<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - HackerHotel 2024 (low quality mp4)</title>
    <link>https://media.ccc.de/c/hackerhotel2024</link>
    <description> This feed contains all events from hackerhotel2024 as mp4</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:43:38 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/unknown.png</url>
      <title>Chaos Computer Club - HackerHotel 2024 (low quality mp4)</title>
      <link>https://media.ccc.de/c/hackerhotel2024</link>
    </image>
    <item>
      <title>Ally talk (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-91-ally-talk</link>
      <description>Nancy and Chantal want to talk about being an ally in the community.

more info is coming!
Nancy and Chantal will take you through a way to be a better ally.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/Y3WFEZ/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-91-eng-Ally_talk_sd.mp4"
        length="149946368"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 21:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-91-eng-Ally_talk_sd.mp4?1707929337</guid>
      <dc:identifier>cd78ce30-1413-5038-bd1c-736caaab030e</dc:identifier>
      <dc:date>2024-02-10T21:00:00+01:00</dc:date>
      <itunes:author>Nancy Beers, Chantal Stekelenburg</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 91, 2024, Talks</itunes:keywords>
      <itunes:summary>Nancy and Chantal want to talk about being an ally in the community.

more info is coming!
Nancy and Chantal will take you through a way to be a better ally.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/Y3WFEZ/
</itunes:summary>
      <itunes:duration>00:50:27</itunes:duration>
    </item>
    <item>
      <title>Hacking your Dreams (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-135-hacking-your-dreams</link>
      <description>You can hack all sorts of things. Software, hardware. But being a hacker, what makes more sense than to hack oneself? Hackers have been turning themselves into bionic man, but we can also just hack our brain, using just out brain. I am talking about lucid dreaming: dreaming while you are aware of doing so and able to shape your dream. This talk will discuss what we know so far about lucid dreams and how they relate to other special states of the mind. The main focus will be on how to hack your own mind to start experiencing lucid dreams, what you can do in them, and how they differ from real life.

What could be more fun than gaining control over your dreamworld? Go to sleep, and find yourself doing things that would be impossible in the real world. Flying? No problem! You can be superman and have it feel more real than reality. Now if that&#39;s not a fun hacking project..
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/HHBEZH/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-135-eng-Hacking_your_Dreams_sd.mp4"
        length="97517568"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 11:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-135-eng-Hacking_your_Dreams_sd.mp4?1707671046</guid>
      <dc:identifier>dde0849f-e105-5de4-ac50-fbb3f87868e7</dc:identifier>
      <dc:date>2024-02-10T11:00:00+01:00</dc:date>
      <itunes:author>Walter Belgers</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 135, 2024, Talks</itunes:keywords>
      <itunes:summary>You can hack all sorts of things. Software, hardware. But being a hacker, what makes more sense than to hack oneself? Hackers have been turning themselves into bionic man, but we can also just hack our brain, using just out brain. I am talking about lucid dreaming: dreaming while you are aware of doing so and able to shape your dream. This talk will discuss what we know so far about lucid dreams and how they relate to other special states of the mind. The main focus will be on how to hack your own mind to start experiencing lucid dreams, what you can do in them, and how they differ from real life.

What could be more fun than gaining control over your dreamworld? Go to sleep, and find yourself doing things that would be impossible in the real world. Flying? No problem! You can be superman and have it feel more real than reality. Now if that&#39;s not a fun hacking project..
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/HHBEZH/
</itunes:summary>
      <itunes:duration>00:48:30</itunes:duration>
    </item>
    <item>
      <title>Closing Hackerhotel 2024 (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-133-closing-hackerhotel-2024</link>
      <description>Closing talk of Hackerhotel 2024 with NFIR CTF award ceremony.

Closing talk of Hackerhotel 2024 with NFIR CTF award ceremony.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/KQUPNG/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-133-eng-Closing_Hackerhotel_2024_sd.mp4"
        length="72351744"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 17:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-133-eng-Closing_Hackerhotel_2024_sd.mp4?1707679256</guid>
      <dc:identifier>cd1f327b-c7b0-568e-8504-eed89efeabf0</dc:identifier>
      <dc:date>2024-02-11T17:30:00+01:00</dc:date>
      <itunes:author>Dimitri</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 133, 2024, Talks</itunes:keywords>
      <itunes:summary>Closing talk of Hackerhotel 2024 with NFIR CTF award ceremony.

Closing talk of Hackerhotel 2024 with NFIR CTF award ceremony.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/KQUPNG/
</itunes:summary>
      <itunes:duration>00:26:42</itunes:duration>
    </item>
    <item>
      <title>Badge Talk (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-165-badge-talk</link>
      <description>Our workflow, challenges and other fun things

From the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yield badges and what it took to deliver these in the hands of the Hacker Hotel people.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/YHMDZ8/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-165-eng-Badge_Talk_sd.mp4"
        length="63963136"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-165-eng-Badge_Talk_sd.mp4?1707679159</guid>
      <dc:identifier>510225c3-677b-5191-bc39-5dbd0d11d491</dc:identifier>
      <dc:date>2024-02-11T16:45:00+01:00</dc:date>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 165, 2024, Talks</itunes:keywords>
      <itunes:summary>Our workflow, challenges and other fun things

From the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yield badges and what it took to deliver these in the hands of the Hacker Hotel people.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/YHMDZ8/
</itunes:summary>
      <itunes:duration>00:33:24</itunes:duration>
    </item>
    <item>
      <title>Geschiedenis van Mediapiraterij in Nederland: onvoorstelbaar groot (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-113-geschiedenis-van-mediapiraterij-in-nederland-onvoorstelbaar-groot</link>
      <description>Als je je eigen opsporingsteam krijgt, dan doe je het pas goed.  Piraterij van muziek en films was midden jaren 90 zo groot dat 1 op de 4 verkochte cd&#39;s illegaal was. De piratenmerken waren bekend in ieder huishouden. De tientallen merken werden aangevoerd door MTV en Twilight. Hoe groot was het nou echt: dat zie je pas als je alles gaat verzamelen. &quot;And so we did&quot;: duizenden cd&#39;s, tapes en DVD&#39;s later is het tijd om eens te duiken in verhalen achter het archief. De collectie is nu te zien in het Homecomputer Museum in Helmond.

Als je je eigen opsporingsteam krijgt, dan doe je het pas goed.  Piraterij van muziek en films was midden jaren 90 zo groot dat 1 op de 4 verkochte cd&#39;s illegaal was. De piratenmerken waren bekend in ieder huishouden. De tientallen merken werden aangevoerd door MTV en Twilight. Hoe groot was het nou echt: dat zie je pas als je alles gaat verzamelen. &quot;And so we did&quot;: duizenden cd&#39;s, tapes en DVD&#39;s later is het tijd om eens te duiken in verhalen achter het archief. De collectie is nu te zien in het Homecomputer Museum in Helmond.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/TFWDPD/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-113-eng-Geschiedenis_van_Mediapiraterij_in_Nederland_onvoorstelbaar_groot_sd.mp4"
        length="114294784"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-113-eng-Geschiedenis_van_Mediapiraterij_in_Nederland_onvoorstelbaar_groot_sd.mp4?1707679033</guid>
      <dc:identifier>1112138b-0866-5f86-83fe-3d7f5debee8b</dc:identifier>
      <dc:date>2024-02-11T16:00:00+01:00</dc:date>
      <itunes:author>Elger &quot;Stitch&quot; Jonker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 113, 2024, Talks</itunes:keywords>
      <itunes:summary>Als je je eigen opsporingsteam krijgt, dan doe je het pas goed.  Piraterij van muziek en films was midden jaren 90 zo groot dat 1 op de 4 verkochte cd&#39;s illegaal was. De piratenmerken waren bekend in ieder huishouden. De tientallen merken werden aangevoerd door MTV en Twilight. Hoe groot was het nou echt: dat zie je pas als je alles gaat verzamelen. &quot;And so we did&quot;: duizenden cd&#39;s, tapes en DVD&#39;s later is het tijd om eens te duiken in verhalen achter het archief. De collectie is nu te zien in het Homecomputer Museum in Helmond.

Als je je eigen opsporingsteam krijgt, dan doe je het pas goed.  Piraterij van muziek en films was midden jaren 90 zo groot dat 1 op de 4 verkochte cd&#39;s illegaal was. De piratenmerken waren bekend in ieder huishouden. De tientallen merken werden aangevoerd door MTV en Twilight. Hoe groot was het nou echt: dat zie je pas als je alles gaat verzamelen. &quot;And so we did&quot;: duizenden cd&#39;s, tapes en DVD&#39;s later is het tijd om eens te duiken in verhalen achter het archief. De collectie is nu te zien in het Homecomputer Museum in Helmond.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/TFWDPD/
</itunes:summary>
      <itunes:duration>00:50:03</itunes:duration>
    </item>
    <item>
      <title>OT Cyberchallenges (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-75-ot-cyberchallenges</link>
      <description>Meet Acme, a wonderful company where nice people make beautiful things... and then management and sales want nice statistics.

