an ideal attack surface. Automated minimization of this attack surface will significantly improve the security of the device without any impact to the device’s functionality. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5356.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4?1399728423</guid>
      <dc:identifier>Veo2ucE-l2cA-V-EaA_ckA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>angcui</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Embedded Security Using Binary Autotomy</itunes:subtitle>
      <itunes:summary>We present a collection of techniques which aim to automagically remove significant (and unnecessary) portions of firmware binaries from common embedded devices to drastically reduce the attack surface of these devices. We present a brief theoretical explanation of Firmware Fat Camp, a collection of &quot;before&quot; and &quot;after&quot; photos of graduates of FFC, along with a set of live demonstrations of FFC in action on common embedded devices.

Modern embedded systems such as VoIP phones, network printers and routers typically ship with all available features compiled into its firmware image. A small subset of these features is activated at any given time on individual devices based on its specific configuration. An even smaller subset of features is actually used, as some unused and insecure features cannot are typically enabled by default and cannot be disabled. However, all embedded devices still contain a large amount of code and data that should never be executed or read according to its current configuration. This unnecessary binary is not simply a waste of memory; it contains vulnerable code and data that can be used by an attacker to exploit the system. This “dead code” provides an ideal attack surface. Automated minimization of this attack surface will significantly improve the security of the device without any impact to the device’s functionality. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5356.html
</itunes:summary>
      <itunes:duration>00:42:25</itunes:duration>
    </item>
    <item>
      <title>Kryptographie nach Snowden (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5337_-_de_-_saal_2_-_201312271715_-_kryptographie_nach_snowden_-_ruedi</link>
      <description>Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit Milliarden-Etat komplett versagt zu haben. Namentlich RC4, MD5 und SHA1 scheinen praxisrelevant brechbar.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5337.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5337-de-Kryptographie_nach_Snowden_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5337-de-Kryptographie_nach_Snowden_h264-hq.mp4?1420051679</guid>
      <dc:identifier>GqBcTbWHQclHwDW_kI9yBQ</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>ruedi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle> Was tun nach der mittelmäßigen Kryptographie-Apokalypse?</itunes:subtitle>
      <itunes:summary>Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit Milliarden-Etat komplett versagt zu haben. Namentlich RC4, MD5 und SHA1 scheinen praxisrelevant brechbar.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5337.html
</itunes:summary>
      <itunes:duration>00:57:21</itunes:duration>
    </item>
    <item>
      <title>10 Years of Fun with Embedded Devices (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5497_-_en_-_saal_g_-_201312271400_-_10_years_of_fun_with_embedded_devices_-_nbd</link>
      <description>A review of the 10 year history of the OpenWrt project, current events, and upcoming developments.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5497.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4?1399728423</guid>
      <dc:identifier>3rqxJH8xZ4waSOXtJbxrDg</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>nbd</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>How OpenWrt evolved from a WRT54G firmware to an universal Embedded Linux OS</itunes:subtitle>
      <itunes:summary>A review of the 10 year history of the OpenWrt project, current events, and upcoming developments.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5497.html
</itunes:summary>
      <itunes:duration>00:48:02</itunes:duration>
    </item>
    <item>
      <title>IFGINT (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5509_-_de_-_saal_6_-_201312271600_-_ifgint_-_stefan_wehrmeyer</link>
      <description>Mit Informationsfreiheitsgesetz (IFG) und FragDenStaat.de kann man als Bürger den Staat einfach zurücküberwachen. Was erfährt man, wenn man fragt? Wo sind die Probleme, was sind die Workarounds? Ein Blick zurück auf 2013, nach vorn auf 2014 und ein Aufruf das IFG zu nutzen.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5509.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5509-de-IFGINT_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5509-de-IFGINT_h264-hq.mp4?1420051679</guid>
