<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - 33C3: works for me (high quality webm)</title>
    <link>https://media.ccc.de/c/33c3</link>
    <description> This feed contains all events from 33c3 as webm</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:45:46 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/congress/2016/folder.png</url>
      <title>Chaos Computer Club - 33C3: works for me (high quality webm)</title>
      <link>https://media.ccc.de/c/33c3</link>
    </image>
    <item>
      <title>JODI - Apache is functioning normally (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8444-jodi_-_apache_is_functioning_normally</link>
      <description>Joan Heemskerk and Dirk Paesmans, collectively known as JODI, are rightfully venerated for their countless contributions to art and technology, working as an artistic duo since the mid-90’s. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8444-eng-deu-JODI_-_Apache_is_functioning_normally_webm-hd.webm"
        length="554696704"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 00:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8444-eng-deu-JODI_-_Apache_is_functioning_normally_webm-hd.webm?1483831160</guid>
      <dc:identifier>babc1d56-c3b9-4a21-bfae-af4190c05e93</dc:identifier>
      <dc:date>2016-12-29T00:00:00+01:00</dc:date>
      <itunes:author>DI, JO</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>33c3, 8444</itunes:keywords>
      <itunes:subtitle>A net.art collective since 1995. Understanding the browser as a canvas for art.</itunes:subtitle>
      <itunes:summary>Joan Heemskerk and Dirk Paesmans, collectively known as JODI, are rightfully venerated for their countless contributions to art and technology, working as an artistic duo since the mid-90’s. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:31:51</itunes:duration>
    </item>
    <item>
      <title>CCC-Jahresrückblick 2016 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8401-ccc-jahresruckblick_2016</link>
      <description>Wir werden einen Überblick über die Themen geben, die den Chaos Computer Club 2016 beschäftigt haben. Neben der Zusammenfassung und der Rückschau auf das vergangene Jahr wollen wir einen Blick in die Zukunft wagen.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8401-deu-eng-fra-CCC-Jahresrueckblick_2016_webm-hd.webm"
        length="1613758464"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 00:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8401-deu-eng-fra-CCC-Jahresrueckblick_2016_webm-hd.webm?1483787923</guid>
      <dc:identifier>0c197c9a-35eb-4780-a38d-9c53b7ff9bea</dc:identifier>
      <dc:date>2016-12-29T00:00:00+01:00</dc:date>
      <itunes:author>frank, Linus Neumann, Constanze Kurz, nexus</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>33c3, 8401</itunes:keywords>
      <itunes:summary>Wir werden einen Überblick über die Themen geben, die den Chaos Computer Club 2016 beschäftigt haben. Neben der Zusammenfassung und der Rückschau auf das vergangene Jahr wollen wir einen Blick in die Zukunft wagen.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>02:16:09</itunes:duration>
    </item>
    <item>
      <title>State of Internet Censorship 2016 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8068-state_of_internet_censorship_2016</link>
      <description>2016 has been marked by major shifts in political policy towards the Internet in Turkey and Thailand, a renegotiation of the responsibilities of content platforms in the west, and a continued struggle for control over the Internet around the world. Turbulent times, indeed. In this session, we&#39;ll survey what&#39;s changed in Internet surveillance and censorship in the last year, and provide context for the major changes affecting the net today.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8068-eng-deu-State_of_Internet_Censorship_2016_webm-hd.webm"
        length="550502400"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 00:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8068-eng-deu-State_of_Internet_Censorship_2016_webm-hd.webm?1483787842</guid>
      <dc:identifier>2b9b6095-9dcd-49f3-9792-cf74aab88b16</dc:identifier>
      <dc:date>2016-12-28T00:00:00+01:00</dc:date>
      <itunes:author>Will Scott, Philipp Winter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>33c3, 8068</itunes:keywords>
      <itunes:summary>2016 has been marked by major shifts in political policy towards the Internet in Turkey and Thailand, a renegotiation of the responsibilities of content platforms in the west, and a continued struggle for control over the Internet around the world. Turbulent times, indeed. In this session, we&#39;ll survey what&#39;s changed in Internet surveillance and censorship in the last year, and provide context for the major changes affecting the net today.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:56:40</itunes:duration>
    </item>
    <item>
      <title>33C3 Closing Ceremony (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8428-33c3_closing_ceremony</link>
      <description>
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8428.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8428-deu-eng-fra-33C3_Closing_Ceremony_webm-hd.webm"
        length="849346560"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8428-deu-eng-fra-33C3_Closing_Ceremony_webm-hd.webm?1483236700</guid>
      <dc:identifier>b1a28d62-75e9-48de-bec9-44df4e611685</dc:identifier>
      <dc:date>2016-12-30T18:30:00+01:00</dc:date>
      <itunes:author>Nicolas Wöhrl, Reinhard Remfort</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8428.html
</itunes:summary>
      <itunes:duration>00:46:36</itunes:duration>
    </item>
    <item>
      <title>Surveilling the surveillers (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7978-surveilling_the_surveillers</link>
      <description>In the last years, technology-savvy artists and technologists have taken over the art world with works addressing current societal and political issues. Their works are located at the intersection between art, technology and activism and are dealing with a variety of problems like free speech, freedom of movement, military and governmental power, corporate and governmental surveillance to name just a few. This talk will present relevant works in this field and will draw connections between critical art and regulatory power, warfare, surveillance, electronic waste, electronic self-defense and the re-appropriation of architectural and technological artifacts in militant ways.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7978.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7978-eng-deu-fra-Surveilling_the_surveillers_webm-hd.webm"
        length="433061888"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7978-eng-deu-fra-Surveilling_the_surveillers_webm-hd.webm?1483236390</guid>
      <dc:identifier>8fbee7ff-b50c-4310-af9d-d44794669f25</dc:identifier>
      <dc:date>2016-12-30T17:15:00+01:00</dc:date>
      <itunes:author>mare</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>About military RF communication surveillance and other activist art &amp; technology projects</itunes:subtitle>
      <itunes:summary>In the last years, technology-savvy artists and technologists have taken over the art world with works addressing current societal and political issues. Their works are located at the intersection between art, technology and activism and are dealing with a variety of problems like free speech, freedom of movement, military and governmental power, corporate and governmental surveillance to name just a few. This talk will present relevant works in this field and will draw connections between critical art and regulatory power, warfare, surveillance, electronic waste, electronic self-defense and the re-appropriation of architectural and technological artifacts in militant ways.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7978.html
</itunes:summary>
      <itunes:duration>00:53:42</itunes:duration>
    </item>
    <item>
      <title>Security Nightmares 0x11 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8413-security_nightmares_0x11</link>
      <description>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8413.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8413-deu-eng-Security_Nightmares_0x11_webm-hd.webm"
        length="636485632"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8413-deu-eng-Security_Nightmares_0x11_webm-hd.webm?1483235806</guid>
      <dc:identifier>25e2df7d-5740-4c2f-bc34-986326d606fe</dc:identifier>
      <dc:date>2016-12-30T17:15:00+01:00</dc:date>
      <itunes:author>frank, Ron</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8413.html
</itunes:summary>
      <itunes:duration>01:10:03</itunes:duration>
    </item>
    <item>
      <title>33C3 Infrastructure Review (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8243-33c3_infrastructure_review</link>
      <description>NOC, POC, VOC and QOC show interesting facts and figures as an excuse to present all the mischief they’ve been up to this year.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8243.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8243-eng-deu-33C3_Infrastructure_Review_webm-hd.webm"
        length="837812224"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8243-eng-deu-33C3_Infrastructure_Review_webm-hd.webm?1483235990</guid>
      <dc:identifier>b598ebbf-0fc6-4127-bb9d-20ae18f1171d</dc:identifier>
      <dc:date>2016-12-30T16:00:00+01:00</dc:date>
      <itunes:author>Leon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:subtitle>The usual extremely factual look behind the scenes of this event</itunes:subtitle>
      <itunes:summary>NOC, POC, VOC and QOC show interesting facts and figures as an excuse to present all the mischief they’ve been up to this year.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8243.html
</itunes:summary>
      <itunes:duration>01:02:10</itunes:duration>
    </item>
    <item>
      <title>The Ultimate Game Boy Talk (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8029-the_ultimate_game_boy_talk</link>
      <description>The 8-bit Game Boy was sold between 1989 and 2003, but its architecture more closely resembles machines from the early 1980s, like the Commodore 64 or the NES. This talk attempts to communicate &quot;everything about the Game Boy&quot; to the listener, including its internals and quirks, as well as the tricks that have been used by games and modern demos, reviving once more the spirit of times when programmers counted clock cycles and hardware limitations were seen as a challenge.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8029.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8029-eng-deu-fra-The_Ultimate_Game_Boy_Talk_webm-hd.webm"
        length="638582784"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8029-eng-deu-fra-The_Ultimate_Game_Boy_Talk_webm-hd.webm?1483235895</guid>
      <dc:identifier>1c75e6a1-e586-4b91-abce-92a4561d0181</dc:identifier>
      <dc:date>2016-12-30T16:00:00+01:00</dc:date>
      <itunes:author>Michael Steil</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>The 8-bit Game Boy was sold between 1989 and 2003, but its architecture more closely resembles machines from the early 1980s, like the Commodore 64 or the NES. This talk attempts to communicate &quot;everything about the Game Boy&quot; to the listener, including its internals and quirks, as well as the tricks that have been used by games and modern demos, reviving once more the spirit of times when programmers counted clock cycles and hardware limitations were seen as a challenge.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8029.html
</itunes:summary>
      <itunes:duration>01:01:06</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 4 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8089-lightning_talks_day_4</link>
      <description>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8089.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8089-eng-deu-Lightning_Talks_Day_4_webm-hd.webm"
        length="872415232"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8089-eng-deu-Lightning_Talks_Day_4_webm-hd.webm?1483235510</guid>
      <dc:identifier>c6decee9-310c-40b9-90af-5937df22e1aa</dc:identifier>
      <dc:date>2016-12-30T12:45:00+01:00</dc:date>
      <itunes:author>gedsic, bigalex</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:subtitle>Lightning Talks</itunes:subtitle>
      <itunes:summary>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8089.html
</itunes:summary>
      <itunes:duration>01:49:47</itunes:duration>
    </item>
    <item>
      <title>Virtual Secure Boot (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8142-virtual_secure_boot</link>
      <description>Over the last two years secure boot support for virtual machines was added to qemu, kvm (linux kernel) and ovmf (edk2/tianocore).  This talk covers the implementation details and the issues we had to deal with along the way.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8142.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8142-eng-deu-Virtual_Secure_Boot_webm-hd.webm"
        length="478150656"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8142-eng-deu-Virtual_Secure_Boot_webm-hd.webm?1483236561</guid>
      <dc:identifier>14590762-b249-463b-9617-46d0f0d3f5b3</dc:identifier>
      <dc:date>2016-12-30T16:00:00+01:00</dc:date>
      <itunes:author>Gerd Hoffmann</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Secure Boot support in qemu, kvm and ovmf.</itunes:subtitle>
      <itunes:summary>Over the last two years secure boot support for virtual machines was added to qemu, kvm (linux kernel) and ovmf (edk2/tianocore).  This talk covers the implementation details and the issues we had to deal with along the way.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8142.html
</itunes:summary>
      <itunes:duration>00:51:44</itunes:duration>
    </item>
    <item>
      <title>Understanding the Snooper’s Charter (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8287-understanding_the_snooper_s_charter</link>
      <description>The ‚Investigative Powers Bill‘ is about to become law in the UK. Its provisions, from looking up Internet connection records without a warrant to forcing communication service providers to assist with interception and decryption of data, have caused an outcry in the Western world. But how and why did British politics get here? And, most importantly of all: How could we fight back?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8287.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8287-eng-deu-Understanding_the_Snoopers_Charter_webm-hd.webm"
        length="637534208"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 14:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8287-eng-deu-Understanding_the_Snoopers_Charter_webm-hd.webm?1483123938</guid>
      <dc:identifier>9d6db804-1074-4116-8210-cca78b335a1a</dc:identifier>
      <dc:date>2016-12-30T14:30:00+01:00</dc:date>
      <itunes:author>Hendrik Obelöer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Theresa May’s effort to abolish privacy</itunes:subtitle>
      <itunes:summary>The ‚Investigative Powers Bill‘ is about to become law in the UK. Its provisions, from looking up Internet connection records without a warrant to forcing communication service providers to assist with interception and decryption of data, have caused an outcry in the Western world. But how and why did British politics get here? And, most importantly of all: How could we fight back?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8287.html
</itunes:summary>
      <itunes:duration>00:36:49</itunes:duration>
    </item>
    <item>
      <title>Privatisierung der Rechtsdurchsetzung (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8040-privatisierung_der_rechtsdurchsetzung</link>
      <description>2016 drehte der Anti-Terror-Kampf in der EU auf. Nicht nur im Rahmen der Anti-Terror-Richtlinie wurde über neue Wege diskutiert, wie man das Netz verstärkt unter Kontrolle bringen kann.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8040.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8040-deu-eng-Privatisierung_der_Rechtsdurchsetzung_webm-hd.webm"
        length="279969792"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 14:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8040-deu-eng-Privatisierung_der_Rechtsdurchsetzung_webm-hd.webm?1483124489</guid>
      <dc:identifier>6796635e-2dd6-4f91-8f23-ba1bea7e2994</dc:identifier>
      <dc:date>2016-12-30T14:30:00+01:00</dc:date>
      <itunes:author>Markus Beckedahl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Was der Anti-Terror-Kampf von der Urheberrechtsdurchsetzung lernen kann</itunes:subtitle>
      <itunes:summary>2016 drehte der Anti-Terror-Kampf in der EU auf. Nicht nur im Rahmen der Anti-Terror-Richtlinie wurde über neue Wege diskutiert, wie man das Netz verstärkt unter Kontrolle bringen kann.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8040.html
</itunes:summary>
      <itunes:duration>00:36:07</itunes:duration>
    </item>
    <item>
      <title>Warum in die Ferne schweifen, wenn das Ausland liegt so nah? (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8445-warum_in_die_ferne_schweifen_wenn_das_ausland_liegt_so_nah</link>
      <description>Der Vortrag stellt die in Deutschland zulässigen Überwachungsmaßnahmen des Internetverkehrs aus rechtlicher und operativer Sicht dar und versucht, die sich aus den Erkenntnissen des NSA-Untersuchungsausschusses ergebenden Fragen auf die gelebte Praxis anzuwenden.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8445.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8445-deu-eng-Warum_in_die_Ferne_schweifen_wenn_das_Ausland_liegt_so_nah_webm-hd.webm"
        length="593494016"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 14:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8445-deu-eng-Warum_in_die_Ferne_schweifen_wenn_das_Ausland_liegt_so_nah_webm-hd.webm?1483126353</guid>
      <dc:identifier>2bdf3de1-417b-4a5a-b31e-4701a921fb5c</dc:identifier>
      <dc:date>2016-12-30T14:30:00+01:00</dc:date>
      <itunes:author>Klaus Landefeld</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Erinnerungen aus dem virtuellen Ausland in Frankfurt, Germany</itunes:subtitle>
      <itunes:summary>Der Vortrag stellt die in Deutschland zulässigen Überwachungsmaßnahmen des Internetverkehrs aus rechtlicher und operativer Sicht dar und versucht, die sich aus den Erkenntnissen des NSA-Untersuchungsausschusses ergebenden Fragen auf die gelebte Praxis anzuwenden.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8445.html
</itunes:summary>
      <itunes:duration>01:00:39</itunes:duration>
    </item>
    <item>
      <title>The Transhumanist Paradox (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8064-the_transhumanist_paradox</link>
      <description>How does a pluralist society – a society built to accommodate our irreconcilable differences – make a choice about the technological future of mankind? How can a liberal state dedicated to upholding individual liberty interfere in technological progress, and why should it? 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8064.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8064-eng-deu-The_Transhumanist_Paradox_webm-hd.webm"
        length="346030080"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 13:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8064-eng-deu-The_Transhumanist_Paradox_webm-hd.webm?1483115870</guid>
      <dc:identifier>fc56c971-c65e-43ca-a92c-d98c7fb47bd6</dc:identifier>
      <dc:date>2016-12-30T13:45:00+01:00</dc:date>
      <itunes:author>Xavier Flory</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Deciding between technological utopias in a liberal state</itunes:subtitle>
      <itunes:summary>How does a pluralist society – a society built to accommodate our irreconcilable differences – make a choice about the technological future of mankind? How can a liberal state dedicated to upholding individual liberty interfere in technological progress, and why should it? 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8064.html
</itunes:summary>
      <itunes:duration>00:33:30</itunes:duration>
    </item>
    <item>
      <title>Datenschutzgrundverordnung: Rechte für Menschen, Pflichten für Firmen &amp; Chancen für uns (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8092-datenschutzgrundverordnung_rechte_fur_menschen_pflichten_fur_firmen_chancen_fur_uns</link>
      <description>Ziel des Vortrages ist es, einen Überblick über die neuen aus der Datenschutzgrundverordnung entstehenden Rechte von Betroffenen (also Du mein*e junge*r Jedi) zu geben und dabei aufzuzeigen, an welchen Stellen Musik für uns drin sein kann.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8092.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8092-deu-eng-Datenschutzgrundverordnung_Rechte_fuer_Menschen_Pflichten_fuer_Firmen_Chancen_fuer_uns_webm-hd.webm"
        length="271581184"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 13:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8092-deu-eng-Datenschutzgrundverordnung_Rechte_fuer_Menschen_Pflichten_fuer_Firmen_Chancen_fuer_uns_webm-hd.webm?1483112821</guid>
      <dc:identifier>3226a81b-dd11-42cc-8c14-ae9f95c01bbd</dc:identifier>
      <dc:date>2016-12-30T13:45:00+01:00</dc:date>
      <itunes:author>derPUPE</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Schärft das Schwert der Transparenz!</itunes:subtitle>
      <itunes:summary>Ziel des Vortrages ist es, einen Überblick über die neuen aus der Datenschutzgrundverordnung entstehenden Rechte von Betroffenen (also Du mein*e junge*r Jedi) zu geben und dabei aufzuzeigen, an welchen Stellen Musik für uns drin sein kann.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8092.html
</itunes:summary>
      <itunes:duration>00:31:43</itunes:duration>
    </item>
    <item>
      <title>Rebel Cities (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8248-rebel_cities</link>
      <description>Cities are emerging as a space for local action and local change but also as dangerous spaces where social engineering, exclusion by design and privatised policing take place rapidly, without adequate frames to catch up and assure fundamental rights. Is the city the answer to a new digital ecosystem, with effective mechanisms to enforce it, in the local government powers?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8248.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8248-eng-deu-fra-Rebel_Cities_webm-hd.webm"
        length="320864256"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 13:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8248-eng-deu-fra-Rebel_Cities_webm-hd.webm?1483115815</guid>
      <dc:identifier>bc9fff95-ca0f-4448-9c4c-875609353da7</dc:identifier>
      <dc:date>2016-12-30T13:45:00+01:00</dc:date>
      <itunes:author>renataavila</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Towards A Global Network Of Neighbourhoods And Cities Rejecting Surveillance</itunes:subtitle>
      <itunes:summary>Cities are emerging as a space for local action and local change but also as dangerous spaces where social engineering, exclusion by design and privatised policing take place rapidly, without adequate frames to catch up and assure fundamental rights. Is the city the answer to a new digital ecosystem, with effective mechanisms to enforce it, in the local government powers?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8248.html
</itunes:summary>
      <itunes:duration>00:33:18</itunes:duration>
    </item>
    <item>
      <title>Beyond Virtual and Augmented Reality (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8225-beyond_virtual_and_augmented_reality</link>
      <description>With recent development in capture technology, preserving one&#39;s’ daily experiences and one&#39;s’ knowledge becomes richer and more comprehensive. Furthermore, new recording technologies beyond simple audio/video recordings become available: 360° videos, tactile recorders and even odor recorders are becoming available. . The new recording technology and the massive amounts of data require new means for selecting, displaying and sharing experiences. 


about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8225.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8225-eng-deu-spa-Beyond_Virtual_and_Augmented_Reality_webm-hd.webm"
        length="401604608"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 12:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8225-eng-deu-spa-Beyond_Virtual_and_Augmented_Reality_webm-hd.webm?1483112747</guid>
      <dc:identifier>e26852ae-9efe-47a0-9e65-3bbd120f7422</dc:identifier>
      <dc:date>2016-12-30T12:15:00+01:00</dc:date>
      <itunes:author>Kai Kunze</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>From Superhuman Sports to Amplifying Human Senses</itunes:subtitle>
      <itunes:summary>With recent development in capture technology, preserving one&#39;s’ daily experiences and one&#39;s’ knowledge becomes richer and more comprehensive. Furthermore, new recording technologies beyond simple audio/video recordings become available: 360° videos, tactile recorders and even odor recorders are becoming available. . The new recording technology and the massive amounts of data require new means for selecting, displaying and sharing experiences. 


