Hallo Du!
Bitte vergiss nicht deinen Fortschritt im Fortschrittsbalken auf der Seite des Talks einzutragen.
Vielen Dank für dein Engagement!
Hey you!
Please don't forget to mark your progress in the progress bar at the talk's website.
Thank you very much for your commitment!
======================================================================
okay thank you everyone let's start so as you probably might have noticed i'm not nick farr nick farr couldn't be here today but he's in new york city right now and sends greetings to all of you as you can see greetings from new york city i miss you yeah very artistic picture of him wearing a hoodie actually
wait wait there's even more so all of you talkers better be aware because he will be watching the streams from times square
okay for those of you so let's start for those of you who don't know what the session is about the session is about so-called lightning talks which are very short talks with a duration of five minutes every speaker gets five minutes and right afterwards the next speaker continues and to make sure that each speaker uses only his five minutes we have this cool device called the time keeper which is this one alex built and constructed it it's a very cool thing big applause for him
so for the for the speaker to notice that his end is coming we need the audience to tell him so so how this works is the following this thing goes up for the first four minutes so everything is safe it's green goes up and up and up four minutes passing and after four minutes so this is uh this is um this is a bit faster now than four minutes actually
and then when the last minute starts it turns yellow and fills up the bar with yellow and then it fills up the bar with red if the last 30 seconds come and up to this point we can start with a countdown do we know how that works so we start from 10 and go down so
okay five four three two one yeah okay that that was that was okay i think you can do better because as you know nick is watching and his face would probably look like this now it it i it actually or starts uh blinking from five seconds on uh i think we give it a short retry for the last five years it wasn't that good anyway so we have to be louder um so five seconds looks like this five four three two one
that was okay alex yes really nearly okay i i think we can work on this yeah we have a lot of time and a lot of chance to do this so we have 22 talks we have lots of time to practice for tomorrow and the day after where the other lightning talk sessions will be so how does this work i would like to tell all the speakers that if you know that your talk is going to be next please sit up front to be able to get up quickly and then you exchange the clicker which is this device that allows you to advance the slides yourself from the speaker before you and then please talk into the mic you don't have to turn around to see your slides because there will be a screen down there below the stage where you can see your slides so i think that's it oh okay there's a translation available so most of the talks are going to be in english and the german translation is available in the translation stream on the streaming page or if you are in the hall right now you can listen to the translation calling dect 8014. then have a great session let's start with the first talk
who is the first speaker yeah there you are
so hello my name is leonid hansa i'm a phd research student at the school of politics international relations and philosophy in queens i'm slightly defraud here i'm not a hacker as you probably can see i'm a social scientist and i'd like to talk about my current phd research and a specific study i'm conducting which is the secularization of hacking and activism and the reason for that is because you're actually currently a very interesting research topic especially in the field i'm working in which is international security um and uh because i've already done research on the party and hacktivism and gender stereotypes in the past my current research project is basically focusing on the issue how activism or hacking has become seen as a security threat and because i'm very unhappy with the current literature in my research field which is mainly focusing on hacking as a malicious activity and to a certain extent even arguing hacktivism is a form of cyber terrorism and also argues that security is like an objective state either being secure or insecure i'd like to look into in my research phd research if hacking could be seen as a technique or if it could be articulating in the current research field hacktivism as a form of political activism and lastly if security and that security should be seen as a social construction which basically goes along with a current uh theory which is called securitization theory which i'm using in my uh research and the basic idea of that theory is basically security issues do not necessarily reflect the objective material circumstances of the world to give a short explanation onto that is basically immigration issues have in the past been seen as a political issue um and have been treated as such but now with what we see with frontex on the european union borders is basically that people are treated as a security issue and they're kept from being basically being seeking asylum refugee the same i would basically apply to the issue of um
hacking and hacktivism how it has become seen as a security threat and as a researcher my interest is to understand how and why this secretization process so how you have become seen as a security threat has happened and to identify the effects of it and so basically the whole thing is what makes a security issue um to investigate this it's basically the idea to look at the securitization move so something has been shifted from a political sphere into security fear where we all run around like headless chicken and are completely threatened about you guys there must be an audience basically the public or the media which accepts that you have been perceived or hacktivists or hackers have been perceived as like a security issue and it needs to appear policy which we see with the current legislation processes my phd research is split up into three parts whereby uh there are multiple levels i'm focusing on and also the aspects of resistance so basically how people who would consider themselves hackers that had to disagree with the current state of art and uh therefore i am basically talking here today to um announce my second study where i would be interested to talk with people who are being securitized so the securitizing actors are normally policy level or in this case of hacking hacktivism the industries mcafee etc where they are talking oh we need to deal something and the audience accepts that so the second study is basically looking at how hackers and hacktivists deal with that current climate and therefore i would like to basically make you aware of my call for participants so there is a link which i will be sending around through twitter as well where you can find information on what i'm doing how i'm doing that i have ethical consent for that and what i'm basically investigating um and basically the idea of that short talk should be basically to make you aware of that to hopefully get some of you participate in an interview with me just spread the news and basi
cally help science and please feel free to contact me and thank you very much
thank you thank you very much now for the next
talk
you may start okay um oh hello i'm going to talk about the smart card reader i'm spending false freelance developer maker i'll post code and slides and everything on the okay on the web on the website later so i wrote this talk and then wrote on twitter that i was going to give it and then a security researcher contacted me and said hey we did the research a year ago and we actually like found some security issues with the thing so then i updated my talk to include what they found as well um and actually one thing i want to point out is it's really great to talk about things you don't understand because i don't understand anything about smart card readers really but you get all sort of interesting contact with people and learn a lot so the talk is also there