      <dc:identifier>TPk2ElH1ePS-A5CinT_ImA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Stefan Wehrmeyer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Erkenntnisse aus Informationsfreiheitsanfragen - Hacks, Bugs, Workarounds </itunes:subtitle>
      <itunes:summary>Mit Informationsfreiheitsgesetz (IFG) und FragDenStaat.de kann man als Bürger den Staat einfach zurücküberwachen. Was erfährt man, wenn man fragt? Wo sind die Probleme, was sind die Workarounds? Ein Blick zurück auf 2013, nach vorn auf 2014 und ein Aufruf das IFG zu nutzen.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5509.html
</itunes:summary>
      <itunes:duration>00:28:32</itunes:duration>
    </item>
    <item>
      <title>Seidenstraße (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5610_-__-_saal_2_-_201312271245_-_seidenstrasse_-_m_-_jeff_mann_-_frank_-_diani_barreto</link>
      <description>Auf dem 30C3 wird es, neben der bisher gewohnten digitalen Infrastruktur mit Netz, Telefon etc. dieses Jahr auch erstmalig ein Rohrpost-System mit dem schönen Namen Seidenstraße geben. Als Inspiration dient die auf geschlossenen Drainagerohren und Staubsaugern basierende Installation OCTO der Künstlergruppe Telekommunisten, die einigen von der letzten transmediale bekannt sein dürfte.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5610.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5610-de-Seidenstrasse_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5610-de-Seidenstrasse_h264-hq.mp4?1399728423</guid>
      <dc:identifier>0OMMJkoMY79GCUUx9LULgA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>*m, Jeff Mann, frank, Diani Barreto</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Art &amp; Beauty</itunes:keywords>
      <itunes:subtitle>The Making of…</itunes:subtitle>
      <itunes:summary>Auf dem 30C3 wird es, neben der bisher gewohnten digitalen Infrastruktur mit Netz, Telefon etc. dieses Jahr auch erstmalig ein Rohrpost-System mit dem schönen Namen Seidenstraße geben. Als Inspiration dient die auf geschlossenen Drainagerohren und Staubsaugern basierende Installation OCTO der Künstlergruppe Telekommunisten, die einigen von der letzten transmediale bekannt sein dürfte.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5610.html
</itunes:summary>
      <itunes:duration>00:48:59</itunes:duration>
    </item>
    <item>
      <title>Script Your Car! (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5360_-_en_-_saal_2_-_201312281600_-_script_your_car_-_felix_tmbinc_domke</link>
      <description>Almost all higher-end cars come with very beefy in-car entertainment hardware. In this talk, I&#39;ll describe how to take advantage of an existing hands-free kit to connect your car to the internet and script your dashboard in python.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5360.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4?1399728422</guid>
      <dc:identifier>7abembel5Nwrd3h_pRjeOQ</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Felix &quot;tmbinc&quot; Domke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Using existing hardware platforms to integrate python into your dashboard</itunes:subtitle>
      <itunes:summary>Almost all higher-end cars come with very beefy in-car entertainment hardware. In this talk, I&#39;ll describe how to take advantage of an existing hands-free kit to connect your car to the internet and script your dashboard in python.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5360.html
</itunes:summary>
      <itunes:duration>00:58:23</itunes:duration>
    </item>
    <item>
      <title>Rock&#39; em Graphic Cards (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5298_-_en_-_saal_g_-_201312271600_-_rock_em_graphic_cards_-_mel_agnes_meyder</link>
      <description>This talks introduces programming concepts and languages for parallel programming on accelerator cards. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5298.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5298-en-Rock_em_Graphic_Cards_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5298-en-Rock_em_Graphic_Cards_h264-hq.mp4?1420051679</guid>
      <dc:identifier>piiLuOpnx-bTwU28WOUQWA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>mel/ Agnes Meyder</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle> Introduction to Heterogeneous Parallel Programming</itunes:subtitle>
      <itunes:summary>This talks introduces programming concepts and languages for parallel programming on accelerator cards. 