about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8225.html
</itunes:summary>
      <itunes:duration>00:33:45</itunes:duration>
    </item>
    <item>
      <title>Genetic Codes and what they tell us – and everyone else (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8221-genetic_codes_and_what_they_tell_us_and_everyone_else</link>
      <description>The genome – the final frontier – or just a complex mess of letters? Somewhere in there, our eye or skin color is hidden. But also, diseases can be diagnosed or predicted by analyzing the genome. More and more research is committed to finding clues for diseases in our genes. The opportunity is clear: If I know about a disease I might get ahead of time, I could possibly intervene before it starts. Yet: How accurate are these predictions and how meaningful are they? And more importantly: What happens to my genetic data once it has been decoded?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8221.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8221-eng-deu-spa-Genetic_Codes_and_what_they_tell_us_-_and_everyone_else_webm-hd.webm"
        length="246415360"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 13:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8221-eng-deu-spa-Genetic_Codes_and_what_they_tell_us_-_and_everyone_else_webm-hd.webm?1483110949</guid>
      <dc:identifier>09eb4f7a-8cf0-436f-aaa4-88190ee26e6d</dc:identifier>
      <dc:date>2016-12-30T13:00:00+01:00</dc:date>
      <itunes:author>_Adora_Belle_</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>The genome – the final frontier – or just a complex mess of letters? Somewhere in there, our eye or skin color is hidden. But also, diseases can be diagnosed or predicted by analyzing the genome. More and more research is committed to finding clues for diseases in our genes. The opportunity is clear: If I know about a disease I might get ahead of time, I could possibly intervene before it starts. Yet: How accurate are these predictions and how meaningful are they? And more importantly: What happens to my genetic data once it has been decoded?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8221.html
</itunes:summary>
      <itunes:duration>00:32:47</itunes:duration>
    </item>
    <item>
      <title>Retail Surveillance / Retail Countersurveillance (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8238-retail_surveillance_retail_countersurveillance</link>
      <description>From geo-magnetic tracking for smartphones to facial recognition for email marketing, from physical shopping cart fingerprinting to computer vision algorithms that use your clothing as metadata, this talk will explore the emerging landscape of hyper-competitive retail surveillance. Instead of dramatizing these technologies which can lead to calcification and normalization, the aim of this talk is to energize discourse around building creative solutions to counter, adapt to, or rethink emerging surveillance technologies.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8238.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8238-eng-deu-fra-Retail_Surveillance_Retail_Countersurveillance_webm-hd.webm"
        length="254803968"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 13:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8238-eng-deu-fra-Retail_Surveillance_Retail_Countersurveillance_webm-hd.webm?1483109698</guid>
      <dc:identifier>fc6c53de-ec9d-4966-a912-5cfaf54c0dd2</dc:identifier>
      <dc:date>2016-12-30T13:00:00+01:00</dc:date>
      <itunes:author>Adam Harvey</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>50 most unwanted retail surveillance technologies / 50 most wanted countersurveillance technologies</itunes:subtitle>
      <itunes:summary>From geo-magnetic tracking for smartphones to facial recognition for email marketing, from physical shopping cart fingerprinting to computer vision algorithms that use your clothing as metadata, this talk will explore the emerging landscape of hyper-competitive retail surveillance. Instead of dramatizing these technologies which can lead to calcification and normalization, the aim of this talk is to energize discourse around building creative solutions to counter, adapt to, or rethink emerging surveillance technologies.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8238.html
</itunes:summary>
      <itunes:duration>00:33:12</itunes:duration>
    </item>
    <item>
      <title>Community (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8404-community</link>
      <description>Mitch Altman (born December 22, 1956) is a San Francisco-based hacker and inventor, best known for inventing TV-B-Gone, as featured speaker at hacker conferences, as international expert on the hackerspace movement, and for teaching introductory electronics workshops. He is also Chief Scientist and CEO of Cornfield Electronics.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8404.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8404-eng-deu-Community_webm-hd.webm"
        length="668991488"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8404-eng-deu-Community_webm-hd.webm?1483113458</guid>
      <dc:identifier>88cc14c0-8962-4906-9b37-06ff82ce159c</dc:identifier>
      <dc:date>2016-12-30T11:30:00+01:00</dc:date>
      <itunes:author>Mitch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Social Life &amp; Life in the early 21st century</itunes:subtitle>
      <itunes:summary>Mitch Altman (born December 22, 1956) is a San Francisco-based hacker and inventor, best known for inventing TV-B-Gone, as featured speaker at hacker conferences, as international expert on the hackerspace movement, and for teaching introductory electronics workshops. He is also Chief Scientist and CEO of Cornfield Electronics.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8404.html
</itunes:summary>
      <itunes:duration>01:02:22</itunes:duration>
    </item>
    <item>
      <title>The High Priests of the Digital Age (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8324-the_high_priests_of_the_digital_age</link>
      <description>The High Priests of the Digital Age Are Working Behind Your Back to Make You Confess, and Repent.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8324.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8324-eng-deu-fra-The_High_Priests_of_the_Digital_Age_webm-hd.webm"
        length="328204288"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 12:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8324-eng-deu-fra-The_High_Priests_of_the_Digital_Age_webm-hd.webm?1483108557</guid>
      <dc:identifier>97570300-6590-45c9-a477-ab629f92a3b1</dc:identifier>
      <dc:date>2016-12-30T12:15:00+01:00</dc:date>
      <itunes:author>catchthewhistle</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>The High Priests of the Digital Age Are Working Behind Your Back to Make You Confess, and Repent.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8324.html
</itunes:summary>
      <itunes:duration>00:32:13</itunes:duration>
    </item>
    <item>
      <title>The Economic Consequences of Internet Censorship (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8170-the_economic_consequences_of_internet_censorship</link>
      <description>Internet censorship today is widespread, both by governments and by private entities. Much of the discussion so far has focused on political and social effects of this censorship. However, censorship also has a clear effect on the economic structure of society that has not been explored.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8170.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8170-eng-deu-fra-The_Economic_Consequences_of_Internet_Censorship_webm-hd.webm"
        length="203423744"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8170-eng-deu-fra-The_Economic_Consequences_of_Internet_Censorship_webm-hd.webm?1483106546</guid>
      <dc:identifier>9039efe4-3282-47d2-a0b5-630843e23304</dc:identifier>
      <dc:date>2016-12-30T11:30:00+01:00</dc:date>
      <itunes:author>Toni</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Why Censorship is a Bad Idea for Everyone</itunes:subtitle>
      <itunes:summary>Internet censorship today is widespread, both by governments and by private entities. Much of the discussion so far has focused on political and social effects of this censorship. However, censorship also has a clear effect on the economic structure of society that has not been explored.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8170.html
</itunes:summary>
      <itunes:duration>00:31:07</itunes:duration>
    </item>
    <item>
      <title>On Smart Cities, Smart Energy, And Dumb Security (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8272-on_smart_cities_smart_energy_and_dumb_security</link>
      <description>Smart City is an abstract concept everyone talks about but no one knows what it actually means. No one, except Energy utilities.
In this talk we will explore the vast world of Smart Energy, and see how energy providers used the &quot;Smart City&quot; concept to get better control over our energy consumption, all while almost completely ignoring security aspects along the way.
Join me and see how Smart Energy is making our lives a little bit better, but also dangerously insecure.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8272.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8272-eng-deu-fra-On_Smart_Cities_Smart_Energy_And_Dumb_Security_webm-hd.webm"
        length="430964736"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8272-eng-deu-fra-On_Smart_Cities_Smart_Energy_And_Dumb_Security_webm-hd.webm?1483098310</guid>
      <dc:identifier>7a5971c8-746b-4450-ba89-6569667f77c2</dc:identifier>
      <dc:date>2016-12-29T12:45:00+01:00</dc:date>
      <itunes:author>Netanel Rubin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Smart City is an abstract concept everyone talks about but no one knows what it actually means. No one, except Energy utilities.
In this talk we will explore the vast world of Smart Energy, and see how energy providers used the &quot;Smart City&quot; concept to get better control over our energy consumption, all while almost completely ignoring security aspects along the way.
Join me and see how Smart Energy is making our lives a little bit better, but also dangerously insecure.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8272.html
</itunes:summary>
      <itunes:duration>00:45:55</itunes:duration>
    </item>
    <item>
      <title>The Zcash anonymous cryptocurrency (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8330-the_zcash_anonymous_cryptocurrency</link>
      <description>Zcash is the third iteration of an extension to the Bitcoin protocol that provides true untraceability, i.e. fully anonymous transactions. It is arguably the first serious attempt to establish this extension, in the form of its own blockchain, beyond the form of an academic proposal. The talk provides an introduction to the magic that makes it work.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8330.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8330-eng-deu-fra-The_Zcash_anonymous_cryptocurrency_webm-hd.webm"
        length="261095424"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8330-eng-deu-fra-The_Zcash_anonymous_cryptocurrency_webm-hd.webm?1483106383</guid>
      <dc:identifier>725b4ff6-8d4c-4d8f-9e38-6b1e49e1602c</dc:identifier>
      <dc:date>2016-12-29T23:30:00+01:00</dc:date>
      <itunes:author>pesco</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>or zero-knowledge succinct non-interactive arguments of knowledge for laypeople</itunes:subtitle>
      <itunes:summary>Zcash is the third iteration of an extension to the Bitcoin protocol that provides true untraceability, i.e. fully anonymous transactions. It is arguably the first serious attempt to establish this extension, in the form of its own blockchain, beyond the form of an academic proposal. The talk provides an introduction to the magic that makes it work.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8330.html
</itunes:summary>
      <itunes:duration>00:31:09</itunes:duration>
    </item>
    <item>
      <title>Ethics in the data society (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8214-ethics_in_the_data_society</link>
      <description>This talk presents the idea that ethics as logic that can be programmed into machines doesn’t seem to work; perhaps, ethics is something else. This talk is about what that something else may be – power. (This talk is not about the Trolley Problem! But it will mention why it shouldn’t apply to the driverless car.)
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8214.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8214-eng-deu-Ethics_in_the_data_society_webm-hd.webm"
        length="289406976"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8214-eng-deu-Ethics_in_the_data_society_webm-hd.webm?1483098110</guid>
      <dc:identifier>562ced0e-1be5-4912-b9a1-d79709ad324a</dc:identifier>
      <dc:date>2016-12-29T23:30:00+01:00</dc:date>
      <itunes:author>mayameme</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Power and politics in the development of the driverless car</itunes:subtitle>
      <itunes:summary>This talk presents the idea that ethics as logic that can be programmed into machines doesn’t seem to work; perhaps, ethics is something else. This talk is about what that something else may be – power. (This talk is not about the Trolley Problem! But it will mention why it shouldn’t apply to the driverless car.)
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8214.html
</itunes:summary>
      <itunes:duration>00:35:13</itunes:duration>
    </item>
    <item>
      <title>The Universe Is, Like, Seriously Huge (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7861-the_universe_is_like_seriously_huge</link>
      <description>Astronomers struggle to accurately measure distances in the vastness of the known universe. Get an insight into the sophisticated techniques and dirty tricks of today&#39;s astrophysics and cosmology. No physics background required, featuring lots of pretty space pictures.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7861.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7861-eng-deu-spa-The_Universe_Is_Like_Seriously_Huge_webm-hd.webm"
        length="342884352"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7861-eng-deu-spa-The_Universe_Is_Like_Seriously_Huge_webm-hd.webm?1483106452</guid>
      <dc:identifier>61677c86-8d83-4c30-9cf4-f7741e1a8798</dc:identifier>
      <dc:date>2016-12-29T23:30:00+01:00</dc:date>
      <itunes:author>Michael Büker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Space</itunes:keywords>
      <itunes:subtitle>Stuff in Space Is Far Away – but How Do We Know?</itunes:subtitle>
      <itunes:summary>Astronomers struggle to accurately measure distances in the vastness of the known universe. Get an insight into the sophisticated techniques and dirty tricks of today&#39;s astrophysics and cosmology. No physics background required, featuring lots of pretty space pictures.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7861.html
</itunes:summary>
      <itunes:duration>00:32:45</itunes:duration>
    </item>
    <item>
      <title>Hebocon (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8270-hebocon</link>
      <description>Join with your derpy bot to fight your nemesis! Push it off the table or knock the enemy over. No weapons. No advanced controllers. No tears. Don&#39;t take it serious. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8270.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8270-eng-deu-Hebocon_webm-hd.webm"
        length="678428672"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8270-eng-deu-Hebocon_webm-hd.webm?1483097848</guid>
      <dc:identifier>fc64467a-cfb3-40ea-a335-4289aef4d06b</dc:identifier>
      <dc:date>2016-12-29T23:30:00+01:00</dc:date>
      <itunes:author>Konfusius</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:subtitle>A sumo style robot battle for intentionally crappy robots!</itunes:subtitle>
      <itunes:summary>Join with your derpy bot to fight your nemesis! Push it off the table or knock the enemy over. No weapons. No advanced controllers. No tears. Don&#39;t take it serious. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8270.html
</itunes:summary>
      <itunes:duration>00:23:26</itunes:duration>
    </item>
    <item>
      <title>Methodisch inkorrekt! (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8020-methodisch_inkorrekt</link>
      <description>Wer hat diese Jungs wieder reingelassen?! Nicolas Wöhrl und Reinhard Remfort sind eine Gefahr für Leib und Leben. Unter dem Deckmantel der Wissenschaftskommunikation machen sie auf der Bühne alles das, was sie an der Uni nie gewagt hätten.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8020.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8020-deu-eng-Methodisch_inkorrekt_webm-hd.webm"
        length="2703228928"
        type="video/webm"/>
      <pubDate>Fri, 30 Dec 2016 00:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8020-deu-eng-Methodisch_inkorrekt_webm-hd.webm?1483110119</guid>
      <dc:identifier>d51d9e44-947b-4a09-94ad-c31c5cf5e5e1</dc:identifier>
      <dc:date>2016-12-30T00:15:00+01:00</dc:date>
      <itunes:author>Nicolas Wöhrl, Reinhard Remfort</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:subtitle>Die Wissenschaftsgala vom 33C3</itunes:subtitle>
      <itunes:summary>Wer hat diese Jungs wieder reingelassen?! Nicolas Wöhrl und Reinhard Remfort sind eine Gefahr für Leib und Leben. Unter dem Deckmantel der Wissenschaftskommunikation machen sie auf der Bühne alles das, was sie an der Uni nie gewagt hätten.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8020.html
</itunes:summary>
      <itunes:duration>01:53:01</itunes:duration>
    </item>
    <item>
      <title>Edible Soft Robotics (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8113-edible_soft_robotics</link>
      <description>As a soft roboticist I am constantly searching for inspiration for novel soft actuators, and as a home cook and artist I consider eating an object to be a high-level form of interactivity. Having noted the similarities between cast silicone and gummi candies it was natural to combine these interests. I will share my experiments in assessing different candies for their engineering potential, and show my work-in-progress for sweet soft robots.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8113.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8113-eng-deu-Edible_Soft_Robotics_webm-hd.webm"
        length="333447168"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8113-eng-deu-Edible_Soft_Robotics_webm-hd.webm?1483091251</guid>
      <dc:identifier>a097896d-04fc-4f58-8d8e-a8dbef9812b4</dc:identifier>
      <dc:date>2016-12-29T22:45:00+01:00</dc:date>
      <itunes:author>Kari Love</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>An exploration of candy as an engineered material</itunes:subtitle>
      <itunes:summary>As a soft roboticist I am constantly searching for inspiration for novel soft actuators, and as a home cook and artist I consider eating an object to be a high-level form of interactivity. Having noted the similarities between cast silicone and gummi candies it was natural to combine these interests. I will share my experiments in assessing different candies for their engineering potential, and show my work-in-progress for sweet soft robots.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8113.html
</itunes:summary>
      <itunes:duration>00:29:39</itunes:duration>
    </item>
    <item>
      <title>The 12 Networking Truths (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8191-the_12_networking_truths</link>
      <description>In *The 12 Networking Truths* Swedish artist Jonas Lund will discuss how he has attempted to subvert the contemporary art world system by using different types of exploits to gain an upper hand against the competition. 

From designing an algorithm for art production to data mining art world personalities, the artist will describe how he has incorporated a classic programming mindset in an otherwise logic-free environment. 

The 12 Networking Truths refers to RFC 1925 - The Twelve Networking Truths, a memo posted on the 1st of April 1996, positioned as revealing the fundamental truths underlying all network protocol designs. The truths include statements such as ‘It Has To Work.’ and ‘Good, Fast, Cheap: Pick any two (you can’t have all three).’. This memo will be the underlying story line throughout the talk, as each truths has a corresponding position within the artist’s artistic practice. 

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8191.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8191-eng-deu-The_12_Networking_Truths_webm-hd.webm"
        length="292552704"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8191-eng-deu-The_12_Networking_Truths_webm-hd.webm?1483104928</guid>
      <dc:identifier>34ea8f1f-9fad-41aa-8424-e833f10e5e8b</dc:identifier>
      <dc:date>2016-12-29T22:45:00+01:00</dc:date>
      <itunes:author>Jonas Lund</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:summary>In *The 12 Networking Truths* Swedish artist Jonas Lund will discuss how he has attempted to subvert the contemporary art world system by using different types of exploits to gain an upper hand against the competition. 

From designing an algorithm for art production to data mining art world personalities, the artist will describe how he has incorporated a classic programming mindset in an otherwise logic-free environment. 

The 12 Networking Truths refers to RFC 1925 - The Twelve Networking Truths, a memo posted on the 1st of April 1996, positioned as revealing the fundamental truths underlying all network protocol designs. The truths include statements such as ‘It Has To Work.’ and ‘Good, Fast, Cheap: Pick any two (you can’t have all three).’. This memo will be the underlying story line throughout the talk, as each truths has a corresponding position within the artist’s artistic practice. 

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8191.html
</itunes:summary>
      <itunes:duration>00:32:34</itunes:duration>
    </item>
    <item>
      <title>PUFs, protection, privacy, PRNGs (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8231-pufs_protection_privacy_prngs</link>
      <description>A physically unclonable function, or PUF, is some physical structure with properties that are easy to verify, hard to predict, and practically impossible to clone. Ideally, this means it&#39;s a device-unique unchanging identifier, which can be used for improving security. However, it can be at odds with privacy and anonymity. This talk will give you an overview of the thirty years of history behind PUFs, and will include the most recent advances in research. The functions, structure, and design will be discussed, as well as devices and materials that have properties to base PUFs on.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8231.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8231-eng-deu-PUFs_protection_privacy_PRNGs_webm-hd.webm"
        length="246415360"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8231-eng-deu-PUFs_protection_privacy_PRNGs_webm-hd.webm?1483105249</guid>
      <dc:identifier>855ab830-c6c0-4be7-b84c-31ba78e90e3c</dc:identifier>
      <dc:date>2016-12-29T22:45:00+01:00</dc:date>
      <itunes:author>Pol Van Aubel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>an overview of physically unclonable functions</itunes:subtitle>
      <itunes:summary>A physically unclonable function, or PUF, is some physical structure with properties that are easy to verify, hard to predict, and practically impossible to clone. Ideally, this means it&#39;s a device-unique unchanging identifier, which can be used for improving security. However, it can be at odds with privacy and anonymity. This talk will give you an overview of the thirty years of history behind PUFs, and will include the most recent advances in research. The functions, structure, and design will be discussed, as well as devices and materials that have properties to base PUFs on.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8231.html
</itunes:summary>
      <itunes:duration>00:31:43</itunes:duration>
    </item>
    <item>
      <title>Eavesdropping on the Dark Cosmos (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8245-eavesdropping_on_the_dark_cosmos</link>
      <description>Imagine, there is this huge data center but your user privileges allow you to access only 5% of the data. That is the exact same situation physicists face when trying to study the cosmos. 95% of our universe is made out of something that cannot be seen or touched. We generally call this unknown substance &quot;dark matter&quot; / &quot;dark energy&quot;. The recent discovery of gravitational waves gives us a handle on the dark cosmos. We can now listen to invisible events in our universe. But there may also be other methods to shed light on the dark side.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8245.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8245-eng-deu-fra-Eavesdropping_on_the_Dark_Cosmos_webm-hd.webm"
        length="471859200"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 22:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8245-eng-deu-fra-Eavesdropping_on_the_Dark_Cosmos_webm-hd.webm?1483104812</guid>
      <dc:identifier>8270c91a-d6e2-4f1c-9ebb-cdf10708d921</dc:identifier>
      <dc:date>2016-12-29T22:45:00+01:00</dc:date>
      <itunes:author>Simon Barke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Space</itunes:keywords>
      <itunes:subtitle>Dark Matter and Gravitational Waves</itunes:subtitle>
      <itunes:summary>Imagine, there is this huge data center but your user privileges allow you to access only 5% of the data. That is the exact same situation physicists face when trying to study the cosmos. 95% of our universe is made out of something that cannot be seen or touched. We generally call this unknown substance &quot;dark matter&quot; / &quot;dark energy&quot;. The recent discovery of gravitational waves gives us a handle on the dark cosmos. We can now listen to invisible events in our universe. But there may also be other methods to shed light on the dark side.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8245.html
</itunes:summary>
      <itunes:duration>00:33:01</itunes:duration>
    </item>
    <item>
      <title>Dissecting modern (3G/4G) cellular modems (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8151-dissecting_modern_3g_4g_cellular_modems</link>
      <description>Let&#39;s have a detailed look at some modern 3G/4G cellular modems and see what we can find out about their internals using undocumented debug interfaces and software or hardware based hacking techniques.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8151.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8151-eng-deu-fra-Dissecting_modern_3G_4G_cellular_modems_webm-hd.webm"
        length="513802240"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8151-eng-deu-fra-Dissecting_modern_3G_4G_cellular_modems_webm-hd.webm?1483092851</guid>
      <dc:identifier>bc638f9f-0370-42f9-b83c-f85cca4ca38d</dc:identifier>
      <dc:date>2016-12-29T14:00:00+01:00</dc:date>
      <itunes:author>LaForge, holger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Let&#39;s have a detailed look at some modern 3G/4G cellular modems and see what we can find out about their internals using undocumented debug interfaces and software or hardware based hacking techniques.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8151.html
</itunes:summary>
      <itunes:duration>00:58:12</itunes:duration>
    </item>
    <item>
      <title>Hacking collective as a laboratory (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8263-hacking_collective_as_a_laboratory</link>
      <description>Talk presents findings from sociological investigation on hacking collectives. I will try to answer the question whether hacking collectives are laboratories, as seen by sociology of science. I will also show some peculiar traits of hacking collective, beneficial both for sciences and societies. Perhaps academia needs hackers more than it’s willing to admit? 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8263.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8263-eng-deu-Hacking_collective_as_a_laboratory_webm-hd.webm"
        length="310378496"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8263-eng-deu-Hacking_collective_as_a_laboratory_webm-hd.webm?1483103636</guid>
      <dc:identifier>a6b27767-e42d-4610-a8d5-5a1f20587b34</dc:identifier>
      <dc:date>2016-12-29T22:00:00+01:00</dc:date>
      <itunes:author>Ezi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Hackers&#39; knowledge studied by sociologist of science </itunes:subtitle>
      <itunes:summary>Talk presents findings from sociological investigation on hacking collectives. I will try to answer the question whether hacking collectives are laboratories, as seen by sociology of science. I will also show some peculiar traits of hacking collective, beneficial both for sciences and societies. Perhaps academia needs hackers more than it’s willing to admit? 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8263.html
</itunes:summary>
      <itunes:duration>00:29:15</itunes:duration>
    </item>
    <item>
      <title>What We Can Learn about Creativity from 3D Printing (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8039-what_we_can_learn_about_creativity_from_3d_printing</link>
      <description>For the past three years we studied the world’s largest 3D printing community “Thingiverse”. We explored the remix-relationships—accessible due the community’s use of open licenses—of more than 200.000 individual designs, tracked an entire week’s new designs for half a year, interviewed more than 80 creators and surveyed over 200 more. This allowed us to develop a deep understanding of the creative processes that take place on the platform.
In this talk we would like to present our findings. This is of interest to people who care about 3D printing as we can give sort of a behind the scenes view on how ideas come to life here. But it is also interesting to people that care about creativity in general. As what we have found has merit outside of 3D printing, too. In this talk we would like to cover the following: (1) Introduce our research setting and explain why it is useful to study this, (2) provide a consolidated overview on our most interesting findings, and (3) give real life examples for how these findings are transferable to other settings.
We have presented primary results of the studies at various academic conferences and have a comprehensive paper on the project currently under revision at the Journal of Information Technology (see attached file). We are a group of three university professors and a Ph.D. student. We work on the intersection of information systems, innovation management, product development, and creativity. We believe that many of the people we studied either attend 33C3 or watch talks online and we therefore think that our results would be of interest to this community. Further, we feel that a well structured talk is better and more entertaining than mailing around our academic journal publications to those who are interested. And lastly, we are eager to receive feedback from a more hands-on audience (than what we deal with at academic conferences). It would be especially useful for us to hear of new developments, discuss ideas for follow-up research projects, and get access to creators that would like to work with us in the future.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8039.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8039-eng-deu-fra-What_We_Can_Learn_about_Creativity_from_3D_Printing_webm-hd.webm"
        length="313524224"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8039-eng-deu-fra-What_We_Can_Learn_about_Creativity_from_3D_Printing_webm-hd.webm?1483103118</guid>
      <dc:identifier>56ec19c0-9844-46d6-b728-7a8217b8ed38</dc:identifier>
      <dc:date>2016-12-29T22:00:00+01:00</dc:date>
      <itunes:author>Sascha Friesike</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>For the past three years we studied the world’s largest 3D printing community “Thingiverse”. We explored the remix-relationships—accessible due the community’s use of open licenses—of more than 200.000 individual designs, tracked an entire week’s new designs for half a year, interviewed more than 80 creators and surveyed over 200 more. This allowed us to develop a deep understanding of the creative processes that take place on the platform.
In this talk we would like to present our findings. This is of interest to people who care about 3D printing as we can give sort of a behind the scenes view on how ideas come to life here. But it is also interesting to people that care about creativity in general. As what we have found has merit outside of 3D printing, too. In this talk we would like to cover the following: (1) Introduce our research setting and explain why it is useful to study this, (2) provide a consolidated overview on our most interesting findings, and (3) give real life examples for how these findings are transferable to other settings.
We have presented primary results of the studies at various academic conferences and have a comprehensive paper on the project currently under revision at the Journal of Information Technology (see attached file). We are a group of three university professors and a Ph.D. student. We work on the intersection of information systems, innovation management, product development, and creativity. We believe that many of the people we studied either attend 33C3 or watch talks online and we therefore think that our results would be of interest to this community. Further, we feel that a well structured talk is better and more entertaining than mailing around our academic journal publications to those who are interested. And lastly, we are eager to receive feedback from a more hands-on audience (than what we deal with at academic conferences). It would be especially useful for us to hear of new developments, discuss ideas for follow-up research projects, and get access to creators that would like to work with us in the future.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8039.html
</itunes:summary>
      <itunes:duration>00:28:21</itunes:duration>
    </item>
    <item>
      <title>Saving the World with (Vegan) Science (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8135-saving_the_world_with_vegan_science</link>
      <description>Describing the science behind new high tech vegan foods which will replace animal agriculture. I will also discuss the potential impact to lessen the severity of climate change and give an update on the Real Vegan Cheese biohacker project.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8135.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8135-eng-deu-Saving_the_World_with_Vegan_Science_webm-hd.webm"
        length="223346688"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8135-eng-deu-Saving_the_World_with_Vegan_Science_webm-hd.webm?1483103025</guid>
      <dc:identifier>094b6119-b261-4750-89cf-43fed50eb679</dc:identifier>
      <dc:date>2016-12-29T21:15:00+01:00</dc:date>
      <itunes:author>Benjamin Rupert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>Describing the science behind new high tech vegan foods which will replace animal agriculture. I will also discuss the potential impact to lessen the severity of climate change and give an update on the Real Vegan Cheese biohacker project.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8135.html
</itunes:summary>
      <itunes:duration>00:31:07</itunes:duration>
    </item>
    <item>
      <title>From Server Farm to Data Table (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8412-from_server_farm_to_data_table</link>
      <description>
Early digital computers were the size of rooms. While the devices have gotten smaller, because of the increasingly networked nature of technology the room has gotten bigger--it&#39;s ceased having walls and started to cover the ocean floor and ascend into low earth orbit. While Neal Stephenson may have cornered this living-inside-a-computer narrative in 1996 with &quot;Mother Earth, Mother Board&quot;, in the past twenty years the seams of the network have become even more opaque, subsumed into The Cloud and other problematic abstractions. This talk will mostly be about different approaches to documenting, comprehending, and thinking about network infrastructure and the ways that the visual vernacular of technologies shape their history and politics. 


about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8412.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8412-eng-deu-From_Server_Farm_to_Data_Table_webm-hd.webm"
        length="367001600"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8412-eng-deu-From_Server_Farm_to_Data_Table_webm-hd.webm?1483102085</guid>
      <dc:identifier>2aba641b-114d-4dac-866e-533314a3c108</dc:identifier>
      <dc:date>2016-12-29T21:15:00+01:00</dc:date>
      <itunes:author>Ingrid Burrington</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:summary>
Early digital computers were the size of rooms. While the devices have gotten smaller, because of the increasingly networked nature of technology the room has gotten bigger--it&#39;s ceased having walls and started to cover the ocean floor and ascend into low earth orbit. While Neal Stephenson may have cornered this living-inside-a-computer narrative in 1996 with &quot;Mother Earth, Mother Board&quot;, in the past twenty years the seams of the network have become even more opaque, subsumed into The Cloud and other problematic abstractions. This talk will mostly be about different approaches to documenting, comprehending, and thinking about network infrastructure and the ways that the visual vernacular of technologies shape their history and politics. 