this is me and them compared to level of sophistication they actually found some issues that i was just messing around uh i'm going to talk about the identifier 2 which is the bank reader from abn amro dutch bank you insert your card you log in enter a pin pay you can do the same with the usb cable which is in theory more secure but now you're having two black boxes in c exchanging binary data which is kind of i don't know interesting so the first thing i tried was just like log in over and over and over and over and over again and you see this sort of like this kind of linear thing which looked kind of bad to me um but i the security researchers told me like it's this protocol and it's like the transaction account that's incrementing and it's the most significant bits so it's probably nothing to see here then i looked at the usb protocol because i was tired of typing all the 100 responses and codes uh we've like looked at wireshark you can see here there's like all the steps it goes through and insert the card it shows your card number in decimal and hexadecimal is kind of a weird representation but whatever and there's this like signed data that's getting signed by your card and then some display text that's going to display on the screen you press ok and then it confirms the transaction so i did something like replay this with by usb and changed a few bits of text which you can see here this is not my this is like what the researchers found they used like a lego robot and machine learning of kind of awesome things and they found that uh it's possible to get the signature and confirm the transaction before the user presses okay so you could like show some things on the screen and just go do the transaction without their consent which is kind of bad they told the bank uh and they released the firmware upgrade um so if you have this abn amro bank you can tell if you have this vulnerability or not by uh hauling five inserting your card if you see this 1.2 version you
are vulnerable and if you see 1.5 or higher you're fine yeah and i think that's it thank you
thank you very much now for the next talk
go on yeah so um i recently got interested in the genetics of indo-european languages such as german latin persian etc um linguists say that all these share a common ancestor they call proto-indo-european or p-i-e it's reconstructed by analyzing similarity similarities between these languages unlikely to arise from your accident or borrowing between neighbor cultures similarities that affect the core of the language such as its most basic vocabulary for body parts or its basic grammatical structure let's take two languages a and b that in their core share the same words for the same things here it's reasonable to assume that these derive from the same proto-words and if a and b fare a lot of such similarities that they derive from the same proto-language now in practice such similarities are often more or less strong the weaker similarities the more question marks we have to put into our proto-word reconstructions and if there's lots of such question marks these proto-word reconstructions become doubtful or even the existence of a common proto-language luckily we usually have much larger data sets to track similarities and reducing the weight of individual deviations um still we somehow have to explain these deviations this is usually done by positing certain regular language changes such as all a sounds becoming o sounds in some language or all b sounds becoming p sounds um these changes however need to be regular they must affect all words borrowed from the proto-language or retained from the proto-language and if we find for example some word from the proto-language that retains its b sound then our rule is false and we have to refine it to for example affect only b sounds before a sounds now from such reconstructive work we may derive entire chronologies of steps by which one language into certain order change into another language my own current interest in such chronologies of language change affects pie grammar particles such as the different endings nouns ma
y take with different grammatical cases gender or number and that is the particles of the nominal inflection or declension on this topic i found no online resources that satisfied me this wikipedia table for example is as hard to grasp as it is imprecise in regards to the scientific literature so i decided i wanted to build my own online resources on that topic the evolution of pie noun endings so i got me some of the literature and i tried to draw from that data about the development of noun endings and put that into some xml format that i could then process with some xslt code into fancy annotated html tables here's an a simplified example of what my xml format currently looks like there are sets of grammar table elements each of which fits a specific stage in language development inside these grammar table elements there's elements for different grammatical categories such as case or gender and which are to be made into table heater cells later on intersections of these categories are mapped by paradigm elements to specific noun endings and also to footnotes that describe where in the scientific literature this ending is a tested for this language development stage my xslt code processes from that something like this this table in the middle the colorful table cells are noun endings mapped to specific grammatical cases if you click on any of these noun endings you jump to a footnote that just tells you where in the literature it is tested or from which earlier language development stage and thereby linked grammar table it is retained into the current one now the colors each color fits a specific noun ending and non-ending form and which is mostly to highlight um noun ending forms that occur more than once um so for this individual table that may be a bit of a visual overkill but it makes sense once you remember it's all about tracking the changing distribution of these endings throughout the entire chronology of language change so that one could for example jump
step by step from an earlier stage to the next one and so on and so on and so on and thereby follow the distribution of these endings um like in a frames of an animation um so if you're interested in these topics up there is the current state of my beginning work on that on github you may also contact me under these addresses i'd be especially happy to hear from people who have ideas on how to improve such tables or who are actually in contrast to me a bit more knowledgeable about linguistics because i'm just an amateur and may have overseen obvious mistakes or obvious prior art trying to solve the same problems so um and uh hi nick farr we all miss you very much thank you
very nice all keeping in time very good so the next talk
hi i drew this picture of the congress some of you how do how does this work okay oh okay okay um yeah some of you might have seen or um even bought it because i printed them as posters and i wanted to tell you how i made them first i sketch it on paper and when i decided that i wanted to change things i have to save time just made notes on what to digitally alter later like this then i traced the entire thing until i had these outlines which i then filled with colors and even more colors even more colors a few things that i want to point out the choice of perspective in this is on purpose because with this kind of picture you don't want a specific focus on anything um the most common kind of perspective these days is the one using a vanishing point where objects in the front appear larger than once in the back which draws attention to the object in the front so you don't want that instead i use an isometric perspective where all the measurements stay the same and where an object is located is only indicated by its placement on the grid and um some other things i pay attention to like you can see that some of my characters basically all look the same they're all bold and wear the same sweater just in different colors um that leads to to an unfortunate effect um featureless characters are usually read as male so when you got to stick figures and you want to make sure that people know there are other genders you got to make that clear in visual art what's not visible is not existing same goes for things like race and disability but you got to be careful there because um when you're illustrating and you have like five people and then they wind up looking like that it's got these token minorities that are themselves offensive and also incredibly lame i try to avoid that
and another thing about visibility is that it doesn't have to be a really realistic percentage it just has to be visible so i'm just a example of disability in this case last time i counted i might have miscounted i drew 245 hackers and only six of them are visible disabled which is less than the german general population so it's not realistic in that sense um but i guess my point is um uh just if if you want something included you have to show it in visual art that's that's the point and you can find both me and the poster at the no drama assembly as well and yeah nick if you send me a home address i'll send you one thank you thank you
okay the next talk is going to start
soon yeah should work now