Acme is a company like many others. They have been making beautiful things in their factory and workshops for years, but the recent modernization drive also appears to have another side...

What is OT and why is it so special? Join us for a short journey through the wonderful world of industrial automation and the challenges we encountered in our daily engineering lives.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/BNJRFV/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-75-eng-OT_Cyberchallenges_sd.mp4"
        length="106954752"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 15:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-75-eng-OT_Cyberchallenges_sd.mp4?1707678802</guid>
      <dc:identifier>62340b1e-7028-54a0-bacb-2c1e39c16e31</dc:identifier>
      <dc:date>2024-02-11T15:00:00+01:00</dc:date>
      <itunes:author>Elborro, Ad</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 75, 2024, Talks</itunes:keywords>
      <itunes:summary>Meet Acme, a wonderful company where nice people make beautiful things... and then management and sales want nice statistics.

Acme is a company like many others. They have been making beautiful things in their factory and workshops for years, but the recent modernization drive also appears to have another side...

What is OT and why is it so special? Join us for a short journey through the wonderful world of industrial automation and the challenges we encountered in our daily engineering lives.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/BNJRFV/
</itunes:summary>
      <itunes:duration>00:56:31</itunes:duration>
    </item>
    <item>
      <title>How to (try to) rebuild your hackerspace after a disaster (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-88-how-to-try-to-rebuild-your-hackerspace-after-a-disaster</link>
      <description>Hackerspace Pixelbar was once the hottest hackerspace in the Netherlands, things happened and awesome people gathered once again to fix things.

After a terrible fire at hackerspace Pixelbar (Rotterdam) on 28th of June 2023 (https://pixelbar.nl/2023/06/28/Pixelbar-has-experienced-an-unexpected-issue/) There was a need to rebuild the awesome and safe space we got to love. In this talk we will take you on a tour on the process, and how we got to where we are today. Maybe we’ll slide in some exclusive pictures and other cool stuff. Join us for an hour of drama, friendship, memes, hackers and most of all, the warmth(pun intended) of the community
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/PJZEAZ/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-88-eng-How_to_try_to_rebuild_your_hackerspace_after_a_disaster_sd.mp4"
        length="60817408"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-88-eng-How_to_try_to_rebuild_your_hackerspace_after_a_disaster_sd.mp4?1707678575</guid>
      <dc:identifier>cc5c44fc-8cc2-59cf-9ce9-ad9397e7b162</dc:identifier>
      <dc:date>2024-02-11T14:00:00+01:00</dc:date>
      <itunes:author>Miep, Pixelbar, TeQ, Field of View</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 88, 2024, Talks</itunes:keywords>
      <itunes:summary>Hackerspace Pixelbar was once the hottest hackerspace in the Netherlands, things happened and awesome people gathered once again to fix things.

After a terrible fire at hackerspace Pixelbar (Rotterdam) on 28th of June 2023 (https://pixelbar.nl/2023/06/28/Pixelbar-has-experienced-an-unexpected-issue/) There was a need to rebuild the awesome and safe space we got to love. In this talk we will take you on a tour on the process, and how we got to where we are today. Maybe we’ll slide in some exclusive pictures and other cool stuff. Join us for an hour of drama, friendship, memes, hackers and most of all, the warmth(pun intended) of the community
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/PJZEAZ/
</itunes:summary>
      <itunes:duration>00:31:49</itunes:duration>
    </item>
    <item>
      <title>Plucking the low hanging fruit of data and security breaches. How to be rewarded even if there&#39;s no bug bounty program (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-110-plucking-the-low-hanging-fruit-of-data-and-security-breaches-how-to-be-rewarded-even-if-there-s-no-bug-bounty-program</link>
      <description>I call myself &quot;The Lamest Hacker You Know&quot;. I don &#39;t use Kali, 0days, Burp Suite or any tools besides Curl, A browser, and clients for existing software, combined with (semi) open data sources. Probably 90% of my findings are for companies that don&#39;t have a CISO an never even heard the term &quot;Bug Bounty Program&quot;, In this talk I will give some tips on how to reach out to a company out-of-the-blue and not have them hate you.

I call myself &quot;The Lamest Hacker You Know&quot;. 
I don &#39;t use Kali, 0days, burp suite or any tools besides Curl and some (semi) open data sources.

Probably 90% of my findings are for companies that don&#39;t even have a CISO and never even heard of a Bug Bounty Program and yet, I have been rewarded for finds that will make you go &quot;yikes&quot;.

I never once got into trouble because of how I operate: Being radically open. 

In this talk I will look back on some cases I never made public, show you how I work, the upsides and the downsides, and give some tips on how to reach out to a company out-of-the-blue and not have them hate you.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/FPMLCB/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-110-eng-Plucking_the_low_hanging_fruit_of_data_and_security_breaches_How_to_be_rewarded_even_if_theres_no_bug_bounty_program_sd.mp4"
        length="90177536"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 15:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-110-eng-Plucking_the_low_hanging_fruit_of_data_and_security_breaches_How_to_be_rewarded_even_if_theres_no_bug_bounty_program_sd.mp4?1707672861</guid>
      <dc:identifier>6a62a2cc-df57-5432-b1c3-2001d8809d3f</dc:identifier>
      <dc:date>2024-02-11T15:00:00+01:00</dc:date>
      <itunes:author>SchizoDuckie</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 110, 2024, Talks</itunes:keywords>
      <itunes:summary>I call myself &quot;The Lamest Hacker You Know&quot;. I don &#39;t use Kali, 0days, Burp Suite or any tools besides Curl, A browser, and clients for existing software, combined with (semi) open data sources. Probably 90% of my findings are for companies that don&#39;t have a CISO an never even heard the term &quot;Bug Bounty Program&quot;, In this talk I will give some tips on how to reach out to a company out-of-the-blue and not have them hate you.

I call myself &quot;The Lamest Hacker You Know&quot;. 
I don &#39;t use Kali, 0days, burp suite or any tools besides Curl and some (semi) open data sources.

Probably 90% of my findings are for companies that don&#39;t even have a CISO and never even heard of a Bug Bounty Program and yet, I have been rewarded for finds that will make you go &quot;yikes&quot;.

I never once got into trouble because of how I operate: Being radically open. 

In this talk I will look back on some cases I never made public, show you how I work, the upsides and the downsides, and give some tips on how to reach out to a company out-of-the-blue and not have them hate you.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/FPMLCB/
</itunes:summary>
      <itunes:duration>00:50:21</itunes:duration>
    </item>
    <item>
      <title>Energie-Hacken: Dynamische Zelfopslag en Power-Tech (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-72-energie-hacken-dynamische-zelfopslag-en-power-tech</link>
      <description>Van een defecte UPS tot een autonome huisomgeving die zelf energie inkoopt en verkoopt op de meest gunstige en voordelige momenten.

Hoe je een huis uit 1928 toch energiezuinig kunt maken door middel van het slimme gebruik van domotica, IOT, zonnepanelen, accu&#39;s, infraroodpanelen, warmtewerend folie, airco&#39;s en slim gasverbruik met een HR-ketel. Als kers op de taart laten we je zien hoe je gebruik kunt maken van dynamische stroomtarieven. Betaal per uur je stroomverbruik met dynamische prijzen.

Dynamisch is het nieuwe crypto: Navigeer door de energiemarkt met de behendigheid van een Bitcoin-trader!
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/SJLFPA/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-72-nld-Energie-Hacken_Dynamische_Zelfopslag_en_Power-Tech_sd.mp4"
        length="141557760"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 15:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-72-nld-Energie-Hacken_Dynamische_Zelfopslag_en_Power-Tech_sd.mp4?1707671395</guid>
      <dc:identifier>56210a92-3680-5954-ab1a-9609f864a2b1</dc:identifier>
      <dc:date>2024-02-11T15:00:00+01:00</dc:date>
      <itunes:author>Arjen Halma</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 72, 2024, Talks</itunes:keywords>
      <itunes:summary>Van een defecte UPS tot een autonome huisomgeving die zelf energie inkoopt en verkoopt op de meest gunstige en voordelige momenten.

Hoe je een huis uit 1928 toch energiezuinig kunt maken door middel van het slimme gebruik van domotica, IOT, zonnepanelen, accu&#39;s, infraroodpanelen, warmtewerend folie, airco&#39;s en slim gasverbruik met een HR-ketel. Als kers op de taart laten we je zien hoe je gebruik kunt maken van dynamische stroomtarieven. Betaal per uur je stroomverbruik met dynamische prijzen.