about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8412.html
</itunes:summary>
      <itunes:duration>00:32:38</itunes:duration>
    </item>
    <item>
      <title>Irren ist staatlich (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7811-irren_ist_staatlich</link>
      <description>&lt;p&gt;Dieses Jahr feiert das Informationsfreiheitsgesetz (IFG) seinen zehnten Geburtstag &amp;ndash; und niemand feiert mit. Zeit f&amp;uuml;r eine Abrechnung. FOIA frei!&lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7811.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7811-deu-eng-fra-Irren_ist_staatlich_webm-hd.webm"
        length="329252864"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7811-deu-eng-fra-Irren_ist_staatlich_webm-hd.webm?1483101993</guid>
      <dc:identifier>7c3a4ac8-1925-4459-bdd8-b9d9e18a6cfa</dc:identifier>
      <dc:date>2016-12-29T21:15:00+01:00</dc:date>
      <itunes:author>Arne Semsrott</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics, Frag den Staat</itunes:keywords>
      <itunes:subtitle>10 Jahre Informationsfreiheitsgesetz</itunes:subtitle>
      <itunes:summary>&lt;p&gt;Dieses Jahr feiert das Informationsfreiheitsgesetz (IFG) seinen zehnten Geburtstag &amp;ndash; und niemand feiert mit. Zeit f&amp;uuml;r eine Abrechnung. FOIA frei!&lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7811.html
</itunes:summary>
      <itunes:duration>00:32:05</itunes:duration>
    </item>
    <item>
      <title>Interplanetary Colonization (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7942-interplanetary_colonization</link>
      <description>The long term survival of the human species requires that we become an interplanetary species. But we must answer two big questions: where are we going, and how do we get there? We explore what scientists know (and don’t know) about humanity’s potential future homes both inside and outside the solar system, and then we’ll dive into the technological challenges of (and potential solutions for) getting humans to and colonizing a new planet.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7942.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7942-eng-deu-fra-Interplanetary_Colonization_webm-hd.webm"
        length="331350016"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 21:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7942-eng-deu-fra-Interplanetary_Colonization_webm-hd.webm?1483102153</guid>
      <dc:identifier>c4211c94-7cea-457d-9214-7ccf5d7c89cc</dc:identifier>
      <dc:date>2016-12-29T21:15:00+01:00</dc:date>
      <itunes:author>Liz George, Peter Buschkamp</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Space</itunes:keywords>
      <itunes:subtitle>the state at the beginning of the 21st Century</itunes:subtitle>
      <itunes:summary>The long term survival of the human species requires that we become an interplanetary species. But we must answer two big questions: where are we going, and how do we get there? We explore what scientists know (and don’t know) about humanity’s potential future homes both inside and outside the solar system, and then we’ll dive into the technological challenges of (and potential solutions for) getting humans to and colonizing a new planet.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7942.html
</itunes:summary>
      <itunes:duration>00:33:52</itunes:duration>
    </item>
    <item>
      <title>Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8280-von_alpakas_hasenbaren_und_einhornern_uber_anerkennungskultur</link>
      <description>Wie würdigen verschiedene Tech-Communities das ehrenamtliche Engagement ihrer Mitglieder? Wie lassen sich gewünschte Lernprozesse verstärken? Was sind unsere Erfahrungen bei Jugend hackt? Und was haben Badges damit zu tun?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8280.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8280-deu-eng-Von_Alpakas_Hasenbaeren_und_Einhoernern_-_UEber_Anerkennungskultur_webm-hd.webm"
        length="429916160"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8280-deu-eng-Von_Alpakas_Hasenbaeren_und_Einhoernern_-_UEber_Anerkennungskultur_webm-hd.webm?1483101287</guid>
      <dc:identifier>7deb971d-1768-4a56-93ed-fe0192a13025</dc:identifier>
      <dc:date>2016-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Maria Reimer, Daniel seitz, Paula Glaser, Robert Alisch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Wie Wertschätzung in (Tech-)Communities gelingen kann</itunes:subtitle>
      <itunes:summary>Wie würdigen verschiedene Tech-Communities das ehrenamtliche Engagement ihrer Mitglieder? Wie lassen sich gewünschte Lernprozesse verstärken? Was sind unsere Erfahrungen bei Jugend hackt? Und was haben Badges damit zu tun?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8280.html
</itunes:summary>
      <itunes:duration>00:32:59</itunes:duration>
    </item>
    <item>
      <title>The Moon and European Space Exploration (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8406-the_moon_and_european_space_exploration</link>
      <description>Since the early successes of moon missions in the Sixtie, mankind has moved on to the earth orbit and other deep space missions. But interest in the moon as a target has intensified recently as the strategies for future missions are evolving.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8406.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8406-eng-deu-fra-The_Moon_and_European_Space_Exploration_webm-hd.webm"
        length="369098752"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8406-eng-deu-fra-The_Moon_and_European_Space_Exploration_webm-hd.webm?1483100870</guid>
      <dc:identifier>f1e2dc22-8925-4a8a-8cd3-4d03aa0e33b7</dc:identifier>
      <dc:date>2016-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Jan Wörner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Space</itunes:keywords>
      <itunes:subtitle>Refocusing on the moon as a platform for future deep space missoins</itunes:subtitle>
      <itunes:summary>Since the early successes of moon missions in the Sixtie, mankind has moved on to the earth orbit and other deep space missions. But interest in the moon as a target has intensified recently as the strategies for future missions are evolving.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8406.html
</itunes:summary>
      <itunes:duration>00:32:16</itunes:duration>
    </item>
    <item>
      <title>Corporate surveillance, digital tracking, big data &amp; privacy (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8414-corporate_surveillance_digital_tracking_big_data_privacy</link>
      <description>Today virtually everything we do is monitored in some way. The collection, analysis and utilization of digital information about our clicks, swipes, likes, purchases, movements, behaviors and interests have become part of everyday life. While individuals become increasingly transparent, companies take control of the recorded data.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8414.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8414-eng-deu-Corporate_surveillance_digital_tracking_big_data_privacy_webm-hd.webm"
        length="391118848"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8414-eng-deu-Corporate_surveillance_digital_tracking_big_data_privacy_webm-hd.webm?1483089930</guid>
      <dc:identifier>b5b4ce04-1e4b-4e09-8347-4e72cb5f90b9</dc:identifier>
      <dc:date>2016-12-29T11:30:00+01:00</dc:date>
      <itunes:author>Wolfie Christl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>How thousands of companies are profiling, categorizing, rating and affecting the lives of billions</itunes:subtitle>
      <itunes:summary>Today virtually everything we do is monitored in some way. The collection, analysis and utilization of digital information about our clicks, swipes, likes, purchases, movements, behaviors and interests have become part of everyday life. While individuals become increasingly transparent, companies take control of the recorded data.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8414.html
</itunes:summary>
      <itunes:duration>01:02:21</itunes:duration>
    </item>
    <item>
      <title>Lasers in the sky (with asteroids) (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7927-lasers_in_the_sky_with_asteroids</link>
      <description>At 32C3 we shot lasers into space... now it&#39;s lasers in space!
We look at space- and airborne laser platforms and what practical uses people have come up with (hint: mostly more or less secret communication and military use).  We&#39;ll also recap the basic physics and boundaries and check if &#39;pew pew pew&#39; is really gonna cut it (hint: mostly no). To close, we&#39;ll have a look at laser based propulsion for space travel and other speculative applications off the beaten path. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7927.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7927-eng-deu-rus-Lasers_in_the_sky_with_asteroids_webm-hd.webm"
        length="312475648"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7927-eng-deu-rus-Lasers_in_the_sky_with_asteroids_webm-hd.webm?1483103487</guid>
      <dc:identifier>b092a437-b612-4887-ba55-f08ddfe333b9</dc:identifier>
      <dc:date>2016-12-29T22:00:00+01:00</dc:date>
      <itunes:author>Peter Buschkamp</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Space</itunes:keywords>
      <itunes:summary>At 32C3 we shot lasers into space... now it&#39;s lasers in space!
We look at space- and airborne laser platforms and what practical uses people have come up with (hint: mostly more or less secret communication and military use).  We&#39;ll also recap the basic physics and boundaries and check if &#39;pew pew pew&#39; is really gonna cut it (hint: mostly no). To close, we&#39;ll have a look at laser based propulsion for space travel and other speculative applications off the beaten path. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7927.html
</itunes:summary>
      <itunes:duration>00:35:44</itunes:duration>
    </item>
    <item>
      <title>Berechnete Welt (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7899-berechnete_welt</link>
      <description>Wer all unsere Daten der Gegenwart mit selbstlernenden Algorithmen auswertet, wird die nahe Zukunft grob vorhersagen können. Die Instrumente dafür sind so weit, viele seriöse Forscher arbeiten an Teilbruchstücken. Die Folgen für die Gesellschaft scheinen fatal zu sein. Orwell naht gewaltig.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7899.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7899-deu-eng-Berechnete_Welt_webm-hd.webm"
        length="241172480"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7899-deu-eng-Berechnete_Welt_webm-hd.webm?1483101341</guid>
      <dc:identifier>198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e</dc:identifier>
      <dc:date>2016-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Karl Urban</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Unsere Daten, die Zukunft und die zerstörte Demokratie</itunes:subtitle>
      <itunes:summary>Wer all unsere Daten der Gegenwart mit selbstlernenden Algorithmen auswertet, wird die nahe Zukunft grob vorhersagen können. Die Instrumente dafür sind so weit, viele seriöse Forscher arbeiten an Teilbruchstücken. Die Folgen für die Gesellschaft scheinen fatal zu sein. Orwell naht gewaltig.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7899.html
</itunes:summary>
      <itunes:duration>00:31:33</itunes:duration>
    </item>
    <item>
      <title>The woman behind your WiFi (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8233-the_woman_behind_your_wifi</link>
      <description>Used in cell phone technology, bluetooth devices, and WiFi, Frequency Hopping Spread Spectrum (FHSS) is often said to have been invented in the early 1940s by none other than Hollywood actress and sex symbol Hedy Lamarr. This talk will present the undeniably entertaining history of a well-known actress moonlighting as a military inventor as well as give an overview of the 100-year-old history of frequency hopping and its past and present uses.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8233.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8233-eng-deu-fra-The_woman_behind_your_WiFi_webm-hd.webm"
        length="307232768"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8233-eng-deu-fra-The_woman_behind_your_WiFi_webm-hd.webm?1483100974</guid>
      <dc:identifier>d851c029-9f83-41af-befd-a54209453d41</dc:identifier>
      <dc:date>2016-12-29T20:30:00+01:00</dc:date>
      <itunes:author>Anja Drephal</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Hedy Lamarr: Frequency Hopping in Hollywood</itunes:subtitle>
      <itunes:summary>Used in cell phone technology, bluetooth devices, and WiFi, Frequency Hopping Spread Spectrum (FHSS) is often said to have been invented in the early 1940s by none other than Hollywood actress and sex symbol Hedy Lamarr. This talk will present the undeniably entertaining history of a well-known actress moonlighting as a military inventor as well as give an overview of the 100-year-old history of frequency hopping and its past and present uses.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8233.html
</itunes:summary>
      <itunes:duration>00:31:45</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 3 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8088-lightning_talks_day_3</link>
      <description>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8088.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8088-eng-deu-Lightning_Talks_Day_3_webm-hd.webm"
        length="933232640"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8088-eng-deu-Lightning_Talks_Day_3_webm-hd.webm?1483092401</guid>
      <dc:identifier>853f2681-504c-45bf-b9af-cbabd005c376</dc:identifier>
      <dc:date>2016-12-29T12:45:00+01:00</dc:date>
      <itunes:author>gedsic, bigalex</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:subtitle>Lightning Talks</itunes:subtitle>
      <itunes:summary>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8088.html
</itunes:summary>
      <itunes:duration>02:02:15</itunes:duration>
    </item>
    <item>
      <title>Making Technology Inclusive Through Papercraft and Sound (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7975-making_technology_inclusive_through_papercraft_and_sound</link>
      <description>The participation of women in computer education is low; undergraduate classrooms in Germany were only 10% female in 2000[1]. The picture at the primary school level is fuzzier, as students do not declare majors at that level, but evidence indicates the trend starts from a young age. Can we make computer education more gender-inclusive? Presenting technology in familiar, non-threatening contexts can lead to more balanced gender participation. For example, Chibitronics uses the context of papercraft to present electronics to beginners; the familiarity of papercraft improves the participation of women of all ages in the creation of electronics. Based on these learnings, we have devised the “Love to Code” platform, an open source hardware-to-cloud stack which combines the familiarity of paper craft with a web-based, driver-free embedded firmware development environment based on FSK audio provisioning via a headphone jack. In this talk, we will dive into the novel open source technical contributions of this platform, which includes the audio-based provisioning protocol and the unique rigid-flex design of the circuitry enabling papercraft integration, as well as the multi-threaded client OS and cloud infrastructure required to complete the picture. This combination of new technology with familiar interfaces aims to lower the barrier to computer education, thus making coding a more accessible and inclusive activity.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7975.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7975-eng-deu-Making_Technology_Inclusive_Through_Papercraft_and_Sound_webm-hd.webm"
        length="457179136"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7975-eng-deu-Making_Technology_Inclusive_Through_Papercraft_and_Sound_webm-hd.webm?1483094434</guid>
      <dc:identifier>07a731a0-2c3a-40f1-928e-3f709eb1eccf</dc:identifier>
      <dc:date>2016-12-29T16:00:00+01:00</dc:date>
      <itunes:author>bunnie</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Introducing the Love to Code Platform</itunes:subtitle>
      <itunes:summary>The participation of women in computer education is low; undergraduate classrooms in Germany were only 10% female in 2000[1]. The picture at the primary school level is fuzzier, as students do not declare majors at that level, but evidence indicates the trend starts from a young age. Can we make computer education more gender-inclusive? Presenting technology in familiar, non-threatening contexts can lead to more balanced gender participation. For example, Chibitronics uses the context of papercraft to present electronics to beginners; the familiarity of papercraft improves the participation of women of all ages in the creation of electronics. Based on these learnings, we have devised the “Love to Code” platform, an open source hardware-to-cloud stack which combines the familiarity of paper craft with a web-based, driver-free embedded firmware development environment based on FSK audio provisioning via a headphone jack. In this talk, we will dive into the novel open source technical contributions of this platform, which includes the audio-based provisioning protocol and the unique rigid-flex design of the circuitry enabling papercraft integration, as well as the multi-threaded client OS and cloud infrastructure required to complete the picture. This combination of new technology with familiar interfaces aims to lower the barrier to computer education, thus making coding a more accessible and inclusive activity.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7975.html
</itunes:summary>
      <itunes:duration>00:56:35</itunes:duration>
    </item>
    <item>
      <title>Building Custom Pinball Machines (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8012-building_custom_pinball_machines</link>
      <description>How to build a pinball machine? We introduce you to all basics and explain the different options for hardware and software. As an example, we show images of our own custom pinball machine.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8012.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8012-eng-deu-Building_Custom_Pinball_Machines_webm-hd.webm"
        length="714080256"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8012-eng-deu-Building_Custom_Pinball_Machines_webm-hd.webm?1483094738</guid>
      <dc:identifier>70269173-72a8-4eab-b356-f22faea6cdca</dc:identifier>
      <dc:date>2016-12-29T16:00:00+01:00</dc:date>
      <itunes:author>jab</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>What you need and how it works. An experiences report</itunes:subtitle>
      <itunes:summary>How to build a pinball machine? We introduce you to all basics and explain the different options for hardware and software. As an example, we show images of our own custom pinball machine.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8012.html
</itunes:summary>
      <itunes:duration>01:03:00</itunes:duration>
    </item>
    <item>
      <title>Memory Deduplication: The Curse that Keeps on Giving (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8022-memory_deduplication_the_curse_that_keeps_on_giving</link>
      <description>We are 4 security researchers who have collectively worked on 3 different attack techniques that all (ab)use memory deduplication in one way or another. There is a cross-vm data leak attack, a cross-vm data write attack, and an in-sandbox (MS Edge) Javascript data leak + full memory read/write attack based in MS Edge.

In this talk we detail how memory deduplication works and the many different ways it is exploited in our attacks.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8022.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8022-eng-deu-Memory_Deduplication_The_Curse_that_Keeps_on_Giving_webm-hd.webm"
        length="338690048"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8022-eng-deu-Memory_Deduplication_The_Curse_that_Keeps_on_Giving_webm-hd.webm?1483091766</guid>
      <dc:identifier>4c92b3f4-e32a-483b-9e5f-4e8201849284</dc:identifier>
      <dc:date>2016-12-29T12:45:00+01:00</dc:date>
      <itunes:author>Ben Gras, Kaveh Razavi, brainsmoke, Antonio Barresi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>A tale of 3 different memory deduplication based exploitation techniques</itunes:subtitle>
      <itunes:summary>We are 4 security researchers who have collectively worked on 3 different attack techniques that all (ab)use memory deduplication in one way or another. There is a cross-vm data leak attack, a cross-vm data write attack, and an in-sandbox (MS Edge) Javascript data leak + full memory read/write attack based in MS Edge.

In this talk we detail how memory deduplication works and the many different ways it is exploited in our attacks.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8022.html
</itunes:summary>
      <itunes:duration>00:59:10</itunes:duration>
    </item>
    <item>
      <title>Liberté, Égalité, Fraternité... and privacy ?! (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8072-liberte_egalite_fraternite_and_privacy</link>
      <description>France is under a state of emergency since November 2015. Several laws and a more intrusive surveillance framework, infringing rights and freedoms, have been adopted these recent years in the name of the fight against terrorism.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8072.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8072-eng-deu-Liberte_Egalite_Fraternite_and_privacy_webm-hd.webm"
        length="817889280"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8072-eng-deu-Liberte_Egalite_Fraternite_and_privacy_webm-hd.webm?1483094153</guid>
      <dc:identifier>6caf962e-8a5e-4dba-ab7e-d3b6a71dc376</dc:identifier>
      <dc:date>2016-12-29T14:00:00+01:00</dc:date>
      <itunes:author>Agnes, Christopher Talib</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>France is under a state of emergency since November 2015. Several laws and a more intrusive surveillance framework, infringing rights and freedoms, have been adopted these recent years in the name of the fight against terrorism.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8072.html
</itunes:summary>
      <itunes:duration>01:04:39</itunes:duration>
    </item>
    <item>
      <title>Machine Dreams (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8369-machine_dreams</link>
      <description>Artificial Intelligence provides a conceptual framework to understand mind and universe in new ways, clearing the obstacles that hindered the progress of philosophy and psychology. Let us see how AI can help us to understand how our minds create the experience of a universe.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8369.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8369-eng-deu-fra-Machine_Dreams_webm-hd.webm"
        length="587202560"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8369-eng-deu-fra-Machine_Dreams_webm-hd.webm?1483094233</guid>
      <dc:identifier>cb23378b-6db0-4e2f-a4c8-f5006a467ca3</dc:identifier>
      <dc:date>2016-12-29T16:00:00+01:00</dc:date>
      <itunes:author>Joscha</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Dreaming Machines</itunes:subtitle>
      <itunes:summary>Artificial Intelligence provides a conceptual framework to understand mind and universe in new ways, clearing the obstacles that hindered the progress of philosophy and psychology. Let us see how AI can help us to understand how our minds create the experience of a universe.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8369.html
</itunes:summary>
      <itunes:duration>01:02:39</itunes:duration>
    </item>
    <item>
      <title>Dissecting HDMI (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8057-dissecting_hdmi</link>
      <description>Ever wondered what is actually happening when a speaker can&#39;t get their laptop to project? While developing the FPGA-based &lt;a href=&quot;https://hdmi2usb.tv&quot;&gt;HDMI2USB.tv open hardware for recording conferences&lt;/a&gt;, we discovered just how convoluted the HDMI protocol can be. Come hear all the horrible details!
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8057.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8057-eng-deu-fra-Dissecting_HDMI_webm-hd.webm"
        length="637534208"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8057-eng-deu-fra-Dissecting_HDMI_webm-hd.webm?1483094682</guid>
      <dc:identifier>aaec73e9-66b9-46d2-aa0f-9f43018198ea</dc:identifier>
      <dc:date>2016-12-29T17:15:00+01:00</dc:date>
      <itunes:author>Tim &#39;mithro&#39; Ansell</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Developing open, FPGA-based capture hardware for conference &amp; user group recording</itunes:subtitle>
      <itunes:summary>Ever wondered what is actually happening when a speaker can&#39;t get their laptop to project? While developing the FPGA-based &lt;a href=&quot;https://hdmi2usb.tv&quot;&gt;HDMI2USB.tv open hardware for recording conferences&lt;/a&gt;, we discovered just how convoluted the HDMI protocol can be. Come hear all the horrible details!
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8057.html
</itunes:summary>
      <itunes:duration>01:03:18</itunes:duration>
    </item>
    <item>
      <title>Technologien für und wider Digitale Souveränität (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8097-technologien_fur_und_wider_digitale_souveranitat</link>
      <description>&#39;&#39;Technologien für und wider Digitale Souveränität&#39;&#39;

Die weltweite Vernetzung ist die tiefgreifendste Veränderung seit der
industriellen Revolution.  In einer Zeit der maßlose Massenüberwachung scheint die Digitale Souveränität den Einsatz privatsphärenfreundlicher Technologien als ein unverzichtbarer Bestandteil von gesellschaftlichen Lösungsversuchen zwingend zu erfordern.

In unserem Beitrag möchten wir hackerrelvante Teilaspekte und Verfahren aus einer Studie für das Bundesministerium für Justiz und Verbraucherschutz vorstellen. Unter anderem sind hier kryptographische Protokolle (z. B.  Blinde Signaturen, Zero-Knowlege Protokolle) und Methoden zur statistischen Auswertung von vertraulichen Daten  (z.B. K-Anonymität, Differentielle Vertraulichkeit) zu nennen.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8097.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet_webm-hd.webm"
        length="719323136"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8097-deu-eng-fra-Technologien_fuer_und_wider_Digitale_Souveraenitaet_webm-hd.webm?1483095433</guid>
      <dc:identifier>c19012c9-71de-4272-a6f4-898f5c48b8d9</dc:identifier>
      <dc:date>2016-12-29T17:15:00+01:00</dc:date>
      <itunes:author>ruedi, vgrass, Prof. Stefan Lucks</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>&#39;&#39;Technologien für und wider Digitale Souveränität&#39;&#39;

Die weltweite Vernetzung ist die tiefgreifendste Veränderung seit der
industriellen Revolution.  In einer Zeit der maßlose Massenüberwachung scheint die Digitale Souveränität den Einsatz privatsphärenfreundlicher Technologien als ein unverzichtbarer Bestandteil von gesellschaftlichen Lösungsversuchen zwingend zu erfordern.

In unserem Beitrag möchten wir hackerrelvante Teilaspekte und Verfahren aus einer Studie für das Bundesministerium für Justiz und Verbraucherschutz vorstellen. Unter anderem sind hier kryptographische Protokolle (z. B.  Blinde Signaturen, Zero-Knowlege Protokolle) und Methoden zur statistischen Auswertung von vertraulichen Daten  (z.B. K-Anonymität, Differentielle Vertraulichkeit) zu nennen.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8097.html
</itunes:summary>
      <itunes:duration>01:00:14</itunes:duration>
    </item>
    <item>
      <title>Talking Behind Your Back (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8336-talking_behind_your_back</link>
      <description>In the last two years, the marketing industry started to show a fast increasing interest in technologies for user cross-device tracking, proximity tracking, and their derivative monetization schemes. To meet these demands, a new ultrasound-based technology has recently emerged and is already utilized in a number of different real-world applications. Ultrasound tracking comes with a number of desirable features (e.g., easy to deploy, inaudible to humans), but alarmingly until now no comprehensive security analysis of the technology has been conducted. In this talk, we will publish the results of our security analysis of the ultrasound tracking ecosystem, and demonstrate the practical security and privacy risks that arise with its adoption. Subsequently, we will introduce some immediately deployable defense mechanisms for practitioners, researchers, and everyday users. Finally, we will initiate the discussion for the standardization of ultrasound beacons, and outline our proposed OS-level API that enables both secure and effortless deployment for ultrasound-enabled applications.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8336.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8336-eng-deu-Talking_Behind_Your_Back_webm-hd.webm"
        length="500170752"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8336-eng-deu-Talking_Behind_Your_Back_webm-hd.webm?1483096179</guid>
      <dc:identifier>3f76be27-6ff5-4a23-a6c6-512eaff00f28</dc:identifier>
      <dc:date>2016-12-29T17:15:00+01:00</dc:date>
      <itunes:author>Vasilios Mavroudis, Federico Maggi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>On the Privacy &amp; Security of the Ultrasound Tracking Ecosystem</itunes:subtitle>
      <itunes:summary>In the last two years, the marketing industry started to show a fast increasing interest in technologies for user cross-device tracking, proximity tracking, and their derivative monetization schemes. To meet these demands, a new ultrasound-based technology has recently emerged and is already utilized in a number of different real-world applications. Ultrasound tracking comes with a number of desirable features (e.g., easy to deploy, inaudible to humans), but alarmingly until now no comprehensive security analysis of the technology has been conducted. In this talk, we will publish the results of our security analysis of the ultrasound tracking ecosystem, and demonstrate the practical security and privacy risks that arise with its adoption. Subsequently, we will introduce some immediately deployable defense mechanisms for practitioners, researchers, and everyday users. Finally, we will initiate the discussion for the standardization of ultrasound beacons, and outline our proposed OS-level API that enables both secure and effortless deployment for ultrasound-enabled applications.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8336.html
</itunes:summary>
      <itunes:duration>00:59:03</itunes:duration>
    </item>
    <item>
      <title>Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7853-do_as_i_say_not_as_i_do_stealth_modification_of_programmable_logic_controllers_i_o_by_pin_control_attack</link>
      <description>Input/Output is the mechanisms through which embedded systems interact and control the outside world. Particularly when employed in mission critical systems, the I/O of embedded systems has to be both reliable and secure. Embedded system’s I/O is controlled by a pin based approach. In this work, we investigate the security implications of embedded system’s pin control. In particular, we show how an attacker can tamper with the integrity and availability of an embedded system’s I/O by exploiting cerain pin control operations and the lack of hardware interrupts associated to them. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7853.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7853-eng-deu-Do_as_I_Say_not_as_I_Do_Stealth_Modification_of_Programmable_Logic_Controllers_I_O_by_Pin_Control_Attack_webm-hd.webm"
        length="797966336"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7853-eng-deu-Do_as_I_Say_not_as_I_Do_Stealth_Modification_of_Programmable_Logic_Controllers_I_O_by_Pin_Control_Attack_webm-hd.webm?1483094492</guid>
      <dc:identifier>b8d9fac7-bbe6-40da-aa80-aed27f77a708</dc:identifier>
      <dc:date>2016-12-29T16:00:00+01:00</dc:date>
      <itunes:author>Ali Abbasi, Majid</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Input/Output is the mechanisms through which embedded systems interact and control the outside world. Particularly when employed in mission critical systems, the I/O of embedded systems has to be both reliable and secure. Embedded system’s I/O is controlled by a pin based approach. In this work, we investigate the security implications of embedded system’s pin control. In particular, we show how an attacker can tamper with the integrity and availability of an embedded system’s I/O by exploiting cerain pin control operations and the lack of hardware interrupts associated to them. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7853.html
</itunes:summary>
      <itunes:duration>01:00:16</itunes:duration>
    </item>
    <item>
      <title>A New Dark Age (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8163-a_new_dark_age</link>
      <description>James Bridle is a British writer and artist living in Greece. His work explores the impact of technology on society, law, geography, politics, and culture. His Drone Shadow installations have appeared on city streets worldwide, he has mapped deportation centres with CGI, designed new kinds of citizenship based on online behaviour. and used neural networks and satellite images to predict election results. A New Dark Age is an exploration of what we can no longer know about the world, and what we can do about it.


about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8163.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8163-eng-deu-A_New_Dark_Age_webm-hd.webm"
        length="974127104"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8163-eng-deu-A_New_Dark_Age_webm-hd.webm?1483098272</guid>
      <dc:identifier>a1f43609-a446-41e7-9ac6-4db12bcb14c1</dc:identifier>
      <dc:date>2016-12-29T17:15:00+01:00</dc:date>
      <itunes:author>James Bridle</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Turbulence, Big Data, AI, Fake News, and Peak Knowledge</itunes:subtitle>
      <itunes:summary>James Bridle is a British writer and artist living in Greece. His work explores the impact of technology on society, law, geography, politics, and culture. His Drone Shadow installations have appeared on city streets worldwide, he has mapped deportation centres with CGI, designed new kinds of citizenship based on online behaviour. and used neural networks and satellite images to predict election results. A New Dark Age is an exploration of what we can no longer know about the world, and what we can do about it.


about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8163.html
</itunes:summary>
      <itunes:duration>00:57:57</itunes:duration>
    </item>
    <item>
      <title>No Love for the US Gov. (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8438-no_love_for_the_us_gov</link>
      <description>Lauri Love has never set foot in the United States, yet he is facing a potential century in jail if extradited for his alleged involvement in #OpLastResort, an Anonymous-related protest action that occurred in response to the death of Aaron Swartz.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8438.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8438-eng-deu-fra-No_Love_for_the_US_Gov_webm-hd.webm"
        length="1049624576"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8438-eng-deu-fra-No_Love_for_the_US_Gov_webm-hd.webm?1483098523</guid>
      <dc:identifier>65833373-6cae-4f9d-947b-c93a83ff1ba1</dc:identifier>
      <dc:date>2016-12-29T18:30:00+01:00</dc:date>
      <itunes:author>Jake Davis, Lauri Love, Mustafa Al-Bassam</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Why Lauri Love’s case is even more important than you thought</itunes:subtitle>
      <itunes:summary>Lauri Love has never set foot in the United States, yet he is facing a potential century in jail if extradited for his alleged involvement in #OpLastResort, an Anonymous-related protest action that occurred in response to the death of Aaron Swartz.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8438.html
</itunes:summary>
      <itunes:duration>00:53:27</itunes:duration>
    </item>
    <item>
      <title>Decoding the LoRa PHY (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7945-decoding_the_lora_phy</link>
      <description>LoRa is an emerging Low Power Wide Area Network, a new class of wireless technology designed to connect everything from streetlights to intelligent mousetraps.  I will discuss the design and security implications of LPWANs, dive deep into the LoRa PHY, and demonstrate sniffing and injection with an open source LoRa transceiver built on commodity Software Defined Radio tools.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7945.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7945-eng-deu-Decoding_the_LoRa_PHY_webm-hd.webm"
        length="404750336"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7945-eng-deu-Decoding_the_LoRa_PHY_webm-hd.webm?1483099035</guid>
      <dc:identifier>5fb5e620-383a-4679-b37a-beef20bcd4fe</dc:identifier>
      <dc:date>2016-12-29T18:30:00+01:00</dc:date>
      <itunes:author>Matt Knight</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Dissecting a Modern Wireless Network for the Internet of Things</itunes:subtitle>
      <itunes:summary>LoRa is an emerging Low Power Wide Area Network, a new class of wireless technology designed to connect everything from streetlights to intelligent mousetraps.  I will discuss the design and security implications of LPWANs, dive deep into the LoRa PHY, and demonstrate sniffing and injection with an open source LoRa transceiver built on commodity Software Defined Radio tools.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7945.html
</itunes:summary>
      <itunes:duration>01:04:15</itunes:duration>
    </item>
    <item>
      <title>Hochsicherheits-Generalschlüssel Marke Eigenbau (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8139-hochsicherheits-generalschlussel_marke_eigenbau</link>
      <description>Die Verfügbarkeit preiswerter Maschinentechnik und Open Source CAD-Software hat den Aufwand des Herstellens eigener mechanischer Schlüssel signifikant abgesenkt, die wir noch vor zehn Jahren als „sicher“ bezeichnet haben.
Klassische Zylinderschlösser sind in der Vergangenheit bereits ausführlich analysiert worden, doch wie sieht die Situation bei anspruchsvolleren mechanischen Schließsystemen aus?
Wir zeigen, wie man den Generalschlüssel einer hoch präzisen, hochpreisigen Schließanlage ermittelt. Weiterhin präsentieren wir unseren Workflow der Software und Mechanik, mit dem man Rohlinge und Schlüssel eines Hochsicherheitssystem mit einer „Low Cost“ CNC-Fräse herstellen kann. Im Gegensatz zum 3D-Drucken bietet uns dies eine deutlich höhere Präzision und mechanische Stabilität - und das für unter 2 Euro pro Schlüssel.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8139.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8139-deu-eng-Hochsicherheits-Generalschluessel_Marke_Eigenbau_webm-hd.webm"
        length="694157312"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8139-deu-eng-Hochsicherheits-Generalschluessel_Marke_Eigenbau_webm-hd.webm?1483100290</guid>
      <dc:identifier>155a622a-196e-4e05-a262-88f3a7726bbe</dc:identifier>
      <dc:date>2016-12-29T18:30:00+01:00</dc:date>
      <itunes:author>Michael Weiner, RFguy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>Die Verfügbarkeit preiswerter Maschinentechnik und Open Source CAD-Software hat den Aufwand des Herstellens eigener mechanischer Schlüssel signifikant abgesenkt, die wir noch vor zehn Jahren als „sicher“ bezeichnet haben.
Klassische Zylinderschlösser sind in der Vergangenheit bereits ausführlich analysiert worden, doch wie sieht die Situation bei anspruchsvolleren mechanischen Schließsystemen aus?
Wir zeigen, wie man den Generalschlüssel einer hoch präzisen, hochpreisigen Schließanlage ermittelt. Weiterhin präsentieren wir unseren Workflow der Software und Mechanik, mit dem man Rohlinge und Schlüssel eines Hochsicherheitssystem mit einer „Low Cost“ CNC-Fräse herstellen kann. Im Gegensatz zum 3D-Drucken bietet uns dies eine deutlich höhere Präzision und mechanische Stabilität - und das für unter 2 Euro pro Schlüssel.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8139.html
</itunes:summary>
      <itunes:duration>01:04:47</itunes:duration>
    </item>
    <item>
      <title>An Elevator to the Moon (and back) (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8407-an_elevator_to_the_moon_and_back</link>
      <description>Why is it so hard to go to the Moon? The curse of Newtonian Mechanics and Tsiolkovsky&#39;s Rocket Equation force us to build huge rockets to achieve any meaningful activity on the Moon. There are two strategies to hack the laws of celestial mechanics: making fuel on the Moon and using cables to climb out of the gravity well. Here we focus on the latter, which is the Moon version of the famous space elevator. The difference to an Earth elevator is - anelevator to the Moon&#39;s surface is realistic with today&#39;s materials. In the talk an introduction to the general problem is given and a starting point for a discussion is given that can easily lead to a sustainable access to the Moon if there is demand to do so.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8407.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8407-eng-deu-rus-An_Elevator_to_the_Moon_and_back_webm-hd.webm"
        length="630194176"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8407-eng-deu-rus-An_Elevator_to_the_Moon_and_back_webm-hd.webm?1483098816</guid>
      <dc:identifier>b5be9501-88f1-4d9f-a5aa-269c8ff22d37</dc:identifier>
      <dc:date>2016-12-29T18:30:00+01:00</dc:date>
      <itunes:author>Markus Landgraf</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Space</itunes:keywords>
      <itunes:subtitle>Space Transportation and the Extraterrestrial Imperative</itunes:subtitle>
      <itunes:summary>Why is it so hard to go to the Moon? The curse of Newtonian Mechanics and Tsiolkovsky&#39;s Rocket Equation force us to build huge rockets to achieve any meaningful activity on the Moon. There are two strategies to hack the laws of celestial mechanics: making fuel on the Moon and using cables to climb out of the gravity well. Here we focus on the latter, which is the Moon version of the famous space elevator. The difference to an Earth elevator is - anelevator to the Moon&#39;s surface is realistic with today&#39;s materials. In the talk an introduction to the general problem is given and a starting point for a discussion is given that can easily lead to a sustainable access to the Moon if there is demand to do so.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8407.html
</itunes:summary>
      <itunes:duration>01:01:28</itunes:duration>
    </item>
    <item>
      <title>How do we know our PRNGs work properly? (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8099-how_do_we_know_our_prngs_work_properly</link>
      <description>Pseudo-random number generators (PRNGs) are critical pieces of security
infrastructure. Yet, PRNGs are surprisingly difficult to design,
implement, and debug. The PRNG vulnerability that we recently found in
GnuPG/Libgcrypt (CVE-2016-6313) survived 18 years of service and several
expert audits. In this presentation, we not only describe the details of
the flaw but, based on our research, explain why the current state of
PRNG implementation and quality assurance downright provokes incidents.
We also present a PRNG analysis method that we developed and give
specific recommendations to implementors of software producing or
consuming pseudo-random numbers to ensure correctness.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8099.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8099-eng-deu-How_do_we_know_our_PRNGs_work_properly_webm-hd.webm"
        length="440401920"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8099-eng-deu-How_do_we_know_our_PRNGs_work_properly_webm-hd.webm?1483033741</guid>
      <dc:identifier>0d02bd82-f771-471c-b4bb-5e24b755b169</dc:identifier>
      <dc:date>2016-12-29T11:30:00+01:00</dc:date>
      <itunes:author>Vladimir Klebanov, Felix Dörre</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Pseudo-random number generators (PRNGs) are critical pieces of security
infrastructure. Yet, PRNGs are surprisingly difficult to design,
implement, and debug. The PRNG vulnerability that we recently found in
GnuPG/Libgcrypt (CVE-2016-6313) survived 18 years of service and several
expert audits. In this presentation, we not only describe the details of
the flaw but, based on our research, explain why the current state of
PRNG implementation and quality assurance downright provokes incidents.
We also present a PRNG analysis method that we developed and give
specific recommendations to implementors of software producing or
consuming pseudo-random numbers to ensure correctness.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8099.html
</itunes:summary>
      <itunes:duration>00:58:35</itunes:duration>
    </item>
    <item>
      <title>radare demystified (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8095-radare_demystified</link>
      <description>radare is a libre framework and a set of tools to ease several tasks related to reverse engineering, exploiting, forensics, binary patching, .. this year, the project gets 10 year old.

