<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - 32C3: gated communities (high quality mp4)</title>
    <link>https://media.ccc.de/c/32c3</link>
    <description> This feed contains all events from 32c3 as mp4</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:43:51 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/congress/2015/32c3_logo.png</url>
      <title>Chaos Computer Club - 32C3: gated communities (high quality mp4)</title>
      <link>https://media.ccc.de/c/32c3</link>
    </image>
    <item>
      <title>State of the Internat AS201701 - Freifunk Rheinland e.V. Backbone (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7xx1-state_of_the_interNAT_AS201701</link>
      <description>&lt;p&gt;The Backbone team from AS201701 (Freifunk Rheinland e.V.) gives an update about peering, future planning for 2016 and a summary about things going on in 2015.&lt;/p&gt;
about this event: 
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7XX1-deu-State_of_the_Internat_AS201701_-_Freifunk_Rheinland_eV_Backbone_hd.mp4"
        length="1395654656"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 20:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7XX1-deu-State_of_the_Internat_AS201701_-_Freifunk_Rheinland_eV_Backbone_hd.mp4?1452625021</guid>
      <dc:identifier>c02bd379-1017-4bf2-88d0-cef5b8df9af0</dc:identifier>
      <dc:date>2015-12-29T20:00:00+01:00</dc:date>
      <itunes:author>Takt, Barbarossa, ThomasDOTwtf, Lars</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>32c3</itunes:keywords>
      <itunes:summary>&lt;p&gt;The Backbone team from AS201701 (Freifunk Rheinland e.V.) gives an update about peering, future planning for 2016 and a summary about things going on in 2015.&lt;/p&gt;
about this event: 
</itunes:summary>
      <itunes:duration>01:09:25</itunes:duration>
    </item>
    <item>
      <title>Buffering sucks! (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7530-buffering_sucks</link>
      <description>&lt;p&gt;Buffering sucks! Why we see regular buffering when watching online video. What internet service providers could do to reduce buffering and why big players refuse to act. An attempt of calculating the economic cost of buffering.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7530.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7530-en-Buffering_sucks.mp4"
        length="249561088"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 13:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7530-en-Buffering_sucks.mp4?1451856112</guid>
      <dc:identifier>c3731bcd-04a8-49ba-a472-d1180944c106</dc:identifier>
      <dc:date>2015-12-28T13:15:00+01:00</dc:date>
      <itunes:author>Fredy Künzler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>An attempt of calculating the economic cost of buffering.</itunes:subtitle>
      <itunes:summary>&lt;p&gt;Buffering sucks! Why we see regular buffering when watching online video. What internet service providers could do to reduce buffering and why big players refuse to act. An attempt of calculating the economic cost of buffering.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7530.html
</itunes:summary>
      <itunes:duration>00:30:52</itunes:duration>
    </item>
    <item>
      <title>How Open Source Software, second hand laptops and hackers helped stop Ebola (and stopped an apocalypse). (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7561-how_open_source_software_second_hand_laptops_and_hackers_helped_stop_ebola_and_stopped_an_apocalypse</link>
      <description>&lt;p&gt;In the dark days of October 2014 an unprecedented Ebola epidemic wrecked havoc across Sierra Leone, Liberia and Guinea. In Sierra Leone, the health system was only weeks away from total collapse due to an inability to manage or pay health workers across the country and the world braced for the unchecked spread of the disease throughout west Africa. In the face of apocalyptic scenario, a company made up of local hackers took on the unprecedented challenge of building, implementing and running a huge Management Information System and Mobile payments system to keep the health system from collapsing. This talk will show how this was achieved with Open Source Software, second hand laptops, hacked voter registration machines, second hand smartphones and some very smart and determined young people used to achieving great things with none of the resources we take for granted. We salute them.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7561.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7561-en-How_Open_Source_Software_second_hand_laptops_and_hackers_helped_stop_Ebola_and_stopped_an_apocalypse.mp4"
        length="636485632"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7561-en-How_Open_Source_Software_second_hand_laptops_and_hackers_helped_stop_Ebola_and_stopped_an_apocalypse.mp4?1451854825</guid>
      <dc:identifier>62a79191-ca6a-48ea-b747-8cf13faa75cb</dc:identifier>
      <dc:date>2015-12-30T16:00:00+01:00</dc:date>
      <itunes:author>Salton Arthur Massally, Harold Valentine Mac-Saidu, Francis Banguara, Emerson</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>&lt;p&gt;In the dark days of October 2014 an unprecedented Ebola epidemic wrecked havoc across Sierra Leone, Liberia and Guinea. In Sierra Leone, the health system was only weeks away from total collapse due to an inability to manage or pay health workers across the country and the world braced for the unchecked spread of the disease throughout west Africa. In the face of apocalyptic scenario, a company made up of local hackers took on the unprecedented challenge of building, implementing and running a huge Management Information System and Mobile payments system to keep the health system from collapsing. This talk will show how this was achieved with Open Source Software, second hand laptops, hacked voter registration machines, second hand smartphones and some very smart and determined young people used to achieving great things with none of the resources we take for granted. We salute them.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7561.html
</itunes:summary>
      <itunes:duration>01:02:29</itunes:duration>
    </item>
    <item>
      <title>32C3 Infrastructure Review (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7555-32c3_infrastructure_review</link>
      <description>&lt;p&gt;The traditional review event with presentations from various teams at congress. Learn how the 32C3 got Internet, video streaming, power and maybe more!&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7555.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7555-en-de-32C3_Infrastructure_Review_hd.mp4"
        length="729808896"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 18:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7555-en-de-32C3_Infrastructure_Review_hd.mp4?1451853165</guid>
      <dc:identifier>7bf4c7a5-779e-4591-8d9b-f5f38d3dc879</dc:identifier>
      <dc:date>2015-12-30T18:00:00+01:00</dc:date>
      <itunes:author>Leon, Marcus, florolf, Peter Stuge, Team Silkroad</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>&lt;p&gt;The traditional review event with presentations from various teams at congress. Learn how the 32C3 got Internet, video streaming, power and maybe more!&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7555.html
</itunes:summary>
      <itunes:duration>01:03:28</itunes:duration>
    </item>
    <item>
      <title>How to contribute to make open hardware happen (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7369-how_to_contribute_to_make_open_hardware_happen</link>
      <description>&lt;p&gt;What to do if you are neither a hardware- nor a software expert and want to contribute in effords of openess neverseless? A short overview about what I have done so far, shown on 3 exaples: The Mooltipass, a offline password save. The Pandora/Pyra, a mini handheld, full Linux PC and its successor. Senoko, the Novena battery board. From &quot;just&quot; crowdfunding to producing, why it&#39;s worth to go through all the ups and downs and encourage others to do the same.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7369.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7369-en-de-How_to_contribute_to_make_open_hardware_happen_hd.mp4"
        length="374341632"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7369-en-de-How_to_contribute_to_make_open_hardware_happen_hd.mp4?1451850132</guid>
      <dc:identifier>abc3b46d-6e36-40e5-a037-79724a720183</dc:identifier>
      <dc:date>2015-12-30T14:00:00+01:00</dc:date>
      <itunes:author>mclien</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Mooltipass, Openpandora/Pyra and Novena/Senoko: how I contributed and what was to be learnt on the path</itunes:subtitle>
      <itunes:summary>&lt;p&gt;What to do if you are neither a hardware- nor a software expert and want to contribute in effords of openess neverseless? A short overview about what I have done so far, shown on 3 exaples: The Mooltipass, a offline password save. The Pandora/Pyra, a mini handheld, full Linux PC and its successor. Senoko, the Novena battery board. From &quot;just&quot; crowdfunding to producing, why it&#39;s worth to go through all the ups and downs and encourage others to do the same.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7369.html
</itunes:summary>
      <itunes:duration>00:51:50</itunes:duration>
    </item>
    <item>
      <title>DDoS mitigation EPIC FAIL collection (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7523-ddos_mitigation_epic_fail_collection</link>
      <description>&lt;p&gt;For the past 3 years I have been delivering a custom-tailored DDoS attacks for organizations that wanted to test out their DDoS defense systems.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7523.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7523-en-de-DDoS_mitigation_EPIC_FAIL_collection_hd.mp4"
        length="675282944"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7523-en-de-DDoS_mitigation_EPIC_FAIL_collection_hd.mp4?1451849401</guid>
      <dc:identifier>2e3d2878-e8b0-44cd-aea8-baf52be25ecf</dc:identifier>
      <dc:date>2015-12-30T14:00:00+01:00</dc:date>
      <itunes:author>dalmoz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Failosophy</itunes:keywords>
      <itunes:summary>&lt;p&gt;For the past 3 years I have been delivering a custom-tailored DDoS attacks for organizations that wanted to test out their DDoS defense systems.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7523.html
</itunes:summary>
      <itunes:duration>01:02:12</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 4 (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7560-lightning_talks_day_4</link>
      <description>&lt;p&gt;Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7560.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7560-en-Lightning_Talks_Day_4.mp4"
        length="567279616"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7560-en-Lightning_Talks_Day_4.mp4?1451847993</guid>
      <dc:identifier>83fa2955-80df-4f47-9421-9e81b9f6f2c0</dc:identifier>
      <dc:date>2015-12-30T12:45:00+01:00</dc:date>
      <itunes:author>gedsic, bigalex</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>&lt;p&gt;Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7560.html
</itunes:summary>
      <itunes:duration>02:11:23</itunes:duration>
    </item>
    <item>
      <title>32C3 Closing Event (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7551-closing_event</link>
      <description>
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7551.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7551-en-Closing_Event.mp4"
        length="268435456"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 19:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7551-en-Closing_Event.mp4?1451846478</guid>
      <dc:identifier>5c8d1a32-d9ce-49cb-b058-846fa58663d8</dc:identifier>
      <dc:date>2015-12-30T19:00:00+01:00</dc:date>
      <itunes:author>Carina Haupt, Linus Neumann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7551.html
</itunes:summary>
      <itunes:duration>00:21:06</itunes:duration>
    </item>
    <item>
      <title>The Magic World of Searchable Symmetric Encryption (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7333-the_magic_world_of_searchable_symmetric_encryption</link>
      <description>In the last couple of years, cloud and web services have become more and more popular. Since Snowden we know for sure that intelligence agencies have access to the data storage of an  service provider, either by (forced) cooperation, or espionage. Thus, to protect our privacy we have to encrypted our data before hand it over to our service provider (data holder). But this approach contradicts the very idea of a web service where the data holder have to process our data in one way or an other. Therefore, we need new cryptographic techniques to enable the  data holder to perform operation on encrypted data. One of the most important operations for cloud storage or database based web/cloud  services is the search operation.  In this talk we focus on the very familiar cloud storage scenario. Because in this scenario, It is obvious, that the user (data owner) do not want to perform the search by himself. This should be a service offered by the data holder. We will present different practical approaches to achieve searchable ciphertext, namely one with an index and one with cleverly encrypted words.

Note that no PhD is required to attend this talk ;-)
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7333.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7333-en-de-The_Magic_World_of_Searchable_Symmetric_Encryption_hd.mp4"
        length="810549248"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7333-en-de-The_Magic_World_of_Searchable_Symmetric_Encryption_hd.mp4?1451505088</guid>
      <dc:identifier>7ca8581d-a3f7-4247-8101-786cf04d9bd1</dc:identifier>
      <dc:date>2015-12-30T11:30:00+01:00</dc:date>
      <itunes:author>Tobias Mueller, Christian Forler</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>A brief introduction to search over encrypted data</itunes:subtitle>
      <itunes:summary>In the last couple of years, cloud and web services have become more and more popular. Since Snowden we know for sure that intelligence agencies have access to the data storage of an  service provider, either by (forced) cooperation, or espionage. Thus, to protect our privacy we have to encrypted our data before hand it over to our service provider (data holder). But this approach contradicts the very idea of a web service where the data holder have to process our data in one way or an other. Therefore, we need new cryptographic techniques to enable the  data holder to perform operation on encrypted data. One of the most important operations for cloud storage or database based web/cloud  services is the search operation.  In this talk we focus on the very familiar cloud storage scenario. Because in this scenario, It is obvious, that the user (data owner) do not want to perform the search by himself. This should be a service offered by the data holder. We will present different practical approaches to achieve searchable ciphertext, namely one with an index and one with cleverly encrypted words.

Note that no PhD is required to attend this talk ;-)
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7333.html
</itunes:summary>
      <itunes:duration>00:58:47</itunes:duration>
    </item>
    <item>
      <title>Security Nightmares 0x10 (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7546-security_nightmares_0x10</link>
      <description>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7546.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7546-de-en-Security_Nightmares_0x10_hd.mp4"
        length="810549248"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 18:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7546-de-en-Security_Nightmares_0x10_hd.mp4?1451504292</guid>
      <dc:identifier>422ba0b9-debb-436e-9822-e9a201dec845</dc:identifier>
      <dc:date>2015-12-30T18:00:00+01:00</dc:date>
      <itunes:author>Ron, frank</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7546.html
</itunes:summary>
      <itunes:duration>01:11:18</itunes:duration>
    </item>
    <item>
      <title>Wireless Drivers: Freedom considered harmful? (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7375-wireless_drivers_freedom_considered_harmful</link>
      <description>A review/rant about the progress that free software wireless drivers (especially on Linux) have made over the recent years, as well as the current challenges that driver developers (and users) are facing.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7375.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7375-en-de-Wireless_Drivers_Freedom_considered_harmful_hd.mp4"
        length="632291328"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 18:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7375-en-de-Wireless_Drivers_Freedom_considered_harmful_hd.mp4?1451502831</guid>
      <dc:identifier>45a2ba85-564b-4d94-9bef-db32b59d7602</dc:identifier>
      <dc:date>2015-12-30T18:00:00+01:00</dc:date>
      <itunes:author>Felix Fietkau</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>An OpenWrt perspective on the development of Linux 802.11 support</itunes:subtitle>
      <itunes:summary>A review/rant about the progress that free software wireless drivers (especially on Linux) have made over the recent years, as well as the current challenges that driver developers (and users) are facing.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7375.html
</itunes:summary>
      <itunes:duration>00:51:05</itunes:duration>
    </item>
    <item>
      <title>Collect It All: Open Source Intelligence (OSINT) for Everyone (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7340-collect_it_all_open_source_intelligence_osint_for_everyone</link>
      <description>Governments post reports and data about their operations. Journalists publish documents from whistleblowers. But there is a third type of open data that is often overlooked- the information people and companies post about themselves. People need jobs. Companies need to hire people. Secret prisons do not build themselves.  

By making it feasible for anyone to collect public data online in bulk and exploring ways to effectively use this data for concrete objectives, we can build an independent, distributed system of accountability.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7340.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7340-en-Collect_It_All_Open_Source_Intelligence_OSINT_for_Everyone.mp4"
        length="581959680"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 18:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7340-en-Collect_It_All_Open_Source_Intelligence_OSINT_for_Everyone.mp4?1452121361</guid>
      <dc:identifier>9b641e3f-6d6e-4850-bddd-ced7d67af5c6</dc:identifier>
      <dc:date>2015-12-30T18:00:00+01:00</dc:date>
      <itunes:author>M. C. McGrath</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Governments post reports and data about their operations. Journalists publish documents from whistleblowers. But there is a third type of open data that is often overlooked- the information people and companies post about themselves. People need jobs. Companies need to hire people. Secret prisons do not build themselves.  