okay hi i'm swally i code demos uh i want to explain to you a simple effect called the plasma effect that's implemented by by using uh xenos tables and pseudo color palettes uh an annotation from me it's uh just a one way um there's not the effect it's a family of effects and i'm showing you just one way i did it so some random notes um last year i did a talk on why i'm demo coding now i'm still going to do how this is an 8-bit implementation so because of what's on an atari 2600 vcs what's the fastest way to do a calculation is to use lookup tables so we're going to use this one for the sine wave function and for optimizing the pseudo-color palette that's available this is just an example of what a pseudo color palette would look like if you just use grayscales this is not what i have in the hardware in the heart where i have um this one when i would be using ntsc i'm using power for technical reasons this color palette got stripped down but i was lucky because the zircom guys they are screwed so i want to optimize this one um for this one i need a reference i think the color or the ordering of the colors from the ntsc looks quite nice so i try to replicate this one i'm doing this by reordering just the colors this looks like this and filling in the gray scales with already used color so i'm just throwing in some frog dna so short recap something is still missing this is what i started with and this is what i've where i'm now but if you take a look at the bottom this flashing still looks something this could be improved so what um um we only have 128 cars there right now um so if we take the columns and all squash them together so it gets bright up to the middle and then gets dark to the end then it would look something like this and i think this looks quite nice to use and this is what the original color values are so this is my zenos table i'm using only half of the available values from 0 0 to 7f because i want to add xinglos values and so i've got the option um
do i don't have to divide it afterwards two by two so this is what the zenith looks like the original one i'm using two to add them together one has a higher frequency and the other one has a lower amplitude and if i add them together they look something like this also looks quite nice so let's turn it around by 90 degrees then it looks like something like this and now for each line we don't use we don't plot um the the color on the x position or by that plot a dot on the x position but we're going to use the lookup table i introduced for the colors and then it looks something like this and i think this looks quite nice this is what would look like with the example color table just using the grayscale okay but i think this one is better um so and this is what the original implementation on the atari vcs look like i think it really did something
so now let's go to a 2d implementation these are also called the raster bars because each raster line the color changes let's go with 2d this is what i did as an example on on how it could look like if you just add them in a two-dimensional array but um this looks rather like just like a moving plane so to get it more more effect-like um i'm gonna divide this um i make it more blocky um each color block will be 16 by 16 pixels and the whole block will be colored by the color that would be used by the top left color of that area then it looks something like this and from here i have to take a shortcut i cannot show you the whole implementation how i did the 2d because i used a different algorithm for this one or different our parameters sine waves but the original implementation looks something like this also i think quite nice effect
and to my conclusion doing a demo uh effect is my uh easier than you might think take a look at other stuff other stuff report it to other platforms the internet is your friend there there's a lot of stuff around there and fool around just test it and you will be surprised how easy it is and how easy it is to make something that looks nice and even if it's just for some some title screen some logo of your software your application you're going to hack up try it it's fun and if you want to see the full demo you can visit me at the uh leicester at the milliways it's be in between the teutres and the tardis and um if you want to start coding on this very ancient hardware i'm doing a self-organized workshop on day three so it's tomorrow at 2100 in hall 13. so thank you
just a short announcement so if you are interested in the slides most of the talkers have uploaded their slides to the wiki so look at the wiki page of the lightning talks and you will find most of the talks otherwise you can contact the speakers because they gave their email addresses if you are really interested in what was what has been shown there just ask them
go on hello my name is luther and i'm going to show you a project of ours which is called ours is me and robert fisher who looks like that on the internet but cannot be here today so we both went to the same school in vienna and there they teach the students in the first year the assembly language just to grasp the basics of computing a little bit better so for that they used this board which is basically developed at the school and was wrapped like 10 years ago it's hand sorted and works generally really nice but sometimes it breaks down and just eats up the time of the lesson so we wanted to fix that it's called usb master by the way so we did that we moved the whole development process into the browser and basically wrote an emulator an assembler and a nice ide for the whole thing so you can see there just an editor and a list of labels to jump to and of course the run button and yeah some things you can do with it is for example just blinking an led so you see the assembly dialect is really easy so the students can easily understand what is going on and don't have to memorize complex commands and such so so basically here you see just an ld which is blinking so loop and delay so you loop turn the led off turn the led on and repeat that all the others you can do here is interrupt so you've got these two buttons at the bottom the gray and the red one and basically what happens here is we've got a make prog a main program with with justice nothing and an interrupt service routine which gets called if you press the button so press button the led just turns on and another interesting thing we can do is pass with modulation so in real life if you turn on led on and off a bunch of times basically the led gets a little bit dimmer it gets a little bit dimmed and we we have simulated that in in our implementation so if you do the exact same thing in our emulator led will be a little bit less light depending on how how much of the time it is on and how much time is it off
so you can see that here and of course if you write programs you just need to debug them so we want the debugger for the thing which you can see here normally the two parts which are uh then the two parts are next to each other but they ran out of space on the slide so they're under each other right now and the whole thing after we finished it we put it on github and uh since it's a school project there's lots and lots of documentation which you can find here and on the website and maybe we want to take a look at it or maybe even contribute something give us comments what you like what you would like to see in it and yeah basically that's it the website is here if you want to contact me right now they're stacked so if you want to speak to me here so you can just call me if you if you're a teacher and you want to use that and there's some feature you're missing or you want to really see in there just give me a call and if not any questions yeah we still have time for questions so
yeah yes
um well it's what architecture is based on so um basically the dialect is the same which the teacher came up with like 10 years ago so i don't really know it we just wanted to to replicate what was on the hardware and it's just i don't think it is based on anything specific just to be simple anything else well then thank you yeah thank you
and the next speaker please
um
um
um
okay we just heard about the political angles so here's the technical one i'm organizing the we fix the network shop as you just heard we should all be aware that technical solutions are urgently needed i'm not quite agreeing that oh yeah they're just around the corner we just have to encrypt uh the flying pic news of today might educate some more people on that um currently the internet does not serve civil liberal society we want to build one that does not serve mass surveillance and war but instead that can be used for private communication for education and for responsible commerce so the workshop today where various projects present their angles their ideas for how to improve or re-architect the internet is happening all day in hall b we're currently on lunch break so you don't have to leave the lightning talks you can meet hackers from cdns gnunet you broke the internet last year tor net2o i2p ethereum leap tales fenrir and more and you're very welcome to join us also in terms of you wanting to become active i we are all looking for more people to help out i'm starting a new research team at inria in france that's there on the map in ren so far away you know we're somewhere here right and this is a new lab where we're going to develop free software solutions so all free software to improve network security in the context of the gruner project and the tala project we are looking for people to join us so if you are currently lacking
