<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - 31C3: a new dawn (opus)</title>
    <link>https://media.ccc.de/c/31c3</link>
    <description> This feed contains all events from 31c3 as opus</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:46:27 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/congress/2014/folder-2014.png</url>
      <title>Chaos Computer Club - 31C3: a new dawn (opus)</title>
      <link>https://media.ccc.de/c/31c3</link>
    </image>
    <item>
      <title>Erste Stunden der Zweisamkeit (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_2000_-_de_-_sessions_-_201412270000_-_erste_-_stunden_-_der_-_zweisamkeit_-_meik_-_christoph_-_bruder</link>
      <description>
about this event: 
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-2000-de-Erste_Stunden_der_Zweisamkeit_opus.opus"
        length="48234496"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 00:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-2000-de-Erste_Stunden_der_Zweisamkeit_opus.opus?1421328649</guid>
      <dc:identifier>4d34a8ab-f2af-4f8c-8406-91715e2498cb</dc:identifier>
      <dc:date>2014-12-27T00:00:00+01:00</dc:date>
      <itunes:author>m.eik, Christoph, Bruder</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords></itunes:keywords>
      <itunes:subtitle>Jahresupdate zur GEMA-Alternative C3S</itunes:subtitle>
      <itunes:summary>
about this event: 
</itunes:summary>
      <itunes:duration>01:07:13</itunes:duration>
    </item>
    <item>
      <title>Iridium Pager Hacking (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6236_-_en_-_saal_1_-_201412281645_-_iridium_pager_hacking_-_sec_-_schneider</link>
      <description>The chronicles of reversing the Iridium pager system.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6236.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6236-en-de-Iridium_Pager_Hacking_opus.opus"
        length="22020096"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6236-en-de-Iridium_Pager_Hacking_opus.opus?1421015722</guid>
      <dc:identifier>rHjqtfbslD_ucUr8kW5wcQ</dc:identifier>
      <dc:date>2014-12-28T16:45:00+01:00</dc:date>
      <itunes:author>Sec, schneider</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>The chronicles of reversing the Iridium pager system.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6236.html
</itunes:summary>
      <itunes:duration>00:31:29</itunes:duration>
    </item>
    <item>
      <title>Mit Kunst die Gesellschaft hacken (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6584_-_de_-_saal_2_-_201412271400_-_mit_kunst_die_gesellschaft_hacken_-_stefan_pelzer_-_philipp_ruch</link>
      <description>Ein Mahnmal gegen die Vereinten Nationen, 25.000 Euro Kopfgeld auf eine
deutsche Waffenhändlerfamilie, eine falsche Kampagne für das
Familienministerium oder die Flucht der &quot;Mauerkreuze&quot; vom Reichstagsufer
an die EU-Außengrenzen: wenn das Zentrum für Politische Schönheit (ZPS)
das Kriegsbeil ausgräbt, ist eine kontroverse Debatte garantiert.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6584.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6584-de-en-Mit_Kunst_die_Gesellschaft_hacken_opus.opus"
        length="48234496"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6584-de-en-Mit_Kunst_die_Gesellschaft_hacken_opus.opus?1421016287</guid>
      <dc:identifier>419d4f7e-7506-4d46-8700-e47e164a8e32</dc:identifier>
      <dc:date>2014-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Stefan Pelzer, Philipp Ruch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Das Zentrum für politische Schönheit</itunes:subtitle>
      <itunes:summary>Ein Mahnmal gegen die Vereinten Nationen, 25.000 Euro Kopfgeld auf eine
deutsche Waffenhändlerfamilie, eine falsche Kampagne für das
Familienministerium oder die Flucht der &quot;Mauerkreuze&quot; vom Reichstagsufer
an die EU-Außengrenzen: wenn das Zentrum für Politische Schönheit (ZPS)
das Kriegsbeil ausgräbt, ist eine kontroverse Debatte garantiert.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6584.html
</itunes:summary>
      <itunes:duration>01:07:18</itunes:duration>
    </item>
    <item>
      <title>Trustworthy secure modular operating system engineering (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6443_-_en_-_saal_2_-_201412271245_-_trustworthy_secure_modular_operating_system_engineering_-_hannes_-_david_kaloper</link>
      <description>We present Mirage OS, a modular library operating system developed from scratch in the functional programming language OCaml. Each service, called unikernel,  is an OCaml application using libraries such as a TCP/IP stack, DNS. It is either compiled to a Xen virtual machine image or to a Unix binary (for development). State in 2014 is that it runs on x86 and arm, we implemented a clean-slate TLS (1.0, 1.1, 1.2), X.509, ASN.1 stack, crypto primitives, Off-the-record. We also have TCP/IP, HTTP, a persistent branchable store (similar to git) - all implemented in OCaml. A virtual machine serving data via https is roughly 2MB in size - no libc inside :)
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6443.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6443-en-Trustworthy_secure_modular_operating_system_engineering_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6443-en-Trustworthy_secure_modular_operating_system_engineering_opus.opus?1420925280</guid>
      <dc:identifier>mzNAGavKy2KOcwOjGqC8pw</dc:identifier>
      <dc:date>2014-12-27T12:45:00+01:00</dc:date>
      <itunes:author>hannes, David Kaloper</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>fun(ctional) operating system and security protocol engineering</itunes:subtitle>
      <itunes:summary>We present Mirage OS, a modular library operating system developed from scratch in the functional programming language OCaml. Each service, called unikernel,  is an OCaml application using libraries such as a TCP/IP stack, DNS. It is either compiled to a Xen virtual machine image or to a Unix binary (for development). State in 2014 is that it runs on x86 and arm, we implemented a clean-slate TLS (1.0, 1.1, 1.2), X.509, ASN.1 stack, crypto primitives, Off-the-record. We also have TCP/IP, HTTP, a persistent branchable store (similar to git) - all implemented in OCaml. A virtual machine serving data via https is roughly 2MB in size - no libc inside :)
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6443.html
</itunes:summary>
      <itunes:duration>01:00:55</itunes:duration>
    </item>
    <item>
      <title>Reproducible Builds (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6240_-_en_-_saal_g_-_201412271400_-_reproducible_builds_-_mike_perry_-_seth_schoen_-_hans_steiner</link>
      <description>Software build reproducibility is the ability to use independent build machines to compile bit-identical binaries from program source code. In this talk, we will discuss the motivation for and the technical details behind software build reproducibility. We will describe the technical mechanisms used by the Tor Project to produce
reproducible builds of the Tor Browser, and also introduce the early efforts of both F-Droid and Debian to achieve these same build integrity properties on a more wide-scale basis.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6240.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6240-en-Reproducible_Builds_opus.opus"
        length="46137344"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6240-en-Reproducible_Builds_opus.opus?1420922417</guid>
      <dc:identifier>KJiq3wTS9cMLTTrgJ8PqHA</dc:identifier>
      <dc:date>2014-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Mike Perry, Seth Schoen, Hans Steiner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Moving Beyond Single Points of Failure for Software Distribution</itunes:subtitle>
      <itunes:summary>Software build reproducibility is the ability to use independent build machines to compile bit-identical binaries from program source code. In this talk, we will discuss the motivation for and the technical details behind software build reproducibility. We will describe the technical mechanisms used by the Tor Project to produce
reproducible builds of the Tor Browser, and also introduce the early efforts of both F-Droid and Debian to achieve these same build integrity properties on a more wide-scale basis.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6240.html
</itunes:summary>
      <itunes:duration>01:03:52</itunes:duration>
    </item>
    <item>
      <title>Let’s build our own personalized open textile production line (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6447_-_en_-_saal_6_-_201412271400_-_let_s_build_our_own_personalized_open_textile_production_line_-_hong_phuc_dang</link>
      <description>The talk is about our project to develop software and hardware tools for a fair and environment friendly garment and textile production and how we break down the locks that exists on every level in the industry from design, to software, machines and distribution. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6447.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6447-en-Lets_build_our_own_personalized_open_textile_production_line_opus.opus"
        length="39845888"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6447-en-Lets_build_our_own_personalized_open_textile_production_line_opus.opus?1420922385</guid>
      <dc:identifier>BhRiQWa_rOqEw5k-l4GRXg</dc:identifier>
      <dc:date>2014-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Hong Phuc Dang</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>The talk is about our project to develop software and hardware tools for a fair and environment friendly garment and textile production and how we break down the locks that exists on every level in the industry from design, to software, machines and distribution. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6447.html
</itunes:summary>
      <itunes:duration>00:55:58</itunes:duration>
    </item>
    <item>
      <title>Mein Bot, der Kombattant (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6184_-_de_-_saal_g_-_201412271715_-_mein_bot_der_kombattant_-_josch_-_arche3000</link>
      <description>Der Vortrag bietet eine sprachwissenschaftlich informierte Perspektive auf den Informationskrieg mit Fokus auf operative Kommunikation in sozialen Medien. Am Beispiel eines selbst entwickelten Bots werden wir linguistische Prozeduren zur Manipulation von Kommunikation mit dem Ziel der Beeinflussung von Wissen, Werten, Gefühlen und Handlungsdispositionen vorstellen. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6184.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6184-de-en-Mein_Bot_der_Kombattant_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6184-de-en-Mein_Bot_der_Kombattant_opus.opus?1420813896</guid>
      <dc:identifier>sAZoeOc6Qu4bMPxrU8yEpw</dc:identifier>
      <dc:date>2014-12-27T17:15:00+01:00</dc:date>
      <itunes:author>josch, arche3000</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Operative Kommunikation im digitalen Informationskrieg</itunes:subtitle>
      <itunes:summary>Der Vortrag bietet eine sprachwissenschaftlich informierte Perspektive auf den Informationskrieg mit Fokus auf operative Kommunikation in sozialen Medien. Am Beispiel eines selbst entwickelten Bots werden wir linguistische Prozeduren zur Manipulation von Kommunikation mit dem Ziel der Beeinflussung von Wissen, Werten, Gefühlen und Handlungsdispositionen vorstellen. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6184.html
</itunes:summary>
      <itunes:duration>01:00:49</itunes:duration>
    </item>
    <item>
      <title>31C3 Infrastructure Review (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6557_-_en_-_saal_g_-_201412301600_-_31c3_infrastructure_review_-_leon</link>
      <description>Sections
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#t=0:10&quot;&gt;0:10 Network (NOC)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#t=26:19&quot;&gt;26:19 Power&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#t=29:39&quot;&gt;29:39 Seidenstraße (SOC)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#t=37:21&quot;&gt;37:21 Video (VOC)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6557.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6557-en-de-31C3_Infrastructure_Review_opus.opus"
        length="37748736"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6557-en-de-31C3_Infrastructure_Review_opus.opus?1420378131</guid>
      <dc:identifier>e192e98a-90ca-44c8-9cfd-86b94a79f4d1</dc:identifier>
      <dc:date>2014-12-30T16:00:00+01:00</dc:date>
      <itunes:author>Leon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>Sections
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;#t=0:10&quot;&gt;0:10 Network (NOC)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#t=26:19&quot;&gt;26:19 Power&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#t=29:39&quot;&gt;29:39 Seidenstraße (SOC)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;#t=37:21&quot;&gt;37:21 Video (VOC)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6557.html
</itunes:summary>
      <itunes:duration>00:52:30</itunes:duration>
    </item>
    <item>
      <title>The case of Chelsea Manning (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6602_-_en_-_saal_1_-_201412301130_-_the_case_of_chelsea_manning_-_alexa_o_brien_-_nancy_hollander_-_ahmed_ghappour_-_chase_strangio</link>
      <description>A discussion with U.S. Army private Chelsea Manning&#39;s attorneys Nanny Hollander, Ahmed Ghappour, and Chase Strangio.
Moderated by journalist Alexa O&#39;Brien.</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6602-en-de-The_case_of_Chelsea_Manning_opus.opus"
        length="41943040"
        type="audio/opus"/>
      <pubDate>Fri, 02 Jan 2015 21:31:32 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6602-en-de-The_case_of_Chelsea_Manning_opus.opus?1420231886</guid>
      <dc:identifier>6b94aab7-5909-4662-99f8-1a990c247bb1</dc:identifier>
      <dc:date>2015-01-02T21:31:32+01:00</dc:date>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords></itunes:keywords>
      <itunes:summary>A discussion with U.S. Army private Chelsea Manning&#39;s attorneys Nanny Hollander, Ahmed Ghappour, and Chase Strangio.
Moderated by journalist Alexa O&#39;Brien.</itunes:summary>
      <itunes:duration>00:59:28</itunes:duration>
    </item>
    <item>
      <title>Traue keinem Scan, den du nicht selbst gefälscht hast (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6558_-_de_-_saal_g_-_201412282300_-_traue_keinem_scan_den_du_nicht_selbst_gefalscht_hast_-_david_kriesel</link>
      <description>Kopierer, die spontan Zahlen im Dokument verändern: Im August 2013 kam heraus, dass so gut wie alle Xerox-Scankopierer beim Scannen Zahlen und Buchstaben einfach so durch andere ersetzen. Da man solche Fehler als Benutzer so gut wie nicht sehen kann, ist der Bug extrem gefährlich und blieb lange unentdeckt: Er existiert über acht Jahre in freier Wildbahn.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6558.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6558-de-en-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_opus.opus"
        length="45088768"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6558-de-en-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_opus.opus?1420218876</guid>
      <dc:identifier>2f68e356-6c3f-4034-9640-c06d717ed96b</dc:identifier>
      <dc:date>2014-12-28T23:00:00+01:00</dc:date>
      <itunes:author>David Kriesel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>&quot;Bei Kopierern kommt das raus, was man reinsteckt.&quot; – Wer das denkt, sollte diesen Vortrag besuchen.</itunes:subtitle>
      <itunes:summary>Kopierer, die spontan Zahlen im Dokument verändern: Im August 2013 kam heraus, dass so gut wie alle Xerox-Scankopierer beim Scannen Zahlen und Buchstaben einfach so durch andere ersetzen. Da man solche Fehler als Benutzer so gut wie nicht sehen kann, ist der Bug extrem gefährlich und blieb lange unentdeckt: Er existiert über acht Jahre in freier Wildbahn.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6558.html
</itunes:summary>
      <itunes:duration>01:03:30</itunes:duration>
    </item>
    <item>
      <title>Premiere: We love surveillance (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6608_-_en_-_saal_1_-_201412301545_-_premiere_we_love_surveillance_-_alexander_lehmann</link>
      <description>Premiere of the English version of the shortfilm &quot;We love surveillance&quot;.</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6608-en-Premiere_We_love_surveillance_opus.opus"
        length="7340032"
        type="audio/opus"/>
      <pubDate>Fri, 02 Jan 2015 15:36:20 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6608-en-Premiere_We_love_surveillance_opus.opus?1420219891</guid>
      <dc:identifier>e604e540-90d0-4910-920a-1c23ea83e341</dc:identifier>
      <dc:date>2015-01-02T15:36:20+01:00</dc:date>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords></itunes:keywords>
      <itunes:subtitle>#7reasons</itunes:subtitle>
      <itunes:summary>Premiere of the English version of the shortfilm &quot;We love surveillance&quot;.</itunes:summary>
      <itunes:duration>00:10:38</itunes:duration>
    </item>
    <item>
      <title>Why are computers so @#!*, and what can we do about it? (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6574_-_en_-_saal_1_-_201412301245_-_why_are_computers_so_and_what_can_we_do_about_it_-_peter_sewell</link>
      <description>Computers have become ubiquitous and essential, but they remain massively error-prone and insecure - as if we were back in the early days of the industrial revolution, with steam engines exploding left, right, and centre.  Why is this, and can we do better?  Is it science, engineering, craft, or bodgery?

I&#39;ll talk about attempts to mix better engineering methods from a cocktail of empiricism and logic, with examples from network protocols, programming languages, and (especially) the concurrency behaviour of programming languages and multiprocessors (from the ARMs in your phone to x86 and IBM Power servers), together with dealings with architects and language standards groups.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6574.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6574-en-de-Why_are_computers_so_and_what_can_we_do_about_it_opus.opus"
        length="41943040"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6574-en-de-Why_are_computers_so_and_what_can_we_do_about_it_opus.opus?1420159580</guid>
      <dc:identifier>ad722522-5817-4317-8f3d-bb443b4e6c77</dc:identifier>
      <dc:date>2014-12-30T12:45:00+01:00</dc:date>
      <itunes:author>Peter Sewell</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>Computers have become ubiquitous and essential, but they remain massively error-prone and insecure - as if we were back in the early days of the industrial revolution, with steam engines exploding left, right, and centre.  Why is this, and can we do better?  Is it science, engineering, craft, or bodgery?

I&#39;ll talk about attempts to mix better engineering methods from a cocktail of empiricism and logic, with examples from network protocols, programming languages, and (especially) the concurrency behaviour of programming languages and multiprocessors (from the ARMs in your phone to x86 and IBM Power servers), together with dealings with architects and language standards groups.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6574.html
</itunes:summary>
      <itunes:duration>00:59:05</itunes:duration>
    </item>
    <item>
      <title>State of the Onion (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6251_-_en_-_saal_1_-_201412301400_-_state_of_the_onion_-_jacob_-_arma</link>
      <description>The current state of the Tor network and community, covering important updates, discussions of the ecosystem of software, and include a longer Q&amp;A than previous CCC talks!
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6251.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6251-en-de-State_of_the_Onion_opus.opus"
        length="52428800"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6251-en-de-State_of_the_Onion_opus.opus?1420157607</guid>
      <dc:identifier>XGhOde-ujLyDS1gsvpebMg</dc:identifier>
      <dc:date>2014-12-30T14:00:00+01:00</dc:date>
      <itunes:author>Jacob, arma</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Neuland</itunes:subtitle>
      <itunes:summary>The current state of the Tor network and community, covering important updates, discussions of the ecosystem of software, and include a longer Q&amp;A than previous CCC talks!
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6251.html
</itunes:summary>
      <itunes:duration>01:12:29</itunes:duration>
    </item>
    <item>
      <title>Paypals War on Terror (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6377_-_en_-_saal_1_-_201412301600_-_paypals_war_on_terror_-_the_no_-_absolem</link>
      <description>We are the PayPal 14. For the last several years we&#39;ve been restricted in what we could or couldn&#39;t say about our court case. Our sentencing is on December 4th, ending the legal restrictions on what we can share about our story.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6377.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6377-en-de-Paypals_War_on_Terror_opus.opus"
        length="41943040"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6377-en-de-Paypals_War_on_Terror_opus.opus?1420155017</guid>
      <dc:identifier>TvC3Zh1wVU8NotOjslV57Q</dc:identifier>
      <dc:date>2014-12-30T16:00:00+01:00</dc:date>
      <itunes:author>the_no, absolem</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>A Historical Re-Enactment of the PayPal14</itunes:subtitle>
      <itunes:summary>We are the PayPal 14. For the last several years we&#39;ve been restricted in what we could or couldn&#39;t say about our court case. Our sentencing is on December 4th, ending the legal restrictions on what we can share about our story.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6377.html
</itunes:summary>
      <itunes:duration>00:58:41</itunes:duration>
    </item>
    <item>
      <title>31C3 Closing Event (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6562_-_en_-_saal_1_-_201412301830_-_31c3_closing_event_-_tomate_-_dodger</link>
      <description>
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6562.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6562-de-en-31C3_Closing_Event_opus.opus"
        length="12582912"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6562-de-en-31C3_Closing_Event_opus.opus?1420155110</guid>
      <dc:identifier>eddb2328-37c3-4e86-86cc-c8541d14b4d7</dc:identifier>
      <dc:date>2014-12-30T18:30:00+01:00</dc:date>
      <itunes:author>tomate, dodger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6562.html
</itunes:summary>
      <itunes:duration>00:18:08</itunes:duration>
    </item>
    <item>
      <title>Security Nightmares (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6572_-_de_-_saal_1_-_201412301715_-_security_nightmares_-_frank_-_ron</link>
      <description>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6572.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6572-de-en-Security_Nightmares_opus.opus"
        length="73400320"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6572-de-en-Security_Nightmares_opus.opus?1420155233</guid>
      <dc:identifier>38ea922b-5b2d-4290-8c79-da0c891edd7a</dc:identifier>
      <dc:date>2014-12-30T17:15:00+01:00</dc:date>
      <itunes:author>frank, Ron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:subtitle>Damit Sie auch morgen schlecht von Ihrem Computer träumen.</itunes:subtitle>
      <itunes:summary>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6572.html
</itunes:summary>
      <itunes:duration>01:41:37</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 4 (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6580_-_en_-_saal_g_-_201412301245_-_lightning_talks_day_4_-_breakthesystem</link>
      <description>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6580.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6580-en-de-Lightning_Talks_Day_4_opus.opus"
        length="89128960"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6580-en-de-Lightning_Talks_Day_4_opus.opus?1420127240</guid>
      <dc:identifier>f69efb76-d030-4371-83e1-d7b2b8d408b9</dc:identifier>
      <dc:date>2014-12-30T12:45:00+01:00</dc:date>
      <itunes:author>breakthesystem</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Other</itunes:keywords>
      <itunes:summary>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6580.html
</itunes:summary>
      <itunes:duration>02:03:42</itunes:duration>
    </item>
    <item>
      <title>Telescope Making (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_5931_-_en_-_saal_g_-_201412301715_-_telescope_making_-_madonius</link>
      <description>In this talk an introduction to amateur telescope making (ATM) will be provided. Starting from grinding the mirror, testing it and building the telescope around it.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5931.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-5931-en-de-Telescope_Making_opus.opus"
        length="49283072"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-5931-en-de-Telescope_Making_opus.opus?1420126800</guid>
      <dc:identifier>hYXcWw5YzxirnRJZDuYiSQ</dc:identifier>
      <dc:date>2014-12-30T17:15:00+01:00</dc:date>
      <itunes:author>Madonius</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>How to make your own telescope</itunes:subtitle>
      <itunes:summary>In this talk an introduction to amateur telescope making (ATM) will be provided. Starting from grinding the mirror, testing it and building the telescope around it.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5931.html
</itunes:summary>
      <itunes:duration>01:09:11</itunes:duration>
    </item>
    <item>
      <title>Tor: Hidden Services and Deanonymisation (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6112_-_en_-_saal_2_-_201412301715_-_tor_hidden_services_and_deanonymisation_-_dr_gareth_owen</link>
      <description>This talk presents the results from what we believe to be one of the largest studies into Tor Hidden Services (The Darknet) to date. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6112.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6112-en-de-Tor_Hidden_Services_and_Deanonymisation_opus.opus"
        length="46137344"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6112-en-de-Tor_Hidden_Services_and_Deanonymisation_opus.opus?1420124628</guid>
      <dc:identifier>C4w30id6HpMnzKM2xcrT4g</dc:identifier>
      <dc:date>2014-12-30T17:15:00+01:00</dc:date>
      <itunes:author>Dr Gareth Owen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>This talk presents the results from what we believe to be one of the largest studies into Tor Hidden Services (The Darknet) to date. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6112.html
</itunes:summary>
      <itunes:duration>01:03:17</itunes:duration>
    </item>
    <item>
      <title>Now I sprinkle thee with crypto dust (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6597_-_en_-_saal_2_-_201412301600_-_now_i_sprinkle_thee_with_crypto_dust_-_ryan_lackey_-_andres_erbsen_-_jurre_van_bergen_-_ladar_levison_-_equinox</link>
      <description>When the Internet was designed, it was thought to be meadows full of daisies. As we now know, it&#39;s a dark place, where communication is monitored and subverted. This session presents both developments in known solutions, as well as novel suggestions, to liberally apply crypto to improve the foundations of Internet communications.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6597.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6597-en-de-Now_I_sprinkle_thee_with_crypto_dust_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6597-en-de-Now_I_sprinkle_thee_with_crypto_dust_opus.opus?1420126863</guid>
      <dc:identifier>87b8f1ba-1f05-46c2-93ac-b575bbc9fb4f</dc:identifier>
      <dc:date>2014-12-30T16:00:00+01:00</dc:date>
      <itunes:author>Ryan Lackey, Andres Erbsen, Jurre van Bergen, Ladar Levison, equinox</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Internet reengineering session</itunes:subtitle>
      <itunes:summary>When the Internet was designed, it was thought to be meadows full of daisies. As we now know, it&#39;s a dark place, where communication is monitored and subverted. This session presents both developments in known solutions, as well as novel suggestions, to liberally apply crypto to improve the foundations of Internet communications.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6597.html
</itunes:summary>
      <itunes:duration>01:01:19</itunes:duration>
    </item>
    <item>
      <title>Virtual Machine Introspection (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6297_-_en_-_saal_6_-_201412301600_-_virtual_machine_introspection_-_tamas_k_lengyel_-_thomas_kittel</link>
      <description>New methods and approaches for securing cloud environments are becoming increasingly more critical as traditional host security strategies are not well integrated into virtual environments. For example, antivirus scans are a critical component of layered defense-in-depth, but in the cloud they rapidly exhaust available CPU and memory. The cloud environment nevertheless offers a unique opportunity: the ability to peer into a running operating system from an outside perspective, known as virtual machine introspection (VMI). More interestingly, it is also possible to alter the behavior of the virtualized components to help protect virtual systems in real-time. In this talk we will explore the open-source LibVMI library which over the last year, as part of the DARPA Cyber Fast Track program, has been significantly extended to ease the process of developing cloud security solutions.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6297.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6297-en-de-Virtual_Machine_Introspection_opus.opus"
        length="40894464"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6297-en-de-Virtual_Machine_Introspection_opus.opus?1420127145</guid>
      <dc:identifier>9RncwfCW37x4dhs15BQqBQ</dc:identifier>
      <dc:date>2014-12-30T16:00:00+01:00</dc:date>
      <itunes:author>Tamas K Lengyel, Thomas Kittel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>From the Outside Looking In</itunes:subtitle>
      <itunes:summary>New methods and approaches for securing cloud environments are becoming increasingly more critical as traditional host security strategies are not well integrated into virtual environments. For example, antivirus scans are a critical component of layered defense-in-depth, but in the cloud they rapidly exhaust available CPU and memory. The cloud environment nevertheless offers a unique opportunity: the ability to peer into a running operating system from an outside perspective, known as virtual machine introspection (VMI). More interestingly, it is also possible to alter the behavior of the virtualized components to help protect virtual systems in real-time. In this talk we will explore the open-source LibVMI library which over the last year, as part of the DARPA Cyber Fast Track program, has been significantly extended to ease the process of developing cloud security solutions.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6297.html
</itunes:summary>
      <itunes:duration>00:58:33</itunes:duration>
    </item>
    <item>
      <title>Let&#39;s Encrypt (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6397_-_en_-_saal_6_-_201412301400_-_let_s_encrypt_-_seth_schoen</link>
      <description>As we&#39;ve called for widespread use of HTTPS, the cost and complexity of the certificate system has been an obstacle.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6397.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6397-en-de-Lets_Encrypt_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6397-en-de-Lets_Encrypt_opus.opus?1420126661</guid>
      <dc:identifier>4_Q4s48yg8FV08kvf9lbpQ</dc:identifier>
      <dc:date>2014-12-30T14:00:00+01:00</dc:date>
      <itunes:author>Seth Schoen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle> A Free Robotic Certificate Authority</itunes:subtitle>
      <itunes:summary>As we&#39;ve called for widespread use of HTTPS, the cost and complexity of the certificate system has been an obstacle.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6397.html
</itunes:summary>
      <itunes:duration>01:02:14</itunes:duration>
    </item>
    <item>
      <title>Diamonds are a quantum computer’s best friend (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6157_-_en_-_saal_6_-_201412301245_-_diamonds_are_a_quantum_computer_s_best_friend_-_nicolas_wohrl</link>
      <description>The next revolution in data processing is Quantum computing.
This talk is an entertaining “tour de force” starting with a brief introduction to the fascinating yet strange theories of quantum physics, the concepts of using these in quantum computing and the latest results on qubits in devices made out of real diamonds.
If you want to learn about the machines that decrypt your passwords in the coming years and how you can actually grow diamonds in your microwave oven (and who wouldn’t?) this talk is for you!