By making it feasible for anyone to collect public data online in bulk and exploring ways to effectively use this data for concrete objectives, we can build an independent, distributed system of accountability.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7340.html
</itunes:summary>
      <itunes:duration>00:56:39</itunes:duration>
    </item>
    <item>
      <title>Microsofts Windows 10 Botnet (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7291-microsofts_windows_10_botnet</link>
      <description>Nachdem viele Jahre vor den Angriffen auf die Wahlfreiheit von Windows-Nutzern gewarnt wurde, schalte Microsoft mit Windows 10 das Botnetz scharf.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7291.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7291-de-en-Microsofts_Windows_10_Botnet_hd.mp4"
        length="511705088"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7291-de-en-Microsofts_Windows_10_Botnet_hd.mp4?1451499658</guid>
      <dc:identifier>5fb6f7b5-c237-4b64-b786-85e4c95f13ad</dc:identifier>
      <dc:date>2015-12-30T17:15:00+01:00</dc:date>
      <itunes:author>ruedi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Nachdem viele Jahre vor den Angriffen auf die Wahlfreiheit von Windows-Nutzern gewarnt wurde, schalte Microsoft mit Windows 10 das Botnetz scharf.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7291.html
</itunes:summary>
      <itunes:duration>00:33:42</itunes:duration>
    </item>
    <item>
      <title>Sin in the time of Technology (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7286-sin_in_the_time_of_technology</link>
      <description>Technology companies now hold an unprecedented ability to shape the world around us by limiting our ability to access certain content and by crafting proprietary algorithm that bring us our daily streams of content.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7286.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7286-en-Sin_in_the_time_of_Technology.mp4"
        length="295698432"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7286-en-Sin_in_the_time_of_Technology.mp4?1451498391</guid>
      <dc:identifier>969bee9e-d0bf-4d24-a649-15f93747d608</dc:identifier>
      <dc:date>2015-12-30T17:15:00+01:00</dc:date>
      <itunes:author>Matthew Stender, Jillian C. York</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>How social media companies are creating a global morality standard through content regulations</itunes:subtitle>
      <itunes:summary>Technology companies now hold an unprecedented ability to shape the world around us by limiting our ability to access certain content and by crafting proprietary algorithm that bring us our daily streams of content.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7286.html
</itunes:summary>
      <itunes:duration>00:32:19</itunes:duration>
    </item>
    <item>
      <title>Compileroptimierungen für Forth im Microcontroller (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7520-compileroptimierungen_fur_forth_im_microcontroller</link>
      <description>Wie lassen sich Konstantenfaltung und ein Registerallokator für einen Forth-Compiler implementieren, der in einem Mikrocontroller läuft ?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7520.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7520-de-en-Compileroptimierungen_fuer_Forth_im_Microcontroller_hd.mp4"
        length="240123904"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7520-de-en-Compileroptimierungen_fuer_Forth_im_Microcontroller_hd.mp4?1451498250</guid>
      <dc:identifier>269e7320-2133-4981-9238-e5fc8305a3e4</dc:identifier>
      <dc:date>2015-12-30T17:15:00+01:00</dc:date>
      <itunes:author>Matthias Koch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Mecrisp intern</itunes:subtitle>
      <itunes:summary>Wie lassen sich Konstantenfaltung und ein Registerallokator für einen Forth-Compiler implementieren, der in einem Mikrocontroller läuft ?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7520.html
</itunes:summary>
      <itunes:duration>00:26:56</itunes:duration>
    </item>
    <item>
      <title>Predicting Crime in a Big Data World (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7457-predicting_crime_in_a_big_data_world</link>
      <description>Yearly, the world is inundated with news about government data collection programs. In addition to these programs, governments collect data from third party sources to gather information about individuals.  This data in conjunction with machine learning aids governments in determining where crime will be committed and who has committed a crime. Could this data serve as a method by which governments predict whether or not the individual will commit a crime? This talk will examine the use of big data in the context of predictive policing. Specifically, how does the data collected inform suspicion about a particular individual? In the context of U.S. law, can big data alone establish reasonable suspicion or should it just factor into the totality of the circumstances? How do we mitigate the biases that might exist in large data sets?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7457.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7457-en-Predicting_Crime_in_a_Big_Data_World.mp4"
        length="254803968"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7457-en-Predicting_Crime_in_a_Big_Data_World.mp4?1451498192</guid>
      <dc:identifier>56126bd1-f1b3-4bc7-81be-304b6b681cde</dc:identifier>
      <dc:date>2015-12-30T17:15:00+01:00</dc:date>
      <itunes:author>Whitney Merrill</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Yearly, the world is inundated with news about government data collection programs. In addition to these programs, governments collect data from third party sources to gather information about individuals.  This data in conjunction with machine learning aids governments in determining where crime will be committed and who has committed a crime. Could this data serve as a method by which governments predict whether or not the individual will commit a crime? This talk will examine the use of big data in the context of predictive policing. Specifically, how does the data collected inform suspicion about a particular individual? In the context of U.S. law, can big data alone establish reasonable suspicion or should it just factor into the totality of the circumstances? How do we mitigate the biases that might exist in large data sets?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7457.html
</itunes:summary>
      <itunes:duration>00:31:51</itunes:duration>
    </item>
    <item>
      <title>CHINTERNET ART (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7216-chinternet_art</link>
      <description>Since my move to China in 2012 I have actively engaged in the local art scenes of Beijing and Shanghai, focusing on collaborating with artists interested in technology and the internet. My own personal independent research of the Chinese internet and the popular Chinese social app, WeChat 微信, has contributed to an ongoing massive archive I began in 2014 called The Chinternet Archive. To date, I have over 15,000 pieces of content (and growing) documenting localized trends, memes, vernacular photography, online personas, .gif animations, videos, selfies, propaganda, retail, family/work life, and other such digital artifacts of online Chinese culture. This archive directly influenced my artistic and curatorial practice, resulting in an online art collection called Netize.net, or its Chinese name of 网友网 [wǎngyǒuwǎng] “Internet Friend Network”, which collaborates with emerging Chinese and international artists who are exploring or deconstructing East/West dichotomies, engaging in Sino-centric Web aesthetics, or investigating the East online. The goal of this talk is to explore through my Chinternet Archive and Netize.net collections, forms of creativity found in China in relationship to it’s early internet history, interactions with technology, localized networks and restrictions.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7216.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7216-en-CHINTERNET_ART.mp4"
        length="704643072"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7216-en-CHINTERNET_ART.mp4?1451497319</guid>
      <dc:identifier>48219ef6-24b8-41ca-8cc0-ec309e4148e6</dc:identifier>
      <dc:date>2015-12-30T16:00:00+01:00</dc:date>
      <itunes:author>Michelle Proksell </itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Creativity, Archives &amp; Digital Media from the Chinese Internet</itunes:subtitle>
      <itunes:summary>Since my move to China in 2012 I have actively engaged in the local art scenes of Beijing and Shanghai, focusing on collaborating with artists interested in technology and the internet. My own personal independent research of the Chinese internet and the popular Chinese social app, WeChat 微信, has contributed to an ongoing massive archive I began in 2014 called The Chinternet Archive. To date, I have over 15,000 pieces of content (and growing) documenting localized trends, memes, vernacular photography, online personas, .gif animations, videos, selfies, propaganda, retail, family/work life, and other such digital artifacts of online Chinese culture. This archive directly influenced my artistic and curatorial practice, resulting in an online art collection called Netize.net, or its Chinese name of 网友网 [wǎngyǒuwǎng] “Internet Friend Network”, which collaborates with emerging Chinese and international artists who are exploring or deconstructing East/West dichotomies, engaging in Sino-centric Web aesthetics, or investigating the East online. The goal of this talk is to explore through my Chinternet Archive and Netize.net collections, forms of creativity found in China in relationship to it’s early internet history, interactions with technology, localized networks and restrictions.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7216.html
</itunes:summary>
      <itunes:duration>00:58:55</itunes:duration>
    </item>
    <item>
      <title>Breaking Honeypots for Fun and Profit (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7277-breaking_honeypots_for_fun_and_profit</link>
      <description>We will detect, bypass, and abuse honeypot technologies and solutions, turning them against the defender. We will also release a global map of honeypot deployments, honeypot detection vulnerabilities, and supporting code.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7277.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7277-en-Breaking_Honeypots_for_Fun_and_Profit.mp4"
        length="515899392"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7277-en-Breaking_Honeypots_for_Fun_and_Profit.mp4?1451496739</guid>
      <dc:identifier>c87fa147-d1f4-4353-82db-c3e5b646884b</dc:identifier>
      <dc:date>2015-12-30T16:00:00+01:00</dc:date>
      <itunes:author>DeanSysman, Gadi Evron, Itamar Sher</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>We will detect, bypass, and abuse honeypot technologies and solutions, turning them against the defender. We will also release a global map of honeypot deployments, honeypot detection vulnerabilities, and supporting code.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7277.html
</itunes:summary>
      <itunes:duration>00:54:15</itunes:duration>
    </item>
    <item>
      <title>Wie man einen Blackout verursacht (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7323-wie_man_einen_blackout_verursacht</link>
      <description>Der steigende Anteil der Erneuerbaren Energien an der Stromerzeugung und der zunehmende Handel mit Strom erhöht die Belastung der Stromnetze. Welche Auswirkungen hat das auf die Netzstabilität? Wann kommen die Stromnetze an ihre Leistungsgrenze? Wie kann ein gezielter Angriff auf das Europäische Verbundnetz aussehen? Was müsste man tun, um einen Blackout zu verursachen? Und: Wie können wir unsere Stromnetze umbauen, damit das nicht passiert?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7323.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7323-de-en-Wie_man_einen_Blackout_verursacht_hd.mp4"
        length="1035993088"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7323-de-en-Wie_man_einen_Blackout_verursacht_hd.mp4?1451496749</guid>
      <dc:identifier>03c8501f-d327-4228-a9fe-2635370d25d2</dc:identifier>
      <dc:date>2015-12-30T16:00:00+01:00</dc:date>
      <itunes:author>Mathias Dalheimer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>und warum das gar nicht so einfach ist.</itunes:subtitle>
      <itunes:summary>Der steigende Anteil der Erneuerbaren Energien an der Stromerzeugung und der zunehmende Handel mit Strom erhöht die Belastung der Stromnetze. Welche Auswirkungen hat das auf die Netzstabilität? Wann kommen die Stromnetze an ihre Leistungsgrenze? Wie kann ein gezielter Angriff auf das Europäische Verbundnetz aussehen? Was müsste man tun, um einen Blackout zu verursachen? Und: Wie können wir unsere Stromnetze umbauen, damit das nicht passiert?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7323.html
</itunes:summary>
      <itunes:duration>01:02:27</itunes:duration>
    </item>
    <item>
      <title>When  algorithms fail in our personal lives (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7497-when_algorithms_fail_in_our_personal_lives</link>
      <description>„Social Media Break Up Coordinator“ is a performance art piece and lecture performed by Caroline Sinders. Inspired by Facebook’s memories algorithms faux pas, such as parents being reminded of their child’s death, or of events with an ex.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7497.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7497-en-de-When_algorithms_fail_in_our_personal_lives_hd.mp4"
        length="494927872"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7497-en-de-When_algorithms_fail_in_our_personal_lives_hd.mp4?1451493434</guid>
      <dc:identifier>b89b8cff-c496-4885-8e72-1461e8b274f7</dc:identifier>
      <dc:date>2015-12-30T14:00:00+01:00</dc:date>
      <itunes:author>Caroline Sinders</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Social media break up coordinator</itunes:subtitle>
      <itunes:summary>„Social Media Break Up Coordinator“ is a performance art piece and lecture performed by Caroline Sinders. Inspired by Facebook’s memories algorithms faux pas, such as parents being reminded of their child’s death, or of events with an ex.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7497.html
</itunes:summary>
      <itunes:duration>00:53:58</itunes:duration>
    </item>
    <item>
      <title>Top X* usability obstacles (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7356-top_x_usability_obstacles</link>
      <description>What do you want? Did you build your web/app for humans or NSA robots? Let&#39;s make it usable for human beings. I&#39;d like to show you some basic design mistakes and how to avoid them to improve usability of your web or app. Why? Because it&#39;s worth it and I&#39;m good in it.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7356.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7356-en-Top_X_usability_obstacles.mp4"
        length="529530880"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7356-en-Top_X_usability_obstacles.mp4?1451491834</guid>
      <dc:identifier>ff303155-f2fa-4c54-b9aa-ef47cd6e7704</dc:identifier>
      <dc:date>2015-12-30T12:45:00+01:00</dc:date>
      <itunes:author>BoB Marvan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Failosophy</itunes:keywords>
      <itunes:subtitle>*(will be specified later based on usability test with Ivana Jilekova)</itunes:subtitle>
      <itunes:summary>What do you want? Did you build your web/app for humans or NSA robots? Let&#39;s make it usable for human beings. I&#39;d like to show you some basic design mistakes and how to avoid them to improve usability of your web or app. Why? Because it&#39;s worth it and I&#39;m good in it.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7356.html
</itunes:summary>
      <itunes:duration>00:59:16</itunes:duration>
    </item>
    <item>
      <title>Jahresrückblick des CCC (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7306-jahresruckblick_des_ccc</link>
      <description>Wir werden einen Überblick über die Themen geben, die den Chaos Computer Club 2015 beschäftigt haben. Neben der Zusammenfassung und der Rückschau auf das vergangene Jahr wollen wir aber auch über zukünftige Projekte reden.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7306.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7306-de-en-Jahresrueckblick_des_CCC_hd.mp4"
        length="1217396736"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7306-de-en-Jahresrueckblick_des_CCC_hd.mp4?1451491081</guid>
      <dc:identifier>f9d33869-f9a2-4570-9e9a-25c56e32082a</dc:identifier>
      <dc:date>2015-12-28T11:30:00+01:00</dc:date>
      <itunes:author>frank, Linus Neumann, erdgeist, Constanze Kurz, Falk Garbsch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>Wir werden einen Überblick über die Themen geben, die den Chaos Computer Club 2015 beschäftigt haben. Neben der Zusammenfassung und der Rückschau auf das vergangene Jahr wollen wir aber auch über zukünftige Projekte reden.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7306.html
</itunes:summary>
      <itunes:duration>01:57:14</itunes:duration>
    </item>
    <item>
      <title>The mummy unwrapped (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7543-the_mummy_unwrapped</link>
      <description>Eine zweite Büste der ägyptischen Königin sei gefunden worden, meldete Ägyptens größte Zeitung. Der Fund war jedoch Teil einer Kunstaktion, die Museen und Kunstmarkt für deren Umgang mit Antiken kritisiert.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7543.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7543-de-The_mummy_unwrapped_hd.mp4"
        length="577765376"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7543-de-The_mummy_unwrapped_hd.mp4?1451490821</guid>
      <dc:identifier>b08bddb1-9370-4392-a8ca-8e49ad4a3911</dc:identifier>
      <dc:date>2015-12-27T11:30:00+01:00</dc:date>
      <itunes:author>nelles-al-badri</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Cultural Commons durch Kunstraub</itunes:subtitle>
      <itunes:summary>Eine zweite Büste der ägyptischen Königin sei gefunden worden, meldete Ägyptens größte Zeitung. Der Fund war jedoch Teil einer Kunstaktion, die Museen und Kunstmarkt für deren Umgang mit Antiken kritisiert.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7543.html
</itunes:summary>
      <itunes:duration>00:56:10</itunes:duration>
    </item>
    <item>
      <title>A New Kid on the Block (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7403-a_new_kid_on_the_block</link>
      <description>The leading social networks are the powerful new gatekeepers of the digital age. Proprietary de facto standards of the dominant companies have lead to the emergence of virtual “information silos” that can barely communicate with one another. Has Diaspora really lost the war? Or is there still a chance to succeed?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7403.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7403-en-A_New_Kid_on_the_Block.mp4"
        length="907018240"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7403-en-A_New_Kid_on_the_Block.mp4?1451488872</guid>
      <dc:identifier>c50c5193-7389-4858-9352-14ea6d74b77a</dc:identifier>
      <dc:date>2015-12-30T12:45:00+01:00</dc:date>
      <itunes:author>Katharina Nocun</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Conditions for a Successful Market Entry of Decentralized Social Networks</itunes:subtitle>
      <itunes:summary>The leading social networks are the powerful new gatekeepers of the digital age. Proprietary de facto standards of the dominant companies have lead to the emergence of virtual “information silos” that can barely communicate with one another. Has Diaspora really lost the war? Or is there still a chance to succeed?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7403.html
</itunes:summary>
      <itunes:duration>01:02:57</itunes:duration>
    </item>
    <item>
      <title>Maker Spaces in Favelas - Lecture (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7540-maker_spaces_in_favelas_-_lecture</link>
      <description>There are two lines of research in the world about decreasing poverty in low-income communities: (1) to create solutions and share them with people living in low-income areas or (2) build the capacity of people from low-income areas to create their own solutions. Maker Spaces to BoP have showed great results to the strategy two. The lecture has the goal to expose all the experience we have learnt in the last three years to project, implement and manage a Maker Space in a favela in São Paulo - Brazil called Innovation Center Vila Nova Esperança (ICVNE).
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7540.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7540-en-Maker_Spaces_in_Favelas_-_Lecture.mp4"
        length="823132160"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7540-en-Maker_Spaces_in_Favelas_-_Lecture.mp4?1451487669</guid>
      <dc:identifier>6a02cc83-73d8-4544-8f17-9358dd2495c9</dc:identifier>
      <dc:date>2015-12-28T11:30:00+01:00</dc:date>
      <itunes:author>Miguel Chaves</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Engaging social innovation and social innovators</itunes:subtitle>
      <itunes:summary>There are two lines of research in the world about decreasing poverty in low-income communities: (1) to create solutions and share them with people living in low-income areas or (2) build the capacity of people from low-income areas to create their own solutions. Maker Spaces to BoP have showed great results to the strategy two. The lecture has the goal to expose all the experience we have learnt in the last three years to project, implement and manage a Maker Space in a favela in São Paulo - Brazil called Innovation Center Vila Nova Esperança (ICVNE).
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7540.html
</itunes:summary>
      <itunes:duration>00:46:45</itunes:duration>
    </item>
    <item>
      <title>Katastrophe und Kommunikation (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7567-katastrophe_und_kommunikation</link>
      <description>Ob diktatorischer Despot, der seiner Bevölkerung die Kommuninaktionsrechte einschränkt, oder ein Erdbeben, das die Kommunikationsinfrastruktur zerstört: Auch 2015 sind die Lösungsansätze noch nicht wesentlich über Zettel und Stift hinaus.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7567.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7567-de-en-Katastrophe_und_Kommunikation_hd.mp4"
        length="633339904"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7567-de-en-Katastrophe_und_Kommunikation_hd.mp4?1451487154</guid>
      <dc:identifier>5f7d945f-872f-4951-a95d-8b78558159f8</dc:identifier>
      <dc:date>2015-12-30T11:30:00+01:00</dc:date>
      <itunes:author>Sebastian Jünemann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Ob diktatorischer Despot, der seiner Bevölkerung die Kommuninaktionsrechte einschränkt, oder ein Erdbeben, das die Kommunikationsinfrastruktur zerstört: Auch 2015 sind die Lösungsansätze noch nicht wesentlich über Zettel und Stift hinaus.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7567.html
</itunes:summary>
      <itunes:duration>00:58:37</itunes:duration>
    </item>
    <item>
      <title>Crypto Wars Part II (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7386-crypto_wars_part_ii</link>
      <description>Governments around the world are seeking to put a stop to secure end-to-end encryption, from the UK’s Data Retention and Investigatory Powers Act, to Australia’s Defence Trade Controls Act, to India’s draft proposal to require plain text copies of all secure messages, to the United States’ Federal Bureau of Investigation’s public pressure on global companies like Apple and Google to weaken their security and provide law enforcement access to plain text content.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7386.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7386-en-Crypto_Wars_Part_II.mp4"
        length="559939584"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7386-en-Crypto_Wars_Part_II.mp4?1451486707</guid>
      <dc:identifier>31331405-a243-48ba-9536-83285542400a</dc:identifier>
      <dc:date>2015-12-30T12:45:00+01:00</dc:date>
      <itunes:author>Kurt Opsahl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>The Empires Strike Back</itunes:subtitle>
      <itunes:summary>Governments around the world are seeking to put a stop to secure end-to-end encryption, from the UK’s Data Retention and Investigatory Powers Act, to Australia’s Defence Trade Controls Act, to India’s draft proposal to require plain text copies of all secure messages, to the United States’ Federal Bureau of Investigation’s public pressure on global companies like Apple and Google to weaken their security and provide law enforcement access to plain text content.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7386.html
</itunes:summary>
      <itunes:duration>01:00:16</itunes:duration>
    </item>
    <item>
      <title>What is the value of anonymous communication? (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7324-what_is_the_value_of_anonymous_communication</link>
      <description>What does the fact that Tor users can’t edit wikipedia mean for the quality of the ``encyclopedia that anyone can edit?’’ How do captchas and blocking of anonymity services affect the experiences of Tor users when they are trying to contribute content? This talk will discuss the increasing limitations of active participation in the anonymous Internet and the findings of our interview study of Tor users and wikipedia editors concerning these issues.  We believe that by understanding the contributions Tor users make—and that people denied access to anonymity tools don&#39;t make—we can help make the case for the value of anonymity online.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7324.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7324-en-What_is_the_value_of_anonymous_communication.mp4"
        length="246415360"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7324-en-What_is_the_value_of_anonymous_communication.mp4?1451486042</guid>
      <dc:identifier>d66db4df-49ed-4c9f-ada3-289d16786c8e</dc:identifier>
      <dc:date>2015-12-27T11:30:00+01:00</dc:date>
      <itunes:author>greenstadt</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>What does the fact that Tor users can’t edit wikipedia mean for the quality of the ``encyclopedia that anyone can edit?’’ How do captchas and blocking of anonymity services affect the experiences of Tor users when they are trying to contribute content? This talk will discuss the increasing limitations of active participation in the anonymous Internet and the findings of our interview study of Tor users and wikipedia editors concerning these issues.  We believe that by understanding the contributions Tor users make—and that people denied access to anonymity tools don&#39;t make—we can help make the case for the value of anonymity online.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7324.html
</itunes:summary>
      <itunes:duration>00:52:36</itunes:duration>
    </item>
    <item>
      <title>“I feel like a criminal and I have to be god at the same time” (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7207-i_feel_like_a_criminal_and_i_have_to_be_god_at_the_same_time</link>
      <description>News reports and political speeches are currently replete with references to hacking and hacktivism, i.e., politically motivated hacking. They often portray hackers and hacktivists negatively and put them onto the same level with, for example, terrorists. This talk is based on a PhD research project examining the perception of self-identified hackers and hacktivists on these (in)securitising developments. It investigates how hackers and hacktivists understand themselves and their activities, explores how they articulate the effects of this (in)securitisation, and outlines the ways they resist these processes. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7207.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7207-en-de-I_feel_like_a_criminal_and_I_have_to_be_god_at_the_same_time_hd.mp4"
        length="472907776"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7207-en-de-I_feel_like_a_criminal_and_I_have_to_be_god_at_the_same_time_hd.mp4?1451484524</guid>
      <dc:identifier>7504eeb1-1665-47fd-b21a-601d2641c41c</dc:identifier>
      <dc:date>2015-12-30T11:30:00+01:00</dc:date>
      <itunes:author>Leonie Maria Tanczer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Perceptions of hackers and hacktivists on their (in)securitisation</itunes:subtitle>
      <itunes:summary>News reports and political speeches are currently replete with references to hacking and hacktivism, i.e., politically motivated hacking. They often portray hackers and hacktivists negatively and put them onto the same level with, for example, terrorists. This talk is based on a PhD research project examining the perception of self-identified hackers and hacktivists on these (in)securitising developments. It investigates how hackers and hacktivists understand themselves and their activities, explores how they articulate the effects of this (in)securitisation, and outlines the ways they resist these processes. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7207.html
</itunes:summary>
      <itunes:duration>00:57:04</itunes:duration>
    </item>
    <item>
      <title>The state of Internet Censorship (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7143-the_state_of_internet_censorship</link>
      <description>The techniques to control access to the Internet, and the ability to bring transparency to those processes are both continuing to evolve. We’ll give an update on the landscape of online information controls, and our ability to measure them.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7143.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7143-en-de-The_state_of_Internet_Censorship_hd.mp4"
        length="480247808"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7143-en-de-The_state_of_Internet_Censorship_hd.mp4?1451483313</guid>
      <dc:identifier>f6149460-a278-4600-bf9d-61ea737c46de</dc:identifier>
      <dc:date>2015-12-28T11:30:00+01:00</dc:date>
      <itunes:author>Will Scott, andz@torproject.org</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>The techniques to control access to the Internet, and the ability to bring transparency to those processes are both continuing to evolve. We’ll give an update on the landscape of online information controls, and our ability to measure them.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7143.html
</itunes:summary>
      <itunes:duration>00:58:34</itunes:duration>
    </item>
    <item>
      <title>Replication Prohibited (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7435-replication_prohibited</link>
      <description>Physical keys and locks are one of the oldest security mechanisms still employed
today. In this talk, we will discuss how 3D printing keys enable attacks against many modern lock systems. We will describe projects researchers and hobbyists have done involving 3D printed keys, and present our own research on automating several of these attacks in order to demonstrate how easy they are to do. Ultimately, we hope to describe the current state of 3D printed keys, and their impact on the physical security systems we most often take for granted.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7435.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7435-en-de-Replication_Prohibited_hd.mp4"
        length="393216000"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7435-en-de-Replication_Prohibited_hd.mp4?1451482933</guid>
      <dc:identifier>1c39bb2e-fba0-4cb3-9aac-9e6dd396c55e</dc:identifier>
      <dc:date>2015-12-30T11:30:00+01:00</dc:date>
      <itunes:author>Eric Wustrow</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>3D printed key attacks</itunes:subtitle>
      <itunes:summary>Physical keys and locks are one of the oldest security mechanisms still employed
today. In this talk, we will discuss how 3D printing keys enable attacks against many modern lock systems. We will describe projects researchers and hobbyists have done involving 3D printed keys, and present our own research on automating several of these attacks in order to demonstrate how easy they are to do. Ultimately, we hope to describe the current state of 3D printed keys, and their impact on the physical security systems we most often take for granted.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7435.html
</itunes:summary>
      <itunes:duration>00:44:16</itunes:duration>
    </item>
    <item>
      <title>Hacker Jeopardy (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7152-hacker_jeopardy</link>
      <description>The Hacker Jeopardy is a quiz show.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7152.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7152-de-en-gsw-Hacker_Jeopardy_hd.mp4"
        length="1293942784"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 00:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7152-de-en-gsw-Hacker_Jeopardy_hd.mp4?1451477823</guid>
      <dc:identifier>e1efc11e-170c-4234-9ac0-4451a6631b01</dc:identifier>
      <dc:date>2015-12-30T00:15:00+01:00</dc:date>
      <itunes:author>Sec, ray</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:subtitle>Zahlenraten für Geeks</itunes:subtitle>
      <itunes:summary>The Hacker Jeopardy is a quiz show.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7152.html
</itunes:summary>
      <itunes:duration>01:35:32</itunes:duration>
    </item>
    <item>
      <title>Free Software and Hardware bring National Sovereignty (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7246-free_software_and_hardware_bring_national_sovereignty</link>
      <description>Free software and hardware are essential to sovereignty among developing nations, and can be used to secure infrastructure and information against sophisticated adversaries. Underdeveloped nations are leveraging Free software for these purposes, including Gaza and the Palestinian territories. This lecture discusses the Palestinian use of Free software and hardware to claim a kind of sovereignty, focusing on the health sector as one example where speaker Dr. Tarek Loubani has experienced and participated in efforts to incorporate Free culture.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7246.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7246-en-de-Free_Software_and_Hardware_bring_National_Sovereignty_hd.mp4"
        length="354418688"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7246-en-de-Free_Software_and_Hardware_bring_National_Sovereignty_hd.mp4?1451443607</guid>
      <dc:identifier>153f9b5f-16a6-4c0c-b8d5-ca62ae23dea0</dc:identifier>
      <dc:date>2015-12-29T21:15:00+01:00</dc:date>
      <itunes:author>Tarek Loubani</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Gaza as a case study</itunes:subtitle>
      <itunes:summary>Free software and hardware are essential to sovereignty among developing nations, and can be used to secure infrastructure and information against sophisticated adversaries. Underdeveloped nations are leveraging Free software for these purposes, including Gaza and the Palestinian territories. This lecture discusses the Palestinian use of Free software and hardware to claim a kind of sovereignty, focusing on the health sector as one example where speaker Dr. Tarek Loubani has experienced and participated in efforts to incorporate Free culture.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7246.html
</itunes:summary>
      <itunes:duration>00:31:40</itunes:duration>
    </item>
    <item>
      <title>Crypto ist Abwehr, IFG ist Angriff! (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7102-crypto_ist_abwehr_ifg_ist_angriff</link>
      <description>&lt;p&gt;Die Landesverrat-Aff&amp;auml;re um netzpolitik.org hat gezeigt, wie wichtig es ist, nicht nur aus staatlichen Dokumenten zu zitieren, sondern sie im Original zu ver&amp;ouml;ffentlichen. Ideales Werkzeug daf&amp;uuml;r ist das Informationsfreiheitsgesetz (IFG). Wir geben einen &amp;Uuml;berblick &amp;uuml;ber die Entwicklungen dieses Jahr rund um das IFG.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7102.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7102-de-en-Crypto_ist_Abwehr_IFG_ist_Angriff_hd.mp4"
        length="347078656"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7102-de-en-Crypto_ist_Abwehr_IFG_ist_Angriff_hd.mp4?1451443507</guid>
      <dc:identifier>ba780105-8cc1-4e6e-8552-5e3bc150b9ff</dc:identifier>
      <dc:date>2015-12-29T22:00:00+01:00</dc:date>
      <itunes:author>Arne Semsrott</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics, Frag den Staat</itunes:keywords>
      <itunes:summary>&lt;p&gt;Die Landesverrat-Aff&amp;auml;re um netzpolitik.org hat gezeigt, wie wichtig es ist, nicht nur aus staatlichen Dokumenten zu zitieren, sondern sie im Original zu ver&amp;ouml;ffentlichen. Ideales Werkzeug daf&amp;uuml;r ist das Informationsfreiheitsgesetz (IFG). Wir geben einen &amp;Uuml;berblick &amp;uuml;ber die Entwicklungen dieses Jahr rund um das IFG.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7102.html
</itunes:summary>
      <itunes:duration>00:32:28</itunes:duration>
    </item>
    <item>
      <title>Grundrechte gelten nicht im Weltall! (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7225-grundrechte_gelten_nicht_im_weltall</link>
      <description>&lt;p&gt;In den nunmehr Hunderte A4-Seiten f&amp;uuml;llenden Live-Protokollen des NSA-BND-Untersuchungsausschusses, die bei netzpolitik.org nachzulesen sind, verbergen sich interessante Antworten auf Fragen, die niemand gestellt hat, vorher unbekannte juristische &amp;bdquo;Theorien&amp;ldquo; des BND und Perlen verlogener Rabulistik.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7225.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7225-de-en-Grundrechte_gelten_nicht_im_Weltall_hd.mp4"
        length="849346560"
        type="video/mp4"/>
      <pubDate>Wed, 30 Dec 2015 00:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7225-de-en-Grundrechte_gelten_nicht_im_Weltall_hd.mp4?1451443444</guid>
      <dc:identifier>47cbd880-f500-4c44-b717-c11ed1da087d</dc:identifier>
      <dc:date>2015-12-30T00:15:00+01:00</dc:date>
      <itunes:author>Anna Biselli, Constanze Kurz, cbass, Felix Betzin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Die absurdesten Szenen aus dem NSA-BND-Untersuchungsausschuss</itunes:subtitle>
      <itunes:summary>&lt;p&gt;In den nunmehr Hunderte A4-Seiten f&amp;uuml;llenden Live-Protokollen des NSA-BND-Untersuchungsausschusses, die bei netzpolitik.org nachzulesen sind, verbergen sich interessante Antworten auf Fragen, die niemand gestellt hat, vorher unbekannte juristische &amp;bdquo;Theorien&amp;ldquo; des BND und Perlen verlogener Rabulistik.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7225.html
</itunes:summary>
      <itunes:duration>01:09:26</itunes:duration>
    </item>
    <item>
      <title>#GOIBlocks - Technical observations about recent internet censorship in India (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7263-goiblocks_-_technical_observations_about_recent_internet_censorship_in_india</link>
      <description>On 17th December 2014, the Government of India&#39;s Ministry of Communications and Information Technology issued an order to all licensed Internet Service Providers (ISPs) in the country to block access to 32 websites, effective immediately. The basis of this was a claim that the targeted web services were being used for &quot;Jihadi Propaganda&quot; by &quot;Anti-National groups&quot;. As a response to this, a few technologists in Berlin got together and thought it would be a good idea to do some research using free and accessible tools and to look at how censorship has been implemented, as well as the various techniques that could be used to circumvent this censorship. This talk will discuss our findings and make recommendations about how ISPs can handle such censorship requests better, while being fair and transparent to their customers.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7263.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7263-en-de-GOIBlocks_-_Technical_observations_about_recent_internet_censorship_in_India_hd.mp4"
        length="381681664"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7263-en-de-GOIBlocks_-_Technical_observations_about_recent_internet_censorship_in_India_hd.mp4?1451437741</guid>
      <dc:identifier>f1c8f781-1ce7-451f-90e9-218ba94bc955</dc:identifier>
      <dc:date>2015-12-29T23:30:00+01:00</dc:date>
      <itunes:author>Kaustubh Srikanth</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>On 17th December 2014, the Government of India&#39;s Ministry of Communications and Information Technology issued an order to all licensed Internet Service Providers (ISPs) in the country to block access to 32 websites, effective immediately. The basis of this was a claim that the targeted web services were being used for &quot;Jihadi Propaganda&quot; by &quot;Anti-National groups&quot;. As a response to this, a few technologists in Berlin got together and thought it would be a good idea to do some research using free and accessible tools and to look at how censorship has been implemented, as well as the various techniques that could be used to circumvent this censorship. This talk will discuss our findings and make recommendations about how ISPs can handle such censorship requests better, while being fair and transparent to their customers.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7263.html
</itunes:summary>
      <itunes:duration>00:28:58</itunes:duration>
    </item>
    <item>
      <title>Methodisch inkorrekt! (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7221-methodisch_inkorrekt</link>
      <description>Nicolas Wöhrl und Reinhard Remfort sprechen über interessante aktuelle Forschung, Experimente und ihren wissenschaftlichen Alltag an einer deutschen Hochschule. Fachübergreifend, abwechslungsreich, unstrukturiert, hoffnungslos subjektiv und immer garantiert methodisch inkorrekt.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7221.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7221-de-Methodisch_inkorrekt_hd.mp4"
        length="3449815040"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 00:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7221-de-Methodisch_inkorrekt_hd.mp4?1452433457</guid>
      <dc:identifier>d516ffe3-d32d-4bed-8289-09d245ac2b2f</dc:identifier>
      <dc:date>2015-12-29T00:15:00+01:00</dc:date>
      <itunes:author>Nicolas Wöhrl, Reinhard Remfort</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:subtitle>Die Wissenschaftsgala vom 32C3</itunes:subtitle>
      <itunes:summary>Nicolas Wöhrl und Reinhard Remfort sprechen über interessante aktuelle Forschung, Experimente und ihren wissenschaftlichen Alltag an einer deutschen Hochschule. Fachübergreifend, abwechslungsreich, unstrukturiert, hoffnungslos subjektiv und immer garantiert methodisch inkorrekt.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7221.html
</itunes:summary>
      <itunes:duration>02:08:17</itunes:duration>
    </item>
    <item>
      <title>libusb: Maintainer fail (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7547-libusb_maintainer_fail</link>
      <description>In 2010 I was asked by the second maintainer in a row to take over as new maintainer of the libusb project. The first time I had declined.

The second time I accepted, and sadly failed.

Eventually a hostile fork emerged, with the explicit goal to take over the original project.

I will tell you my story, which mistakes I made and what I learned - about independent and corporate contributors in open source projects, about package maintainers in downstream OS distributions, about trolls on the internet, about GitHub Inc. and about myself.

The hostile fork? It wasn&#39;t merged.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7547.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7547-en-de-libusb_Maintainer_fail_hd.mp4"
        length="318767104"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7547-en-de-libusb_Maintainer_fail_hd.mp4?1451435324</guid>
      <dc:identifier>4d473646-e765-441b-98eb-653dfe6bdeb1</dc:identifier>
      <dc:date>2015-12-29T23:30:00+01:00</dc:date>
      <itunes:author>Peter Stuge</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Failosophy</itunes:keywords>
      <itunes:subtitle>How I failed to run an open source project</itunes:subtitle>
      <itunes:summary>In 2010 I was asked by the second maintainer in a row to take over as new maintainer of the libusb project. The first time I had declined.

The second time I accepted, and sadly failed.

Eventually a hostile fork emerged, with the explicit goal to take over the original project.

I will tell you my story, which mistakes I made and what I learned - about independent and corporate contributors in open source projects, about package maintainers in downstream OS distributions, about trolls on the internet, about GitHub Inc. and about myself.