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5298.html
</itunes:summary>
      <itunes:duration>00:56:13</itunes:duration>
    </item>
    <item>
      <title>Der Kampf um Netzneutralität (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5348_-_de_-_saal_2_-_201312272145_-_der_kampf_um_netzneutralitat_-_markus_beckedahl_-_thomas_lohninger</link>
      <description>Seit Jahren nur in Fachzirkeln diskutiert gab es 2013 den Durchbruch für die Debatte um Netzneutralität. Mit der Ankündigung der Deutschen Telekom im Frühjahr, zukünftig auf Volumentarife umzusteigen und Partnerdienste priorisiert durchzulassen, wurde Netzneutralität eines der meistdiskutierten netzpolitischen Debatten des Jahres.

Auf nationaler Ebene startete das Bundeswirtschaftsminsiterium eine Diskussion über eine Verordnung und auf EU-Ebene legte die Kommission einen Verordnungsvorschlag vor.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5348.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5348-de-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5348-de-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4?1420051681</guid>
      <dc:identifier>u40tVBeaVPehGK39ABNLlQ</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Markus Beckedahl, Thomas Lohninger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Wer kontrolliert das Netz?</itunes:subtitle>
      <itunes:summary>Seit Jahren nur in Fachzirkeln diskutiert gab es 2013 den Durchbruch für die Debatte um Netzneutralität. Mit der Ankündigung der Deutschen Telekom im Frühjahr, zukünftig auf Volumentarife umzusteigen und Partnerdienste priorisiert durchzulassen, wurde Netzneutralität eines der meistdiskutierten netzpolitischen Debatten des Jahres.

Auf nationaler Ebene startete das Bundeswirtschaftsminsiterium eine Diskussion über eine Verordnung und auf EU-Ebene legte die Kommission einen Verordnungsvorschlag vor.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5348.html
</itunes:summary>
      <itunes:duration>00:54:09</itunes:duration>
    </item>
    <item>
      <title>HbbTV Security (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5398_-_en_-_saal_2_-_201312272300_-_hbbtv_security_-_martin_herfurt</link>
      <description>HbbTV (Hybrid broadband broadcast TV) is an emerging standard that is implemented in a growing number of smart TV devices. The idea is to bundle broadcast media content with online content which can be retrieved by the TV set through an Internet connection.

Mechanisms that allow the online content to be accessed by the TV set can be attacked and might put the TV user’s privacy at stake. The presentation highlights possible attack vectors of HbbTV-capable TV sets and introduces possible mitigations.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5398.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4?1399728422</guid>
      <dc:identifier>wJ8usABBu6mJXRNpmhr_SQ</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Martin Herfurt</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>OMG - my Smart TV got pr0wn3d</itunes:subtitle>
      <itunes:summary>HbbTV (Hybrid broadband broadcast TV) is an emerging standard that is implemented in a growing number of smart TV devices. The idea is to bundle broadcast media content with online content which can be retrieved by the TV set through an Internet connection.