Dynamisch is het nieuwe crypto: Navigeer door de energiemarkt met de behendigheid van een Bitcoin-trader!
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/SJLFPA/
</itunes:summary>
      <itunes:duration>01:03:07</itunes:duration>
    </item>
    <item>
      <title>Crypterella Stories: Fortigate (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-114-crypterella-stories-fortigate</link>
      <description>We all love bedtime stories, and these stories are even better when they turn into reality. This cinderella story is about how a big vendor rolled its own algorithm to &quot;encrypt&quot; its firmware images to deter poor hackers like us from fiddling around and potentially uncover flaws. But what if your motive is not to uncover potential flaws, but simply to agnostically fingerprint devices left vulnerable on the internet? 

Join us into a semi-deepdive of reverse engineering the Fortigate firmware &quot;encryption&quot; to satisfy our own curiosity, but also to make the web that little bit more secure by fingerprinting vulnerable devices in a non-obtrusive manner with the endgoal of notifying the related parties.

This talk will go into the process of reverse engineering the Fortigate firmware images with the purpose of developing a non-obtrusive version identification that can be used to fingerprint device firmware versions on the internet, this in turn can be used to notify the related party. Next to a technical deep dive the audience will be presented with a set of questions and thoughts on the topic of encrypting such firmware devices and if this really is the way to go for big vendors, or if these things are only making matters worse by limiting the scope to not just the &quot;bad&quot; people, but also the &quot;good&quot; people.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/QB3Z87/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-114-eng-Crypterella_Stories_Fortigate_sd.mp4"
        length="53477376"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-114-eng-Crypterella_Stories_Fortigate_sd.mp4?1707672611</guid>
      <dc:identifier>1a004edb-8d92-5a49-911a-fd1739e0159c</dc:identifier>
      <dc:date>2024-02-11T14:00:00+01:00</dc:date>
      <itunes:author>axel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 114, 2024, Talks</itunes:keywords>
      <itunes:summary>We all love bedtime stories, and these stories are even better when they turn into reality. This cinderella story is about how a big vendor rolled its own algorithm to &quot;encrypt&quot; its firmware images to deter poor hackers like us from fiddling around and potentially uncover flaws. But what if your motive is not to uncover potential flaws, but simply to agnostically fingerprint devices left vulnerable on the internet? 

Join us into a semi-deepdive of reverse engineering the Fortigate firmware &quot;encryption&quot; to satisfy our own curiosity, but also to make the web that little bit more secure by fingerprinting vulnerable devices in a non-obtrusive manner with the endgoal of notifying the related parties.

This talk will go into the process of reverse engineering the Fortigate firmware images with the purpose of developing a non-obtrusive version identification that can be used to fingerprint device firmware versions on the internet, this in turn can be used to notify the related party. Next to a technical deep dive the audience will be presented with a set of questions and thoughts on the topic of encrypting such firmware devices and if this really is the way to go for big vendors, or if these things are only making matters worse by limiting the scope to not just the &quot;bad&quot; people, but also the &quot;good&quot; people.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/QB3Z87/
</itunes:summary>
      <itunes:duration>00:26:51</itunes:duration>
    </item>
    <item>
      <title>Reinventing the Single 8 home movie format (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-85-reinventing-the-single-8-home-movie-format</link>
      <description>An engineer buys a camera in a second hand store, and finds herself bringing back a defunct film format.

When home movies on 8mm film were king, there was a format war between Kodak&#39;s Super 8 and Fuji&#39;s Single 8. Just like Sony&#39;s Betamax in the home video wars, Fuji&#39;s technically superior contender lost the battle, and the final Single 8 cartridges were manufactured in about 2010.

The physical dimensions of the film are the same though, so here in 2023 it should be possible to load a Single 8 camera with film from a Super 8 cartridge. This is the story of the revival and reinvention of a lost film format through OpenSCAD and 3D printing, done mostly without an original cartridge to copy.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/VZC8LK/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-85-eng-Reinventing_the_Single_8_home_movie_format_sd.mp4"
        length="46137344"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-85-eng-Reinventing_the_Single_8_home_movie_format_sd.mp4?1707671147</guid>
      <dc:identifier>7d271302-352d-5c3e-8d21-acbfd19f831c</dc:identifier>
      <dc:date>2024-02-11T14:00:00+01:00</dc:date>
      <itunes:author>Jenny List</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 85, 2024, Talks</itunes:keywords>
      <itunes:summary>An engineer buys a camera in a second hand store, and finds herself bringing back a defunct film format.

When home movies on 8mm film were king, there was a format war between Kodak&#39;s Super 8 and Fuji&#39;s Single 8. Just like Sony&#39;s Betamax in the home video wars, Fuji&#39;s technically superior contender lost the battle, and the final Single 8 cartridges were manufactured in about 2010.

The physical dimensions of the film are the same though, so here in 2023 it should be possible to load a Single 8 camera with film from a Super 8 cartridge. This is the story of the revival and reinvention of a lost film format through OpenSCAD and 3D printing, done mostly without an original cartridge to copy.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/VZC8LK/
</itunes:summary>
      <itunes:duration>00:21:19</itunes:duration>
    </item>
    <item>
      <title>Where physical security meets cyber security. (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-106-where-physical-security-meets-cyber-security-</link>
      <description>Critical infrastructure like data centers needs to be well protected. While there is lots of cyber security knowledge around at Hacker Hotel, in this talk we want to share knowledge on the physical security side of protection. Physical security measures are mostly controlled by PLC&#39;s. Thus physical security bears cyber risks as well.

The talk will cover:
How are physical security measures designed?
How do you create stand-off distance? (airgap)
How are physical security measures pen-tested?
What controllers / PLCs and converters are used? (IP, RS-485:IP)
The presentation will contain practical examples and crash test movies.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/9FQXNF/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-106-eng-Where_physical_security_meets_cyber_security_sd.mp4"
        length="97517568"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 11:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-106-eng-Where_physical_security_meets_cyber_security_sd.mp4?1707672538</guid>
      <dc:identifier>25afdf8d-c3a0-53d4-bb98-baa373113855</dc:identifier>
      <dc:date>2024-02-11T11:00:00+01:00</dc:date>
      <itunes:author>Jasper Weijman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 106, 2024, Talks</itunes:keywords>
      <itunes:summary>Critical infrastructure like data centers needs to be well protected. While there is lots of cyber security knowledge around at Hacker Hotel, in this talk we want to share knowledge on the physical security side of protection. Physical security measures are mostly controlled by PLC&#39;s. Thus physical security bears cyber risks as well.

The talk will cover:
How are physical security measures designed?
How do you create stand-off distance? (airgap)
How are physical security measures pen-tested?
What controllers / PLCs and converters are used? (IP, RS-485:IP)
The presentation will contain practical examples and crash test movies.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/9FQXNF/
</itunes:summary>
      <itunes:duration>00:43:40</itunes:duration>
    </item>
    <item>
      <title>Ransomware never really left (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-145-ransomware-never-really-left</link>
      <description>Ransomware is still a serious threat to a lot of people and organisations and nowadays using more and more advanced techniques. And now also with new open AI technology, criminals are able to organise a sophisticated attack in minutes to target you and steal your data.

This talk will tell us what Ransomware actually is, who’s writing the code and making money out of it, it shows us a bit of the Ransomware history and what types are out there, to better understand what we’re dealing with. And explain all of the ransomware attack stages and what you can do in terms of detection and defence inside your security operations.

For the security analysts out there this talk will be beneficial when looking for traces Ransomware attacks are leaving behind. Including a demonstration of a Ransomware scenario making use of open AI technology in a sandboxed environment and show all of the attack stages to learn and recognise the IOCs in a Red and blue teaming scenario.

This ain’t everything. I’ll show what kind of information ransomware groups are sharing and what happened when a random organization was hit by a ransomware attack and their sensitive information was published on the dark web..

Life has been good until that day a phishing mail arrived. Out of curiosity you clicked the link in the email and after that the desktop background on your screen changes with the message to immediately transfer an amount of bitcoins to retrieve your files.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/CXLP8X/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-145-eng-Ransomware_never_really_left_sd.mp4"
        length="76546048"
        type="video/mp4"/>
      <pubDate>Sun, 11 Feb 2024 11:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-145-eng-Ransomware_never_really_left_sd.mp4?1707669507</guid>
      <dc:identifier>0dbf21f8-d38e-53c9-8c3a-aeb9cebff164</dc:identifier>
      <dc:date>2024-02-11T11:00:00+01:00</dc:date>
      <itunes:author>Erik Heskes</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 145, 2024, Talks</itunes:keywords>
      <itunes:summary>Ransomware is still a serious threat to a lot of people and organisations and nowadays using more and more advanced techniques. And now also with new open AI technology, criminals are able to organise a sophisticated attack in minutes to target you and steal your data.