or having the excuse of not being paid to develop free software to improve the world well no more if you have ethics a master's or doctoral degree systems programming skills use interface development skills or something else that you think you can bring to the table talk to me we have lots of open positions and i would love to have a strong team to fix the internet thank you you you still have a lot of time so uh maybe we uh can do a quick q and a is there a question yeah over there
is the stack only focused on security and privacy or are there other things i want to fix about the net um security and privacy are the main things but of course by decentralizing we are also trying to take care of control issues that we have right now where you know you have censorship you could i would con include that into security uh so it's a question of what you mean by security and privacy if you interpret these terms broadly i think that is really our focus performance is not the focus for example but usability for example would be a focus because we're only going to get good security if you cannot have lots of users right or you could say it's an availability goal because if you can't use it it's not available to you right so in that sense interpret these terms broadly and i think this is the scope
this is the first one
oh
there's a question over there yeah
ah the question is is this also is this sponsored or also sponsored by the french military okay i was told that the security center is going to be sponsored by 20 positions by the region of britannia and by 1.5 positions by the french military so they are somewhere in there then i immediately asked so what do they want and they said they want better free software to secure their systems so they did not say we want you to break into other people's systems or do mass surveillance and then i said well okay that could be fine what do you expect from me to do and they say just yet just to build build this grounded thing and build a better network and that's fine with me as long as those are the requirements so yes there is government sponsorship involved it's not even dominant at this point but and i do not know if i'm going to get any of these 1.5 positions from the french military but the french military is somewhere in there
okay thank you very much
next speaker please hi i want to talk to you about the boltz open library for technical specifications and where's this thing did the previous talker take the clicker with him
is the previous talker still here is my clicker gone now
so reset the time please yeah so bolts and open library for technical specifications and it starts with digital fabrication 3d printers cnc mills and laser cutters are super cool tools because you can basically build parts in almost arbitrarily shapes which allow you to build basically anything and compute computer-aided design is a central ingredient to that process because you always start with a digital model of your of your design um but even though you can build arbitrarily shaped parts using standard parts like nuts bolts bearings or profiles and it's still a good idea because it allows you to make better cheaper and simpler designs and there's the problem there's excellent free and open source cad software available but it doesn't come with a standard parts library where you can just easily insert standard parts like nuts bolts and other stuff commercial software usually has this available so boltz is an effort to try to to fill this gap it's a modular system to develop part libraries and it tries to target not only a single but many different cad systems by leveraging parametric capabilities of the cad systems to create from a one parametric geometry that is specific to the cat system and a big table with the dimensions and parameters for all the different sizes and variations of a part and to create from this the standard parts library
it is based on a human readable format for marking up these tables with parameters it does automatic consistency checks to ensure that the data is somehow usable we automatically track the license of geometries and data which allows us to to build subsets of part libraries that are compatible with certain licenses we support translations of the parts everything is managed in git which makes it easy to to contribute and currently and two cad systems are supported open scat and freecad openscad is a scripting language for 3d modeling so you basically program your shapes which is very cool and powerful when you come from a programming background there will be a lightning talk tomorrow i think about openscad so if you're interesting uh look at that um it looks like this your first so it's very simple to use bolts with the openscad you um just include the library and then call a module which is kind of like a function and that tells you that tells the system to insert in this case a hexagon bolt according to dean 931 um and there it is if you cannot remember all these names that's not a problem many of the parts you can also refer to by more easily rememberable names like here the t-slot extrusion free cut is closer to the classical cat software where like autocut or catia and their bolts is included in the gui so you can select the part you want enter the parameters and click a button and there it is the boltz website also has a nice list of all the parts with drawings and all the tables and other information so if this sounds interesting to you i'm happy to to talk about it to discuss it so just drop me an email or contact me anyway i'm around and check out the website try it and tell me tell us what works and what doesn't work and you can also happily invite it to to help with improving documentation or translating translation of the parts so at the moment the german translation is quite in good shape but other languages can always profit from more people helping out
or by adding more parts to it to make it more useful or by helping with porting that to other cad systems which should be easily possible so thank you thank you
hi i'm marcus and i'm here to talk about information and interaction being combined so let's start with getting interactive a little bit i would like you to guess how much germans spend on newspapers every single month any idea just just guess give me a number okay let me tell you it's half a billion euro every month now let's um spotlight the information part a little bit more uh two questions here how do we deal with information and what does it turn us into
well when it comes to newspapers or television we usually consume the information and we are doing it most of the times on our own now
our reaction to consuming the information can be manifold but just three examples we could get angry about the information we could get apathetical we could get depressed but again we do that when we are on our own so alone now if you look up the definition of idiot in its primordial sense it comes actually pretty close to our behavior when we consume and deal with information in the traditional way how come well i think one reason is that if you consume information
it's typically a one-way road so the information channel communicate to us not with us okay so in some to some extent it's dead end the whole setup of these information channels do not allow us to ask questions to comment the information to discuss it with other people being interested in the topic which i think is also important to link the information ourselves to other information that is relevant to the topic in a convenient and timely manner
so isn't it nice and that we nowadays have other opportunities and new channels available well to some extent it is but as you might all know googling things has its own constraints um some of the more simple constraints are it's time consuming to do the research ourselves and it costs a lot of energy so for many people being in day-to-day life it's just not affordable there are other programs you could use i just highlighted two of them here facebook wikipedia which have really interesting features to deal with information but at the end of the day they do not really deliver what we need so in my opinion it's important to get information discussion and action aligned in one single channel i would like to take the best out of wikipedia facebook supplemented with some additional and important features and create a new information channel