Mechanisms that allow the online content to be accessed by the TV set can be attacked and might put the TV user’s privacy at stake. The presentation highlights possible attack vectors of HbbTV-capable TV sets and introduces possible mitigations.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5398.html
</itunes:summary>
      <itunes:duration>00:45:10</itunes:duration>
    </item>
    <item>
      <title>EUDataP: State of the Union (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5601_-_en_-_saal_2_-_201312281400_-_eudatap_state_of_the_union_-_jan_philipp_albrecht</link>
      <description>Jan Phillip Albrecht is rapporteur of the European Parliament for the EU&#39;s General Data Protection Regulation as well as for the EU-US data protection framework agreement.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5601.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5601-en-EUDataP_State_of_the_Union_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4-web/30c3-5601-en-EUDataP_State_of_the_Union_h264-hq.mp4?1420051678</guid>
      <dc:identifier>QF7QyNNX35gm9TZyqlb7_A</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Jan Philipp Albrecht</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Jan Phillip Albrecht is rapporteur of the European Parliament for the EU&#39;s General Data Protection Regulation as well as for the EU-US data protection framework agreement.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5601.html
</itunes:summary>
      <itunes:duration>01:12:22</itunes:duration>
    </item>
    <item>
      <title>Toward a Cognitive &quot;Quantified Self&quot; (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5387_-_en_-_saal_6_-_201312272030_-_toward_a_cognitive_quantified_self_-_kai</link>
      <description>The talk gives an overview about our work of quantifying knowledge acquisition tasks in real-life environments, focusing on reading. We combine several pervasive sensing approaches (computer vision, motion-based activity recognition etc.) to tackle the problem of recognizing and classifying knowledge acquisition tasks with a special focus on reading. We discuss which sensing modalities can be used for digital and offline reading recognition, as well as how to combine them dynamically.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5387.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4?1399728422</guid>
      <dc:identifier>O-7g6jlu6DmenVdxO6t2Mg</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Kai</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>Activity Recognition for the Mind</itunes:subtitle>
      <itunes:summary>The talk gives an overview about our work of quantifying knowledge acquisition tasks in real-life environments, focusing on reading. We combine several pervasive sensing approaches (computer vision, motion-based activity recognition etc.) to tackle the problem of recognizing and classifying knowledge acquisition tasks with a special focus on reading. We discuss which sensing modalities can be used for digital and offline reading recognition, as well as how to combine them dynamically.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5387.html
</itunes:summary>
      <itunes:duration>00:49:50</itunes:duration>
    </item>
    <item>
      <title>Programming FPGAs with PSHDL (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5186_-_en_-_saal_6_-_201312282145_-_programming_fpgas_with_pshdl_-_karsten_becker</link>
      <description>Learning to program an FPGA is time consuming. Not just do you need to download and install 20 GB of vendor tools, but you also need to wrap your brain around the strange ideas of hardware description languages like VHDL. PSHDL aims to ease the learning curve significantly and provide more people with the ability to program FPGAs.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5186.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4?1399728421</guid>
      <dc:identifier>0IuyfNlW5fXVnrMIgEXesw</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Karsten Becker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Let&#39;s create the Arduino for FPGAs</itunes:subtitle>
      <itunes:summary>Learning to program an FPGA is time consuming. Not just do you need to download and install 20 GB of vendor tools, but you also need to wrap your brain around the strange ideas of hardware description languages like VHDL. PSHDL aims to ease the learning curve significantly and provide more people with the ability to program FPGAs.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5186.html
</itunes:summary>
      <itunes:duration>01:01:45</itunes:duration>
    </item>
    <item>
      <title>Open source experimental incubator build up (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5566_-_en_-_saal_6_-_201312281815_-_open_source_experimental_incubator_build_up_-_frantisek_algoldor_apfelbeck</link>
      <description>This is a call for participation in a project aimed to build up an open source based experimental incubator which can be used for variety of food, beverage and bio hacking projects allowing for easy control and monitoring of internal condition like temperature and humidity. Working groups will be established to develop prototypes which can be easily and relatively cheaply assembled. Securing funding and establishing a portal to effectively share the news and knowledge within the groups and wider community will be major part of the first phase.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5566.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4?1399728421</guid>
      <dc:identifier>MKUdng2EHp0XtgsBdwCVRQ</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>Frantisek Algoldor Apfelbeck</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>call for participation in project and product development</itunes:subtitle>
      <itunes:summary>This is a call for participation in a project aimed to build up an open source based experimental incubator which can be used for variety of food, beverage and bio hacking projects allowing for easy control and monitoring of internal condition like temperature and humidity. Working groups will be established to develop prototypes which can be easily and relatively cheaply assembled. Securing funding and establishing a portal to effectively share the news and knowledge within the groups and wider community will be major part of the first phase.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5566.html
</itunes:summary>
      <itunes:duration>00:33:19</itunes:duration>
    </item>
    <item>
      <title>SCADA StrangeLove 2 (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5582_-_en_-_saal_2_-_201312282300_-_scada_strangelove_2_-_repdet_-_sgordey</link>
      <description>SCADA StrangeLove team will present their research on ICS systems for the second time on CCC. Last year we showed current situation with security of industrial world and disclosed a big number of vulnerabilities found in Siemens ICS solutions. Part of vulnerabilities, we can say most notable one, wasn’t disclosed due to Responsible Disclosure. This time we already know. We will speak about several industrial protocols and their weaknesses. During this year we played with new industrial hardware and software – this patitially brings new “We don’t know yet” vulnerability details. Moreover, we’ll mention creepiest bugs undisclosed from last year, tell you about new ones and build attack vectors from them. At last, we will share our experience in pentesting ICS enviroments.

Speakers: Gleb Gritsai and Sergey Gordeychik

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5582.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4?1399728421</guid>
      <dc:identifier>OT5cFvmp4WvV3cjuoH1gtQ</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>repdet, sgordey</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>We already know</itunes:subtitle>
      <itunes:summary>SCADA StrangeLove team will present their research on ICS systems for the second time on CCC. Last year we showed current situation with security of industrial world and disclosed a big number of vulnerabilities found in Siemens ICS solutions. Part of vulnerabilities, we can say most notable one, wasn’t disclosed due to Responsible Disclosure. This time we already know. We will speak about several industrial protocols and their weaknesses. During this year we played with new industrial hardware and software – this patitially brings new “We don’t know yet” vulnerability details. Moreover, we’ll mention creepiest bugs undisclosed from last year, tell you about new ones and build attack vectors from them. At last, we will share our experience in pentesting ICS enviroments.