In the process, the design evolved and several new functionalities has appeared, defining better development rules, improving code reviews and introducing RDD and fuzzing as part of the development process. Constant refactoring, writing usage examples and documentation and giving talks, to enlarge the community has been key elements to reach the great user base and health the project lives nowadays.

This year, in order to celebrate the 10th anniversary, the author organized the first r2con, a congress around the tool that aims to be an excuse for sharing knowledge, tools, scripts about what different parties and people is doing with it.

The congress was pretty successful and allowed to meet developers, users and other interested parties for learning more about the future of the tool and understanding its capabilities.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8095.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8095-eng-deu-fra-radare_demystified_webm-hd.webm"
        length="551550976"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8095-eng-deu-fra-radare_demystified_webm-hd.webm?1483033928</guid>
      <dc:identifier>994082de-ef8e-4f8e-8c46-ec0eb110b845</dc:identifier>
      <dc:date>2016-12-29T11:30:00+01:00</dc:date>
      <itunes:author>pancake</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>after 1.0</itunes:subtitle>
      <itunes:summary>radare is a libre framework and a set of tools to ease several tasks related to reverse engineering, exploiting, forensics, binary patching, .. this year, the project gets 10 year old.

In the process, the design evolved and several new functionalities has appeared, defining better development rules, improving code reviews and introducing RDD and fuzzing as part of the development process. Constant refactoring, writing usage examples and documentation and giving talks, to enlarge the community has been key elements to reach the great user base and health the project lives nowadays.

This year, in order to celebrate the 10th anniversary, the author organized the first r2con, a congress around the tool that aims to be an excuse for sharing knowledge, tools, scripts about what different parties and people is doing with it.

The congress was pretty successful and allowed to meet developers, users and other interested parties for learning more about the future of the tool and understanding its capabilities.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8095.html
</itunes:summary>
      <itunes:duration>01:02:44</itunes:duration>
    </item>
    <item>
      <title>Million Dollar Dissidents and the Rest of Us (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8115-million_dollar_dissidents_and_the_rest_of_us</link>
      <description>In August 2016, Apple issued updates to iOS and macOS that patched three zero-day vulnerabilities that were being exploited in the wild to remotely install persistent malcode on a target’s device if they tapped on a specially crafted link. We linked the vulnerabilities and malcode to US-owned, Israel-based NSO Group, a government-exclusive surveillance vendor described by one of its founders as “a complete ghost”.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8115.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8115-eng-deu-fra-Million_Dollar_Dissidents_and_the_Rest_of_Us_webm-hd.webm"
        length="441450496"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8115-eng-deu-fra-Million_Dollar_Dissidents_and_the_Rest_of_Us_webm-hd.webm?1483033969</guid>
      <dc:identifier>a431b8a5-b8af-4ccf-bba2-7b1d88a782fb</dc:identifier>
      <dc:date>2016-12-29T11:30:00+01:00</dc:date>
      <itunes:author>Bill Marczak, John Scott-Railton</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Uncovering Nation-State Mobile Espionage in the Wild</itunes:subtitle>
      <itunes:summary>In August 2016, Apple issued updates to iOS and macOS that patched three zero-day vulnerabilities that were being exploited in the wild to remotely install persistent malcode on a target’s device if they tapped on a specially crafted link. We linked the vulnerabilities and malcode to US-owned, Israel-based NSO Group, a government-exclusive surveillance vendor described by one of its founders as “a complete ghost”.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8115.html
</itunes:summary>
      <itunes:duration>00:53:36</itunes:duration>
    </item>
    <item>
      <title>Eine kleine Geschichte der Parlamentsschlägerei (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8021-eine_kleine_geschichte_der_parlamentsschlagerei</link>
      <description>Der Vortrag gibt einen Abriss über die Geschichte der Parlamentsschlägerei, ordnet diese politisch und geografisch ein - um dann die verschiedenen Typen und Formen anhand von Videomaterial zu zeigen und gemeinsam zu analysieren.

Die beiden Vortragenden betreiben seit 2010 gemeinsam das weltweit einzige Fachblog für Parlamentsschlägereien.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8021.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8021-deu-eng-gsw-Eine_kleine_Geschichte_der_Parlamentsschlaegerei_webm-hd.webm"
        length="628097024"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 00:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8021-deu-eng-gsw-Eine_kleine_Geschichte_der_Parlamentsschlaegerei_webm-hd.webm?1483025133</guid>
      <dc:identifier>9d36932f-616a-4677-b924-60c1986fbbfc</dc:identifier>
      <dc:date>2016-12-29T00:15:00+01:00</dc:date>
      <itunes:author>Joachim Schautenbach, Pia Fortunata</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:subtitle>Schlagende Argumente, fliegende Fäuste</itunes:subtitle>
      <itunes:summary>Der Vortrag gibt einen Abriss über die Geschichte der Parlamentsschlägerei, ordnet diese politisch und geografisch ein - um dann die verschiedenen Typen und Formen anhand von Videomaterial zu zeigen und gemeinsam zu analysieren.

Die beiden Vortragenden betreiben seit 2010 gemeinsam das weltweit einzige Fachblog für Parlamentsschlägereien.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8021.html
</itunes:summary>
      <itunes:duration>00:26:38</itunes:duration>
    </item>
    <item>
      <title>SpiegelMining – Reverse Engineering von Spiegel-Online (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7912-spiegelmining_reverse_engineering_von_spiegel-online</link>
      <description>Seit Mitte 2014 hat David fast 100.000 Artikel von Spiegel-Online systematisch gespeichert. Diese Datenmasse wird er in einem bunten Vortrag vorstellen und erforschen.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7912.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7912-deu-eng-fra-SpiegelMining_-_Reverse_Engineering_von_Spiegel-Online_webm-hd.webm"
        length="413138944"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7912-deu-eng-fra-SpiegelMining_-_Reverse_Engineering_von_Spiegel-Online_webm-hd.webm?1483031452</guid>
      <dc:identifier>c300b194-2a85-4705-92aa-b4e789882303</dc:identifier>
      <dc:date>2016-12-28T21:45:00+01:00</dc:date>
      <itunes:author>David Kriesel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Wer denkt, Vorratsdatenspeicherungen und „Big Data“ sind harmlos, der kriegt hier eine Demo an Spiegel-Online.</itunes:subtitle>
      <itunes:summary>Seit Mitte 2014 hat David fast 100.000 Artikel von Spiegel-Online systematisch gespeichert. Diese Datenmasse wird er in einem bunten Vortrag vorstellen und erforschen.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7912.html
</itunes:summary>
      <itunes:duration>00:58:45</itunes:duration>
    </item>
    <item>
      <title>ATMs how to break them to stop the fraud (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8273-atms_how_to_break_them_to_stop_the_fraud</link>
      <description>How to stop the ATMs fraud? How to protect ATMs from attacks such as black box jackpotting? How to prevent network hijacking such as rogue processing center or MiTM? Some of these issues can be fixed by configuration means, some fixed by compensation measures, but many only by vendor. We will tell you about what bank can do now and what we as a community of security specialists should force to vendors.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8273.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8273-eng-deu-ATMs_how_to_break_them_to_stop_the_fraud_webm-hd.webm"
        length="501219328"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8273-eng-deu-ATMs_how_to_break_them_to_stop_the_fraud_webm-hd.webm?1483016810</guid>
      <dc:identifier>ef62eb53-cb69-42c6-aab0-bc9d3b0e1e92</dc:identifier>
      <dc:date>2016-12-28T23:00:00+01:00</dc:date>
      <itunes:author>Olga Kochetova, Alexey Osipov</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>How to stop the ATMs fraud? How to protect ATMs from attacks such as black box jackpotting? How to prevent network hijacking such as rogue processing center or MiTM? Some of these issues can be fixed by configuration means, some fixed by compensation measures, but many only by vendor. We will tell you about what bank can do now and what we as a community of security specialists should force to vendors.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8273.html
</itunes:summary>
      <itunes:duration>00:54:12</itunes:duration>
    </item>
    <item>
      <title>Code BROWN in the Air (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8042-code_brown_in_the_air</link>
      <description>The talk is about the paging system, an old technology in the 90&#39;s, used in healthcare, ICS and government, a systematic review of security impacts that it brought to us in the age of SDR, covering the United States, Canada, England and Japan.  By sniffing known pager frequencies in the general vicinity of hospitals, factories and public facilities with a $20 DVB-T, we discovered that not only is pager technology alive and kicking, but much of the traffic is not encrypted, resulting in violation of privacy laws and more importantly, leaks of sensitive information.  The talk is not about the protocol nor the hardware device.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8042.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8042-eng-deu-Code_BROWN_in_the_Air_webm-hd.webm"
        length="197132288"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8042-eng-deu-Code_BROWN_in_the_Air_webm-hd.webm?1483014392</guid>
      <dc:identifier>90c2f1c6-c32e-4bb2-b8a0-db6b4e24e4b3</dc:identifier>
      <dc:date>2016-12-28T23:00:00+01:00</dc:date>
      <itunes:author>miaoski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>A systemic update of sensitive information that you sniff from pagers</itunes:subtitle>
      <itunes:summary>The talk is about the paging system, an old technology in the 90&#39;s, used in healthcare, ICS and government, a systematic review of security impacts that it brought to us in the age of SDR, covering the United States, Canada, England and Japan.  By sniffing known pager frequencies in the general vicinity of hospitals, factories and public facilities with a $20 DVB-T, we discovered that not only is pager technology alive and kicking, but much of the traffic is not encrypted, resulting in violation of privacy laws and more importantly, leaks of sensitive information.  The talk is not about the protocol nor the hardware device.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8042.html
</itunes:summary>
      <itunes:duration>00:37:07</itunes:duration>
    </item>
    <item>
      <title>Fnord-Jahresrückblick (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7960-fnord-jahresruckblick</link>
      <description>Wenn mal wieder der Zensor pinkeln war, wenn DAMIT ja wohl NIEMAND rechnen konnte, wenn es um demokratisch legitimiertes Baumanagement oder um Stahlbälle geht, dann ist es wieder an der Zeit für eine lockere Abendshow mit den High- und Lowlights des Jahres.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7960.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7960-deu-eng-gsw-Fnord-Jahresrueckblick_webm-hd.webm"
        length="876609536"
        type="video/webm"/>
      <pubDate>Thu, 29 Dec 2016 00:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7960-deu-eng-gsw-Fnord-Jahresrueckblick_webm-hd.webm?1483021458</guid>
      <dc:identifier>f21478d4-e8db-4f19-854c-2f74b5824706</dc:identifier>
      <dc:date>2016-12-29T00:45:00+01:00</dc:date>
      <itunes:author>Fefe, frank</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:subtitle>Wir helfen euch, die Fnords zu sehen!</itunes:subtitle>
      <itunes:summary>Wenn mal wieder der Zensor pinkeln war, wenn DAMIT ja wohl NIEMAND rechnen konnte, wenn es um demokratisch legitimiertes Baumanagement oder um Stahlbälle geht, dann ist es wieder an der Zeit für eine lockere Abendshow mit den High- und Lowlights des Jahres.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7960.html
</itunes:summary>
      <itunes:duration>01:39:28</itunes:duration>
    </item>
    <item>
      <title>Durchmarsch von Rechts (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8439-durchmarsch_von_rechts</link>
      <description>Seit einigen Jahren formieren sich am rechten Rand der Gesellschaft explosionsartig neue rassistische, völkisch-nationalistische und offen nazistische Strömungen, Gruppen und Parteien. Einen erschreckenden Verstärker findet das neue braune Getöse in den sozialen Medien und sein Resonanzraum reicht inzwischen bis weit in die Mitte der Gesellschaft.

Teil des Problems sind institutioneller Rassismus in den Behörden und unkontrollierbare Geheimdienste, die den Mob gewähren lassen: Dafür bietet der NSU-Komplex ein erschütterndes Beispiel. Vor dem neuen, sehr lauten, in der Tendenz aber auch gewalttätigen und terroristischen Phänomen rechter Formierung stehen Linke und bürgerliche Mitte ziemlich verdattert und hilflos. 

Jetzt kommt es darauf an, diese Hilflosigkeit zu überwinden, das Geschehen zu analysieren und sich Gegenstrategien einfallen zu lassen. Das ist „unser“ Job. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8439.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8439-deu-eng-Durchmarsch_von_Rechts_webm-hd.webm"
        length="542113792"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8439-deu-eng-Durchmarsch_von_Rechts_webm-hd.webm?1483019514</guid>
      <dc:identifier>c9f7749d-c365-43ad-9869-1f014c9f1f06</dc:identifier>
      <dc:date>2016-12-28T23:00:00+01:00</dc:date>
      <itunes:author>Friedrich Burschel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>…und was wir dagegen tun können</itunes:subtitle>
      <itunes:summary>Seit einigen Jahren formieren sich am rechten Rand der Gesellschaft explosionsartig neue rassistische, völkisch-nationalistische und offen nazistische Strömungen, Gruppen und Parteien. Einen erschreckenden Verstärker findet das neue braune Getöse in den sozialen Medien und sein Resonanzraum reicht inzwischen bis weit in die Mitte der Gesellschaft.

Teil des Problems sind institutioneller Rassismus in den Behörden und unkontrollierbare Geheimdienste, die den Mob gewähren lassen: Dafür bietet der NSU-Komplex ein erschütterndes Beispiel. Vor dem neuen, sehr lauten, in der Tendenz aber auch gewalttätigen und terroristischen Phänomen rechter Formierung stehen Linke und bürgerliche Mitte ziemlich verdattert und hilflos. 

Jetzt kommt es darauf an, diese Hilflosigkeit zu überwinden, das Geschehen zu analysieren und sich Gegenstrategien einfallen zu lassen. Das ist „unser“ Job. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8439.html
</itunes:summary>
      <itunes:duration>01:00:19</itunes:duration>
    </item>
    <item>
      <title>Intercoms Hacking (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8027-intercoms_hacking</link>
      <description>&lt;p&gt;To break into a building, several methods have already been discussed, such as trying to find the code
paths of a digicode, clone RFID cards, use some social engineering attacks, or the use of archaic methods
like lockpicking a door lock or breaking a window.&lt;/p&gt;
&lt;p&gt;New methods are now possible with recent intercoms.
Indeed, these intercoms are used to call the tenants to access the building. But little study has been
performed on how these boxes communicate to request and grant access to the building.&lt;/p&gt;
&lt;p&gt;In the past, they were connected with wires directly to apartments. Now, these are more practical and
allow residents to open doors not only from their classic door phone, but to forward calls to their home
or mobile phone. Private houses are now equipped with these new devices and its common to find these
“connected” intercoms on recent and renovated buildings.&lt;/p&gt;
&lt;p&gt;In this short paper we introduce the Intercoms and focus on one particular device that is commonly
installed in buildings today. Then we present our analysis on an interesting attack vector, which already
has its own history. After this analysis, we present our environment to test the intercoms, and show some
practical attacks that could be performed on these devices. During this talks, the evolution of our mobile lab and some advances on the 3G intercoms, and M2M intercoms attacks will be also presented.&lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8027.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8027-eng-deu-Intercoms_Hacking_webm-hd.webm"
        length="271581184"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8027-eng-deu-Intercoms_Hacking_webm-hd.webm?1483016769</guid>
      <dc:identifier>8d0aed87-2484-4880-ae08-2dc3c7898959</dc:identifier>
      <dc:date>2016-12-28T21:45:00+01:00</dc:date>
      <itunes:author>Sebastien Dudek</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Call the frontdoor to install your backdoors</itunes:subtitle>
      <itunes:summary>&lt;p&gt;To break into a building, several methods have already been discussed, such as trying to find the code
paths of a digicode, clone RFID cards, use some social engineering attacks, or the use of archaic methods
like lockpicking a door lock or breaking a window.&lt;/p&gt;
&lt;p&gt;New methods are now possible with recent intercoms.
Indeed, these intercoms are used to call the tenants to access the building. But little study has been
performed on how these boxes communicate to request and grant access to the building.&lt;/p&gt;
&lt;p&gt;In the past, they were connected with wires directly to apartments. Now, these are more practical and
allow residents to open doors not only from their classic door phone, but to forward calls to their home
or mobile phone. Private houses are now equipped with these new devices and its common to find these
“connected” intercoms on recent and renovated buildings.&lt;/p&gt;
&lt;p&gt;In this short paper we introduce the Intercoms and focus on one particular device that is commonly
installed in buildings today. Then we present our analysis on an interesting attack vector, which already
has its own history. After this analysis, we present our environment to test the intercoms, and show some
practical attacks that could be performed on these devices. During this talks, the evolution of our mobile lab and some advances on the 3G intercoms, and M2M intercoms attacks will be also presented.&lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8027.html
</itunes:summary>
      <itunes:duration>00:40:50</itunes:duration>
    </item>
    <item>
      <title>Build your own NSA (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8034-build_your_own_nsa</link>
      <description>When thinking about surveillance, everyone worries about government agencies like the NSA and big corporations like Google and Facebook. But actually there are hundreds of companies that have also discovered data collection as a revenue source.  We decided to do an experiment: Using simple social engineering techniques, we tried to get the most personal you may have in your procession.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8034.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8034-deu-eng-fra-Build_your_own_NSA_webm-hd.webm"
        length="840957952"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8034-deu-eng-fra-Build_your_own_NSA_webm-hd.webm?1483014865</guid>
      <dc:identifier>1f7eb981-2819-4824-8f40-4ddde0be7bf3</dc:identifier>
      <dc:date>2016-12-28T20:30:00+01:00</dc:date>
      <itunes:author>Andreas Dewes, @sveckert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>How private companies leak your personal data into the public domain, and how you can buy it.</itunes:subtitle>
      <itunes:summary>When thinking about surveillance, everyone worries about government agencies like the NSA and big corporations like Google and Facebook. But actually there are hundreds of companies that have also discovered data collection as a revenue source.  We decided to do an experiment: Using simple social engineering techniques, we tried to get the most personal you may have in your procession.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8034.html
</itunes:summary>
      <itunes:duration>01:00:00</itunes:duration>
    </item>
    <item>
      <title>Shining some light on the Amazon Dash button (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8398-shining_some_light_on_the_amazon_dash_button</link>
      <description>This talk will explore the hard- and software of the Amazon Dash button.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8398.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8398-eng-deu-fra-Shining_some_light_on_the_Amazon_Dash_button_webm-hd.webm"
        length="371195904"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8398-eng-deu-fra-Shining_some_light_on_the_Amazon_Dash_button_webm-hd.webm?1483010566</guid>
      <dc:identifier>5ae90a09-0b83-4357-bdb4-9afc04100c68</dc:identifier>
      <dc:date>2016-12-28T23:00:00+01:00</dc:date>
      <itunes:author>hunz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>This talk will explore the hard- and software of the Amazon Dash button.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8398.html
</itunes:summary>
      <itunes:duration>00:53:19</itunes:duration>
    </item>
    <item>
      <title>The Untold Story of Edward Snowden’s Escape from Hong Kong (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8416-the_untold_story_of_edward_snowden_s_escape_from_hong_kong</link>
      <description>On June 9, 2013, Edward Snowden revealed massive civil rights abuses by the NSA. On June 10, Snowden didn’t know where to hide.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8416.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8416-eng-deu-fra-The_Untold_Story_of_Edward_Snowdens_Escape_from_Hong_Kong_webm-hd.webm"
        length="842006528"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8416-eng-deu-fra-The_Untold_Story_of_Edward_Snowdens_Escape_from_Hong_Kong_webm-hd.webm?1483009415</guid>
      <dc:identifier>1b27dbeb-cffc-48a1-b2e6-b2011c338a50</dc:identifier>
      <dc:date>2016-12-28T18:30:00+01:00</dc:date>
      <itunes:author>Lena Rohrbach, Sönke Iwersen, Robert Tibbo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>and How You Can Help the Refugees Who Saved His Life</itunes:subtitle>
      <itunes:summary>On June 9, 2013, Edward Snowden revealed massive civil rights abuses by the NSA. On June 10, Snowden didn’t know where to hide.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8416.html
</itunes:summary>
      <itunes:duration>01:05:13</itunes:duration>
    </item>
    <item>
      <title>SpinalHDL : An alternative hardware description language (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7873-spinalhdl_an_alternative_hardware_description_language</link>
      <description>Since too long we use VHDL and Verilog to describe hardware. SpinalHDL is an alternative language which does its best to prove that it is time to do a paradigm shift in hardware description.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7873.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7873-eng-deu-SpinalHDL_An_alternative_hardware_description_language_webm-hd.webm"
        length="292552704"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7873-eng-deu-SpinalHDL_An_alternative_hardware_description_language_webm-hd.webm?1482977669</guid>
      <dc:identifier>a57b8f0e-62ae-48d9-aa89-5ebfe5fdc056</dc:identifier>
      <dc:date>2016-12-28T21:45:00+01:00</dc:date>
      <itunes:author>Dolu1990</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>Since too long we use VHDL and Verilog to describe hardware. SpinalHDL is an alternative language which does its best to prove that it is time to do a paradigm shift in hardware description.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7873.html
</itunes:summary>
      <itunes:duration>00:45:50</itunes:duration>
    </item>
    <item>
      <title>Downgrading iOS: From past to present (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7888-downgrading_ios_from_past_to_present</link>
      <description>This talk is about the iOS secure boot chain and how it changed throughout different iOS versions, while focusing on downgrading despite countermesures. 
It will explain basics like what SHSH blobs and APTickets are and how IMG3 and IMG4 file format works.
Also a new technique called &quot;prometheus&quot; will be introduced which allows for the first time downgrading 64bit devices.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7888.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7888-eng-deu-Downgrading_iOS_From_past_to_present_webm-hd.webm"
        length="265289728"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7888-eng-deu-Downgrading_iOS_From_past_to_present_webm-hd.webm?1482977537</guid>
      <dc:identifier>149f13d4-cc8c-49a9-9e68-544754646022</dc:identifier>
      <dc:date>2016-12-28T20:30:00+01:00</dc:date>
      <itunes:author>tihmstar</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>This talk is about the iOS secure boot chain and how it changed throughout different iOS versions, while focusing on downgrading despite countermesures. 
It will explain basics like what SHSH blobs and APTickets are and how IMG3 and IMG4 file format works.
Also a new technique called &quot;prometheus&quot; will be introduced which allows for the first time downgrading 64bit devices.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7888.html
</itunes:summary>
      <itunes:duration>00:52:06</itunes:duration>
    </item>
    <item>
      <title>A world without blockchain (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8315-a_world_without_blockchain</link>
      <description>Instant money transfer, globally without borders and 24/7. That’s one of the promises of Bitcoin. But how does national and international money transfer work in the world of banks?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8315.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8315-eng-deu-A_world_without_blockchain_webm-hd.webm"
        length="421527552"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8315-eng-deu-A_world_without_blockchain_webm-hd.webm?1482978092</guid>
      <dc:identifier>f6811c99-96af-44d5-b82d-5afe826b2caf</dc:identifier>
      <dc:date>2016-12-28T18:30:00+01:00</dc:date>
      <itunes:author>Mark van Cuijk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>How (inter)national money transfers works</itunes:subtitle>
      <itunes:summary>Instant money transfer, globally without borders and 24/7. That’s one of the promises of Bitcoin. But how does national and international money transfer work in the world of banks?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8315.html
</itunes:summary>
      <itunes:duration>00:42:07</itunes:duration>
    </item>
    <item>
      <title>Lightning Talks Day 2 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8087-lightning_talks_day_2</link>
      <description>&lt;p&gt;Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8087.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8087-eng-deu-Lightning_Talks_Day_2_webm-hd.webm"
        length="849346560"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8087-eng-deu-Lightning_Talks_Day_2_webm-hd.webm?1483012090</guid>
      <dc:identifier>090675f6-f86e-4082-886b-e13c9c837ecb</dc:identifier>
      <dc:date>2016-12-28T12:45:00+01:00</dc:date>
      <itunes:author>gedsic, bigalex</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:subtitle>Lightning Talks</itunes:subtitle>
      <itunes:summary>&lt;p&gt;Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8087.html
</itunes:summary>
      <itunes:duration>02:00:35</itunes:duration>
    </item>
    <item>
      <title>Copywrongs 2.0 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8229-copywrongs_2_0</link>
      <description>EU copyright reform plans threaten freedom of expression: Commissioner Günther Oettinger wants to make sharing even the tiniest snippets of news content subject to costly licensing, and obligate internet platforms to monitor all user uploads. We can still stop these proposals – if you join the fight now.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8229.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8229-eng-deu-fra-Copywrongs_20_webm-hd.webm"
        length="602931200"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8229-eng-deu-fra-Copywrongs_20_webm-hd.webm?1482977876</guid>
      <dc:identifier>bfc2ab1f-8384-4d7d-801a-dde8c81e039c</dc:identifier>
      <dc:date>2016-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Julia Reda</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>We must prevent EU copyright reform from breaking the internet</itunes:subtitle>
      <itunes:summary>EU copyright reform plans threaten freedom of expression: Commissioner Günther Oettinger wants to make sharing even the tiniest snippets of news content subject to costly licensing, and obligate internet platforms to monitor all user uploads. We can still stop these proposals – if you join the fight now.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8229.html
</itunes:summary>
      <itunes:duration>01:01:25</itunes:duration>
    </item>
    <item>
      <title>Stopping law enforcement hacking (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8136-stopping_law_enforcement_hacking</link>
      <description>We didn’t win the second crypto wars. Governments merely made a strategic retreat and they’ll be back. Although they will likely give up on trying to regulate or prohibit encryption, we should expect that malware and law enforcement hacking will play a starring role in the next battle in the crypto wars.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8136.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8136-eng-Stopping_law_enforcement_hacking_webm-hd.webm"
        length="412090368"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8136-eng-Stopping_law_enforcement_hacking_webm-hd.webm?1482977604</guid>
      <dc:identifier>9e02145e-1d65-4398-b8e2-bd4c1faee0fa</dc:identifier>
      <dc:date>2016-12-28T18:30:00+01:00</dc:date>
      <itunes:author>Christopher Soghoian</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>We didn’t win the second crypto wars. Governments merely made a strategic retreat and they’ll be back. Although they will likely give up on trying to regulate or prohibit encryption, we should expect that malware and law enforcement hacking will play a starring role in the next battle in the crypto wars.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8136.html
</itunes:summary>
      <itunes:duration>01:04:22</itunes:duration>
    </item>
    <item>
      <title>Searchwing - Mit Drohnen leben retten (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7963-searchwing_-_mit_drohnen_leben_retten</link>
      <description>Refugees are dying in the Mediterranean Sea. Thousands of them. 
We are building fixed wing drones, autonomously searching for refugee-vessels in a radius of 50km around a base-ship. 
The association &quot;Seawatch e.V.&quot; has bought two well equipped Ships to help and rescue those people. But to help them we first have to find them.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7963.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7963-deu-eng-Searchwing_-_Mit_Drohnen_leben_retten_webm-hd.webm"
        length="888143872"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7963-deu-eng-Searchwing_-_Mit_Drohnen_leben_retten_webm-hd.webm?1482977413</guid>
      <dc:identifier>c45fa431-69f9-47db-a90c-fb596efdcb55</dc:identifier>
      <dc:date>2016-12-28T17:15:00+01:00</dc:date>
      <itunes:author>Steini, Ruben Neugebauer, benthor</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>Refugees are dying in the Mediterranean Sea. Thousands of them. 
We are building fixed wing drones, autonomously searching for refugee-vessels in a radius of 50km around a base-ship. 
The association &quot;Seawatch e.V.&quot; has bought two well equipped Ships to help and rescue those people. But to help them we first have to find them.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7963.html
</itunes:summary>
      <itunes:duration>01:01:04</itunes:duration>
    </item>
    <item>
      <title>Einführung zu Blockchains (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7824-einfuhrung_zu_blockchains</link>
      <description>Blockchain ist die Technologie welche moderne Kryptowährungen ermöglicht. In dem Vortrag wird die Funktionsweise von Blockchains ganz allgemein erklärt. Anhand der Bitcoin Blockchain wird ausserdem gezeigt, wie diese Funktionen in einem echten System umgesetzt werden können.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7824.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7824-deu-eng-fra-Einfuehrung_zu_Blockchains_webm-hd.webm"
        length="455081984"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7824-deu-eng-fra-Einfuehrung_zu_Blockchains_webm-hd.webm?1482978372</guid>
      <dc:identifier>4ef69e6a-026f-4b30-888d-af654b220a3d</dc:identifier>
      <dc:date>2016-12-28T17:15:00+01:00</dc:date>
      <itunes:author>vimja</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Blockchain ist die Technologie welche moderne Kryptowährungen ermöglicht. In dem Vortrag wird die Funktionsweise von Blockchains ganz allgemein erklärt. Anhand der Bitcoin Blockchain wird ausserdem gezeigt, wie diese Funktionen in einem echten System umgesetzt werden können.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7824.html
</itunes:summary>
      <itunes:duration>01:01:24</itunes:duration>
    </item>
    <item>
      <title>Formal Verification of Verilog HDL with Yosys-SMTBMC (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7922-formal_verification_of_verilog_hdl_with_yosys-smtbmc</link>
      <description>Yosys is a free and open source Verilog synthesis tool and more. It gained prominence last year because of its role as synthesis tool in the Project IceStorm FOSS Verilog-to-bitstream flow for iCE40 FPGAs. This presentation however dives into the Yosys-SMTBMC formal verification flow that can be used for verifying formal properties using bounded model checks and/or temporal induction.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7922.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7922-eng-deu-Formal_Verification_of_Verilog_HDL_with_Yosys-SMTBMC_webm-hd.webm"
        length="424673280"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7922-eng-deu-Formal_Verification_of_Verilog_HDL_with_Yosys-SMTBMC_webm-hd.webm?1483008867</guid>
      <dc:identifier>0a3b7891-6446-4ef7-afc4-e95c21193c68</dc:identifier>
      <dc:date>2016-12-28T17:15:00+01:00</dc:date>
      <itunes:author>Clifford</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>Yosys is a free and open source Verilog synthesis tool and more. It gained prominence last year because of its role as synthesis tool in the Project IceStorm FOSS Verilog-to-bitstream flow for iCE40 FPGAs. This presentation however dives into the Yosys-SMTBMC formal verification flow that can be used for verifying formal properties using bounded model checks and/or temporal induction.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7922.html
</itunes:summary>
      <itunes:duration>00:52:24</itunes:duration>
    </item>
    <item>
      <title>On the Security and Privacy of Modern Single Sign-On in the Web (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7827-on_the_security_and_privacy_of_modern_single_sign-on_in_the_web</link>
      <description>&lt;p&gt;Many web sites allow users to log in with their Facebook or Google account. This so-called Web single sign-on (SSO) often uses the standard protocols OAuth and OpenID Connect. How secure are these protocols?  What can go wrong?&lt;/p&gt;