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6157.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6157-en-de-Diamonds_are_a_quantum_computers_best_friend_opus.opus"
        length="48234496"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6157-en-de-Diamonds_are_a_quantum_computers_best_friend_opus.opus?1420124944</guid>
      <dc:identifier>yN_BHtGEljjFHh2dl-Irug</dc:identifier>
      <dc:date>2014-12-30T12:45:00+01:00</dc:date>
      <itunes:author>Nicolas Wöhrl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>The next revolution in data processing is Quantum computing.
This talk is an entertaining “tour de force” starting with a brief introduction to the fascinating yet strange theories of quantum physics, the concepts of using these in quantum computing and the latest results on qubits in devices made out of real diamonds.
If you want to learn about the machines that decrypt your passwords in the coming years and how you can actually grow diamonds in your microwave oven (and who wouldn’t?) this talk is for you!

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6157.html
</itunes:summary>
      <itunes:duration>01:06:28</itunes:duration>
    </item>
    <item>
      <title>Attribution revolution (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6214_-_en_-_saal_2_-_201412301245_-_attribution_revolution_-_jonas_oberg</link>
      <description>Re-using works licensed under Creative Commons seems pretty simple, but it can often be quite time consuming. One image might be okay, but keeping track of the license and attribution of a thousand images in your mashup, or when quoting from massively crowdsourced data sets such as Wikipedia? Whoah! Don’t we have computers to do that for us!? We do –  but there’s no widespread support for including licensing or author information when sharing or reusing digital works. This session will discuss how this should work in the open knowledge environment.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6214.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6214-en-de-Attribution_revolution_opus.opus"
        length="39845888"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6214-en-de-Attribution_revolution_opus.opus?1420126056</guid>
      <dc:identifier>aUcSuwZ2iMoJQMEL40opIw</dc:identifier>
      <dc:date>2014-12-30T12:45:00+01:00</dc:date>
      <itunes:author>Jonas Öberg</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Turning copyright upside-down with metadata</itunes:subtitle>
      <itunes:summary>Re-using works licensed under Creative Commons seems pretty simple, but it can often be quite time consuming. One image might be okay, but keeping track of the license and attribution of a thousand images in your mashup, or when quoting from massively crowdsourced data sets such as Wikipedia? Whoah! Don’t we have computers to do that for us!? We do –  but there’s no widespread support for including licensing or author information when sharing or reusing digital works. This session will discuss how this should work in the open knowledge environment.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6214.html
</itunes:summary>
      <itunes:duration>00:54:57</itunes:duration>
    </item>
    <item>
      <title>The rise and fall of Internet voting in Norway (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6213_-_en_-_saal_6_-_201412301130_-_the_rise_and_fall_of_internet_voting_in_norway_-_tor_e_bjorstad</link>
      <description>In the parliamentary elections of September 2013, more than 250 000 Norwegians in selected municipalities were able to vote from home. They were taking part in a national trial of Internet voting, building on an advanced cryptographic protocol.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6213.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6213-en-de-The_rise_and_fall_of_Internet_voting_in_Norway_opus.opus"
        length="41943040"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6213-en-de-The_rise_and_fall_of_Internet_voting_in_Norway_opus.opus?1420125637</guid>
      <dc:identifier>EN5SvbzMs0D7iCFyfK1Ubw</dc:identifier>
      <dc:date>2014-12-30T11:30:00+01:00</dc:date>
      <itunes:author>Tor E. Bjørstad</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Evaluating a complex cryptographic implementation</itunes:subtitle>
      <itunes:summary>In the parliamentary elections of September 2013, more than 250 000 Norwegians in selected municipalities were able to vote from home. They were taking part in a national trial of Internet voting, building on an advanced cryptographic protocol.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6213.html
</itunes:summary>
      <itunes:duration>01:00:02</itunes:duration>
    </item>
    <item>
      <title>Low Cost High Speed Photography (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_5943_-_en_-_saal_2_-_201412301130_-_low_cost_high_speed_photography_-_polygon</link>
      <description>Capturing the splash of a water balloon, the snap of a mouse trap or the impact of a bullet results in exciting pictures. Best of all, it doesn&#39;t require expensive equipment. This talk covers the theory of high speed photography, the required hardware, microcontroller hacking and setting up an improvised studio in the shower.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5943.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-5943-en-de-Low_Cost_High_Speed_Photography_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Tue, 30 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-5943-en-de-Low_Cost_High_Speed_Photography_opus.opus?1419964439</guid>
      <dc:identifier>uJGVeWdNzwr_8AvAXa2DKA</dc:identifier>
      <dc:date>2014-12-30T11:30:00+01:00</dc:date>
      <itunes:author>polygon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Using microcontrollers to capture the blink of an eye for cheap</itunes:subtitle>
      <itunes:summary>Capturing the splash of a water balloon, the snap of a mouse trap or the impact of a bullet results in exciting pictures. Best of all, it doesn&#39;t require expensive equipment. This talk covers the theory of high speed photography, the required hardware, microcontroller hacking and setting up an improvised studio in the shower.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5943.html
</itunes:summary>
      <itunes:duration>01:00:23</itunes:duration>
    </item>
    <item>
      <title>Higher-Dimensional Geometry and Fractals (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6072_-_en_-_saal_g_-_201412292330_-_higher-dimensional_geometry_and_fractals_-_magnus</link>
      <description>Extending the common 3-space-to-2-space projections to 4D and higher and how certain types of fractals can be presented using these expansions. After that we&#39;ll have a closer look at Fractal Flames as used in Electric Sheep.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6072.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6072-en-de-Higher-Dimensional_Geometry_and_Fractals_opus.opus"
        length="22020096"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6072-en-de-Higher-Dimensional_Geometry_and_Fractals_opus.opus?1419943858</guid>
      <dc:identifier>V_yKfMGBUgnu6g90YF-iBA</dc:identifier>
      <dc:date>2014-12-29T23:30:00+01:00</dc:date>
      <itunes:author>Magnus</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>Extending the common 3-space-to-2-space projections to 4D and higher and how certain types of fractals can be presented using these expansions. After that we&#39;ll have a closer look at Fractal Flames as used in Electric Sheep.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6072.html
</itunes:summary>
      <itunes:duration>00:30:42</itunes:duration>
    </item>
    <item>
      <title>The Time is Right (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6543_-_de_-_saal_6_-_201412292115_-_the_time_is_right_-_c-atre</link>
      <description>Das c-atre collectivdrama präsentiert THE TIME IS RIGHT, ein Science-Fiction-Theaterstück nach einer Idee von yetzt.

„Es geht um das große Ganze! Die Bewahrung von freiem Wissen, freier Kultur – ohne Copyright-Mafiosi, die jeden Pups, der dir entfleucht, lizenzieren wollen!“ (Jo)

Als die Aktivisten Mo und Jo bei einer ihrer geheim-gefährlichen Widerstandsaktionen gegen die drohende Allmacht der Verwertungsgesellschaften von dieser sonderbaren jungen Frau, die wie aus dem Nichts erscheint, überrascht werden, ahnt noch niemand, welche weitreichenden Folgen diese Begegnung im Kampf für die Kunst der Zukunft gehabt haben wird.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6543.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6543-de-en-The_Time_is_Right_opus.opus"
        length="65011712"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6543-de-en-The_Time_is_Right_opus.opus?1419942195</guid>
      <dc:identifier>35vPpFdywfzrf36_zbn6zA</dc:identifier>
      <dc:date>2014-12-29T21:15:00+01:00</dc:date>
      <itunes:author>c-atre</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:subtitle>Ein Science-Fiction-Theaterstück</itunes:subtitle>
      <itunes:summary>Das c-atre collectivdrama präsentiert THE TIME IS RIGHT, ein Science-Fiction-Theaterstück nach einer Idee von yetzt.

„Es geht um das große Ganze! Die Bewahrung von freiem Wissen, freier Kultur – ohne Copyright-Mafiosi, die jeden Pups, der dir entfleucht, lizenzieren wollen!“ (Jo)

Als die Aktivisten Mo und Jo bei einer ihrer geheim-gefährlichen Widerstandsaktionen gegen die drohende Allmacht der Verwertungsgesellschaften von dieser sonderbaren jungen Frau, die wie aus dem Nichts erscheint, überrascht werden, ahnt noch niemand, welche weitreichenden Folgen diese Begegnung im Kampf für die Kunst der Zukunft gehabt haben wird.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6543.html
</itunes:summary>
      <itunes:duration>01:35:47</itunes:duration>
    </item>
    <item>
      <title>The Machine To Be Another (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6385_-_en_-_saal_g_-_201412292245_-_the_machine_to_be_another_-_beanotherlab</link>
      <description>The Machine To Be Another is an open-source interactive system designed to explore the relationship between identity and empathy through interdisciplinary performance-experiments drawing from neuroscience, VR, storytelling and art. Through research collaborations we have been developing applications in contexts of conflict resolution, the arts and healthcare.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6385.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6385-en-de-The_Machine_To_Be_Another_opus.opus"
        length="20971520"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6385-en-de-The_Machine_To_Be_Another_opus.opus?1419951248</guid>
      <dc:identifier>n2e6vsWynbgJeu2GC6FpnA</dc:identifier>
      <dc:date>2014-12-29T22:45:00+01:00</dc:date>
      <itunes:author>BeAnotherLab</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Exploring identity and empathy through neuroscience, embodiment, VR and storytelling</itunes:subtitle>
      <itunes:summary>The Machine To Be Another is an open-source interactive system designed to explore the relationship between identity and empathy through interdisciplinary performance-experiments drawing from neuroscience, VR, storytelling and art. Through research collaborations we have been developing applications in contexts of conflict resolution, the arts and healthcare.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6385.html
</itunes:summary>
      <itunes:duration>00:30:02</itunes:duration>
    </item>
    <item>
      <title>Infocalypse now: P0wning stuff is not enough (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6205_-_en_-_saal_1_-_201412292330_-_infocalypse_now_p0wning_stuff_is_not_enough_-_walter_van_holst</link>
      <description>This speech about how the hacker scene is failing its own ideals and what questions must be addressed to make a real difference.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6205.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6205-en-de-Infocalypse_now_P0wning_stuff_is_not_enough_opus.opus"
        length="20971520"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6205-en-de-Infocalypse_now_P0wning_stuff_is_not_enough_opus.opus?1419944295</guid>
      <dc:identifier>rSiFVNguzdBmx13Lb-gobg</dc:identifier>
      <dc:date>2014-12-29T23:30:00+01:00</dc:date>
      <itunes:author>Walter van Holst</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Several failure modes of the hacker scene</itunes:subtitle>
      <itunes:summary>This speech about how the hacker scene is failing its own ideals and what questions must be addressed to make a real difference.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6205.html
</itunes:summary>
      <itunes:duration>00:29:43</itunes:duration>
    </item>
    <item>
      <title>Snowden Effect vs. Privacy Paradox (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6455_-_de_-_saal_2_-_201412292330_-_snowden_effect_vs_privacy_paradox_-_matthias_herz_-_michael_johann</link>
      <description>&quot;Vertrauen ist gut - Kontrolle ist besser.&quot; Dieses Idiom gilt mehr denn je, sofern man die Aktivitäten von Geheimdiensten bewerten mag. Wie seit einiger Zeit bekannt ist, ist die Mär der massenhaften Überwachung des Einzelnen Realität. Ob und inwieweit dies Auswirkungen auf die Realität des Einzelnen hat, steht im Fokus der vorliegenden Studie.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6455.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6455-de-en-Snowden_Effect_vs_Privacy_Paradox_opus.opus"
        length="24117248"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6455-de-en-Snowden_Effect_vs_Privacy_Paradox_opus.opus?1419944169</guid>
      <dc:identifier>z84bCyzZ-xiYlyM83L5dig</dc:identifier>
      <dc:date>2014-12-29T23:30:00+01:00</dc:date>
      <itunes:author>Matthias Herz, Michael Johann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Einstellungen und Internetnutzungsverhalten im Kontext des NSA-Skandals am Beispiel von Facebook</itunes:subtitle>
      <itunes:summary>&quot;Vertrauen ist gut - Kontrolle ist besser.&quot; Dieses Idiom gilt mehr denn je, sofern man die Aktivitäten von Geheimdiensten bewerten mag. Wie seit einiger Zeit bekannt ist, ist die Mär der massenhaften Überwachung des Einzelnen Realität. Ob und inwieweit dies Auswirkungen auf die Realität des Einzelnen hat, steht im Fokus der vorliegenden Studie.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6455.html
</itunes:summary>
      <itunes:duration>00:34:16</itunes:duration>
    </item>
    <item>
      <title>Eye Wear Computing (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6460_-_en_-_saal_g_-_201412292115_-_eye_wear_computing_-_kai_kunze</link>
      <description>The talk gives an overview about the emerging field of smart glasses and how they can be used to augment our mind (e.g. how to improve our brain with technology). The talk will focus mostly on how to quantify cognitive tasks in real world environments. I also present a first application scenarios on how to use smart eyewear (e.g. google glass or JINS MEME) for short term memory augmentation and cognitive activity recognition.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6460.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6460-en-de-Eye_Wear_Computing_opus.opus"
        length="23068672"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6460-en-de-Eye_Wear_Computing_opus.opus?1419943604</guid>
      <dc:identifier>aowmh_BVhxN_YNmkQomweQ</dc:identifier>
      <dc:date>2014-12-29T21:15:00+01:00</dc:date>
      <itunes:author>Kai Kunze</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Augmenting the Human Mind</itunes:subtitle>
      <itunes:summary>The talk gives an overview about the emerging field of smart glasses and how they can be used to augment our mind (e.g. how to improve our brain with technology). The talk will focus mostly on how to quantify cognitive tasks in real world environments. I also present a first application scenarios on how to use smart eyewear (e.g. google glass or JINS MEME) for short term memory augmentation and cognitive activity recognition.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6460.html
</itunes:summary>
      <itunes:duration>00:32:13</itunes:duration>
    </item>
    <item>
      <title>Die Krise der Bilder ist die Krise der Politik (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6381_-_de_-_saal_6_-_201412291715_-_die_krise_der_bilder_ist_die_krise_der_politik_-_mareike_foecking</link>
      <description>Im Rahmen meiner Forschungsarbeit &quot;Das Bild im digitalen Wandel&quot; beschätige ich mich mit der Veränderung der Bilder im Rahmen der Veränderung der medialen Anwendung und Vermittlung von Bildern.
Darüber würde ich gerne sprechen.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6381.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6381-de-en-Die_Krise_der_Bilder_ist_die_Krise_der_Politik_opus.opus"
        length="41943040"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6381-de-en-Die_Krise_der_Bilder_ist_die_Krise_der_Politik_opus.opus?1419906037</guid>
      <dc:identifier>L9rFWciMu_GVpHLIhPT9Qg</dc:identifier>
      <dc:date>2014-12-29T17:15:00+01:00</dc:date>
      <itunes:author>Mareike Foecking</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Die Krise der Politik ist die Krise der Bilder</itunes:subtitle>
      <itunes:summary>Im Rahmen meiner Forschungsarbeit &quot;Das Bild im digitalen Wandel&quot; beschätige ich mich mit der Veränderung der Bilder im Rahmen der Veränderung der medialen Anwendung und Vermittlung von Bildern.
Darüber würde ich gerne sprechen.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6381.html
</itunes:summary>
      <itunes:duration>00:58:17</itunes:duration>
    </item>
    <item>
      <title>What Ever Happened to Nuclear Weapons? (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6121_-_en_-_saal_2_-_201412291715_-_what_ever_happened_to_nuclear_weapons_-_michael_buker</link>
      <description>An overview of 70 years of nuclear weapons, focusing on some of the underlying physics, the international politics that surround the topic, modern technology for nuclear weapons detection and monitoring, and what everyone can do to help nuclear disarmament.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6121.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6121-en-de-What_Ever_Happened_to_Nuclear_Weapons_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6121-en-de-What_Ever_Happened_to_Nuclear_Weapons_opus.opus?1419899481</guid>
      <dc:identifier>uMGv2XJJqkQodKm0_Mtr_A</dc:identifier>
      <dc:date>2014-12-29T17:15:00+01:00</dc:date>
      <itunes:author>Michael Büker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Politics and Physics of a Problem That&#39;s Not Going Away</itunes:subtitle>
      <itunes:summary>An overview of 70 years of nuclear weapons, focusing on some of the underlying physics, the international politics that surround the topic, modern technology for nuclear weapons detection and monitoring, and what everyone can do to help nuclear disarmament.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6121.html
</itunes:summary>
      <itunes:duration>01:01:13</itunes:duration>
    </item>
    <item>
      <title>IFG – Mit freundlichen Grüßen (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6366_-_de_-_saal_1_-_201412292030_-_ifg_mit_freundlichen_grussen_-_stefan_wehrmeyer</link>
      <description>Die interessantesten IFG-Geschichten des Jahres mit Anfragen und Ablehnungen, Klagen und Kampagnen. Außerdem: wie wir mit Hilfe des Journalismus der Informationsfreiheit neuen Antrieb geben werden!
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6366.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6366-de-en-IFG_-_Mit_freundlichen_Gruessen_opus.opus"
        length="24117248"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6366-de-en-IFG_-_Mit_freundlichen_Gruessen_opus.opus?1419899514</guid>
      <dc:identifier>Lt7ABZNFLzAgdiGcpHPHUQ</dc:identifier>
      <dc:date>2014-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Stefan Wehrmeyer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Neue Energie für die Informationsfreiheit</itunes:subtitle>
      <itunes:summary>Die interessantesten IFG-Geschichten des Jahres mit Anfragen und Ablehnungen, Klagen und Kampagnen. Außerdem: wie wir mit Hilfe des Journalismus der Informationsfreiheit neuen Antrieb geben werden!
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6366.html
</itunes:summary>
      <itunes:duration>00:33:24</itunes:duration>
    </item>
    <item>
      <title>MegaCode to facility gates (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6462_-_en_-_saal_2_-_201412292245_-_megacode_to_facility_gates_-_kevin_redon</link>
      <description>How do garage gate remotes work?
It turns out the ones from MegaCode simply send a individual fixed code.
And with little efforts if was possibly to clone them, send arbitrary codes, and record them all.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6462.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6462-en-de-MegaCode_to_facility_gates_opus.opus"
        length="19922944"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6462-en-de-MegaCode_to_facility_gates_opus.opus?1419898004</guid>
      <dc:identifier>ejFaY7sUr4WTs1tajM9JOQ</dc:identifier>
      <dc:date>2014-12-29T22:45:00+01:00</dc:date>
      <itunes:author>Kévin Redon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>How do garage gate remotes work?
It turns out the ones from MegaCode simply send a individual fixed code.
And with little efforts if was possibly to clone them, send arbitrary codes, and record them all.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6462.html
</itunes:summary>
      <itunes:duration>00:28:05</itunes:duration>
    </item>
    <item>
      <title>UNHash - Methods for better password cracking (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_5966_-_en_-_saal_1_-_201412292245_-_unhash_-_methods_for_better_password_cracking_-_tonimir_kisasondi</link>
      <description>This talk will show a new method for password cracking called UNHash. UNHash as a tool uses rulefiles that are something in between of a DSL (Domain specific language) and a python script to describe the password cracking process. This talk will show how to mix web service abuse, knowledge of human nature and data mining to enable far better attacks against passwords. We will be focusing on a few features: cracking default passwords on network systems with minimal effort, testing for embedded backdoors and offline attacks by data mining and modeling about 33 million user account to gain insight in how users choose their passwords and how can we use that knowledge to speed up password cracking for 20% more gain for non pseudorandom passwords.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5966.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-5966-en-de-UNHash_-_Methods_for_better_password_cracking_opus.opus"
        length="23068672"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-5966-en-de-UNHash_-_Methods_for_better_password_cracking_opus.opus?1419899550</guid>
      <dc:identifier>Q41efHdmmnBkM5G8p6Wf_w</dc:identifier>
      <dc:date>2014-12-29T22:45:00+01:00</dc:date>
      <itunes:author>Tonimir Kisasondi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>This talk will show a new method for password cracking called UNHash. UNHash as a tool uses rulefiles that are something in between of a DSL (Domain specific language) and a python script to describe the password cracking process. This talk will show how to mix web service abuse, knowledge of human nature and data mining to enable far better attacks against passwords. We will be focusing on a few features: cracking default passwords on network systems with minimal effort, testing for embedded backdoors and offline attacks by data mining and modeling about 33 million user account to gain insight in how users choose their passwords and how can we use that knowledge to speed up password cracking for 20% more gain for non pseudorandom passwords.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5966.html
</itunes:summary>
      <itunes:duration>00:32:22</itunes:duration>
    </item>
    <item>
      <title>Automatically Subtitling the C3 (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6554_-_en_-_saal_g_-_201412292200_-_automatically_subtitling_the_c3_-_timobaumann_-_arne_kohn</link>
      <description>Transcribing a talk comes relatively easy to fast typists, whereas turning a transcript into time-aligned subtitles for a video requires a much larger human effort. In contrast, speech recognition performance (especially for open-source-based solutions), is still poor on open-domain topics, but speech technology is able to align a given text to the corresponding speech with high accuracy. Let&#39;s join forces to generate superior subtitling with little effort, and to improve future open-source-based speech recognizers, at the same time!