The hostile fork? It wasn&#39;t merged.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7547.html
</itunes:summary>
      <itunes:duration>00:30:24</itunes:duration>
    </item>
    <item>
      <title>Stromtankstellen – eine neue öffentliche Infrastruktur (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7202-stromtankstellen_eine_neue_offentliche_infrastruktur</link>
      <description>Landauf landab entstehen zur Zeit tausende öffentlicher Stromtankstellen. Diese neue Infrastruktur bietet viel Potential für kreative Nutzungen und hat eine Reihe an Nutzungs-, Sicherheits- und Datenschutzproblemen, für die bislang Lösungen fehlen.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7202.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7202-de-en-Stromtankstellen_-_eine_neue_oeffentliche_Infrastruktur_hd.mp4"
        length="218103808"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7202-de-en-Stromtankstellen_-_eine_neue_oeffentliche_Infrastruktur_hd.mp4?1451434632</guid>
      <dc:identifier>f4da28f8-1e28-45d4-9fab-d1d36d20ca7b</dc:identifier>
      <dc:date>2015-12-29T22:45:00+01:00</dc:date>
      <itunes:author>Gunnar Thöle</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Was kann das? Wie kann ich das nutzen? Wo besteht Erforschungsbedarf?</itunes:subtitle>
      <itunes:summary>Landauf landab entstehen zur Zeit tausende öffentlicher Stromtankstellen. Diese neue Infrastruktur bietet viel Potential für kreative Nutzungen und hat eine Reihe an Nutzungs-, Sicherheits- und Datenschutzproblemen, für die bislang Lösungen fehlen.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7202.html
</itunes:summary>
      <itunes:duration>00:28:49</itunes:duration>
    </item>
    <item>
      <title>Running your own 3G/3.5G network (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7412-running_your_own_3g_3_5g_network</link>
      <description>Seven years after presenting „running your own GSM network“, we are back presenting about how to do the same for 3G (UMTS/HSPA) networks.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7412.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7412-en-Running_your_own_3G_35G_network_hd.mp4"
        length="285212672"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7412-en-Running_your_own_3G_35G_network_hd.mp4?1451434562</guid>
      <dc:identifier>16613345-4f8c-44f1-a065-b3fa1d7b51cc</dc:identifier>
      <dc:date>2015-12-27T20:30:00+01:00</dc:date>
      <itunes:author>LaForge</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>OpenBSC reloaded</itunes:subtitle>
      <itunes:summary>Seven years after presenting „running your own GSM network“, we are back presenting about how to do the same for 3G (UMTS/HSPA) networks.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7412.html
</itunes:summary>
      <itunes:duration>00:56:28</itunes:duration>
    </item>
    <item>
      <title>Maritime Robotics (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7265-maritime_robotics</link>
      <description>This talk will have a look at maritime related robots and projects. It is not all that difficult and expensive - and there are truly still dragons to find!
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7265.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7265-en-de-Maritime_Robotics_hd.mp4"
        length="267386880"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7265-en-de-Maritime_Robotics_hd.mp4?1451434485</guid>
      <dc:identifier>6063a86c-6703-4402-a7a1-074f18377b1a</dc:identifier>
      <dc:date>2015-12-29T23:30:00+01:00</dc:date>
      <itunes:author>lilafisch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Hackers, I call thee to our Oceans!</itunes:subtitle>
      <itunes:summary>This talk will have a look at maritime related robots and projects. It is not all that difficult and expensive - and there are truly still dragons to find!
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7265.html
</itunes:summary>
      <itunes:duration>00:27:22</itunes:duration>
    </item>
    <item>
      <title>Technology and Mass Atrocity Prevention (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7400-technology_and_mass_atrocity_prevention</link>
      <description>This lecture will give an overview on how technology can help and is helping to prevent or mitigate mass atrocity crimes. It focuses on the work and research of the Digital Mass Atrocity Prevention Lab (DMAP Lab) but will discuss other major projects as well. The goal is to inform the audience about ongoing efforts and spark their interest to help work at the intersection of technology and human rights.  
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7400.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7400-en-Technology_and_Mass_Atrocity_Prevention.mp4"
        length="354418688"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7400-en-Technology_and_Mass_Atrocity_Prevention.mp4?1451433596</guid>
      <dc:identifier>eb36c9f7-076a-45cc-ad66-ac97768e0c75</dc:identifier>
      <dc:date>2015-12-29T23:30:00+01:00</dc:date>
      <itunes:author>Nicolai Pogadl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Overview on Current Efforts - We Need Moar H4x0rs?! </itunes:subtitle>
      <itunes:summary>This lecture will give an overview on how technology can help and is helping to prevent or mitigate mass atrocity crimes. It focuses on the work and research of the Digital Mass Atrocity Prevention Lab (DMAP Lab) but will discuss other major projects as well. The goal is to inform the audience about ongoing efforts and spark their interest to help work at the intersection of technology and human rights.  
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7400.html
</itunes:summary>
      <itunes:duration>00:32:46</itunes:duration>
    </item>
    <item>
      <title>Craft, leisure, and end-user innovation (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7114-craft_leisure_and_end-user_innovation</link>
      <description>Hacking receives growing attention among social scientists during the last five years. Researchers particularly in the fields of Human-Computer Interaction (HCI) and Computer-Supported Collaborative Work (CSCW) but also in the social sciences generally have begun to study hacking empirically—investigating hacking as a practice and as cultural phenomenon. The talk offers a glimpse of the spectrum of research about hacking in HCI, CSCW, and adjacent fields. Researchers in these fields portray hacking very differently. The spectrum ranges from “transgressive craft” to “innovative leisure practice,” from skilled craftsmanship to ad hoc kludging, from an individualist pursuit to a community mission, from an expression of liberalism to an exclusive practice of cultural distinction. Some researchers see hacking as an illustration of how to defy technological determinism, i.e., the conviction that the technological determines the social, a position that social scientists typically fight ferociously. Other researchers see it as the future of “end-user innovation.” This talks discusses these notions and describes the value---economic, pedagogical, cultural, conceptual---that different research perspectives perceive in hacking.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7114.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7114-de-Craft_leisure_and_end-user_innovation.mp4"
        length="304087040"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7114-de-Craft_leisure_and_end-user_innovation.mp4?1454539843</guid>
      <dc:identifier>5f5cdb89-f599-40a6-84eb-d588eeed0250</dc:identifier>
      <dc:date>2015-12-29T22:00:00+01:00</dc:date>
      <itunes:author>Susann Wagenknecht</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>How hacking is conceived in social science research</itunes:subtitle>
      <itunes:summary>Hacking receives growing attention among social scientists during the last five years. Researchers particularly in the fields of Human-Computer Interaction (HCI) and Computer-Supported Collaborative Work (CSCW) but also in the social sciences generally have begun to study hacking empirically—investigating hacking as a practice and as cultural phenomenon. The talk offers a glimpse of the spectrum of research about hacking in HCI, CSCW, and adjacent fields. Researchers in these fields portray hacking very differently. The spectrum ranges from “transgressive craft” to “innovative leisure practice,” from skilled craftsmanship to ad hoc kludging, from an individualist pursuit to a community mission, from an expression of liberalism to an exclusive practice of cultural distinction. Some researchers see hacking as an illustration of how to defy technological determinism, i.e., the conviction that the technological determines the social, a position that social scientists typically fight ferociously. Other researchers see it as the future of “end-user innovation.” This talks discusses these notions and describes the value---economic, pedagogical, cultural, conceptual---that different research perspectives perceive in hacking.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7114.html
</itunes:summary>
      <itunes:duration>00:32:28</itunes:duration>
    </item>
    <item>
      <title>On Computing Numbers, with an Application to Problems of our Society (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7419-on_computing_numbers_with_an_application_to_problems_of_our_society</link>
      <description>Journalists, while structurally and economically under threat, are bringing computer science into their newsrooms. Their tools and techniques benefit from computer science in areas such as databases, graph analysis and machine learning and allow journalists to tackle new kinds of stories.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7419.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7419-en-de-On_Computing_Numbers_with_an_Application_to_Problems_of_our_Society_hd.mp4"
        length="528482304"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7419-en-de-On_Computing_Numbers_with_an_Application_to_Problems_of_our_Society_hd.mp4?1451432272</guid>
      <dc:identifier>25dc688f-fe4f-4648-8b82-82c05cc090b8</dc:identifier>
      <dc:date>2015-12-29T22:45:00+01:00</dc:date>
      <itunes:author>Stefan Wehrmeyer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Journalism ♥ Computer Science</itunes:subtitle>
      <itunes:summary>Journalists, while structurally and economically under threat, are bringing computer science into their newsrooms. Their tools and techniques benefit from computer science in areas such as databases, graph analysis and machine learning and allow journalists to tackle new kinds of stories.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7419.html
</itunes:summary>
      <itunes:duration>00:30:44</itunes:duration>
    </item>
    <item>
      <title>Österreich: Der Kampf gegen unkontrollierte Massenüberwachung (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7413-osterreich_der_kampf_gegen_unkontrollierte_massenuberwachung</link>
      <description>Im April 2015 hat die österreichische Bundesregierung einen Entwurf für ein &quot;Polizeiliches Staatsschutzgesetz&quot; vorgelegt. Damit soll ein neuer Inlandsgeheimdienst mit weitreichenden Überwachungsbefugnissen geschaffen werden. Unabhängige Kontrolle durch Gerichte und das Parlament ist nicht vorgesehen. Bereits in der Begutachtungsphase wurde das Gesetz massiv kritisiert. Der AKVorrat gab mit einer umfassenden Stellungnahme die wichtigsten Argumente vor. Der Widerstand gegen das Gesetz und die Kampagne des AKVorrat haben zwar zu mehrfacher Verschiebung der Beschlussfassung geführt, aber die Geheimdienstpläne der Regierung sind trotz mehr als 22.000 Unterzeichnerinnen und Unterzeichnern der Petition auf www.staatsschutz.at nach wie vor nicht vom Tisch. Der Talk bietet Einblicke, wie Geheimdienste in der Post-Snowden-Ära öffentlich und nicht öffentlich diskutiert werden.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7413.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7413-en-OEsterreich_Der_Kampf_gegen_unkontrollierte_Massenueberwachung.mp4"
        length="370147328"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7413-en-OEsterreich_Der_Kampf_gegen_unkontrollierte_Massenueberwachung.mp4?1453157908</guid>
      <dc:identifier>d961bd32-2c2a-45a5-bc58-64449bb4b16a</dc:identifier>
      <dc:date>2015-12-29T22:45:00+01:00</dc:date>
      <itunes:author>Thomas Lohninger, Werner Reiter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Geheimdienste kontrolliert man am besten, indem man ihre Gründung verhindert</itunes:subtitle>
      <itunes:summary>Im April 2015 hat die österreichische Bundesregierung einen Entwurf für ein &quot;Polizeiliches Staatsschutzgesetz&quot; vorgelegt. Damit soll ein neuer Inlandsgeheimdienst mit weitreichenden Überwachungsbefugnissen geschaffen werden. Unabhängige Kontrolle durch Gerichte und das Parlament ist nicht vorgesehen. Bereits in der Begutachtungsphase wurde das Gesetz massiv kritisiert. Der AKVorrat gab mit einer umfassenden Stellungnahme die wichtigsten Argumente vor. Der Widerstand gegen das Gesetz und die Kampagne des AKVorrat haben zwar zu mehrfacher Verschiebung der Beschlussfassung geführt, aber die Geheimdienstpläne der Regierung sind trotz mehr als 22.000 Unterzeichnerinnen und Unterzeichnern der Petition auf www.staatsschutz.at nach wie vor nicht vom Tisch. Der Talk bietet Einblicke, wie Geheimdienste in der Post-Snowden-Ära öffentlich und nicht öffentlich diskutiert werden.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7413.html
</itunes:summary>
      <itunes:duration>00:30:41</itunes:duration>
    </item>
    <item>
      <title>Building and Breaking Wireless Security (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7119-building_and_breaking_wireless_security</link>
      <description>This talk gives an overview on state-of-the-art wireless security concepts: How can we analyze wireless protocols? How can we build mechanisms that are secure even when the attacker has unlimited computational power? Can we exploit wireless transmission for more?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7119.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7119-en-de-Building_and_Breaking_Wireless_Security_hd.mp4"
        length="281018368"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7119-en-de-Building_and_Breaking_Wireless_Security_hd.mp4?1451431698</guid>
      <dc:identifier>60ba43d2-a9c8-42ab-a434-8772cb182675</dc:identifier>
      <dc:date>2015-12-29T22:45:00+01:00</dc:date>
      <itunes:author>jiska</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Wireless Physical Layer Security &amp; More...</itunes:subtitle>
      <itunes:summary>This talk gives an overview on state-of-the-art wireless security concepts: How can we analyze wireless protocols? How can we build mechanisms that are secure even when the attacker has unlimited computational power? Can we exploit wireless transmission for more?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7119.html
</itunes:summary>
      <itunes:duration>00:29:05</itunes:duration>
    </item>
    <item>
      <title>QRtistry (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7310-qrtistry</link>
      <description>QR codes have rapidly overtaken rival 2D bar code symbologies and are becoming quite ubiquitous. Most uses are rather pedestrian though, and even the more non-standard modifications to pure QR codes lack a certain technical finesse, opting to just overpaint part of the code and let error correction handle that instead. Let&#39;s see how we can do better.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7310.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7310-en-de-QRtistry_hd.mp4"
        length="264241152"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7310-en-de-QRtistry_hd.mp4?1451430646</guid>
      <dc:identifier>3026eefd-c196-421a-b9d3-d678753ad8f7</dc:identifier>
      <dc:date>2015-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Henryk Plötz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>One can create art and beauty with … pixels</itunes:subtitle>
      <itunes:summary>QR codes have rapidly overtaken rival 2D bar code symbologies and are becoming quite ubiquitous. Most uses are rather pedestrian though, and even the more non-standard modifications to pure QR codes lack a certain technical finesse, opting to just overpaint part of the code and let error correction handle that instead. Let&#39;s see how we can do better.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7310.html
</itunes:summary>
      <itunes:duration>00:28:49</itunes:duration>
    </item>
    <item>
      <title>Internet Cube (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7401-internet_cube</link>
      <description>Two years after the invitation to build your own iSP at 30C3, I&#39;d like to invite everyone to take part in building a better Internet with the Internet Cube project.

about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7401.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7401-en-de-Internet_Cube_hd.mp4"
        length="244318208"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7401-en-de-Internet_Cube_hd.mp4?1451429803</guid>
      <dc:identifier>8becd5e2-45df-4723-9d6a-2e9f334875d2</dc:identifier>
      <dc:date>2015-12-29T22:00:00+01:00</dc:date>
      <itunes:author>taziden, kload</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Let&#39;s Build together a Free, Neutral and Decentralized Internet</itunes:subtitle>
      <itunes:summary>Two years after the invitation to build your own iSP at 30C3, I&#39;d like to invite everyone to take part in building a better Internet with the Internet Cube project.

about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7401.html
</itunes:summary>
      <itunes:duration>00:22:55</itunes:duration>
    </item>
    <item>
      <title>the possibility of an army (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7517-the_possibility_of_an_army</link>
      <description>Using follower bombing as art performances, the artists Constant Dullaart continues the research into attention and identity as a commodity on social networks, and has recently created a large sum of custom created artificial Facebook identities.
Many websites offer an option to login in with Facebook credentials due to the strict controle of the service on the reliability and verification of the social medium. In a time where the open borders in Europe are under pressure, and Syrian identities are sold to people that long for a better future, virtual identity systems, and their reliability become a topical analogy.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7517.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7517-en-de-the_possibility_of_an_army_hd.mp4"
        length="494927872"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7517-en-de-the_possibility_of_an_army_hd.mp4?1451429019</guid>
      <dc:identifier>92891768-7427-4d48-8127-35d18318a63d</dc:identifier>
      <dc:date>2015-12-29T22:00:00+01:00</dc:date>
      <itunes:author>constantdull</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>phone verified accounts bringing the Hessian army back to life</itunes:subtitle>
      <itunes:summary>Using follower bombing as art performances, the artists Constant Dullaart continues the research into attention and identity as a commodity on social networks, and has recently created a large sum of custom created artificial Facebook identities.
Many websites offer an option to login in with Facebook credentials due to the strict controle of the service on the reliability and verification of the social medium. In a time where the open borders in Europe are under pressure, and Syrian identities are sold to people that long for a better future, virtual identity systems, and their reliability become a topical analogy.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7517.html
</itunes:summary>
      <itunes:duration>00:30:08</itunes:duration>
    </item>
    <item>
      <title>20 OSCILLATORS IN 20 MINUTES (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7549-20_oscillators_in_20_minutes</link>
      <description>20 OSCILLATORS IN 20 MINUTES is an experimental music performance/technical challenge/standup comedy act where I attempt to build twenty sound generating square wave oscillators in twenty minutes. This involves fabricating small electronic circuits with wires, chips, small components and nine-volt batteries under the pressure of limited time and expectation. This is a test of my technical abilities and an experiment in working with live troubleshooting as a method of musical improvisation. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7549.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7549-en-de-20_OSCILLATORS_IN_20_MINUTES_hd.mp4"
        length="888143872"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7549-en-de-20_OSCILLATORS_IN_20_MINUTES_hd.mp4?1451428605</guid>
      <dc:identifier>3b16ddc9-499b-44b1-9084-b3e328daea30</dc:identifier>
      <dc:date>2015-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Darsha</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:summary>20 OSCILLATORS IN 20 MINUTES is an experimental music performance/technical challenge/standup comedy act where I attempt to build twenty sound generating square wave oscillators in twenty minutes. This involves fabricating small electronic circuits with wires, chips, small components and nine-volt batteries under the pressure of limited time and expectation. This is a test of my technical abilities and an experiment in working with live troubleshooting as a method of musical improvisation. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7549.html
</itunes:summary>
      <itunes:duration>00:25:43</itunes:duration>
    </item>
    <item>
      <title>Intelexit (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7426-intelexit</link>
      <description>Giant billboard vans, drone-operated leaflet drops over an NSA building and calls to secret service agents, Intelexit explores all routes to reach out to secret service agents and convince them to follow their conscience and quit their jobs. We will take a look at the highlights of the campaign from 2015 and what&#39;s around the corner for 2016. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7426.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7426-en-Intelexit.mp4"
        length="295698432"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7426-en-Intelexit.mp4?1454540092</guid>
      <dc:identifier>550b8e16-3394-40d2-b47c-7cfe0031945b</dc:identifier>
      <dc:date>2015-12-29T21:15:00+01:00</dc:date>
      <itunes:author>Gloria Spindle – Peng! Collective</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Calling secret service agents to quit their jobs </itunes:subtitle>
      <itunes:summary>Giant billboard vans, drone-operated leaflet drops over an NSA building and calls to secret service agents, Intelexit explores all routes to reach out to secret service agents and convince them to follow their conscience and quit their jobs. We will take a look at the highlights of the campaign from 2015 and what&#39;s around the corner for 2016. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7426.html
</itunes:summary>
      <itunes:duration>00:30:13</itunes:duration>
    </item>
    <item>
      <title>Media Coverage and the Public in the Surveillance Society (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7388-media_coverage_and_the_public_in_the_surveillance_society</link>
      <description>How have the media reported the Snowden revelations? Does the public care about surveillance, and how do people react? Do we need a ‚data justice‘ movement?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7388.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7388-en-de-Media_Coverage_and_the_Public_in_the_Surveillance_Society_hd.mp4"
        length="267386880"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7388-en-de-Media_Coverage_and_the_Public_in_the_Surveillance_Society_hd.mp4?1452266556</guid>
      <dc:identifier>f193e1eb-5f67-43bc-a42a-c2c9b0c8d57f</dc:identifier>
      <dc:date>2015-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Arne Hintz, Lina Dencik</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Findings from a Research Project on Digital Surveillance Post-Snowden</itunes:subtitle>
      <itunes:summary>How have the media reported the Snowden revelations? Does the public care about surveillance, and how do people react? Do we need a ‚data justice‘ movement?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7388.html
</itunes:summary>
      <itunes:duration>00:28:47</itunes:duration>
    </item>
    <item>
      <title>The plain simple reality of entropy (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7441-the_plain_simple_reality_of_entropy</link>
      <description>Entropy, the randomness used in many critical cryptography processes including key generation, is as important as it is misunderstood. Many myths are fueled by misleading documentation. This presentation aims to provide simple and actionable information while explaining the core technical details and real world implementations.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7441.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7441-en-de-The_plain_simple_reality_of_entropy_hd.mp4"
        length="318767104"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7441-en-de-The_plain_simple_reality_of_entropy_hd.mp4?1451427685</guid>
      <dc:identifier>8b01d636-d39b-44b8-8d6f-fc03e47eae1b</dc:identifier>
      <dc:date>2015-12-29T21:15:00+01:00</dc:date>
      <itunes:author>Filippo Valsorda</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Or how I learned to stop worrying and love urandom</itunes:subtitle>
      <itunes:summary>Entropy, the randomness used in many critical cryptography processes including key generation, is as important as it is misunderstood. Many myths are fueled by misleading documentation. This presentation aims to provide simple and actionable information while explaining the core technical details and real world implementations.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7441.html
</itunes:summary>
      <itunes:duration>00:29:59</itunes:duration>
    </item>
    <item>
      <title>Trust us and our business will expand! (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7219-trust_us_and_our_business_will_expand</link>
      <description>The lecture outlines strategies by the &quot;Artist against 419&quot; online community that uses open source intelligence to gather data and file reports about fraudulent websites. The lecture presents the artistic installation &quot;Megacorp.&quot; (created by KairUs) that tries to visualize the global phenomenon of fake business websites.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7219.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7219-en-de-Trust_us_and_our_business_will_expand_hd.mp4"
        length="249561088"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 21:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7219-en-de-Trust_us_and_our_business_will_expand_hd.mp4?1451427459</guid>
      <dc:identifier>bfadd7de-3680-4766-a474-faa53c5f141f</dc:identifier>
      <dc:date>2015-12-29T21:30:00+01:00</dc:date>
      <itunes:author>Andreas Zingerle, Linda Kronman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Net-activism strategies against fake web companies</itunes:subtitle>
      <itunes:summary>The lecture outlines strategies by the &quot;Artist against 419&quot; online community that uses open source intelligence to gather data and file reports about fraudulent websites. The lecture presents the artistic installation &quot;Megacorp.&quot; (created by KairUs) that tries to visualize the global phenomenon of fake business websites.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7219.html
</itunes:summary>
      <itunes:duration>00:22:03</itunes:duration>
    </item>
    <item>
      <title>Reversing UEFI by execution (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7245-reversing_uefi_by_execution</link>
      <description>This talk will be an overview of how to reverse-engineer Unified Extensible Firmware Interface (UEFI) firmware, the replacement for BIOS. Various useful tools will be discussed, including those written by the presenter and those written by others. One of the highlights will be a tool that enables running parts of the firmware in userspace on a standard Operating System.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7245.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7245-en-de-Reversing_UEFI_by_execution_hd.mp4"
        length="287309824"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7245-en-de-Reversing_UEFI_by_execution_hd.mp4?1451427273</guid>
      <dc:identifier>930673b3-4f75-40eb-8be5-574469c3920f</dc:identifier>
      <dc:date>2015-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Jethro Beekman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>This talk will be an overview of how to reverse-engineer Unified Extensible Firmware Interface (UEFI) firmware, the replacement for BIOS. Various useful tools will be discussed, including those written by the presenter and those written by others. One of the highlights will be a tool that enables running parts of the firmware in userspace on a standard Operating System.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7245.html
</itunes:summary>
      <itunes:duration>00:24:52</itunes:duration>
    </item>
    <item>
      <title>The architecture of a street level panopticon (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7374-the_architecture_of_a_street_level_panopticon</link>
      <description>Street level surveillance technology, such as surveillance cameras and iris scanners, is now a pervasive part of the daily lives of city dwellers, with disastrous consequences for freedom of expression. This talk will cover what kind of street level technology we’re seeing, how it’s spreading, and who’s making money off of it. We’ll also talk about some of the security flaws hackers have exposed on these technologies, and put out a call to action to CCC. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7374.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7374-en-de-The_architecture_of_a_street_level_panopticon_hd.mp4"
        length="772800512"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7374-en-de-The_architecture_of_a_street_level_panopticon_hd.mp4?1451421960</guid>
      <dc:identifier>b4339927-6780-4881-a342-e7a262078dce</dc:identifier>
      <dc:date>2015-12-29T18:30:00+01:00</dc:date>
      <itunes:author>Dia Kayyali</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>How drones, IMSI Catchers, and cameras are shaping our cities</itunes:subtitle>
      <itunes:summary>Street level surveillance technology, such as surveillance cameras and iris scanners, is now a pervasive part of the daily lives of city dwellers, with disastrous consequences for freedom of expression. This talk will cover what kind of street level technology we’re seeing, how it’s spreading, and who’s making money off of it. We’ll also talk about some of the security flaws hackers have exposed on these technologies, and put out a call to action to CCC. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7374.html
</itunes:summary>
      <itunes:duration>01:01:01</itunes:duration>
    </item>
    <item>
      <title>3D printing on the moon (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7336-3d_printing_on_the_moon</link>
      <description>3D printers are almost everywhere, but not on the moon yet. We want to change that and this talk gives you a little insight into the how and whys of 3D printing on the moon.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7336.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7336-en-de-3D_printing_on_the_moon_hd.mp4"
        length="765460480"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7336-en-de-3D_printing_on_the_moon_hd.mp4?1451420907</guid>
      <dc:identifier>47da549d-fd5b-4210-a8e5-bbb057844c0d</dc:identifier>
      <dc:date>2015-12-29T18:30:00+01:00</dc:date>
      <itunes:author>Karsten Becker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>The future of space exploration</itunes:subtitle>
      <itunes:summary>3D printers are almost everywhere, but not on the moon yet. We want to change that and this talk gives you a little insight into the how and whys of 3D printing on the moon.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7336.html
</itunes:summary>
      <itunes:duration>00:55:10</itunes:duration>
    </item>
    <item>
      <title>Ten years after ‚We Lost The War‘ (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7501-ten_years_after_we_lost_the_war</link>
      <description>The talk „We Lost The War“ was presented at Congress ten years ago, causing quite a stir. It was a prediction of a dark future that did not sit well with many people, but unfortunately many predictions have come true meanwhile. This talk will try to address what comes next, as well as what the hacker community can do to make things better.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7501.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7501-en-de-Ten_years_after_We_Lost_The_War_hd.mp4"
        length="1005584384"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7501-en-de-Ten_years_after_We_Lost_The_War_hd.mp4?1451420697</guid>
      <dc:identifier>0c8f0e98-92ee-42ba-aa75-04fc50344904</dc:identifier>
      <dc:date>2015-12-29T18:30:00+01:00</dc:date>
      <itunes:author>rop, frank</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>The future does not look much brighter than ten years ago. What comes next, and what can the hacker community do to make things better?</itunes:subtitle>
      <itunes:summary>The talk „We Lost The War“ was presented at Congress ten years ago, causing quite a stir. It was a prediction of a dark future that did not sit well with many people, but unfortunately many predictions have come true meanwhile. This talk will try to address what comes next, as well as what the hacker community can do to make things better.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7501.html
</itunes:summary>
      <itunes:duration>01:01:33</itunes:duration>
    </item>
    <item>
      <title>Prediction and Control (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7449-prediction_and_control</link>
      <description>Mass quantities of data are being incorporated into predictive systems in an ever-broadening set of fields. In many cases, these algorithms operate in the dark and their use has implications both intentional and unintentional. This talk will cover some of the fairness and accountability issues involved in controlling algorithms for media, policy, and policing. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7449.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7449-en-de-Prediction_and_Control_hd.mp4"
        length="500170752"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7449-en-de-Prediction_and_Control_hd.mp4?1451420558</guid>
      <dc:identifier>13789a83-1028-40a6-ac32-827b57ec3f8e</dc:identifier>
      <dc:date>2015-12-29T18:30:00+01:00</dc:date>
      <itunes:author>Jennifer Helsby</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Watching Algorithms</itunes:subtitle>
      <itunes:summary>Mass quantities of data are being incorporated into predictive systems in an ever-broadening set of fields. In many cases, these algorithms operate in the dark and their use has implications both intentional and unintentional. This talk will cover some of the fairness and accountability issues involved in controlling algorithms for media, policy, and policing. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7449.html
</itunes:summary>
      <itunes:duration>00:54:27</itunes:duration>
    </item>
    <item>
      <title>Vehicle2Vehicle Communication based on IEEE 802.11p (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7165-vehicle2vehicle_communication_based_on_ieee_802_11p</link>
      <description>This talk is about Vehicle2Vehicle (V2V) communication in Europe and in the U.S. Next to the introduction of some requirements for V2V communication, the basic approaches of V2V communication based on IEEE 802.11p are presented. This includes an introduction to communication stack, concepts of message dissemination, message contents, privacy &amp; security issues and an outlook to further developments.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7165.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7165-en-Vehicle2Vehicle_Communication_based_on_IEEE_80211p.mp4"
        length="512753664"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7165-en-Vehicle2Vehicle_Communication_based_on_IEEE_80211p.mp4?1452118099</guid>
      <dc:identifier>276311bf-60b5-411a-ab68-6a8fbb0fd6a9</dc:identifier>
      <dc:date>2015-12-29T16:00:00+01:00</dc:date>
      <itunes:author>Bernd Lehmann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>This talk is about Vehicle2Vehicle (V2V) communication in Europe and in the U.S. Next to the introduction of some requirements for V2V communication, the basic approaches of V2V communication based on IEEE 802.11p are presented. This includes an introduction to communication stack, concepts of message dissemination, message contents, privacy &amp; security issues and an outlook to further developments.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7165.html
</itunes:summary>
      <itunes:duration>01:00:16</itunes:duration>
    </item>
    <item>
      <title>Unpatchable (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7273-unpatchable</link>
      <description>Gradually we are all becoming more and more dependent on machines, we will be able to live longer with an increased quality of life due to machines integrated into our body. However, our dependence on technology grows faster than our ability to secure it, and a security failure of a medical device can have fatal consequences. This talk is about Marie&#39;s personal experience with being the host of a vulnerable medical implant, and how this has forced her to become a human part of the &quot;Internet-of-Things&quot;. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7273.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7273-en-Unpatchable_hd.mp4"
        length="824180736"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7273-en-Unpatchable_hd.mp4?1451419819</guid>
      <dc:identifier>ab751ee0-8623-4a20-bab3-f82f8cf3dd82</dc:identifier>
      <dc:date>2015-12-28T23:00:00+01:00</dc:date>
      <itunes:author>Marie Moe, Eireann Leverett</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Living with a vulnerable implanted device</itunes:subtitle>
      <itunes:summary>Gradually we are all becoming more and more dependent on machines, we will be able to live longer with an increased quality of life due to machines integrated into our body. However, our dependence on technology grows faster than our ability to secure it, and a security failure of a medical device can have fatal consequences. This talk is about Marie&#39;s personal experience with being the host of a vulnerable medical implant, and how this has forced her to become a human part of the &quot;Internet-of-Things&quot;. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7273.html
</itunes:summary>
      <itunes:duration>01:00:15</itunes:duration>
    </item>
    <item>
      <title>A Dozen Years of Shellphish (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7218-a_dozen_years_of_shellphish</link>
      <description>How we built an automatic exploitation system and qualified for the DARPA Cyber Grand Challenge.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7218.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7218-en-de-A_Dozen_Years_of_Shellphish_hd.mp4"
        length="633339904"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7218-en-de-A_Dozen_Years_of_Shellphish_hd.mp4?1451437726</guid>
      <dc:identifier>1cac5105-cfdc-42e9-9a87-0ee71fc2443c</dc:identifier>
      <dc:date>2015-12-29T17:15:00+01:00</dc:date>
      <itunes:author>Antonio Bianchi, Jacopo Corbetta, Andrew Dutcher</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>From DEFCON to the DARPA Cyber Grand Challenge</itunes:subtitle>
      <itunes:summary>How we built an automatic exploitation system and qualified for the DARPA Cyber Grand Challenge.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7218.html
</itunes:summary>
      <itunes:duration>00:57:27</itunes:duration>
    </item>
    <item>
      <title>The Price Of Dissent (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7443-the_price_of_dissent</link>
      <description>CAGE exists to highlight abuses of the War on Terror. It has uncovered many secrets of governments that they would like to remain secret, and is now one of the most targeted organisations in the UK. Hear how the state attempts to suppress dissent, and yet we manage to speak out.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7443.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7443-en-de-The_Price_Of_Dissent_hd.mp4"
        length="1101004800"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7443-en-de-The_Price_Of_Dissent_hd.mp4?1451417662</guid>
      <dc:identifier>9d3ce896-1ee6-47c5-b616-1ebcf6860690</dc:identifier>
      <dc:date>2015-12-29T17:15:00+01:00</dc:date>
      <itunes:author>CAGE, Cerie Bullivant</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>The surveillance state &amp; modern day COINTELPRO tactics</itunes:subtitle>
      <itunes:summary>CAGE exists to highlight abuses of the War on Terror. It has uncovered many secrets of governments that they would like to remain secret, and is now one of the most targeted organisations in the UK. Hear how the state attempts to suppress dissent, and yet we manage to speak out.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7443.html
</itunes:summary>
      <itunes:duration>01:02:57</itunes:duration>
    </item>
    <item>
      <title>De-anonymizing Programmers (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7491-de-anonymizing_programmers</link>
      <description>Last year I presented research showing how to de-anonymize programmers based on their coding style. This is of immediate concern to open source software developers who would like to remain anonymous. On the other hand, being able to de-anonymize programmers can help in forensic investigations, or in resolving plagiarism claims or copyright disputes. 