Speakers: Gleb Gritsai and Sergey Gordeychik

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5582.html
</itunes:summary>
      <itunes:duration>00:41:41</itunes:duration>
    </item>
    <item>
      <title>lasers in space (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5311_-_en_-_saal_6_-_201312271645_-_lasers_in_space_-_anja</link>
      <description>This talk will give an introduction on lasers and space and it will show the huge diversity of applications for lasers in space.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5311.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5311-en-lasers_in_space_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5311-en-lasers_in_space_h264-hq.mp4?1399728421</guid>
      <dc:identifier>TTYvRfSgu6wHisdcwpo1VA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>anja</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Science &amp; Engineering</itunes:keywords>
      <itunes:subtitle>more than just pew pew!</itunes:subtitle>
      <itunes:summary>This talk will give an introduction on lasers and space and it will show the huge diversity of applications for lasers in space.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5311.html
</itunes:summary>
      <itunes:duration>00:29:22</itunes:duration>
    </item>
    <item>
      <title>Hardening hardware and choosing a #goodBIOS (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5529_-_en_-_saal_2_-_201312271830_-_hardening_hardware_and_choosing_a_goodbios_-_peter_stuge</link>
      <description>A commodity laptop is analyzed to identify exposed attack surfaces and is then secured on both the hardware and the firmware level against permanent modifications by malicious software as well as quick drive-by hardware attacks by evil maids, ensuring that the machine always powers up to a known good state and significantly raising the bar for an attacker who wants to use the machine against its owner.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5529.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4?1399728421</guid>
      <dc:identifier>QszoY6oJD6rpkbsTRQinRA</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Peter Stuge</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Clean boot every boot -  rejecting persistence of malicious software and tripping up the evil maid</itunes:subtitle>
      <itunes:summary>A commodity laptop is analyzed to identify exposed attack surfaces and is then secured on both the hardware and the firmware level against permanent modifications by malicious software as well as quick drive-by hardware attacks by evil maids, ensuring that the machine always powers up to a known good state and significantly raising the bar for an attacker who wants to use the machine against its owner.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5529.html
</itunes:summary>
      <itunes:duration>00:47:45</itunes:duration>
    </item>
    <item>
      <title>The GNU Name System (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5212_-_en_-_saal_6_-_201312272145_-_the_gnu_name_system_-_grothoff</link>
      <description>DNS, DNSSEC and the X.509 CA system leak private information about users to server operators and fail to provide adequate security against modern adversaries.  The fully decentralized GNU Name System provides a privacy-enhancing and censorship-resistant alternative.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5212.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4?1399728421</guid>
      <dc:identifier>mskIn_xqqyN3oJeG11ztXg</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>grothoff</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>A Decentralized PKI For Social Movements</itunes:subtitle>
      <itunes:summary>DNS, DNSSEC and the X.509 CA system leak private information about users to server operators and fail to provide adequate security against modern adversaries.  The fully decentralized GNU Name System provides a privacy-enhancing and censorship-resistant alternative.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5212.html
</itunes:summary>
      <itunes:duration>00:51:58</itunes:duration>
    </item>
    <item>
      <title>Reverse engineering of CHIASMUS from GSTOOL (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5307_-_en_-_saal_2_-_201312271400_-_reverse_engineering_of_chiasmus_from_gstool_-_jan_schejbal</link>
      <description>We reverse-engineered one implementation of the non-public CHIASMUS cipher designed by the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, short BSI). This did not only give us some insight on the cipher, but also uncovered serious implementation issues in GSTOOL which allow attackers to crack files encrypted with the GSTOOL encryption function with very little effort.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5307.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4?1399728421</guid>
      <dc:identifier>NzaYFnLUYCWw9gjG_KMgsQ</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>Jan Schejbal</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>It hurts.</itunes:subtitle>
      <itunes:summary>We reverse-engineered one implementation of the non-public CHIASMUS cipher designed by the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, short BSI). This did not only give us some insight on the cipher, but also uncovered serious implementation issues in GSTOOL which allow attackers to crack files encrypted with the GSTOOL encryption function with very little effort.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5307.html