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6554.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6554-en-de-Automatically_Subtitling_the_C3_opus.opus"
        length="22020096"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6554-en-de-Automatically_Subtitling_the_C3_opus.opus?1419897972</guid>
      <dc:identifier>7dt2PzyGxZI8i0QQysCZ6Q</dc:identifier>
      <dc:date>2014-12-29T22:00:00+01:00</dc:date>
      <itunes:author>timobaumann, Arne Köhn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>How speech processing helps the CCC subtitle project, and vice-versa.</itunes:subtitle>
      <itunes:summary>Transcribing a talk comes relatively easy to fast typists, whereas turning a transcript into time-aligned subtitles for a video requires a much larger human effort. In contrast, speech recognition performance (especially for open-source-based solutions), is still poor on open-domain topics, but speech technology is able to align a given text to the corresponding speech with high accuracy. Let&#39;s join forces to generate superior subtitling with little effort, and to improve future open-source-based speech recognizers, at the same time!

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6554.html
</itunes:summary>
      <itunes:duration>00:30:46</itunes:duration>
    </item>
    <item>
      <title>Trackography (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6299_-_en_-_saal_2_-_201412292200_-_trackography_-_maria_xynou_-_claudio_vecna</link>
      <description>Have you ever wondered who is watching while you are reading your favourite media online?

Whether we are reading the Guardian, the New York Times, the Hindu or any other news website, third party trackers are collecting data about our online behaviour. 

This lecture will present Tactical Tech&#39;s new project, Trackography, which shows that we are all part of a global tracking business. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6299.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6299-en-de-Trackography_opus.opus"
        length="23068672"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6299-en-de-Trackography_opus.opus?1419897939</guid>
      <dc:identifier>SNW-UDgMBlqvbRHVTwhxpg</dc:identifier>
      <dc:date>2014-12-29T22:00:00+01:00</dc:date>
      <itunes:author>Maria Xynou, Claudio ࿓ vecna</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>You never read alone</itunes:subtitle>
      <itunes:summary>Have you ever wondered who is watching while you are reading your favourite media online?

Whether we are reading the Guardian, the New York Times, the Hindu or any other news website, third party trackers are collecting data about our online behaviour. 

This lecture will present Tactical Tech&#39;s new project, Trackography, which shows that we are all part of a global tracking business. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6299.html
</itunes:summary>
      <itunes:duration>00:31:47</itunes:duration>
    </item>
    <item>
      <title>Computer Science in the DPRK (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6253_-_en_-_saal_2_-_201412292115_-_computer_science_in_the_dprk_-_will_scott</link>
      <description>This talk will reflect on teaching Computer Science in Pyongyang over the last two years, and look at how technology has been integrated into civilian life in the DPRK. Remaining an extremely isolated country, many people would be surprised to hear that cellphones have become commonplace within the capitol, let alone that the country invests in custom hardware and software. I&#39;ll talk through the current state of desktop and mobile technology in pyongyang, and what&#39;s changing.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6253.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6253-en-de-Computer_Science_in_the_DPRK_opus.opus"
        length="24117248"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6253-en-de-Computer_Science_in_the_DPRK_opus.opus?1419897875</guid>
      <dc:identifier>iU5CnqxotZz_KK2P-uVMsQ</dc:identifier>
      <dc:date>2014-12-29T21:15:00+01:00</dc:date>
      <itunes:author>Will Scott</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>A view into technology on the other side of the world</itunes:subtitle>
      <itunes:summary>This talk will reflect on teaching Computer Science in Pyongyang over the last two years, and look at how technology has been integrated into civilian life in the DPRK. Remaining an extremely isolated country, many people would be surprised to hear that cellphones have become commonplace within the capitol, let alone that the country invests in custom hardware and software. I&#39;ll talk through the current state of desktop and mobile technology in pyongyang, and what&#39;s changing.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6253.html
</itunes:summary>
      <itunes:duration>00:33:20</itunes:duration>
    </item>
    <item>
      <title>The Perl Jam: Exploiting a 20 Year-old Vulnerability (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6243_-_en_-_saal_1_-_201412292200_-_the_perl_jam_exploiting_a_20_year-old_vulnerability_-_netanel_rubin</link>
      <description>tl;dr EXPLOIT ALL THE PERL.
We chained several of Perl’s ridiculous syntax quirks in order to create a surprisingly powerful attack, bringing down some of the most popular Perl-based projects in the world to their knees. Brace yourselves, RCE exploits are coming.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6243.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6243-en-de-The_Perl_Jam_Exploiting_a_20_Year-old_Vulnerability_opus.opus"
        length="19922944"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6243-en-de-The_Perl_Jam_Exploiting_a_20_Year-old_Vulnerability_opus.opus?1419897907</guid>
      <dc:identifier>5hkhmuwi5J8ZHMfd5k7veg</dc:identifier>
      <dc:date>2014-12-29T22:00:00+01:00</dc:date>
      <itunes:author>Netanel Rubin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>tl;dr EXPLOIT ALL THE PERL.
We chained several of Perl’s ridiculous syntax quirks in order to create a surprisingly powerful attack, bringing down some of the most popular Perl-based projects in the world to their knees. Brace yourselves, RCE exploits are coming.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6243.html
</itunes:summary>
      <itunes:duration>00:28:51</itunes:duration>
    </item>
    <item>
      <title>Axoloti (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6402_-_en_-_saal_g_-_201412292030_-_axoloti_-_johannes_taelman</link>
      <description>Axoloti is an integrated platform for digital audio: its graphical editor is an easy-to-use toolbox for creating sound synthesis or processing algorithms. The audio processing runs on a microcontroller board, and runs standalone after editing. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6402.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6402-en-de-Axoloti_opus.opus"
        length="20971520"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6402-en-de-Axoloti_opus.opus?1419895906</guid>
      <dc:identifier>wyL8OVhv0Y6VczeYR3K_jQ</dc:identifier>
      <dc:date>2014-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Johannes Taelman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>DIY audio signal processing</itunes:subtitle>
      <itunes:summary>Axoloti is an integrated platform for digital audio: its graphical editor is an easy-to-use toolbox for creating sound synthesis or processing algorithms. The audio processing runs on a microcontroller board, and runs standalone after editing. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6402.html
</itunes:summary>
      <itunes:duration>00:29:41</itunes:duration>
    </item>
    <item>
      <title>The Magical Secrecy Tour (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6596_-_en_-_saal_1_-_201412292115_-_the_magical_secrecy_tour_-_leslie_dunton-downer</link>
      <description>June 5, 2014 marked one year since leaks by NSA whistleblower Edward Snowden began to be introduced to a worldwide public. On this date, transmediale teamed up with N.K. Projekt and Leslie Dunton-Downer, 2014 fellow at The American Academy in Berlin, for the Magical Secrecy Tour, a bus journey exploring Berlin as the global capital of informed response to mass surveillance. This inside look at the project features first-ever screening of footage shot by filmmaker Simon Klose (TPB AFK) for his documentary about the tour.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6596.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6596-en-de-The_Magical_Secrecy_Tour_opus.opus"
        length="20971520"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6596-en-de-The_Magical_Secrecy_Tour_opus.opus?1419896006</guid>
      <dc:identifier>a7cde3ca-46a8-4f0b-be61-f60e77f3418e</dc:identifier>
      <dc:date>2014-12-29T21:15:00+01:00</dc:date>
      <itunes:author>Leslie Dunton-Downer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>A Bus Trip into the Surveillance Culture of Berlin One Year After Snowden</itunes:subtitle>
      <itunes:summary>June 5, 2014 marked one year since leaks by NSA whistleblower Edward Snowden began to be introduced to a worldwide public. On this date, transmediale teamed up with N.K. Projekt and Leslie Dunton-Downer, 2014 fellow at The American Academy in Berlin, for the Magical Secrecy Tour, a bus journey exploring Berlin as the global capital of informed response to mass surveillance. This inside look at the project features first-ever screening of footage shot by filmmaker Simon Klose (TPB AFK) for his documentary about the tour.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6596.html
</itunes:summary>
      <itunes:duration>00:30:23</itunes:duration>
    </item>
    <item>
      <title>Agri-tech and the Arts: From Barns to D-Space (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6135_-_en_-_saal_6_-_201412292030_-_agri-tech_and_the_arts_from_barns_to_d-space_-_richard_marggraf_turley</link>
      <description>What do the arts and literature have to contribute to urgent debates about the technization of food production? What can a play from 1605 tell us about fairer distribution of natural resources today? Equally, how might a cyber thriller from 2011 help us debate contentious issues such as gene-based technologies and utopian visions of knowledge-led society? This talk considers agri-tech and food security across a wide sweep of social and political terrain, from the Arab Spring to the European horsemeat scandal, from Shakespeare to Daniel Suarez. It argues that the arts and sciences need to cooperate to deepen understanding about, and define actions on, the big challenges facing a needy world. Finally, it suggests ways in which the arts and technology can assist us in arriving at a model of society in which resources are distributed not only more efficiently, but also more equitably.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6135.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6135-en-de-Agri-tech_and_the_Arts_From_Barns_to_D-Space_opus.opus"
        length="19922944"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6135-en-de-Agri-tech_and_the_Arts_From_Barns_to_D-Space_opus.opus?1419895971</guid>
      <dc:identifier>lE9xGxC7-9DQGljZOWg_Sw</dc:identifier>
      <dc:date>2014-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Richard Marggraf Turley</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>What do the arts and literature have to contribute to urgent debates about the technization of food production? What can a play from 1605 tell us about fairer distribution of natural resources today? Equally, how might a cyber thriller from 2011 help us debate contentious issues such as gene-based technologies and utopian visions of knowledge-led society? This talk considers agri-tech and food security across a wide sweep of social and political terrain, from the Arab Spring to the European horsemeat scandal, from Shakespeare to Daniel Suarez. It argues that the arts and sciences need to cooperate to deepen understanding about, and define actions on, the big challenges facing a needy world. Finally, it suggests ways in which the arts and technology can assist us in arriving at a model of society in which resources are distributed not only more efficiently, but also more equitably.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6135.html
</itunes:summary>
      <itunes:duration>00:29:14</itunes:duration>
    </item>
    <item>
      <title>The Maker movement meets patent law (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6043_-_en_-_saal_2_-_201412291830_-_the_maker_movement_meets_patent_law_-_natalia_lukaszewicz</link>
      <description>The Maker movement and patent law are like two planets moving on the orbit of innovations. Occasionally, they collide … because the Maker planet moves too fast.
But, back on the Earth. Encounters with patent law can be of many reasons, e.g. filing a patent application or being blocked in making by a patent (or much worse, being accused of a patent infringement). The latter motivated the question of the permissible uses of patented inventions. The talk explains which activities on patents are lawful and keep Makers safe in their making.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6043.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6043-en-de-The_Maker_movement_meets_patent_law_opus.opus"
        length="48234496"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6043-en-de-The_Maker_movement_meets_patent_law_opus.opus?1419895809</guid>
      <dc:identifier>p6g2YacbVEfuPkJ01kvHAw</dc:identifier>
      <dc:date>2014-12-29T18:30:00+01:00</dc:date>
      <itunes:author>Natalia Lukaszewicz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>How many windows are open in the patent fortress</itunes:subtitle>
      <itunes:summary>The Maker movement and patent law are like two planets moving on the orbit of innovations. Occasionally, they collide … because the Maker planet moves too fast.
But, back on the Earth. Encounters with patent law can be of many reasons, e.g. filing a patent application or being blocked in making by a patent (or much worse, being accused of a patent infringement). The latter motivated the question of the permissible uses of patented inventions. The talk explains which activities on patents are lawful and keep Makers safe in their making.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6043.html
</itunes:summary>
      <itunes:duration>01:07:02</itunes:duration>
    </item>
    <item>
      <title>Living Drones (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6275_-_en_-_saal_2_-_201412292030_-_living_drones_-_anja_drephal</link>
      <description>During World War I, homing pigeons were used to carry messages and take photographs over enemy territory. Today, experiments are being conducted to remote-control insects for similar purposes.
This talk intends to give an overview of 100 years of living drones, speculate on future developments in the field, and question the ethical implications of the practice.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6275.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6275-en-de-Living_Drones_opus.opus"
        length="22020096"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6275-en-de-Living_Drones_opus.opus?1419895938</guid>
      <dc:identifier>4f9TGtkPJafH9LU7RqsZnw</dc:identifier>
      <dc:date>2014-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Anja Drephal</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>From war pigeons in 1914 to cyborg moths in 2014</itunes:subtitle>
      <itunes:summary>During World War I, homing pigeons were used to carry messages and take photographs over enemy territory. Today, experiments are being conducted to remote-control insects for similar purposes.
This talk intends to give an overview of 100 years of living drones, speculate on future developments in the field, and question the ethical implications of the practice.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6275.html
</itunes:summary>
      <itunes:duration>00:30:55</itunes:duration>
    </item>
    <item>
      <title>Freedom in your computer and in the net (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6123_-_en_-_saal_1_-_201412291130_-_freedom_in_your_computer_and_in_the_net_-_richard_stallman</link>
      <description>For freedom in your own computer, the software must be free.
For freedom on the internet, we must organize against
surveillance, censorship, SaaSS and the war against sharing.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6123.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6123-en-de-Freedom_in_your_computer_and_in_the_net_opus.opus"
        length="45088768"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6123-en-de-Freedom_in_your_computer_and_in_the_net_opus.opus?1419893211</guid>
      <dc:identifier>iWU6RrYVPk7Q-fLuBE-LoQ</dc:identifier>
      <dc:date>2014-12-29T11:30:00+01:00</dc:date>
      <itunes:author>Richard Stallman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>For freedom in your own computer, the software must be free.
For freedom on the internet, we must organize against
surveillance, censorship, SaaSS and the war against sharing.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6123.html
</itunes:summary>
      <itunes:duration>01:02:07</itunes:duration>
    </item>
    <item>
      <title>ES GIBT VIEL ZU TUN - HAU&#39;N WIR AB. (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6124_-_de_-_saal_6_-_201412291830_-_es_gibt_viel_zu_tun_-_hau_n_wir_ab_-_robert_verch_-_eva_olivin</link>
      <description>Eine Mietwohnung ist seit circa 20 Jahren verlassen, ihr Bewohner nicht auffindbar. Unveränderte Möblierung, Ausstattung und persönliche Hinterlassenschaften sind jedoch noch vorhanden und unberührt.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6124.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6124-de-en-ES_GIBT_VIEL_ZU_TUN_-_HAUN_WIR_AB_opus.opus"
        length="45088768"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6124-de-en-ES_GIBT_VIEL_ZU_TUN_-_HAUN_WIR_AB_opus.opus?1419895841</guid>
      <dc:identifier>-fw4u4HgOtFUvdKnF7Xrbw</dc:identifier>
      <dc:date>2014-12-29T18:30:00+01:00</dc:date>
      <itunes:author>Robert Verch, Eva Olivin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>[Die Untersuchung]</itunes:subtitle>
      <itunes:summary>Eine Mietwohnung ist seit circa 20 Jahren verlassen, ihr Bewohner nicht auffindbar. Unveränderte Möblierung, Ausstattung und persönliche Hinterlassenschaften sind jedoch noch vorhanden und unberührt.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6124.html
</itunes:summary>
      <itunes:duration>01:04:17</itunes:duration>
    </item>
    <item>
      <title>&quot;Exploit&quot; in theater (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6547_-_en_-_saal_g_-_201412291830_-_exploit_in_theater_-_cyphunk_nathan_fain</link>
      <description>3 theater projects that illustrate the false &quot;California Ideology&quot; and ask us to look at our slip into neoliberalism through the backdoor of technology and to consider the ethics in the protocol. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6547.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6547-en-de-Exploit_in_theater_opus.opus"
        length="46137344"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6547-en-de-Exploit_in_theater_opus.opus?1419895873</guid>
      <dc:identifier>0hwHwiTLCTkE94bpOBOcVg</dc:identifier>
      <dc:date>2014-12-29T18:30:00+01:00</dc:date>
      <itunes:author>cyphunk / nathan fain</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>post-existentialism is the question, not post-privacy</itunes:subtitle>
      <itunes:summary>3 theater projects that illustrate the false &quot;California Ideology&quot; and ask us to look at our slip into neoliberalism through the backdoor of technology and to consider the ethics in the protocol. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6547.html
</itunes:summary>
      <itunes:duration>01:04:26</itunes:duration>
    </item>
    <item>
      <title>Thunderstrike: EFI bootkits for Apple MacBooks (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6128_-_en_-_saal_1_-_201412291830_-_thunderstrike_efi_bootkits_for_apple_macbooks_-_trammell_hudson</link>
      <description>In this presentation we demonstrate Thunderstrike, a vulnerability that allows the installation of persistent firmware modifications into the EFI boot ROM of Apple&#39;s popular MacBooks.  The bootkit can be easily installed by an evil-maid via the externally accessible Thunderbolt ports and can survive reinstallation of OSX as well as hard drive replacements.  Once installed, it can prevent software attempts to remove it and could spread virally across air-gaps by infecting additional Thunderbolt devices.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6128.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6128-en-de-Thunderstrike_EFI_bootkits_for_Apple_MacBooks_opus.opus"
        length="40894464"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6128-en-de-Thunderstrike_EFI_bootkits_for_Apple_MacBooks_opus.opus?1419895777</guid>
      <dc:identifier>k78-hNDINhkZS3TvxuLSrQ</dc:identifier>
      <dc:date>2014-12-29T18:30:00+01:00</dc:date>
      <itunes:author>Trammell Hudson</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>In this presentation we demonstrate Thunderstrike, a vulnerability that allows the installation of persistent firmware modifications into the EFI boot ROM of Apple&#39;s popular MacBooks.  The bootkit can be easily installed by an evil-maid via the externally accessible Thunderbolt ports and can survive reinstallation of OSX as well as hard drive replacements.  Once installed, it can prevent software attempts to remove it and could spread virally across air-gaps by infecting additional Thunderbolt devices.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6128.html
</itunes:summary>
      <itunes:duration>00:57:45</itunes:duration>
    </item>
    <item>
      <title>Source Code and Cross-Domain Authorship Attribution (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6173_-_en_-_saal_g_-_201412291715_-_source_code_and_cross-domain_authorship_attribution_-_aylin_-_greenie_-_rebekah_overdorf</link>
      <description>Stylometry is the study of linguistic style found in text. Stylometry existed long before computers but now the field is dominated by artificial intelligence techniques.

Writing style is a marker of identity that can be found in a document through linguistic information to perform authorship recognition. Authorship recognition is a threat to anonymity but knowing ways to identify authors provides methods for anonymizing authors as well. Even basic stylometry systems reach high accuracy in classifying authors correctly.  Stylometry can also be used in source code to identify the author of a program. In this talk, we investigate methods to de-anonymize source code authors of C++ and authors across different domains. Source code authorship attribution could provide proof of authorship in court, automate the process of finding a cyber criminal from the source code left in an infected system, or aid in resolving copyright, copyleft and plagiarism issues in the programming fields. Programmers can obfuscate their variable or function names, but not the structures they subconsciously prefer to use or their favorite increment operators. Following this intuition, we create a new feature set that reflects coding style from properties derived from abstract syntax trees. We reach 99% accuracy in attributing 36 authors each with ten files. We experiment with many different sized datasets leading to high true positive rates.  Such a unique representation of coding style has not been used as a machine learning feature to attribute authors and therefore this is a valuable contribution to the field. 

We also examine the need for cross-domain stylometry, where the documents of known authorship and the documents in question are written in different contexts. Specifically, we look at blogs, Twitter feeds, and Reddit comments. While traditional methods in stylometry that work well within one domain fail to identify authors across domains, we are able to improve the accuracy of cross-domain stylometry to as high as 80%. Being able to identify authors across domains facilitates linking identities across the Internet making this a key privacy concern; users can take other measures to ensure their anonymity, but due to their unique writing style, they may not be as anonymous as they believe. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6173.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6173-en-de-Source_Code_and_Cross-Domain_Authorship_Attribution_opus.opus"
        length="46137344"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6173-en-de-Source_Code_and_Cross-Domain_Authorship_Attribution_opus.opus?1419895744</guid>
      <dc:identifier>xnYRHWIRybr3subP-h_1Wg</dc:identifier>
      <dc:date>2014-12-29T17:15:00+01:00</dc:date>
      <itunes:author>Aylin, greenie, Rebekah Overdorf</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>The Role of Stylometry in Privacy</itunes:subtitle>
      <itunes:summary>Stylometry is the study of linguistic style found in text. Stylometry existed long before computers but now the field is dominated by artificial intelligence techniques.

Writing style is a marker of identity that can be found in a document through linguistic information to perform authorship recognition. Authorship recognition is a threat to anonymity but knowing ways to identify authors provides methods for anonymizing authors as well. Even basic stylometry systems reach high accuracy in classifying authors correctly.  Stylometry can also be used in source code to identify the author of a program. In this talk, we investigate methods to de-anonymize source code authors of C++ and authors across different domains. Source code authorship attribution could provide proof of authorship in court, automate the process of finding a cyber criminal from the source code left in an infected system, or aid in resolving copyright, copyleft and plagiarism issues in the programming fields. Programmers can obfuscate their variable or function names, but not the structures they subconsciously prefer to use or their favorite increment operators. Following this intuition, we create a new feature set that reflects coding style from properties derived from abstract syntax trees. We reach 99% accuracy in attributing 36 authors each with ten files. We experiment with many different sized datasets leading to high true positive rates.  Such a unique representation of coding style has not been used as a machine learning feature to attribute authors and therefore this is a valuable contribution to the field. 