I will report on our new research findings in the past year. We were able to increase the scale and accuracy of our methods dramatically and can now handle 1,600 programmers, reaching 94% de-anonymization accuracy. In ongoing research, we are tackling the much harder problem of de-anonymizing programmers from binaries of compiled code. This can help identify the author of a suspicious executable file and can potentially aid malware forensics. We demonstrate the efficacy of our techniques using a dataset collected from GitHub.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7491.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7491-en-de-De-anonymizing_Programmers_hd.mp4"
        length="537919488"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7491-en-de-De-anonymizing_Programmers_hd.mp4?1451417519</guid>
      <dc:identifier>371063d0-da9d-4d9f-bbe9-f5739eba2f30</dc:identifier>
      <dc:date>2015-12-29T17:15:00+01:00</dc:date>
      <itunes:author>Aylin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Large Scale Authorship Attribution from Executable Binaries of Compiled Code and Source Code</itunes:subtitle>
      <itunes:summary>Last year I presented research showing how to de-anonymize programmers based on their coding style. This is of immediate concern to open source software developers who would like to remain anonymous. On the other hand, being able to de-anonymize programmers can help in forensic investigations, or in resolving plagiarism claims or copyright disputes. 

I will report on our new research findings in the past year. We were able to increase the scale and accuracy of our methods dramatically and can now handle 1,600 programmers, reaching 94% de-anonymization accuracy. In ongoing research, we are tackling the much harder problem of de-anonymizing programmers from binaries of compiled code. This can help identify the author of a suspicious executable file and can potentially aid malware forensics. We demonstrate the efficacy of our techniques using a dataset collected from GitHub.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7491.html
</itunes:summary>
      <itunes:duration>00:59:32</itunes:duration>
    </item>
    <item>
      <title>Safe Harbor (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7513-safe_harbor</link>
      <description>Introduction and consequences of the CJEU&#39;s &quot;Safe Harbor&quot; ruling, to  invalidate the EU-US data sharing deal in the light of the revelations over US surveillance by Edward Snowden.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7513.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7513-en-de-Safe_Harbor_hd.mp4"
        length="698351616"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7513-en-de-Safe_Harbor_hd.mp4?1451416920</guid>
      <dc:identifier>668ba44b-6800-4a8f-9544-b8e5cd7bd86c</dc:identifier>
      <dc:date>2015-12-29T17:15:00+01:00</dc:date>
      <itunes:author>Max Schrems</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Introduction and consequences of the CJEU&#39;s &quot;Safe Harbor&quot; ruling, to  invalidate the EU-US data sharing deal in the light of the revelations over US surveillance by Edward Snowden.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7513.html
</itunes:summary>
      <itunes:duration>00:59:18</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 3 (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7559-lightning_talks_day_3</link>
      <description>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7559.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7559-en-de-Lightning_Talks_Day_3_hd.mp4"
        length="969932800"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7559-en-de-Lightning_Talks_Day_3_hd.mp4?1451412493</guid>
      <dc:identifier>3a1241e9-1e0b-4539-a44c-7d04257ae16d</dc:identifier>
      <dc:date>2015-12-29T12:45:00+01:00</dc:date>
      <itunes:author>gedsic, bigalex</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7559.html
</itunes:summary>
      <itunes:duration>02:09:24</itunes:duration>
    </item>
    <item>
      <title>Check your privileges! (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7284-check_your_privileges</link>
      <description>After defensive programming techniques and before attack method mitigations, the least privilege principle is our strongest weapon against exploitation. Much of the focus has been on how the admin can sandbox processes away.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7284.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7284-en-de-Check_your_privileges_hd.mp4"
        length="354418688"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7284-en-de-Check_your_privileges_hd.mp4?1451412325</guid>
      <dc:identifier>b7327513-182a-455a-932e-aab4791f5331</dc:identifier>
      <dc:date>2015-12-29T16:00:00+01:00</dc:date>
      <itunes:author>Fefe</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>How to drop more of your privileges to reduce attack surface.</itunes:subtitle>
      <itunes:summary>After defensive programming techniques and before attack method mitigations, the least privilege principle is our strongest weapon against exploitation. Much of the focus has been on how the admin can sandbox processes away.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7284.html
</itunes:summary>
      <itunes:duration>01:00:47</itunes:duration>
    </item>
    <item>
      <title>Say hi to your new boss: How algorithms might soon control our lives. (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7482-say_hi_to_your_new_boss_how_algorithms_might_soon_control_our_lives</link>
      <description>Algorithms and „big data“ penetrate many aspects of our lives today. In the future, data collection and analysis will be even more ubiquitous and permeate our lives from morning to night.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7482.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7482-en-de-Say_hi_to_your_new_boss_How_algorithms_might_soon_control_our_lives_hd.mp4"
        length="559939584"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7482-en-de-Say_hi_to_your_new_boss_How_algorithms_might_soon_control_our_lives_hd.mp4?1451411783</guid>
      <dc:identifier>e9a8cc8d-a598-4bc3-83ac-82c1fe227b0a</dc:identifier>
      <dc:date>2015-12-29T16:00:00+01:00</dc:date>
      <itunes:author>Andreas Dewes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Discrimination and ethics in the data-driven society</itunes:subtitle>
      <itunes:summary>Algorithms and „big data“ penetrate many aspects of our lives today. In the future, data collection and analysis will be even more ubiquitous and permeate our lives from morning to night.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7482.html
</itunes:summary>
      <itunes:duration>00:59:54</itunes:duration>
    </item>
    <item>
      <title>Gibberish Detection 102 (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7243-gibberish_detection_102</link>
      <description>DGAs (Domain Generation Algorithms) have become a trusty fallback mechanism for malware that’s a headache to deal with, but they have one big drawback – they draw a lot of attention to themselves with their many DNS request for gibberish domains.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7243.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7243-en-de-Gibberish_Detection_102_hd.mp4"
        length="452984832"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7243-en-de-Gibberish_Detection_102_hd.mp4?1451411466</guid>
      <dc:identifier>018148c1-62c9-4796-8443-2a8c8b8e3a01</dc:identifier>
      <dc:date>2015-12-29T16:00:00+01:00</dc:date>
      <itunes:author>Ben H.</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>DGAs (Domain Generation Algorithms) have become a trusty fallback mechanism for malware that’s a headache to deal with, but they have one big drawback – they draw a lot of attention to themselves with their many DNS request for gibberish domains.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7243.html
</itunes:summary>
      <itunes:duration>00:58:19</itunes:duration>
    </item>
    <item>
      <title>&quot;Fluxus cannot save the world.&quot; (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7421-fluxus_cannot_save_the_world</link>
      <description>The Fluxus movement came about in the early 1960ies and the talk will discuss its strenghts, dead-ends and promises for the creation of works and community in our digital environment. International, transdisciplinary, non-institutional, anti-art and playful. After several years of research and new art productions, Leo Findeisen and Markus Zimmermann will present their findings.  

about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7421.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7421-en-de-Fluxus_cannot_save_the_world_hd.mp4"
        length="1020264448"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7421-en-de-Fluxus_cannot_save_the_world_hd.mp4?1451407319</guid>
      <dc:identifier>cc9ede64-bad5-4ed0-92a3-4fbaf54eadec</dc:identifier>
      <dc:date>2015-12-29T14:00:00+01:00</dc:date>
      <itunes:author>leomagnet, Markus Zimmermann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>What hacking has to do with avantgarde art of the 1960ies (subtitle to be changed)</itunes:subtitle>
      <itunes:summary>The Fluxus movement came about in the early 1960ies and the talk will discuss its strenghts, dead-ends and promises for the creation of works and community in our digital environment. International, transdisciplinary, non-institutional, anti-art and playful. After several years of research and new art productions, Leo Findeisen and Markus Zimmermann will present their findings.  

about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7421.html
</itunes:summary>
      <itunes:duration>00:57:41</itunes:duration>
    </item>
    <item>
      <title>State of the Onion (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7307-state_of_the_onion</link>
      <description>&lt;p&gt;Major changes are underway in the Tor Project, the Tor Network, and the Tor community. We want to tell you details and introduce the growing Tor community to the larger world.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7307.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7307-en-de-State_of_the_Onion_hd.mp4"
        length="890241024"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7307-en-de-State_of_the_Onion_hd.mp4?1451406980</guid>
      <dc:identifier>088e3078-bab2-433d-8be2-f1a4b37b4d5c</dc:identifier>
      <dc:date>2015-12-29T14:00:00+01:00</dc:date>
      <itunes:author>Roger, Jacob Appelbaum, Mike Perry, Shari Steele, Alison Macrina</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>&lt;p&gt;Major changes are underway in the Tor Project, the Tor Network, and the Tor community. We want to tell you details and introduce the growing Tor community to the larger world.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7307.html
</itunes:summary>
      <itunes:duration>01:06:05</itunes:duration>
    </item>
    <item>
      <title>Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015 (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7255-neither_snow_nor_rain_nor_mitm_the_state_of_email_security_in_2015</link>
      <description>Is your email being sent in the clear? While PGP and S/MIME provide end-to-end encrypted mail, most users have yet to adopt these practices, and for users who have, these tools leave metadata, such as the subject, sender, and recipient, visible everywhere along a message’s path. SMTP&amp;mdash;the ubiquitous mail transport protocol&amp;mdash;has evolved over the years to add encryption and authentication, both of which take place behind the scenes and help guard against surveillance and spam. While these features are being increasingly deployed, our research shows that they are almost always configured in vulnerable ways&amp;mdash;the details of which are hidden from the users sending and receiving mail. Even more disturbingly, these vulnerabilities are being widely exploited in the wild: in seven countries, more than 20% of inbound Gmail messages are downgraded to cleartext by network-based attacks. In the most severe case, 96% of messages sent from Tunisia to Gmail are downgraded to cleartext. In this talk, I’ll introduce the commonly used SMTP security extensions&amp;mdash;including STARTTLS, SPF, DKIM, and DMARC&amp;mdash;and describe the current state of mail security on the Internet. I&#39;ll describe several commonly occurring attacks our recent research has found and discuss how mail operators can configure their servers to secure email transport. Finally, I&#39;ll discuss several weaknesses in the protocols we&#39;re using and recent proposals for helping secure email transport.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7255.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7255-en-de-Neither_Snow_Nor_Rain_Nor_MITM_The_State_of_Email_Security_in_2015_hd.mp4"
        length="403701760"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7255-en-de-Neither_Snow_Nor_Rain_Nor_MITM_The_State_of_Email_Security_in_2015_hd.mp4?1451406760</guid>
      <dc:identifier>36ff9cc8-f717-42f3-b570-fca9810a02fa</dc:identifier>
      <dc:date>2015-12-29T14:00:00+01:00</dc:date>
      <itunes:author>Zakir Durumeric</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Is your email being sent in the clear? While PGP and S/MIME provide end-to-end encrypted mail, most users have yet to adopt these practices, and for users who have, these tools leave metadata, such as the subject, sender, and recipient, visible everywhere along a message’s path. SMTP&amp;mdash;the ubiquitous mail transport protocol&amp;mdash;has evolved over the years to add encryption and authentication, both of which take place behind the scenes and help guard against surveillance and spam. While these features are being increasingly deployed, our research shows that they are almost always configured in vulnerable ways&amp;mdash;the details of which are hidden from the users sending and receiving mail. Even more disturbingly, these vulnerabilities are being widely exploited in the wild: in seven countries, more than 20% of inbound Gmail messages are downgraded to cleartext by network-based attacks. In the most severe case, 96% of messages sent from Tunisia to Gmail are downgraded to cleartext. In this talk, I’ll introduce the commonly used SMTP security extensions&amp;mdash;including STARTTLS, SPF, DKIM, and DMARC&amp;mdash;and describe the current state of mail security on the Internet. I&#39;ll describe several commonly occurring attacks our recent research has found and discuss how mail operators can configure their servers to secure email transport. Finally, I&#39;ll discuss several weaknesses in the protocols we&#39;re using and recent proposals for helping secure email transport.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7255.html
</itunes:summary>
      <itunes:duration>00:49:50</itunes:duration>
    </item>
    <item>
      <title>Computational Meta-Psychology (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7483-computational_meta-psychology</link>
      <description>Computational theories of the mind seem to be ideally suited to explain rationality. But how can computations be subverted by meaning, emotion and love?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7483.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7483-en-de-Computational_Meta-Psychology_hd.mp4"
        length="555745280"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7483-en-de-Computational_Meta-Psychology_hd.mp4?1451406376</guid>
      <dc:identifier>fb537cde-7f1d-484b-971b-1d30a543ecfb</dc:identifier>
      <dc:date>2015-12-29T12:45:00+01:00</dc:date>
      <itunes:author>Joscha</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>An Artificial Intelligence exploration into the creation of meaning</itunes:subtitle>
      <itunes:summary>Computational theories of the mind seem to be ideally suited to explain rationality. But how can computations be subverted by meaning, emotion and love?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7483.html
</itunes:summary>
      <itunes:duration>01:01:39</itunes:duration>
    </item>
    <item>
      <title>Tor onion services: more useful than you think (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7322-tor_onion_services_more_useful_than_you_think</link>
      <description>We&#39;ll update you on what&#39;s going on with Tor onion services, aka Tor hidden services.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7322.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7322-de-Tor_onion_services_more_useful_than_you_think.mp4"
        length="729808896"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7322-de-Tor_onion_services_more_useful_than_you_think.mp4?1451406224</guid>
      <dc:identifier>1edc7ea3-0f06-4453-911f-f11b2a49e649</dc:identifier>
      <dc:date>2015-12-29T12:45:00+01:00</dc:date>
      <itunes:author>Roger, David Goulet, asn</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>We&#39;ll update you on what&#39;s going on with Tor onion services, aka Tor hidden services.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7322.html
</itunes:summary>
      <itunes:duration>01:00:38</itunes:duration>
    </item>
    <item>
      <title>How hackers grind an MMORPG: by taking it apart! (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7493-how_hackers_grind_an_mmorpg_by_taking_it_apart</link>
      <description>When an online game no longer captivates interest, what do you do? Grind on the network protocol, of course! How does it work, is it secure - and, how can you still get away while doing this?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7493.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7493-en-How_hackers_grind_an_MMORPG_by_taking_it_apart.mp4"
        length="642777088"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7493-en-How_hackers_grind_an_MMORPG_by_taking_it_apart.mp4?1451405614</guid>
      <dc:identifier>df35c860-60fc-4df8-801c-b2f4f91b33b8</dc:identifier>
      <dc:date>2015-12-28T21:45:00+01:00</dc:date>
      <itunes:author>Rink Springer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>An introduction to reverse engineering network protocols</itunes:subtitle>
      <itunes:summary>When an online game no longer captivates interest, what do you do? Grind on the network protocol, of course! How does it work, is it secure - and, how can you still get away while doing this?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7493.html
</itunes:summary>
      <itunes:duration>00:54:49</itunes:duration>
    </item>
    <item>
      <title>Graphs, Drones &amp; Phones (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7259-graphs_drones_phones</link>
      <description>The military use of Drones has profoundly changed warfare and is a central aspect of the globalized war on terror. The public debate including the respective talks at prior CCCs is dominated by questions of the ethical and juridical aspects of Drone use. 

This talk tries to shift the focus towards the enabling dimensions of Drone warfare. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7259.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7259-en-de-Graphs_Drones_Phones_hd.mp4"
        length="651165696"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7259-en-de-Graphs_Drones_Phones_hd.mp4?1451401740</guid>
      <dc:identifier>4b81e057-d17d-4108-90c4-8b0b162cf6c0</dc:identifier>
      <dc:date>2015-12-29T12:45:00+01:00</dc:date>
      <itunes:author>Christoph Engemann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>The role of social-graphs for Drones in the War on Terror. </itunes:subtitle>
      <itunes:summary>The military use of Drones has profoundly changed warfare and is a central aspect of the globalized war on terror. The public debate including the respective talks at prior CCCs is dominated by questions of the ethical and juridical aspects of Drone use. 