so um my intention being here is to meet with um talented and ambitious programmers to get this thing rolling and i would be interested in meeting with you outside after my talk i will also be there at three o'clock at the elevator if you turn to the right when you exit this room um and just let's just discuss how we can get this thing rolling okay thank you very much
you still have some time would you like some questions oh yeah yeah so i'm happy to anyone has a question
i don't see any questions
yeah okay so then we'll just continue with the next talk thank you very much
hello my name is felix and i have just one slide on the right side is some kind of road map i want to get to that in a minute and on the left sides you see a screenshot of the realitybuilder.com website which originally i wanted to show you but i i cannot do it because you can only show slides so what you see is an image of a construction site and on top of that image you see some kind of like augmented reality overlay and you can move around this virtual block with a um cursor keys there and then click on make real and it actually gets built for example out of stone i mean this is of course uh pre-recorded this is not live
well the core idea of this whole thing is that with the click of a mouse button you can change the physical world and another important aspect is that many people at the same time can build a construction collaboratively and the outcome is totally unclear uh yeah i think it's it's it's best not to think too much about if that makes sense or not it's just it's just an experiment and um yeah not for the road map there are three stages uh there's something we can try today then that the next step would be to do this on the cannery islands and big i've i've lived there for several months this year and last year and there's uh nice locations one of them is the cht hack base and lancer rotary where in las palmas we can do it where there's always mild weather make it with big blocks and then in the future well i'm in i'm in a team with people and we want to build something big in berlin but now let's get to what we want to do today and there's a session in the hardware hacking area today in hall three from three to six on i don't know maybe longer and maybe also tomorrow depends uh how fast we can set up all this and the idea is to make a low-tech solution we will just stream via twitch and the channel rb31c3 and put some webcams i'll put a webcam and film this these lego bricks i have
564 of these white bricks and then people can um send coordinates and we will build in the coordinates
yeah this will take some time to set up and i would be glad if some people could join that know a bit about twitch because i'm all new to twitch and also the challenge is to get an audience so that people actually play this so uh yeah please join offline at the hardware hacking area or um online at the channel um okay i think um yeah if you want to reach me i put my um yeah my twitter handle there and my um telephone number i also have a gsm number here which is uh
605.6052 um
yeah again don't think too much if they make sense or not it's really just in the test what happens okay thank you
so we would have time for one question does anyone have a question on this project yes here hi on my head it's a panoramic camera i just was thinking i i'm gonna film my own talk okay we'll have to talk about that probably i just prefer it's not i'm not going to put this online thanks any other questions
those are just uh the lego bricks i have i have actually more but they're nicely arranged like this i think it's easier to carry around yeah
okay thank you very much now we have a 15-minute break so if you want to leave for a short time period then you are free to do so and we'll see each other again at two o'clock
so
so
so
so
so
so
so
uh
so
so
so
so
so
so
so
so
okay please sit down we can start
so we are doing the next part of the first lightning talk session now and with the next speaker please come up to the stage all right the clicker should be there yeah it is
go ahead okay
which one should i press right is the next slide left is the previous slide okay yeah
hi i'm dan from cccmunic and i've been in the ipv6 business for a few years now and i can tell you that we need more and better ipv6 software we need more alternatives to choose from ideally open source and we need much better quality in this software so i accepted the challenge and designed an ipv6 router advertisement daemon to get used to writing ibv6 software
i'm a network guy so i love clis therefore i decided to write through two programs one daemon for the actual work and one cli tool for controlling the daemon and configuring the system
so what about the challenges of a modern router advertisement daemon this is an interface on the linux box all the things in red are subject to change during runtime and the route advertisement daemon should be able to handle these changes without breaking any clients connectivity
so i ended up with a very dynamic software design i have a unix socket for the cli link socket to listen to the kernel for interface configuration changes and i have a few raw sockets for sending and receiving icmp6 packets and raw data i maintain i maintain state and configuration data using an in-memory database and i use threads for the actual work
today our a-tools comes with a couple of icmp6 options it also features a super easy to use module architecture that allows the implementation of new options in under an hour including the cli definition given that you have a bit of basic c understandings this is a syntax example demonstrating how to create a new route advertisement on vlan 3000 on ethernet interface 2 and this is taken from the currently running congress network's net 64 configuration so this software is currently running and serving the net 64 network
this is how monitoring statistics look like
i give you a couple of seconds to to see it
so i've been working on this software for a year now and my um my conclusion is that there's that there are a lot of misunderstandings on how to implement the rfcs and maybe i got it wrong or maybe other vendors got it wrong or maybe people programming just don't care enough about the rfc documents
but we have some issues in the soft and other software and probably also mine which breaks ipv6 connectivity so this means if we have bad software quality we will lose our connectivity and once ipv4 is gone this is not an option that we have not no connectivity so here are my conclusions and i prepared a little checklist that may help you to detect non-optimal implementations many implementations cannot advertise admin defined source link layer addresses some do not support the icmp6 rdns option which means that you have no dns unless you use dhcp for v6 and without dns the internet is broken few of them are not state keeping and some of them never heard of de-advertising so as soon as the software stops working for some reason maybe due to a configuration change it does not de-advertise the data or the prefixes in the network so clients lose connectivity which i think is not an option yeah thanks for listening and use more of the net six four share your experiences um it's c3 knock on the twitters or you can use my handle if you want to contact me personally use more bandwidth and use more net 64. thank you thank you
next speaker please bitcoin mining anyone wants to talk about that oh there okay
the clicker should be on the yeah all right go ahead uh okay i'm going to briefly introduce one new service for bitcoin mining pools
and the service is oh uh it's virgin coins so i'm going to explain what virgin coins are why would anyone want them and how did we actually make it happen
okay