We also examine the need for cross-domain stylometry, where the documents of known authorship and the documents in question are written in different contexts. Specifically, we look at blogs, Twitter feeds, and Reddit comments. While traditional methods in stylometry that work well within one domain fail to identify authors across domains, we are able to improve the accuracy of cross-domain stylometry to as high as 80%. Being able to identify authors across domains facilitates linking identities across the Internet making this a key privacy concern; users can take other measures to ensure their anonymity, but due to their unique writing style, they may not be as anonymous as they believe. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6173.html
</itunes:summary>
      <itunes:duration>01:03:59</itunes:duration>
    </item>
    <item>
      <title>DP5: PIR for Privacy-preserving Presence (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6140_-_en_-_saal_1_-_201412291715_-_dp5_pir_for_privacy-preserving_presence_-_ian_goldberg_-_george_danezis_-_nikita_borisov</link>
      <description>In the wake of the Snowden revelations and the explicit targetting of address book and buddy list information, social service providers may wish to actively avoid learning which of its users are friends.  In this talk, we will introduce the workings of a surprising technology called private information retrieval, or PIR. Then, we will describe its use in DP5, a new suite of privacy-preserving presence protocols that allow people to determine when their friends are online (and to establish secure communications with them), without a centralized provider ever learning who is friends with whom.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6140.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6140-en-de-DP5_PIR_for_Privacy-preserving_Presence_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6140-en-de-DP5_PIR_for_Privacy-preserving_Presence_opus.opus?1419895712</guid>
      <dc:identifier>dN7QONPJousa5xBD6XQxgg</dc:identifier>
      <dc:date>2014-12-29T17:15:00+01:00</dc:date>
      <itunes:author>Ian Goldberg, George Danezis, Nikita Borisov</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>In the wake of the Snowden revelations and the explicit targetting of address book and buddy list information, social service providers may wish to actively avoid learning which of its users are friends.  In this talk, we will introduce the workings of a surprising technology called private information retrieval, or PIR. Then, we will describe its use in DP5, a new suite of privacy-preserving presence protocols that allow people to determine when their friends are online (and to establish secure communications with them), without a centralized provider ever learning who is friends with whom.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6140.html
</itunes:summary>
      <itunes:duration>00:59:42</itunes:duration>
    </item>
    <item>
      <title>EMET 5.1 - Armor or Curtain? (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6161_-_en_-_saal_2_-_201412291600_-_emet_5_1_-_armor_or_curtain_-_rene_freingruber</link>
      <description>EMET (Enhanced Mitigation Experience Toolkit) is an application which can be used to further harden a Windows system by adding additional security protections to running processes. These protections include several ROP (Return-Oriented-Programming) checks, shellcode detection mechansims, heap-spray mitigations and many more.
The talk covers techniques to bypass EMET 5.1 (the current version) and shows the audience how hard/easy it is for an attacker to accomplish this.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6161.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6161-en-de-EMET_51_-_Armor_or_Curtain_opus.opus"
        length="40894464"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6161-en-de-EMET_51_-_Armor_or_Curtain_opus.opus?1419895615</guid>
      <dc:identifier>_kPJG76FUvxbX7Z6h20Gcw</dc:identifier>
      <dc:date>2014-12-29T16:00:00+01:00</dc:date>
      <itunes:author>René Freingruber</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>EMET (Enhanced Mitigation Experience Toolkit) is an application which can be used to further harden a Windows system by adding additional security protections to running processes. These protections include several ROP (Return-Oriented-Programming) checks, shellcode detection mechansims, heap-spray mitigations and many more.
The talk covers techniques to bypass EMET 5.1 (the current version) and shows the audience how hard/easy it is for an attacker to accomplish this.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6161.html
</itunes:summary>
      <itunes:duration>00:57:23</itunes:duration>
    </item>
    <item>
      <title>Jahresrückblick des CCC (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6583_-_de_-_saal_1_-_201412291245_-_jahresruckblick_des_ccc_-_frank_rieger_-_erdgeist_-_linus_neumann_-_heckpiet_-_constanze_kurz</link>
      <description>Auch das Jahr 2014 geht irgendwann vorbei. Deshalb werfen wir einen Blick zurück auf die für uns besonders relevanten Themen und versuchen abzuschätzen, was im Jahr 2015 auf uns zukommen könnte.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6583.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6583-de-en-Jahresrueckblick_des_CCC_opus.opus"
        length="100663296"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6583-de-en-Jahresrueckblick_des_CCC_opus.opus?1419895453</guid>
      <dc:identifier>7bdbb7a1-63f2-400f-97a1-d7abfc455f73</dc:identifier>
      <dc:date>2014-12-29T12:45:00+01:00</dc:date>
      <itunes:author>Frank Rieger, erdgeist, Linus Neumann, heckpiet, Constanze Kurz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>Auch das Jahr 2014 geht irgendwann vorbei. Deshalb werfen wir einen Blick zurück auf die für uns besonders relevanten Themen und versuchen abzuschätzen, was im Jahr 2015 auf uns zukommen könnte.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6583.html
</itunes:summary>
      <itunes:duration>02:18:28</itunes:duration>
    </item>
    <item>
      <title>The Only Thing We Know About Cyberspace Is That Its 640x480 (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6373_-_en_-_saal_6_-_201412291600_-_the_only_thing_we_know_about_cyberspace_is_that_its_640x480_-_olia_lialina</link>
      <description>Since 10 years I write about Vernacular Web and Digital Folklore, about early days of the web and web design before it became a profession. It is not that easy to find pages that were made in 93-97 and are still online or look the same. Things changed in 2009, when Yahoo announced that they are closing Geocities, number one free hosting service of the last century, &quot;myspace of the 90es&quot;, first home for many web users and a jest for &quot;professional web&quot;

In half a year yahoo gave its users to copy their data, Archive Team managed to partly rescue the pages and release one terabyte torrent of it. In 2010 my partner Dragan Espenschied and I started to download the files. In the middle of 2011 Dragan restored the archive and we started to go through the profiles: collecting, tagging, comparing, analyzing. One Terabyte of Kilobyte Age project started.

We don&#39;t only collect and restore but bring this culture of the 90es back to the web, using contemporary infrastructure. It is http://oneterabyteofkilobyteage.tumblr.com/ that posts a screenshot of a page every 20 minutes since February 2013. Or my channel on Vine, that allows to see those pages animated and with sound. And of course the blog http://contemporary-home-computing.org/1tb/ where we describe the findings.

In my HIGHLY ILLUSTRATED talk I&#39;d like to introduce to the audience pearls of the early web culture, going much deeper than usual Under Construction signs and animated GIFs nostalgia. Will show what did it mean to make a web page technically, philosophically and ideologically. Will also talk about our unique technical setting for emulating the pages and what digital preservation really means.  And last but not least will talk about newer cases of deleted social networks and social services.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6373.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6373-en-de-The_Only_Thing_We_Know_About_Cyberspace_Is_That_Its_640x480_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6373-en-de-The_Only_Thing_We_Know_About_Cyberspace_Is_That_Its_640x480_opus.opus?1419895647</guid>
      <dc:identifier>vw7sldBf_2ldlwNWTOF93A</dc:identifier>
      <dc:date>2014-12-29T16:00:00+01:00</dc:date>
      <itunes:author>olia lialina</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>One Terabyte of Kilobyte Age</itunes:subtitle>
      <itunes:summary>Since 10 years I write about Vernacular Web and Digital Folklore, about early days of the web and web design before it became a profession. It is not that easy to find pages that were made in 93-97 and are still online or look the same. Things changed in 2009, when Yahoo announced that they are closing Geocities, number one free hosting service of the last century, &quot;myspace of the 90es&quot;, first home for many web users and a jest for &quot;professional web&quot;

In half a year yahoo gave its users to copy their data, Archive Team managed to partly rescue the pages and release one terabyte torrent of it. In 2010 my partner Dragan Espenschied and I started to download the files. In the middle of 2011 Dragan restored the archive and we started to go through the profiles: collecting, tagging, comparing, analyzing. One Terabyte of Kilobyte Age project started.

We don&#39;t only collect and restore but bring this culture of the 90es back to the web, using contemporary infrastructure. It is http://oneterabyteofkilobyteage.tumblr.com/ that posts a screenshot of a page every 20 minutes since February 2013. Or my channel on Vine, that allows to see those pages animated and with sound. And of course the blog http://contemporary-home-computing.org/1tb/ where we describe the findings.

In my HIGHLY ILLUSTRATED talk I&#39;d like to introduce to the audience pearls of the early web culture, going much deeper than usual Under Construction signs and animated GIFs nostalgia. Will show what did it mean to make a web page technically, philosophically and ideologically. Will also talk about our unique technical setting for emulating the pages and what digital preservation really means.  And last but not least will talk about newer cases of deleted social networks and social services.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6373.html
</itunes:summary>
      <itunes:duration>01:00:41</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 3 (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6579_-_en_-_saal_g_-_201412291245_-_lightning_talks_day_3_-_theresa</link>
      <description>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6579.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6579-en-de-Lightning_Talks_Day_3_opus.opus"
        length="95420416"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6579-en-de-Lightning_Talks_Day_3_opus.opus?1419895486</guid>
      <dc:identifier>e46101e6-3114-4d5a-a09a-c70d4bfb4fec</dc:identifier>
      <dc:date>2014-12-29T12:45:00+01:00</dc:date>
      <itunes:author>Theresa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Other</itunes:keywords>
      <itunes:summary>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6579.html
</itunes:summary>
      <itunes:duration>02:11:10</itunes:duration>
    </item>
    <item>
      <title>CAESAR and NORX (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6137_-_en_-_saal_g_-_201412291600_-_caesar_and_norx_-_philipp_jovanovic_-_aumasson</link>
      <description>&quot;Nearly all of the symmetric encryption modes you learned  about in school, textbooks, and Wikipedia are (potentially) insecure.&quot; -- Matthew Green

In recent history, we saw time and again (to some extent catastrophic) failures of cryptographic constructions for authenticated encryption (AE) due to bad design choices, implementation errors and a lack of reliable standards. After an introduction providing some background information on these topics, we present CAESAR, a new cryptographic competition which aims to find solutions to the problems mentioned above. In the second part of the talk, we introduce NORX, a new and next-generation AE scheme and our candidate for CAESAR.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6137.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6137-en-de-CAESAR_and_NORX_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6137-en-de-CAESAR_and_NORX_opus.opus?1419895679</guid>
      <dc:identifier>5gpaE5FLmfxMjTlbSDJkWw</dc:identifier>
      <dc:date>2014-12-29T16:00:00+01:00</dc:date>
      <itunes:author>Philipp Jovanovic, aumasson</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Developing the Future of Authenticated Encryption</itunes:subtitle>
      <itunes:summary>&quot;Nearly all of the symmetric encryption modes you learned  about in school, textbooks, and Wikipedia are (potentially) insecure.&quot; -- Matthew Green

In recent history, we saw time and again (to some extent catastrophic) failures of cryptographic constructions for authenticated encryption (AE) due to bad design choices, implementation errors and a lack of reliable standards. After an introduction providing some background information on these topics, we present CAESAR, a new cryptographic competition which aims to find solutions to the problems mentioned above. In the second part of the talk, we introduce NORX, a new and next-generation AE scheme and our candidate for CAESAR.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6137.html
</itunes:summary>
      <itunes:duration>01:00:55</itunes:duration>
    </item>
    <item>
      <title>Correcting copywrongs (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6350_-_en_-_saal_2_-_201412291400_-_correcting_copywrongs_-_julia_reda</link>
      <description>After years of debate, EU copyright law is finally being revisited. The Commission will present a proposal for reform within 4 months of 31c3. And it&#39;s high time: There has never been a bigger discrepancy between the technical feasibility to share information and knowledge across all physical borders and the legal restrictions to actually do so. This talk outlines the unique opportunity and the challenge to bring copyright into the 21st century that lies in front of us. Hackers ensured that people were heard during last winter&#39;s public consultation. Can they now also ensure a progressive outcome of the reform process?
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6350.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6350-en-Correcting_copywrongs_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6350-en-Correcting_copywrongs_opus.opus?1419895518</guid>
      <dc:identifier>P8L4krxqjXP7zHMZToU6CQ</dc:identifier>
      <dc:date>2014-12-29T14:00:00+01:00</dc:date>
      <itunes:author>Julia Reda</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>European copyright reform is finally on the horizon</itunes:subtitle>
      <itunes:summary>After years of debate, EU copyright law is finally being revisited. The Commission will present a proposal for reform within 4 months of 31c3. And it&#39;s high time: There has never been a bigger discrepancy between the technical feasibility to share information and knowledge across all physical borders and the legal restrictions to actually do so. This talk outlines the unique opportunity and the challenge to bring copyright into the 21st century that lies in front of us. Hackers ensured that people were heard during last winter&#39;s public consultation. Can they now also ensure a progressive outcome of the reform process?
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6350.html
</itunes:summary>
      <itunes:duration>01:01:09</itunes:duration>
    </item>
    <item>
      <title>Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6342_-_de_-_saal_1_-_201412291600_-_deine_rechte_sind_in_diesen_freihandelsabkommen_nicht_verfugbar_-_katharina_nocun</link>
      <description>Die Kritik am Freihandelsabkommen TTIP und CETA auf die Chlorhühnchen zu beschränken, greift viel zu kurz. Denn bei den beiden Abkommen zwischen der EU und den USA und der EU und Kanada steht noch viel mehr auf dem Spiel. Egal ob Datenschutz, Demokratie oder Urheberrecht – Abkommen, an denen Konzerne unter Ausschluss der Öffentlichkeit mitschreiben können, sind selten eine gute Idee. Sitzungsdokumente mit “unverbindlichen” Lobby-Vorschlägen und Leaks der Vertragstexte lassen wenig Gutes erwarten. Datenschutzstandards laufen Gefahr zu Handelshemmnissen erklärt zu werden. Konzerne pochen darauf, Staaten vor außerstaatlichen Schiedsgerichten auf Schadensersatz verklagen zu können. Was die Bürger wollen, wurde im ganzen Verhandlungsprozess der beiden Freihandelsabkommen nicht einmal gefragt. Doch “Klicktivismus” war gestern – neue Strategien und Tools halfen dabei, eine Welle des dezentralen Protests loszutreten. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6342.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6342-de-Deine_Rechte_sind_in_diesen_Freihandelsabkommen_nicht_verfuegbar_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6342-de-Deine_Rechte_sind_in_diesen_Freihandelsabkommen_nicht_verfuegbar_opus.opus?1419895583</guid>
      <dc:identifier>Rm1YndV-p_f5_NFEyPZMNA</dc:identifier>
      <dc:date>2014-12-29T16:00:00+01:00</dc:date>
      <itunes:author>Katharina Nocun</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Der Protest gegen TTIP und CETA</itunes:subtitle>
      <itunes:summary>Die Kritik am Freihandelsabkommen TTIP und CETA auf die Chlorhühnchen zu beschränken, greift viel zu kurz. Denn bei den beiden Abkommen zwischen der EU und den USA und der EU und Kanada steht noch viel mehr auf dem Spiel. Egal ob Datenschutz, Demokratie oder Urheberrecht – Abkommen, an denen Konzerne unter Ausschluss der Öffentlichkeit mitschreiben können, sind selten eine gute Idee. Sitzungsdokumente mit “unverbindlichen” Lobby-Vorschlägen und Leaks der Vertragstexte lassen wenig Gutes erwarten. Datenschutzstandards laufen Gefahr zu Handelshemmnissen erklärt zu werden. Konzerne pochen darauf, Staaten vor außerstaatlichen Schiedsgerichten auf Schadensersatz verklagen zu können. Was die Bürger wollen, wurde im ganzen Verhandlungsprozess der beiden Freihandelsabkommen nicht einmal gefragt. Doch “Klicktivismus” war gestern – neue Strategien und Tools halfen dabei, eine Welle des dezentralen Protests loszutreten. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6342.html
</itunes:summary>
      <itunes:duration>01:02:07</itunes:duration>
    </item>
    <item>
      <title>Funky File Formats (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_5930_-_en_-_saal_6_-_201412291400_-_funky_file_formats_-_ange_albertini</link>
      <description>Binary tricks to evade identification, detection, to exploit encryption and hash collisions.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5930.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-5930-en-de-Funky_File_Formats_opus.opus"
        length="36700160"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-5930-en-de-Funky_File_Formats_opus.opus?1419895550</guid>
      <dc:identifier>H1GEe9l64eUbo1oZXtLkEg</dc:identifier>
      <dc:date>2014-12-29T14:00:00+01:00</dc:date>
      <itunes:author>Ange Albertini</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Advanced binary tricks</itunes:subtitle>
      <itunes:summary>Binary tricks to evade identification, detection, to exploit encryption and hash collisions.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5930.html
</itunes:summary>
      <itunes:duration>00:51:03</itunes:duration>
    </item>
    <item>
      <title>Security Analysis of a Full-Body X-Ray Scanner (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6332_-_en_-_saal_g_-_201412291130_-_security_analysis_of_a_full-body_x-ray_scanner_-_eric_wustrow_-_hovav_shacham</link>
      <description>Full-body scanners, also known as &quot;naked scanners&quot;, are used in airports and other government facilities to detect metallic and nonmetallic objects hidden beneath people&#39;s clothes. In many countries, they play a critical part in airline security, but they have also been criticized for being unsafe, ineffective, and an invasion of privacy. To shed scientific lights on these questions, we conducted the first rigorous, independent security evaluation of such a system. We bought a government-surplus Rapiscan Secure 1000 full-body scanner on eBay and extensively tested it in our lab. We found that it&#39;s possible to conceal knives, guns, and explosives from detection by exploiting properties of the device&#39;s backscatter X-ray technology. We also investigated computer security threats: malicious software and hardware that can compromise the effectiveness, safety, and privacy of the machine. In this talk, we&#39;ll explain how full-body scanners work, describe the results of our experiments, and draw lessons to inform transportation security, embedded systems security, and the public debate over secretive and privacy invasive government technologies.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6332.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6332-en-de-Security_Analysis_of_a_Full-Body_X-Ray_Scanner_opus.opus"
        length="38797312"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6332-en-de-Security_Analysis_of_a_Full-Body_X-Ray_Scanner_opus.opus?1419895421</guid>
      <dc:identifier>hl9yD87mkTYvOY5J2BIQwQ</dc:identifier>
      <dc:date>2014-12-29T11:30:00+01:00</dc:date>
      <itunes:author>Eric Wustrow, Hovav Shacham</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>Full-body scanners, also known as &quot;naked scanners&quot;, are used in airports and other government facilities to detect metallic and nonmetallic objects hidden beneath people&#39;s clothes. In many countries, they play a critical part in airline security, but they have also been criticized for being unsafe, ineffective, and an invasion of privacy. To shed scientific lights on these questions, we conducted the first rigorous, independent security evaluation of such a system. We bought a government-surplus Rapiscan Secure 1000 full-body scanner on eBay and extensively tested it in our lab. We found that it&#39;s possible to conceal knives, guns, and explosives from detection by exploiting properties of the device&#39;s backscatter X-ray technology. We also investigated computer security threats: malicious software and hardware that can compromise the effectiveness, safety, and privacy of the machine. In this talk, we&#39;ll explain how full-body scanners work, describe the results of our experiments, and draw lessons to inform transportation security, embedded systems security, and the public debate over secretive and privacy invasive government technologies.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6332.html
</itunes:summary>
      <itunes:duration>00:54:30</itunes:duration>
    </item>
    <item>
      <title>Let&#39;s build a quantum computer! (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6261_-_en_-_saal_2_-_201412291245_-_let_s_build_a_quantum_computer_-_andreas_dewes</link>
      <description>I will explain why quantum computing is interesting, how it works and what you actually need to build a working quantum computer. I will use the superconducting two-qubit quantum processor I built during my PhD as an example to explain its basic building blocks. I will show how we used this processor to achieve so-called quantum speed-up for a search algorithm that we ran on it. Finally, I will give a short overview of the current state of superconducting quantum computing and Google&#39;s recently announced effort to build a working quantum computer in cooperation with one of the leading research groups in this field.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6261.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6261-en-de-Lets_build_a_quantum_computer_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6261-en-de-Lets_build_a_quantum_computer_opus.opus?1419881919</guid>
      <dc:identifier>_jFN0YWHACogrN4ddVWK0Q</dc:identifier>
      <dc:date>2014-12-29T12:45:00+01:00</dc:date>
      <itunes:author>Andreas Dewes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Understanding the architecture of a quantum processor</itunes:subtitle>
      <itunes:summary>I will explain why quantum computing is interesting, how it works and what you actually need to build a working quantum computer. I will use the superconducting two-qubit quantum processor I built during my PhD as an example to explain its basic building blocks. I will show how we used this processor to achieve so-called quantum speed-up for a search algorithm that we ran on it. Finally, I will give a short overview of the current state of superconducting quantum computing and Google&#39;s recently announced effort to build a working quantum computer in cooperation with one of the leading research groups in this field.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6261.html
</itunes:summary>
      <itunes:duration>00:59:49</itunes:duration>
    </item>
    <item>
      <title>Damn Vulnerable Chemical Process (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6463_-_en_-_saal_6_-_201412291245_-_damn_vulnerable_chemical_process_-_marmusha</link>
      <description>So you want to author a next Stuxnet (or even cooler than that). Here is the success recipe: forget what you have known about cyber security. When an attack transitions from control of a digital system to control of a physical process, physics and time become controlling factors instead of the digital rules encoded into your microcontroller.

The holly CIA trinity is meaningless in the physical world. The uncontrollable but still running process is not really available; process dynamics does not stop simply because the controlling equipment is DoSed; electronically segregated components can still communicate over physical media (the process) and a physical phenomenon can be measured terribly wrongly (so that the wrong measurement will be  proudly delivered to the digital application in a totally secure way). Where physics plays a governing role, IT security concepts are rendered useless. 

Please welcome a new arrival in the &quot;damn&quot;-frameworks series - Damn Vulnerable Chemical Process. Come to the lecture and learn what it takes to exploit a physical process: how to find vulnerabilities and how to exploit them with minimal cost and maximum impact. Get astonished about the gazillion of uncertainties you will have to face on your way to disruptive goal and realize that the TIME is ONLY what matters while designing your attack .

Make sure to visit local library and refresh your knowledge on physics, chemistry, mechanics, control theory, signal processing and algorithms. The lecture will teach you how to apply this knowledge in the exciting world of cyber-physical exploitation.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6463.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6463-en-Damn_Vulnerable_Chemical_Process_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6463-en-Damn_Vulnerable_Chemical_Process_opus.opus?1419881951</guid>
      <dc:identifier>SkWIxKKgQFunVQAJT_oagA</dc:identifier>
      <dc:date>2014-12-29T12:45:00+01:00</dc:date>
      <itunes:author>Marmusha</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Exploitation in a new media</itunes:subtitle>
      <itunes:summary>So you want to author a next Stuxnet (or even cooler than that). Here is the success recipe: forget what you have known about cyber security. When an attack transitions from control of a digital system to control of a physical process, physics and time become controlling factors instead of the digital rules encoded into your microcontroller.

The holly CIA trinity is meaningless in the physical world. The uncontrollable but still running process is not really available; process dynamics does not stop simply because the controlling equipment is DoSed; electronically segregated components can still communicate over physical media (the process) and a physical phenomenon can be measured terribly wrongly (so that the wrong measurement will be  proudly delivered to the digital application in a totally secure way). Where physics plays a governing role, IT security concepts are rendered useless. 

Please welcome a new arrival in the &quot;damn&quot;-frameworks series - Damn Vulnerable Chemical Process. Come to the lecture and learn what it takes to exploit a physical process: how to find vulnerabilities and how to exploit them with minimal cost and maximum impact. Get astonished about the gazillion of uncertainties you will have to face on your way to disruptive goal and realize that the TIME is ONLY what matters while designing your attack .