This talk tries to shift the focus towards the enabling dimensions of Drone warfare. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7259.html
</itunes:summary>
      <itunes:duration>00:55:58</itunes:duration>
    </item>
    <item>
      <title>„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7150-nach_bestem_wissen_und_gewissen_floskeln_in_der_politik</link>
      <description>In der politischen Rede sind immer wieder Floskeln zu beobachten, zum Teil gibt es Moden, wie im Zusammenhang mit dem so genannten No-Spy-Abkommen, wo Handlungen wiederholt mit „bestem Wissen und Gewissen“ gerechtfertigt wurden. Auch das „volle/vollste Vertrauen“ der Kanzlerin ist auffällig. Der Vortrag vertritt die Hypothese, dass solche Phrasen nicht zufällig sind, dass sie eine Funktion besitzen. Es wird erläutert, was mit ihnen erreicht werden soll. Es wird außerdem der Frage nachgegangen, wie Floskeln sich durch häufigen Gebrauch in ihrer Bedeutung verändern bzw. verselbständigen und gegen den Sprecher wenden können. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7150.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7150-de-en-Nach_bestem_Wissen_und_Gewissen_-_Floskeln_in_der_Politik_hd.mp4"
        length="764411904"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7150-de-en-Nach_bestem_Wissen_und_Gewissen_-_Floskeln_in_der_Politik_hd.mp4?1451401468</guid>
      <dc:identifier>72ad2630-b736-4d4c-8ea1-d982076426bc</dc:identifier>
      <dc:date>2015-12-29T11:30:00+01:00</dc:date>
      <itunes:author>Martin Haase/maha, Kai Biermann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Politische Phrasologie – warum man aus dem ganzen Zeug, das Politiker so reden, schlau werden kann</itunes:subtitle>
      <itunes:summary>In der politischen Rede sind immer wieder Floskeln zu beobachten, zum Teil gibt es Moden, wie im Zusammenhang mit dem so genannten No-Spy-Abkommen, wo Handlungen wiederholt mit „bestem Wissen und Gewissen“ gerechtfertigt wurden. Auch das „volle/vollste Vertrauen“ der Kanzlerin ist auffällig. Der Vortrag vertritt die Hypothese, dass solche Phrasen nicht zufällig sind, dass sie eine Funktion besitzen. Es wird erläutert, was mit ihnen erreicht werden soll. Es wird außerdem der Frage nachgegangen, wie Floskeln sich durch häufigen Gebrauch in ihrer Bedeutung verändern bzw. verselbständigen und gegen den Sprecher wenden können. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7150.html
</itunes:summary>
      <itunes:duration>01:00:34</itunes:duration>
    </item>
    <item>
      <title>(In)Security of Embedded Devices&#39; Firmware - Fast and Furious at Large Scale (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7252-in_security_of_embedded_devices_firmware_-_fast_and_furious_at_large_scale</link>
      <description>    Embedded systems are omnipresent in our everyday life and are becoming 
    increasingly present in many computing and networked environments. For example,
    they are at the core of various Common-Off-The-Shelf (COTS) devices such as
    printers, video surveillance systems, home routers and virtually anything we 
    informally call electronics. The emerging phenomenon of the Internet-of-Things
    (IoT) will make them even more widespread and interconnected. Cisco famously
    predicted that there will be 50 billion connected embedded devices by 2020.
    Given those estimations, the heterogeneity of technology and application fields,
    and the current threat landscape, the security of all those devices becomes of
    paramount importance. In addition to this, manual security analysis does not
    scale. Therefore, novel, scalable and automated approaches are needed.
    In this talk, we present several methods that make *the large scale
    security analyses of embedded devices* a feasible task. We implemented 
    those techniques in a scalable framework that we tested on real world data. 
    First, we collected a large number of firmware images from Internet 
    repositories and then performed simple static analysis. 
    Second, since embedded devices often expose web interfaces for 
    remote administration, therefore we developed techniques for large scale 
    static and dynamic analysis of such interfaces. 
    Finally, identifying and classifying the firmware files, as well as 
    fingerprinting and identifying embedded devices is difficult, especially 
    at large scale. 
    Using these techniques, we were able to discover a large number of new 
    vulnerabilities in dozens of firmware packages, affecting a great variety of vendors and
    device classes. We were also able to achieve high accuracy in fingerprinting and
    classification of both firmware images and live devices.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7252.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7252-en-de-In_Security_of_Embedded_Devices_Firmware_-_Fast_and_Furious_at_Large_Scale_hd.mp4"
        length="592445440"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7252-en-de-In_Security_of_Embedded_Devices_Firmware_-_Fast_and_Furious_at_Large_Scale_hd.mp4?1451400859</guid>
      <dc:identifier>3f61827f-8b17-47b4-a43c-e0dce6532cbe</dc:identifier>
      <dc:date>2015-12-29T11:30:00+01:00</dc:date>
      <itunes:author>Andrei Costin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>    Embedded systems are omnipresent in our everyday life and are becoming 
    increasingly present in many computing and networked environments. For example,
    they are at the core of various Common-Off-The-Shelf (COTS) devices such as
    printers, video surveillance systems, home routers and virtually anything we 
    informally call electronics. The emerging phenomenon of the Internet-of-Things
    (IoT) will make them even more widespread and interconnected. Cisco famously
    predicted that there will be 50 billion connected embedded devices by 2020.
    Given those estimations, the heterogeneity of technology and application fields,
    and the current threat landscape, the security of all those devices becomes of
    paramount importance. In addition to this, manual security analysis does not
    scale. Therefore, novel, scalable and automated approaches are needed.
    In this talk, we present several methods that make *the large scale
    security analyses of embedded devices* a feasible task. We implemented 
    those techniques in a scalable framework that we tested on real world data. 
    First, we collected a large number of firmware images from Internet 
    repositories and then performed simple static analysis. 
    Second, since embedded devices often expose web interfaces for 
    remote administration, therefore we developed techniques for large scale 
    static and dynamic analysis of such interfaces. 
    Finally, identifying and classifying the firmware files, as well as 
    fingerprinting and identifying embedded devices is difficult, especially 
    at large scale. 
    Using these techniques, we were able to discover a large number of new 
    vulnerabilities in dozens of firmware packages, affecting a great variety of vendors and
    device classes. We were also able to achieve high accuracy in fingerprinting and
    classification of both firmware images and live devices.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7252.html
</itunes:summary>
      <itunes:duration>00:59:05</itunes:duration>
    </item>
    <item>
      <title>re_cycle (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7321-re_cycle</link>
      <description>How can be 3d printing a dual use technology? Print more things, produce less waste, save money!
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7321.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7321-en-re_cycle.mp4"
        length="656408576"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7321-en-re_cycle.mp4?1451400563</guid>
      <dc:identifier>1c70e359-0e63-4dad-b7f3-8377e3822286</dc:identifier>
      <dc:date>2015-12-29T11:30:00+01:00</dc:date>
      <itunes:author>obelix</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Trash the prints, print the trash</itunes:subtitle>
      <itunes:summary>How can be 3d printing a dual use technology? Print more things, produce less waste, save money!
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7321.html
</itunes:summary>
      <itunes:duration>00:47:23</itunes:duration>
    </item>
    <item>
      <title>Beyond Anti Evil Maid (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7343-beyond_anti_evil_maid</link>
      <description>In 2011, Joanna Rutkowska unveiled an easy-to-use tool for mitigating many attacks on system boot chains by using the TPM - the Anti Evil Maid. Unfortunately the implementation was difficult to incorporate into normal system boot in a secure manner - anybody able to observe a user could recreate the secret. This presentation describes a method to allow systems to prove their identity to the user without making it trivial for attackers to mimic a secure boot and extract secrets from the user, and why the state of modern hardware means this may still not be enough.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7343.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7343-en-Beyond_Anti_Evil_Maid.mp4"
        length="430964736"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7343-en-Beyond_Anti_Evil_Maid.mp4?1451400192</guid>
      <dc:identifier>b5d1079a-7d72-45b1-8328-e5c3e60944c1</dc:identifier>
      <dc:date>2015-12-29T11:30:00+01:00</dc:date>
      <itunes:author>Matthew Garrett</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Making it easier to avoid low-level compromise, and why you&#39;ll still lose</itunes:subtitle>
      <itunes:summary>In 2011, Joanna Rutkowska unveiled an easy-to-use tool for mitigating many attacks on system boot chains by using the TPM - the Anti Evil Maid. Unfortunately the implementation was difficult to incorporate into normal system boot in a secure manner - anybody able to observe a user could recreate the secret. This presentation describes a method to allow systems to prove their identity to the user without making it trivial for attackers to mimic a secure boot and extract secrets from the user, and why the state of modern hardware means this may still not be enough.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7343.html
</itunes:summary>
      <itunes:duration>01:00:25</itunes:duration>
    </item>
    <item>
      <title>goto fail; (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7438-goto_fail</link>
      <description>Legend has it, the first iteration of the Secure Sockets Layer (SSL) protocol was broken in ten minutes by Phillip Hallam-Baker and Alan Schiffman during a presentation by Marc Andreesen at MIT in 1994. In the following two decades the protocol has been improved and the implementations have been strengthened, but not without a steady stream of implementation vulnerabilities and protocol design errors. From the ciphersuite rollback attack to LogJam, SSL/TLS has seen a diverse set of problems. In this talk we’ll discuss the pitfalls in designing and implementing a cryptographic protocol and lessons learned from TLS up to version 1.2.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7438.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7438-de-goto_fail.mp4"
        length="555745280"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7438-de-goto_fail.mp4?1451399975</guid>
      <dc:identifier>144b2208-bf0b-494c-99e5-665ed18f1e8f</dc:identifier>
      <dc:date>2015-12-28T23:00:00+01:00</dc:date>
      <itunes:author>Nick Sullivan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Failosophy</itunes:keywords>
      <itunes:subtitle>exploring two decades of transport layer insecurity</itunes:subtitle>
      <itunes:summary>Legend has it, the first iteration of the Secure Sockets Layer (SSL) protocol was broken in ten minutes by Phillip Hallam-Baker and Alan Schiffman during a presentation by Marc Andreesen at MIT in 1994. In the following two decades the protocol has been improved and the implementations have been strengthened, but not without a steady stream of implementation vulnerabilities and protocol design errors. From the ciphersuite rollback attack to LogJam, SSL/TLS has seen a diverse set of problems. In this talk we’ll discuss the pitfalls in designing and implementing a cryptographic protocol and lessons learned from TLS up to version 1.2.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7438.html
</itunes:summary>
      <itunes:duration>01:03:29</itunes:duration>
    </item>
    <item>
      <title>Fnord-Jahresrückblick (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7282-fnord-jahresruckblick</link>
      <description>Wir helfen euch, die Fnords zu sehen, wenn nach einem klaren Fall von Selbstmord der Zensor pinkeln war und die Stahlbälle den maximalen Realitätsabstand eingenommen haben.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7282.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7282-de-en-Fnord-Jahresrueckblick_hd.mp4"
        length="618659840"
        type="video/mp4"/>
      <pubDate>Tue, 29 Dec 2015 00:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7282-de-en-Fnord-Jahresrueckblick_hd.mp4?1451399651</guid>
      <dc:identifier>0bdbef2d-1594-4582-b315-7ee5da5505bf</dc:identifier>
      <dc:date>2015-12-29T00:15:00+01:00</dc:date>
      <itunes:author>Fefe, frank</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:summary>Wir helfen euch, die Fnords zu sehen, wenn nach einem klaren Fall von Selbstmord der Zensor pinkeln war und die Stahlbälle den maximalen Realitätsabstand eingenommen haben.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7282.html
</itunes:summary>
      <itunes:duration>01:18:01</itunes:duration>
    </item>
    <item>
      <title>Wie Jugendschutzprogramme nicht nur die Jugend schädigen (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7415-wie_jugendschutzprogramme_nicht_nur_die_jugend_schadigen</link>
      <description>Das Nonplusultra für hauptamtliche Jugendschützer sind Filterprogramme, auch „Jugendschutzprogramme“ genannt. Doch was machen die Programme, welche Wirkungen und vor allem Nebenwirkungen haben sie? Und was macht eigentlich der Zombie JMStV?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7415.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7415-de-en-Wie_Jugendschutzprogramme_nicht_nur_die_Jugend_schaedigen_hd.mp4"
        length="426770432"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7415-de-en-Wie_Jugendschutzprogramme_nicht_nur_die_Jugend_schaedigen_hd.mp4?1451391565</guid>
      <dc:identifier>5f57ffa9-631c-429d-a11b-5b51bebe0f0f</dc:identifier>
      <dc:date>2015-12-28T17:30:00+01:00</dc:date>
      <itunes:author>Alvar Freude</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Das Nonplusultra für hauptamtliche Jugendschützer sind Filterprogramme, auch „Jugendschutzprogramme“ genannt. Doch was machen die Programme, welche Wirkungen und vor allem Nebenwirkungen haben sie? Und was macht eigentlich der Zombie JMStV?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7415.html
</itunes:summary>
      <itunes:duration>00:32:43</itunes:duration>
    </item>
    <item>
      <title>Lessons learned: Freifunk für Geflüchtete (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7230-lessons_learned_freifunk_fur_gefluchtete</link>
      <description>Initiative Freifunk, ein Projekt des Chaos Darmstadt e.V. - Wie kamen wir mit den Verwaltungen, den Verbänden und Parteien ins Gespräch, um freifunk für refugees umzusetzen?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7230.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7230-de-en-Lessons_learned_Freifunk_fuer_Gefluechtete_hd.mp4"
        length="287309824"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7230-de-en-Lessons_learned_Freifunk_fuer_Gefluechtete_hd.mp4?1451391193</guid>
      <dc:identifier>28efa221-42ce-4e2c-aa2c-1b52c87ddeb1</dc:identifier>
      <dc:date>2015-12-28T16:45:00+01:00</dc:date>
      <itunes:author>Peter Löwenstein</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>1 Jahr Freifunk in Südhessen </itunes:subtitle>
      <itunes:summary>Initiative Freifunk, ein Projekt des Chaos Darmstadt e.V. - Wie kamen wir mit den Verwaltungen, den Verbänden und Parteien ins Gespräch, um freifunk für refugees umzusetzen?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7230.html
</itunes:summary>
      <itunes:duration>00:31:35</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 2 (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7558-lightning_talks_day_2</link>
      <description>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7558.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7558-en-Lightning_Talks_Day_2.mp4"
        length="964689920"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7558-en-Lightning_Talks_Day_2.mp4?1451391052</guid>
      <dc:identifier>df2f6e8a-f1fb-4736-8b4e-7e197ead73c2</dc:identifier>
      <dc:date>2015-12-28T12:45:00+01:00</dc:date>
      <itunes:author>gedsic, bigalex</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7558.html
</itunes:summary>
      <itunes:duration>02:11:02</itunes:duration>
    </item>
    <item>
      <title>(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7360-un_sicherheit_von_app-basierten_tan-verfahren_im_onlinebanking</link>
      <description>Neue App-basierte TAN-Verfahren sollen die etablierten Verfahren ablösen und Onlinebanking komfortabler machen. Die Notwendigkeit von dedizierter Hardware entfällt und Transaktionen können mit nur einem mobilen Endgerät durchgeführt werden. Was von den Kreditinstituten als Feature beworben wird, erweist sich in unserer Untersuchung als fatal. In einem Proof-of-Concept-Angriff demonstrieren wir die Manipulation von Transaktionsdaten und zeigen die konzeptionelle Schwäche von App-basierten TAN-Verfahren.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7360.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7360-de-en-Un_Sicherheit_von_App-basierten_TAN-Verfahren_im_Onlinebanking_hd.mp4"
        length="377487360"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7360-de-en-Un_Sicherheit_von_App-basierten_TAN-Verfahren_im_Onlinebanking_hd.mp4?1451390450</guid>
      <dc:identifier>74515f8e-a752-4cbb-b407-3a70fca5b0b3</dc:identifier>
      <dc:date>2015-12-28T16:45:00+01:00</dc:date>
      <itunes:author>Vincent Haupert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Neue App-basierte TAN-Verfahren sollen die etablierten Verfahren ablösen und Onlinebanking komfortabler machen. Die Notwendigkeit von dedizierter Hardware entfällt und Transaktionen können mit nur einem mobilen Endgerät durchgeführt werden. Was von den Kreditinstituten als Feature beworben wird, erweist sich in unserer Untersuchung als fatal. In einem Proof-of-Concept-Angriff demonstrieren wir die Manipulation von Transaktionsdaten und zeigen die konzeptionelle Schwäche von App-basierten TAN-Verfahren.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7360.html
</itunes:summary>
      <itunes:duration>00:30:54</itunes:duration>
    </item>
    <item>
      <title>Sanitizing PCAPs (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7294-sanitizing_pcaps</link>
      <description>Sanitizing and anonymizing PCAP or PCAPng files is often necessary to be able to share information about attack vectors, security problems or incidents in general. While it may seem simple to replace IP addresses or ports there are still quite a number of network packet details that are hard to replace. This technical talk will shed a light on where those troublemakers are encountered and how to get around them.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7294.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7294-en-de-Sanitizing_PCAPs_hd.mp4"
        length="612368384"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7294-en-de-Sanitizing_PCAPs_hd.mp4?1451390167</guid>
      <dc:identifier>4d8d4f44-bade-460b-8274-0bb5b9df38b3</dc:identifier>
      <dc:date>2015-12-28T23:00:00+01:00</dc:date>
      <itunes:author>Jasper Bongertz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Fun and games until someone uses IPv6 or TCP</itunes:subtitle>
      <itunes:summary>Sanitizing and anonymizing PCAP or PCAPng files is often necessary to be able to share information about attack vectors, security problems or incidents in general. While it may seem simple to replace IP addresses or ports there are still quite a number of network packet details that are hard to replace. This technical talk will shed a light on where those troublemakers are encountered and how to get around them.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7294.html
</itunes:summary>
      <itunes:duration>00:43:09</itunes:duration>
    </item>
    <item>
      <title>Iridium Update (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7154-iridium_update</link>
      <description>&lt;p&gt;Listening to satellites and decoding is fun. We show interesting stuff we found, and how you can get into it.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7154.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7154-en-de-Iridium_Update_hd.mp4"
        length="871366656"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7154-en-de-Iridium_Update_hd.mp4?1451389968</guid>
      <dc:identifier>e6217eeb-68ef-44b4-8e6e-beebe6a5195c</dc:identifier>
      <dc:date>2015-12-28T23:00:00+01:00</dc:date>
      <itunes:author>Sec, schneider</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>more than just pagers</itunes:subtitle>
      <itunes:summary>&lt;p&gt;Listening to satellites and decoding is fun. We show interesting stuff we found, and how you can get into it.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7154.html
</itunes:summary>
      <itunes:duration>00:56:58</itunes:duration>
    </item>
    <item>
      <title>Quantenphysik und  Kosmologie (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7525-quantenphysik_und_kosmologie</link>
      <description>Unsere Welt ist nach allem was wir heute wissen im kleinsten Massstab völlig bizarr aufgebaut und im grössten also im kosmologischen Massstab besteht sie ziemlich genau aus nichts. Wie hängt das zusammen und was hat das mit dunkler Materie und dunkler Energie zu tun und was zum Geier ist eigentlich die &quot;spukhafte Fernwirkung&quot; von der Einstein damals sprach und warum hat bis heute keiner so recht verstanden wie das alles zusammenpasst?
Hast du schon mal davon gehört, dass die Quantenphysik irgendwie schräg ist, hast dich da aber noch nicht ran getraut, obwohl du das gerne besser verstehen wollen würdest? Denkst du manchmal drüber nach, wie zum Geier das komplette Universum mit allen Sternen und Planeten ganz früher mal in einen Tischtennisball oder sogar noch was kleineres gepasst haben soll? Hast du schon mal davon gehört, dass ein Proton angeblich aus drei Quarks besteht und denkst, &quot;jaja, ihr könnt mir viel erzählen&quot;. Und klinkt sich dein Vorstellungsvermögen aus, wenn du versuchst dir so was wie ein &quot;schwarzes Loch&quot; vorzustellen, das unendlich klein sein soll und dabei unendlich schwer? Dann bist du hier genau richtig. Ich will dir  ohne wesentliche Vorkenntnisse vorauszusetzen im Grossen und Ganzen den  Zusammenhang näher bringen, deine Faszination für das Thema wecken oder füttern und dir Mut machen, dich weiter damit zu beschäftigen. Du darfst hier Fragen stellen, dich wundern, zweifeln und irritiert sein. 
Wenn du an Quantenheilung, Vortex Atome und holistische Quanten-Kinesiologie glaubst, dann bist du herzlich willkommen um zu lernen, dass das mit Quantenphysik nichts, aber auch wirklich gar nichts zu tun hat, aber sei bitte nicht enttäuscht, wenn ich auf diese Themen nicht eingehe. Eine Stunde ist viel zu Kurz um zusätzlich eine Einführung in die Prinzipien der Wissenschaft zu halten. 
Wenn du aber schon mal die Schrödingergleichung hergeleitet hast oder gerne über die Vorteile der M-Theorie gegenüber der Super-Stringtheorie schwadronieren möchtest oder wenn du diskutieren möchtest, ob es vielleicht auch noch ein Typ 3 Weyl Fermion geben kann, dann langweilst du dich hier vermutlich, das können wir dann ja gerne ein anderes mal machen ;-)

about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7525.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7525-de-en-Quantenphysik_und_Kosmologie_hd.mp4"
        length="1170210816"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7525-de-en-Quantenphysik_und_Kosmologie_hd.mp4?1451356356</guid>
      <dc:identifier>0549d204-604a-46c5-92a2-e64b85aa9892</dc:identifier>
      <dc:date>2015-12-28T21:45:00+01:00</dc:date>
      <itunes:author>Steini</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Eine Einführung für blutige Anfänger</itunes:subtitle>
      <itunes:summary>Unsere Welt ist nach allem was wir heute wissen im kleinsten Massstab völlig bizarr aufgebaut und im grössten also im kosmologischen Massstab besteht sie ziemlich genau aus nichts. Wie hängt das zusammen und was hat das mit dunkler Materie und dunkler Energie zu tun und was zum Geier ist eigentlich die &quot;spukhafte Fernwirkung&quot; von der Einstein damals sprach und warum hat bis heute keiner so recht verstanden wie das alles zusammenpasst?
Hast du schon mal davon gehört, dass die Quantenphysik irgendwie schräg ist, hast dich da aber noch nicht ran getraut, obwohl du das gerne besser verstehen wollen würdest? Denkst du manchmal drüber nach, wie zum Geier das komplette Universum mit allen Sternen und Planeten ganz früher mal in einen Tischtennisball oder sogar noch was kleineres gepasst haben soll? Hast du schon mal davon gehört, dass ein Proton angeblich aus drei Quarks besteht und denkst, &quot;jaja, ihr könnt mir viel erzählen&quot;. Und klinkt sich dein Vorstellungsvermögen aus, wenn du versuchst dir so was wie ein &quot;schwarzes Loch&quot; vorzustellen, das unendlich klein sein soll und dabei unendlich schwer? Dann bist du hier genau richtig. Ich will dir  ohne wesentliche Vorkenntnisse vorauszusetzen im Grossen und Ganzen den  Zusammenhang näher bringen, deine Faszination für das Thema wecken oder füttern und dir Mut machen, dich weiter damit zu beschäftigen. Du darfst hier Fragen stellen, dich wundern, zweifeln und irritiert sein. 
Wenn du an Quantenheilung, Vortex Atome und holistische Quanten-Kinesiologie glaubst, dann bist du herzlich willkommen um zu lernen, dass das mit Quantenphysik nichts, aber auch wirklich gar nichts zu tun hat, aber sei bitte nicht enttäuscht, wenn ich auf diese Themen nicht eingehe. Eine Stunde ist viel zu Kurz um zusätzlich eine Einführung in die Prinzipien der Wissenschaft zu halten. 
Wenn du aber schon mal die Schrödingergleichung hergeleitet hast oder gerne über die Vorteile der M-Theorie gegenüber der Super-Stringtheorie schwadronieren möchtest oder wenn du diskutieren möchtest, ob es vielleicht auch noch ein Typ 3 Weyl Fermion geben kann, dann langweilst du dich hier vermutlich, das können wir dann ja gerne ein anderes mal machen ;-)

about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7525.html
</itunes:summary>
      <itunes:duration>01:01:34</itunes:duration>
    </item>
    <item>
      <title>Hardsploit: A Metasploit-like tool for hardware hacking (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7496-hardsploit_a_metasploit-like_tool_for_hardware_hacking</link>
      <description>It is clear that something is needed to help the security community to evaluate, audit and control the security level of hardware products.

Hardsploit is a complete tool box (hardware &amp; software), a framework which aims to:

- Facilitate the audit of electronic systems for industry &#39;security&#39; workers (consultants, auditors, pentesters, product designers, etc.)

- Increase the level of security (and trust !) of new products designed by the industry
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7496.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_hd.mp4"
        length="873463808"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_hd.mp4?1451392063</guid>
      <dc:identifier>341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f</dc:identifier>
      <dc:date>2015-12-28T20:30:00+01:00</dc:date>
      <itunes:author>Yann.A, Julien MOINARD, Gwénolé Audic</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>A complete toolbox for IoT security </itunes:subtitle>
      <itunes:summary>It is clear that something is needed to help the security community to evaluate, audit and control the security level of hardware products.

Hardsploit is a complete tool box (hardware &amp; software), a framework which aims to:

- Facilitate the audit of electronic systems for industry &#39;security&#39; workers (consultants, auditors, pentesters, product designers, etc.)

- Increase the level of security (and trust !) of new products designed by the industry
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7496.html
</itunes:summary>
      <itunes:duration>00:59:22</itunes:duration>
    </item>
    <item>
      <title>Quantum Cryptography (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7305-quantum_cryptography</link>
      <description>I will entertain the audience with a science talk about quantum cryptography, covering both some classics (Quantum Key Distribution) and the latest developments (position-based quantum cryptography) in this fascinating research field. 
[No previous knowledge of quantum mechanics is required to follow the talk.]
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7305.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7305-en-de-Quantum_Cryptography_hd.mp4"
        length="510656512"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7305-en-de-Quantum_Cryptography_hd.mp4?1451392135</guid>
      <dc:identifier>1dcedd27-94b5-433e-a650-dccc1ba3d720</dc:identifier>
      <dc:date>2015-12-28T20:30:00+01:00</dc:date>
      <itunes:author>Christian Schaffner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>from key distribution to position-based cryptography</itunes:subtitle>
      <itunes:summary>I will entertain the audience with a science talk about quantum cryptography, covering both some classics (Quantum Key Distribution) and the latest developments (position-based quantum cryptography) in this fascinating research field. 
[No previous knowledge of quantum mechanics is required to follow the talk.]
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7305.html
</itunes:summary>
      <itunes:duration>01:00:25</itunes:duration>
    </item>
    <item>
      <title>The Perl Jam 2 (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7130-the_perl_jam_2</link>
      <description>tl;dr EXPLOIT ALL THE PERL. AGAIN.
After last year’s Perl crackdown, I decided I have to take the Perl abuse to the next level. This time I focused on Perl’s core, or more specifically, the referencing mechanism, and shattered the security of most Perl CGI projects in the world.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7130.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7130-en-de-The_Perl_Jam_2_hd.mp4"
        length="713031680"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7130-en-de-The_Perl_Jam_2_hd.mp4?1451391267</guid>
      <dc:identifier>b2a8a8fe-646f-4e32-a4d8-67a163573e36</dc:identifier>
      <dc:date>2015-12-28T20:30:00+01:00</dc:date>
      <itunes:author>Netanel Rubin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>The Camel Strikes Back</itunes:subtitle>
      <itunes:summary>tl;dr EXPLOIT ALL THE PERL. AGAIN.
After last year’s Perl crackdown, I decided I have to take the Perl abuse to the next level. This time I focused on Perl’s core, or more specifically, the referencing mechanism, and shattered the security of most Perl CGI projects in the world.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7130.html
</itunes:summary>
      <itunes:duration>00:40:23</itunes:duration>
    </item>
    <item>
      <title>Das Zahnrad aus Fleisch (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7249-das_zahnrad_aus_fleisch</link>
      <description>Kommentierendes im Internet ist neuerdings bedroht. Der unflätige Kommentierer hat den Pedonazi als Schrecken des Netzes abgelöst, als Strohmann für mehr Kontrolle über das Netz kann er auf breitere Gefolgschaft rechnen. Es “muss etwas geschehen” gegen den “Hass im Netz”, “Putintrolle” und Wutnetzbürger. Twitter, Mark Zuckerberg, Politiker, alle sollen mehr tun - aber was denn eigentlich, mehr Zensur und Moderation, andere Ausgestaltungen von Kommentarsystemen? 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7249.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7249-de-en-Das_Zahnrad_aus_Fleisch_hd.mp4"
        length="568328192"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7249-de-en-Das_Zahnrad_aus_Fleisch_hd.mp4?1451392201</guid>
      <dc:identifier>47c13b4a-a50b-4158-9a71-f4a2f24ace64</dc:identifier>
      <dc:date>2015-12-28T20:30:00+01:00</dc:date>
      <itunes:author>agonarch, @fraufeli</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Expeditionen ins Kommentierreich</itunes:subtitle>
      <itunes:summary>Kommentierendes im Internet ist neuerdings bedroht. Der unflätige Kommentierer hat den Pedonazi als Schrecken des Netzes abgelöst, als Strohmann für mehr Kontrolle über das Netz kann er auf breitere Gefolgschaft rechnen. Es “muss etwas geschehen” gegen den “Hass im Netz”, “Putintrolle” und Wutnetzbürger. Twitter, Mark Zuckerberg, Politiker, alle sollen mehr tun - aber was denn eigentlich, mehr Zensur und Moderation, andere Ausgestaltungen von Kommentarsystemen? 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7249.html
</itunes:summary>
      <itunes:duration>00:54:11</itunes:duration>
    </item>
    <item>
      <title>Dissecting VoLTE (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7502-dissecting_volte</link>
      <description>Newly adopted VoLTE requires changes in all associated parties, such as 3GPP standard, device, operating system, and cellular core networks. Therefore, it is not too surprising that it has security problems. However, it turns out that it has way too many problems. In this talk, we introduce how you can freely send data in the cellular network, and how an attacker can perform caller spoofing and denial of service attacks on calls to disable the target’s calling. Furthermore, we explain how small implementation glitch on VoLTE may lead to break the whole cellular network down.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7502.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7502-en-de-Dissecting_VoLTE_hd.mp4"
        length="436207616"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7502-en-de-Dissecting_VoLTE_hd.mp4?1451355647</guid>
      <dc:identifier>9f89d94f-07fd-47f4-9ad0-c8dda94de175</dc:identifier>
      <dc:date>2015-12-28T21:45:00+01:00</dc:date>
      <itunes:author>Dongkwan, Hongil Kim</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Exploiting Free Data Channels and Security Problems</itunes:subtitle>
      <itunes:summary>Newly adopted VoLTE requires changes in all associated parties, such as 3GPP standard, device, operating system, and cellular core networks. Therefore, it is not too surprising that it has security problems. However, it turns out that it has way too many problems. In this talk, we introduce how you can freely send data in the cellular network, and how an attacker can perform caller spoofing and denial of service attacks on calls to disable the target’s calling. Furthermore, we explain how small implementation glitch on VoLTE may lead to break the whole cellular network down.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7502.html
</itunes:summary>
      <itunes:duration>00:49:27</itunes:duration>
    </item>
    <item>
      <title>Logjam: Diffie-Hellman, discrete logs, the NSA, and you (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7288-logjam_diffie-hellman_discrete_logs_the_nsa_and_you</link>
      <description>Earlier this year, we discovered that Diffie-Hellman key
exchange – cornerstone of modern cryptography – is less
secure in practice than the security community believed. In this
talk, we’ll explain how the NSA is likely exploiting this weakness to
allow it to decrypt connections to at least 20% of HTTPS websites, 25% of SSH servers, and 66% of IPsec VPNs.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7288.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7288-en-de-Logjam_Diffie-Hellman_discrete_logs_the_NSA_and_you_hd.mp4"
        length="802160640"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7288-en-de-Logjam_Diffie-Hellman_discrete_logs_the_NSA_and_you_hd.mp4?1451355601</guid>
      <dc:identifier>2f4cd1ef-dd90-4145-a734-141e5c081940</dc:identifier>
      <dc:date>2015-12-28T21:45:00+01:00</dc:date>
      <itunes:author>J. Alex Halderman, Nadia Heninger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Earlier this year, we discovered that Diffie-Hellman key
exchange – cornerstone of modern cryptography – is less
secure in practice than the security community believed. In this
talk, we’ll explain how the NSA is likely exploiting this weakness to
allow it to decrypt connections to at least 20% of HTTPS websites, 25% of SSH servers, and 66% of IPsec VPNs.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7288.html
</itunes:summary>
      <itunes:duration>01:01:43</itunes:duration>
    </item>
    <item>
      <title>Rowhammer.js: Root privileges for web apps? (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7197-rowhammer_js_root_privileges_for_web_apps</link>
      <description>&quot;Insanity: doing the same thing over and over again and expecting different results.&quot; 
Albert Einstein - Who did not live long enough to see Rowhammer