This talk will tell us what Ransomware actually is, who’s writing the code and making money out of it, it shows us a bit of the Ransomware history and what types are out there, to better understand what we’re dealing with. And explain all of the ransomware attack stages and what you can do in terms of detection and defence inside your security operations.

For the security analysts out there this talk will be beneficial when looking for traces Ransomware attacks are leaving behind. Including a demonstration of a Ransomware scenario making use of open AI technology in a sandboxed environment and show all of the attack stages to learn and recognise the IOCs in a Red and blue teaming scenario.

This ain’t everything. I’ll show what kind of information ransomware groups are sharing and what happened when a random organization was hit by a ransomware attack and their sensitive information was published on the dark web..

Life has been good until that day a phishing mail arrived. Out of curiosity you clicked the link in the email and after that the desktop background on your screen changes with the message to immediately transfer an amount of bitcoins to retrieve your files.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/CXLP8X/
</itunes:summary>
      <itunes:duration>00:42:08</itunes:duration>
    </item>
    <item>
      <title>Counting the votes, a quest to create new software for the Dutch elections (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-159-counting-the-votes-a-quest-to-create-new-software-for-the-dutch-elections</link>
      <description>The Dutch Electoral Council has asked a bunch of nerds to help them with new software for the elections. What is needed and how can you help?

The Dutch Electoral Council has asked a bunch of nerds to help them with new software for the elections. 

The main source of truth in the Dutch elections are the paper documents, the software is there to support the process and assist with simple tasks. Given the age and complexity of the current setup, the Council is looking for something new and more simple. By law, it will be open source! 

This lecture will take you into the inner workings of the Dutch election system and give an insight into the questions the still growing devteam of the Electoral Council asks itself. What exactly does the current software do, how do we plan to make it better and how can you help? Come in, it is open!
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/WTE3FQ/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-159-nld-Counting_the_votes_a_quest_to_create_new_software_for_the_Dutch_elections_sd.mp4"
        length="126877696"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-159-nld-Counting_the_votes_a_quest_to_create_new_software_for_the_Dutch_elections_sd.mp4?1707669350</guid>
      <dc:identifier>31bcd956-caed-5005-8493-5aebb46e1751</dc:identifier>
      <dc:date>2024-02-10T16:45:00+01:00</dc:date>
      <itunes:author>nino</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 159, 2024, Talks</itunes:keywords>
      <itunes:summary>The Dutch Electoral Council has asked a bunch of nerds to help them with new software for the elections. What is needed and how can you help?

The Dutch Electoral Council has asked a bunch of nerds to help them with new software for the elections. 

The main source of truth in the Dutch elections are the paper documents, the software is there to support the process and assist with simple tasks. Given the age and complexity of the current setup, the Council is looking for something new and more simple. By law, it will be open source! 

This lecture will take you into the inner workings of the Dutch election system and give an insight into the questions the still growing devteam of the Electoral Council asks itself. What exactly does the current software do, how do we plan to make it better and how can you help? Come in, it is open!
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/WTE3FQ/
</itunes:summary>
      <itunes:duration>00:55:27</itunes:duration>
    </item>
    <item>
      <title>Threat Modeling for Privacy and against Stalkers (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-93-threat-modeling-for-privacy-and-against-stalkers</link>
      <description>When we talk about tech stacks we usually think about big organizations running systems, but in the current day and age we too have a large digital footprint. In this talk we will go over mapping out our personal tech stack and start identifying any threats that could be useful to help prevent stalking and harassment, or at least be aware of the risks you encounter so you can make informed choices about data that you share.

In the presentation I’ll give an example of a basic threat modeling that can be applied to our personal digital footprint to help improve privacy and protect yourself against nosey governments and digital stalking.

We start with creating an overview of all apps, services and accounts that we use and contain personal information, focusing on those that can be exploited for stalking or bullying purposes. From there we will apply threat modeling methods, mainly persona non grata, to identify how they can be exploited by malicious actors. Either working from publicly shared information or who might have gained access to private details in legitimate or illegitimate ways.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/JTUNBY/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-93-eng-Threat_Modeling_for_Privacy_and_against_Stalkers_sd.mp4"
        length="68157440"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-93-eng-Threat_Modeling_for_Privacy_and_against_Stalkers_sd.mp4?1707669130</guid>
      <dc:identifier>d4fc9bb0-af2a-5c1f-adcc-80c1c35e2a5c</dc:identifier>
      <dc:date>2024-02-10T16:00:00+01:00</dc:date>
      <itunes:author>Dany</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 93, 2024, Talks</itunes:keywords>
      <itunes:summary>When we talk about tech stacks we usually think about big organizations running systems, but in the current day and age we too have a large digital footprint. In this talk we will go over mapping out our personal tech stack and start identifying any threats that could be useful to help prevent stalking and harassment, or at least be aware of the risks you encounter so you can make informed choices about data that you share.

In the presentation I’ll give an example of a basic threat modeling that can be applied to our personal digital footprint to help improve privacy and protect yourself against nosey governments and digital stalking.

We start with creating an overview of all apps, services and accounts that we use and contain personal information, focusing on those that can be exploited for stalking or bullying purposes. From there we will apply threat modeling methods, mainly persona non grata, to identify how they can be exploited by malicious actors. Either working from publicly shared information or who might have gained access to private details in legitimate or illegitimate ways.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/JTUNBY/
</itunes:summary>
      <itunes:duration>00:36:57</itunes:duration>
    </item>
    <item>
      <title>Everything you always wanted to know about cryptography but were afraid to ask (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-158-everything-you-always-wanted-to-know-about-cryptography-but-were-afraid-to-ask</link>
      <description>What is this DES and why is it bad? Should I always use AES-256, bigger is better right? Who are these RSA-dudes in the first place and why do I need 25519 elliptic curves in my life? Is quantum really that bad for encryption and what can I do about it?  
If these are questions keeping you up at 05:00, then this talk might be for you!

Cryptography is not only essential in our modern-day lives, but it has been for thousands of years.  
After some historical context, we will dive into some modern ciphers like DES, AES, RSA and ECC. I will show you how they work (using simple to understand high-school math and pretty pictures) and how to use them. We will then see how quantum computers are bad for cryptography and show techniques that can counter that.

The slides are in English, the spoken language can be English or Dutch (depending on the audience).

Pre-talk disclaimer: the provided explanations are very high-level and leave out details that make the ciphers actually secure. **DO NOT USE THEM IN YOUR PROJECTS!**
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/B7BL3K/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-158-eng-Everything_you_always_wanted_to_know_about_cryptography_but_were_afraid_to_ask_sd.mp4"
        length="111149056"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 15:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-158-eng-Everything_you_always_wanted_to_know_about_cryptography_but_were_afraid_to_ask_sd.mp4?1707668767</guid>
      <dc:identifier>dabcb596-ea40-5661-a31d-6bf37f1d400a</dc:identifier>
      <dc:date>2024-02-10T15:00:00+01:00</dc:date>
      <itunes:author>Lord egeltje</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 158, 2024, Talks</itunes:keywords>
      <itunes:summary>What is this DES and why is it bad? Should I always use AES-256, bigger is better right? Who are these RSA-dudes in the first place and why do I need 25519 elliptic curves in my life? Is quantum really that bad for encryption and what can I do about it?  
If these are questions keeping you up at 05:00, then this talk might be for you!

Cryptography is not only essential in our modern-day lives, but it has been for thousands of years.  
After some historical context, we will dive into some modern ciphers like DES, AES, RSA and ECC. I will show you how they work (using simple to understand high-school math and pretty pictures) and how to use them. We will then see how quantum computers are bad for cryptography and show techniques that can counter that.

The slides are in English, the spoken language can be English or Dutch (depending on the audience).

Pre-talk disclaimer: the provided explanations are very high-level and leave out details that make the ciphers actually secure. **DO NOT USE THEM IN YOUR PROJECTS!**
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/B7BL3K/
</itunes:summary>
      <itunes:duration>01:00:02</itunes:duration>
    </item>
    <item>
      <title>Opening electronic safe locks with ketchup and lasers (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-115-opening-electronic-safe-locks-with-ketchup-and-lasers</link>
      <description>Mechanical safe locks are quickly replaced with their electronic counterparts. While there are many benefits, the security implications are far less understood than the mechanical systems. Jan-Willem collects and researches electronic safe locks and will share his thoughts. From dumping chips with lasers to locks which can be opened with ketchup.

We use safes to protect our valuables from threats. We trust these systems to keep the assets safe. Mechanical combination locks can be quite cumbersome to operate, and don&#39;t have the benefits including auditing, remote access, multi-user, time lock, and much more. But how the additional electronics impacts the security of the safe isn&#39;t widely understood.  