Make sure to visit local library and refresh your knowledge on physics, chemistry, mechanics, control theory, signal processing and algorithms. The lecture will teach you how to apply this knowledge in the exciting world of cyber-physical exploitation.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6463.html
</itunes:summary>
      <itunes:duration>01:01:06</itunes:duration>
    </item>
    <item>
      <title>Why do we need an open food information platform (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6158_-_en_-_saal_6_-_201412291130_-_why_do_we_need_an_open_food_information_platform_-_alexis</link>
      <description>We from EveryCook are building an open source computerized cooking device. At 29c3 I presented the idea of digital cooking and people gave me an awesome feedback. Now, 2 years later the industry giants have realised that connecting computers and kitchen devices can do awesome things. But do they create open standards? Of course not! They create little black boxes speaking strange languages that you can&#39;t integrate in an ecosystem that wasn&#39;t designed by the manufacturers themselves. We still want an open ecosystem for free exchange of information about food and recipes. We came closer to our goal. Let me tell you...
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6158.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6158-en-de-Why_do_we_need_an_open_food_information_platform_opus.opus"
        length="27262976"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6158-en-de-Why_do_we_need_an_open_food_information_platform_opus.opus?1419881855</guid>
      <dc:identifier>nH8WWBIPmElTIWVCbrjcrg</dc:identifier>
      <dc:date>2014-12-29T11:30:00+01:00</dc:date>
      <itunes:author>Alexis</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>We want all data about food to be linked and public</itunes:subtitle>
      <itunes:summary>We from EveryCook are building an open source computerized cooking device. At 29c3 I presented the idea of digital cooking and people gave me an awesome feedback. Now, 2 years later the industry giants have realised that connecting computers and kitchen devices can do awesome things. But do they create open standards? Of course not! They create little black boxes speaking strange languages that you can&#39;t integrate in an ecosystem that wasn&#39;t designed by the manufacturers themselves. We still want an open ecosystem for free exchange of information about food and recipes. We came closer to our goal. Let me tell you...
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6158.html
</itunes:summary>
      <itunes:duration>00:38:53</itunes:duration>
    </item>
    <item>
      <title>NSA Points of Presence in AT (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6430_-_de_-_saal_2_-_201412291130_-_nsa_points_of_presence_in_at_-_erich_moechel</link>
      <description> - Station VIENNA in der US-Botschaft 1090 Wien
-  VIENNA  ANNEX  beim UNO-Sitz in Wien 1220
- Legacy Standort „NSA-Villa“ Wien 1180 
- Relaystation Exelberg,Breitbandnetz von NSA/SCS  über Wien  
- Equipment und Funktion der FORNSAT-Station Königswarte.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6430.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6430-de-en-NSA_Points_of_Presence_in_AT_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6430-de-en-NSA_Points_of_Presence_in_AT_opus.opus?1419881887</guid>
      <dc:identifier>Z4htibNZxLewwCmPKSdeqA</dc:identifier>
      <dc:date>2014-12-29T11:30:00+01:00</dc:date>
      <itunes:author>Erich Moechel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Vortrag mit aktuellen Fotos aus luftigen Perspektiven</itunes:subtitle>
      <itunes:summary> - Station VIENNA in der US-Botschaft 1090 Wien
-  VIENNA  ANNEX  beim UNO-Sitz in Wien 1220
- Legacy Standort „NSA-Villa“ Wien 1180 
- Relaystation Exelberg,Breitbandnetz von NSA/SCS  über Wien  
- Equipment und Funktion der FORNSAT-Station Königswarte.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6430.html
</itunes:summary>
      <itunes:duration>00:59:43</itunes:duration>
    </item>
    <item>
      <title>»Hard Drive Punch« (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6595_-_en_-_saal_1_-_201412281900_-_hard_drive_punch_-_aram_bartholl</link>
      <description>In general data is stored on technically sensitive systems and can easily be lost. At the same time files today appear often as indestructible once uploaded to the Internet.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6595.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6595-en-de-Hard_Drive_Punch_opus.opus"
        length="17825792"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 19:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6595-en-de-Hard_Drive_Punch_opus.opus?1419881468</guid>
      <dc:identifier>defd3b01-c39d-433f-b3c4-dbea1ea2fe00</dc:identifier>
      <dc:date>2014-12-28T19:00:00+01:00</dc:date>
      <itunes:author>Aram Bartholl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Destroying data as a performative act</itunes:subtitle>
      <itunes:summary>In general data is stored on technically sensitive systems and can easily be lost. At the same time files today appear often as indestructible once uploaded to the Internet.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6595.html
</itunes:summary>
      <itunes:duration>00:24:53</itunes:duration>
    </item>
    <item>
      <title>The automobile as massive data gathering source and the consequences for individual privacy (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6265_-_en_-_saal_6_-_201412281600_-_the_automobile_as_massive_data_gathering_source_and_the_consequences_for_individual_privacy_-_jimmy_schulz_-_dr_rudiger_hanig</link>
      <description>We report about a LOAD e. V. study regarding data collection of cars, future developments of this technology field, how this data is accessed and secured and what the stakeholders (car manufacturers, car owners and users)  positions are on this data gathering. In a summary we outline necessary consequences.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6265.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6265-en-The_automobile_as_massive_data_gathering_source_and_the_consequences_for_individual_privacy_opus.opus"
        length="28311552"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6265-en-The_automobile_as_massive_data_gathering_source_and_the_consequences_for_individual_privacy_opus.opus?1419881247</guid>
      <dc:identifier>2yBK0TAIqddmCWa1MJUNQQ</dc:identifier>
      <dc:date>2014-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Jimmy Schulz, Dr. Rüdiger Hanig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>The next big privacy heist</itunes:subtitle>
      <itunes:summary>We report about a LOAD e. V. study regarding data collection of cars, future developments of this technology field, how this data is accessed and secured and what the stakeholders (car manufacturers, car owners and users)  positions are on this data gathering. In a summary we outline necessary consequences.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6265.html
</itunes:summary>
      <itunes:duration>00:39:22</itunes:duration>
    </item>
    <item>
      <title>10 Jahre OpenStreetMap (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6255_-_de_-_saal_g_-_201412271830_-_10_jahre_openstreetmap_-_thomas_skowron_-_ubahnverleih</link>
      <description>Seit nun über 10 Jahren gibt es OpenStreetMap. Besonders in den letzten drei Jahren war die Entwicklung überwältigend, sowohl was die Datenlage als auch das gesamte Ökosystem anbelangt. Wir wollen zeigen, was möglich ist und was in der Zukunft (hoffentlich) passieren wird.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6255.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6255-de-en-10_Jahre_OpenStreetMap_opus.opus"
        length="38797312"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6255-de-en-10_Jahre_OpenStreetMap_opus.opus?1419864536</guid>
      <dc:identifier>1hSKsR-r9B0BnpLfUvpDAg</dc:identifier>
      <dc:date>2014-12-27T18:30:00+01:00</dc:date>
      <itunes:author>Thomas Skowron, ubahnverleih</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Wir leben noch und zwar sehr gut.</itunes:subtitle>
      <itunes:summary>Seit nun über 10 Jahren gibt es OpenStreetMap. Besonders in den letzten drei Jahren war die Entwicklung überwältigend, sowohl was die Datenlage als auch das gesamte Ökosystem anbelangt. Wir wollen zeigen, was möglich ist und was in der Zukunft (hoffentlich) passieren wird.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6255.html
</itunes:summary>
      <itunes:duration>00:54:22</itunes:duration>
    </item>
    <item>
      <title>Fnord News Show (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6109_-_de_-_saal_1_-_201412290015_-_fnord_news_show_-_frank_-_fefe</link>
      <description>Im Format einer lockeren Abendshow werden wir die Nachrichten-Highlights des Jahres präsentieren, die Meldungen zwischen den Meldungen, die subtilen Sensationen hinter den Schlagzeilen.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6109.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6109-de-en-Fnord_News_Show_opus.opus"
        length="83886080"
        type="audio/opus"/>
      <pubDate>Mon, 29 Dec 2014 00:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6109-de-en-Fnord_News_Show_opus.opus?1419856924</guid>
      <dc:identifier>Mw1wjnNzwxzSkM3Ip5Lg0g</dc:identifier>
      <dc:date>2014-12-29T00:15:00+01:00</dc:date>
      <itunes:author>frank, Fefe</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:subtitle>Wir helfen Euch die Fnords zu sehen.</itunes:subtitle>
      <itunes:summary>Im Format einer lockeren Abendshow werden wir die Nachrichten-Highlights des Jahres präsentieren, die Meldungen zwischen den Meldungen, die subtilen Sensationen hinter den Schlagzeilen.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6109.html
</itunes:summary>
      <itunes:duration>01:57:04</itunes:duration>
    </item>
    <item>
      <title>Ich sehe, also bin ich ... Du (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6450_-_de_-_saal_1_-_201412272030_-_ich_sehe_also_bin_ich_du_-_starbug</link>
      <description>Bei der Passworteingabe über die Schultern schauen? Die Mateflasche klauen, um an Fingerabdrücke zu kommen? Alles Technik von gestern. Der Vortrag zeigt, wie man heutzutage an Daten kommt, um Authentifizierungsmethoden zu überwinden.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6450.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6450-de-en-Ich_sehe_also_bin_ich_Du_opus.opus"
        length="39845888"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6450-de-en-Ich_sehe_also_bin_ich_Du_opus.opus?1419864436</guid>
      <dc:identifier>A8xVpIjX1oKQOQcWMt_49Q</dc:identifier>
      <dc:date>2014-12-27T20:30:00+01:00</dc:date>
      <itunes:author>starbug</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Gefahren von Kameras für (biometrische) Authentifizierungsverfahren</itunes:subtitle>
      <itunes:summary>Bei der Passworteingabe über die Schultern schauen? Die Mateflasche klauen, um an Fingerabdrücke zu kommen? Alles Technik von gestern. Der Vortrag zeigt, wie man heutzutage an Daten kommt, um Authentifizierungsmethoden zu überwinden.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6450.html
</itunes:summary>
      <itunes:duration>00:55:46</itunes:duration>
    </item>
    <item>
      <title>Jugend hackt (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6559_-_de_-_saal_6_-_201412271830_-_jugend_hackt_-_fiona_krakenburger_-_maria_reimer_-_philipp_kalweit_-_max_nagy_-_lukas_-_nico</link>
      <description>Im September 2014 fand die Veranstaltung Jugend hackt statt: Ein Wochenende Hacken, Basteln und Programmieren mit 120 computerbegeisterten Jugendlichen. Wir als Organisatorinnen und Teilnehmer wollen von dem Event erzählen und unsere Erfahrungen teilen. Der Talk richtet sich gleichermaßen an Jugendliche, die sich für&#39;s Hacken begeistern, als auch an alle, die sich für Code Literacy, Medienpädagogik oder den IT-Nachwuchs interessieren.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6559.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6559-de-en-Jugend_hackt_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6559-de-en-Jugend_hackt_opus.opus?1419862946</guid>
      <dc:identifier>0a06acd5-709e-4bba-9444-e71f78cd2094</dc:identifier>
      <dc:date>2014-12-27T18:30:00+01:00</dc:date>
      <itunes:author>Fiona Krakenbürger, Maria Reimer, Philipp Kalweit, Max Nagy , Lukas, Nico</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>Im September 2014 fand die Veranstaltung Jugend hackt statt: Ein Wochenende Hacken, Basteln und Programmieren mit 120 computerbegeisterten Jugendlichen. Wir als Organisatorinnen und Teilnehmer wollen von dem Event erzählen und unsere Erfahrungen teilen. Der Talk richtet sich gleichermaßen an Jugendliche, die sich für&#39;s Hacken begeistern, als auch an alle, die sich für Code Literacy, Medienpädagogik oder den IT-Nachwuchs interessieren.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6559.html
</itunes:summary>
      <itunes:duration>01:00:06</itunes:duration>
    </item>
    <item>
      <title>Doing right by sources, done right (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6291_-_en_-_saal_2_-_201412282300_-_doing_right_by_sources_done_right_-_sarah_harrison_-_gracefire</link>
      <description>Whistleblowing is becoming a progressively popular topic and ways to technically support anonymous submissions by journalistic sources are being increasingly discussed and developed. However, there is much more to protecting sources than the technical side. There is currently little discussion about the surrounding ethics, operational security and public protections of sources. Two women that have expertise in all areas of source protection; from submission, to publication, to after-care explain and discuss what source protection really means, issues that have arisen in recent years, often causing disastrous consequences, as well as the important lessons to learn from these and successful cases.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6291.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6291-en-Doing_right_by_sources_done_right_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6291-en-Doing_right_by_sources_done_right_opus.opus?1419964178</guid>
      <dc:identifier>xyADKdXtvEgJWo6eaTmUBQ</dc:identifier>
      <dc:date>2014-12-28T23:00:00+01:00</dc:date>
      <itunes:author>Sarah Harrison, gracefire</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Whistleblowing is becoming a progressively popular topic and ways to technically support anonymous submissions by journalistic sources are being increasingly discussed and developed. However, there is much more to protecting sources than the technical side. There is currently little discussion about the surrounding ethics, operational security and public protections of sources. Two women that have expertise in all areas of source protection; from submission, to publication, to after-care explain and discuss what source protection really means, issues that have arisen in recent years, often causing disastrous consequences, as well as the important lessons to learn from these and successful cases.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6291.html
</itunes:summary>
      <itunes:duration>01:00:41</itunes:duration>
    </item>
    <item>
      <title>Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6212_-_en_-_saal_1_-_201412282330_-_heartache_and_heartbleed_the_insider_s_perspective_on_the_aftermath_of_heartbleed_-_nick_sullivan</link>
      <description>Two weeks after the Heartbleed bug was announced, CloudFlare patched the Heartbleed bug, created a challenge to prove the bug could be used to find private keys (uncovering a second bug in OpenSSL) and turned its entire network into a giant honeypot. This session will discuss the specific steps taken to prevent early disclosure, creating and scaling the first public vulnerability test, how the CloudFlare Heartbleed challenge showed that you can reveal private SSL keys (how a second bug in OpenSSL made this possible) the incredible impact of revoking over 100,000 certificates in a single day, and the results of our honeypot revealing the proportion of attack traffic versus research traffic. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6212.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6212-en-de-Heartache_and_Heartbleed_The_insiders_perspective_on_the_aftermath_of_Heartbleed_opus.opus"
        length="20971520"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6212-en-de-Heartache_and_Heartbleed_The_insiders_perspective_on_the_aftermath_of_Heartbleed_opus.opus?1419881791</guid>
      <dc:identifier>4aOXU9cdQYbirV0Q-k5usw</dc:identifier>
      <dc:date>2014-12-28T23:30:00+01:00</dc:date>
      <itunes:author>Nick Sullivan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>The untold story of what really happened, how it was patched and what was learned.</itunes:subtitle>
      <itunes:summary>Two weeks after the Heartbleed bug was announced, CloudFlare patched the Heartbleed bug, created a challenge to prove the bug could be used to find private keys (uncovering a second bug in OpenSSL) and turned its entire network into a giant honeypot. This session will discuss the specific steps taken to prevent early disclosure, creating and scaling the first public vulnerability test, how the CloudFlare Heartbleed challenge showed that you can reveal private SSL keys (how a second bug in OpenSSL made this possible) the incredible impact of revoking over 100,000 certificates in a single day, and the results of our honeypot revealing the proportion of attack traffic versus research traffic. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6212.html
</itunes:summary>
      <itunes:duration>00:28:56</itunes:duration>
    </item>
    <item>
      <title>Superheroes Still Need Phoneboxes (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6175_-_en_-_saal_6_-_201412282300_-_superheroes_still_need_phoneboxes_-_ben_dalton</link>
      <description>This talk asks how we might plan for the continuation of a privacy sustaining internet in light of growing trends in enforced identity checking and demonisation of everyday anonymity. It presents a &#39;free phonebox&#39; project, which was tested at the FutureEverything art and technology festival in 2014, as an example of a social-technical system that promotes identity ambiguity in communication through the sharing of &#39;free&#39; mobile phone minutes between strangers.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6175.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6175-en-Superheroes_Still_Need_Phoneboxes_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6175-en-Superheroes_Still_Need_Phoneboxes_opus.opus?1419881727</guid>
      <dc:identifier>bX1J_FaFjsFbyn15h7OGdg</dc:identifier>
      <dc:date>2014-12-28T23:00:00+01:00</dc:date>
      <itunes:author>Ben Dalton</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>The art of making a free phonebox and the culture of anonymous communication</itunes:subtitle>
      <itunes:summary>This talk asks how we might plan for the continuation of a privacy sustaining internet in light of growing trends in enforced identity checking and demonisation of everyday anonymity. It presents a &#39;free phonebox&#39; project, which was tested at the FutureEverything art and technology festival in 2014, as an example of a social-technical system that promotes identity ambiguity in communication through the sharing of &#39;free&#39; mobile phone minutes between strangers.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6175.html
</itunes:summary>
      <itunes:duration>01:02:09</itunes:duration>
    </item>
    <item>
      <title>net neutrality: days of future past? (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6170_-_en_-_saal_g_-_201412282145_-_net_neutrality_days_of_future_past_-_rejo_zenger_-_thomas_lohninger</link>
      <description>Our talk will highlight the current debates surrounding net neutrality in Europe, the United States and other parts of the world. We will look at the results of the &lt;a href=&quot;https://savetheinternet.eu&quot;&gt;SaveTheInternet.eu&lt;/a&gt; campaign which was lunched a year ago on 30c3. We will discuss various legal protections for net neutrality, look closer at the experience of the Netherlands and we will give an overview of all important open ends of the debate.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6170.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6170-en-net_neutrality_days_of_future_past_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6170-en-net_neutrality_days_of_future_past_opus.opus?1419881597</guid>
      <dc:identifier>1lKbMS92kS0J0pQAAO6XZA</dc:identifier>
      <dc:date>2014-12-28T21:45:00+01:00</dc:date>
      <itunes:author>Rejo Zenger, Thomas Lohninger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Taking stock after two years of net neutrality in the Netherlands</itunes:subtitle>
      <itunes:summary>Our talk will highlight the current debates surrounding net neutrality in Europe, the United States and other parts of the world. We will look at the results of the &lt;a href=&quot;https://savetheinternet.eu&quot;&gt;SaveTheInternet.eu&lt;/a&gt; campaign which was lunched a year ago on 30c3. We will discuss various legal protections for net neutrality, look closer at the experience of the Netherlands and we will give an overview of all important open ends of the debate.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6170.html
</itunes:summary>
      <itunes:duration>01:00:01</itunes:duration>
    </item>
    <item>
      <title>The Matter of Heartbleed (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6321_-_en_-_saal_1_-_201412282300_-_the_matter_of_heartbleed_-_zakir_durumeric</link>
      <description>The Heartbleed vulnerability took the Internet by surprise in April of this year. The vulnerability was one of the most consequential in the history of the Internet, since it allowed attackers to potentially steal login credentials, cryptographic keys, and other private data from up to half of all popular HTTPS sites.  In this talk, we take a detailed look at Heartbleed and its aftermath, based on comprehensive measurements and analysis that our research team performed over the past six months.  We began tracking Heartbleed&#39;s impact within hours of its disclosure using massive ZMap scans and large network telescopes.  This allowed us to track which sites remained vulnerable, observe certificate revocations, and monitor for large scale attacks in close to real time. Based on this data, we also conducted one of the largest ever mass vulnerability notifications, informing the network administrators for all devices still susceptible to Heartbleed across the entire IPv4 address space.  Finally, we investigated the question of whether attackers knew about and exploited Heartbleed prior to its public disclosure---and we will present new details about this question in the talk.  We hope that by learning from the Heartbleed security disaster, our community can prepare to respond more effectively to such events in the future. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6321.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6321-en-de-The_Matter_of_Heartbleed_opus.opus"
        length="35651584"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6321-en-de-The_Matter_of_Heartbleed_opus.opus?1419881759</guid>
      <dc:identifier>6bXRd7c5UJbIlb4QiTd1ng</dc:identifier>
      <dc:date>2014-12-28T23:00:00+01:00</dc:date>
      <itunes:author>Zakir Durumeric</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>What went wrong, how the Internet reacted, what we can learn for the future</itunes:subtitle>
      <itunes:summary>The Heartbleed vulnerability took the Internet by surprise in April of this year. The vulnerability was one of the most consequential in the history of the Internet, since it allowed attackers to potentially steal login credentials, cryptographic keys, and other private data from up to half of all popular HTTPS sites.  In this talk, we take a detailed look at Heartbleed and its aftermath, based on comprehensive measurements and analysis that our research team performed over the past six months.  We began tracking Heartbleed&#39;s impact within hours of its disclosure using massive ZMap scans and large network telescopes.  This allowed us to track which sites remained vulnerable, observe certificate revocations, and monitor for large scale attacks in close to real time. Based on this data, we also conducted one of the largest ever mass vulnerability notifications, informing the network administrators for all devices still susceptible to Heartbleed across the entire IPv4 address space.  Finally, we investigated the question of whether attackers knew about and exploited Heartbleed prior to its public disclosure---and we will present new details about this question in the talk.  We hope that by learning from the Heartbleed security disaster, our community can prepare to respond more effectively to such events in the future. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6321.html
</itunes:summary>
      <itunes:duration>00:50:16</itunes:duration>
    </item>
    <item>
      <title>The Invisible Committee Returns with &quot;Fuck Off Google&quot; (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6459_-_en_-_saal_2_-_201412281900_-_the_invisible_committee_returns_with_fuck_off_google_-_anonymous_member_of_tarnac_solidarity_committee_-_tarnac_nine</link>
      <description> “There will be people who resist adopting and using technology, people who want nothing to do with virtual profiles, online data systems or smart phones. Yet a government might suspect that people who opt out completely have something to hide and thus are more likely to break laws, and as a counterterrorism measure, that government will build the kind of ‘hidden people’ registry we described earlier. If you don’t have any registered social-networking profiles or mobile subscriptions, and on-line references to you are unusually hard to find, you might be considered a candidate for such a registry. You might also be subjected to a strict set of new regulations that includes rigorous airport screening or even travel restrictions.”
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6459.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6459-en-de-The_Invisible_Committee_Returns_with_Fuck_Off_Google_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 19:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6459-en-de-The_Invisible_Committee_Returns_with_Fuck_Off_Google_opus.opus?1419870934</guid>
      <dc:identifier>T7Ta13fUuQaAbv1JlO4-Qg</dc:identifier>
      <dc:date>2014-12-28T19:00:00+01:00</dc:date>
      <itunes:author>Anonymous member of Tarnac Solidarity Committee, tarnac nine</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Cybernetics, Anti-Terrorism, and the ongoing case against the Tarnac 10</itunes:subtitle>
      <itunes:summary> “There will be people who resist adopting and using technology, people who want nothing to do with virtual profiles, online data systems or smart phones. Yet a government might suspect that people who opt out completely have something to hide and thus are more likely to break laws, and as a counterterrorism measure, that government will build the kind of ‘hidden people’ registry we described earlier. If you don’t have any registered social-networking profiles or mobile subscriptions, and on-line references to you are unusually hard to find, you might be considered a candidate for such a registry. You might also be subjected to a strict set of new regulations that includes rigorous airport screening or even travel restrictions.”
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6459.html
</itunes:summary>
      <itunes:duration>01:00:51</itunes:duration>
    </item>
    <item>
      <title>Too Many Cooks - Exploiting the Internet-of-TR-069-Things (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6166_-_en_-_saal_6_-_201412282145_-_too_many_cooks_-_exploiting_the_internet-of-tr-069-things_-_lior_oppenheim_-_shahar_tal</link>
      <description>TL;DR We unravel the story of a bug that would become one of the most important vulnerabilities released this year. Also, we have free cookies.
The findings we published earlier this year demystified the voodoo that is TR-069, demonstrated how mass pwnage can be achieved via server-side attacks, and proved the landscape is ripe for harvesting. We will continue where we left off to explore TR-069 client-side vulnerabilities; we analyze client implementations, pour some insight into mysterious results from our internet-wide scans, and follow to mass pwnage through remote code execution on millions of online devices. again.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6166.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6166-en-Too_Many_Cooks_-_Exploiting_the_Internet-of-TR-069-Things_opus.opus"
        length="37748736"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6166-en-Too_Many_Cooks_-_Exploiting_the_Internet-of-TR-069-Things_opus.opus?1419899448</guid>
      <dc:identifier>lEFQRUU823FUOPqKG85vWg</dc:identifier>
      <dc:date>2014-12-28T21:45:00+01:00</dc:date>
      <itunes:author>Lior Oppenheim, Shahar Tal</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>TL;DR We unravel the story of a bug that would become one of the most important vulnerabilities released this year. Also, we have free cookies.
The findings we published earlier this year demystified the voodoo that is TR-069, demonstrated how mass pwnage can be achieved via server-side attacks, and proved the landscape is ripe for harvesting. We will continue where we left off to explore TR-069 client-side vulnerabilities; we analyze client implementations, pour some insight into mysterious results from our internet-wide scans, and follow to mass pwnage through remote code execution on millions of online devices. again.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6166.html
</itunes:summary>
      <itunes:duration>00:53:28</itunes:duration>
    </item>
    <item>
      <title>GIFs: Tod eines Mediums. Und sein Leben nach dem Tod. (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6325_-_de_-_saal_g_-_201412281600_-_gifs_tod_eines_mediums_und_sein_leben_nach_dem_tod_-_felix_mutze</link>
      <description>Im Grunde sind GIFs Schnee von gestern. Es gibt zahlreiche Alternativen, die das, was ein GIF kann, besser können. Und trotzdem haben sich GIFs als Kulturtechnik durchgesetzt. Oder war es nur ein letzter Hype vor dem Tod? Wie kommt es, dass ein Medium, das schon in den 90ern veraltet war, sich noch zwei Jahrzehnte später bester Beliebtheit erfreut? Und was können wir daraus über die Diskrepanz zwischen aktueller technischer Entwicklung einerseits und der tatsächlichen Nutzung von Technologie andererseits lernen?
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6325.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6325-de-en-GIFs_Tod_eines_Mediums_Und_sein_Leben_nach_dem_Tod_opus.opus"
        length="22020096"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6325-de-en-GIFs_Tod_eines_Mediums_Und_sein_Leben_nach_dem_Tod_opus.opus?1419870691</guid>
      <dc:identifier>1Xe2U3LqTfMTXAvI6hrgxg</dc:identifier>
      <dc:date>2014-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Felix Mütze</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Wie es kommt, dass technischer Fortschritt den Nutzern gänzlich egal sein kann.</itunes:subtitle>
      <itunes:summary>Im Grunde sind GIFs Schnee von gestern. Es gibt zahlreiche Alternativen, die das, was ein GIF kann, besser können. Und trotzdem haben sich GIFs als Kulturtechnik durchgesetzt. Oder war es nur ein letzter Hype vor dem Tod? Wie kommt es, dass ein Medium, das schon in den 90ern veraltet war, sich noch zwei Jahrzehnte später bester Beliebtheit erfreut? Und was können wir daraus über die Diskrepanz zwischen aktueller technischer Entwicklung einerseits und der tatsächlichen Nutzung von Technologie andererseits lernen?
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6325.html
</itunes:summary>
      <itunes:duration>00:31:10</itunes:duration>
    </item>
    <item>
      <title>Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source MT6260 SoC (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6156_-_en_-_saal_1_-_201412282145_-_fernvale_an_open_hardware_and_software_platform_based_on_the_nominally_closed-source_mt6260_soc_-_bunnie_-_xobs</link>
      <description>We introduce Fernvale, a reverse-engineered, open hardware and software platform based upon Mediatek&#39;s MT6260 value phone SoC. The MT6260 is the chip that powers many of the $10 GSM feature phones produced by the Shanzhai. 