so uh what are virgin coins it's basically never spent bitcoin it's bitcoin with no history whatsoever um you pay a fee and you also pay the amount of virgin coin you want and and give us your address and we will just make sure that the bitcoin is mined directly to your wallet it's very easy but why would anybody actually want virgin coins well you've probably noticed that bitcoin doesn't have exactly the best reputation so there are many people that would like to use bitcoin but are actually afraid of uh of the coins that have some not not not so great uh history so for that um the coins without any history are probably ideal so you would avoid suspicious sources also you don't want to bother mining yourself as most people probably don't want to mine nowadays and the other thing is that it will definitely have collectible value maybe not now when still new coins are being mined but in the future when the mining stops you won't get any new coins anymore and and the extra feature is that when you actually when you request a whole block at the moment it's 25 bitcoin you uh get to choose your message written in the blockchain and spread all over so now i very briefly describe some technical overview how we actually build it the service is another service on top of mining mining pool operations it's written in python it's it heavily uses the asynchronous server client architecture and relies on python twisted um here the the server creates custom coinbase or block template with the new uh virgin coin addresses and pushes the coinbase to the miners and the miners do what they always do they mine but they mine for this new coin base and finally we also need to verify the payments for the service and the success of the mining that the coins well virgin addresses are already in the blockchain and for that we use the normal bitcoin api and yeah we also use the 32 hierarchical deterministic wallets for generating the addresses the customers can pay us
so we will soon going to actually deploy it and test it and find out how much do you want it thank you
thank you very much can we please remind all speakers to be ready here at the podium and please return the clicker hello hello hello okay okay blows hello please the next speakers please come in front of the podium before your talk starts
hello uh i want to tell you a bit about the fuzzing project um i'm using linux and free software and i think many of you do too and i like my system to be secure and stable and of course you know linux is always secure and all free software projects are always stable because everyone can find bugs and fix them um unfortunately at some point i learned that's not always true so i try to do something about it i i don't know i mean many of you probably use a command line and may expect that a tool like less or strings or file is secure and you can use it on untrusted input um but that's not the case uh all of these tools had bugs recently that are probably security bugs and you can probably be exploited by them um so what's fuzzing fuzzing is very simple you just take some input for some software and then you add random errors to it so like let's say you take a image file a jpeg just flip some bits or turn some data around or truncate the file and then you feed it into an image parser and if it crashes then you probably have some bug and very often if it crashes it's some kind of memory access issue memory corruption and that means you probably have a security issue and um unfortunately the state of our software is very bad usually the common cases you take a random piece of software you run a further on it and you will find crashes just within seconds
so we have some quite powerful tools to do fuzzing and to find bugs i want to mention two one is address sanitizer which adds some additional bounce tracking to your c programs it's part of llvm and gcc so it's just a compiler flag because sometimes if you have an invalid memory access your program will not always crash sometimes it will just read or write to some invalid memory but still run so you don't detect the bugs and address sanitizer will take care of that and will always terminate your program if you have an invalid memory access and then there's american fuzzy lob which is a very powerful fuzzing tool it adds some compile-time instrumentation and can then detect code paths and it will do fuzzing and if it has a fuzzing sample which is uh exposes a lot of code it will use that for further fuzzing this is very powerful and it found already bugs in a lot of important software packages uh especially for example one of the shell shock variants was found with this tool um so yeah these tools are out there and you should use them to find bugs in software and i personally started the fuzzing project which is like uh mainly it's a web page it's just some kind of loose coordination of which software already was fast by someone and there are open bugs that are not fixed yet and there are no developers available to fix anything um there's a tutorial because i really want to tell people if you have some basic understanding of linux and programming this is not hard this is something it's easy you can do it if you're a software developer and you should do it
yeah and uh my personal goal is at least the easy to find bugs should be wiped out and this should really be possible um yeah so if you're a software developer use fuzzing as a tool to develop and to find bugs if you want to improve the security of free software also use these tools you can meet me after the lightning talks near the gentle table and if people are interested i can do a small workshop and show people how to do this yeah that's basically it and if you're interested in this and want to invite me to have a longer talk or some workshop somewhere talk to me maybe we can handle something out thanks yeah thank you very much
now let me quickly deal with my with my uh drag and drop fail here so
this belongs to here so
all right go ahead yeah test first it works okay uh hi to everyone uh my name is frankie sheikh algorith and i am one of the co-founders of hoodie green bass project
today i would like to make a small overview of our activities especially in the last year and the plans for the future so page number one uh who we are we are people from all around the world who are interested in food drink and biohacking you can also think about experimenting coming together having a beer and doing also things which are bit more specialized we like open source we like consensus uh collaboration within different hacker spaces and hacker movement around the world uh in our case we really like to stay within the hacker movement and not to split at least so far uh at the moment we are developing in the direction of being more like an umbra for people and organizations who would like to join and work on the projects collaborate uh and yeah staying in the hacker movement very important now what do we what did we accomplish in 2014 uh at the beginning of the year after 30 c3 we did a heker tour around europe which we enjoyed around 40 acre spaces both in the west and in the south and the east we can name tech inc house quest we have been in bermuda novi south many places we promoted workshops we have promoted uh different social dinings you know things like that getting the community together and another thing which we did for example we started our web page presents so we have now rc channel nice wiki pages are trying to build a forum that's actually for the next year uh definitely experimentator the ones who didn't try special project which we are trying to develop in the long term uh where you can use nice control environment for fermentations very interesting now next year projects we will prepare for ccc camp running and improving our crowdsourcing campaigns which we did several of them we are generally successful but definitely things just to be better uh we want to push more for the biotech and more i would say really specialized uh hacking food hacking you can imagine cultivating you know pure strains uh using them later on combining for differen
t kind of polycultures there are many things long long talk now uh of course preparation for 32 c3s uh we want to be permanently active more and more not just on the congresses and camps uh if you want to learn more about that come downstairs all age and the korean x2 you can talk to us you can taste what we are doing you can join our workshops food tasting we are basically open source you know open platform which is funded by the people if they want it it will be there now uh first working base will be basically built uh this year in the island where i now live with my girlfriend jeju we have a small fermented fermentation facility uh we hope to have their also small build up and hackerspace with hacker residency so in the spring we will be basically running for that small crowdsourcing campaign to support that that's one of the kind of examples what we do and building really something in reality because so far we are based all around the world in this case basically we have small facility where we can really put things into the practice in a more easy way so this was the introduction thank you very much for giving me the opportunity to present and i hope to see you around the congress and downstairs when you have time pop in let's talk send me an email okay thank you very much
next next talk will be up in just like two seconds or something one
so this one goes over here and then go ahead okay hi my name is georg stepner this talk will be in german because the platform i speak about this in german currently only so um
is
foreign
thank you
yeah please leave the clicker on the desk
next talk please