This talk goes into researching the security of electronic safe locks, from reverse engineering known attacks, to learning from scratch. For example, we used laser fault injection to read out the memory of several chips to analyze the code looking for bugs and back doors. While at the low-end, we reverse engineered lock spiking, and use ketchup to open locks.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/3PFXDX/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-115-eng-Opening_electronic_safe_locks_with_ketchup_and_lasers_sd.mp4"
        length="81788928"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-115-eng-Opening_electronic_safe_locks_with_ketchup_and_lasers_sd.mp4?1707667552</guid>
      <dc:identifier>c6bd3d75-754a-58a2-82ed-fcbfa3b8cdd6</dc:identifier>
      <dc:date>2024-02-10T14:00:00+01:00</dc:date>
      <itunes:author>Jan-Willem Markus</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 115, 2024, Talks</itunes:keywords>
      <itunes:summary>Mechanical safe locks are quickly replaced with their electronic counterparts. While there are many benefits, the security implications are far less understood than the mechanical systems. Jan-Willem collects and researches electronic safe locks and will share his thoughts. From dumping chips with lasers to locks which can be opened with ketchup.

We use safes to protect our valuables from threats. We trust these systems to keep the assets safe. Mechanical combination locks can be quite cumbersome to operate, and don&#39;t have the benefits including auditing, remote access, multi-user, time lock, and much more. But how the additional electronics impacts the security of the safe isn&#39;t widely understood.  

This talk goes into researching the security of electronic safe locks, from reverse engineering known attacks, to learning from scratch. For example, we used laser fault injection to read out the memory of several chips to analyze the code looking for bugs and back doors. While at the low-end, we reverse engineered lock spiking, and use ketchup to open locks.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/3PFXDX/
</itunes:summary>
      <itunes:duration>00:43:58</itunes:duration>
    </item>
    <item>
      <title>Basisbeveiliging / Internet Cleanup Foundation - State of the map (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-112-basisbeveiliging-internet-cleanup-foundation-state-of-the-map</link>
      <description>An overview of the new maps and new metrics added in 2023, and what it did.

An overview of the new maps and new metrics added in 2023, and what it did.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/ADQKKH/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-112-eng-Basisbeveiliging_Internet_Cleanup_Foundation_-_State_of_the_map_sd.mp4"
        length="72351744"
        type="video/mp4"/>
      <pubDate>Fri, 09 Feb 2024 17:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-112-eng-Basisbeveiliging_Internet_Cleanup_Foundation_-_State_of_the_map_sd.mp4?1707653466</guid>
      <dc:identifier>ea448f39-7688-5ed3-bcaa-b25df337bd76</dc:identifier>
      <dc:date>2024-02-09T17:00:00+01:00</dc:date>
      <itunes:author>Elger &quot;Stitch&quot; Jonker</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 112, 2024, Talks</itunes:keywords>
      <itunes:summary>An overview of the new maps and new metrics added in 2023, and what it did.

An overview of the new maps and new metrics added in 2023, and what it did.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/ADQKKH/
</itunes:summary>
      <itunes:duration>00:38:02</itunes:duration>
    </item>
    <item>
      <title>A feline approach to NIS2 (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-140-a-feline-approach-to-nis2</link>
      <description>In security one of the biggest changes will be the fact that on Oct 17th a lot of organisations need to have implemented. A big challenge for many organisations who haven&#39;t got a clue. But what do you need to do? And what does that mean? 

One of the solutions maybe to take a feline approach to NIS2 and fulfill parts of the compliance needs with OpenKAT. Not just for organisations, but also for software solutions that are used with in the chain. 

In this talk the main points of NIS2 will be explained as well as the parts where automation with OpenKAT can make a change.

In security one of the biggest changes will be the fact that on Oct 17th a lot of organisations need to have implemented. A big challenge for many organisations who haven&#39;t got a clue. But what do you need to do? And what does that mean? 

One of the solutions maybe to take a feline approach to NIS2 and fulfill parts of the compliance needs with OpenKAT. Not just for organisations, but also for software solutions that are used with in the chain. 

In this talk the main points of NIS2 will be explained as well as the parts where automation with OpenKAT can make a change.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/NYAXKU/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-140-eng-A_feline_approach_to_NIS2_sd.mp4"
        length="101711872"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-140-eng-A_feline_approach_to_NIS2_sd.mp4?1707652013</guid>
      <dc:identifier>43758271-7747-5283-a799-d43526401d0c</dc:identifier>
      <dc:date>2024-02-10T16:00:00+01:00</dc:date>
      <itunes:author>Brenno de Winter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 140, 2024, Talks</itunes:keywords>
      <itunes:summary>In security one of the biggest changes will be the fact that on Oct 17th a lot of organisations need to have implemented. A big challenge for many organisations who haven&#39;t got a clue. But what do you need to do? And what does that mean? 

One of the solutions maybe to take a feline approach to NIS2 and fulfill parts of the compliance needs with OpenKAT. Not just for organisations, but also for software solutions that are used with in the chain. 

In this talk the main points of NIS2 will be explained as well as the parts where automation with OpenKAT can make a change.

In security one of the biggest changes will be the fact that on Oct 17th a lot of organisations need to have implemented. A big challenge for many organisations who haven&#39;t got a clue. But what do you need to do? And what does that mean? 

One of the solutions maybe to take a feline approach to NIS2 and fulfill parts of the compliance needs with OpenKAT. Not just for organisations, but also for software solutions that are used with in the chain. 

In this talk the main points of NIS2 will be explained as well as the parts where automation with OpenKAT can make a change.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/NYAXKU/
</itunes:summary>
      <itunes:duration>00:48:45</itunes:duration>
    </item>
    <item>
      <title>Crytocalypse Now! And why the Dutch government is investing so much in Post Quantum Crypto already. (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-82-crytocalypse-now-and-why-the-dutch-government-is-investing-so-much-in-post-quantum-crypto-already-</link>
      <description>In this talk i will share the plans of the Dutch government on building a quantum computer resistive infrastructure. The government actually started last year with its program. Whats the plan of the central government now and in the next years, nation wide and internationally.

In this talk i will share the plans of the Dutch government on building a quantum computer resistive infrastructure. The government actually started last year with its program. Whats the plan of the central government now and in the next years, nation wide and internationally.

The national intelligence agency (AIVD) also published a migration handbook. What is in this book and how might it help you too.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/RFAGVM/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-82-eng-Crytocalypse_Now_And_why_the_Dutch_government_is_investing_so_much_in_Post_Quantum_Crypto_already_sd.mp4"
        length="131072000"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 16:45:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-82-eng-Crytocalypse_Now_And_why_the_Dutch_government_is_investing_so_much_in_Post_Quantum_Crypto_already_sd.mp4?1707618043</guid>
      <dc:identifier>8cbf1644-899a-54db-ad0e-f1ebd36d152d</dc:identifier>
      <dc:date>2024-02-10T16:45:00+01:00</dc:date>
      <itunes:author>Oscar Koeroo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 82, 2024, Talks</itunes:keywords>
      <itunes:summary>In this talk i will share the plans of the Dutch government on building a quantum computer resistive infrastructure. The government actually started last year with its program. Whats the plan of the central government now and in the next years, nation wide and internationally.

In this talk i will share the plans of the Dutch government on building a quantum computer resistive infrastructure. The government actually started last year with its program. Whats the plan of the central government now and in the next years, nation wide and internationally.

The national intelligence agency (AIVD) also published a migration handbook. What is in this book and how might it help you too.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/RFAGVM/
</itunes:summary>
      <itunes:duration>00:48:47</itunes:duration>
    </item>
    <item>
      <title>Empowering Cybersecurity Excellence: Unveiling the DIVD Academy Journey (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-105-empowering-cybersecurity-excellence-unveiling-the-divd-academy-journey</link>
      <description>Dive into the World of Cybersecurity Excellence with DIVD Academy: A Journey of Skill Enhancement and Threat Mitigation. This talk explores the pivotal role of DIVD Academy in shaping cybersecurity professionals, fostering skill development, and equipping individuals to combat evolving digital threats. Discover the cutting-edge training methodologies, industry insights, and real-world scenarios that make DIVD Academy a cornerstone in the pursuit of cybersecurity mastery. Join us as we unravel the transformative experience awaiting those who embark on the DIVD Academy adventure.