&lt;p&gt;OAuth and OpenID Connect do not protect your privacy at all, i.e., your identity provider (e.g., Facebook or Google) can always track, where you log in. Mozilla tried to create an authentication protocol that aimed to prevent tracking: BrowserID (a.k.a. Persona). Did their proposition really solve the privacy issue? What are the lessons learned and can we do better?&lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7827.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7827-eng-deu-On_the_Security_and_Privacy_of_Modern_Single_Sign-On_in_the_Web_webm-hd.webm"
        length="466616320"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 18:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7827-eng-deu-On_the_Security_and_Privacy_of_Modern_Single_Sign-On_in_the_Web_webm-hd.webm?1483008526</guid>
      <dc:identifier>7ef9172a-e2c7-4e78-9316-08449bd582c6</dc:identifier>
      <dc:date>2016-12-28T18:30:00+01:00</dc:date>
      <itunes:author>Guido Schmitz (gtrs), dfett</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>(Not Only) Attacks on OAuth and OpenID Connect</itunes:subtitle>
      <itunes:summary>&lt;p&gt;Many web sites allow users to log in with their Facebook or Google account. This so-called Web single sign-on (SSO) often uses the standard protocols OAuth and OpenID Connect. How secure are these protocols?  What can go wrong?&lt;/p&gt;

&lt;p&gt;OAuth and OpenID Connect do not protect your privacy at all, i.e., your identity provider (e.g., Facebook or Google) can always track, where you log in. Mozilla tried to create an authentication protocol that aimed to prevent tracking: BrowserID (a.k.a. Persona). Did their proposition really solve the privacy issue? What are the lessons learned and can we do better?&lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7827.html
</itunes:summary>
      <itunes:duration>01:04:04</itunes:duration>
    </item>
    <item>
      <title>3 Years After Snowden: Is Germany fighting State Surveillance? (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8117-3_years_after_snowden_is_germany_fighting_state_surveillance</link>
      <description>&lt;p&gt;Germany has a good reputation for strong data protection. It also features the only parliamentary inquiry committee investigating the Snowden revelations. But what are actual results of parliamentary, journalistic and public engagement?&lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8117.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8117-eng-deu-3_Years_After_Snowden_Is_Germany_fighting_State_Surveillance_webm-hd.webm"
        length="727711744"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 17:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8117-eng-deu-3_Years_After_Snowden_Is_Germany_fighting_State_Surveillance_webm-hd.webm?1483008482</guid>
      <dc:identifier>4745fbc3-87d4-41eb-8c82-2c1bb8a51beb</dc:identifier>
      <dc:date>2016-12-28T17:15:00+01:00</dc:date>
      <itunes:author>anna, Andre Meister</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>A Closer Look at the Political Reactions to Mass Surveillance in Germany</itunes:subtitle>
      <itunes:summary>&lt;p&gt;Germany has a good reputation for strong data protection. It also features the only parliamentary inquiry committee investigating the Snowden revelations. But what are actual results of parliamentary, journalistic and public engagement?&lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8117.html
</itunes:summary>
      <itunes:duration>01:04:09</itunes:duration>
    </item>
    <item>
      <title>Die Sprache der Populisten (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8037-die_sprache_der_populisten</link>
      <description>Mit dem Erstarken der Rechtspopulisten (nicht nur in Deutschland) werden populistische Positionen immer häufiger hingenommen, obwohl es sich dabei um vermeintliche &quot;Gewissenheiten&quot; handelt, die bei näherer Betrachtung inakzeptabel sind. Solche Positionen beruhen nicht auf einer nachvollziehbaren Argumentation, sondern auf sprachlich-rhetorischen Tricks, die im Grunde leicht zu durchschauen sind, denen jedoch immer mehr Menschen auf den Leim gehen. Dieser Vortrag soll zeigen, welche Tricks das sind und wie Populisten demaskiert werden können. Dabei wird deutlich werden, dass nicht nur eine Partei für populistische Parolen anfällig ist.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8037.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8037-deu-eng-fra-Die_Sprache_der_Populisten_webm-hd.webm"
        length="707788800"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8037-deu-eng-fra-Die_Sprache_der_Populisten_webm-hd.webm?1483007559</guid>
      <dc:identifier>6347d122-daf0-4b30-851c-32cac06bf6bd</dc:identifier>
      <dc:date>2016-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Martin Haase/maha</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Wie politische &quot;Gewissheiten&quot; sprachlich konstruiert werden</itunes:subtitle>
      <itunes:summary>Mit dem Erstarken der Rechtspopulisten (nicht nur in Deutschland) werden populistische Positionen immer häufiger hingenommen, obwohl es sich dabei um vermeintliche &quot;Gewissenheiten&quot; handelt, die bei näherer Betrachtung inakzeptabel sind. Solche Positionen beruhen nicht auf einer nachvollziehbaren Argumentation, sondern auf sprachlich-rhetorischen Tricks, die im Grunde leicht zu durchschauen sind, denen jedoch immer mehr Menschen auf den Leim gehen. Dieser Vortrag soll zeigen, welche Tricks das sind und wie Populisten demaskiert werden können. Dabei wird deutlich werden, dass nicht nur eine Partei für populistische Parolen anfällig ist.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8037.html
</itunes:summary>
      <itunes:duration>00:59:03</itunes:duration>
    </item>
    <item>
      <title>Hacking Reality (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8317-hacking_reality</link>
      <description>Inspired by a long history of bold reality hacks this talk considers the kinds of potentials opening up through emerging Virtual Reality (VR) and Mixed Reality technologies. In this current moment of climate crisis and structural metamorphosis how can we work with powerful immersive technologies to understand our own perceptual systems, to radically communicate and to innovate new ways of being together?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8317.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8317-eng-deu-Hacking_Reality_webm-hd.webm"
        length="714080256"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8317-eng-deu-Hacking_Reality_webm-hd.webm?1483007678</guid>
      <dc:identifier>2f586f3b-5399-496c-ab03-c25ad8ea8cf6</dc:identifier>
      <dc:date>2016-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Kate Genevieve </itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Mixed Reality and multi-sensory communication    </itunes:subtitle>
      <itunes:summary>Inspired by a long history of bold reality hacks this talk considers the kinds of potentials opening up through emerging Virtual Reality (VR) and Mixed Reality technologies. In this current moment of climate crisis and structural metamorphosis how can we work with powerful immersive technologies to understand our own perceptual systems, to radically communicate and to innovate new ways of being together?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8317.html
</itunes:summary>
      <itunes:duration>01:00:06</itunes:duration>
    </item>
    <item>
      <title>No USB? No problem. (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8031-no_usb_no_problem</link>
      <description>How to get USB running on an ARM microcontroller that has no built in USB hardware.  We&#39;ll cover electrical requirements, pin assignments, and microcontroller considerations, then move all the way up the stack to creating a bidirectional USB HID communications layer entirely in software.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8031.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8031-eng-deu-No_USB_No_problem_webm-hd.webm"
        length="432013312"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8031-eng-deu-No_USB_No_problem_webm-hd.webm?1483007991</guid>
      <dc:identifier>e204268f-0cea-4a1f-bb38-e7d50496492e</dc:identifier>
      <dc:date>2016-12-28T16:00:00+01:00</dc:date>
      <itunes:author>Xobs</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>How to write an open source bit-bang low-speed USB stack running on a sub-$1 Cortex M0+</itunes:subtitle>
      <itunes:summary>How to get USB running on an ARM microcontroller that has no built in USB hardware.  We&#39;ll cover electrical requirements, pin assignments, and microcontroller considerations, then move all the way up the stack to creating a bidirectional USB HID communications layer entirely in software.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8031.html
</itunes:summary>
      <itunes:duration>00:57:01</itunes:duration>
    </item>
    <item>
      <title>Space making/space shaping (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7958-space_making_space_shaping</link>
      <description>What are the politics and aesthetics of mapping? An introduction how cartography shapes cities and landscapes, creates borders and determines the perception of our environment. How an evolving mix of high-resolution satellite imagery, algorithm-based mappings and the huge amount of data of digitized cities will enhance these effects? And in contrast, how can maps be designed, that question the “objectivity” and “correctness” of conventional cartography?

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7958.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7958-deu-eng-Space_making_space_shaping_webm-hd.webm"
        length="354418688"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7958-deu-eng-Space_making_space_shaping_webm-hd.webm?1482950411</guid>
      <dc:identifier>e4eb4104-b9e7-4e99-bcb2-d10ddff3e19a</dc:identifier>
      <dc:date>2016-12-27T16:00:00+01:00</dc:date>
      <itunes:author>Ulf Treger</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>How mapping creates space, shapes cities and our view of the world.</itunes:subtitle>
      <itunes:summary>What are the politics and aesthetics of mapping? An introduction how cartography shapes cities and landscapes, creates borders and determines the perception of our environment. How an evolving mix of high-resolution satellite imagery, algorithm-based mappings and the huge amount of data of digitized cities will enhance these effects? And in contrast, how can maps be designed, that question the “objectivity” and “correctness” of conventional cartography?

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7958.html
</itunes:summary>
      <itunes:duration>00:33:34</itunes:duration>
    </item>
    <item>
      <title>Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8074-recount_2016_an_uninvited_security_audit_of_the_u_s_presidential_election</link>
      <description>The 2016 U.S. presidential election was preceded by unprecedented cyberattacks and produced a result that surprised many people in the U.S. and abroad.  Was it hacked?  To find out, we teamed up with scientists and lawyers from around the country&amp;mdash;and a presidential candidate&amp;mdash;to initiate the first presidential election recounts motivated primarily by e-voting security concerns.  In this talk, we will explain how the recounts took place, what we learned about the integrity of the election, and what needs to change to ensure that future U.S. elections are secure.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8074.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8074-eng-deu-rus-Recount_2016_An_Uninvited_Security_Audit_of_the_US_Presidential_Election_webm-hd.webm"
        length="612368384"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 14:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8074-eng-deu-rus-Recount_2016_An_Uninvited_Security_Audit_of_the_US_Presidential_Election_webm-hd.webm?1483089562</guid>
      <dc:identifier>56b62043-b92d-4b32-b5d0-b78d8fbcbb24</dc:identifier>
      <dc:date>2016-12-28T14:30:00+01:00</dc:date>
      <itunes:author>Matt  Bernhard, J. Alex Halderman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>The 2016 U.S. presidential election was preceded by unprecedented cyberattacks and produced a result that surprised many people in the U.S. and abroad.  Was it hacked?  To find out, we teamed up with scientists and lawyers from around the country&amp;mdash;and a presidential candidate&amp;mdash;to initiate the first presidential election recounts motivated primarily by e-voting security concerns.  In this talk, we will explain how the recounts took place, what we learned about the integrity of the election, and what needs to change to ensure that future U.S. elections are secure.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8074.html
</itunes:summary>
      <itunes:duration>01:00:05</itunes:duration>
    </item>
    <item>
      <title>Lockpicking in the IoT (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8019-lockpicking_in_the_iot</link>
      <description>&quot;Smart&quot; devices using BTLE, a mobile phone and the Internet are becoming more and more popular. We will be using mechanical and electronic hardware attacks, TLS MitM, BTLE sniffing and App decompilation to show why those devices and their manufacturers aren&#39;t always that smart after all. And that even AES128 on top of the BTLE layer doesn&#39;t have to mean &quot;unbreakable&quot;. Our main target will be electronic locks, but the methods shown apply to many other smart devices as well...
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8019.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT_webm-hd.webm"
        length="428867584"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT_webm-hd.webm?1482951770</guid>
      <dc:identifier>8c32309e-7136-4899-8ee4-1558e63ad137</dc:identifier>
      <dc:date>2016-12-27T21:45:00+01:00</dc:date>
      <itunes:author>Ray</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>...or why adding BTLE to a device sometimes isn&#39;t smart at all</itunes:subtitle>
      <itunes:summary>&quot;Smart&quot; devices using BTLE, a mobile phone and the Internet are becoming more and more popular. We will be using mechanical and electronic hardware attacks, TLS MitM, BTLE sniffing and App decompilation to show why those devices and their manufacturers aren&#39;t always that smart after all. And that even AES128 on top of the BTLE layer doesn&#39;t have to mean &quot;unbreakable&quot;. Our main target will be electronic locks, but the methods shown apply to many other smart devices as well...
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8019.html
</itunes:summary>
      <itunes:duration>01:00:40</itunes:duration>
    </item>
    <item>
      <title>Welcome to the Anthropocene? (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7860-welcome_to_the_anthropocene</link>
      <description>The Anthropocene is widely understood to mean the current &lt;em&gt;&amp;quot;period of Earth&#39;s history during which humans have a decisive influence on the state, dynamics and future&amp;quot;&lt;/em&gt; of this planet. For several years, scientists in the &lt;a href=&quot;http://quaternary.stratigraphy.org/workinggroups/anthropocene/&quot; title=&quot;Website of the Working Group on the &amp;#39;Anthropocene&amp;#39; (AWG)&quot;&gt;Working Group on the &#39;Anthropocene&#39; (AWG)&lt;/a&gt; have &lt;a href=&quot;https://www2.le.ac.uk/offices/press/press-releases/2016/august/media-note-anthropocene-working-group-awg&quot; title=&quot;Media note on AWG recommendations&quot;&gt;worked (and voted!)&lt;/a&gt; on defining the beginning of the Anthropocene in geochemical terms. The mid-20&lt;sup&gt;th&lt;/sup&gt; century provides an obvious geochemical &#39;timestamp&#39;: fallout from &lt;a href=&quot;https://media.ccc.de/v/31c3_-_6121_-_en_-_saal_2_-_201412291715_-_what_ever_happened_to_nuclear_weapons_-_michael_buker&quot; title=&quot;Michael Büker&amp;#39;s &amp;#39;What Ever Happened to Nuclear Weapons?&amp;#39; talk at 31c3&quot;&gt;nuclear weapons detonations&lt;/a&gt;. Which other chemicals and timestamps are being considered for marking the Anthropocene&#39;s start? How is &#39;define-by-committee&#39; even working out for &lt;a href=&quot;http://www.stratigraphy.org/index.php/ics-chart-timescale&quot; title=&quot;International Chronostratigraphic Chart AKA Geological Timescale&quot;&gt;geological epochs&lt;/a&gt;? This talk boils the scientific background of the Anthropocene debate down for non-stratigraphers.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7860.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7860-eng-deu-Welcome_to_the_Anthropocene_webm-hd.webm"
        length="182452224"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 13:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7860-eng-deu-Welcome_to_the_Anthropocene_webm-hd.webm?1482952593</guid>
      <dc:identifier>599ef527-fc3f-4474-8137-cf0e49cf118f</dc:identifier>
      <dc:date>2016-12-28T13:00:00+01:00</dc:date>
      <itunes:author>KaLeiMai</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>(Did) We Accidentally a New Geological Epoch(?)</itunes:subtitle>
      <itunes:summary>The Anthropocene is widely understood to mean the current &lt;em&gt;&amp;quot;period of Earth&#39;s history during which humans have a decisive influence on the state, dynamics and future&amp;quot;&lt;/em&gt; of this planet. For several years, scientists in the &lt;a href=&quot;http://quaternary.stratigraphy.org/workinggroups/anthropocene/&quot; title=&quot;Website of the Working Group on the &amp;#39;Anthropocene&amp;#39; (AWG)&quot;&gt;Working Group on the &#39;Anthropocene&#39; (AWG)&lt;/a&gt; have &lt;a href=&quot;https://www2.le.ac.uk/offices/press/press-releases/2016/august/media-note-anthropocene-working-group-awg&quot; title=&quot;Media note on AWG recommendations&quot;&gt;worked (and voted!)&lt;/a&gt; on defining the beginning of the Anthropocene in geochemical terms. The mid-20&lt;sup&gt;th&lt;/sup&gt; century provides an obvious geochemical &#39;timestamp&#39;: fallout from &lt;a href=&quot;https://media.ccc.de/v/31c3_-_6121_-_en_-_saal_2_-_201412291715_-_what_ever_happened_to_nuclear_weapons_-_michael_buker&quot; title=&quot;Michael Büker&amp;#39;s &amp;#39;What Ever Happened to Nuclear Weapons?&amp;#39; talk at 31c3&quot;&gt;nuclear weapons detonations&lt;/a&gt;. Which other chemicals and timestamps are being considered for marking the Anthropocene&#39;s start? How is &#39;define-by-committee&#39; even working out for &lt;a href=&quot;http://www.stratigraphy.org/index.php/ics-chart-timescale&quot; title=&quot;International Chronostratigraphic Chart AKA Geological Timescale&quot;&gt;geological epochs&lt;/a&gt;? This talk boils the scientific background of the Anthropocene debate down for non-stratigraphers.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7860.html
</itunes:summary>
      <itunes:duration>00:28:42</itunes:duration>
    </item>
    <item>
      <title>Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8418-von_kaffeeriechern_abtrittanbietern_und_fischbeinreissern</link>
      <description>Aus ihrem Buch „Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern – Berufe aus vergangenen Zeiten“: es geht darin um Berufe, die einfach verschwunden sind, deren Bezeichnung bereits in Bedeutungslosigkeit versunken sind. Aber was machte z.B. ein Kaffeeriecher? Er war kein Hipster-Barista, sondern ein Auswuchs der Politik von Friedrich II.: durch den Schmuggel von Kaffeebohnen sah sich Friedrich II genötigt, ausgediente Kriegsveteranen durch Berlin zu schicken. Sie durften in die Häuser der Bürger eindringen, um unversteuerten Kaffee aufzufinden. Sie verletzten dabei die Privatsphäre und schnüffelten buchstäblich nach einem Vergehen. Anders als die Überwachung im Netz heute waren sie laut und derb und nicht unsichtbar. Den Bürgern waren sie so verhasst, dass sie sich gegen sie aufbäumten. Nach nur acht Jahre war der Spuk vorbei, die Kaffeeriecher wurden durch Protest des Volkes ausrangiert. Wäre es heute nur so einfach.

Akribisch nach Fakten, Formen und Verbindungen suchend, entstand auch die Auftragsarbeit „Altes Handwerk“ , für die Stiftung Preußischer Kulturbesitz: ein Jahr lang wühlte Michaela Vieser in den Archiven des BPK: zum Teil lagen die Bilder in einer alten Kegelbahn in einem Offizierskasino in Charlottenburg. Die Fotografien stammen aus einer Zeit, als der Fotograf selbst noch Handwerker war. Anhand der Bilder lassen sich Ästhetik und Funktionalität des neuen Berufes klar erkennen. Das Buch wurde gemeinsam in einem Interview mit dem Bundesarbeitsminister im Radio vorgestellt, es war über zwei Jahre lang das wichtigste Buch des Verlags Braun editions.

Im Folgewerk „Das Zeitalter der Maschinen – Von der Industrialisierung des Lebens“ geht es um den Übergang in die Industrielle Revolution:
„Die Zeit“ schreibt: „Seit der Industrialisierung bestimmen Maschinen unseren Alltag – damals waren sie aus Eisen und Stahl, und manche überlebensgroß. Heute denken wir über die winzigen Chips schon gar nicht mehr nach, die Smartphones oder Autos steuern. Doch damals revolutionierten die Maschinen nicht nur die Wirtschaft, sondern das ganze Leben. Ein neuer Bildband vermittelt einen Eindruck davon, wie sehr.“ Michaela Vieser zieht im Vorwort die Parallele zur Digitalen Revolution.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8418.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8418-deu-eng-Von_Kaffeeriechern_Abtrittanbietern_und_Fischbeinreissern_webm-hd.webm"
        length="243269632"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 14:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8418-deu-eng-Von_Kaffeeriechern_Abtrittanbietern_und_Fischbeinreissern_webm-hd.webm?1482960168</guid>
      <dc:identifier>69ce21df-4bf5-43ce-a500-ac7707ee64b7</dc:identifier>
      <dc:date>2016-12-28T14:30:00+01:00</dc:date>
      <itunes:author>Michaela Vieser</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Berufe aus vergangenen Zeiten</itunes:subtitle>
      <itunes:summary>Aus ihrem Buch „Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern – Berufe aus vergangenen Zeiten“: es geht darin um Berufe, die einfach verschwunden sind, deren Bezeichnung bereits in Bedeutungslosigkeit versunken sind. Aber was machte z.B. ein Kaffeeriecher? Er war kein Hipster-Barista, sondern ein Auswuchs der Politik von Friedrich II.: durch den Schmuggel von Kaffeebohnen sah sich Friedrich II genötigt, ausgediente Kriegsveteranen durch Berlin zu schicken. Sie durften in die Häuser der Bürger eindringen, um unversteuerten Kaffee aufzufinden. Sie verletzten dabei die Privatsphäre und schnüffelten buchstäblich nach einem Vergehen. Anders als die Überwachung im Netz heute waren sie laut und derb und nicht unsichtbar. Den Bürgern waren sie so verhasst, dass sie sich gegen sie aufbäumten. Nach nur acht Jahre war der Spuk vorbei, die Kaffeeriecher wurden durch Protest des Volkes ausrangiert. Wäre es heute nur so einfach.

Akribisch nach Fakten, Formen und Verbindungen suchend, entstand auch die Auftragsarbeit „Altes Handwerk“ , für die Stiftung Preußischer Kulturbesitz: ein Jahr lang wühlte Michaela Vieser in den Archiven des BPK: zum Teil lagen die Bilder in einer alten Kegelbahn in einem Offizierskasino in Charlottenburg. Die Fotografien stammen aus einer Zeit, als der Fotograf selbst noch Handwerker war. Anhand der Bilder lassen sich Ästhetik und Funktionalität des neuen Berufes klar erkennen. Das Buch wurde gemeinsam in einem Interview mit dem Bundesarbeitsminister im Radio vorgestellt, es war über zwei Jahre lang das wichtigste Buch des Verlags Braun editions.