</itunes:summary>
      <itunes:duration>00:48:26</itunes:duration>
    </item>
    <item>
      <title>Electronic Bank Robberies (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5476_-_en_-_saal_2_-_201312271600_-_electronic_bank_robberies_-_tw_-_sb</link>
      <description>This talk will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The successful compromise of an ATM can easily result in the loss of several hundred thousand dollars.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5476.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Fri, 27 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4?1399728420</guid>
      <dc:identifier>w9UU1iDfP18QvWJ5i2VDsg</dc:identifier>
      <dc:date>2013-12-27T01:00:00+01:00</dc:date>
      <itunes:author>tw, sb</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:subtitle>Stealing Money from ATMs with Malware</itunes:subtitle>
      <itunes:summary>This talk will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The successful compromise of an ATM can easily result in the loss of several hundred thousand dollars.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5476.html
</itunes:summary>
      <itunes:duration>00:56:18</itunes:duration>
    </item>
    <item>
      <title>Fast Internet-wide Scanning and its Security Applications (30c3)</title>
      <link>https://media.ccc.de/v/30C3_-_5533_-_en_-_saal_2_-_201312281245_-_fast_internet-wide_scanning_and_its_security_applications_-_j_alex_halderman</link>
      <description>Internet-wide network scanning has powerful security applications, including exposing new vulnerabilities, tracking their mitigation, and exposing hidden services.  Unfortunately, probing the entire public address space with standard tools like Nmap requires either months of time or large clusters of machines.  In this talk, I&#39;ll demonstrate &lt;a href=&quot;https://zmap.io&quot;&gt;ZMap&lt;/a&gt;, an open-source network scanner developed by my research group that is designed from the ground up to perform Internet-wide scans efficiently.  We&#39;ve used ZMap with a gigabit Ethernet uplink to survey the entire IPv4 address space in under 45 minutes from a single machine, more than 1300 times faster than Nmap.  I&#39;ll explain how ZMap&#39;s architecture enables such high performance.  We&#39;ll then work through a series of practical examples that explore the security applications of very fast Internet-scale scanning, both offensive and defensive.  I&#39;ll talk about results and experiences from conducting more than 300 Internet-wide scans over the past 18 months, including new revelations about the state of the HTTPS CA ecosystem.  I&#39;ll discuss the reactions our scans have generated--on one occasion we were mistaken for an Iranian attack against U.S. banks and we received a visit from the FBI--and I&#39;ll suggest guidelines and best practices for good Internet citizenship while scanning.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5533.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4"
        length="0"
        type="video/mp4"/>
      <pubDate>Sat, 28 Dec 2013 01:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4?1399728420</guid>
      <dc:identifier>RiskSjr33wsyUrC5oX80uw</dc:identifier>
      <dc:date>2013-12-28T01:00:00+01:00</dc:date>
      <itunes:author>J. Alex Halderman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>30c3, Security &amp; Safety</itunes:keywords>
      <itunes:summary>Internet-wide network scanning has powerful security applications, including exposing new vulnerabilities, tracking their mitigation, and exposing hidden services.  Unfortunately, probing the entire public address space with standard tools like Nmap requires either months of time or large clusters of machines.  In this talk, I&#39;ll demonstrate &lt;a href=&quot;https://zmap.io&quot;&gt;ZMap&lt;/a&gt;, an open-source network scanner developed by my research group that is designed from the ground up to perform Internet-wide scans efficiently.  We&#39;ve used ZMap with a gigabit Ethernet uplink to survey the entire IPv4 address space in under 45 minutes from a single machine, more than 1300 times faster than Nmap.  I&#39;ll explain how ZMap&#39;s architecture enables such high performance.  We&#39;ll then work through a series of practical examples that explore the security applications of very fast Internet-scale scanning, both offensive and defensive.  I&#39;ll talk about results and experiences from conducting more than 300 Internet-wide scans over the past 18 months, including new revelations about the state of the HTTPS CA ecosystem.  I&#39;ll discuss the reactions our scans have generated--on one occasion we were mistaken for an Iranian attack against U.S. banks and we received a visit from the FBI--and I&#39;ll suggest guidelines and best practices for good Internet citizenship while scanning.

about this event: http://events.ccc.de/congress/2013/Fahrplan/events/5533.html
</itunes:summary>
      <itunes:duration>01:03:03</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/congress/2013/folder-30c3.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from 30c3 as mp4</itunes:summary>
  </channel>
</rss>