Fernvale is made available as open-licensed schematics, board layouts, and an RTOS based upon the BSD-licensed NuttX, as well as a suite of open tools for code development and firmware upload. We discuss our technical reverse engineering efforts, as well as our methodology to lawfully import IP from the Shanzhai ecosystem into the Maker ecosystem. We hope to establish a repeatable, if not labor-intensive, model for opening up previously closed IP of interest, thereby outlining a path to leveling the playing field for lawful Makers.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6156.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6156-en-Fernvale_An_Open_Hardware_and_Software_Platform_Based_on_the_nominally_Closed-Source_MT6260_SoC_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6156-en-Fernvale_An_Open_Hardware_and_Software_Platform_Based_on_the_nominally_Closed-Source_MT6260_SoC_opus.opus?1419881629</guid>
      <dc:identifier>gRbk7OprwZBqF3cv0NddMQ</dc:identifier>
      <dc:date>2014-12-28T21:45:00+01:00</dc:date>
      <itunes:author>bunnie, Xobs</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>A Lawful Method for Converting Closed IP into Open IP</itunes:subtitle>
      <itunes:summary>We introduce Fernvale, a reverse-engineered, open hardware and software platform based upon Mediatek&#39;s MT6260 value phone SoC. The MT6260 is the chip that powers many of the $10 GSM feature phones produced by the Shanzhai. 

Fernvale is made available as open-licensed schematics, board layouts, and an RTOS based upon the BSD-licensed NuttX, as well as a suite of open tools for code development and firmware upload. We discuss our technical reverse engineering efforts, as well as our methodology to lawfully import IP from the Shanzhai ecosystem into the Maker ecosystem. We hope to establish a repeatable, if not labor-intensive, model for opening up previously closed IP of interest, thereby outlining a path to leveling the playing field for lawful Makers.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6156.html
</itunes:summary>
      <itunes:duration>00:59:43</itunes:duration>
    </item>
    <item>
      <title>Inside Field Station Berlin Teufelsberg (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6585_-_en_-_saal_2_-_201412282145_-_inside_field_station_berlin_teufelsberg_-_bill_scannell</link>
      <description>Of all the NSA&#39;s Cold War listening posts, their intelligence facility on top of Berlin&#39;s Teufelsberg was their most secretive.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6585.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6585-en-de-Inside_Field_Station_Berlin_Teufelsberg_opus.opus"
        length="39845888"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6585-en-de-Inside_Field_Station_Berlin_Teufelsberg_opus.opus?1419881662</guid>
      <dc:identifier>78e2d419-0adc-43ff-989e-95a78ac9ddd4</dc:identifier>
      <dc:date>2014-12-28T21:45:00+01:00</dc:date>
      <itunes:author>Bill Scannell</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>The story of the NSA listening post – told by an ex-SIGINT analyst who worked there</itunes:subtitle>
      <itunes:summary>Of all the NSA&#39;s Cold War listening posts, their intelligence facility on top of Berlin&#39;s Teufelsberg was their most secretive.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6585.html
</itunes:summary>
      <itunes:duration>00:55:23</itunes:duration>
    </item>
    <item>
      <title>Mining for Bugs with Graph Database Queries (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6534_-_en_-_saal_g_-_201412282030_-_mining_for_bugs_with_graph_database_queries_-_fabs</link>
      <description>While graph databases are primarily known as the backbone of the modern dating world, this nerd has found a much more interesting application for them: program analysis. This talk aims to demonstrate that graph databases and the typical program representations developed in compiler construction are a match made in heaven, allowing large code bases to be mined for vulnerabilities using complex bug descriptions encoded in simple, and not so simple graph database
queries.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6534.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6534-en-Mining_for_Bugs_with_Graph_Database_Queries_opus.opus"
        length="38797312"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6534-en-Mining_for_Bugs_with_Graph_Database_Queries_opus.opus?1419871305</guid>
      <dc:identifier>xvPazrSLJdMwzpnphpOEIQ</dc:identifier>
      <dc:date>2014-12-28T20:30:00+01:00</dc:date>
      <itunes:author>fabs</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>While graph databases are primarily known as the backbone of the modern dating world, this nerd has found a much more interesting application for them: program analysis. This talk aims to demonstrate that graph databases and the typical program representations developed in compiler construction are a match made in heaven, allowing large code bases to be mined for vulnerabilities using complex bug descriptions encoded in simple, and not so simple graph database
queries.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6534.html
</itunes:summary>
      <itunes:duration>00:54:53</itunes:duration>
    </item>
    <item>
      <title>Space Hacker (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6142_-_en_-_saal_2_-_201412272030_-_space_hacker_-_karsten_becker_-_robert</link>
      <description>At the 26C3 we first presented our vision of sending a rover to the moon. We&#39;re still in the pursuit of doing this and are closer than ever. Many things have happened in the past 5 years and we want to share our story with you.
But this talk is not just about us, it is also about you! You will have the possibility to contribute to our mission, just tune in to get all the details :)
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6142.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6142-en-de-Space_Hacker_opus.opus"
        length="45088768"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6142-en-de-Space_Hacker_opus.opus?1419864878</guid>
      <dc:identifier>i_Dt13BFiawklEaokv3pKg</dc:identifier>
      <dc:date>2014-12-27T20:30:00+01:00</dc:date>
      <itunes:author>Karsten Becker, Robert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Uploading rover...</itunes:subtitle>
      <itunes:summary>At the 26C3 we first presented our vision of sending a rover to the moon. We&#39;re still in the pursuit of doing this and are closer than ever. Many things have happened in the past 5 years and we want to share our story with you.
But this talk is not just about us, it is also about you! You will have the possibility to contribute to our mission, just tune in to get all the details :)
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6142.html
</itunes:summary>
      <itunes:duration>01:02:33</itunes:duration>
    </item>
    <item>
      <title>Vor Windows 8 wird gewarnt (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6294_-_de_-_saal_1_-_201412281815_-_vor_windows_8_wird_gewarnt_-_ruedi</link>
      <description>Im Vortrag sollen technische und gesellschaftliche Konsequenzen der von Microsoft kontrollierten Windows-8-Secure-Boot-Architektur und mögliche Gegenmaßnahmen diskutiert werden.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6294.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6294-de-en-Vor_Windows_8_wird_gewarnt_opus.opus"
        length="22020096"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6294-de-en-Vor_Windows_8_wird_gewarnt_opus.opus?1419881183</guid>
      <dc:identifier>xmlu4jFXkob2t8CUHi0Rng</dc:identifier>
      <dc:date>2014-12-28T18:15:00+01:00</dc:date>
      <itunes:author>ruedi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Und nichts (Secure) Bootet mehr?</itunes:subtitle>
      <itunes:summary>Im Vortrag sollen technische und gesellschaftliche Konsequenzen der von Microsoft kontrollierten Windows-8-Secure-Boot-Architektur und mögliche Gegenmaßnahmen diskutiert werden.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6294.html
</itunes:summary>
      <itunes:duration>00:31:21</itunes:duration>
    </item>
    <item>
      <title>Attacks on UEFI security, inspired by Darth Venamis&#39;s misery and Speed Racer (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6129_-_en_-_saal_2_-_201412282030_-_attacks_on_uefi_security_inspired_by_darth_venamis_s_misery_and_speed_racer_-_rafal_wojtczuk_-_corey_kallenberg</link>
      <description>On modern Intel based computers there exists two powerful and protected code regions: the UEFI firmware and System Management Mode (SMM). UEFI is the replacement for conventional BIOS and has the responsibility of initializing the platform. SMM is a powerful mode of execution on Intel CPUs that is even more privileged than a hypervisor. Because of their powerful positions, SMM and UEFI are protected by a variety of hardware mechanisms. In this talk, Rafal Wojtczuk and Corey Kallenberg team up to disclose several prevalent vulnerabilities that result in SMM runtime breakin as well as arbitrary reflash of the UEFI firmware.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6129.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6129-en-Attacks_on_UEFI_security_inspired_by_Darth_Venamiss_misery_and_Speed_Racer_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6129-en-Attacks_on_UEFI_security_inspired_by_Darth_Venamiss_misery_and_Speed_Racer_opus.opus?1419881500</guid>
      <dc:identifier>T7aunKcOFBLl5b8IGVqJWQ</dc:identifier>
      <dc:date>2014-12-28T20:30:00+01:00</dc:date>
      <itunes:author>Rafal Wojtczuk, Corey Kallenberg</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>On modern Intel based computers there exists two powerful and protected code regions: the UEFI firmware and System Management Mode (SMM). UEFI is the replacement for conventional BIOS and has the responsibility of initializing the platform. SMM is a powerful mode of execution on Intel CPUs that is even more privileged than a hypervisor. Because of their powerful positions, SMM and UEFI are protected by a variety of hardware mechanisms. In this talk, Rafal Wojtczuk and Corey Kallenberg team up to disclose several prevalent vulnerabilities that result in SMM runtime breakin as well as arbitrary reflash of the UEFI firmware.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6129.html
</itunes:summary>
      <itunes:duration>01:00:10</itunes:duration>
    </item>
    <item>
      <title>Preserving arcade games (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_5997_-_en_-_saal_6_-_201412282030_-_preserving_arcade_games_-_ange_albertini</link>
      <description>Old-school arcade games were so protected that hacking is the only way to preserve them before all boards are dead, and the games are lost.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5997.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-5997-en-Preserving_arcade_games_opus.opus"
        length="36700160"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-5997-en-Preserving_arcade_games_opus.opus?1419881532</guid>
      <dc:identifier>MBpSOQzfPD4ky0hqL6B-hg</dc:identifier>
      <dc:date>2014-12-28T20:30:00+01:00</dc:date>
      <itunes:author>Ange Albertini</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>Old-school arcade games were so protected that hacking is the only way to preserve them before all boards are dead, and the games are lost.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5997.html
</itunes:summary>
      <itunes:duration>00:52:03</itunes:duration>
    </item>
    <item>
      <title>Reconstructing narratives (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6258_-_en_-_saal_1_-_201412282030_-_reconstructing_narratives_-_jacob_-_laura_poitras</link>
      <description>Surveillance, cryptography, terrorism, malware, economic espionage, assassination, interventions, intelligence services, political prisoners, policing, transparency, justice and you.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6258.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6258-en-Reconstructing_narratives_opus.opus"
        length="45088768"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6258-en-Reconstructing_narratives_opus.opus?1419881565</guid>
      <dc:identifier>1NE5joYD0o-gaf5SqL-1Nw</dc:identifier>
      <dc:date>2014-12-28T20:30:00+01:00</dc:date>
      <itunes:author>Jacob, Laura Poitras</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>transparency in the service of justice</itunes:subtitle>
      <itunes:summary>Surveillance, cryptography, terrorism, malware, economic espionage, assassination, interventions, intelligence services, political prisoners, policing, transparency, justice and you.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6258.html
</itunes:summary>
      <itunes:duration>01:03:36</itunes:duration>
    </item>
    <item>
      <title>Internet of toilets (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6370_-_en_-_saal_g_-_201412281900_-_internet_of_toilets_-_tbsprs</link>
      <description>A toilet is a toilet is a toilet ... was a toilet. Nowadays hackers discover a larger interest in doing more with toilets then just what they were designed for in the first place. Within the &quot;Internet of things&quot; scene the sanitarian sphere claims a place of its own. This talk will present current projects, technologies used and research published.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6370.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6370-en-Internet_of_toilets_opus.opus"
        length="25165824"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 19:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6370-en-Internet_of_toilets_opus.opus?1419871072</guid>
      <dc:identifier>qRQclNxyOV7ZYPwbrXrw1Q</dc:identifier>
      <dc:date>2014-12-28T19:00:00+01:00</dc:date>
      <itunes:author>tbsprs</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Trends in the sanitarian territory</itunes:subtitle>
      <itunes:summary>A toilet is a toilet is a toilet ... was a toilet. Nowadays hackers discover a larger interest in doing more with toilets then just what they were designed for in the first place. Within the &quot;Internet of things&quot; scene the sanitarian sphere claims a place of its own. This talk will present current projects, technologies used and research published.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6370.html
</itunes:summary>
      <itunes:duration>00:34:56</itunes:duration>
    </item>
    <item>
      <title>Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6148_-_en_-_saal_6_-_201412281815_-_open-bci_diy-neuroscience_maker-art_mind-hacking_-_metamind_evolution</link>
      <description>leading hackers and researchers
from the worldwide hackerspace, 
universitiy, and DIY artist community, 
explain current technological 
possibilites in BCI, 

and show ways
to use open source 
hardware and software 
for hackers, makers, artists, 
personal development, citizen science, 

providing a framework
for alternative culture and free expression 
balancing the soon coming commercial expansion 
in &quot;Neurogaming&quot;, &quot;Neuromarketing&quot; and &quot;eHealth&quot; 

talk will illustrate 
the mutually beneficial relationship 
between &quot;hacking&quot; and science, 
with the example of hacking BCIs, 

as well as an overview into the new field
of &quot;BCI Mind-Hacking&quot;, such as exploiting 
remote consumer Neuroheadsets, 
and Data-Mining the human-brain 
for sensitive data during casual use.


about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6148.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6148-en-Open-BCI_DIY-Neuroscience_Maker-Art_Mind-Hacking_opus.opus"
        length="27262976"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6148-en-Open-BCI_DIY-Neuroscience_Maker-Art_Mind-Hacking_opus.opus?1419881279</guid>
      <dc:identifier>1J0sEDUwTplMXgNU2Q7hrw</dc:identifier>
      <dc:date>2014-12-28T18:15:00+01:00</dc:date>
      <itunes:author>MeTaMiNd EvoLuTioN</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>open source DIY brain-computer-interfaces | technology and applications crash-course | &quot;BCI Mind-Hacking&quot; intro</itunes:subtitle>
      <itunes:summary>leading hackers and researchers
from the worldwide hackerspace, 
universitiy, and DIY artist community, 
explain current technological 
possibilites in BCI, 

and show ways
to use open source 
hardware and software 
for hackers, makers, artists, 
personal development, citizen science, 

providing a framework
for alternative culture and free expression 
balancing the soon coming commercial expansion 
in &quot;Neurogaming&quot;, &quot;Neuromarketing&quot; and &quot;eHealth&quot; 

talk will illustrate 
the mutually beneficial relationship 
between &quot;hacking&quot; and science, 
with the example of hacking BCIs, 

as well as an overview into the new field
of &quot;BCI Mind-Hacking&quot;, such as exploiting 
remote consumer Neuroheadsets, 
and Data-Mining the human-brain 
for sensitive data during casual use.


about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6148.html
</itunes:summary>
      <itunes:duration>00:37:58</itunes:duration>
    </item>
    <item>
      <title>Privacy and Consumer Markets (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6202_-_en_-_saal_2_-_201412281815_-_privacy_and_consumer_markets_-_reuben_binns</link>
      <description>The internet may be the nervous system of the 21st century, but its main business purpose is helping marketers work out how to make people buy stuff. This talk maps out a possible alternative, where consumers co-ordinate online, pooling their data and resources to match demand with supply.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6202.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6202-en-de-Privacy_and_Consumer_Markets_opus.opus"
        length="22020096"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6202-en-de-Privacy_and_Consumer_Markets_opus.opus?1419881311</guid>
      <dc:identifier>lcqCv-SWZ2OTU7b2xqw9tg</dc:identifier>
      <dc:date>2014-12-28T18:15:00+01:00</dc:date>
      <itunes:author>Reuben Binns</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Reversing the Surveillance Business Model</itunes:subtitle>
      <itunes:summary>The internet may be the nervous system of the 21st century, but its main business purpose is helping marketers work out how to make people buy stuff. This talk maps out a possible alternative, where consumers co-ordinate online, pooling their data and resources to match demand with supply.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6202.html
</itunes:summary>
      <itunes:duration>00:30:41</itunes:duration>
    </item>
    <item>
      <title>Global Civil Society Under Attack (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6399_-_en_-_saal_g_-_201412281815_-_global_civil_society_under_attack_-_michael_carbone</link>
      <description>An update to our Reports from the Frontlines talk at OHM 2013, we will provide the latest stories and figures from Access&#39; digital security helpline that provides security incident response and technical support to civil society groups and human rights defenders around the world.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6399.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6399-en-Global_Civil_Society_Under_Attack_opus.opus"
        length="24117248"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6399-en-Global_Civil_Society_Under_Attack_opus.opus?1419881436</guid>
      <dc:identifier>KNu4tX4NRJCFiFCsIh-FxA</dc:identifier>
      <dc:date>2014-12-28T18:15:00+01:00</dc:date>
      <itunes:author>Michael Carbone</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Reports from the Frontlines</itunes:subtitle>
      <itunes:summary>An update to our Reports from the Frontlines talk at OHM 2013, we will provide the latest stories and figures from Access&#39; digital security helpline that provides security incident response and technical support to civil society groups and human rights defenders around the world.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6399.html
</itunes:summary>
      <itunes:duration>00:33:28</itunes:duration>
    </item>
    <item>
      <title>Hacking Ethics in Education (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6071_-_en_-_saal_g_-_201412281730_-_hacking_ethics_in_education_-_jeroen_van_der_ham</link>
      <description>Ethics in Computer Science is now finally gaining some well deserved attention.  At the University of Amsterdam, we have started an ethical committee for the System and Network Engineering Master. In this talk we describe how and why we started this committee, and also look back at our first results.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6071.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6071-en-Hacking_Ethics_in_Education_opus.opus"
        length="19922944"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6071-en-Hacking_Ethics_in_Education_opus.opus?1419870036</guid>
      <dc:identifier>n8k2uElFR872zYbrs7kycQ</dc:identifier>
      <dc:date>2014-12-28T17:30:00+01:00</dc:date>
      <itunes:author>Jeroen van der Ham</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Ethics in Computer Science is now finally gaining some well deserved attention.  At the University of Amsterdam, we have started an ethical committee for the System and Network Engineering Master. In this talk we describe how and why we started this committee, and also look back at our first results.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6071.html
</itunes:summary>
      <itunes:duration>00:28:14</itunes:duration>
    </item>
    <item>
      <title>Information Control and Strategic Violence (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6358_-_en_-_saal_1_-_201412281730_-_information_control_and_strategic_violence_-_anita_gohdes</link>
      <description>Simple access to social media and cell phone has widely been accepted as a positive tool for citizens to voice dissatisfaction with their government and coordinate protest. But why would rulers permit these tools if they merely pose a threat to their own survival? This talk will investigate how a government’s ability to censor and limit the flow of information feeds into its choice of violent responses to protest. I will talk about the conditions under which a government is likely to benefit more from surveilling the free flow of information, and under which conditions it is more likely to benefit from censorship. 

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6358.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6358-en-de-Information_Control_and_Strategic_Violence_opus.opus"
        length="20971520"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6358-en-de-Information_Control_and_Strategic_Violence_opus.opus?1419869424</guid>
      <dc:identifier>lWgvj2btOjK-_XxUtIs-qw</dc:identifier>
      <dc:date>2014-12-28T17:30:00+01:00</dc:date>
      <itunes:author>Anita Gohdes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>How governments use censorship and surveillance  as part of their violent repressive tactics</itunes:subtitle>
      <itunes:summary>Simple access to social media and cell phone has widely been accepted as a positive tool for citizens to voice dissatisfaction with their government and coordinate protest. But why would rulers permit these tools if they merely pose a threat to their own survival? This talk will investigate how a government’s ability to censor and limit the flow of information feeds into its choice of violent responses to protest. I will talk about the conditions under which a government is likely to benefit more from surveilling the free flow of information, and under which conditions it is more likely to benefit from censorship. 