Im Folgewerk „Das Zeitalter der Maschinen – Von der Industrialisierung des Lebens“ geht es um den Übergang in die Industrielle Revolution:
„Die Zeit“ schreibt: „Seit der Industrialisierung bestimmen Maschinen unseren Alltag – damals waren sie aus Eisen und Stahl, und manche überlebensgroß. Heute denken wir über die winzigen Chips schon gar nicht mehr nach, die Smartphones oder Autos steuern. Doch damals revolutionierten die Maschinen nicht nur die Wirtschaft, sondern das ganze Leben. Ein neuer Bildband vermittelt einen Eindruck davon, wie sehr.“ Michaela Vieser zieht im Vorwort die Parallele zur Digitalen Revolution.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8418.html
</itunes:summary>
      <itunes:duration>00:27:19</itunes:duration>
    </item>
    <item>
      <title>Haft für Whistleblower? (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8181-haft_fur_whistleblower</link>
      <description>Der neue Straftatbestand der Datenhehlerei gem. § 202d StGB kriminalisiert Whistleblower und droht mit Haftstrafe bis zu drei Jahren oder Geldstrafe. Das schwächt die Zivilgesellschaft und verhindert wichtige demokratische Aufklärungsprozesse.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8181.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8181-deu-eng-fra-Haft_fuer_Whistleblower_webm-hd.webm"
        length="275775488"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 14:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8181-deu-eng-fra-Haft_fuer_Whistleblower_webm-hd.webm?1482949060</guid>
      <dc:identifier>c849ebc8-b3b9-49fb-a9a2-ebef217c80b6</dc:identifier>
      <dc:date>2016-12-28T14:30:00+01:00</dc:date>
      <itunes:author>RA Ulrich Kerner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Demokratiefeindliches Strafrecht: Die Datenhehlerei gem. § 202d StGB</itunes:subtitle>
      <itunes:summary>Der neue Straftatbestand der Datenhehlerei gem. § 202d StGB kriminalisiert Whistleblower und droht mit Haftstrafe bis zu drei Jahren oder Geldstrafe. Das schwächt die Zivilgesellschaft und verhindert wichtige demokratische Aufklärungsprozesse.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8181.html
</itunes:summary>
      <itunes:duration>00:34:59</itunes:duration>
    </item>
    <item>
      <title>Wheel of Fortune (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7949-wheel_of_fortune</link>
      <description>Secure random number generators play a crucial role in the wider security ecosystem. In the absence of a dedicated hardware True Random Number Generator (TRNG), computer systems have to resort to a software (cryptographically secure) Pseudo-Random Number Generator (CSPRNG). Since the (secure) design of a CSPRNG is an involved and complicated effort and since randomness is such a security-critical resource, many operating systems provide a CSPRNG as a core system service and many popular security software products assume their presence. The constraints imposed by the embedded world, however, pose a variety of unique challenges to proper OS (CS)PRNG design and implementation which have historically resulted in security failures. In this talk we will discuss these challenges, how they affect the quality of (CS)PRNGs in embedded operating systems and illustrate our arguments by means of the first public analysis of the OS random number generators of several popular embedded operating systems.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7949.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7949-eng-deu-Wheel_of_Fortune_webm-hd.webm"
        length="367001600"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 13:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7949-eng-deu-Wheel_of_Fortune_webm-hd.webm?1482948738</guid>
      <dc:identifier>10b11771-c76f-44d5-9b65-9ebca428d8ff</dc:identifier>
      <dc:date>2016-12-28T13:45:00+01:00</dc:date>
      <itunes:author>Jos Wetzels, Ali Abbasi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Analyzing Embedded OS Random Number Generators</itunes:subtitle>
      <itunes:summary>Secure random number generators play a crucial role in the wider security ecosystem. In the absence of a dedicated hardware True Random Number Generator (TRNG), computer systems have to resort to a software (cryptographically secure) Pseudo-Random Number Generator (CSPRNG). Since the (secure) design of a CSPRNG is an involved and complicated effort and since randomness is such a security-critical resource, many operating systems provide a CSPRNG as a core system service and many popular security software products assume their presence. The constraints imposed by the embedded world, however, pose a variety of unique challenges to proper OS (CS)PRNG design and implementation which have historically resulted in security failures. In this talk we will discuss these challenges, how they affect the quality of (CS)PRNGs in embedded operating systems and illustrate our arguments by means of the first public analysis of the OS random number generators of several popular embedded operating systems.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7949.html
</itunes:summary>
      <itunes:duration>00:36:48</itunes:duration>
    </item>
    <item>
      <title>In Search of Evidence-Based IT-Security (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8169-in_search_of_evidence-based_it-security</link>
      <description>Applied IT security is largely a science-free field. The IT-Security industry is selling a range of products with often very questionable and sometimes outright ridiculous claims. Yet it&#39;s widely accepted practice among users and companies that protection with security appliances, antivirus products and firewalls is a necessity. There are no rigorous scientific studies that try to evaluate the effectiveness of most security products or strategies. Evidence-based IT security could provide a way out of the security nihilism that&#39;s often dominating the debate – however it doesn&#39;t exist yet.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8169.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8169-eng-deu-fra-In_Search_of_Evidence-Based_IT-Security_webm-hd.webm"
        length="235929600"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 13:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8169-eng-deu-fra-In_Search_of_Evidence-Based_IT-Security_webm-hd.webm?1482945669</guid>
      <dc:identifier>4bff9cb3-9e91-4305-9029-f4d9053c7b5c</dc:identifier>
      <dc:date>2016-12-28T13:45:00+01:00</dc:date>
      <itunes:author>hanno</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>IT security is largely a science-free field. This needs to change.</itunes:subtitle>
      <itunes:summary>Applied IT security is largely a science-free field. The IT-Security industry is selling a range of products with often very questionable and sometimes outright ridiculous claims. Yet it&#39;s widely accepted practice among users and companies that protection with security appliances, antivirus products and firewalls is a necessity. There are no rigorous scientific studies that try to evaluate the effectiveness of most security products or strategies. Evidence-based IT security could provide a way out of the security nihilism that&#39;s often dominating the debate – however it doesn&#39;t exist yet.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8169.html
</itunes:summary>
      <itunes:duration>00:30:54</itunes:duration>
    </item>
    <item>
      <title>Gone in 60 Milliseconds (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7865-gone_in_60_milliseconds</link>
      <description>&lt;p&gt;More and more businesses are moving away from monolithic servers and turning to event-driven microservices powered by cloud function providers like AWS Lambda. So, how do we hack in to a server that only exists for &lt;i&gt;60 milliseconds&lt;/i&gt;?&lt;/p&gt;

&lt;p&gt;This talk will show novel attack vectors using cloud event sources,  exploitabilities in common server-less patterns and frameworks, abuse of undocumented features in AWS Lambda for persistent malware injection, identifying valuable targets for pilfering, and, of course, how to exfiltrate juicy data out of a secure Virtual Private Cloud. &lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7865.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7865-eng-deu-fra-Gone_in_60_Milliseconds_webm-hd.webm"
        length="208666624"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 13:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7865-eng-deu-fra-Gone_in_60_Milliseconds_webm-hd.webm?1482960071</guid>
      <dc:identifier>1a6657a2-b6c2-4acc-b8fc-5ec081c0877f</dc:identifier>
      <dc:date>2016-12-28T13:45:00+01:00</dc:date>
      <itunes:author>Rich Jones</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Intrusion and Exfiltration in Server-less Architectures</itunes:subtitle>
      <itunes:summary>&lt;p&gt;More and more businesses are moving away from monolithic servers and turning to event-driven microservices powered by cloud function providers like AWS Lambda. So, how do we hack in to a server that only exists for &lt;i&gt;60 milliseconds&lt;/i&gt;?&lt;/p&gt;

&lt;p&gt;This talk will show novel attack vectors using cloud event sources,  exploitabilities in common server-less patterns and frameworks, abuse of undocumented features in AWS Lambda for persistent malware injection, identifying valuable targets for pilfering, and, of course, how to exfiltrate juicy data out of a secure Virtual Private Cloud. &lt;/p&gt;
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7865.html
</itunes:summary>
      <itunes:duration>00:33:01</itunes:duration>
    </item>
    <item>
      <title>You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8061-you_can_-j_reject_but_you_can_not_hide_global_scanning_of_the_ipv6_internet</link>
      <description>In this talk we will explore and present various IPv6 scanning techniques that allow attackers to peek into IPv6 networks. With the already known difference between IPv4 and IPv6 firewalling (the latter is worse... ) we then demonstrate how these techniques can be combined and used to obtain a large-scale view on the state of IPv6 in infrastructures and data centers. To give the whole issue a somewhat more fun dimension, we will also look at some (security) sensitive applications of this technique. Complimentary code-snippets will be provided.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8061.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8061-eng-deu-You_can_-j_REJECT_but_you_can_not_hide_Global_scanning_of_the_IPv6_Internet_webm-hd.webm"
        length="344981504"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8061-eng-deu-You_can_-j_REJECT_but_you_can_not_hide_Global_scanning_of_the_IPv6_Internet_webm-hd.webm?1482951972</guid>
      <dc:identifier>ac80424a-f4dc-431d-95f3-3f85664ba2dc</dc:identifier>
      <dc:date>2016-12-27T23:00:00+01:00</dc:date>
      <itunes:author>Tobias Fiebig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Finding interesting targets in 128bit of entropy</itunes:subtitle>
      <itunes:summary>In this talk we will explore and present various IPv6 scanning techniques that allow attackers to peek into IPv6 networks. With the already known difference between IPv4 and IPv6 firewalling (the latter is worse... ) we then demonstrate how these techniques can be combined and used to obtain a large-scale view on the state of IPv6 in infrastructures and data centers. To give the whole issue a somewhat more fun dimension, we will also look at some (security) sensitive applications of this technique. Complimentary code-snippets will be provided.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8061.html
</itunes:summary>
      <itunes:duration>00:46:19</itunes:duration>
    </item>
    <item>
      <title>Der 33 Jahrerückblick (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8266-der_33_jahreruckblick</link>
      <description>The proper relationship of technology and politics have been the subject of an evergreen debate on the floor of the Chaos Communication Congress.  Rather than taking a position in this debate, we are asking how the two have been co-articulated in practice so far by CCC participants?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8266.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8266-eng-deu-fra-Der_33_Jahrerueckblick_webm-hd.webm"
        length="241172480"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8266-eng-deu-fra-Der_33_Jahrerueckblick_webm-hd.webm?1482945399</guid>
      <dc:identifier>658b276a-e3a2-4698-b2a8-2edb724be17e</dc:identifier>
      <dc:date>2016-12-28T11:30:00+01:00</dc:date>
      <itunes:author>maxigas, mel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Technology and Politics in Congress Talks, from 1984 to now</itunes:subtitle>
      <itunes:summary>The proper relationship of technology and politics have been the subject of an evergreen debate on the floor of the Chaos Communication Congress.  Rather than taking a position in this debate, we are asking how the two have been co-articulated in practice so far by CCC participants?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8266.html
</itunes:summary>
      <itunes:duration>00:26:38</itunes:duration>
    </item>
    <item>
      <title>Hacking the World (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8349-hacking_the_world</link>
      <description>In this lecture I wish to reflect on the maturation of the security and hacking communities and their role in larger societal and political participation. We&#39;ll reflect on the predominant role that technology has been growing into our lives, and the responsibilities we have in nurturing it. After having spent the last years in researching, exposing, and preventing the electronic targeting of dissidents and journalists, I hope to synthesize my experience and suggest how to reconsider our tactics, the successes, and the failures, and hopefully draw some inspiration for a brighter future.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8349.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8349-eng-deu-fra-Hacking_the_World_webm-hd.webm"
        length="229638144"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 13:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8349-eng-deu-fra-Hacking_the_World_webm-hd.webm?1482960039</guid>
      <dc:identifier>60b52369-b0ee-455f-904a-4dfef49596eb</dc:identifier>
      <dc:date>2016-12-28T13:00:00+01:00</dc:date>
      <itunes:author>Claudio &quot;nex&quot; Guarnieri</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>The struggle for security for all.</itunes:subtitle>
      <itunes:summary>In this lecture I wish to reflect on the maturation of the security and hacking communities and their role in larger societal and political participation. We&#39;ll reflect on the predominant role that technology has been growing into our lives, and the responsibilities we have in nurturing it. After having spent the last years in researching, exposing, and preventing the electronic targeting of dissidents and journalists, I hope to synthesize my experience and suggest how to reconsider our tactics, the successes, and the failures, and hopefully draw some inspiration for a brighter future.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8349.html
</itunes:summary>
      <itunes:duration>00:26:40</itunes:duration>
    </item>
    <item>
      <title>Tapping into the core (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8069-tapping_into_the_core</link>
      <description>Engaging universally available deep debug functionality of modern
Intel cores, with zero software or hardware modifications
required on the target side.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8069.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8069-eng-deu-Tapping_into_the_core_webm-hd.webm"
        length="243269632"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 13:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8069-eng-deu-Tapping_into_the_core_webm-hd.webm?1482959914</guid>
      <dc:identifier>ff044b6a-d567-4309-b9a8-ec9384b16a27</dc:identifier>
      <dc:date>2016-12-28T13:00:00+01:00</dc:date>
      <itunes:author>Maxim Goryachy, Mark Ermolov</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Engaging universally available deep debug functionality of modern
Intel cores, with zero software or hardware modifications
required on the target side.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8069.html
</itunes:summary>
      <itunes:duration>00:31:29</itunes:duration>
    </item>
    <item>
      <title>Syrian Archive (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7909-syrian_archive</link>
      <description>Journalists and human rights groups need to find and use verified visual evidence in order to accurately report about what’s happening in conflict zones. In the case of Syria, there are more hours of online footage online than there have been hours of conflict.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7909.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7909-eng-deu-Syrian_Archive_webm-hd.webm"
        length="289406976"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 12:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7909-eng-deu-Syrian_Archive_webm-hd.webm?1482959276</guid>
      <dc:identifier>e0758eb2-0282-40d7-9c41-de607eb3d494</dc:identifier>
      <dc:date>2016-12-28T12:15:00+01:00</dc:date>
      <itunes:author>Jeff Deutch, Hadi Al-Khatib</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Preserving documentation of human rights violations</itunes:subtitle>
      <itunes:summary>Journalists and human rights groups need to find and use verified visual evidence in order to accurately report about what’s happening in conflict zones. In the case of Syria, there are more hours of online footage online than there have been hours of conflict.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7909.html
</itunes:summary>
      <itunes:duration>00:30:34</itunes:duration>
    </item>
    <item>
      <title>How physicists analyze massive data: LHC + brain + ROOT = Higgs (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8083-how_physicists_analyze_massive_data_lhc_brain_root_higgs</link>
      <description>Physicists are not computer scientists. But at CERN and worldwide, they need to analyze petabytes of data, efficiently. Since more than 20 years now, ROOT helps them with interactive development of analysis algorithms (in the context of the experiments&#39; multi-gigabyte software libraries), serialization of virtually any C++ object, fast statistical and general math tools, and high quality graphics for publications. I.e. ROOT helps physicists transform data into knowledge.

The presentation will introduce the life of data, the role of computing for physicists and how physicists analyze data with ROOT. It will sketch out how some of us foresee the development of data analysis given that the rest of the world all of a sudden also has big data tools: where they fit, where they don&#39;t, and what&#39;s missing.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8083.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8083-eng-deu-fra-How_physicists_analyze_massive_data_LHC_brain_ROOT_Higgs_webm-hd.webm"
        length="217055232"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 12:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8083-eng-deu-fra-How_physicists_analyze_massive_data_LHC_brain_ROOT_Higgs_webm-hd.webm?1482958451</guid>
      <dc:identifier>8aaa55ad-b426-4d7a-8d46-f4b34a906eda</dc:identifier>
      <dc:date>2016-12-28T12:15:00+01:00</dc:date>
      <itunes:author>Axel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:summary>Physicists are not computer scientists. But at CERN and worldwide, they need to analyze petabytes of data, efficiently. Since more than 20 years now, ROOT helps them with interactive development of analysis algorithms (in the context of the experiments&#39; multi-gigabyte software libraries), serialization of virtually any C++ object, fast statistical and general math tools, and high quality graphics for publications. I.e. ROOT helps physicists transform data into knowledge.

The presentation will introduce the life of data, the role of computing for physicists and how physicists analyze data with ROOT. It will sketch out how some of us foresee the development of data analysis given that the rest of the world all of a sudden also has big data tools: where they fit, where they don&#39;t, and what&#39;s missing.

about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8083.html
</itunes:summary>
      <itunes:duration>00:31:44</itunes:duration>
    </item>
    <item>
      <title>The Clash of Digitalizations (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8419-the_clash_of_digitalizations</link>
      <description>This talk discusses the representation of Arab males in video games and the adverse effect it has on the collective political imagination. Anonymous military-aged Arab men become increasingly the exception to the laws of human rights, and become default targets for conventional and unmanned drone attacks. This devolution is seen through the lens of the changing nature of conflict through digitalization, the collapse of the nation state in Iraq and Syria, and the future of war. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8419.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8419-eng-deu-The_Clash_of_Digitalizations_webm-hd.webm"
        length="220200960"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 12:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8419-eng-deu-The_Clash_of_Digitalizations_webm-hd.webm?1482959850</guid>
      <dc:identifier>5f0ab68a-8e2d-481e-b009-55a1af58760c</dc:identifier>
      <dc:date>2016-12-28T12:15:00+01:00</dc:date>
      <itunes:author>Saud Al-Zaid</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>The Devolution of Arab Men from Humans to Digital Fodder</itunes:subtitle>
      <itunes:summary>This talk discusses the representation of Arab males in video games and the adverse effect it has on the collective political imagination. Anonymous military-aged Arab men become increasingly the exception to the laws of human rights, and become default targets for conventional and unmanned drone attacks. This devolution is seen through the lens of the changing nature of conflict through digitalization, the collapse of the nation state in Iraq and Syria, and the future of war. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8419.html
</itunes:summary>
      <itunes:duration>00:31:40</itunes:duration>
    </item>
    <item>
      <title>A look into the Mobile Messaging Black Box (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8062-a_look_into_the_mobile_messaging_black_box</link>
      <description>Most of us use mobile messaging every day. We use certain apps that we chose for a number of factors, like our friends using it, good press, privacy promises, or simply their feature sets. This talk aims to enable more of us to reason about the privacy and security of messaging apps. We will try to present simple analogies translating abstract security and privacy expectations into concrete feature sets. We will illustrate these features using the the popular messaging app Threema. Our analysis of its protocol is based on our own reverse-engineering efforts and a re-implementation of the Threema protocol that we will release during the talk.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8062.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8062-eng-deu-A_look_into_the_Mobile_Messaging_Black_Box_webm-hd.webm"
        length="422576128"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8062-eng-deu-A_look_into_the_Mobile_Messaging_Black_Box_webm-hd.webm?1482950659</guid>
      <dc:identifier>f32a1a13-b244-4a1d-a6cf-99c5e3bdad27</dc:identifier>
      <dc:date>2016-12-28T11:30:00+01:00</dc:date>
      <itunes:author>Roland Schilling, Frieder Steinmetz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>A gentle introduction to mobile messaging and subsequent analysis of the Threema protocol.</itunes:subtitle>
      <itunes:summary>Most of us use mobile messaging every day. We use certain apps that we chose for a number of factors, like our friends using it, good press, privacy promises, or simply their feature sets. This talk aims to enable more of us to reason about the privacy and security of messaging apps. We will try to present simple analogies translating abstract security and privacy expectations into concrete feature sets. We will illustrate these features using the the popular messaging app Threema. Our analysis of its protocol is based on our own reverse-engineering efforts and a re-implementation of the Threema protocol that we will release during the talk.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8062.html
</itunes:summary>
      <itunes:duration>01:03:19</itunes:duration>
    </item>
    <item>
      <title>International exchange of tax information (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7880-international_exchange_of_tax_information</link>
      <description>The Common Reporting Standard is a multinational agreement  signed by more than 80 nations, including all EU member states. The signatories promised to exchange bank account information on foreigners.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7880.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7880-eng-deu-International_exchange_of_tax_information_webm-hd.webm"
        length="207618048"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7880-eng-deu-International_exchange_of_tax_information_webm-hd.webm?1482945159</guid>
      <dc:identifier>2a9ac911-1072-4672-8fbc-2887f4fd7aec</dc:identifier>
      <dc:date>2016-12-28T11:30:00+01:00</dc:date>
      <itunes:author>taxman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>The Common Reporting Standard is a multinational agreement  signed by more than 80 nations, including all EU member states. The signatories promised to exchange bank account information on foreigners.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7880.html
</itunes:summary>
      <itunes:duration>00:28:17</itunes:duration>
    </item>
    <item>
      <title>Es sind die kleinen Dinge im Leben (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8237-es_sind_die_kleinen_dinge_im_leben</link>
      <description>Jeder weiß ungefähr was ein Mikroskop ist und vielleicht hat man auch mal davon gehört das da immernoch dran geforscht wird – Stichwort Hochauflösungsmikroskopie (Nobelpreis 2014 in Chemie). Es gibt deutlich mehr Mikroskope in der professionellen Forschung als es Teleskope gibt, deutlich mehr – und da könnte man sich jetzt fragen: &quot;Warum sehe ich so viele Bilder von Sterne, aber kaum Mikroskopiebilder von öffentlichen Einrichtungen und Stellen?&quot;. Um diese Frage zu beantworten will ich kurz in die Welt der Hochauflösungsmikroskopie einführen und die Techniken erklären. Ein bisschen über die Community erzählen und versuchen klar zu machen, warum es hier mit der Offenheit noch etwas hapert. UND: Es soll auch mikroskopiert werden.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8237.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8237-deu-eng-spa-Es_sind_die_kleinen_Dinge_im_Leben_webm-hd.webm"
        length="378535936"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8237-deu-eng-spa-Es_sind_die_kleinen_Dinge_im_Leben_webm-hd.webm?1482940648</guid>
      <dc:identifier>d1681340-162c-48ce-8c0b-61c3e176696d</dc:identifier>
      <dc:date>2016-12-28T11:30:00+01:00</dc:date>
      <itunes:author>André Lampe</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>von Mikroskopen, Wahrnehmung und warum das kaum jemanden interessiert</itunes:subtitle>
      <itunes:summary>Jeder weiß ungefähr was ein Mikroskop ist und vielleicht hat man auch mal davon gehört das da immernoch dran geforscht wird – Stichwort Hochauflösungsmikroskopie (Nobelpreis 2014 in Chemie). Es gibt deutlich mehr Mikroskope in der professionellen Forschung als es Teleskope gibt, deutlich mehr – und da könnte man sich jetzt fragen: &quot;Warum sehe ich so viele Bilder von Sterne, aber kaum Mikroskopiebilder von öffentlichen Einrichtungen und Stellen?&quot;. Um diese Frage zu beantworten will ich kurz in die Welt der Hochauflösungsmikroskopie einführen und die Techniken erklären. Ein bisschen über die Community erzählen und versuchen klar zu machen, warum es hier mit der Offenheit noch etwas hapert. UND: Es soll auch mikroskopiert werden.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8237.html
</itunes:summary>
      <itunes:duration>00:32:48</itunes:duration>
    </item>
    <item>
      <title>Nicht öffentlich. (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8116-nicht_offentlich</link>
      <description>Der NSA-Untersuchungsausschuss im Bundestag soll aufklären, was die NSA in Deutschland tut und wie deutsche Geheimdienste in diese Aktivitäten verwickelt sind. Fast wie in einer Gerichtsverhandlung – doch es gibt eine Besonderheit: Der Zeuge ist der BND, ein Geheimdienst. Und der tut alles dafür, nichts zu verraten.


about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8116.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8116-deu-eng-fra-Nicht_oeffentlich_webm-hd.webm"
        length="579862528"
        type="video/webm"/>
      <pubDate>Wed, 28 Dec 2016 00:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8116-deu-eng-fra-Nicht_oeffentlich_webm-hd.webm?1482941653</guid>
      <dc:identifier>2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4</dc:identifier>
      <dc:date>2016-12-28T00:15:00+01:00</dc:date>
      <itunes:author>anna, Kai Biermann, Felix Betzin, Elisabeth Pleß, Johannes Wolf, vieuxrenard</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Entertainment</itunes:keywords>
      <itunes:subtitle>Ein Geheimdienst als Zeuge. Szenen aus dem NSA-Untersuchungsausschuss.</itunes:subtitle>
      <itunes:summary>Der NSA-Untersuchungsausschuss im Bundestag soll aufklären, was die NSA in Deutschland tut und wie deutsche Geheimdienste in diese Aktivitäten verwickelt sind. Fast wie in einer Gerichtsverhandlung – doch es gibt eine Besonderheit: Der Zeuge ist der BND, ein Geheimdienst. Und der tut alles dafür, nichts zu verraten.


about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8116.html
</itunes:summary>
      <itunes:duration>01:05:27</itunes:duration>
    </item>
    <item>
      <title>Woolim – Lifting the Fog on DPRK’s Latest Tablet PC (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8143-woolim_lifting_the_fog_on_dprk_s_latest_tablet_pc</link>
      <description>Last year we have been talking about DPRK’s operating system Red Star OS and its surveillance features. We have identified a watermarking mechanism and gave an insight on the internals of the operating system itself. This year we will be talking about one of DPRK’s Tablet PCs, called Woolim.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8143.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8143-eng-deu-Woolim_-_Lifting_the_Fog_on_DPRKs_Latest_Tablet_PC_webm-hd.webm"
        length="697303040"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8143-eng-deu-Woolim_-_Lifting_the_Fog_on_DPRKs_Latest_Tablet_PC_webm-hd.webm?1482954926</guid>
      <dc:identifier>fd205d0d-d767-4ff6-9771-9f2d4c933fe7</dc:identifier>
      <dc:date>2016-12-27T23:00:00+01:00</dc:date>
      <itunes:author>Florian Grunow, Niklaus Schiess, Manuel Lubetzki</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>Last year we have been talking about DPRK’s operating system Red Star OS and its surveillance features. We have identified a watermarking mechanism and gave an insight on the internals of the operating system itself. This year we will be talking about one of DPRK’s Tablet PCs, called Woolim.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8143.html
</itunes:summary>
      <itunes:duration>01:03:15</itunes:duration>
    </item>
    <item>
      <title>Visiting The Bear Den (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8094-visiting_the_bear_den</link>
      <description>Sednit, a.k.a Fancy Bear/APT28/Sofacy, is a group of attackers
operating since at least 2004 and whose main objective is to steal
confidential information from specific targets. Over the past two years,
this group&#39;s activity increased significantly, in particular with numerous attacks against foreign affairs ministries and embassies all over the world. They are supposedly behind the DNC hack, and the WADA hack, which happened earlier this year. This talk presents the results of a two-year hunt after Sednit, during which we dug up and analyzed many of their software.


about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8094.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8094-eng-deu-Visiting_The_Bear_Den_webm-hd.webm"
        length="359661568"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8094-eng-deu-Visiting_The_Bear_Den_webm-hd.webm?1482954402</guid>
      <dc:identifier>b9ca38ea-fa88-48c4-8083-9415eee93fcb</dc:identifier>
      <dc:date>2016-12-27T23:00:00+01:00</dc:date>
      <itunes:author>Jessy Campos</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>A Journey in the Land of (Cyber-)Espionage</itunes:subtitle>
      <itunes:summary>Sednit, a.k.a Fancy Bear/APT28/Sofacy, is a group of attackers
operating since at least 2004 and whose main objective is to steal
confidential information from specific targets. Over the past two years,
this group&#39;s activity increased significantly, in particular with numerous attacks against foreign affairs ministries and embassies all over the world. They are supposedly behind the DNC hack, and the WADA hack, which happened earlier this year. This talk presents the results of a two-year hunt after Sednit, during which we dug up and analyzed many of their software.