Recent studies have found that repeated accesses to DRAM rows can cause random bit flips, resulting in the so called Rowhammer vulnerability. We present Rowhammer.js, the first remote software-induced hardware-fault attack, from JavaScript. We also extend our presentation with an overview of cache side-channel attacks, that use the same technique to evict data from the cache.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7197.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7197-en-de-Rowhammerjs_Root_privileges_for_web_apps_hd.mp4"
        length="459276288"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7197-en-de-Rowhammerjs_Root_privileges_for_web_apps_hd.mp4?1451355100</guid>
      <dc:identifier>01da121b-bd49-4805-aaaf-a6ec1f4f941f</dc:identifier>
      <dc:date>2015-12-28T18:15:00+01:00</dc:date>
      <itunes:author>Clémentine Maurice, Daniel Gruss</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>A tale of fault attacks on DRAM and attacks on CPU caches</itunes:subtitle>
      <itunes:summary>&quot;Insanity: doing the same thing over and over again and expecting different results.&quot; 
Albert Einstein - Who did not live long enough to see Rowhammer

Recent studies have found that repeated accesses to DRAM rows can cause random bit flips, resulting in the so called Rowhammer vulnerability. We present Rowhammer.js, the first remote software-induced hardware-fault attack, from JavaScript. We also extend our presentation with an overview of cache side-channel attacks, that use the same technique to evict data from the cache.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7197.html
</itunes:summary>
      <itunes:duration>00:30:59</itunes:duration>
    </item>
    <item>
      <title>Verified Firewall Ruleset Verification (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7195-verified_firewall_ruleset_verification</link>
      <description>We develop a tool to verify Linux netfilter/iptables firewalls rulesets. Then, we verify the verification tool itself.

Warning: involves math!

This talk is also an introduction to interactive theorem proving and programming in Isabelle/HOL. We strongly suggest that audience members have some familiarity with functional programming. A strong mathematical background is NOT required.

TL;DR: Math is cool again, we now have the tools for &quot;executable math&quot;. Also: iptables!
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7195.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7195-en-de-Verified_Firewall_Ruleset_Verification_hd.mp4"
        length="226492416"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7195-en-de-Verified_Firewall_Ruleset_Verification_hd.mp4?1451354955</guid>
      <dc:identifier>81cba379-0eb6-4dbb-a48c-80feaea60939</dc:identifier>
      <dc:date>2015-12-28T17:30:00+01:00</dc:date>
      <itunes:author>Cornelius Diekmann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Math, Functional Programming, Theorem Proving, and an Introduction to Isabelle/HOL</itunes:subtitle>
      <itunes:summary>We develop a tool to verify Linux netfilter/iptables firewalls rulesets. Then, we verify the verification tool itself.

Warning: involves math!

This talk is also an introduction to interactive theorem proving and programming in Isabelle/HOL. We strongly suggest that audience members have some familiarity with functional programming. A strong mathematical background is NOT required.

TL;DR: Math is cool again, we now have the tools for &quot;executable math&quot;. Also: iptables!
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7195.html
</itunes:summary>
      <itunes:duration>00:32:30</itunes:duration>
    </item>
    <item>
      <title>One year of securitarian drift in France (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7423-one_year_of_securitarian_drift_in_france</link>
      <description>Earlier this year, following the tragic events of early January in Paris, the French governement pushed a bill to put a legal framework around Intelligence Services activities. Far from protecting civil liberties, this bill seem to be the translation of Snowden&#39;s revelations into law.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7423.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7423-en-de-One_year_of_securitarian_drift_in_France_hd.mp4"
        length="315621376"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7423-en-de-One_year_of_securitarian_drift_in_France_hd.mp4?1451354929</guid>
      <dc:identifier>00abb473-d6cc-4200-9920-3794591fe4d4</dc:identifier>
      <dc:date>2015-12-28T17:30:00+01:00</dc:date>
      <itunes:author>taziden, Adrienne Charmet</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>From the Bill on Intelligence to the State of Emergency</itunes:subtitle>
      <itunes:summary>Earlier this year, following the tragic events of early January in Paris, the French governement pushed a bill to put a legal framework around Intelligence Services activities. Far from protecting civil liberties, this bill seem to be the translation of Snowden&#39;s revelations into law.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7423.html
</itunes:summary>
      <itunes:duration>00:27:17</itunes:duration>
    </item>
    <item>
      <title>All Our Shared Spectrum Are Belong to Us (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7314-all_our_shared_spectrum_are_belong_to_us</link>
      <description>&quot;Signal level is high but throughput is low&quot; is a common experience in WLAN networks without central management. That causes a lot of frustration, mainly because there is no easy way for users to OBSERVE the presence of interference at all. 

In order to improve this situation we developed a patch for OpenWRT which makes interference from other sources visible and is able to display the current utilization-ratio (channel load). No additional hardware is required and no interruption of normal operation is necessary - because recent chipsets maintain internal counters for channel load tracking.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7314.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7314-en-All_Our_Shared_Spectrum_Are_Belong_to_Us.mp4"
        length="305135616"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7314-en-All_Our_Shared_Spectrum_Are_Belong_to_Us.mp4?1451354985</guid>
      <dc:identifier>17259b49-65ef-4726-ae03-a0b90e45806a</dc:identifier>
      <dc:date>2015-12-28T17:30:00+01:00</dc:date>
      <itunes:author>Paul Fuxjaeger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Visualizing WLAN Channel Usage on OpenWRT</itunes:subtitle>
      <itunes:summary>&quot;Signal level is high but throughput is low&quot; is a common experience in WLAN networks without central management. That causes a lot of frustration, mainly because there is no easy way for users to OBSERVE the presence of interference at all. 

In order to improve this situation we developed a patch for OpenWRT which makes interference from other sources visible and is able to display the current utilization-ratio (channel load). No additional hardware is required and no interruption of normal operation is necessary - because recent chipsets maintain internal counters for channel load tracking.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7314.html
</itunes:summary>
      <itunes:duration>00:30:57</itunes:duration>
    </item>
    <item>
      <title>apertus° AXIOM (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7355-apertus_axiom</link>
      <description>AXIOM is the first professional, extendable, affordable and modular cinema camera platform based on Free (&quot;libre&quot;) Software, Open Design, Open Hardware, transparent development processes and extensive documentation. The community project establishes an ecosystem that offers a sustainable basis for a broad spectrum of imaging applications and empowers enthusiasts, videographers as well as developers in the technology and creative industry sectors.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7355.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7355-en-de-apertus_AXIOM_hd.mp4"
        length="408944640"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7355-en-de-apertus_AXIOM_hd.mp4?1451354897</guid>
      <dc:identifier>b9b2c371-417c-45c4-a47f-faf7eeb11fbf</dc:identifier>
      <dc:date>2015-12-28T16:45:00+01:00</dc:date>
      <itunes:author>Matthias Tarasiewicz (parasew)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>The first Open Source Cinema Camera</itunes:subtitle>
      <itunes:summary>AXIOM is the first professional, extendable, affordable and modular cinema camera platform based on Free (&quot;libre&quot;) Software, Open Design, Open Hardware, transparent development processes and extensive documentation. The community project establishes an ecosystem that offers a sustainable basis for a broad spectrum of imaging applications and empowers enthusiasts, videographers as well as developers in the technology and creative industry sectors.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7355.html
</itunes:summary>
      <itunes:duration>00:30:15</itunes:duration>
    </item>
    <item>
      <title>Plunge into Proxy Politics (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7570-plunge_into_proxy_politics</link>
      <description>During this lecture presentation, Boaz Levin and Vera Tollmann,
co-founders of the Research Center for Proxy Politics, will develop the
proxy as a figure of thought by spinning and testing it in different
contexts.

about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7570.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7570-en-de-Plunge_into_Proxy_Politics_hd.mp4"
        length="612368384"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7570-en-de-Plunge_into_Proxy_Politics_hd.mp4?1451354856</guid>
      <dc:identifier>012b9dea-7d42-4428-acd4-4f84fa41e729</dc:identifier>
      <dc:date>2015-12-28T16:45:00+01:00</dc:date>
      <itunes:author>Vera Tollmann, Boaz Levin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:summary>During this lecture presentation, Boaz Levin and Vera Tollmann,
co-founders of the Research Center for Proxy Politics, will develop the
proxy as a figure of thought by spinning and testing it in different
contexts.

about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7570.html
</itunes:summary>
      <itunes:duration>00:30:30</itunes:duration>
    </item>
    <item>
      <title>Evolution of Brain-Computer Interfaces (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7416-evolution_of_brain-computer_interfaces</link>
      <description>This talk is a brief recap into EEG / BCI for hackers, makers, researchers, and artists. It will give an overview of current consumer devices and their flaws, and subquently present fully open-source, high-quality hardware and software. Finally implications for the future of modern society are outlined, especially how commercial EEG consumer devices or services may be exploited by corporations to cloudsource market research, or spy on health conditions, brain states or even leak private information. Strategies to circumvent these risks and secure brain wave experience are being discussed.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7416.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7416-en-de-Evolution_of_Brain-Computer_Interfaces_hd.mp4"
        length="560988160"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7416-en-de-Evolution_of_Brain-Computer_Interfaces_hd.mp4?1451354805</guid>
      <dc:identifier>52706f90-a2f9-48be-a4c3-786257fce233</dc:identifier>
      <dc:date>2015-12-28T16:00:00+01:00</dc:date>
      <itunes:author>fractalfox</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>The future of Neuro-Headsets and concepts towards open-source, high-quality devices as an alternative to commercial products</itunes:subtitle>
      <itunes:summary>This talk is a brief recap into EEG / BCI for hackers, makers, researchers, and artists. It will give an overview of current consumer devices and their flaws, and subquently present fully open-source, high-quality hardware and software. Finally implications for the future of modern society are outlined, especially how commercial EEG consumer devices or services may be exploited by corporations to cloudsource market research, or spy on health conditions, brain states or even leak private information. Strategies to circumvent these risks and secure brain wave experience are being discussed.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7416.html
</itunes:summary>
      <itunes:duration>00:35:00</itunes:duration>
    </item>
    <item>
      <title>Cyber all the Wassenaars (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7280-cyber_all_the_wassenaars</link>
      <description>Transposition of the Wassenaar Arrangement, which now also covers export controls on exploits and surveillance technology, into European law is upon us. This panel discusses this, both on process and substance.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7280.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7280-en-Cyber_all_the_Wassenaars.mp4"
        length="846200832"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7280-en-Cyber_all_the_Wassenaars.mp4?1452116457</guid>
      <dc:identifier>8b3cba12-3928-4fb9-b727-ee4bc9e56f51</dc:identifier>
      <dc:date>2015-12-28T14:00:00+01:00</dc:date>
      <itunes:author>Walter van Holst, Nate Cardozo, mlp, Richard Tynan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Export controls and exploit regulations: braindead and (in)evitable?</itunes:subtitle>
      <itunes:summary>Transposition of the Wassenaar Arrangement, which now also covers export controls on exploits and surveillance technology, into European law is upon us. This panel discusses this, both on process and substance.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7280.html
</itunes:summary>
      <itunes:duration>00:58:07</itunes:duration>
    </item>
    <item>
      <title>Jugend hackt 2015 (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7562-jugend_hackt_2015</link>
      <description>Auch in 2015 entstanden wieder zahlreiche Projekte bei Jugend hackt, die mit Code die Welt verbessern. Im Talk möchten die jugendlichen HackerInnen Einblick in ihre Ideen und Projekte geben, und ihre Perspektive auf die Welt vermitteln.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7562.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7562-de-en-Jugend_hackt_2015_hd.mp4"
        length="810549248"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7562-de-en-Jugend_hackt_2015_hd.mp4?1452261288</guid>
      <dc:identifier>3aeabb04-6227-4122-8fbc-21e31c04daf0</dc:identifier>
      <dc:date>2015-12-28T14:00:00+01:00</dc:date>
      <itunes:author>Jugend hackt</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:subtitle>Projektvorstellungen der JunghackerInnen</itunes:subtitle>
      <itunes:summary>Auch in 2015 entstanden wieder zahlreiche Projekte bei Jugend hackt, die mit Code die Welt verbessern. Im Talk möchten die jugendlichen HackerInnen Einblick in ihre Ideen und Projekte geben, und ihre Perspektive auf die Welt vermitteln.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7562.html
</itunes:summary>
      <itunes:duration>01:01:37</itunes:duration>
    </item>
    <item>
      <title>Ling - High level system programming (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7367-ling_-_high_level_system_programming</link>
      <description>In this presentation I will present the experimental language Ling. We shall get an intuitive understanding of the language through familiar concepts from imperative programming. We shall cover how Ling enables a modular and precise control on memory allocation, through  a general optimization called fusion. This optimization, fusion is a cost-free abstraction mechanism which brings high level programming to system programming.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7367.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7367-en-de-Ling_-_High_level_system_programming_hd.mp4"
        length="422576128"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 19:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7367-en-de-Ling_-_High_level_system_programming_hd.mp4?1451355247</guid>
      <dc:identifier>4afc705e-a55c-45ae-b67e-a820e5398d23</dc:identifier>
      <dc:date>2015-12-28T19:00:00+01:00</dc:date>
      <itunes:author>Nicolas Pouillard</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>modular and precise resource management</itunes:subtitle>
      <itunes:summary>In this presentation I will present the experimental language Ling. We shall get an intuitive understanding of the language through familiar concepts from imperative programming. We shall cover how Ling enables a modular and precise control on memory allocation, through  a general optimization called fusion. This optimization, fusion is a cost-free abstraction mechanism which brings high level programming to system programming.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7367.html
</itunes:summary>
      <itunes:duration>00:34:51</itunes:duration>
    </item>
    <item>
      <title>Ecuador: how an authoritarian government is fooling the entire world (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7134-ecuador_how_an_authoritarian_government_is_fooling_the_entire_world</link>
      <description>The Ecuadorian government received international visibility when in 2012 it agreed to grant Wikileaks founder Julian Assange political asylum and host him in Ecuador&#39;s London embassy. Ecuador has since been widely praised for standing up to the United States to defend the freedom of the press and freedom of expression.

However, the reality is not consistent with this image Ecuador seeks to project. Journalists inside the country face oppressive laws, huge fines and lawsuits for reporting on government corruption. Digital and physical surveillance of journalists and activists is in fact getting worse.

We will analyze some of the existing leaks that prove such activities. We will also give a first-hand account from someone who had to literally run away from Ecuador for publishing leaked materials proving illegal espionage against journalists and citizens.

Is Ecuador really interested in free speech? We don&#39;t think so and we will tell you why.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7134.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7134-en-de-Ecuador_how_an_authoritarian_government_is_fooling_the_entire_world_hd.mp4"
        length="491782144"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 19:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7134-en-de-Ecuador_how_an_authoritarian_government_is_fooling_the_entire_world_hd.mp4?1451355292</guid>
      <dc:identifier>62290f8e-f515-416f-9c4a-b403474e94e6</dc:identifier>
      <dc:date>2015-12-28T19:00:00+01:00</dc:date>
      <itunes:author>Pedro Noel, Bethany Horne</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Guess what? The Government of Rafael Correa actually is totally against free-speech and we got proofs on that</itunes:subtitle>
      <itunes:summary>The Ecuadorian government received international visibility when in 2012 it agreed to grant Wikileaks founder Julian Assange political asylum and host him in Ecuador&#39;s London embassy. Ecuador has since been widely praised for standing up to the United States to defend the freedom of the press and freedom of expression.

However, the reality is not consistent with this image Ecuador seeks to project. Journalists inside the country face oppressive laws, huge fines and lawsuits for reporting on government corruption. Digital and physical surveillance of journalists and activists is in fact getting worse.

We will analyze some of the existing leaks that prove such activities. We will also give a first-hand account from someone who had to literally run away from Ecuador for publishing leaked materials proving illegal espionage against journalists and citizens.