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6358.html
</itunes:summary>
      <itunes:duration>00:30:01</itunes:duration>
    </item>
    <item>
      <title>Mr Beam goes Kickstarter (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6589_-_en_-_saal_6_-_201412281730_-_mr_beam_goes_kickstarter_-_teja_philipp_-_philipp_engel</link>
      <description>Mr Beam was started as a hobby project aiming to get more experience in 3D printing. For fun we put it on Kickstarter and ended up in kind of a roller coaster. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6589.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6589-en-Mr_Beam_goes_Kickstarter_opus.opus"
        length="22020096"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6589-en-Mr_Beam_goes_Kickstarter_opus.opus?1419869972</guid>
      <dc:identifier>8283fa4f-a6eb-4296-a6a8-20c3f9d80a4c</dc:identifier>
      <dc:date>2014-12-28T17:30:00+01:00</dc:date>
      <itunes:author>Teja Philipp, Philipp Engel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Lessons learned from crowdfunding a hardware project</itunes:subtitle>
      <itunes:summary>Mr Beam was started as a hobby project aiming to get more experience in 3D printing. For fun we put it on Kickstarter and ended up in kind of a roller coaster. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6589.html
</itunes:summary>
      <itunes:duration>00:31:00</itunes:duration>
    </item>
    <item>
      <title>Forging the USB armory (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6541_-_en_-_saal_2_-_201412281730_-_forging_the_usb_armory_-_andrea_barisani</link>
      <description>The presentation will cover the journey that we have taken to develop the USB armory board from scratch, explaining the lessons learned and its prospected applications.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6541.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6541-en-de-Forging_the_USB_armory_opus.opus"
        length="22020096"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6541-en-de-Forging_the_USB_armory_opus.opus?1419869749</guid>
      <dc:identifier>UqfjLnUNKqc6-WzUjP6YQg</dc:identifier>
      <dc:date>2014-12-28T17:30:00+01:00</dc:date>
      <itunes:author>Andrea Barisani</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Creating an open source secure flash-drive-sized computer</itunes:subtitle>
      <itunes:summary>The presentation will cover the journey that we have taken to develop the USB armory board from scratch, explaining the lessons learned and its prospected applications.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6541.html
</itunes:summary>
      <itunes:duration>00:30:41</itunes:duration>
    </item>
    <item>
      <title>Finding the Weak Crypto Needle in a Byte Haystack (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6144_-_en_-_saal_g_-_201412281645_-_finding_the_weak_crypto_needle_in_a_byte_haystack_-_ben_h</link>
      <description>Using the same stream cipher key twice is known to be a Very Bad Idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. We describe a heuristic algorithm which can detect vulnerabilities of this kind. We explain the inner workings of the algorithm and demonstrate a proof-of-concept attack on sevreral examples of vulnerable data, including files encrypted by the DirCrypt malware and encrypted traffic generated by malware such as variants of Zeus and Ramnit.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6144.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6144-en-Finding_the_Weak_Crypto_Needle_in_a_Byte_Haystack_opus.opus"
        length="23068672"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6144-en-Finding_the_Weak_Crypto_Needle_in_a_Byte_Haystack_opus.opus?1419869280</guid>
      <dc:identifier>0T8GTXjwMVJLM_n5VEuE0A</dc:identifier>
      <dc:date>2014-12-28T16:45:00+01:00</dc:date>
      <itunes:author>Ben H.</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Automatic detection of key-reuse vulnerabilities</itunes:subtitle>
      <itunes:summary>Using the same stream cipher key twice is known to be a Very Bad Idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. We describe a heuristic algorithm which can detect vulnerabilities of this kind. We explain the inner workings of the algorithm and demonstrate a proof-of-concept attack on sevreral examples of vulnerable data, including files encrypted by the DirCrypt malware and encrypted traffic generated by malware such as variants of Zeus and Ramnit.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6144.html
</itunes:summary>
      <itunes:duration>00:32:22</itunes:duration>
    </item>
    <item>
      <title>Krypto für die Zukunft (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6295_-_de_-_saal_2_-_201412281645_-_krypto_fur_die_zukunft_-_ruedi</link>
      <description>(K)ein kleiner Rant über Elliptische Kurven, Quantencomputer, Bitcoins und die NSA et al.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6295.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6295-de-en-Krypto_fuer_die_Zukunft_opus.opus"
        length="22020096"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6295-de-en-Krypto_fuer_die_Zukunft_opus.opus?1419881151</guid>
      <dc:identifier>oBQMMNfX5t-5TBIk3z6pOg</dc:identifier>
      <dc:date>2014-12-28T16:45:00+01:00</dc:date>
      <itunes:author>ruedi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Verteidigung gegen Dunkle Künste</itunes:subtitle>
      <itunes:summary>(K)ein kleiner Rant über Elliptische Kurven, Quantencomputer, Bitcoins und die NSA et al.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6295.html
</itunes:summary>
      <itunes:duration>00:30:51</itunes:duration>
    </item>
    <item>
      <title>Programming with dependent types in Idris (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6162_-_en_-_saal_6_-_201412281400_-_programming_with_dependent_types_in_idris_-_raichoo</link>
      <description>Idris is a relatively young research programming languages that attempts to bring dependent types to general purpose programming. In this talk I will introduce the concept of dependent types and the Curry-Howard isomorphism and how these can be applied to prove properties about software and eradicate whole classes of bugs and security issues.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6162.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6162-en-Programming_with_dependent_types_in_Idris_opus.opus"
        length="40894464"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6162-en-Programming_with_dependent_types_in_Idris_opus.opus?1419868340</guid>
      <dc:identifier>JhCUm-jQqCMx_jDfrzH24Q</dc:identifier>
      <dc:date>2014-12-28T14:00:00+01:00</dc:date>
      <itunes:author>raichoo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>Idris is a relatively young research programming languages that attempts to bring dependent types to general purpose programming. In this talk I will introduce the concept of dependent types and the Curry-Howard isomorphism and how these can be applied to prove properties about software and eradicate whole classes of bugs and security issues.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6162.html
</itunes:summary>
      <itunes:duration>00:56:44</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 2 (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6563_-_en_-_saal_g_-_201412281245_-_lightning_talks_day_2_-_gedsic</link>
      <description>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6563.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6563-en-Lightning_Talks_Day_2_opus.opus"
        length="91226112"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6563-en-Lightning_Talks_Day_2_opus.opus?1419872313</guid>
      <dc:identifier>c3efec0b-cfb1-4e59-88fd-f519dd31d9a6</dc:identifier>
      <dc:date>2014-12-28T12:45:00+01:00</dc:date>
      <itunes:author>gedsic</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Other</itunes:keywords>
      <itunes:summary>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6563.html
</itunes:summary>
      <itunes:duration>02:06:40</itunes:duration>
    </item>
    <item>
      <title>The eXperimental Robot Project (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6234_-_en_-_saal_6_-_201412271715_-_the_experimental_robot_project_-_norbert_braun_-_darthrake</link>
      <description>The talk is on the eXperimental Robot Project (XRP), a project to develop an open-hardware humanoid robot. More precisely, we are focusing on the distinguishing feature of a &lt;i&gt;humanoid&lt;/i&gt; robot - the ability to walk on two legs.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6234.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6234-en-The_eXperimental_Robot_Project_opus.opus"
        length="35651584"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6234-en-The_eXperimental_Robot_Project_opus.opus?1419852899</guid>
      <dc:identifier>hixbG3OS0o1-lkJG36qcug</dc:identifier>
      <dc:date>2014-12-27T17:15:00+01:00</dc:date>
      <itunes:author>Norbert Braun, darthrake</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>An open-hardware bipedal walking machine</itunes:subtitle>
      <itunes:summary>The talk is on the eXperimental Robot Project (XRP), a project to develop an open-hardware humanoid robot. More precisely, we are focusing on the distinguishing feature of a &lt;i&gt;humanoid&lt;/i&gt; robot - the ability to walk on two legs.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6234.html
</itunes:summary>
      <itunes:duration>00:50:23</itunes:duration>
    </item>
    <item>
      <title>Security Analysis of Estonia&#39;s Internet Voting System (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6344_-_en_-_saal_1_-_201412281400_-_security_analysis_of_estonia_s_internet_voting_system_-_j_alex_halderman</link>
      <description>Estonia is the only country in the world that relies on Internet voting in a significant way for legally-binding national elections — up to 30% of all voters cast their ballots online. This makes the security of Estonia&#39;s Internet voting system of interest to technologists and citizens the world over. Over the past year, I helped lead the first rigorous, independent security evaluation of the system, based on election observation, code review, and laboratory testing. The findings are alarming: there are staggering gaps in Estonia&#39;s procedural and operational security, and the architecture of the system leaves it open to cyberattacks from foreign powers. Our investigation confirmed the viability of these attacks in the lab, but the Estonian government has chosen to downplay them. We urgently recommend that Estonia discontinue use of the system before the country suffers a major attack.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6344.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6344-en-Security_Analysis_of_Estonias_Internet_Voting_System_opus.opus"
        length="52428800"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6344-en-Security_Analysis_of_Estonias_Internet_Voting_System_opus.opus?1419867748</guid>
      <dc:identifier>yMuYr5eW4o9FpJMw-NwXrg</dc:identifier>
      <dc:date>2014-12-28T14:00:00+01:00</dc:date>
      <itunes:author>J. Alex Halderman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Estonia is the only country in the world that relies on Internet voting in a significant way for legally-binding national elections — up to 30% of all voters cast their ballots online. This makes the security of Estonia&#39;s Internet voting system of interest to technologists and citizens the world over. Over the past year, I helped lead the first rigorous, independent security evaluation of the system, based on election observation, code review, and laboratory testing. The findings are alarming: there are staggering gaps in Estonia&#39;s procedural and operational security, and the architecture of the system leaves it open to cyberattacks from foreign powers. Our investigation confirmed the viability of these attacks in the lab, but the Estonian government has chosen to downplay them. We urgently recommend that Estonia discontinue use of the system before the country suffers a major attack.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6344.html
</itunes:summary>
      <itunes:duration>01:12:48</itunes:duration>
    </item>
    <item>
      <title>Das Transparenzportal Hamburg (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6582_-_de_-_saal_2_-_201412281600_-_das_transparenzportal_hamburg_-_lothar_hotz</link>
      <description>Im Vortrag wird die technische Umsetzung des Transparenzportals Hamburg vorgestellt.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6582.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6582-de-Das_Transparenzportal_Hamburg_opus.opus"
        length="23068672"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6582-de-Das_Transparenzportal_Hamburg_opus.opus?1419868750</guid>
      <dc:identifier>66379bd1-4e68-4bcf-9d1e-0f4c38fbe78e</dc:identifier>
      <dc:date>2014-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Lothar Hotz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Inhalt und Umsetzung</itunes:subtitle>
      <itunes:summary>Im Vortrag wird die technische Umsetzung des Transparenzportals Hamburg vorgestellt.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6582.html
</itunes:summary>
      <itunes:duration>00:32:19</itunes:duration>
    </item>
    <item>
      <title>The Cloud Conspiracy 2008-2014 (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6195_-_en_-_saal_g_-_201412272145_-_the_cloud_conspiracy_2008-2014_-_caspar_bowden</link>
      <description>In 2011 I started trying to warn EU institutions about what we now call PRISM, after working it out from open sources. Civil society, privacy regulators, and the Commission all did nothing. This is the story of exactly how they did nothing, and why, and what is happening now
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6195.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6195-en-The_Cloud_Conspiracy_2008-2014_opus.opus"
        length="45088768"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6195-en-The_Cloud_Conspiracy_2008-2014_opus.opus?1419863670</guid>
      <dc:identifier>H_jf4nwFLZMEY7zwBlrehA</dc:identifier>
      <dc:date>2014-12-27T21:45:00+01:00</dc:date>
      <itunes:author>Caspar Bowden</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>how the EU was hypnotised that the NSA did not exist</itunes:subtitle>
      <itunes:summary>In 2011 I started trying to warn EU institutions about what we now call PRISM, after working it out from open sources. Civil society, privacy regulators, and the Commission all did nothing. This is the story of exactly how they did nothing, and why, and what is happening now
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6195.html
</itunes:summary>
      <itunes:duration>01:03:32</itunes:duration>
    </item>
    <item>
      <title>Tell no-one (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6600_-_en_-_saal_2_-_201412281245_-_tell_no-one_-_james_bamford</link>
      <description>For nearly one hundred years, the NSA and its predecessors have been engaging in secret, illegal deals with the American telecom industry, with both virtually immune from prosecution.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6600.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6600-en-de-Tell_no-one_opus.opus"
        length="45088768"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6600-en-de-Tell_no-one_opus.opus?1419881215</guid>
      <dc:identifier>e8e29f6a-11df-491a-acae-1253879ae8f9</dc:identifier>
      <dc:date>2014-12-28T12:45:00+01:00</dc:date>
      <itunes:author>James Bamford</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>A century of secret deals between the NSA and the telecom industry</itunes:subtitle>
      <itunes:summary>For nearly one hundred years, the NSA and its predecessors have been engaging in secret, illegal deals with the American telecom industry, with both virtually immune from prosecution.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6600.html
</itunes:summary>
      <itunes:duration>01:02:29</itunes:duration>
    </item>
    <item>
      <title>ECCHacks (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6369_-_en_-_saal_1_-_201412272145_-_ecchacks_-_djb_-_tanja_lange</link>
      <description>This talk will explain how to work with elliptic curves constructively to obtain secure and efficient implementations, and will highlight pitfalls that must be avoided when implementing elliptic-curve crypto (ECC). The talk will also explain what all the buzz in curve choices for TLS is about. This talk does not require any prior exposure to ECC.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6369.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6369-en-ECCHacks_opus.opus"
        length="39845888"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6369-en-ECCHacks_opus.opus?1419863604</guid>
      <dc:identifier>7G4FQIXg2eb7D6F_jNwuxA</dc:identifier>
      <dc:date>2014-12-27T21:45:00+01:00</dc:date>
      <itunes:author>djb, Tanja Lange</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>A gentle introduction to elliptic-curve cryptography</itunes:subtitle>
      <itunes:summary>This talk will explain how to work with elliptic curves constructively to obtain secure and efficient implementations, and will highlight pitfalls that must be avoided when implementing elliptic-curve crypto (ECC). The talk will also explain what all the buzz in curve choices for TLS is about. This talk does not require any prior exposure to ECC.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6369.html
</itunes:summary>
      <itunes:duration>00:55:28</itunes:duration>
    </item>
    <item>
      <title>Long war tactics (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6406_-_en_-_saal_6_-_201412281645_-_long_war_tactics_-_sacha_van_geffen</link>
      <description>Referring to the seminal talk Dymaxion gave at the closing of the NoisySquare at OHM in 2013. This talk will explore what has happened and what has not in the mean time on the &quot;battle ground&quot;. An overview will be presented on the technical, legal, political and social battles going on and will provide pointers to further tactics. Finally we will look at how to make sure we keep ourselves safe and sane.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6406.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6406-en-Long_war_tactics_opus.opus"
        length="19922944"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6406-en-Long_war_tactics_opus.opus?1419868998</guid>
      <dc:identifier>oN5AzdecYPpDFbE3nkJZFg</dc:identifier>
      <dc:date>2014-12-28T16:45:00+01:00</dc:date>
      <itunes:author>Sacha van Geffen</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>or how we learned to stop worrying and love the NSA</itunes:subtitle>
      <itunes:summary>Referring to the seminal talk Dymaxion gave at the closing of the NoisySquare at OHM in 2013. This talk will explore what has happened and what has not in the mean time on the &quot;battle ground&quot;. An overview will be presented on the technical, legal, political and social battles going on and will provide pointers to further tactics. Finally we will look at how to make sure we keep ourselves safe and sane.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6406.html
</itunes:summary>
      <itunes:duration>00:28:41</itunes:duration>
    </item>
    <item>
      <title>Safer playing with lasers (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6131_-_en_-_saal_1_-_201412281600_-_safer_playing_with_lasers_-_sarah</link>
      <description>How to play with lasers without injuring Yourself and others and how to design the safety circuits of a laser system.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6131.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6131-en-de-Safer_playing_with_lasers_opus.opus"
        length="18874368"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6131-en-de-Safer_playing_with_lasers_opus.opus?1419868607</guid>
      <dc:identifier>psS7-V3-VqYDuiKCr5PmWg</dc:identifier>
      <dc:date>2014-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Sarah</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>How to play with lasers without injuring Yourself and others and how to design the safety circuits of a laser system.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6131.html
</itunes:summary>
      <itunes:duration>00:27:14</itunes:duration>
    </item>
    <item>
      <title>Crypto Tales from the Trenches (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6154_-_en_-_saal_1_-_201412272300_-_crypto_tales_from_the_trenches_-_nadia_heninger_-_julia_angwin_-_laura_poitras_-_jack_gillum</link>
      <description>Julia Angwin, Jack Gillum, and Laura Poitras will tell us stories about how they use crypto and privacy-enhancing technologies as high-profile journalists, and rant in an entertaining way about how these tools have failed or are horribly inadequate for their needs. They will also talk about their rare crypto successes.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6154.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6154-en-de-Crypto_Tales_from_the_Trenches_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6154-en-de-Crypto_Tales_from_the_Trenches_opus.opus?1419864000</guid>
      <dc:identifier>MghFmvDBS-J7T2ZOkNXUKA</dc:identifier>
      <dc:date>2014-12-27T23:00:00+01:00</dc:date>
      <itunes:author>Nadia Heninger, Julia Angwin,  Laura Poitras, Jack Gillum</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>Julia Angwin, Jack Gillum, and Laura Poitras will tell us stories about how they use crypto and privacy-enhancing technologies as high-profile journalists, and rant in an entertaining way about how these tools have failed or are horribly inadequate for their needs. They will also talk about their rare crypto successes.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6154.html
</itunes:summary>
      <itunes:duration>01:01:18</itunes:duration>
    </item>
    <item>
      <title>Rocket Kitten: Advanced Off-the-Shelf Targeted Attacks Against Nation States (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6575_-_en_-_saal_2_-_201412272300_-_rocket_kitten_advanced_off-the-shelf_targeted_attacks_against_nation_states_-_tw_-_gadi</link>
      <description>Rocket Kitten is an advanced APT set of campaigns, with a twist - off-the-shelf malware that won’t shame a nation state. The talk will combine an assessment of the threat group’s modus operandi with a technical deep dive. Prepare for some hex dumps.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6575.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6575-en-Rocket_Kitten_Advanced_Off-the-Shelf_Targeted_Attacks_Against_Nation_States_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6575-en-Rocket_Kitten_Advanced_Off-the-Shelf_Targeted_Attacks_Against_Nation_States_opus.opus?1419897167</guid>
      <dc:identifier>67baa392-2af9-4213-a9ce-bf63331d43a4</dc:identifier>
      <dc:date>2014-12-27T23:00:00+01:00</dc:date>
      <itunes:author>tw, gadi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>A Deep Technical Analysis</itunes:subtitle>
      <itunes:summary>Rocket Kitten is an advanced APT set of campaigns, with a twist - off-the-shelf malware that won’t shame a nation state. The talk will combine an assessment of the threat group’s modus operandi with a technical deep dive. Prepare for some hex dumps.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6575.html
</itunes:summary>
      <itunes:duration>01:01:26</itunes:duration>
    </item>
    <item>
      <title>SS7map : mapping vulnerability of the international mobile roaming infrastructure (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6531_-_en_-_saal_6_-_201412272300_-_ss7map_mapping_vulnerability_of_the_international_mobile_roaming_infrastructure_-_laurent_ghigonis_-_alexandre_de_oliveira</link>
      <description>SS7 has been shown repeatedly as an insecure protocol: spoofing, faking, crash through fuzzing, fraud. The main question of our study is to determine how this insecurity is mitigated by network operator’s action to prevent compromise on both network exposure of infrastructure and privacy compromise of subscribers. It&#39;s why we wanted to come out with SS7map.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6531.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6531-en-SS7map_mapping_vulnerability_of_the_international_mobile_roaming_infrastructure_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6531-en-SS7map_mapping_vulnerability_of_the_international_mobile_roaming_infrastructure_opus.opus?1419864263</guid>
      <dc:identifier>13hAy7IIWod2RIuLMvnELw</dc:identifier>
      <dc:date>2014-12-27T23:00:00+01:00</dc:date>
      <itunes:author>Laurent Ghigonis, Alexandre De Oliveira</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>SS7 has been shown repeatedly as an insecure protocol: spoofing, faking, crash through fuzzing, fraud. The main question of our study is to determine how this insecurity is mitigated by network operator’s action to prevent compromise on both network exposure of infrastructure and privacy compromise of subscribers. It&#39;s why we wanted to come out with SS7map.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6531.html
</itunes:summary>
      <itunes:duration>01:00:46</itunes:duration>
    </item>
    <item>
      <title>Cyber Necromancy (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_5956_-_en_-_saal_2_-_201412281400_-_cyber_necromancy_-_joseph_tartaro_-_matthew_halchyshak</link>
      <description>Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this talk we go into the gruesome details of how we dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch together the pieces necessary to bring our favorite game Metal Gear Online back to life.

We will be examining the process of reverse engineering the games custom network protocols in all angles from packet logs to low level disassembly of client code.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5956.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-5956-en-Cyber_Necromancy_opus.opus"
        length="39845888"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-5956-en-Cyber_Necromancy_opus.opus?1419868008</guid>
      <dc:identifier>ELK9-ZQeFcqKxBYW8eay8g</dc:identifier>
      <dc:date>2014-12-28T14:00:00+01:00</dc:date>
      <itunes:author>Joseph Tartaro, Matthew Halchyshak</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Reverse Engineering Dead Protocols</itunes:subtitle>
      <itunes:summary>Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this talk we go into the gruesome details of how we dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch together the pieces necessary to bring our favorite game Metal Gear Online back to life.

We will be examining the process of reverse engineering the games custom network protocols in all angles from packet logs to low level disassembly of client code.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5956.html
</itunes:summary>
      <itunes:duration>00:55:46</itunes:duration>
    </item>
    <item>
      <title>Beyond PNR: Exploring airline systems (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6308_-_en_-_saal_1_-_201412281245_-_beyond_pnr_exploring_airline_systems_-_saper</link>
      <description>Ever wondered what the cryptic &lt;code&gt;QNY27R&lt;/code&gt; on your airline reservaton means? This talk explores typical computing environment as seen in the air transport industry. Discover ancient software, old communication protocols and cryptic systems. What data are stored and how they are exchanged to keep the air transport industry running. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6308.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6308-en-Beyond_PNR_Exploring_airline_systems_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6308-en-Beyond_PNR_Exploring_airline_systems_opus.opus?1419866404</guid>
      <dc:identifier>DvpNPWPGVgSqGcOI1WK45g</dc:identifier>
      <dc:date>2014-12-28T12:45:00+01:00</dc:date>
      <itunes:author>saper</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>Ever wondered what the cryptic &lt;code&gt;QNY27R&lt;/code&gt; on your airline reservaton means? This talk explores typical computing environment as seen in the air transport industry. Discover ancient software, old communication protocols and cryptic systems. What data are stored and how they are exchanged to keep the air transport industry running. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6308.html
</itunes:summary>
      <itunes:duration>00:59:44</itunes:duration>
    </item>
    <item>
      <title>Serenität – Anleitung zum Glücklichsein (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6244_-_de_-_saal_6_-_201412281245_-_serenitat_anleitung_zum_glucklichsein_-_elektra_-_andrea_behrendt_-_read_delete</link>
      <description>Die radikalen philosophischen Texte von Elektra W. haben das Ziel - seien wir offen und direkt - einen Headcrash des Ich-Erlebens herbeizuführen, das sich im Laufe unserer Enkulturation und Erziehung im Vorderlappen des Großhirns breit gemacht hat. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6244.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6244-de-Serenitaet_-_Anleitung_zum_Gluecklichsein_opus.opus"
        length="31457280"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6244-de-Serenitaet_-_Anleitung_zum_Gluecklichsein_opus.opus?1419867415</guid>
      <dc:identifier>Fj7J1P7FKCiWEl7lIaDaXg</dc:identifier>
      <dc:date>2014-12-28T12:45:00+01:00</dc:date>
      <itunes:author>Elektra, Andrea Behrendt - read &amp; delete</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Das Duo &#39;read &amp; delete&#39; präsentiert radikale philosophische Texte mit musikalischer Begleitung</itunes:subtitle>
      <itunes:summary>Die radikalen philosophischen Texte von Elektra W. haben das Ziel - seien wir offen und direkt - einen Headcrash des Ich-Erlebens herbeizuführen, das sich im Laufe unserer Enkulturation und Erziehung im Vorderlappen des Großhirns breit gemacht hat. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6244.html
</itunes:summary>
      <itunes:duration>00:45:10</itunes:duration>
    </item>
    <item>
      <title>From Maxwell to antenna arrays (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6361_-_en_-_saal_g_-_201412272300_-_from_maxwell_to_antenna_arrays_-_friederike</link>
      <description>Maxwell&#39;s  equations are four differential equations which form the foundation of classical electrodynamics, classical optics, and electric circuits. This talk will take a look at the connection between these equations, wave propagation and antenna arrays.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6361.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6361-en-From_Maxwell_to_antenna_arrays_opus.opus"
        length="37748736"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6361-en-From_Maxwell_to_antenna_arrays_opus.opus?1419864568</guid>
      <dc:identifier>AvAdq20cdc8iWoNubd6ABw</dc:identifier>
      <dc:date>2014-12-27T23:00:00+01:00</dc:date>
      <itunes:author>Friederike</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>How 150 year old equations still help to communicate</itunes:subtitle>
      <itunes:summary>Maxwell&#39;s  equations are four differential equations which form the foundation of classical electrodynamics, classical optics, and electric circuits. This talk will take a look at the connection between these equations, wave propagation and antenna arrays.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6361.html
</itunes:summary>
      <itunes:duration>00:53:47</itunes:duration>
    </item>
    <item>
      <title>From Computation to Consciousness (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6573_-_en_-_saal_2_-_201412281130_-_from_computation_to_consciousness_-_joscha</link>
      <description>How can the physical universe give rise to a mind? I suggest to replace this confusing question by another one: what kind of information processing system is the mind, and how is the mind computed? As we will see, even our ideas of the physical universe turn out to be computational. Let us explore some fascinating scenery of the philosophy underlying Artificial Intelligence.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6573.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6573-en-de-From_Computation_to_Consciousness_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6573-en-de-From_Computation_to_Consciousness_opus.opus?1419865399</guid>
      <dc:identifier>1116a02b-0312-4949-9921-d605148bfccb</dc:identifier>
      <dc:date>2014-12-28T11:30:00+01:00</dc:date>
      <itunes:author>Joscha</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>How computation helps to explain mind, universe and everything</itunes:subtitle>
      <itunes:summary>How can the physical universe give rise to a mind? I suggest to replace this confusing question by another one: what kind of information processing system is the mind, and how is the mind computed? As we will see, even our ideas of the physical universe turn out to be computational. Let us explore some fascinating scenery of the philosophy underlying Artificial Intelligence.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6573.html
</itunes:summary>
      <itunes:duration>01:00:42</itunes:duration>
    </item>
    <item>
      <title>Switches Get Stitches (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6196_-_en_-_saal_1_-_201412281130_-_switches_get_stitches_-_eireann_leverett</link>
      <description>This talk will introduce you to Industrial Ethernet Switches and their vulnerabilities. These are switches used in industrial environments, like substations, factories, refineries, ports, or other other homes of industrial automation. In other words: DCS, PCS, ICS &amp; SCADA switches. It is a very good companion talk to Damn Vulnerable Chemical Process? Own your own critical infrastructures today!
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6196.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6196-en-Switches_Get_Stitches_opus.opus"
        length="41943040"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6196-en-Switches_Get_Stitches_opus.opus?1419865192</guid>
      <dc:identifier>Km3oA97mSXAMOZGte_v8Fg</dc:identifier>
      <dc:date>2014-12-28T11:30:00+01:00</dc:date>
      <itunes:author>Eireann Leverett</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Industrial System Ownership</itunes:subtitle>
      <itunes:summary>This talk will introduce you to Industrial Ethernet Switches and their vulnerabilities. These are switches used in industrial environments, like substations, factories, refineries, ports, or other other homes of industrial automation. In other words: DCS, PCS, ICS &amp; SCADA switches. It is a very good companion talk to Damn Vulnerable Chemical Process? Own your own critical infrastructures today!
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6196.html
</itunes:summary>
      <itunes:duration>00:58:14</itunes:duration>
    </item>
    <item>
      <title>Uncaging Microchips (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6084_-_en_-_saal_6_-_201412281130_-_uncaging_microchips_-_peter_laackmann_-_marcus_janke</link>
      <description>An entertaining, thrilling and educational journey through the world of chip preparation. Deep insight into amateur- as well as professional methods and equipment is given, for the first, most important steps for analysis and attacks on dedicated hardware.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6084.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6084-en-Uncaging_Microchips_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6084-en-Uncaging_Microchips_opus.opus?1419865759</guid>
      <dc:identifier>hnRe8t6JYI_8PYnFh-dsug</dc:identifier>
      <dc:date>2014-12-28T11:30:00+01:00</dc:date>
      <itunes:author>Peter Laackmann, Marcus Janke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Techniques for Chip Preparation</itunes:subtitle>
      <itunes:summary>An entertaining, thrilling and educational journey through the world of chip preparation. Deep insight into amateur- as well as professional methods and equipment is given, for the first, most important steps for analysis and attacks on dedicated hardware.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6084.html
</itunes:summary>
      <itunes:duration>01:01:46</itunes:duration>
    </item>
    <item>
      <title>Why is GPG &quot;damn near unusable&quot;? (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6021_-_en_-_saal_g_-_201412281130_-_why_is_gpg_damn_near_unusable_-_arne_padmos</link>
      <description>GPG has been correctly described as &quot;damn near unusable&quot;. Why is this so? What does research into usable security tell us? This talk covers the history, methods, and findings of the research field, as well as proposed solutions and open questions.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6021.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6021-en-de-Why_is_GPG_damn_near_unusable_opus.opus"
        length="40894464"
        type="audio/opus"/>
      <pubDate>Sun, 28 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6021-en-de-Why_is_GPG_damn_near_unusable_opus.opus?1419866212</guid>
      <dc:identifier>XGqu620EKR92-WUWMXNRvA</dc:identifier>
      <dc:date>2014-12-28T11:30:00+01:00</dc:date>
      <itunes:author>Arne Padmos</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>An overview of usable security research</itunes:subtitle>
      <itunes:summary>GPG has been correctly described as &quot;damn near unusable&quot;. Why is this so? What does research into usable security tell us? This talk covers the history, methods, and findings of the research field, as well as proposed solutions and open questions.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6021.html
</itunes:summary>
      <itunes:duration>00:57:42</itunes:duration>
    </item>
    <item>
      <title>(In)Security of Mobile Banking (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6530_-_en_-_saal_6_-_201412272145_-_in_security_of_mobile_banking_-_ericfiliol_-_paul_irolla</link>
      <description>This talk presents a deep analysis of banking mobile apps available in the world. Based on static and dynamic analysis as well as on the analysis of the final source code we show that a vast majority of them are not respecting users&#39; privacy and users&#39; data protection. Worse a few of them contains critical bugs
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6530.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6530-en-In_Security_of_Mobile_Banking_opus.opus"
        length="40894464"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6530-en-In_Security_of_Mobile_Banking_opus.opus?1419863857</guid>
      <dc:identifier>P27IBlfmjGfZIib1deB_xg</dc:identifier>
      <dc:date>2014-12-27T21:45:00+01:00</dc:date>
      <itunes:author>ericfiliol, Paul Irolla</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>This talk presents a deep analysis of banking mobile apps available in the world. Based on static and dynamic analysis as well as on the analysis of the final source code we show that a vast majority of them are not respecting users&#39; privacy and users&#39; data protection. Worse a few of them contains critical bugs
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6530.html
</itunes:summary>
      <itunes:duration>00:56:18</itunes:duration>
    </item>
    <item>
      <title>AMD x86 SMU firmware analysis (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6103_-_en_-_saal_2_-_201412272145_-_amd_x86_smu_firmware_analysis_-_rudolf_marek</link>
      <description>You definitely should care. The aim of this talk is to provide insight to the  security, architecture and yes you guessed it, vulnerability of the AMD System Management Unit (SMU) firmware found in modern AMD x86 processors.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6103.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6103-en-AMD_x86_SMU_firmware_analysis_opus.opus"
        length="38797312"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6103-en-AMD_x86_SMU_firmware_analysis_opus.opus?1419863793</guid>
      <dc:identifier>_lVlmBO98KMg4M-n-_A3FA</dc:identifier>
      <dc:date>2014-12-27T21:45:00+01:00</dc:date>
      <itunes:author>Rudolf Marek</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Do you care about Matroshka processors?</itunes:subtitle>
      <itunes:summary>You definitely should care. The aim of this talk is to provide insight to the  security, architecture and yes you guessed it, vulnerability of the AMD System Management Unit (SMU) firmware found in modern AMD x86 processors.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6103.html
</itunes:summary>
      <itunes:duration>00:53:58</itunes:duration>
    </item>
    <item>
      <title>Rocket science – how hard can it be? (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6180_-_en_-_saal_2_-_201412271830_-_rocket_science_how_hard_can_it_be_-_david_madlener</link>
      <description>Three years have elapsed since the call for a &quot;Hacker Space Program&quot; during the Chaos Communication Camp 2011. In this lecture we will review the basics of space flight, discuss common problems and pitfalls encountered by a practitioner on the way to orbit, and report on the state of our sounding rocket program.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6180.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6180-en-de-Rocket_science_-_how_hard_can_it_be_opus.opus"
        length="46137344"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6180-en-de-Rocket_science_-_how_hard_can_it_be_opus.opus?1419854226</guid>
      <dc:identifier>oI8n77eKy3Uz2Fklmk4hVQ</dc:identifier>
      <dc:date>2014-12-27T18:30:00+01:00</dc:date>
      <itunes:author>David Madlener</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>First steps into space with sounding rockets</itunes:subtitle>
      <itunes:summary>Three years have elapsed since the call for a &quot;Hacker Space Program&quot; during the Chaos Communication Camp 2011. In this lecture we will review the basics of space flight, discuss common problems and pitfalls encountered by a practitioner on the way to orbit, and report on the state of our sounding rocket program.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6180.html
</itunes:summary>
      <itunes:duration>01:04:55</itunes:duration>
    </item>
    <item>
      <title>Towards General Purpose Reconfigurable Computing on Novena (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6412_-_en_-_saal_6_-_201412272030_-_towards_general_purpose_reconfigurable_computing_on_novena_-_stars_-_andy_isaacson</link>
      <description>The Novena open source laptop contains a FPGA, but free software support for FPGAs is lacking and requires root access to the hardware.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6412.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6412-en-Towards_General_Purpose_Reconfigurable_Computing_on_Novena_opus.opus"
        length="41943040"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6412-en-Towards_General_Purpose_Reconfigurable_Computing_on_Novena_opus.opus?1419870262</guid>
      <dc:identifier>qdo1rVjUVrQBHvjWYYx8sQ</dc:identifier>
      <dc:date>2014-12-27T20:30:00+01:00</dc:date>
      <itunes:author>stars, Andy Isaacson</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>FPGAs for Everybody with Novena</itunes:subtitle>
      <itunes:summary>The Novena open source laptop contains a FPGA, but free software support for FPGAs is lacking and requires root access to the hardware.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6412.html
</itunes:summary>
      <itunes:duration>00:59:28</itunes:duration>
    </item>
    <item>
      <title>Code Pointer Integrity (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6050_-_en_-_saal_g_-_201412272030_-_code_pointer_integrity_-_gannimo</link>
      <description>Programs are full of bugs, leading to vulnerabilities. We&#39;ll discuss power and limitations of code-pointer integrity (CPI), a strong but practical security policy that enforces memory safety for all code pointers, protecting against any form of control-flow hijack attack (e. g., ROP or JOP).