about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8094.html
</itunes:summary>
      <itunes:duration>00:59:02</itunes:duration>
    </item>
    <item>
      <title>Console Hacking 2016 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7946-console_hacking_2016</link>
      <description>Last year, we demonstrated Linux running on the PS4 in a lightning talk - presented on the PS4 itself. But how did we do it? In a departure from previous Console Hacking talks focusing on security, this year we&#39;re going to focus on the PS4 hardware, what makes it different from a PC, and how we reverse engineered it enough to get a full-blown Linux distro running on it, complete with 3D acceleration.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7946.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7946-eng-deu-fra-Console_Hacking_2016_webm-hd.webm"
        length="458227712"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 23:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7946-eng-deu-fra-Console_Hacking_2016_webm-hd.webm?1482954362</guid>
      <dc:identifier>700a07e7-a9c4-437b-a4c5-4491b23a9b4a</dc:identifier>
      <dc:date>2016-12-27T23:00:00+01:00</dc:date>
      <itunes:author>marcan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>PS4: PC Master Race</itunes:subtitle>
      <itunes:summary>Last year, we demonstrated Linux running on the PS4 in a lightning talk - presented on the PS4 itself. But how did we do it? In a departure from previous Console Hacking talks focusing on security, this year we&#39;re going to focus on the PS4 hardware, what makes it different from a PC, and how we reverse engineered it enough to get a full-blown Linux distro running on it, complete with 3D acceleration.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7946.html
</itunes:summary>
      <itunes:duration>00:53:43</itunes:duration>
    </item>
    <item>
      <title>Netzpolitik in der Schweiz 2016 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8264-netzpolitik_in_der_schweiz_2016</link>
      <description>Ein Überblick zur netzpolitischen Situation in der Schweiz. Wir geben einen umfassenden Rückblick auf das ereignissreiche Jahr 2016, in dem die Schweizer Bevölkerung über gleich zwei Massenüberwachungsgesetze entschieden hat. Die netzpolitischen Gruppierungen haben mit viel Einsatz gegen die Gesetze gekämpft . Wir berichten darüber, wie wir das angengangen sind, wie es ausgegangen ist und was wir dabei gelernt haben.
Zudem machen wir einen Ausblick auf kommende netzpolitische Herausforderungen.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8264.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8264-deu-eng-Netzpolitik_in_der_Schweiz_2016_webm-hd.webm"
        length="1047527424"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8264-deu-eng-Netzpolitik_in_der_Schweiz_2016_webm-hd.webm?1483089366</guid>
      <dc:identifier>c06dd4c2-c637-445d-9c72-92204a35eeff</dc:identifier>
      <dc:date>2016-12-27T20:30:00+01:00</dc:date>
      <itunes:author>Hakuna MaMate</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:subtitle>Grundrechte per Volksentscheid versenken</itunes:subtitle>
      <itunes:summary>Ein Überblick zur netzpolitischen Situation in der Schweiz. Wir geben einen umfassenden Rückblick auf das ereignissreiche Jahr 2016, in dem die Schweizer Bevölkerung über gleich zwei Massenüberwachungsgesetze entschieden hat. Die netzpolitischen Gruppierungen haben mit viel Einsatz gegen die Gesetze gekämpft . Wir berichten darüber, wie wir das angengangen sind, wie es ausgegangen ist und was wir dabei gelernt haben.
Zudem machen wir einen Ausblick auf kommende netzpolitische Herausforderungen.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8264.html
</itunes:summary>
      <itunes:duration>01:02:07</itunes:duration>
    </item>
    <item>
      <title>Netzpolitik in Österreich (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8293-netzpolitik_in_osterreich</link>
      <description>Die Netzpolitik der österreichischen Bundesregierung hat sich im Jahr 2016 nicht besser dargestellt als die Jahre davor: Neue Überwachungsgesetze, (bislang erfolgreich verhinderte) Versuche eine staatliche Spionagesoftware  (Bundestrojaner) einzuführen, der ewige Kampf um ein Transparenzgesetz, eine scheinheilige Simulation demokratischer Partizipation und das totglaubte E-Voting sind brennende Themen und bedürfen einer breiten gesellschaftlichen Diskussion. Der AKVorrat zeigt in einem netzpolitischen Jahresrückblick, was wir dagegen tun können und zeigt, dass Zivilgesellschaft wirkt. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8293.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8293-deu-eng-Netzpolitik_in_OEsterreich_webm-hd.webm"
        length="578813952"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8293-deu-eng-Netzpolitik_in_OEsterreich_webm-hd.webm?1482954079</guid>
      <dc:identifier>c53f6fb8-8fe5-487f-9d5c-15ac56edd6b1</dc:identifier>
      <dc:date>2016-12-27T21:45:00+01:00</dc:date>
      <itunes:author>Thomas Lohninger, Alexander Czadilek</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:subtitle>Ein Jahresrückblick aus dem Land der Datenberge</itunes:subtitle>
      <itunes:summary>Die Netzpolitik der österreichischen Bundesregierung hat sich im Jahr 2016 nicht besser dargestellt als die Jahre davor: Neue Überwachungsgesetze, (bislang erfolgreich verhinderte) Versuche eine staatliche Spionagesoftware  (Bundestrojaner) einzuführen, der ewige Kampf um ein Transparenzgesetz, eine scheinheilige Simulation demokratischer Partizipation und das totglaubte E-Voting sind brennende Themen und bedürfen einer breiten gesellschaftlichen Diskussion. Der AKVorrat zeigt in einem netzpolitischen Jahresrückblick, was wir dagegen tun können und zeigt, dass Zivilgesellschaft wirkt. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8293.html
</itunes:summary>
      <itunes:duration>01:01:02</itunes:duration>
    </item>
    <item>
      <title>Deploying TLS 1.3: the great, the good and the bad (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8348-deploying_tls_1_3_the_great_the_good_and_the_bad</link>
      <description>Transport Layer Security (TLS) 1.3 is almost here. The protocol that protects most of the Internet secure connections is getting the biggest ever revamp, and is losing a round-trip. We will explore differences between TLS 1.3 and previous versions in detail, focusing on the security improvements of the new protocol as well as some of the challenges we face around securely implementing new features such as 0-RTT resumption. At Cloudflare we will be the first to deploy TLS 1.3 on a wide scale, and we’ll be able to discuss the insights we gained while implementing and deploying this protocol.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8348.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8348-eng-deu-spa-Deploying_TLS_13_the_great_the_good_and_the_bad_webm-hd.webm"
        length="516947968"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8348-eng-deu-spa-Deploying_TLS_13_the_great_the_good_and_the_bad_webm-hd.webm?1482953712</guid>
      <dc:identifier>a1a52c4c-8233-403b-8f04-db981df016c1</dc:identifier>
      <dc:date>2016-12-27T21:45:00+01:00</dc:date>
      <itunes:author>Filippo Valsorda, Nick Sullivan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Improving the encrypted the web, one round-trip at a time</itunes:subtitle>
      <itunes:summary>Transport Layer Security (TLS) 1.3 is almost here. The protocol that protects most of the Internet secure connections is getting the biggest ever revamp, and is losing a round-trip. We will explore differences between TLS 1.3 and previous versions in detail, focusing on the security improvements of the new protocol as well as some of the challenges we face around securely implementing new features such as 0-RTT resumption. At Cloudflare we will be the first to deploy TLS 1.3 on a wide scale, and we’ll be able to discuss the insights we gained while implementing and deploying this protocol.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8348.html
</itunes:summary>
      <itunes:duration>01:01:43</itunes:duration>
    </item>
    <item>
      <title>What&#39;s It Doing Now? (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8033-what_s_it_doing_now</link>
      <description>Legend has it that most airline pilots will at one time have uttered the sentence &quot;What&#39;s it Doing now?&quot;, whenever the autopilot or one of its related systems did something unexpected. I will be exploring some high-profile accidents in which wrong expectations of automation behaviour contributed to the outcome.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8033.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8033-eng-deu-fra-Whats_It_Doing_Now_webm-hd.webm"
        length="197132288"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8033-eng-deu-fra-Whats_It_Doing_Now_webm-hd.webm?1482931979</guid>
      <dc:identifier>361946ca-4577-467d-b608-022c8a2d3164</dc:identifier>
      <dc:date>2016-12-27T18:15:00+01:00</dc:date>
      <itunes:author>Bernd Sieker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>The Role of Automation Dependency in Aviation Accidents</itunes:subtitle>
      <itunes:summary>Legend has it that most airline pilots will at one time have uttered the sentence &quot;What&#39;s it Doing now?&quot;, whenever the autopilot or one of its related systems did something unexpected. I will be exploring some high-profile accidents in which wrong expectations of automation behaviour contributed to the outcome.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8033.html
</itunes:summary>
      <itunes:duration>00:32:45</itunes:duration>
    </item>
    <item>
      <title>Where in the World Is Carmen Sandiego? (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7964-where_in_the_world_is_carmen_sandiego</link>
      <description>Travel booking systems are among the oldest global IT infrastructures, and have changed surprisingly little since the 80s. The personal information contained in these systems is hence not well secured by today&#39;s standards. This talk shows real-world hacking risks from tracking travelers to stealing flights. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7964.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7964-eng-deu-Where_in_the_World_Is_Carmen_Sandiego_webm-hd.webm"
        length="526385152"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 21:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7964-eng-deu-Where_in_the_World_Is_Carmen_Sandiego_webm-hd.webm?1482940873</guid>
      <dc:identifier>530f0400-e4e8-4d99-909d-4cfc8121c0b0</dc:identifier>
      <dc:date>2016-12-27T21:45:00+01:00</dc:date>
      <itunes:author>Karsten Nohl, Nemanja Nikodijevic</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Becoming a secret travel agent</itunes:subtitle>
      <itunes:summary>Travel booking systems are among the oldest global IT infrastructures, and have changed surprisingly little since the 80s. The personal information contained in these systems is hence not well secured by today&#39;s standards. This talk shows real-world hacking risks from tracking travelers to stealing flights. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7964.html
</itunes:summary>
      <itunes:duration>00:59:44</itunes:duration>
    </item>
    <item>
      <title>Dieselgate – A year later (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8131-dieselgate_a_year_later</link>
      <description>At 32C3 we gave an overview on the organizational and technical aspects of Dieselgate that had just broken public three months before. In the last year we have learned a lot and spoken to hundreds of people. Daniel gives an update on what is known and what is still to be revealed.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8131.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8131-eng-deu-fra-Dieselgate_-_A_year_later_webm-hd.webm"
        length="300941312"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 19:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8131-eng-deu-fra-Dieselgate_-_A_year_later_webm-hd.webm?1482950001</guid>
      <dc:identifier>378cdf23-350b-4a05-afd0-6360139a7a06</dc:identifier>
      <dc:date>2016-12-27T19:00:00+01:00</dc:date>
      <itunes:author>Daniel Lange (DLange)</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>env stinks || exit</itunes:subtitle>
      <itunes:summary>At 32C3 we gave an overview on the organizational and technical aspects of Dieselgate that had just broken public three months before. In the last year we have learned a lot and spoken to hundreds of people. Daniel gives an update on what is known and what is still to be revealed.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8131.html
</itunes:summary>
      <itunes:duration>00:40:09</itunes:duration>
    </item>
    <item>
      <title>Nintendo Hacking 2016 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8344-nintendo_hacking_2016</link>
      <description>This talk will give a unique insight of what happens when consoles have been hacked already, but not all secrets are busted yet.
This time we will not only focus on the Nintendo 3DS but also on the Wii U, talking about our experiences wrapping up the end of an era.
We will show how we managed to exploit them in novel ways and discuss why we think that Nintendo has lost the game.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8344.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8344-eng-deu-Nintendo_Hacking_2016_webm-hd.webm"
        length="279969792"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8344-eng-deu-Nintendo_Hacking_2016_webm-hd.webm?1482950695</guid>
      <dc:identifier>686b1941-b211-4902-b4c4-1d642398e08b</dc:identifier>
      <dc:date>2016-12-27T20:30:00+01:00</dc:date>
      <itunes:author>derrek, nedwill, naehrwert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Game Over</itunes:subtitle>
      <itunes:summary>This talk will give a unique insight of what happens when consoles have been hacked already, but not all secrets are busted yet.
This time we will not only focus on the Nintendo 3DS but also on the Wii U, talking about our experiences wrapping up the end of an era.
We will show how we managed to exploit them in novel ways and discuss why we think that Nintendo has lost the game.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8344.html
</itunes:summary>
      <itunes:duration>01:01:19</itunes:duration>
    </item>
    <item>
      <title>Software Defined Emissions (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7904-software_defined_emissions</link>
      <description>A technical talk on how to reverse-engineer electronic control units in order to document what was left apparently intentionally undocumented by the vendor – including how Volkswagen tweaked their cycle detection code while already being investigated by the EPA, how different the Volkswagen approach is really to the rest of the industry, and of course some trivia on how the „acoustic function“ got its name.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7904.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7904-eng-deu-Software_Defined_Emissions_webm-hd.webm"
        length="397410304"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7904-eng-deu-Software_Defined_Emissions_webm-hd.webm?1482941327</guid>
      <dc:identifier>4de841b2-0f34-494e-ba5b-0b79ba2c88cd</dc:identifier>
      <dc:date>2016-12-27T20:30:00+01:00</dc:date>
      <itunes:author>Felix „tmbinc“ Domke</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>A hacker’s review of Dieselgate</itunes:subtitle>
      <itunes:summary>A technical talk on how to reverse-engineer electronic control units in order to document what was left apparently intentionally undocumented by the vendor – including how Volkswagen tweaked their cycle detection code while already being investigated by the EPA, how different the Volkswagen approach is really to the rest of the industry, and of course some trivia on how the „acoustic function“ got its name.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7904.html
</itunes:summary>
      <itunes:duration>01:00:30</itunes:duration>
    </item>
    <item>
      <title>Make Wi-Fi fast again (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7911-make_wi-fi_fast_again</link>
      <description>Mit steigendem Datenaufkommen und einer immer größer werdenden Zahl von Geräten muss auch das WLAN wachsen. Nach &quot;ur WiFi sucks!!1!&quot; ist dieser Talk eine kleine Einführung in die Neuerungen, welche mit dem 802.11ac-Standard gekommen sind und gibt eine Erklärung, wie sie funktionieren.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7911.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7911-deu-eng-Make_Wi-Fi_fast_again_webm-hd.webm"
        length="460324864"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 20:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7911-deu-eng-Make_Wi-Fi_fast_again_webm-hd.webm?1482951081</guid>
      <dc:identifier>143759c6-2cad-4fc8-a120-86dcc8de97e6</dc:identifier>
      <dc:date>2016-12-27T20:30:00+01:00</dc:date>
      <itunes:author>Hendrik Lüth</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Eine kleine Einführung in den 802.11ac Standard</itunes:subtitle>
      <itunes:summary>Mit steigendem Datenaufkommen und einer immer größer werdenden Zahl von Geräten muss auch das WLAN wachsen. Nach &quot;ur WiFi sucks!!1!&quot; ist dieser Talk eine kleine Einführung in die Neuerungen, welche mit dem 802.11ac-Standard gekommen sind und gibt eine Erklärung, wie sie funktionieren.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7911.html
</itunes:summary>
      <itunes:duration>00:57:46</itunes:duration>
    </item>
    <item>
      <title>Untrusting the CPU (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8014-untrusting_the_cpu</link>
      <description>It is a sad fact of reality that we can no longer trust our CPUs to only run the things we want and to not have exploitable flaws. I will provide an proposal for a system to restore (some) trust in communication secrecy and system security even in this day and age without compromising too much the benefits in usability and speed modern systems provide.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8014.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8014-eng-deu-Untrusting_the_CPU_webm-hd.webm"
        length="818937856"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8014-eng-deu-Untrusting_the_CPU_webm-hd.webm?1482938953</guid>
      <dc:identifier>c3844820-b5ed-4b12-9094-cfc67aff60be</dc:identifier>
      <dc:date>2016-12-27T18:15:00+01:00</dc:date>
      <itunes:author>jaseg</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>A proposal for secure computing in an age where we cannot trust our CPUs anymore</itunes:subtitle>
      <itunes:summary>It is a sad fact of reality that we can no longer trust our CPUs to only run the things we want and to not have exploitable flaws. I will provide an proposal for a system to restore (some) trust in communication secrecy and system security even in this day and age without compromising too much the benefits in usability and speed modern systems provide.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8014.html
</itunes:summary>
      <itunes:duration>01:01:25</itunes:duration>
    </item>
    <item>
      <title>Keys of Fury (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8408-keys_of_fury</link>
      <description>Keys Of Fury is a brutalist storytelling about technology and keystrokes where text is used unadorned and roughcast, like concrete. I define my practice as KYBDslöjd (drawing by Type In) who uses the Commodore 64 computer, Teletext technologies and Typewriter. Brutalism has an unfortunate reputation of evoking a raw dystopia and KYBDslöjd evokes an “object of nostalgia”. But nostalgic‬, ‪retro‬, obsolete or ‪limited‬ are rhetoric qualities earn by constant repetition. We live in a time where hardware and software become obsolete before most of the users have learned how to use them or disappear into pure functionality. The obedience to standards who made us passive observers and consumers. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8408.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8408-eng-deu-Keys_of_Fury_webm-hd.webm"
        length="293601280"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 19:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8408-eng-deu-Keys_of_Fury_webm-hd.webm?1482944569</guid>
      <dc:identifier>65d150d3-f432-4a36-b3e3-20ee80ad913c</dc:identifier>
      <dc:date>2016-12-27T19:00:00+01:00</dc:date>
      <itunes:author>raquel meyers</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>Type In Beyond the Scrolling Horizon</itunes:subtitle>
      <itunes:summary>Keys Of Fury is a brutalist storytelling about technology and keystrokes where text is used unadorned and roughcast, like concrete. I define my practice as KYBDslöjd (drawing by Type In) who uses the Commodore 64 computer, Teletext technologies and Typewriter. Brutalism has an unfortunate reputation of evoking a raw dystopia and KYBDslöjd evokes an “object of nostalgia”. But nostalgic‬, ‪retro‬, obsolete or ‪limited‬ are rhetoric qualities earn by constant repetition. We live in a time where hardware and software become obsolete before most of the users have learned how to use them or disappear into pure functionality. The obedience to standards who made us passive observers and consumers. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8408.html
</itunes:summary>
      <itunes:duration>00:25:55</itunes:duration>
    </item>
    <item>
      <title>A Data Point Walks Into a Bar (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7999-a_data_point_walks_into_a_bar</link>
      <description>tl;dr: Mother Teresa said &quot;If I look at the mass I will never act. If I look at the one, I will.&quot; I&#39;ll present ways that make us act when looking at the mass.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7999.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7999-eng-deu-A_Data_Point_Walks_Into_a_Bar_webm-hd.webm"
        length="242221056"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7999-eng-deu-A_Data_Point_Walks_Into_a_Bar_webm-hd.webm?1482932298</guid>
      <dc:identifier>600ca67d-e18d-49d8-8e5d-08d5b38ec528</dc:identifier>
      <dc:date>2016-12-27T18:15:00+01:00</dc:date>
      <itunes:author>Lisa Charlotte Rost</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:subtitle>How cold data can make you feel things.</itunes:subtitle>
      <itunes:summary>tl;dr: Mother Teresa said &quot;If I look at the mass I will never act. If I look at the one, I will.&quot; I&#39;ll present ways that make us act when looking at the mass.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7999.html
</itunes:summary>
      <itunes:duration>00:32:18</itunes:duration>
    </item>
    <item>
      <title>Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8288-bonsai_kitten_waren_mir_lieber_-_rechte_falschmeldungen_in_sozialen_netzwerken</link>
      <description>Auf der Hoaxmap werden seit vergangenem Februar Gerüchte über Geflüchtete und deren Widerlegungen gesammelt, sortiert und in Kartenform präsentiert. Die Themen sind dabei so vielfältig wie die Erzählformen.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8288.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8288-deu-eng-fra-Bonsai_Kitten_waren_mir_lieber_-_Rechte_Falschmeldungen_in_sozialen_Netzwerken_webm-hd.webm"
        length="288358400"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 19:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8288-deu-eng-fra-Bonsai_Kitten_waren_mir_lieber_-_Rechte_Falschmeldungen_in_sozialen_Netzwerken_webm-hd.webm?1482939233</guid>
      <dc:identifier>b7e028fa-175f-464d-bc85-adf56e358626</dc:identifier>
      <dc:date>2016-12-27T19:00:00+01:00</dc:date>
      <itunes:author>fraulutz, NoAverageRobot</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Wie mit Gerüchten über Geflüchtete im Netz Stimmung gemacht wird</itunes:subtitle>
      <itunes:summary>Auf der Hoaxmap werden seit vergangenem Februar Gerüchte über Geflüchtete und deren Widerlegungen gesammelt, sortiert und in Kartenform präsentiert. Die Themen sind dabei so vielfältig wie die Erzählformen.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8288.html
</itunes:summary>
      <itunes:duration>00:34:10</itunes:duration>
    </item>
    <item>
      <title>Make the Internet Neutral Again (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8076-make_the_internet_neutral_again</link>
      <description>After three years the EU has for the first time new Net Neutrality rules. What do they mean in practice? Which commercial practices by ISPs are allowed and which have to be punished by the telecom regulator. We give an overview about three years of campaign and where we go from here. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8076.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8076-eng-deu-fra-Make_the_Internet_Neutral_Again_webm-hd.webm"
        length="242221056"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 18:15:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8076-eng-deu-fra-Make_the_Internet_Neutral_Again_webm-hd.webm?1482931948</guid>
      <dc:identifier>80190dbb-bf17-40a0-95e4-18a32bcd37e4</dc:identifier>
      <dc:date>2016-12-27T18:15:00+01:00</dc:date>
      <itunes:author>Thomas Lohninger, Christopher Talib</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Let&#39;s put the new EU Net Neutrality rules to work</itunes:subtitle>
      <itunes:summary>After three years the EU has for the first time new Net Neutrality rules. What do they mean in practice? Which commercial practices by ISPs are allowed and which have to be punished by the telecom regulator. We give an overview about three years of campaign and where we go from here. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8076.html
</itunes:summary>
      <itunes:duration>00:31:59</itunes:duration>
    </item>
    <item>
      <title>Geolocation methods in mobile networks (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7966-geolocation_methods_in_mobile_networks</link>
      <description>This talk presents the results of the technical analysis for the German Parliamentary Committee investigating the NSA spying scandal on geolocation methods in mobile networks.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7966.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7966-eng-deu-rus-Geolocation_methods_in_mobile_networks_webm-hd.webm"
        length="218103808"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7966-eng-deu-rus-Geolocation_methods_in_mobile_networks_webm-hd.webm?1482931913</guid>
      <dc:identifier>dd070191-1d1c-4b9c-a887-e4950a688cdb</dc:identifier>
      <dc:date>2016-12-27T17:30:00+01:00</dc:date>
      <itunes:author>Erik</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:summary>This talk presents the results of the technical analysis for the German Parliamentary Committee investigating the NSA spying scandal on geolocation methods in mobile networks.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7966.html
</itunes:summary>
      <itunes:duration>00:30:51</itunes:duration>
    </item>
    <item>
      <title>A Story of Discrimination and Unfairness (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8026-a_story_of_discrimination_and_unfairness</link>
      <description>Artificial intelligence and machine learning are in a period of astounding growth. However, there are concerns that these technologies may be used, either with or without intention, to perpetuate the prejudice and unfairness that unfortunately characterizes many human institutions. We show for the first time that human-like semantic biases result from the application of standard machine learning to ordinary language—the same sort of language humans are exposed to every day. We replicate a spectrum of standard human biases as exposed by the Implicit Association Test and other well-known psychological studies. We replicate these using a widely used, purely statistical machine-learning model—namely, the GloVe word embedding—trained on a corpus of text from the Web. Our results indicate that language itself contains recoverable and accurate imprints of our historic biases, whether these are morally neutral as towards insects or flowers, problematic as towards race or gender, or even simply veridical, reflecting the status quo for the distribution of gender with respect to careers or first names. These regularities are captured by machine learning along with the rest of semantics. In addition to our empirical findings concerning language, we also contribute new methods for evaluating bias in text, the Word Embedding Association Test (WEAT) and the Word Embedding Factual Association Test (WEFAT). Our results have implications not only for AI and machine learning, but also for the fields of psychology, sociology, and human ethics, since they raise the possibility that mere exposure to everyday language can account for the biases we replicate here.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8026.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8026-eng-deu-A_Story_of_Discrimination_and_Unfairness_webm-hd.webm"
        length="189792256"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8026-eng-deu-A_Story_of_Discrimination_and_Unfairness_webm-hd.webm?1482931751</guid>
      <dc:identifier>84ce6d72-3f4f-445b-801e-37f6a1331bed</dc:identifier>
      <dc:date>2016-12-27T16:45:00+01:00</dc:date>
      <itunes:author>Aylin Caliskan</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Science</itunes:keywords>
      <itunes:subtitle>Prejudice in Word Embeddings</itunes:subtitle>
      <itunes:summary>Artificial intelligence and machine learning are in a period of astounding growth. However, there are concerns that these technologies may be used, either with or without intention, to perpetuate the prejudice and unfairness that unfortunately characterizes many human institutions. We show for the first time that human-like semantic biases result from the application of standard machine learning to ordinary language—the same sort of language humans are exposed to every day. We replicate a spectrum of standard human biases as exposed by the Implicit Association Test and other well-known psychological studies. We replicate these using a widely used, purely statistical machine-learning model—namely, the GloVe word embedding—trained on a corpus of text from the Web. Our results indicate that language itself contains recoverable and accurate imprints of our historic biases, whether these are morally neutral as towards insects or flowers, problematic as towards race or gender, or even simply veridical, reflecting the status quo for the distribution of gender with respect to careers or first names. These regularities are captured by machine learning along with the rest of semantics. In addition to our empirical findings concerning language, we also contribute new methods for evaluating bias in text, the Word Embedding Association Test (WEAT) and the Word Embedding Factual Association Test (WEFAT). Our results have implications not only for AI and machine learning, but also for the fields of psychology, sociology, and human ethics, since they raise the possibility that mere exposure to everyday language can account for the biases we replicate here.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8026.html
</itunes:summary>
      <itunes:duration>00:34:55</itunes:duration>
    </item>
    <item>
      <title>Routerzwang und Funkabschottung (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8024-routerzwang_und_funkabschottung</link>
      <description>Nach drei Jahren wurde endlich die nutzerunfreundliche Praxis des Routerzwangs („Compulsory Routers“) gesetzlich für unzulässig erklärt, und aktuell treibt uns die EU-Funkabschottung („Radio Lockdown Directive“) um. Um was geht es dabei? Und was können wir daraus für andere Fälle lernen?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8024.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8024-deu-eng-Routerzwang_und_Funkabschottung_webm-hd.webm"
        length="396361728"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8024-deu-eng-Routerzwang_und_Funkabschottung_webm-hd.webm?1482931845</guid>
      <dc:identifier>fc959f0c-5e93-4b23-8a63-5b6478adb700</dc:identifier>
      <dc:date>2016-12-27T17:30:00+01:00</dc:date>
      <itunes:author>Max Mehl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Was Aktivisten davon lernen können</itunes:subtitle>
      <itunes:summary>Nach drei Jahren wurde endlich die nutzerunfreundliche Praxis des Routerzwangs („Compulsory Routers“) gesetzlich für unzulässig erklärt, und aktuell treibt uns die EU-Funkabschottung („Radio Lockdown Directive“) um. Um was geht es dabei? Und was können wir daraus für andere Fälle lernen?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8024.html
</itunes:summary>
      <itunes:duration>00:33:27</itunes:duration>
    </item>
    <item>
      <title>Pegasus internals (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7901-pegasus_internals</link>
      <description>This talk will take an in-depth look at the technical capabilities and vulnerabilities used by Pegasus. We will focus on Pegasus’s features and the exploit chain Pegasus used called Trident. Attendees will learn about Pegasus’s use of 0-days, obfuscation, encryption, function hooking, and its ability to go unnoticed. We will present our detailed technical analysis that covers each payload stage of Pegasus including its exploit chain and the various 0-day vulnerabilities that the toolkit was using to jailbreak a device. After this talk attendees will have learned all of the technical details about Pegasus and Trident and how the vulnerabilities we found were patched.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7901.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7901-eng-deu-Pegasus_internals_webm-hd.webm"
        length="176160768"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7901-eng-deu-Pegasus_internals_webm-hd.webm?1482931877</guid>
      <dc:identifier>cb67ad7f-7e12-4f34-aec0-748a61f3f958</dc:identifier>
      <dc:date>2016-12-27T17:30:00+01:00</dc:date>
      <itunes:author>Max Bazaliy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Technical Teardown of the Pegasus malware and Trident exploit chain</itunes:subtitle>
      <itunes:summary>This talk will take an in-depth look at the technical capabilities and vulnerabilities used by Pegasus. We will focus on Pegasus’s features and the exploit chain Pegasus used called Trident. Attendees will learn about Pegasus’s use of 0-days, obfuscation, encryption, function hooking, and its ability to go unnoticed. We will present our detailed technical analysis that covers each payload stage of Pegasus including its exploit chain and the various 0-day vulnerabilities that the toolkit was using to jailbreak a device. After this talk attendees will have learned all of the technical details about Pegasus and Trident and how the vulnerabilities we found were patched.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7901.html
</itunes:summary>
      <itunes:duration>00:29:38</itunes:duration>
    </item>
    <item>
      <title>Kampf dem Abmahnunwesen (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8388-kampf_dem_abmahnunwesen</link>