Is Ecuador really interested in free speech? We don&#39;t think so and we will tell you why.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7134.html
</itunes:summary>
      <itunes:duration>00:51:05</itunes:duration>
    </item>
    <item>
      <title>Let&#39;s Encrypt -- What launching a free CA looks like (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7528-let_s_encrypt_--_what_launching_a_free_ca_looks_like</link>
      <description>Let&#39;s Encrypt is a new free and automated certificate authority,
that entered closed beta in October and has already issued a large number of
valid certificates.  This talk will provide a short overview of 
how the Let&#39;s Encrypt client and server software work, and explore
statistics gathered during our closed beta and launch period. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7528.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7528-en-de-Lets_Encrypt_--_What_launching_a_free_CA_looks_like_hd.mp4"
        length="622854144"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 19:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7528-en-de-Lets_Encrypt_--_What_launching_a_free_CA_looks_like_hd.mp4?1451355206</guid>
      <dc:identifier>4f1a0717-6931-4580-9e49-5d523be045df</dc:identifier>
      <dc:date>2015-12-28T19:00:00+01:00</dc:date>
      <itunes:author>Roland Bracewell Shoemaker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Let&#39;s Encrypt is a new free and automated certificate authority,
that entered closed beta in October and has already issued a large number of
valid certificates.  This talk will provide a short overview of 
how the Let&#39;s Encrypt client and server software work, and explore
statistics gathered during our closed beta and launch period. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7528.html
</itunes:summary>
      <itunes:duration>00:29:56</itunes:duration>
    </item>
    <item>
      <title>G’scheitern (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7138-g_scheitern</link>
      <description>„Never ever say no, act your first thought and learn to love mistakes“ – these are the basic rules of improv theatre. I will show how this can be adopted for everyday life.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7138.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7138-en-de-Gscheitern_hd.mp4"
        length="271581184"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7138-en-de-Gscheitern_hd.mp4?1451355021</guid>
      <dc:identifier>e34fb384-4da9-44c4-9096-1660d5d57962</dc:identifier>
      <dc:date>2015-12-28T18:15:00+01:00</dc:date>
      <itunes:author>Gregor Ruttner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Failosophy</itunes:keywords>
      <itunes:subtitle>The art of failure taught by improv theatre </itunes:subtitle>
      <itunes:summary>„Never ever say no, act your first thought and learn to love mistakes“ – these are the basic rules of improv theatre. I will show how this can be adopted for everyday life.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7138.html
</itunes:summary>
      <itunes:duration>00:24:43</itunes:duration>
    </item>
    <item>
      <title>Mobile Censorship in Iran (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7529-mobile_censorship_in_iran</link>
      <description>As Internet users increasingly connect to the Internet through smartphones, this has transformed Iran’s Internet ecology towards an increasing reliance and production in apps. In Iran, a country that practises some of the most stringent censorship and surveillance techniques in the world has seen this transformation reshape the way the government implements information controls online. While applications with popular usage on browsers such as Facebook and Twitter remain blocked through their mobile applications, platforms that predominantly exist in app form such as WhatsApp, Viber, and Instagram remain unblocked in the country. This talk will look at how the government is counteracting these policies through various means, including local imitation apps, and new programs such as ‘intelligent filtering’, and the Revolutionary Guards&#39; “Spider” program. Additionally, a discussion of how Iranian Internet users use these platforms, especially in reference to digital security awareness and practices will be included. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7529.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7529-en-de-Mobile_Censorship_in_Iran_hd.mp4"
        length="303038464"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7529-en-de-Mobile_Censorship_in_Iran_hd.mp4?1451355153</guid>
      <dc:identifier>658ebc92-ef93-421d-9547-f117f75eed92</dc:identifier>
      <dc:date>2015-12-28T18:15:00+01:00</dc:date>
      <itunes:author>Mahsa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>As Internet users increasingly connect to the Internet through smartphones, this has transformed Iran’s Internet ecology towards an increasing reliance and production in apps. In Iran, a country that practises some of the most stringent censorship and surveillance techniques in the world has seen this transformation reshape the way the government implements information controls online. While applications with popular usage on browsers such as Facebook and Twitter remain blocked through their mobile applications, platforms that predominantly exist in app form such as WhatsApp, Viber, and Instagram remain unblocked in the country. This talk will look at how the government is counteracting these policies through various means, including local imitation apps, and new programs such as ‘intelligent filtering’, and the Revolutionary Guards&#39; “Spider” program. Additionally, a discussion of how Iranian Internet users use these platforms, especially in reference to digital security awareness and practices will be included. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7529.html
</itunes:summary>
      <itunes:duration>00:30:12</itunes:duration>
    </item>
    <item>
      <title>Vector retrogaming (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7238-vector_retrogaming</link>
      <description>In this talk I&#39;ll show how to build an open source vector gaming system with MAME, a microcontroller and an XY monitor or oscilloscope. Relive the joys of playing vector video games from 1979 and enjoy some of the retro-styled vector games of 2015.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7238.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7238-en-Vector_retrogaming.mp4"
        length="271581184"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7238-en-Vector_retrogaming.mp4?1451405155</guid>
      <dc:identifier>6f79c506-a6cd-4430-bfbf-1841aca06e41</dc:identifier>
      <dc:date>2015-12-28T18:15:00+01:00</dc:date>
      <itunes:author>Trammell Hudson, Adelle Lin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>In this talk I&#39;ll show how to build an open source vector gaming system with MAME, a microcontroller and an XY monitor or oscilloscope. Relive the joys of playing vector video games from 1979 and enjoy some of the retro-styled vector games of 2015.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7238.html
</itunes:summary>
      <itunes:duration>00:22:41</itunes:duration>
    </item>
    <item>
      <title>Ein Abgrund von Landesverrat (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7135-ein_abgrund_von_landesverrat</link>
      <description>Im Sommer kam heraus, dass der Generalbundesanwalt Ermittlungen gegen zwei Journalisten von netzpolitik.org in Gang gesetzt hatte. Das geschah, weil sich das Bundesamt für Verfassungsschutz dadurch auf den Schlips getreten fühlte, dass Auszüge aus ihren Haushaltsplänen der allgemeinen Bevölkerung bei netzpolitik.org zugänglich gemacht wurden.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7135.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7135-de-en-Ein_Abgrund_von_Landesverrat_hd.mp4"
        length="469762048"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7135-de-en-Ein_Abgrund_von_Landesverrat_hd.mp4?1451354689</guid>
      <dc:identifier>527d5a8e-841d-48ad-89d9-b62fbee741b8</dc:identifier>
      <dc:date>2015-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Markus Beckedahl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Wie es dazu kam und was daraus zu lernen ist</itunes:subtitle>
      <itunes:summary>Im Sommer kam heraus, dass der Generalbundesanwalt Ermittlungen gegen zwei Journalisten von netzpolitik.org in Gang gesetzt hatte. Das geschah, weil sich das Bundesamt für Verfassungsschutz dadurch auf den Schlips getreten fühlte, dass Auszüge aus ihren Haushaltsplänen der allgemeinen Bevölkerung bei netzpolitik.org zugänglich gemacht wurden.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7135.html
</itunes:summary>
      <itunes:duration>00:32:00</itunes:duration>
    </item>
    <item>
      <title>Profiling (In)justice (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7264-profiling_in_justice</link>
      <description>This talk will focus on the potential ability of data disaggregated by race and ethnicity to reduce discriminatory policing in Germany.  In the UK, data has been collected during police procedures, allowing for a monitoring and evaluation of discriminatory policing practices. Unfortunately, such an empirically driven policy approach is not currently possible in Germany. This talk will argue that, as a first step, a policy based off the UK approach towards data collection be implemented in Germany to incorporate, rather than ignore, Germany’s diverse identities, and to allow for empirically driven and more effective policing.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7264.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7264-en-de-Profiling_In_justice_hd.mp4"
        length="359661568"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7264-en-de-Profiling_In_justice_hd.mp4?1451354642</guid>
      <dc:identifier>6c57ad7c-325a-47b1-88b9-124c35298f81</dc:identifier>
      <dc:date>2015-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Jeff Deutch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Disaggregating Data by Race and Ethnicity to Curb Discriminatory Policing</itunes:subtitle>
      <itunes:summary>This talk will focus on the potential ability of data disaggregated by race and ethnicity to reduce discriminatory policing in Germany.  In the UK, data has been collected during police procedures, allowing for a monitoring and evaluation of discriminatory policing practices. Unfortunately, such an empirically driven policy approach is not currently possible in Germany. This talk will argue that, as a first step, a policy based off the UK approach towards data collection be implemented in Germany to incorporate, rather than ignore, Germany’s diverse identities, and to allow for empirically driven and more effective policing.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7264.html
</itunes:summary>
      <itunes:duration>00:28:25</itunes:duration>
    </item>
    <item>
      <title>Sicherheit von 125kHz Transpondern  am Beispiel Hitag S (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7166-sicherheit_von_125khz_transpondern_am_beispiel_hitag_s</link>
      <description>Der Hitag S Transponder wird in verschiedensten Applikationen eingesetzt. Während Angriffe für den Hitag 2 bereits bekannt sind, gilt der Hitag S in der Literatur noch nicht als gebrochen. Wir haben die beschriebenen Angriffe auf den Hitag S übertragen. Wir sind in der Lage den Schlüssel zu brechen und Informationen wie das Kennwort zu ermitteln, obwohl diese zusätzlich vor Lesezugriff geschützt sind. In Abhängigkeit des gewählten Angriffs benötigen wir für das Brechen des Schlüssels zwischen mehreren hundert Tagen und 5 Minuten. Wir haben einen Emulator gebaut, der jeden Hitag S Transponder nachbilden kann. Wird der Transponder in einem Schließsystem eingesetzt, können wir so eine Schlüsselkopie erstellen. 
Basierend auf unseren Ergebnissen und den Erfahrungen mit anderen Transpondern aus dem 125kHz Bereich können wir nur vor dem Einsatz in sicherheitskritischen Bereichen warnen.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7166.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7166-de-en-Sicherheit_von_125kHz_Transpondern_am_Beispiel_Hitag_S_hd.mp4"
        length="253755392"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7166-de-en-Sicherheit_von_125kHz_Transpondern_am_Beispiel_Hitag_S_hd.mp4?1451354721</guid>
      <dc:identifier>b753dbd8-32bb-437c-9f15-db0d7ac1811a</dc:identifier>
      <dc:date>2015-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Ralf Spenneberg, Hendrik Schwartke, Oguzhan Cicek</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Der Hitag S Transponder wird in verschiedensten Applikationen eingesetzt. Während Angriffe für den Hitag 2 bereits bekannt sind, gilt der Hitag S in der Literatur noch nicht als gebrochen. Wir haben die beschriebenen Angriffe auf den Hitag S übertragen. Wir sind in der Lage den Schlüssel zu brechen und Informationen wie das Kennwort zu ermitteln, obwohl diese zusätzlich vor Lesezugriff geschützt sind. In Abhängigkeit des gewählten Angriffs benötigen wir für das Brechen des Schlüssels zwischen mehreren hundert Tagen und 5 Minuten. Wir haben einen Emulator gebaut, der jeden Hitag S Transponder nachbilden kann. Wird der Transponder in einem Schließsystem eingesetzt, können wir so eine Schlüsselkopie erstellen. 
Basierend auf unseren Ergebnissen und den Erfahrungen mit anderen Transpondern aus dem 125kHz Bereich können wir nur vor dem Einsatz in sicherheitskritischen Bereichen warnen.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7166.html
</itunes:summary>
      <itunes:duration>00:29:47</itunes:duration>
    </item>
    <item>
      <title>Software and business method patents: call for action (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7283-software_and_business_method_patents_call_for_action</link>
      <description>&lt;p&gt;Ten years after the rejection of the European software patent directive by the European Parliament, the software patent problem still is not over. Political action is required.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7283.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7283-en-de-Software_and_business_method_patents_call_for_action_hd.mp4"
        length="1123024896"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7283-en-de-Software_and_business_method_patents_call_for_action_hd.mp4?1452261471</guid>
      <dc:identifier>b5456783-49dc-4420-bb0f-fee33a249b65</dc:identifier>
      <dc:date>2015-12-28T14:00:00+01:00</dc:date>
      <itunes:author>Iga Bałos, Benjamin Henrion (zoobab)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>&lt;p&gt;Ten years after the rejection of the European software patent directive by the European Parliament, the software patent problem still is not over. Political action is required.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7283.html
</itunes:summary>
      <itunes:duration>01:02:55</itunes:duration>
    </item>
    <item>
      <title>CloudABI (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7231-cloudabi</link>
      <description>CloudABI is an alternative runtime environment for UNIX-like operating systems that is purely based on the principle of capability-based security. This makes it possible to create applications that are strongly sandboxed, easier to test and easier to maintain.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7231.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7231-en-de-CloudABI_hd.mp4"
        length="785383424"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7231-en-de-CloudABI_hd.mp4?1451354329</guid>
      <dc:identifier>08843e46-b813-49a4-93ad-ab6e7b3e4a17</dc:identifier>
      <dc:date>2015-12-28T12:45:00+01:00</dc:date>
      <itunes:author>Ed Schouten</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Pure capability-based security for UNIX</itunes:subtitle>
      <itunes:summary>CloudABI is an alternative runtime environment for UNIX-like operating systems that is purely based on the principle of capability-based security. This makes it possible to create applications that are strongly sandboxed, easier to test and easier to maintain.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7231.html
</itunes:summary>
      <itunes:duration>01:02:05</itunes:duration>
    </item>
    <item>
      <title>Net Neutrality in Europe (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7387-net_neutrality_in_europe</link>
      <description>After two years the fight for net neutrality in Europe about the Telecom Single Market Regulation has come to a close. In this talk we will analyse the new net neutrality law and it&#39;s consequences and we give you the lessons learned from two years of EU campaigning. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7387.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7387-en-de-Net_Neutrality_in_Europe_hd.mp4"
        length="478150656"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7387-en-de-Net_Neutrality_in_Europe_hd.mp4?1451354267</guid>
      <dc:identifier>3a221dbd-39c7-4b85-a1fc-73d7e87fd31a</dc:identifier>
      <dc:date>2015-12-28T12:45:00+01:00</dc:date>
      <itunes:author>Thomas Lohninger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>alea iacta est </itunes:subtitle>
      <itunes:summary>After two years the fight for net neutrality in Europe about the Telecom Single Market Regulation has come to a close. In this talk we will analyse the new net neutrality law and it&#39;s consequences and we give you the lessons learned from two years of EU campaigning. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7387.html
</itunes:summary>
      <itunes:duration>01:01:49</itunes:duration>
    </item>
    <item>
      <title>Shooting lasers into space – for science! (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7162-shooting_lasers_into_space_for_science</link>
      <description>Light of astronomical objects gets distorted as it passes earth’s atmosphere. Adaptive optics can correct this distortion and create images that are as sharp as those taken in space. The correction needs a bright reference star. If there is no such star nearby, an artificial Laser Guide Star can be created in the upper atmosphere.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7162.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7162-en-de-Shooting_lasers_into_space_-_for_science_hd.mp4"
        length="757071872"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7162-en-de-Shooting_lasers_into_space_-_for_science_hd.mp4?1451353836</guid>
      <dc:identifier>cc3ee8b6-9fe5-4290-82de-824e0223bef9</dc:identifier>
      <dc:date>2015-12-27T21:45:00+01:00</dc:date>
      <itunes:author>Peter Buschkamp</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>Light of astronomical objects gets distorted as it passes earth’s atmosphere. Adaptive optics can correct this distortion and create images that are as sharp as those taken in space. The correction needs a bright reference star. If there is no such star nearby, an artificial Laser Guide Star can be created in the upper atmosphere.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7162.html
</itunes:summary>
      <itunes:duration>01:00:28</itunes:duration>
    </item>
    <item>
      <title>Household, Totalitarianism and Cyberspace (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7342-household_totalitarianism_and_cyberspace</link>
      <description>In my talk I am 1) discussing philosophical concepts of privacy, especially Hannah Arendt&#39;s philosophy.  I am 2) explaining why in a liberal-democratic system we need to protect our privacy and 3) what we can morally do to prevent catastrophes such as a totalitarian system from happening again. With Hannah Arendt&#39;s arguments and her analysis of totalitarian systems in mind, I am referring to three examples from today&#39;s privacy discussions: cybermobbing, Behavioral Advertising and secret services.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7342.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7342-en-Household_Totalitarianism_and_Cyberspace_hd.mp4"
        length="615514112"
        type="video/mp4"/>
      <pubDate>Mon, 28 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7342-en-Household_Totalitarianism_and_Cyberspace_hd.mp4?1451417539</guid>
      <dc:identifier>94fa109a-45d7-4fea-86e3-12d12510c374</dc:identifier>
      <dc:date>2015-12-28T11:30:00+01:00</dc:date>
      <itunes:author>Julia Maria Mönig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Philosophical Perspectives on Privacy Drawing on the Example of Hannah Arendt</itunes:subtitle>
      <itunes:summary>In my talk I am 1) discussing philosophical concepts of privacy, especially Hannah Arendt&#39;s philosophy.  I am 2) explaining why in a liberal-democratic system we need to protect our privacy and 3) what we can morally do to prevent catastrophes such as a totalitarian system from happening again. With Hannah Arendt&#39;s arguments and her analysis of totalitarian systems in mind, I am referring to three examples from today&#39;s privacy discussions: cybermobbing, Behavioral Advertising and secret services.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7342.html
</itunes:summary>
      <itunes:duration>00:56:54</itunes:duration>
    </item>
    <item>
      <title>New memory corruption attacks: why can&#39;t we have nice things? (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7163-new_memory_corruption_attacks_why_can_t_we_have_nice_things</link>
      <description>Memory corruption is an ongoing problem and in past years we have both developed a set of defense mechanisms and novel attacks against those defense mechanisms. Novel defense mechanisms like Control-Flow Integrity (CFI) and Code-Pointer Integrity (CPI) promise to stop control-flow hijack attacks. We show that, while they make attacks harder, attacks often remain possible. Introducing novel attack mechanisms, like Control-Flow Bending (CFB), we discuss limitations of the current approaches. CFB is a generalization of data-only attacks that allows an attacker to execute code even if a defense mechanism significantly constrains execution.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7163.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7163-en-de-New_memory_corruption_attacks_why_cant_we_have_nice_things_hd.mp4"
        length="448790528"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7163-en-de-New_memory_corruption_attacks_why_cant_we_have_nice_things_hd.mp4?1451353773</guid>
      <dc:identifier>777ec642-2866-4617-9789-91cba4a2b313</dc:identifier>
      <dc:date>2015-12-27T21:45:00+01:00</dc:date>
      <itunes:author>gannimo, npc@berkeley.edu</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Memory corruption is an ongoing problem and in past years we have both developed a set of defense mechanisms and novel attacks against those defense mechanisms. Novel defense mechanisms like Control-Flow Integrity (CFI) and Code-Pointer Integrity (CPI) promise to stop control-flow hijack attacks. We show that, while they make attacks harder, attacks often remain possible. Introducing novel attack mechanisms, like Control-Flow Bending (CFB), we discuss limitations of the current approaches. CFB is a generalization of data-only attacks that allows an attacker to execute code even if a defense mechanism significantly constrains execution.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7163.html
</itunes:summary>
      <itunes:duration>00:54:31</itunes:duration>
    </item>
    <item>
      <title>Console Hacking (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7240-console_hacking</link>
      <description>In 2011 the Nintendo 3DS was released. Today it is the most popular current-gen handheld console, having sold more than 50 million units worldwide. The 3DS features a completely redesigned architecture from its predecessors the DS and the DSi. This talk will focus on the security features of the 3DS, and how we got around them.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7240.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7240-en-de-Console_Hacking_hd.mp4"
        length="312475648"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7240-en-de-Console_Hacking_hd.mp4?1451354164</guid>
      <dc:identifier>9f2e9ff0-1555-470b-8743-9f07f54e9097</dc:identifier>
      <dc:date>2015-12-27T23:00:00+01:00</dc:date>
      <itunes:author>plutoo, derrek, smea</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Breaking the 3DS</itunes:subtitle>
      <itunes:summary>In 2011 the Nintendo 3DS was released. Today it is the most popular current-gen handheld console, having sold more than 50 million units worldwide. The 3DS features a completely redesigned architecture from its predecessors the DS and the DSi. This talk will focus on the security features of the 3DS, and how we got around them.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7240.html
</itunes:summary>
      <itunes:duration>01:12:47</itunes:duration>
    </item>
    <item>
      <title>APT Reports and OPSEC Evolution, or: These are not  the APT reports you are looking for (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7260-apt_reports_and_opsec_evolution_or_these_are_not_the_apt_reports_you_are_looking_for</link>
      <description>With the advancement of defensive security and the constant release of research papers into their toolsets, advanced threat actors have had to adapt with new operational security practices, as well as with new technology.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7260.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7260-en-APT_Reports_and_OPSEC_Evolution_or_These_are_not_the_APT_reports_you_are_looking_for.mp4"
        length="762314752"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7260-en-APT_Reports_and_OPSEC_Evolution_or_These_are_not_the_APT_reports_you_are_looking_for.mp4?1451354130</guid>
      <dc:identifier>56e8d345-8c04-4281-9811-d4ed9da8603e</dc:identifier>
      <dc:date>2015-12-27T23:00:00+01:00</dc:date>
      <itunes:author>Inbar Raz, Gadi Evron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>How advanced threat actors learn and change with innovation in security defense and constant APT reports, and how we can get better</itunes:subtitle>
      <itunes:summary>With the advancement of defensive security and the constant release of research papers into their toolsets, advanced threat actors have had to adapt with new operational security practices, as well as with new technology.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7260.html
</itunes:summary>
      <itunes:duration>01:00:24</itunes:duration>
    </item>
    <item>
      <title>Shopshifting (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7368-shopshifting</link>
      <description>Payment systems are old and have – unlike card protocols – seen little scrutiny so far. This talk enumerates design and implementation flaws in payment processing systems, which can defraud consumers and merchants.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7368.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7368-en-de-Shopshifting_hd.mp4"
        length="754974720"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7368-en-de-Shopshifting_hd.mp4?1451353903</guid>
      <dc:identifier>2ca47144-1fe0-4ffd-b0fb-e65b1e73f1ff</dc:identifier>
      <dc:date>2015-12-27T21:45:00+01:00</dc:date>
      <itunes:author>Karsten Nohl, Fabian Bräunlein, dexter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>The potential for payment system abuse</itunes:subtitle>
      <itunes:summary>Payment systems are old and have – unlike card protocols – seen little scrutiny so far. This talk enumerates design and implementation flaws in payment processing systems, which can defraud consumers and merchants.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7368.html
</itunes:summary>
      <itunes:duration>00:58:00</itunes:duration>
    </item>
    <item>
      <title>PQCHacks (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7210-pqchacks</link>
      <description>&lt;p&gt;Last year your friend Karen joined the alternative music scene and sent you a sound track. The government is recording everything, and this year announced that alternative music is a gateway drug to terrorism (see &lt;a href=&quot;http://www.theguardian.com/australia-news/2015/sep/25/radicalisation-kit-links-activism-and-alternative-music-scene-to-extremism&quot;&gt;http://www.theguardian.com/australia-news/2015/sep/25/radicalisation-kit-links-activism-and-alternative-music-scene-to-extremism&lt;/a&gt;). Fortunately, Karen encrypted the email.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7210.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7210-en-PQCHacks.mp4"
        length="433061888"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7210-en-PQCHacks.mp4?1451354064</guid>
      <dc:identifier>1b6ed158-e206-416a-8705-9b285a428dbf</dc:identifier>
      <dc:date>2015-12-27T23:00:00+01:00</dc:date>
      <itunes:author>djb, Tanja Lange</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>A gentle introduction to post-quantum cryptography</itunes:subtitle>
      <itunes:summary>&lt;p&gt;Last year your friend Karen joined the alternative music scene and sent you a sound track. The government is recording everything, and this year announced that alternative music is a gateway drug to terrorism (see &lt;a href=&quot;http://www.theguardian.com/australia-news/2015/sep/25/radicalisation-kit-links-activism-and-alternative-music-scene-to-extremism&quot;&gt;http://www.theguardian.com/australia-news/2015/sep/25/radicalisation-kit-links-activism-and-alternative-music-scene-to-extremism&lt;/a&gt;). Fortunately, Karen encrypted the email.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7210.html
</itunes:summary>
      <itunes:duration>01:00:57</itunes:duration>
    </item>
    <item>
      <title>My Robot Will Crush You With Its Soft Delicate Hands! (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7389-my_robot_will_crush_you_with_its_soft_delicate_hands</link>
      <description>In this talk Matthew Borgatti, Lead Scientist at Super-Releaser, will take you through the process of turning a puddle of goo into a working soft robot. He will take you through the different mechanisms that can be created, simple processes for fabricating soft robots, and methods for joining elements together into sophisticated assemblies.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7389.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7389-en-de-My_Robot_Will_Crush_You_With_Its_Soft_Delicate_Hands_hd.mp4"
        length="746586112"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7389-en-de-My_Robot_Will_Crush_You_With_Its_Soft_Delicate_Hands_hd.mp4?1451354018</guid>
      <dc:identifier>534b5a9d-f786-4fc9-96d1-a0827125ee6e</dc:identifier>
      <dc:date>2015-12-27T23:00:00+01:00</dc:date>
      <itunes:author>Gianteye</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>How to design and fabricate soft robots using everyday materials</itunes:subtitle>
      <itunes:summary>In this talk Matthew Borgatti, Lead Scientist at Super-Releaser, will take you through the process of turning a puddle of goo into a working soft robot. He will take you through the different mechanisms that can be created, simple processes for fabricating soft robots, and methods for joining elements together into sophisticated assemblies.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7389.html
</itunes:summary>
      <itunes:duration>01:00:44</itunes:duration>
    </item>
    <item>
      <title>When hardware must „just work“ (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7171-when_hardware_must_just_work</link>
      <description>Software design and testing is hard, but what happens when each bug fix can cost months of delay and millions of dollars? In this talk we’ll take a behind-the-scenes look at the challenges in the design of a very complex, yet critical piece of hardware: the modern x86 CPU.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7171.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7171-en-de-When_hardware_must_just_work_hd.mp4"
        length="520093696"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7171-en-de-When_hardware_must_just_work_hd.mp4?1451353955</guid>
      <dc:identifier>489a414b-2d6b-4f20-8187-813169ca19c9</dc:identifier>
      <dc:date>2015-12-27T21:45:00+01:00</dc:date>
      <itunes:author>David Kaplan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Failosophy</itunes:keywords>
      <itunes:subtitle>An inside look at x86 CPU design</itunes:subtitle>
      <itunes:summary>Software design and testing is hard, but what happens when each bug fix can cost months of delay and millions of dollars? In this talk we’ll take a behind-the-scenes look at the challenges in the design of a very complex, yet critical piece of hardware: the modern x86 CPU.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7171.html
</itunes:summary>
      <itunes:duration>00:58:23</itunes:duration>
    </item>
    <item>
      <title>Public Library/Memory of the World (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7279-public_library_memory_of_the_world</link>
      <description>Public Library is the synergy of two efforts. First, it makes the case for the institution of public library and its principle of universal access to knowledge. Second, it is an exploration and development of distributed internet infrastructure for amateur librarians. If &lt;a href=&quot;https://www.memoryoftheworld.org/blog/2014/10/27/public-library-an-essay/&quot;&gt;Public Library&lt;/a&gt; is a proposal/RFC &lt;a href=&quot;&quot;https://library.memoryoftheworld.org/&gt;Memory of the World&lt;/a&gt; is its proof of concept and &lt;a href=&quot;https://github.com/marcellmars/letssharebooks&quot;&gt;reference implementation&lt;/a&gt;. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7279.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7279-en-Public_Library_Memory_of_the_World.mp4"
        length="811597824"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7279-en-Public_Library_Memory_of_the_World.mp4?1452117802</guid>
      <dc:identifier>b2a1a06b-bafc-4a59-ba6f-dddaee5adddb</dc:identifier>
      <dc:date>2015-12-27T17:15:00+01:00</dc:date>
      <itunes:author>Marcell Mars</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Access to knowledge for every member of society</itunes:subtitle>
      <itunes:summary>Public Library is the synergy of two efforts. First, it makes the case for the institution of public library and its principle of universal access to knowledge. Second, it is an exploration and development of distributed internet infrastructure for amateur librarians. If &lt;a href=&quot;https://www.memoryoftheworld.org/blog/2014/10/27/public-library-an-essay/&quot;&gt;Public Library&lt;/a&gt; is a proposal/RFC &lt;a href=&quot;&quot;https://library.memoryoftheworld.org/&gt;Memory of the World&lt;/a&gt; is its proof of concept and &lt;a href=&quot;https://github.com/marcellmars/letssharebooks&quot;&gt;reference implementation&lt;/a&gt;. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7279.html
</itunes:summary>
      <itunes:duration>01:02:29</itunes:duration>
    </item>
    <item>
      <title>Datahavens from HavenCo to Today (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7432-datahavens_from_havenco_to_today</link>
      <description>Datahavens have long been discussed as a solution to user security and privacy needs.  Instinctively, the idea of physical locations where servers for communications, financial privacy, and other services can work is easily understood and seems appealing.  As a founder of the HavenCo datahaven on Sealand in 2000, I saw firsthand the potential and the pitfalls of this approach.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7432.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7432-en-Datahavens_from_HavenCo_to_Today.mp4"
        length="486539264"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7432-en-Datahavens_from_HavenCo_to_Today.mp4?1451353724</guid>
      <dc:identifier>28891a0d-98d9-484a-bd59-ccea80852b12</dc:identifier>
      <dc:date>2015-12-27T20:30:00+01:00</dc:date>
      <itunes:author>Ryan Lackey</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Failosophy</itunes:keywords>
      <itunes:summary>Datahavens have long been discussed as a solution to user security and privacy needs.  Instinctively, the idea of physical locations where servers for communications, financial privacy, and other services can work is easily understood and seems appealing.  As a founder of the HavenCo datahaven on Sealand in 2000, I saw firsthand the potential and the pitfalls of this approach.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7432.html
</itunes:summary>
      <itunes:duration>00:58:13</itunes:duration>
    </item>
    <item>
      <title>So you want to build a satellite? (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7341-so_you_want_to_build_a_satellite</link>
      <description>CubeSat are small standardized satellites typically flown as secondary and containerized payloads piggybacking on the launches of larger satellites. Their low entrance cost have been a revolution in opening access to space for a broad range of institutions. In this talk the basics of CubeSat standards, technology and development are going to be presented. The goal is to proliferate the knowledge of what it takes to successfully build, launch and operate a CubeSat within and beyond the hacker community.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7341.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7341-en-de-So_you_want_to_build_a_satellite_hd.mp4"
        length="738197504"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7341-en-de-So_you_want_to_build_a_satellite_hd.mp4?1451353663</guid>
      <dc:identifier>0399a5b3-f539-41ed-b0bc-858d7c987688</dc:identifier>
      <dc:date>2015-12-27T20:30:00+01:00</dc:date>
      <itunes:author>INCO</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>How hard can it be? An introduction into CubeSat development</itunes:subtitle>
      <itunes:summary>CubeSat are small standardized satellites typically flown as secondary and containerized payloads piggybacking on the launches of larger satellites. Their low entrance cost have been a revolution in opening access to space for a broad range of institutions. In this talk the basics of CubeSat standards, technology and development are going to be presented. The goal is to proliferate the knowledge of what it takes to successfully build, launch and operate a CubeSat within and beyond the hacker community.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7341.html
</itunes:summary>
      <itunes:duration>01:00:30</itunes:duration>
    </item>
    <item>
      <title>Thunderstrike 2 (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7236-thunderstrike_2</link>
      <description>Last year at 31c3 we disclosed &lt;a href=&quot;https://trmm.net/Thunderstrike_31c3&quot;&gt;Thunderstrike&lt;/a&gt;, the first firmware attacks against Macbooks.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7236.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7236-en-de-Thunderstrike_2_hd.mp4"
        length="347078656"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7236-en-de-Thunderstrike_2_hd.mp4?1451353584</guid>
      <dc:identifier>aa5412e2-c20a-4c4a-b4d7-fd97184a87fe</dc:identifier>
      <dc:date>2015-12-27T20:30:00+01:00</dc:date>
      <itunes:author>Trammell Hudson</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Last year at 31c3 we disclosed &lt;a href=&quot;https://trmm.net/Thunderstrike_31c3&quot;&gt;Thunderstrike&lt;/a&gt;, the first firmware attacks against Macbooks.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7236.html
</itunes:summary>
      <itunes:duration>00:43:25</itunes:duration>
    </item>
    <item>
      <title>What does Big Brother see, while he is watching? (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7209-what_does_big_brother_see_while_he_is_watching</link>
      <description>In the past years there has been a lot of discussion on the topic of state sponsored surveillance. But hardly any material can be accessed to support the general debate due to vaguely declared security concerns. So we are debating Big Brother with little knowledge about what he actually sees, while he is watching. Over the course of three years, I was able to research the archives left by East Germany&#39;s Stasi to look for visual memories of this notorious surveillance system and more recently I was invited to spend some weeks looking at the archive by the Czechoslovak StB. Illustrating with images I have found during my research, I would like to address the question why this material is still relevant – even 25 years after the fall of the Iron Curtain.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7209.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching_hd.mp4"
        length="1009778688"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching_hd.mp4?1451353492</guid>
      <dc:identifier>f79c744f-30d1-4175-a173-2e760049337d</dc:identifier>
      <dc:date>2015-12-27T18:30:00+01:00</dc:date>
      <itunes:author>Simon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Uncovering images from the secret Stasi archives.</itunes:subtitle>
      <itunes:summary>In the past years there has been a lot of discussion on the topic of state sponsored surveillance. But hardly any material can be accessed to support the general debate due to vaguely declared security concerns. So we are debating Big Brother with little knowledge about what he actually sees, while he is watching. Over the course of three years, I was able to research the archives left by East Germany&#39;s Stasi to look for visual memories of this notorious surveillance system and more recently I was invited to spend some weeks looking at the archive by the Czechoslovak StB. Illustrating with images I have found during my research, I would like to address the question why this material is still relevant – even 25 years after the fall of the Iron Curtain.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7209.html
</itunes:summary>
      <itunes:duration>00:57:19</itunes:duration>
    </item>
    <item>
      <title>Beyond your cable modem (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7133-beyond_your_cable_modem</link>
      <description>Did you ever want to have access to a few hundred thousand network end points? Or a few hundred thousand phone numbers? A short look behind the curtains of how not to do network security.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7133.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7133-en-de-Beyond_your_cable_modem_hd.mp4"
        length="403701760"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7133-en-de-Beyond_your_cable_modem_hd.mp4?1451353425</guid>
      <dc:identifier>9ab1407a-126f-48d9-898d-eae7974324e9</dc:identifier>
      <dc:date>2015-12-27T18:30:00+01:00</dc:date>
      <itunes:author>Alexander Graf</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>How not to do DOCSIS networks</itunes:subtitle>
      <itunes:summary>Did you ever want to have access to a few hundred thousand network end points? Or a few hundred thousand phone numbers? A short look behind the curtains of how not to do network security.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7133.html
</itunes:summary>
      <itunes:duration>00:50:41</itunes:duration>
    </item>
    <item>
      <title>How the Great Firewall discovers hidden circumvention servers (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7196-how_the_great_firewall_discovers_hidden_circumvention_servers</link>
      <description>Several years ago, the Great Firewall of China was silently upgraded to find and block circumvention servers that employ encryption to defeat deep packet inspection. The system is now used to block protocols such as Tor, SoftEther, and SSH. In this talk, we will give an overview of how this system works, and how it can be circumvented.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7196.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_hd.mp4"
        length="525336576"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_hd.mp4?1451353341</guid>
      <dc:identifier>56721a59-30c0-4201-8744-5d2a9846ed28</dc:identifier>
      <dc:date>2015-12-27T17:15:00+01:00</dc:date>
      <itunes:author>Philipp Winter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>Several years ago, the Great Firewall of China was silently upgraded to find and block circumvention servers that employ encryption to defeat deep packet inspection. The system is now used to block protocols such as Tor, SoftEther, and SSH. In this talk, we will give an overview of how this system works, and how it can be circumvented.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7196.html
</itunes:summary>
      <itunes:duration>00:59:23</itunes:duration>
    </item>
    <item>
      <title>The Great Train Cyber Robbery (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7490-the_great_train_cyber_robbery</link>
      <description>&lt;p&gt;For years SCADA StrangeLove team speaks about vulnerabilities in Industrial Control Systems. Now we want to show by example of railway the link between information security and industrial safety and demonstrate how a root access gained in a few minutes can bring to naught all the years of efforts that were devoted to the improvement of fail-safety and reliability of the ICS system. Railroads is a complex systems and process automation is used in different areas: to control power, switches, signals and locomotives. At this talk we will analyze threats and vulnerabilities of fundamental rail-road automation systems such as computer based interlocking, automatic train control and automatic train protection. No vendor names and vulnerabilities details will be released, for obvious reasons. By the way, all research based on hands-on security exercises and most of issues are confirmed and processed by vendors.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7490.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7490-de-The_Great_Train_Cyber_Robbery.mp4"
        length="465567744"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7490-de-The_Great_Train_Cyber_Robbery.mp4?1451353477</guid>
      <dc:identifier>27260dd7-65b6-40ec-8929-2b96b45aa368</dc:identifier>
      <dc:date>2015-12-27T18:30:00+01:00</dc:date>
      <itunes:author>Sergey Gordeychik, Aleksandr Timorin, repdet</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>&lt;p&gt;For years SCADA StrangeLove team speaks about vulnerabilities in Industrial Control Systems. Now we want to show by example of railway the link between information security and industrial safety and demonstrate how a root access gained in a few minutes can bring to naught all the years of efforts that were devoted to the improvement of fail-safety and reliability of the ICS system. Railroads is a complex systems and process automation is used in different areas: to control power, switches, signals and locomotives. At this talk we will analyze threats and vulnerabilities of fundamental rail-road automation systems such as computer based interlocking, automatic train control and automatic train protection. No vendor names and vulnerabilities details will be released, for obvious reasons. By the way, all research based on hands-on security exercises and most of issues are confirmed and processed by vendors.&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7490.html
</itunes:summary>
      <itunes:duration>00:54:41</itunes:duration>
    </item>
    <item>
      <title>The Ultimate Amiga 500 Talk (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7468-the_ultimate_amiga_500_talk</link>
      <description>The Amiga was one of the most powerful and wide srpead computers in the late 80&#39;s. This talk explains its hardware design and programming.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7468.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7468-en-de-The_Ultimate_Amiga_500_Talk_hd.mp4"
        length="571473920"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7468-en-de-The_Ultimate_Amiga_500_Talk_hd.mp4?1451353549</guid>
      <dc:identifier>c6f44cff-122c-44f3-bcf9-683577a67e85</dc:identifier>
      <dc:date>2015-12-27T18:30:00+01:00</dc:date>
      <itunes:author>rahra</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Amiga Hardware Design And Programming</itunes:subtitle>
      <itunes:summary>The Amiga was one of the most powerful and wide srpead computers in the late 80&#39;s. This talk explains its hardware design and programming.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7468.html
</itunes:summary>
      <itunes:duration>00:53:14</itunes:duration>
    </item>
    <item>
      <title>Windows drivers attack surface (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7510-windows_drivers_attack_surface</link>
      <description>This presentation covers windows kernel driver security issues. It&#39;ll discuss some background, and then give an overview of the most common issues seen in drivers, covering both finding and fixing issues.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7510.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7510-en-de-Windows_drivers_attack_surface_hd.mp4"
        length="545259520"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7510-en-de-Windows_drivers_attack_surface_hd.mp4?1451353390</guid>
      <dc:identifier>4c070a2c-0558-48b8-b612-b8507a51154e</dc:identifier>
      <dc:date>2015-12-27T17:15:00+01:00</dc:date>
      <itunes:author>Ilja van Sprundel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>some &#39;new&#39; insights</itunes:subtitle>
      <itunes:summary>This presentation covers windows kernel driver security issues. It&#39;ll discuss some background, and then give an overview of the most common issues seen in drivers, covering both finding and fixing issues.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7510.html
</itunes:summary>
      <itunes:duration>01:00:31</itunes:duration>
    </item>
    <item>
      <title>Netzpolitik in der Schweiz (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7205-netzpolitik_in_der_schweiz</link>
      <description>2015 und 2016 sind wichtige Jahre für die Netzpolitik in der Schweiz, denn die Parlamente entscheiden sowohl die Revision des BÜPF (&lt;b&gt;B&lt;/b&gt;undesgesetz betreffend die &lt;b&gt;Ü&lt;/b&gt;berwachung des &lt;b&gt;P&lt;/b&gt;ost- und &lt;b&gt;F&lt;/b&gt;ernmeldeverkehrs) als auch das NDG (&lt;b&gt;N&lt;/b&gt;achrichten&lt;b&gt;d&lt;/b&gt;ienst&lt;b&gt;g&lt;/b&gt;esetz).
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7205.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7205-de-Netzpolitik_in_der_Schweiz_hd.mp4"
        length="446693376"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7205-de-Netzpolitik_in_der_Schweiz_hd.mp4?1451353199</guid>
      <dc:identifier>5db7d97f-59c9-42d8-abfc-6224bf075f08</dc:identifier>
      <dc:date>2015-12-27T16:00:00+01:00</dc:date>
      <itunes:author>vimja, ari, Patrick Stählin, Hakuna MaMate</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:subtitle>NDG, BÜPF und wie wir uns dagegen wehren</itunes:subtitle>
      <itunes:summary>2015 und 2016 sind wichtige Jahre für die Netzpolitik in der Schweiz, denn die Parlamente entscheiden sowohl die Revision des BÜPF (&lt;b&gt;B&lt;/b&gt;undesgesetz betreffend die &lt;b&gt;Ü&lt;/b&gt;berwachung des &lt;b&gt;P&lt;/b&gt;ost- und &lt;b&gt;F&lt;/b&gt;ernmeldeverkehrs) als auch das NDG (&lt;b&gt;N&lt;/b&gt;achrichten&lt;b&gt;d&lt;/b&gt;ienst&lt;b&gt;g&lt;/b&gt;esetz).
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7205.html
</itunes:summary>
      <itunes:duration>00:47:45</itunes:duration>
    </item>
    <item>
      <title>Lifting the Fog on Red Star OS (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7174-lifting_the_fog_on_red_star_os</link>
      <description>Angae means &quot;Fog&quot; in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea&#39;s operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7174.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7174-en-de-Lifting_the_Fog_on_Red_Star_OS_hd.mp4"
        length="546308096"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7174-en-de-Lifting_the_Fog_on_Red_Star_OS_hd.mp4?1451353151</guid>
      <dc:identifier>1d7d4787-c77a-4e6e-9398-f3b4dcaa3587</dc:identifier>
      <dc:date>2015-12-27T16:00:00+01:00</dc:date>
      <itunes:author>Florian Grunow, Niklaus Schiess</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>A deep dive into the surveillance features of North Korea&#39;s operating system</itunes:subtitle>
      <itunes:summary>Angae means &quot;Fog&quot; in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea&#39;s operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7174.html
</itunes:summary>
      <itunes:duration>00:56:51</itunes:duration>
    </item>
    <item>
      <title>Key-logger, Video, Mouse (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7189-key-logger_video_mouse</link>
      <description>Key-Loggers are cool, really cool. It seems, however, that every conceivable aspect of key-logging has already been covered: from physical devices to hooking techniques. What possible innovation could be left in this field?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7189.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7189-en-Key-logger_Video_Mouse_hd.mp4"
        length="488636416"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7189-en-Key-logger_Video_Mouse_hd.mp4?1451353214</guid>
      <dc:identifier>dda07b64-844a-4a54-8135-8c03f7ee6718</dc:identifier>
      <dc:date>2015-12-27T17:15:00+01:00</dc:date>
      <itunes:author>Yaniv Balmas</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>How to turn your KVM into a raging key-logging monster</itunes:subtitle>
      <itunes:summary>Key-Loggers are cool, really cool. It seems, however, that every conceivable aspect of key-logging has already been covered: from physical devices to hooking techniques. What possible innovation could be left in this field?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7189.html
</itunes:summary>
      <itunes:duration>00:49:42</itunes:duration>
    </item>
    <item>
      <title>A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7139-a_free_and_open_source_verilog-to-bitstream_flow_for_ice40_fpgas</link>
      <description>Yosys (Yosys Open Synthesis Suite) is an Open Source Verilog synthesis and verification tool.