you can start hi my name is free hersha i'm going to talk about how to do two-factor uh decryption of uh your look of your luke's uh encrypted block devices so uh listen about myself uh i use a full disk encryption on almost all of my devices um it used to be for fun earlier but now nowadays it's more like a necessity and i hope it's the same uh with all of you guys and one thing i'm most paranoid about is that when i type my passwords anybody can see it or that they can interpret from my typing the same password for most of the machines because i really have to be careful not to forget the passwords for the full disk encryption uh i really want to use a two-factor decryption when i tried to decrypt these loops devices so i tried to look around and to find how i can do this uh one way is to use a usb media as an usb stick to um to hold a key file and then encrypt and this media should support a pin style decryption to enable access to the file or i can also similarly use a pgp smart card and have same type of decryption but these two uh seem to be a bit difficult if i have to drive this process through the inner parameters when i try to boot the system so what i found is that uh i can use something uh called a ub key um so this looks like this it's a usb device it connects like a keyboard um it's what it does it generates a one-time password it can have a rsa um and it can also sorry there's a mistake it can hold an aes key and it can do challenge response on this uh aes key so and uh this project is like in this project uh we ask for the user for a password so this is the first uh factor and then we derive the key and uh now we read a encrypted uh challenge from the loops header and now we decrypt this challenge with a simple xor and we challenge the ub key with this challenge and we get the response and this response unlocks your luke's partition so if you're doing it for the first time the flow takes towards the right part it generates a new challenge challenges
the ub key gets the response adds the response as a key to unlock your looks and then encrypts the challenge starts the challenge in the loop setter and um yeah and shows the uh challenge in the loop seller so a bit of dirty things which we do uh here are that uh this is due to the reason of space limitation in the loop setter we only have um a space where we can tinker around in these one of one of these key slots and this project assumes that we uh you won't use keyslash six and seven that's like we give you options to use six key other key slots so uh in the last slot is where we store the encrypted challenge um and the slot before uh key slot six is where we store the key which is actually corresponds to the response you receive from the ub key and as always you should also have a backup fast phrase which we'll probably have in first zero to five key slots and as always if you want to use this project uh you should always back up your looks header before trying it yeah so this is actually not started by me i was i was just looking around in the internet and i found the first one but that didn't have the two-factor authentication i wanted to have so i extended the one in the second one and it hasn't meshed yet i have to contact the other to take a pull request and the third one so the first two currently do not support our they don't have much documentation of how to do this in uh initial fs style boot up um and the third one has that but it doesn't have the two-factor authentication yeah so these are things which have to be combined to get a a good two-factor decryption when you of your looks when you boot up your computer thank you thank you very much
so the next talk please sensing proximity ah there you are okay
so hi guys i'm sam i'm here with steven patrick please get behind the mic so people hear you and our professor sent us here to do a weird experiment this experiment is sensing proximity so what is what does that mean anyway you have phones you have smartphones you have androids you have iphones you have yellow phones etc and then there is bluetooth on these phones the newer phones have bluetooth 40. bluetooth 40 supports bluetooth low energy and bluetooth low energy you can do many cool things you can make tiny beacons that send out a signal every one second this signal can be picked up by these phones in the background using low energy right and so what can you do with this
you could make a map and that's what we are trying to do we're trying to make a map we're trying to make different maps a social graph so a map of relationships between people so if you're with a group of friends here you would appear as a as a cluster on this map and it would be interesting to see also if this cluster changes in time so if i don't know you meet new friends here we would theoretically be able to see that you're moving from one cluster to another there are many issues here but i'll go into them later so the beacon is picked up by two phones we get that sent to the server and we have an as kind of information on the location of this beacon out of the phones because we know the location of the beacon right so we're trying to do this with two apps they are really being overwhelmed by downloads at the moment we did not do any advertisement so it's really crashing our server at the moment but it's good it's a good thing and we are really learning a lot here so when you download it now you will be uploading the proximity data of beacons around you so any beacons beacons here in this box here or statically installed in the room will be picked up by this app and will be sent to a server and then collect it this will also the android app will also allow you to share some other data this is interesting because like i said before these clusters that form your friends your new friends they have different properties they have accelerometer data they have battery data temperature and so you would see in a very noisy room maybe like this one when when you all talk you would see like a very noisy cluster and you could assign a color to that noise say red is high noise and green is low noise
and these beacons were manufactured by us with a 3d printer and a very simple bluetooth module the hm10 that basically you just configure it with at commands and then it just works it just sends out the signal but it was a real real pain if you want to manufacture 120 beacons you you gotta know what you're getting into so this is an example of how the graph will look like and maybe sid and patrick who are sitting there are showing you right now the real-time graph of around 100 people um in this conference right now if you go up closer later you'll see it in detail so issues again scalability we were overwhelmed by the the people downloading this app and we had like 30 transactions per second on our tiny little mysql server so if you can help please help we need python skills and mysql skills the bluetooth signal is also an interesting thing so when a lot of people are sitting in a room like this the signal propagation changes a lot so that we can see different locations of different phones in even though they're at the same at the same place
exactly so we are having a discussion later on where we want to talk about this in more detail because we are collecting a lot of data and we don't want to be a dot in krake we want we want your opinions on how to do this in a privacy preserving manner we want to know what feels not right for you and what is what is the way to go with this we've thought of also setting up a mesh net with with the app to transmit the data but that seems to be a bit buggy in the moment so please come to our discussion and we will be giving out free beacons as well so if you want i could just throw this into the audience please be prepared don't die sorry okay there you go okay thank you very much
okay the next speaker please
she's coming from there okay
this is a service announcement to all speakers please be reminded to stay in the front row before the beginning of your talk it would be nice so that we can have continuous talks here thank you