In this engaging talk, we delve into the dynamic landscape of cybersecurity through the lens of DIVD Academy. Unpacking the essential components of the academy&#39;s curriculum, we explore how it cultivates expertise and resilience in the face of digital adversaries. From hands-on training modules to strategic insights, attendees will gain a comprehensive understanding of the DIVD Academy&#39;s role in fostering cybersecurity excellence. Whether you&#39;re a seasoned professional or just starting in the field, this talk offers valuable insights into the world of DIVD Academy and its impact on shaping the next generation of cyber defenders.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/897EXD/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-105-nld-Empowering_Cybersecurity_Excellence_Unveiling_the_DIVD_Academy_Journey_sd.mp4"
        length="84934656"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-105-nld-Empowering_Cybersecurity_Excellence_Unveiling_the_DIVD_Academy_Journey_sd.mp4?1707615948</guid>
      <dc:identifier>728b4db4-dbaa-5c52-ac27-fe4d1e4af727</dc:identifier>
      <dc:date>2024-02-10T16:00:00+01:00</dc:date>
      <itunes:author>Astrid Oosenbrug</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 105, 2024, Talks</itunes:keywords>
      <itunes:summary>Dive into the World of Cybersecurity Excellence with DIVD Academy: A Journey of Skill Enhancement and Threat Mitigation. This talk explores the pivotal role of DIVD Academy in shaping cybersecurity professionals, fostering skill development, and equipping individuals to combat evolving digital threats. Discover the cutting-edge training methodologies, industry insights, and real-world scenarios that make DIVD Academy a cornerstone in the pursuit of cybersecurity mastery. Join us as we unravel the transformative experience awaiting those who embark on the DIVD Academy adventure.

In this engaging talk, we delve into the dynamic landscape of cybersecurity through the lens of DIVD Academy. Unpacking the essential components of the academy&#39;s curriculum, we explore how it cultivates expertise and resilience in the face of digital adversaries. From hands-on training modules to strategic insights, attendees will gain a comprehensive understanding of the DIVD Academy&#39;s role in fostering cybersecurity excellence. Whether you&#39;re a seasoned professional or just starting in the field, this talk offers valuable insights into the world of DIVD Academy and its impact on shaping the next generation of cyber defenders.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/897EXD/
</itunes:summary>
      <itunes:duration>00:29:49</itunes:duration>
    </item>
    <item>
      <title>Unmasking the Bullshit in Cybersecurity (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-86-unmasking-the-bullshit-in-cybersecurity</link>
      <description>How organisations adopt buzzwords from the market and incorporate them into tenders, RFPs etc.

During this session we will look at all the marketing buzzwords like SIEM/SOC, we go in-depth on topics such as pentesting, Unicorns, SIEM, signatures and, of course, compliancy vs. security. There will be a short panel discussion on how we as a community can change the mindset and make sure organisations will get the right tooling and knowledge (people) to become more cyber resilient.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/XDAAAH/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-86-eng-Unmasking_the_Bullshit_in_Cybersecurity_sd.mp4"
        length="90177536"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-86-eng-Unmasking_the_Bullshit_in_Cybersecurity_sd.mp4?1707615966</guid>
      <dc:identifier>7b43314d-3d0b-5f69-8ae6-aaa9f99e7c55</dc:identifier>
      <dc:date>2024-02-10T22:00:00+01:00</dc:date>
      <itunes:author>Ronald Kingma, Jasper Dijkgraaf</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 86, 2024, Talks</itunes:keywords>
      <itunes:summary>How organisations adopt buzzwords from the market and incorporate them into tenders, RFPs etc.

During this session we will look at all the marketing buzzwords like SIEM/SOC, we go in-depth on topics such as pentesting, Unicorns, SIEM, signatures and, of course, compliancy vs. security. There will be a short panel discussion on how we as a community can change the mindset and make sure organisations will get the right tooling and knowledge (people) to become more cyber resilient.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/XDAAAH/
</itunes:summary>
      <itunes:duration>00:37:10</itunes:duration>
    </item>
    <item>
      <title>EOS/Thuisbatterij techtalk (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-87-eos-thuisbatterij-techtalk</link>
      <description>Lets talk about battery&#39;s! 

Li-ion, salt, H2 or LFP, veel systemen zijn er op dit moment beschikbaar of komen beschikbaar. Alleen zijn er nieuwe regelgevingen op de loer en wordt de positie van de netbeheerder belangrijker. Welke ontwikkelingen zijn er en hoe vormt het zich? 

Ik neem jullie mee in mijn reis waarin ik een thuisbatterij heb gebouwd. Tijdens mijn presentatie deel ik basale informatie welke ik ook deel met mijn klanten. 

Kleine discussie is leuk, maar houd de temperatuur in de gaten, geen thermal runaway ;-)

EOS, LFP, NCA, Li-Ion, nen4046, netbeheerders, grid capacity (NL), ckomende wetgeving, etc/wvttk
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/AYHRPY/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-87-nld-EOS_Thuisbatterij_techtalk_sd.mp4"
        length="72351744"
        type="video/mp4"/>
      <pubDate>Fri, 09 Feb 2024 16:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-87-nld-EOS_Thuisbatterij_techtalk_sd.mp4?1707612906</guid>
      <dc:identifier>ab3921b7-f4bb-585a-af7b-3b2bc0021862</dc:identifier>
      <dc:date>2024-02-09T16:30:00+01:00</dc:date>
      <itunes:author>[M]ichiel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 87, 2024, Talks</itunes:keywords>
      <itunes:summary>Lets talk about battery&#39;s! 

Li-ion, salt, H2 or LFP, veel systemen zijn er op dit moment beschikbaar of komen beschikbaar. Alleen zijn er nieuwe regelgevingen op de loer en wordt de positie van de netbeheerder belangrijker. Welke ontwikkelingen zijn er en hoe vormt het zich? 

Ik neem jullie mee in mijn reis waarin ik een thuisbatterij heb gebouwd. Tijdens mijn presentatie deel ik basale informatie welke ik ook deel met mijn klanten. 

Kleine discussie is leuk, maar houd de temperatuur in de gaten, geen thermal runaway ;-)

EOS, LFP, NCA, Li-Ion, nen4046, netbeheerders, grid capacity (NL), ckomende wetgeving, etc/wvttk
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/AYHRPY/
</itunes:summary>
      <itunes:duration>00:33:07</itunes:duration>
    </item>
    <item>
      <title>OSINT - How AI fuels disinformation (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-146-osint-how-ai-fuels-disinformation</link>
      <description>Nico Dekens a.k.a Dutch_OSINTguy, a renowned open source intelligence professional, has noticed recurring patterns in
content created using artificial intelligence. He demonstrates how he has used OSINT tools and even
basic search engines to locate and identify online accounts that appear to be using autogenerated
website content, social media posts, reviews, and hate speech.

The proliferation of content generated by artificial intelligence (AI) is just beginning. Recent years have
seen online accounts, run by bots, create fake news articles, divisive social media posts, fraudulent
product reviews, and more. As mainstream access to AI tools spreads, the opportunities to use the
technology for malicious purposes are on the rise.


Nico Dekens, a renowned open source intelligence professional, has noticed recurring patterns in
content created using artificial intelligence. He demonstrates how he has used OSINT tools and even
basic search engines to locate and identify online accounts that appear to be using autogenerated
website content, social media posts, reviews, and hate speech.


Investigative approaches and techniques are covered, including a list of string text that can be easily
searched to locate these types of accounts. There is also a detailed example for generating high-quality
deep fake photos using Midjourney.


The author takes an ethical stance on the use of artificial intelligence and advocates for validating online
content using OSINT investigative methodology. This paper provides an investigative study for
identifying AI-generated content.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/ED8Z7P/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-146-eng-OSINT_-_How_AI_fuels_disinformation_sd.mp4"
        length="76546048"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 15:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-146-eng-OSINT_-_How_AI_fuels_disinformation_sd.mp4?1707615696</guid>
      <dc:identifier>d35c6e1f-fa72-5b77-8929-22581e414cf1</dc:identifier>
      <dc:date>2024-02-10T15:00:00+01:00</dc:date>
      <itunes:author>Nico Dekens</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 146, 2024, Talks</itunes:keywords>
      <itunes:summary>Nico Dekens a.k.a Dutch_OSINTguy, a renowned open source intelligence professional, has noticed recurring patterns in
content created using artificial intelligence. He demonstrates how he has used OSINT tools and even
basic search engines to locate and identify online accounts that appear to be using autogenerated
website content, social media posts, reviews, and hate speech.

The proliferation of content generated by artificial intelligence (AI) is just beginning. Recent years have
seen online accounts, run by bots, create fake news articles, divisive social media posts, fraudulent
product reviews, and more. As mainstream access to AI tools spreads, the opportunities to use the
technology for malicious purposes are on the rise.


Nico Dekens, a renowned open source intelligence professional, has noticed recurring patterns in
content created using artificial intelligence. He demonstrates how he has used OSINT tools and even
basic search engines to locate and identify online accounts that appear to be using autogenerated
website content, social media posts, reviews, and hate speech.