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6050.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6050-en-Code_Pointer_Integrity_opus.opus"
        length="44040192"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6050-en-Code_Pointer_Integrity_opus.opus?1419775047</guid>
      <dc:identifier>n2DFvyl_lWjW-gm317vT3A</dc:identifier>
      <dc:date>2014-12-27T20:30:00+01:00</dc:date>
      <itunes:author>gannimo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>... or how we battle the daemons of memory safety</itunes:subtitle>
      <itunes:summary>Programs are full of bugs, leading to vulnerabilities. We&#39;ll discuss power and limitations of code-pointer integrity (CPI), a strong but practical security policy that enforces memory safety for all code pointers, protecting against any form of control-flow hijack attack (e. g., ROP or JOP).

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6050.html
</itunes:summary>
      <itunes:duration>01:01:15</itunes:duration>
    </item>
    <item>
      <title>Mobile self-defense (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6122_-_en_-_saal_1_-_201412271830_-_mobile_self-defense_-_karsten_nohl</link>
      <description>We know that mobile networks can — and do — attack us on many fronts. As this talk will show, even 3G is attackable. It’s high time that we upgrade from complaining to self-defense.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6122.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6122-en-de-Mobile_self-defense_opus.opus"
        length="46137344"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6122-en-de-Mobile_self-defense_opus.opus?1419775405</guid>
      <dc:identifier>szHEwO2pazLIG7w8wQTa1w</dc:identifier>
      <dc:date>2014-12-27T18:30:00+01:00</dc:date>
      <itunes:author>Karsten Nohl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>We know that mobile networks can — and do — attack us on many fronts. As this talk will show, even 3G is attackable. It’s high time that we upgrade from complaining to self-defense.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6122.html
</itunes:summary>
      <itunes:duration>01:03:49</itunes:duration>
    </item>
    <item>
      <title>SS7: Locate. Track. Manipulate. (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6249_-_en_-_saal_1_-_201412271715_-_ss7_locate_track_manipulate_-_tobias_engel</link>
      <description>Companies are now selling the ability to track your phone number whereever you go. With a precision of up to 50 meters, detailed movement profiles can be compiled by somebody from the other side of the world without you ever knowing about it. But that is just the tip of the iceberg.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6249.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6249-en-de-SS7_Locate_Track_Manipulate_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6249-en-de-SS7_Locate_Track_Manipulate_opus.opus?1419821656</guid>
      <dc:identifier>-n9QScyDLXMEwkqrCHASYw</dc:identifier>
      <dc:date>2014-12-27T17:15:00+01:00</dc:date>
      <itunes:author>Tobias Engel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>You have a tracking device in your pocket</itunes:subtitle>
      <itunes:summary>Companies are now selling the ability to track your phone number whereever you go. With a precision of up to 50 meters, detailed movement profiles can be compiled by somebody from the other side of the world without you ever knowing about it. But that is just the tip of the iceberg.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6249.html
</itunes:summary>
      <itunes:duration>01:00:47</itunes:duration>
    </item>
    <item>
      <title>Glitching For n00bs (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6499_-_en_-_saal_2_-_201412271715_-_glitching_for_n00bs_-_exide</link>
      <description>Despite claims of its obsolescence, electrical glitching can be a viable attack vector against some ICs. This presentation chronicles a quest to learn what types of electrical transients can be introduced into an integrated circuit to cause a variety of circuit faults advantageous to an reverser. Several hardware platforms were constructed during the quest to aid in research, including old-skool &amp; solderless breadboards, photo-etched &amp; professional PCBs, FPGAs, and cheap &amp; dirty homemade logic analyzers. The strengths and weaknesses of the various approaches will be discussed.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6499.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6499-en-Glitching_For_n00bs_opus.opus"
        length="42991616"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6499-en-Glitching_For_n00bs_opus.opus?1419819603</guid>
      <dc:identifier>Bnz1quB2NHq9BEXoyNm5xQ</dc:identifier>
      <dc:date>2014-12-27T17:15:00+01:00</dc:date>
      <itunes:author>exide</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>A Journey to Coax Out Chips&#39; Inner Secrets</itunes:subtitle>
      <itunes:summary>Despite claims of its obsolescence, electrical glitching can be a viable attack vector against some ICs. This presentation chronicles a quest to learn what types of electrical transients can be introduced into an integrated circuit to cause a variety of circuit faults advantageous to an reverser. Several hardware platforms were constructed during the quest to aid in research, including old-skool &amp; solderless breadboards, photo-etched &amp; professional PCBs, FPGAs, and cheap &amp; dirty homemade logic analyzers. The strengths and weaknesses of the various approaches will be discussed.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6499.html
</itunes:summary>
      <itunes:duration>00:58:43</itunes:duration>
    </item>
    <item>
      <title>osmo-gmr: What&#39;s up with sat-phones ? (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6267_-_en_-_saal_g_-_201412271600_-_osmo-gmr_what_s_up_with_sat-phones_-_sylvain_munaut</link>
      <description>At 28C3 we introduced the very first steps of the osmo-gmr projects. During this talk, we will present the various advances that have been made in this project on various aspects (voice codec, crypto algorithm, ...)
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6267.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6267-en-osmo-gmr_Whats_up_with_sat-phones_opus.opus"
        length="41943040"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6267-en-osmo-gmr_Whats_up_with_sat-phones_opus.opus?1419819383</guid>
      <dc:identifier>E95sP8WH8tLiiJj2SBAA1A</dc:identifier>
      <dc:date>2014-12-27T16:00:00+01:00</dc:date>
      <itunes:author>Sylvain Munaut</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>Piecing together the missing bits</itunes:subtitle>
      <itunes:summary>At 28C3 we introduced the very first steps of the osmo-gmr projects. During this talk, we will present the various advances that have been made in this project on various aspects (voice codec, crypto algorithm, ...)
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6267.html
</itunes:summary>
      <itunes:duration>00:57:56</itunes:duration>
    </item>
    <item>
      <title>Revisiting SSL/TLS Implementations (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_5960_-_en_-_saal_2_-_201412271600_-_revisiting_ssl_tls_implementations_-_sebastian_schinzel</link>
      <description>We present four new Bleichenbacher side channels, and three successful Bleichenbacher attacks against the Java Secure Socket Extension (JSSE) SSL/TLS implementation and against hardware security appliances using the Cavium NITROX SSL accelerator chip.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5960.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-5960-en-Revisiting_SSL_TLS_Implementations_opus.opus"
        length="39845888"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-5960-en-Revisiting_SSL_TLS_Implementations_opus.opus?1419818695</guid>
      <dc:identifier>HLDDEFxCxCrQryx8fEacZw</dc:identifier>
      <dc:date>2014-12-27T16:00:00+01:00</dc:date>
      <itunes:author>Sebastian Schinzel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:subtitle>New Bleichenbacher Side Channels and Attacks</itunes:subtitle>
      <itunes:summary>We present four new Bleichenbacher side channels, and three successful Bleichenbacher attacks against the Java Secure Socket Extension (JSSE) SSL/TLS implementation and against hardware security appliances using the Cavium NITROX SSL accelerator chip.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5960.html
</itunes:summary>
      <itunes:duration>00:55:45</itunes:duration>
    </item>
    <item>
      <title>Practical EMV PIN interception and fraud detection (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6120_-_en_-_saal_1_-_201412271600_-_practical_emv_pin_interception_and_fraud_detection_-_andrea_barisani</link>
      <description>This talks follows our previous EMV research uncovering new findings as well as a detailed analysis of Chip &amp; PIN fraud markers in order to benefit cardholders, as well as issuing banks, in preventing wrongful liability for fraudulent charges.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6120.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6120-en-Practical_EMV_PIN_interception_and_fraud_detection_opus.opus"
        length="41943040"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6120-en-Practical_EMV_PIN_interception_and_fraud_detection_opus.opus?1419775045</guid>
      <dc:identifier>J9UXjl3ggsIGnkIJSxSxmw</dc:identifier>
      <dc:date>2014-12-27T16:00:00+01:00</dc:date>
      <itunes:author>Andrea Barisani</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>This talks follows our previous EMV research uncovering new findings as well as a detailed analysis of Chip &amp; PIN fraud markers in order to benefit cardholders, as well as issuing banks, in preventing wrongful liability for fraudulent charges.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6120.html
</itunes:summary>
      <itunes:duration>00:58:23</itunes:duration>
    </item>
    <item>
      <title>3D Casting Aluminum (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6417_-_en_-_saal_g_-_201412271245_-_3d_casting_aluminum_-_julia_longtin</link>
      <description>We use microwaves to cast aluminum from 3D printed objects. This gives us the ability to cast high quality 6040 aluminum pieces using a 3D printer and commercially available consumer microwaves. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6417.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6417-en-3D_Casting_Aluminum_opus.opus"
        length="39845888"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6417-en-3D_Casting_Aluminum_opus.opus?1421143153</guid>
      <dc:identifier>SXxWu-U4pNjjFZLl9XXDDA</dc:identifier>
      <dc:date>2014-12-27T12:45:00+01:00</dc:date>
      <itunes:author>Julia Longtin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Too Much Fun with Microwaves</itunes:subtitle>
      <itunes:summary>We use microwaves to cast aluminum from 3D printed objects. This gives us the ability to cast high quality 6040 aluminum pieces using a 3D printer and commercially available consumer microwaves. 
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6417.html
</itunes:summary>
      <itunes:duration>00:55:49</itunes:duration>
    </item>
    <item>
      <title>How I Learned to Stop Reinventing and Love the Wheels (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6077_-_en_-_saal_6_-_201412271600_-_how_i_learned_to_stop_reinventing_and_love_the_wheels_-_andreas_bihlmaier</link>
      <description>An introduction to the Robot Operating System (ROS) for the home/hackerspace roboticist (if it physically interacts with the world through code, call it robot).
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6077.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6077-en-How_I_Learned_to_Stop_Reinventing_and_Love_the_Wheels_opus.opus"
        length="39845888"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6077-en-How_I_Learned_to_Stop_Reinventing_and_Love_the_Wheels_opus.opus?1419819112</guid>
      <dc:identifier>0CpZm9-0S1ja92XDOICX0Q</dc:identifier>
      <dc:date>2014-12-27T16:00:00+01:00</dc:date>
      <itunes:author>Andreas Bihlmaier</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>or having FUN with (home/hackerspace) robotics</itunes:subtitle>
      <itunes:summary>An introduction to the Robot Operating System (ROS) for the home/hackerspace roboticist (if it physically interacts with the world through code, call it robot).
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6077.html
</itunes:summary>
      <itunes:duration>00:57:05</itunes:duration>
    </item>
    <item>
      <title>Personal Tracking Devices and Online Identity (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6100_-_en_-_saal_6_-_201412271245_-_personal_tracking_devices_and_online_identity_-_silvia</link>
      <description>In the post-NSA world it is important to understand the magnitude of our online activities in order to take informative decisions on our ubiquitous shared lives.

Personal Tracking Devices is the result of a two years long study on tracking technologies and the inherent nature of the web and telecommunication networks in general.

The study, conducted as part of Ph.D. research in privacy and security at UPC Barcelona Tech, collected a large amount of metadata to raise awareness on the footprints left by users on the web and through mobile apps.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6100.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6100-en-Personal_Tracking_Devices_and_Online_Identity_opus.opus"
        length="28311552"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6100-en-Personal_Tracking_Devices_and_Online_Identity_opus.opus?1419773316</guid>
      <dc:identifier>NjtxGgpt76NkFb1Q4LLjvg</dc:identifier>
      <dc:date>2014-12-27T12:45:00+01:00</dc:date>
      <itunes:author>Silvia</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>In the post-NSA world it is important to understand the magnitude of our online activities in order to take informative decisions on our ubiquitous shared lives.

Personal Tracking Devices is the result of a two years long study on tracking technologies and the inherent nature of the web and telecommunication networks in general.

The study, conducted as part of Ph.D. research in privacy and security at UPC Barcelona Tech, collected a large amount of metadata to raise awareness on the footprints left by users on the web and through mobile apps.

about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6100.html
</itunes:summary>
      <itunes:duration>00:40:16</itunes:duration>
    </item>
    <item>
      <title>SCADA StrangeLove: Too Smart Grid in da Cloud (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6010_-_en_-_saal_1_-_201412271400_-_scada_strangelove_too_smart_grid_in_da_cloud_-_sergey_gordeychik_-_aleksandr_timorin</link>
      <description>For two years SCADA StrangeLove speaks about Industrial Control Systems and nuclear plants. This year we want to discuss Green Energy. Our hackers&#39; vision of Green Energy, SmartGrids and Cloud IoT technology.
We will also speak about the security problems of traditional &quot;heavy&quot; industrial solutions, about the things that Zurich Airport and Large Hadron Collider have in common 

On top of it you will learn about our new releases, some funny and not so funny stories about discovery and fixing of vulnerabilities and the latest news from the front struggling for the Purity of Essence.​
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6010.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6010-en-SCADA_StrangeLove_Too_Smart_Grid_in_da_Cloud_opus.opus"
        length="33554432"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6010-en-SCADA_StrangeLove_Too_Smart_Grid_in_da_Cloud_opus.opus?1419774319</guid>
      <dc:identifier>OQzXwQcnHSLD9Qd7Iu7Rqw</dc:identifier>
      <dc:date>2014-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Sergey Gordeychik, Aleksandr Timorin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security &amp; Hacking</itunes:keywords>
      <itunes:summary>For two years SCADA StrangeLove speaks about Industrial Control Systems and nuclear plants. This year we want to discuss Green Energy. Our hackers&#39; vision of Green Energy, SmartGrids and Cloud IoT technology.
We will also speak about the security problems of traditional &quot;heavy&quot; industrial solutions, about the things that Zurich Airport and Large Hadron Collider have in common 

On top of it you will learn about our new releases, some funny and not so funny stories about discovery and fixing of vulnerabilities and the latest news from the front struggling for the Purity of Essence.​
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6010.html
</itunes:summary>
      <itunes:duration>00:47:35</itunes:duration>
    </item>
    <item>
      <title>„Wir beteiligen uns aktiv an den Diskussionen“ (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6264_-_de_-_saal_1_-_201412271245_-_wir_beteiligen_uns_aktiv_an_den_diskussionen_-_martin_haase_maha</link>
      <description>Im Sommer 2014 wurde die sogenannte Digitale „Agenda“ vorgestellt, die als „netzpolitisches Regierungsprogramm“ bezeichnet wurde. Aus texttypologischer Sicht handelt es sich aber eher um einen PR-Text, der so aussieht, als sei er ein Auszug aus einer Wahlkampfbroschüre. Der Vortrag analysiert den Text zunächst inhaltlich, um zu zeigen, worum es im Einzelnen geht und wo Widersprüche auftauchen, dann aus textkritischer und aus linguistischer Perspektive. Insbesondere werden bestimmte Interessen der Bundesregierung und anderer Akteure deutlich, die weniger offen thematisiert werden, aber doch sprachlich zu Tage treten.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6264.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6264-de-en-Wir_beteiligen_uns_aktiv_an_den_Diskussionen_opus.opus"
        length="45088768"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6264-de-en-Wir_beteiligen_uns_aktiv_an_den_Diskussionen_opus.opus?1419773623</guid>
      <dc:identifier>HOqeNIb6G7M4hYFKFRkCmQ</dc:identifier>
      <dc:date>2014-12-27T12:45:00+01:00</dc:date>
      <itunes:author>Martin Haase/maha</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Die digitale „Agenda“ der Bundesregierung aus inhaltlicher, philologischer und linguistischer Perspektive</itunes:subtitle>
      <itunes:summary>Im Sommer 2014 wurde die sogenannte Digitale „Agenda“ vorgestellt, die als „netzpolitisches Regierungsprogramm“ bezeichnet wurde. Aus texttypologischer Sicht handelt es sich aber eher um einen PR-Text, der so aussieht, als sei er ein Auszug aus einer Wahlkampfbroschüre. Der Vortrag analysiert den Text zunächst inhaltlich, um zu zeigen, worum es im Einzelnen geht und wo Widersprüche auftauchen, dann aus textkritischer und aus linguistischer Perspektive. Insbesondere werden bestimmte Interessen der Bundesregierung und anderer Akteure deutlich, die weniger offen thematisiert werden, aber doch sprachlich zu Tage treten.
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6264.html
</itunes:summary>
      <itunes:duration>01:02:47</itunes:duration>
    </item>
    <item>
      <title>31C3 Keynote (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6571_-_en_-_saal_1_-_201412271130_-_31c3_keynote_-_alecempire</link>
      <description>The 31C3 Keynote
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6571.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6571-en-31C3_Keynote_opus.opus"
        length="47185920"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6571-en-31C3_Keynote_opus.opus?1419796592</guid>
      <dc:identifier>8c4e647f-813e-41ef-b05b-65469dd841c3</dc:identifier>
      <dc:date>2014-12-27T11:30:00+01:00</dc:date>
      <itunes:author>alecempire</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:subtitle>A New Dawn</itunes:subtitle>
      <itunes:summary>The 31C3 Keynote
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6571.html
</itunes:summary>
      <itunes:duration>01:06:17</itunes:duration>
    </item>
    <item>
      <title>31C3 Opening Event (31c3)</title>
      <link>https://media.ccc.de/v/31c3_-_6561_-_en_-_saal_1_-_201412271100_-_31c3_opening_event_-_erdgeist_-_geraldine_de_bastion</link>
      <description>
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6561.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2014/opus/31c3-6561-en-31C3_Opening_Event_opus.opus"
        length="17825792"
        type="audio/opus"/>
      <pubDate>Sat, 27 Dec 2014 11:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2014/opus/31c3-6561-en-31C3_Opening_Event_opus.opus?1419795252</guid>
      <dc:identifier>29aecfd7-2e44-4f49-ab86-29b5e0877325</dc:identifier>
      <dc:date>2014-12-27T11:00:00+01:00</dc:date>
      <itunes:author>erdgeist, Geraldine de Bastion</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6561.html
</itunes:summary>
      <itunes:duration>00:25:19</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/congress/2014/folder-2014.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from 31c3 as opus</itunes:summary>
  </channel>
</rss>