      <description>Im Spannungsfeld zwischen der Vorderfront der Computertechnik und einem Spezialbereich des Urheberrechts hat sich eine Industrie eine Nische geschaffen, in der sie durch Hochspezialisierung und Automatisierung ein einträgliches Geschäft aufgezogen haben. Dabei nehmen sie als Kollateralschaden in Kauf, dass Unschuldige durch die Drohkulisse zum Zahlen bewegt und zum Schließen ihres offenen Netzwerks gebracht werden. Wir beschreiben, was man dagegen tun kann und was wir dagegen schon getan haben.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8388.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8388-deu-eng-Kampf_dem_Abmahnunwesen_webm-hd.webm"
        length="517996544"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8388-deu-eng-Kampf_dem_Abmahnunwesen_webm-hd.webm?1482931798</guid>
      <dc:identifier>e4fbbb8d-0b74-4129-83b7-bda2247175bc</dc:identifier>
      <dc:date>2016-12-27T16:45:00+01:00</dc:date>
      <itunes:author>Beata Hubrig, erdgeist</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:subtitle>Wider die automatisierte Rechtsdurchsetzung</itunes:subtitle>
      <itunes:summary>Im Spannungsfeld zwischen der Vorderfront der Computertechnik und einem Spezialbereich des Urheberrechts hat sich eine Industrie eine Nische geschaffen, in der sie durch Hochspezialisierung und Automatisierung ein einträgliches Geschäft aufgezogen haben. Dabei nehmen sie als Kollateralschaden in Kauf, dass Unschuldige durch die Drohkulisse zum Zahlen bewegt und zum Schließen ihres offenen Netzwerks gebracht werden. Wir beschreiben, was man dagegen tun kann und was wir dagegen schon getan haben.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8388.html
</itunes:summary>
      <itunes:duration>00:33:02</itunes:duration>
    </item>
    <item>
      <title>Shut Up and Take My Money! (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7969-shut_up_and_take_my_money</link>
      <description>FinTechs increasingly cut the ground from under long-established banks’ feet. With a &quot;Mobile First&quot; strategy, many set their sights on bringing all financial tasks—checking the account balance, making transactions, arranging investments, and ordering an overdraft—on your smartphone. In a business area that was once entirely committed to security, Fintechs make a hip design and outstanding user experience their one and only priority. Even though this strategy is rewarded by rapidly increasing customer numbers, it also reveals a flawed understanding of security. With the example of the pan-European banking startup N26 (formerly Number26), we succeeded independently from the used device to leak customer data, manipulate transactions, and to entirely take over accounts to ultimately issue arbitrary transactions—even without credit.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7969.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7969-eng-deu-fra-Shut_Up_and_Take_My_Money_webm-hd.webm"
        length="207618048"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7969-eng-deu-fra-Shut_Up_and_Take_My_Money_webm-hd.webm?1482931720</guid>
      <dc:identifier>74783236-46f4-493c-9574-1b27a44847b7</dc:identifier>
      <dc:date>2016-12-27T16:45:00+01:00</dc:date>
      <itunes:author>Vincent Haupert</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>The Red Pill of N26 Security</itunes:subtitle>
      <itunes:summary>FinTechs increasingly cut the ground from under long-established banks’ feet. With a &quot;Mobile First&quot; strategy, many set their sights on bringing all financial tasks—checking the account balance, making transactions, arranging investments, and ordering an overdraft—on your smartphone. In a business area that was once entirely committed to security, Fintechs make a hip design and outstanding user experience their one and only priority. Even though this strategy is rewarded by rapidly increasing customer numbers, it also reveals a flawed understanding of security. With the example of the pan-European banking startup N26 (formerly Number26), we succeeded independently from the used device to leak customer data, manipulate transactions, and to entirely take over accounts to ultimately issue arbitrary transactions—even without credit.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7969.html
</itunes:summary>
      <itunes:duration>00:30:50</itunes:duration>
    </item>
    <item>
      <title>Anthropology for kids - What is privacy? (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8420-anthropology_for_kids_-_what_is_privacy</link>
      <description>I would like to present my project called Anthropology for kids and a specific book, that I am working on in the larger framework of this project.  
This book will look like an ordinary school notebook in which a teacher checks a student if the lesson had been learnt. But it is actually not! I gathered this collection of historical and anthropological notes, so that together with school kids we can think about how the very idea of privacy was developed in different countries and in different historical epochs. In ancient Babylon wealthy women were allowed to cover their faces and their bodies, but the poor ones were not. In the Soviet Union during Stalin times it was dangerous to tell a political joke even in the group of close friends. One of them may report a joke to the authorities. Punishment for a political joke could be a prison sentence. 
Today more or less all our online communication is watched or recorded by authorities.
How does our present relate to other times in history, how is the western notion of privacy related to the ideas in other cultures.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8420.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8420-eng-deu-Anthropology_for_kids_-_What_is_privacy_webm-hd.webm"
        length="208666624"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8420-eng-deu-Anthropology_for_kids_-_What_is_privacy_webm-hd.webm?1482931688</guid>
      <dc:identifier>450d2481-6606-40fe-ba8b-7117d4724155</dc:identifier>
      <dc:date>2016-12-27T16:45:00+01:00</dc:date>
      <itunes:author>Nika Dubrovsky</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Art &amp; Culture</itunes:keywords>
      <itunes:summary>I would like to present my project called Anthropology for kids and a specific book, that I am working on in the larger framework of this project.  
This book will look like an ordinary school notebook in which a teacher checks a student if the lesson had been learnt. But it is actually not! I gathered this collection of historical and anthropological notes, so that together with school kids we can think about how the very idea of privacy was developed in different countries and in different historical epochs. In ancient Babylon wealthy women were allowed to cover their faces and their bodies, but the poor ones were not. In the Soviet Union during Stalin times it was dangerous to tell a political joke even in the group of close friends. One of them may report a joke to the authorities. Punishment for a political joke could be a prison sentence. 
Today more or less all our online communication is watched or recorded by authorities.
How does our present relate to other times in history, how is the western notion of privacy related to the ideas in other cultures.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8420.html
</itunes:summary>
      <itunes:duration>00:25:01</itunes:duration>
    </item>
    <item>
      <title>Law Enforcement Are Hacking the Planet (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8018-law_enforcement_are_hacking_the_planet</link>
      <description>In early 2015, the Federal Bureau of Investigation hacked computers in Austria, Denmark, Chile, Colombia, Greece, and likely the United Kingdom and Turkey too. In all, the agency used a Tor Browser exploit to target over 4000 computers spread across the world based on a single, arguably illegal warrant.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8018.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8018-eng-deu-fra-Law_Enforcement_Are_Hacking_the_Planet_webm-hd.webm"
        length="224395264"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8018-eng-deu-fra-Law_Enforcement_Are_Hacking_the_Planet_webm-hd.webm?1482928071</guid>
      <dc:identifier>c92203a0-9158-4111-ab52-5dacd0e46c73</dc:identifier>
      <dc:date>2016-12-27T16:00:00+01:00</dc:date>
      <itunes:author>Joseph Cox</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>How the FBI and local cops are hacking computers outside of their jurisdiction.</itunes:subtitle>
      <itunes:summary>In early 2015, the Federal Bureau of Investigation hacked computers in Austria, Denmark, Chile, Colombia, Greece, and likely the United Kingdom and Turkey too. In all, the agency used a Tor Browser exploit to target over 4000 computers spread across the world based on a single, arguably illegal warrant.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8018.html
</itunes:summary>
      <itunes:duration>00:31:22</itunes:duration>
    </item>
    <item>
      <title>The Nibbletronic (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7925-the_nibbletronic</link>
      <description>The NibbleTronic is a MIDI wind controller that features a novel user interface resulting in a unique tonal range. The standard configuration allows to precisely play a bit more than four full octaves including semitones with only one hand. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7925.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7925-eng-deu-The_Nibbletronic_webm-hd.webm"
        length="174063616"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7925-eng-deu-The_Nibbletronic_webm-hd.webm?1482928559</guid>
      <dc:identifier>f62fb3be-656f-4e7b-9619-11f3cdb2da26</dc:identifier>
      <dc:date>2016-12-27T16:00:00+01:00</dc:date>
      <itunes:author>ctrapp</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>A DIY MIDI Controller and a New UI for Wind Instruments</itunes:subtitle>
      <itunes:summary>The NibbleTronic is a MIDI wind controller that features a novel user interface resulting in a unique tonal range. The standard configuration allows to precisely play a bit more than four full octaves including semitones with only one hand. 
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7925.html
</itunes:summary>
      <itunes:duration>00:20:36</itunes:duration>
    </item>
    <item>
      <title>Check Your Police Record! (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7939-check_your_police_record</link>
      <description>Polizeibehörden und Geheimdienste sammeln Daten der Bürger – mehr als je zuvor. Der Bestand an unterschiedlichen Datenbanken ist enorm gewachsen und geradezu unübersichtlich geworden. Aufgrund datenschutzrechtlicher Regelungen gibt es für etliche dieser Datenbanken einen gesetzlichen Auskunftsanspruch des Bürgers.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7939.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7939-deu-eng-fra-Check_Your_Police_Record_webm-hd.webm"
        length="336592896"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7939-deu-eng-fra-Check_Your_Police_Record_webm-hd.webm?1482928306</guid>
      <dc:identifier>56537f49-c8f0-4d73-bdba-d4d8307fc170</dc:identifier>
      <dc:date>2016-12-27T16:00:00+01:00</dc:date>
      <itunes:author>RA Ulrich Kerner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Polizeiliche Datenbanken und was man über seinen Auskunfts- und Löschungsanspruch wissen sollte</itunes:subtitle>
      <itunes:summary>Polizeibehörden und Geheimdienste sammeln Daten der Bürger – mehr als je zuvor. Der Bestand an unterschiedlichen Datenbanken ist enorm gewachsen und geradezu unübersichtlich geworden. Aufgrund datenschutzrechtlicher Regelungen gibt es für etliche dieser Datenbanken einen gesetzlichen Auskunftsanspruch des Bürgers.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7939.html
</itunes:summary>
      <itunes:duration>00:31:28</itunes:duration>
    </item>
    <item>
      <title>Predicting and Abusing WPA2/802.11 Group Keys (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8195-predicting_and_abusing_wpa2_802_11_group_keys</link>
      <description>We analyze the generation and management of WPA2 group keys. These keys protect broadcast and multicast Wi-Fi traffic. We discovered several issues and illustrate their importance by decrypting all group (and unicast) traffic of a typical Wi-Fi network.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8195.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_webm-hd.webm"
        length="304087040"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_webm-hd.webm?1482923882</guid>
      <dc:identifier>1efa803c-d280-49f0-bd17-8ec8f28e054f</dc:identifier>
      <dc:date>2016-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Mathy Vanhoef</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>We analyze the generation and management of WPA2 group keys. These keys protect broadcast and multicast Wi-Fi traffic. We discovered several issues and illustrate their importance by decrypting all group (and unicast) traffic of a typical Wi-Fi network.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8195.html
</itunes:summary>
      <itunes:duration>01:00:21</itunes:duration>
    </item>
    <item>
      <title>Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8262-zwischen_technikbegeisterung_und_kritischer_reflexion_chaos_macht_schule</link>
      <description>Die Lebenswelt von Kindern und Jugendlichen sowie die der Schulen könnte in Bezug auf die Digitalisierung kaum gegensätzlicher sein: Schülerinnen und Schüler leben und entfalten sich begeistert in der digitalen Welt, aber die Schule ist kaum in der Lage, Schülern ihre drängenden Fragen rund um die komplexe digitale Welt zu beantworten. In unserem Talk möchten wir anhand unserer Erfahrungen aus dem Projekt &quot;Chaos macht Schule&quot; u.a. diskutieren, wie man die heranwachsende Generation u. a. für Themen wie Datenschutz und Überwachung sensibilisieren und gleichzeitig Technikbegeisterung bei jungen Menschen fördern kann.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8262.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8262-deu-eng-Zwischen_Technikbegeisterung_und_kritischer_Reflexion_Chaos_macht_Schule_webm-hd.webm"
        length="1063256064"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8262-deu-eng-Zwischen_Technikbegeisterung_und_kritischer_Reflexion_Chaos_macht_Schule_webm-hd.webm?1482926458</guid>
      <dc:identifier>a0c851a1-b44e-46cb-bbb8-db966bc8639b</dc:identifier>
      <dc:date>2016-12-27T14:00:00+01:00</dc:date>
      <itunes:author>benni, Dorina</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>Die Lebenswelt von Kindern und Jugendlichen sowie die der Schulen könnte in Bezug auf die Digitalisierung kaum gegensätzlicher sein: Schülerinnen und Schüler leben und entfalten sich begeistert in der digitalen Welt, aber die Schule ist kaum in der Lage, Schülern ihre drängenden Fragen rund um die komplexe digitale Welt zu beantworten. In unserem Talk möchten wir anhand unserer Erfahrungen aus dem Projekt &quot;Chaos macht Schule&quot; u.a. diskutieren, wie man die heranwachsende Generation u. a. für Themen wie Datenschutz und Überwachung sensibilisieren und gleichzeitig Technikbegeisterung bei jungen Menschen fördern kann.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8262.html
</itunes:summary>
      <itunes:duration>01:02:55</itunes:duration>
    </item>
    <item>
      <title>Bootstraping a slightly more secure laptop (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8314-bootstraping_a_slightly_more_secure_laptop</link>
      <description>Heads is an open source custom firmware and OS configuration for laptops and servers that aims to provide slightly better physical security and protection for data on the system. Unlike Tails, which aims to be a stateless OS that leaves no trace on the computer of its presence, Heads is intended for the case where you need to store data and state on the computer. It targets specific models of commodity hardware and takes advantage of lessons learned from several years of vulnerability research. This talk provides a high level overview of Heads, a demo of installing it on a Thinkpad and a tour of some of the attacks that it protects against.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8314.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8314-eng-deu-fra-Bootstraping_a_slightly_more_secure_laptop_webm-hd.webm"
        length="357564416"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8314-eng-deu-fra-Bootstraping_a_slightly_more_secure_laptop_webm-hd.webm?1482916566</guid>
      <dc:identifier>64c07cb5-ec19-4972-a2c8-96c0e0df83c6</dc:identifier>
      <dc:date>2016-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Trammell Hudson</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Heads is an open source custom firmware and OS configuration for laptops and servers that aims to provide slightly better physical security and protection for data on the system. Unlike Tails, which aims to be a stateless OS that leaves no trace on the computer of its presence, Heads is intended for the case where you need to store data and state on the computer. It targets specific models of commodity hardware and takes advantage of lessons learned from several years of vulnerability research. This talk provides a high level overview of Heads, a demo of installing it on a Thinkpad and a tour of some of the attacks that it protects against.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8314.html
</itunes:summary>
      <itunes:duration>00:47:42</itunes:duration>
    </item>
    <item>
      <title>What could possibly go wrong with &lt;insert x86 instruction here&gt;? (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8044-what_could_possibly_go_wrong_with_insert_x86_instruction_here</link>
      <description>Hardware is often considered as an abstract layer that behaves correctly, just executing instructions and outputting a result. However, the internal state of the hardware leaks information about the programs that are executing. In this talk, we focus on how to extract information from the execution of simple x86 instructions that do not require any privileges. Beyond classical cache-based side-channel attacks, we demonstrate how to perform cache attacks without a single memory access, as well as how to bypass kernel ASLR. This talk does not require any knowledge about assembly. We promise.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8044.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8044-eng-deu-What_could_possibly_go_wrong_with_insert_x86_instruction_here_webm-hd.webm"
        length="351272960"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8044-eng-deu-What_could_possibly_go_wrong_with_insert_x86_instruction_here_webm-hd.webm?1482924731</guid>
      <dc:identifier>1aa7a4c5-1a3f-444f-99fb-e9c7b4744794</dc:identifier>
      <dc:date>2016-12-27T11:30:00+01:00</dc:date>
      <itunes:author>Clémentine Maurice, Moritz Lipp</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Side effects include side-channel attacks and bypassing kernel ASLR</itunes:subtitle>
      <itunes:summary>Hardware is often considered as an abstract layer that behaves correctly, just executing instructions and outputting a result. However, the internal state of the hardware leaks information about the programs that are executing. In this talk, we focus on how to extract information from the execution of simple x86 instructions that do not require any privileges. Beyond classical cache-based side-channel attacks, we demonstrate how to perform cache attacks without a single memory access, as well as how to bypass kernel ASLR. This talk does not require any knowledge about assembly. We promise.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8044.html
</itunes:summary>
      <itunes:duration>00:55:05</itunes:duration>
    </item>
    <item>
      <title>The DROWN Attack (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7821-the_drown_attack</link>
      <description>We present DROWN, a novel cross-protocol attack on TLS that uses a server supporting SSLv2 as an oracle to decrypt modern TLS connections. Using Internet-wide scans, we find that 33% of all HTTPS servers are vulnerable to this protocol-level attack.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7821.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7821-eng-deu-rus-The_DROWN_Attack_webm-hd.webm"
        length="333447168"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7821-eng-deu-rus-The_DROWN_Attack_webm-hd.webm?1482916478</guid>
      <dc:identifier>61f9d4c6-a3de-4958-a57c-efcf941668fa</dc:identifier>
      <dc:date>2016-12-27T14:00:00+01:00</dc:date>
      <itunes:author>Sebastian Schinzel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>Breaking TLS using SSLv2</itunes:subtitle>
      <itunes:summary>We present DROWN, a novel cross-protocol attack on TLS that uses a server supporting SSLv2 as an oracle to decrypt modern TLS connections. Using Internet-wide scans, we find that 33% of all HTTPS servers are vulnerable to this protocol-level attack.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7821.html
</itunes:summary>
      <itunes:duration>00:55:35</itunes:duration>
    </item>
    <item>
      <title>The Fight for Encryption in 2016 (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8295-the_fight_for_encryption_in_2016</link>
      <description>Both strong end-to-end communications encryption and device encryption are legal in most jurisdictions today, and remain widely available. Yet software programmers and hardware producers are increasingly under pressure from law enforcement and policy makers around the world to include so-called backdoors in encryption products.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8295.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8295-eng-deu-fra-The_Fight_for_Encryption_in_2016_webm-hd.webm"
        length="429916160"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8295-eng-deu-fra-The_Fight_for_Encryption_in_2016_webm-hd.webm?1482925418</guid>
      <dc:identifier>1275f046-e52e-4b0b-9f5b-7eb2008b2ec4</dc:identifier>
      <dc:date>2016-12-27T12:45:00+01:00</dc:date>
      <itunes:author>Kurt Opsahl</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>Crypto fight in the Wake of Apple v. FBI</itunes:subtitle>
      <itunes:summary>Both strong end-to-end communications encryption and device encryption are legal in most jurisdictions today, and remain widely available. Yet software programmers and hardware producers are increasingly under pressure from law enforcement and policy makers around the world to include so-called backdoors in encryption products.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8295.html
</itunes:summary>
      <itunes:duration>01:00:05</itunes:duration>
    </item>
    <item>
      <title>Exploiting PHP7 unserialize (33c3)</title>
      <link>https://media.ccc.de/v/33c3-7858-exploiting_php7_unserialize</link>
      <description>PHP-7 is a new version of the most prevalent server-side language in use today. Like previous version, this version is also vulnerable to memory corruptions.
However, the language has gone through extensive changes and none of previous exploitation techniques are relevant.
In this talk, we explore the new memory internals of the language from exploiters and vulnerability researchers point of view. We will explain newly found vulnerabilities in the &#39;unserialize&#39; mechanism of the language and present re-usable primitives for remote exploitation of these vulnerabilities.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7858.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7858-eng-deu-Exploiting_PHP7_unserialize_webm-hd.webm"
        length="202375168"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-7858-eng-deu-Exploiting_PHP7_unserialize_webm-hd.webm?1482924839</guid>
      <dc:identifier>798573a8-f544-48f0-abaf-ebc405f03f4a</dc:identifier>
      <dc:date>2016-12-27T12:45:00+01:00</dc:date>
      <itunes:author>Yannay Livneh</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>teaching a new dog old tricks</itunes:subtitle>
      <itunes:summary>PHP-7 is a new version of the most prevalent server-side language in use today. Like previous version, this version is also vulnerable to memory corruptions.
However, the language has gone through extensive changes and none of previous exploitation techniques are relevant.
In this talk, we explore the new memory internals of the language from exploiters and vulnerability researchers point of view. We will explain newly found vulnerabilities in the &#39;unserialize&#39; mechanism of the language and present re-usable primitives for remote exploitation of these vulnerabilities.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7858.html
</itunes:summary>
      <itunes:duration>00:44:01</itunes:duration>
    </item>
    <item>
      <title>Building a high throughput low-latency PCIe based SDR (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8338-building_a_high_throughput_low-latency_pcie_based_sdr</link>
      <description>Software Defined Radios (SDRs) became a mainstream tool for wireless engineers and security researches and there are plenty of them available on the market. Most if not all SDRs in the affordable price range are using USB2/USB3 as a transport, because of implementation simplicity. While being so popular, USB has limited bandwidth, high latency and is not really suitable for embedded applications. PCIe/miniPCIe is the only widespread bus which is embedded friendly, low latency and high bandwidth at the same time. But implementing PCIe/miniPCIe is not for the faint of heart - you have to write your own FPGA code, write your own Linux kernel driver and ensure compatibility with different chipsets, each with its own quirks. In this talk we will look at the requirements for a high performance SDR like XTRX, how this leads to certain design decisions and share pitfalls and gotchas we encountered (and solved).
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8338.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8338-eng-deu-Building_a_high_throughput_low-latency_PCIe_based_SDR_webm-hd.webm"
        length="779091968"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8338-eng-deu-Building_a_high_throughput_low-latency_PCIe_based_SDR_webm-hd.webm?1482925536</guid>
      <dc:identifier>48e016a4-5683-4bda-8976-98f1dbf62787</dc:identifier>
      <dc:date>2016-12-27T12:45:00+01:00</dc:date>
      <itunes:author>Alexander Chemeris, Sergey Kostanbaev</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:subtitle>Lessons learnt implementing PCIe on FPGA for XTRX Software Defined Radio</itunes:subtitle>
      <itunes:summary>Software Defined Radios (SDRs) became a mainstream tool for wireless engineers and security researches and there are plenty of them available on the market. Most if not all SDRs in the affordable price range are using USB2/USB3 as a transport, because of implementation simplicity. While being so popular, USB has limited bandwidth, high latency and is not really suitable for embedded applications. PCIe/miniPCIe is the only widespread bus which is embedded friendly, low latency and high bandwidth at the same time. But implementing PCIe/miniPCIe is not for the faint of heart - you have to write your own FPGA code, write your own Linux kernel driver and ensure compatibility with different chipsets, each with its own quirks. In this talk we will look at the requirements for a high performance SDR like XTRX, how this leads to certain design decisions and share pitfalls and gotchas we encountered (and solved).
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8338.html
</itunes:summary>
      <itunes:duration>01:00:54</itunes:duration>
    </item>
    <item>
      <title>How Do I Crack Satellite and Cable Pay TV? (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8127-how_do_i_crack_satellite_and_cable_pay_tv</link>
      <description>Follow the steps taken to crack a conditional access and scrambling system used in millions of TV set-top-boxes across North America. From circuit board to chemical decapsulation, optical ROM extraction, glitching, and reverse engineering custom hardware cryptographic features. This talk describes the techniques used to breach the security of satellite and cable TV systems that have remained secure after 15+ years in use.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8127.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8127-eng-deu-fra-How_Do_I_Crack_Satellite_and_Cable_Pay_TV_webm-hd.webm"
        length="465567744"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 12:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8127-eng-deu-fra-How_Do_I_Crack_Satellite_and_Cable_Pay_TV_webm-hd.webm?1482917570</guid>
      <dc:identifier>5a517be2-220b-4eb6-88c3-e7ef08c98ace</dc:identifier>
      <dc:date>2016-12-27T12:45:00+01:00</dc:date>
      <itunes:author>Chris Gerlinsky</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:summary>Follow the steps taken to crack a conditional access and scrambling system used in millions of TV set-top-boxes across North America. From circuit board to chemical decapsulation, optical ROM extraction, glitching, and reverse engineering custom hardware cryptographic features. This talk describes the techniques used to breach the security of satellite and cable TV systems that have remained secure after 15+ years in use.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8127.html
</itunes:summary>
      <itunes:duration>01:02:40</itunes:duration>
    </item>
    <item>
      <title>Everything you always wanted to know about Certificate Transparency (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8167-everything_you_always_wanted_to_know_about_certificate_transparency</link>
      <description>Certificate transparency - what is it, and what can be done with it?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8167.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8167-eng-deu-Everything_you_always_wanted_to_know_about_Certificate_Transparency_webm-hd.webm"
        length="339738624"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8167-eng-deu-Everything_you_always_wanted_to_know_about_Certificate_Transparency_webm-hd.webm?1482924395</guid>
      <dc:identifier>c54bec28-0cec-4472-9a0f-36be8b626dd7</dc:identifier>
      <dc:date>2016-12-27T11:30:00+01:00</dc:date>
      <itunes:author>Martin Schmiedecker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Security</itunes:keywords>
      <itunes:subtitle>(but were afraid to ask)</itunes:subtitle>
      <itunes:summary>Certificate transparency - what is it, and what can be done with it?
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8167.html
</itunes:summary>
      <itunes:duration>01:00:07</itunes:duration>
    </item>
    <item>
      <title>Reverse engineering Outernet (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8399-reverse_engineering_outernet</link>
      <description>&lt;a href=&quot;https://outernet.is&quot;&gt;Outernet&lt;/a&gt; is a company whose goal is to ease worldwide access to internet contents by broadcasting files through geostationary satellites. Most of the software used for Outernet is open source, but the key parts of their receiver are closed source and the protocols and specifications of the signal used are secret. I have been able to &lt;a href=&quot;http://destevez.net/tag/outernet/&quot;&gt;reverse engineer&lt;/a&gt; most of the protocols, and a functional &lt;a href=&quot;https://github.com/daniestevez/free-outernet&quot;&gt;open source&lt;/a&gt; receiver is now available.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8399.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8399-eng-deu-Reverse_engineering_Outernet_webm-hd.webm"
        length="381681664"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8399-eng-deu-Reverse_engineering_Outernet_webm-hd.webm?1482918484</guid>
      <dc:identifier>f75d0531-ac47-4edd-99bd-9eadd836982a</dc:identifier>
      <dc:date>2016-12-27T11:30:00+01:00</dc:date>
      <itunes:author>Daniel Estévez</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Hardware &amp; Making</itunes:keywords>
      <itunes:summary>&lt;a href=&quot;https://outernet.is&quot;&gt;Outernet&lt;/a&gt; is a company whose goal is to ease worldwide access to internet contents by broadcasting files through geostationary satellites. Most of the software used for Outernet is open source, but the key parts of their receiver are closed source and the protocols and specifications of the signal used are secret. I have been able to &lt;a href=&quot;http://destevez.net/tag/outernet/&quot;&gt;reverse engineer&lt;/a&gt; most of the protocols, and a functional &lt;a href=&quot;https://github.com/daniestevez/free-outernet&quot;&gt;open source&lt;/a&gt; receiver is now available.
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8399.html
</itunes:summary>
      <itunes:duration>00:52:23</itunes:duration>
    </item>
    <item>
      <title>The Global Assassination Grid (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8425-the_global_assassination_grid</link>
      <description>As they say in the Air Force, ‚No comms no bombs‘,  – A technician’s insight into the invisible networks governing military drones and the quest for accountability
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8425.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8425-eng-deu-fra-The_Global_Assassination_Grid_webm-hd.webm"
        length="631242752"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 11:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8425-eng-deu-fra-The_Global_Assassination_Grid_webm-hd.webm?1482918351</guid>
      <dc:identifier>87092ad2-d3fd-4a37-bb58-1fe71217a06b</dc:identifier>
      <dc:date>2016-12-27T11:30:00+01:00</dc:date>
      <itunes:author>Cian Westmoreland</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>Ethics, Society &amp; Politics</itunes:keywords>
      <itunes:subtitle>The Infrastructure and People behind Drone Killings</itunes:subtitle>
      <itunes:summary>As they say in the Air Force, ‚No comms no bombs‘,  – A technician’s insight into the invisible networks governing military drones and the quest for accountability
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8425.html
</itunes:summary>
      <itunes:duration>01:03:03</itunes:duration>
    </item>
    <item>
      <title>33C3 Opening Ceremony (33c3)</title>
      <link>https://media.ccc.de/v/33c3-8429-33c3_opening_ceremony</link>
      <description>
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8429.html
</description>
      <enclosure url="https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8429-eng-deu-fra-33C3_Opening_Ceremony_webm-hd.webm"
        length="119537664"
        type="video/webm"/>
      <pubDate>Tue, 27 Dec 2016 11:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8429-eng-deu-fra-33C3_Opening_Ceremony_webm-hd.webm?1482854789</guid>
      <dc:identifier>b8e0eb47-4832-4726-bc9b-9015bd96becf</dc:identifier>
      <dc:date>2016-12-27T11:00:00+01:00</dc:date>
      <itunes:author>anna, elisa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>CCC</itunes:keywords>
      <itunes:summary>
about this event: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8429.html
</itunes:summary>
      <itunes:duration>00:15:33</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/congress/2016/folder.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from 33c3 as webm</itunes:summary>
  </channel>
</rss>