Investigative approaches and techniques are covered, including a list of string text that can be easily
searched to locate these types of accounts. There is also a detailed example for generating high-quality
deep fake photos using Midjourney.


The author takes an ethical stance on the use of artificial intelligence and advocates for validating online
content using OSINT investigative methodology. This paper provides an investigative study for
identifying AI-generated content.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/ED8Z7P/
</itunes:summary>
      <itunes:duration>00:40:46</itunes:duration>
    </item>
    <item>
      <title>Ham Radio for hackers (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-123-ham-radio-for-hackers</link>
      <description>Ham radio is a nice hobby, with a bit of overlap with the hacker community.
It&#39;s a very technical hobby, with a lot of variation. Much more than an Old Man talking on the radio all day.

Ham radio is a nice hobby, with a bit of overlap with the hacker community.
It&#39;s a very technical hobby, with a lot of variation. Much more than an Old Man talking on the radio all day.
As a licensed HAM you have access to many frequency bands
- HF, these are low frequencies that can travel 1000ths of kilometers without repeater
- But also frequencies close to &#39;commercial&#39; products, a ham could use LoRa 433MHz with over 100W to see what that does.
- Also on 2.4GHz and 5GHz there is a HAM radio frequency band next to the WiFi band that can be used with much power.
- There are a bunch of satellites that can be used for (data) communication as well.

I&#39;ll show you some possibilities with a HAM radio license, and tell you a bit about how you can get into it.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/WAFHXM/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-123-eng-Ham_Radio_for_hackers_sd.mp4"
        length="120586240"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 15:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-123-eng-Ham_Radio_for_hackers_sd.mp4?1707612873</guid>
      <dc:identifier>5f66f994-85c0-523c-86f3-8e9932a9981e</dc:identifier>
      <dc:date>2024-02-10T15:00:00+01:00</dc:date>
      <itunes:author>Ward De Ridder</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 123, 2024, Talks</itunes:keywords>
      <itunes:summary>Ham radio is a nice hobby, with a bit of overlap with the hacker community.
It&#39;s a very technical hobby, with a lot of variation. Much more than an Old Man talking on the radio all day.

Ham radio is a nice hobby, with a bit of overlap with the hacker community.
It&#39;s a very technical hobby, with a lot of variation. Much more than an Old Man talking on the radio all day.
As a licensed HAM you have access to many frequency bands
- HF, these are low frequencies that can travel 1000ths of kilometers without repeater
- But also frequencies close to &#39;commercial&#39; products, a ham could use LoRa 433MHz with over 100W to see what that does.
- Also on 2.4GHz and 5GHz there is a HAM radio frequency band next to the WiFi band that can be used with much power.
- There are a bunch of satellites that can be used for (data) communication as well.

I&#39;ll show you some possibilities with a HAM radio license, and tell you a bit about how you can get into it.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/WAFHXM/
</itunes:summary>
      <itunes:duration>00:36:45</itunes:duration>
    </item>
    <item>
      <title>Build your own hackersguild! (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-95-build-your-own-hackersguild-</link>
      <description>This talk explores the concept of hackersguilds, groups of engineers collaborating to enhance internal information security. Through various activities such as answering inquiries, conducting internal pentesting exercises, and participating in CTF competitions, hackersguilds empower engineers to actively contribute to an organization&#39;s security efforts. The talk provides practical insights into initiating and nurturing hackersguilds, fostering a collaborative environment that taps into collective expertise. By leveraging hackersguilds, organizations can enhance resilience against cyber threats and foster a culture of continuous learning. Attendees will gain a comprehensive understanding of hackersguilds&#39; potential for a more secure future.

This talk explores the concept of hackersguilds, groups of engineers collaborating to enhance internal information security. Through various activities such as answering inquiries, conducting pentesting exercises, and participating in CTF competitions, hackersguilds empower engineers to actively contribute to an organization&#39;s security efforts. The talk provides practical insights into initiating and nurturing hackersguilds, fostering a collaborative environment that taps into collective expertise. By leveraging hackersguilds, organizations can enhance resilience against cyber threats and foster a culture of continuous learning. Attendees will gain a comprehensive understanding of hackersguilds&#39; potential for a more secure future.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/K39SKE/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-95-nld-Build_your_own_hackersguild_sd.mp4"
        length="70254592"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 11:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-95-nld-Build_your_own_hackersguild_sd.mp4?1707612845</guid>
      <dc:identifier>0208d912-e399-57ba-9bb3-7c7690d3f374</dc:identifier>
      <dc:date>2024-02-10T11:00:00+01:00</dc:date>
      <itunes:author>Sp0Q</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 95, 2024, Talks</itunes:keywords>
      <itunes:summary>This talk explores the concept of hackersguilds, groups of engineers collaborating to enhance internal information security. Through various activities such as answering inquiries, conducting internal pentesting exercises, and participating in CTF competitions, hackersguilds empower engineers to actively contribute to an organization&#39;s security efforts. The talk provides practical insights into initiating and nurturing hackersguilds, fostering a collaborative environment that taps into collective expertise. By leveraging hackersguilds, organizations can enhance resilience against cyber threats and foster a culture of continuous learning. Attendees will gain a comprehensive understanding of hackersguilds&#39; potential for a more secure future.

This talk explores the concept of hackersguilds, groups of engineers collaborating to enhance internal information security. Through various activities such as answering inquiries, conducting pentesting exercises, and participating in CTF competitions, hackersguilds empower engineers to actively contribute to an organization&#39;s security efforts. The talk provides practical insights into initiating and nurturing hackersguilds, fostering a collaborative environment that taps into collective expertise. By leveraging hackersguilds, organizations can enhance resilience against cyber threats and foster a culture of continuous learning. Attendees will gain a comprehensive understanding of hackersguilds&#39; potential for a more secure future.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/K39SKE/
</itunes:summary>
      <itunes:duration>00:40:05</itunes:duration>
    </item>
    <item>
      <title>Hacking influence (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-96-hacking-influence</link>
      <description>Social Engineering 102: Hacking influence. 
How to get people to trust your judgement.

Your level of influence, in buisines or daily life, has little to do with your level of compentence. It can be very frustrating to see all your great ideas getting shot down by the people in charge. More so when silly ideas dó get accepted. But how does influence work? Hoe can you get the higher-ups to listen and value your contribution for what it really is?
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/U3BFMC/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-96-eng-Hacking_influence_sd.mp4"
        length="63963136"
        type="video/mp4"/>
      <pubDate>Sat, 10 Feb 2024 14:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-96-eng-Hacking_influence_sd.mp4?1707615447</guid>
      <dc:identifier>0242121a-af14-56f6-9fcf-fd0499f62807</dc:identifier>
      <dc:date>2024-02-10T14:00:00+01:00</dc:date>
      <itunes:author>IJskimo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 96, 2024, Talks</itunes:keywords>
      <itunes:summary>Social Engineering 102: Hacking influence. 
How to get people to trust your judgement.

Your level of influence, in buisines or daily life, has little to do with your level of compentence. It can be very frustrating to see all your great ideas getting shot down by the people in charge. More so when silly ideas dó get accepted. But how does influence work? Hoe can you get the higher-ups to listen and value your contribution for what it really is?
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/U3BFMC/
</itunes:summary>
      <itunes:duration>00:38:01</itunes:duration>
    </item>
    <item>
      <title>Cyberonderzoeksraad: Computer says no, the law says yes (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-98-cyberonderzoeksraad-computer-says-no-the-law-says-yes</link>
      <description>More and more decisions are made or prepared automatically, with &quot;computer says no&quot; making it really harmful at crucial moments. For many people, it is then unclear whether you have rights and what those rights are. Yet there are steps you can take to successfully fend for yourself. This talk lays out some hacks and will be the presentation of the report &#39;Computer says no, but the law says yes&#39;.

Good thoughts are frequently accompanied by procedures that are not always well thought out. The victims are often not the organizations, but the customers or citizens on the receiving end of the processes. Sometimes the consequences are severe, such as no longer being able to use your phone, blocking a bank account or credit card to actually closing a bank account.

In the presentation of the study &quot;Computer says no, but the law says yes,&quot; we look at causes and possible solutions. Of course we lend a hand with advice for businesses, but we also look at legal frameworks that give the common man some guidance.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/XVE39C/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-98-nld-Cyberonderzoeksraad_Computer_says_no_the_law_says_yes_sd.mp4"
        length="105906176"
        type="video/mp4"/>
      <pubDate>Fri, 09 Feb 2024 23:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-98-nld-Cyberonderzoeksraad_Computer_says_no_the_law_says_yes_sd.mp4?1707615345</guid>
      <dc:identifier>52abbd84-0409-5a42-be09-ca37f965460e</dc:identifier>
      <dc:date>2024-02-09T23:30:00+01:00</dc:date>
      <itunes:author>Brenno de Winter, jos</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 98, 2024, Talks</itunes:keywords>
      <itunes:summary>More and more decisions are made or prepared automatically, with &quot;computer says no&quot; making it really harmful at crucial moments. For many people, it is then unclear whether you have rights and what those rights are. Yet there are steps you can take to successfully fend for yourself. This talk lays out some hacks and will be the presentation of the report &#39;Computer says no, but the law says yes&#39;.