Project IceStorm aims at reverse engineering and documenting  the bit-stream format of Lattice iCE40 FPGAs and providing simple tools for analyzing and creating bit-stream files, including a tool that converts iCE40 bit-stream files into behavioral Verilog. Currently the bitstream format for iCE40 HX1K and HX8K is fully documented and supported by the tools.  

Arachne-PNR is an Open Source place&amp;route tool for iCE40 FPGAs based on the databases provided by Project IceStorm. It converts BLIF files into an ASCII file format that can be turned into a bit-stream by IceStorm tools.

This three projects together implement a complete open source tool-chain for iCE40 FPGAs. It is available now and it is feature complete (with the exception of timing analysis, which is work in progress).
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7139.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7139-en-A_Free_and_Open_Source_Verilog-to-Bitstream_Flow_for_iCE40_FPGAs.mp4"
        length="533725184"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7139-en-A_Free_and_Open_Source_Verilog-to-Bitstream_Flow_for_iCE40_FPGAs.mp4?1451353095</guid>
      <dc:identifier>fca4934b-5f01-4680-8cda-03fa206aac17</dc:identifier>
      <dc:date>2015-12-27T16:00:00+01:00</dc:date>
      <itunes:author>Clifford</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>Yosys (Yosys Open Synthesis Suite) is an Open Source Verilog synthesis and verification tool.

Project IceStorm aims at reverse engineering and documenting  the bit-stream format of Lattice iCE40 FPGAs and providing simple tools for analyzing and creating bit-stream files, including a tool that converts iCE40 bit-stream files into behavioral Verilog. Currently the bitstream format for iCE40 HX1K and HX8K is fully documented and supported by the tools.  

Arachne-PNR is an Open Source place&amp;route tool for iCE40 FPGAs based on the databases provided by Project IceStorm. It converts BLIF files into an ASCII file format that can be turned into a bit-stream by IceStorm tools.

This three projects together implement a complete open source tool-chain for iCE40 FPGAs. It is available now and it is feature complete (with the exception of timing analysis, which is work in progress).
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7139.html
</itunes:summary>
      <itunes:duration>00:59:29</itunes:duration>
    </item>
    <item>
      <title>Hardware-Trojaner in Security-Chips (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7146-hardware-trojaner_in_security-chips</link>
      <description>Dr. Peter Laackmann und Marcus Janke zeigen mit einem tiefen Einblick in die Welt der Hardware-Trojaner, auf welchem Wege „Institutionen“ versuchen können, sich versteckten Zugang zu Sicherheits-Hardware zu verschaffen.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7146.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7146-de-en-Hardware-Trojaner_in_Security-Chips_hd.mp4"
        length="342884352"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7146-de-en-Hardware-Trojaner_in_Security-Chips_hd.mp4?1451353185</guid>
      <dc:identifier>7430c969-7ccf-4d40-903a-d9b1ebb4fb15</dc:identifier>
      <dc:date>2015-12-27T16:00:00+01:00</dc:date>
      <itunes:author>Peter Laackmann, Marcus Janke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Eine Reise auf die dunkle Seite</itunes:subtitle>
      <itunes:summary>Dr. Peter Laackmann und Marcus Janke zeigen mit einem tiefen Einblick in die Welt der Hardware-Trojaner, auf welchem Wege „Institutionen“ versuchen können, sich versteckten Zugang zu Sicherheits-Hardware zu verschaffen.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7146.html
</itunes:summary>
      <itunes:duration>00:57:23</itunes:duration>
    </item>
    <item>
      <title>Internet Landscapes (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7538-internet_landscapes</link>
      <description>In Internet Landscapes, Evan Roth with discuss his work as it relates to visualizing, archiving and understanding the Internet and its effects on culture with a focus on the misuse of communication technologies. Roth will trace his personal and creative history within an Internet landscape that has changed significantly in the last 16 years. The presentation will include a range of work culminating in his more recent pilgrimages to the beaches of the UK, New Zealand and Sweden, where submarine Internet fiber optic cables reach the land. Armed with an array of paranormal technologies, Roth will recount his personal quest to visualize and reconnect with a changing Internet landscape. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7538.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7538-en-Internet_Landscapes_hd.mp4"
        length="717225984"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7538-en-Internet_Landscapes_hd.mp4?1451352892</guid>
      <dc:identifier>78ea005f-4ddb-44d1-82e5-a2825ddea4e1</dc:identifier>
      <dc:date>2015-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Evan Roth</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:summary>In Internet Landscapes, Evan Roth with discuss his work as it relates to visualizing, archiving and understanding the Internet and its effects on culture with a focus on the misuse of communication technologies. Roth will trace his personal and creative history within an Internet landscape that has changed significantly in the last 16 years. The presentation will include a range of work culminating in his more recent pilgrimages to the beaches of the UK, New Zealand and Sweden, where submarine Internet fiber optic cables reach the land. Armed with an array of paranormal technologies, Roth will recount his personal quest to visualize and reconnect with a changing Internet landscape. 
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7538.html
</itunes:summary>
      <itunes:duration>01:02:25</itunes:duration>
    </item>
    <item>
      <title>PLC-Blaster (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7229-plc-blaster</link>
      <description>Unser Vortrag demonstriert einen PLC-only Wurm. Der PLC-Wurm kann selbstständig ein Netzwerk nach Siemens Simatic S7-1200 Geräten in den Versionen 1 bis 3  durchsuchen und diese befallen.  Hierzu ist keine Unterstützung durch PCs oder Server erforderlich. Der Wurm „lebt“ ausschließlich in den PLCs.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7229.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7229-de-en-PLC-Blaster_hd.mp4"
        length="674234368"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7229-de-en-PLC-Blaster_hd.mp4?1451352950</guid>
      <dc:identifier>6ef3da22-6e38-4997-b44d-e279907be98d</dc:identifier>
      <dc:date>2015-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Maik Brüggemann, Ralf Spenneberg</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Ein Computerwurm für PLCs</itunes:subtitle>
      <itunes:summary>Unser Vortrag demonstriert einen PLC-only Wurm. Der PLC-Wurm kann selbstständig ein Netzwerk nach Siemens Simatic S7-1200 Geräten in den Versionen 1 bis 3  durchsuchen und diese befallen.  Hierzu ist keine Unterstützung durch PCs oder Server erforderlich. Der Wurm „lebt“ ausschließlich in den PLCs.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7229.html
</itunes:summary>
      <itunes:duration>00:58:34</itunes:duration>
    </item>
    <item>
      <title>The exhaust emissions scandal („Dieselgate“) (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7331-the_exhaust_emissions_scandal_dieselgate</link>
      <description>Analysis of the emission scandal shaking the German automotive industry from a procedural, organizational and technical level. Includes insight into cheating for advanced managers and code extraction from ECUs from Ebay. And from Volkswagen. Initially.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7331.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7331-en-The_exhaust_emissions_scandal_Dieselgate.mp4"
        length="522190848"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7331-en-The_exhaust_emissions_scandal_Dieselgate.mp4?1451353043</guid>
      <dc:identifier>3cb4101c-2042-4883-b6fb-6591994a70c0</dc:identifier>
      <dc:date>2015-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Daniel Lange (DLange), Felix &quot;tmbinc&quot; Domke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Take a deep breath into pollution trickery</itunes:subtitle>
      <itunes:summary>Analysis of the emission scandal shaking the German automotive industry from a procedural, organizational and technical level. Includes insight into cheating for advanced managers and code extraction from ECUs from Ebay. And from Volkswagen. Initially.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7331.html
</itunes:summary>
      <itunes:duration>01:05:10</itunes:duration>
    </item>
    <item>
      <title>rad1o++ (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7153-rad1o</link>
      <description>News about the rad1o half a year later – cool stuff that happened, and why you need an SDR.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7153.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7153-en-de-rad1o_hd.mp4"
        length="533725184"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7153-en-de-rad1o_hd.mp4?1451352994</guid>
      <dc:identifier>7d2e79be-5d42-425b-a335-c41fd18431fb</dc:identifier>
      <dc:date>2015-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Sec, schneider</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>half a year later</itunes:subtitle>
      <itunes:summary>News about the rad1o half a year later – cool stuff that happened, and why you need an SDR.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7153.html
</itunes:summary>
      <itunes:duration>00:58:22</itunes:duration>
    </item>
    <item>
      <title>Avoiding kernel panic: Europe’s biggest fails in digital policy-making (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7227-avoiding_kernel_panic_europe_s_biggest_fails_in_digital_policy-making</link>
      <description>In recent years, NGOs have been struggling to defend civil rights in Brussels. As human rights defenders, it is part of our job to detect failures in the EU’s digital policy-making. But we rarely have the opportunity to explore the underlying reasons and to debug Europe’s kernel package.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7227.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7227-en-Avoiding_kernel_panic_Europes_biggest_fails_in_digital_policy-making_hd.mp4"
        length="932184064"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7227-en-Avoiding_kernel_panic_Europes_biggest_fails_in_digital_policy-making_hd.mp4?1451352877</guid>
      <dc:identifier>a30bcf2c-1abf-4b7b-9554-a6dacbaeba52</dc:identifier>
      <dc:date>2015-12-27T12:45:00+01:00</dc:date>
      <itunes:author>Kirst3nF, Walter van Holst</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>How the institutions fuck up, and how we fuck it up as well</itunes:subtitle>
      <itunes:summary>In recent years, NGOs have been struggling to defend civil rights in Brussels. As human rights defenders, it is part of our job to detect failures in the EU’s digital policy-making. But we rarely have the opportunity to explore the underlying reasons and to debug Europe’s kernel package.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7227.html
</itunes:summary>
      <itunes:duration>01:01:00</itunes:duration>
    </item>
    <item>
      <title>Towards (reasonably) trustworthy x86 laptops (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7352-towards_reasonably_trustworthy_x86_laptops</link>
      <description>Can we build trustworthy client systems on x86 hardware? What are the main challenges? What can we do about them, realistically? Is there anything we can?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7352.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7352-en-de-Towards_reasonably_trustworthy_x86_laptops_hd.mp4"
        length="367001600"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7352-en-de-Towards_reasonably_trustworthy_x86_laptops_hd.mp4?1451352774</guid>
      <dc:identifier>fa0727ab-81a7-4197-bc7d-0ce5e9dc4526</dc:identifier>
      <dc:date>2015-12-27T12:45:00+01:00</dc:date>
      <itunes:author>Joanna Rutkowska</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Can we build trustworthy client systems on x86 hardware? What are the main challenges? What can we do about them, realistically? Is there anything we can?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7352.html
</itunes:summary>
      <itunes:duration>01:02:51</itunes:duration>
    </item>
    <item>
      <title>REXUS/BEXUS - Rocket and Balloon Experiments for University Students (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7325-rexus_bexus_-_rocket_and_balloon_experiments_for_university_students</link>
      <description>The REXUS/BEXUS programme allows students from universities and higher education colleges across Europe to carry out scientific and technological experiments on research rockets and balloons. Each year, two rockets and two balloons are launched, carrying up to 20 experiments designed and built by student teams.
By reference of two experiments we were involved in, we will explain the way from the experiment idea to the launch and test of it.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7325.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7325-en-REXUS_BEXUS_-_Rocket_and_Balloon_Experiments_for_University_Students.mp4"
        length="309329920"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7325-en-REXUS_BEXUS_-_Rocket_and_Balloon_Experiments_for_University_Students.mp4?1451352808</guid>
      <dc:identifier>3c818a0e-4148-4ba4-a58f-d2559e9d6a82</dc:identifier>
      <dc:date>2015-12-27T12:45:00+01:00</dc:date>
      <itunes:author>panic, sev</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>How to bring student experiments into space.</itunes:subtitle>
      <itunes:summary>The REXUS/BEXUS programme allows students from universities and higher education colleges across Europe to carry out scientific and technological experiments on research rockets and balloons. Each year, two rockets and two balloons are launched, carrying up to 20 experiments designed and built by student teams.
By reference of two experiments we were involved in, we will explain the way from the experiment idea to the launch and test of it.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7325.html
</itunes:summary>
      <itunes:duration>00:48:34</itunes:duration>
    </item>
    <item>
      <title>NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7228-nsa-untersuchungsausschuss_zwischen_aufklarungswillen_und_mauern_aus_schweigen</link>
      <description>&lt;p&gt;Im M&amp;auml;rz 2014 wurde der NSA-Untersuchungsausschuss im Bundestag eingesetzt, der die Verwicklungen um die deutschen Geheimdienste aufkl&amp;auml;ren soll. Ein R&amp;uuml;ck- und Ausblick: Was wissen wir heute, was erwartet uns noch?&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7228.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7228-de-en-NSA-Untersuchungsausschuss_Zwischen_Aufklaerungswillen_und_Mauern_aus_Schweigen_hd.mp4"
        length="498073600"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7228-de-en-NSA-Untersuchungsausschuss_Zwischen_Aufklaerungswillen_und_Mauern_aus_Schweigen_hd.mp4?1451352863</guid>
      <dc:identifier>0417a69e-87af-43f9-abbb-0f0666bfda3e</dc:identifier>
      <dc:date>2015-12-27T12:45:00+01:00</dc:date>
      <itunes:author>Anna Biselli</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics, NSA, BND, NSAUA</itunes:keywords>
      <itunes:summary>&lt;p&gt;Im M&amp;auml;rz 2014 wurde der NSA-Untersuchungsausschuss im Bundestag eingesetzt, der die Verwicklungen um die deutschen Geheimdienste aufkl&amp;auml;ren soll. Ein R&amp;uuml;ck- und Ausblick: Was wissen wir heute, was erwartet uns noch?&lt;/p&gt;
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7228.html
</itunes:summary>
      <itunes:duration>01:00:10</itunes:duration>
    </item>
    <item>
      <title>Hacking EU funding for a decentralizing FOSS project (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7300-hacking_eu_funding_for_a_decentralizing_foss_project</link>
      <description>FOSS and hacker culture meeting the EU buereaucracy.  What can possibly come out of that?  We&#39;ll discuss what is involved for FOSS projects and other interested parties to get $$$ funding by the European Union.  Hackers deal with rule systems and their execution.  And the European Union issues a lot of rules which are executed by the &quot;commission&quot; and its employees.  Within the Horizon2020 framework programme 80.000.000.000 Euros will be distributed towards research projects across Europe between 2014-2020.  Shouldn&#39;t some of that money go to purposes deemed useful by 32c3 attendants?

about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7300.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7300-en-de-Hacking_EU_funding_for_a_decentralizing_FOSS_project_hd.mp4"
        length="726663168"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7300-en-de-Hacking_EU_funding_for_a_decentralizing_FOSS_project_hd.mp4?1451352742</guid>
      <dc:identifier>3101dcca-7460-45e2-bdb1-c9f597eb462e</dc:identifier>
      <dc:date>2015-12-27T11:30:00+01:00</dc:date>
      <itunes:author>holger krekel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Understanding and adapting EU legal guidelines from a FOSS perspective</itunes:subtitle>
      <itunes:summary>FOSS and hacker culture meeting the EU buereaucracy.  What can possibly come out of that?  We&#39;ll discuss what is involved for FOSS projects and other interested parties to get $$$ funding by the European Union.  Hackers deal with rule systems and their execution.  And the European Union issues a lot of rules which are executed by the &quot;commission&quot; and its employees.  Within the Horizon2020 framework programme 80.000.000.000 Euros will be distributed towards research projects across Europe between 2014-2020.  Shouldn&#39;t some of that money go to purposes deemed useful by 32c3 attendants?

about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7300.html
</itunes:summary>
      <itunes:duration>00:59:43</itunes:duration>
    </item>
    <item>
      <title>32C3 Keynote (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7565-keynote</link>
      <description>
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7565.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7565-en-Keynote_hd.mp4"
        length="809500672"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7565-en-Keynote_hd.mp4?1451352687</guid>
      <dc:identifier>77a03013-82df-48f7-8c0f-65a9e9f23490</dc:identifier>
      <dc:date>2015-12-27T11:30:00+01:00</dc:date>
      <itunes:author>Fatuma Musa Afrah</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7565.html
</itunes:summary>
      <itunes:duration>00:59:43</itunes:duration>
    </item>
    <item>
      <title>32C3 Opening Event (32c3)</title>
      <link>https://media.ccc.de/v/32c3-7550-opening_event</link>
      <description>
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7550.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7550-en-Opening_Event_hd.mp4"
        length="217055232"
        type="video/mp4"/>
      <pubDate>Sun, 27 Dec 2015 11:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7550-en-Opening_Event_hd.mp4?1451352670</guid>
      <dc:identifier>654331ae-1710-42e5-bdf4-65a03a80c614</dc:identifier>
      <dc:date>2015-12-27T11:00:00+01:00</dc:date>
      <itunes:author>Carina Haupt, Linus Neumann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7550.html
</itunes:summary>
      <itunes:duration>00:17:07</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/congress/2015/32c3_logo.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from 32c3 as mp4</itunes:summary>
  </channel>
</rss>