Good thoughts are frequently accompanied by procedures that are not always well thought out. The victims are often not the organizations, but the customers or citizens on the receiving end of the processes. Sometimes the consequences are severe, such as no longer being able to use your phone, blocking a bank account or credit card to actually closing a bank account.

In the presentation of the study &quot;Computer says no, but the law says yes,&quot; we look at causes and possible solutions. Of course we lend a hand with advice for businesses, but we also look at legal frameworks that give the common man some guidance.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/XVE39C/
</itunes:summary>
      <itunes:duration>00:41:18</itunes:duration>
    </item>
    <item>
      <title>WOOt does the government do? (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-97-woot-does-the-government-do-</link>
      <description>WOOt do we want? Freedom for our software! When do we WOOnt it? Now! This talk is about the journey into opensourcing software used and made by our governement. We will introduce you to the Wet Open Overheid (WOO) and explain how this law allows you to request the source of certain software. Then we’ll provide you with a step-by-step guide how you can woo (yes, that’s a new verb we made up) software of your interest and in which cases you may want or not want to do so. This may all sound nice in theory but Mendel will of course also tell you about his personal journey of requesting the DigiD code base and how this eventually lead to opensourcing the complete code base.

In contrast to this lovely abstract, the talk will be in Dutch.

WOOt do we want? Freedom for our software! When do we WOOnt it? Now! This talk is about the journey into opensourcing software used and made by our governement. We will introduce you to the Wet Open Overheid (WOO) and explain how this law allows you to request the source of certain software. Then we’ll provide you with a step-by-step guide how you can woo (yes, that’s a new verb we made up) software of your interest and in which cases you may want or not want to do so. This may all sound nice in theory but Mendel will of course also tell you about his personal journey of requesting the DigiD code base and how this eventually lead to opensourcing the complete code base.

In contrast to this lovely description, the talk will be in Dutch.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/FTWP3P/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-97-nld-WOOt_does_the_government_do_sd.mp4"
        length="160432128"
        type="video/mp4"/>
      <pubDate>Fri, 09 Feb 2024 22:30:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-97-nld-WOOt_does_the_government_do_sd.mp4?1707612817</guid>
      <dc:identifier>3ebc61c2-4499-55ff-a9b8-0c4619391870</dc:identifier>
      <dc:date>2024-02-09T22:30:00+01:00</dc:date>
      <itunes:author>Lord BugBlue, Maja, Lisette Meij</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 97, 2024, Talks</itunes:keywords>
      <itunes:summary>WOOt do we want? Freedom for our software! When do we WOOnt it? Now! This talk is about the journey into opensourcing software used and made by our governement. We will introduce you to the Wet Open Overheid (WOO) and explain how this law allows you to request the source of certain software. Then we’ll provide you with a step-by-step guide how you can woo (yes, that’s a new verb we made up) software of your interest and in which cases you may want or not want to do so. This may all sound nice in theory but Mendel will of course also tell you about his personal journey of requesting the DigiD code base and how this eventually lead to opensourcing the complete code base.

In contrast to this lovely abstract, the talk will be in Dutch.

WOOt do we want? Freedom for our software! When do we WOOnt it? Now! This talk is about the journey into opensourcing software used and made by our governement. We will introduce you to the Wet Open Overheid (WOO) and explain how this law allows you to request the source of certain software. Then we’ll provide you with a step-by-step guide how you can woo (yes, that’s a new verb we made up) software of your interest and in which cases you may want or not want to do so. This may all sound nice in theory but Mendel will of course also tell you about his personal journey of requesting the DigiD code base and how this eventually lead to opensourcing the complete code base.

In contrast to this lovely description, the talk will be in Dutch.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/FTWP3P/
</itunes:summary>
      <itunes:duration>00:54:05</itunes:duration>
    </item>
    <item>
      <title>Top secret surprise (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-108-top-secret-surprise</link>
      <description>More information will be added soon, or not...

More information will be added soon, or not...
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/VL9CGG/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-108-eng-Top_secret_surprise_sd.mp4"
        length="69206016"
        type="video/mp4"/>
      <pubDate>Fri, 09 Feb 2024 22:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-108-eng-Top_secret_surprise_sd.mp4?1707612785</guid>
      <dc:identifier>4531e650-44d4-5c10-8aef-92d2a11c1dfc</dc:identifier>
      <dc:date>2024-02-09T22:00:00+01:00</dc:date>
      <itunes:author>Nancy Beers</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 108, 2024, Talks</itunes:keywords>
      <itunes:summary>More information will be added soon, or not...

More information will be added soon, or not...
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/VL9CGG/
</itunes:summary>
      <itunes:duration>00:14:12</itunes:duration>
    </item>
    <item>
      <title>A black hat in our white hat collective... a lesson in (incident response|human trust|pr|.*) (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-147-a-black-hat-in-our-white-hat-collective-a-lesson-in-incident-response-human-trust-pr-</link>
      <description>We always knew it coulde happen, and thus that it, accoording to Murphey&#39;s law, would happen. A member of DIVD got arrested in relation to computer crime. And about a year ago it did, Pepijn van der S. got arrested. 
In this (no press) talk we will walk you through the events that happened, the impact they had on our organisation and the lessons we learned.

Being a, white hat, hackers collective has it&#39;s risks. The most obvious risk is a legal risk. And we always considered it likely that a mebmer of DIVD would be arrested in relation to computer crime. And we prepared for it.

But then, when it does happen, you find our how prepared you really are.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/HYZ7WU/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-147-eng-A_black_hat_in_our_white_hat_collective_a_lesson_in_incident_response_human_trust_pr_sd.mp4"
        length="91226112"
        type="video/mp4"/>
      <pubDate>Fri, 09 Feb 2024 16:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-147-eng-A_black_hat_in_our_white_hat_collective_a_lesson_in_incident_response_human_trust_pr_sd.mp4?1707612731</guid>
      <dc:identifier>99a50082-6362-5ce7-abbe-6aa778007ca3</dc:identifier>
      <dc:date>2024-02-09T16:00:00+01:00</dc:date>
      <itunes:author>Chris van &#39;t Hof, Frank Breedijk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 147, 2024, Talks</itunes:keywords>
      <itunes:summary>We always knew it coulde happen, and thus that it, accoording to Murphey&#39;s law, would happen. A member of DIVD got arrested in relation to computer crime. And about a year ago it did, Pepijn van der S. got arrested. 
In this (no press) talk we will walk you through the events that happened, the impact they had on our organisation and the lessons we learned.

Being a, white hat, hackers collective has it&#39;s risks. The most obvious risk is a legal risk. And we always considered it likely that a mebmer of DIVD would be arrested in relation to computer crime. And we prepared for it.

But then, when it does happen, you find our how prepared you really are.
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/HYZ7WU/
</itunes:summary>
      <itunes:duration>00:45:06</itunes:duration>
    </item>
    <item>
      <title>Opening Hackerhotel 2024 (hackerhotel2024)</title>
      <link>https://media.ccc.de/v/hackerhotel-2024-132-opening-hackerhotel-2024</link>
      <description>Opening and welcome by Dimitri Modderman

Opening and welcome by Dimitri Modderman
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/ZQHVMN/
</description>
      <enclosure url="https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-132-eng-Opening_Hackerhotel_2024_sd.mp4"
        length="160432128"
        type="video/mp4"/>
      <pubDate>Fri, 09 Feb 2024 21:00:00 +0100</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/hackerhotel/2024/h264-sd/hackerhotel2024-132-eng-Opening_Hackerhotel_2024_sd.mp4?1707612766</guid>
      <dc:identifier>abddd9b0-849e-5d5e-ad76-fdec267c4d92</dc:identifier>
      <dc:date>2024-02-09T21:00:00+01:00</dc:date>
      <itunes:author>Dimitri</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>hackerhotel2024, 132, 2024, Talks</itunes:keywords>
      <itunes:summary>Opening and welcome by Dimitri Modderman

Opening and welcome by Dimitri Modderman
about this event: https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/ZQHVMN/
</itunes:summary>
      <itunes:duration>01:01:15</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/unknown.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from hackerhotel2024 as mp4</itunes:summary>
  </channel>
</rss>