go ahead okay hi i'm emily hames and i'm a scientific diver which is kind of a different side of i guess hacking than a lot of you guys are in um one of the things i switch one of the problems with scientific diving that you run into a lot is there's a lot of sensor systems that are easy to create and hack and so on but they're not really designed to go underwater primarily because you have your electronics and you have your sensor so in this case those are my electronics and the sensor has to penetrate the case in order to be in contact with the water but you can't have your electronics get wet and you want to leave it down there for a week or two weeks or a month so it needs to be very watertight and so you also don't want to have a system that's permanently stuck to your encapsulation method so you need to have a gasket system so you can remove it and in this case the sensor penetrates with a gasket which is the green arrow um so how does this gasket allow the device to be watertight basically each one of these screws has a force that goes down on this big plastic sheet and that puts force on the gasket which translates into a squishing into the sensor itself and that pressure causes a tight seal on the sensor system which then allows the device to be watertight for periods of weeks or more um and so why do i have so many screws that's another question that i keep having people ask me well basically i have two gaskets and they have different surface areas so because each one has a different surface area you can't have the same screw put force on each gasket because it'll put way too much force on the red gasket and not enough force on the blue gasket to get a seal and in fact you can crack the plastic plate on the top so you have different sets of screws for each case and in in this case those are the four screws or the the red screws correspond to the red gasket and the blue screws correspond to the blue gasket and that's really all i have okay thank you very mu
ch we we still would have time for some questions if you if you would like so any scuba divers here having questions or non-scuba divers
could you please get behind the mic and repeat the question sorry um what is it measuring and actually in that case it's measuring just temperature because temperature sensors are cheap and if it screws up we didn't want to waste a lot of money developing like a ph meter for example um because those are very expensive it was more a because i i just basically did my scientific diving license this was part of the training because we have to test something that we create and so we chose to do a temperature sensor because we were actually diving in a geothermal vent which is kind of like yellowstone national park only under the water near stromboli which is north of sicily in the north part of sicily and so temperature is actually important especially because that volcano is erupting right now
another question that's not the case then thank you very much for your talk
so next speaker please do you recognize your slide all right there he comes from the back row
hello everybody
my name is michael schumer i'm from stuttgart um next slide please uh this the clicker should be on the desk there press the right button to advance um
is
um
foreign
a
um
foreign
foreign
super
so then we'll go on with the next talk p2p value that's you all right
hi good morning afternoon so p2p value and p2v value is a project made up of these partners you can see here and it's funded by the eu and what it's trying to do is to investigate the value that's generated by commons based peer production which is a big a big term but basically means production of things like linux wikipedia openstreetmap has been the kind of biggest cases and also the kind of investigation and building of a software platform which would facilitate the the kind of um relationships that make up those organizations and their work methods so we've kind of defined commons based peer production as its collaborative production it's got a peer-to-peer relationship it uses common resources and it's open access and the way we're doing this is basically through this diagram so excuse me research which feature which uh feeds into the analysis and design which goes into the co-creation which is tested and the feedback is gained and this is actually by people by real communities not by not by researchers or whatever and then that goes again into the research and the whole process goes on so the project was launched uh officially in barcelona in the 22nd of january 150 people were there it was involving all of the kind of communities we're looking at so researchers hackers civic society policy making actors etc etc and one of the first parts of the project was an investigation into the kind of existing groups of common space peer production but when we tried to do that we couldn't actually find any kind of registry or any place where we could actually find all of these groups so we just we had to build one so we built this directory which now features over 300 350 uh common space peer production groups and as far as we know is the biggest uh directory anywhere so you can you can visit that you can explore it you can download all of the information there and if you are in a group uh that that is involved in common space peer production please add yourself to that
database um let's say anybody can go in there the address is there it's a very straightforward simple interface you just log in and then put in all your data and information and we'll actually be building on this directory this year we'll be hosting two kind of data jams in barcelona to to use better this directory another thing that we're doing um we're also hosting like a public event calendar so if you've if any comebase beer production groups because again we couldn't find any kind of central uh calendar of activities of groups that were involved we're doing so we're hosting that ourselves on our on the website p2p value.eu one of the other things we've discovered is that the um the kind of communication around open source about common space production is often very very bad so we've been trying to we've done a set of posters um which we hope user friendly which are explaining for example this is one day in the life of uh collaborative communities these are crazy things you can do and here's like a history of commons based peer production communities i've got a few here i'm not going to throw them into the crowd but if you want some you can uh come and see me you know i could give you some they will be uploaded onto wikimedia they will be downloadable and they will be uh editable also so one of the things we've apart from doing the research we've been working on the on the actual platform itself and we were using uh google wave which became apache wave and we've built an api for wave which is kind of fairly unique it's a decentralized alternative it's compatible with the google real-time collaborative api and we see that as an opportunity for building an ecosystem of other cbp apps at the moment it's javascript and soon it'll be for android it's on github if you want to check it out and the most important thing is that we're holding a workshop in london uh march the 16th and 17th which is basically together floss um groups that are working on distributed platfo
rms there'll be lightning talks there'll be show-and-tell will be tutorials there'll be an unconference and there will be scholarships available so if you are interested in coming please look at that address b2b value second floss p2p workshop thank you
thank you very much
then we'll have our last talk for this session
so please start hello uh so we've been hearing a lot about information that was made more available more accessible via journalism through news organizations and so i want to tell you about how you can join the news nerds bring your skills to journalism how you can apply those skills in in this field um so first hi i'm i'm erica i am based in philadelphia which is known for things like rocky and the liberty bell but we also have a really active open source community i got involved through through being involved with drupal we have a very active civic and open data community and that brought me to night mozilla open news which is where i work now we exist to support the journalism code community that is the community of news nerds we support this community in a lot of various ways and one of the first questions that people often ask is what is journalism code so journalism code is some of the code that actually drives a lot of what we access on the web django is a web framework that was developed in a small news organization in the middle of the note of nowhere usa backbone.js came out of a project called document cloud that news organizations use to deal with pdfs and and make that information more accessible and these are technologies that are used far beyond what is happening in journalism but were developed within news organizations journalism code also helps you understand the world in addition to things like the nsa revelations there's also projects like this which came out of a hack day that we organized in june which compared maps of disputed territories around the world so who creates this code kind of fun name for that community are news nerds so it's kind of the combination of news journalism not exactly nerd candy but it comes together to be a field of people who have an interest in journalism they work in news organizations they do work supporting news organizations but they bring development skills technical skills programming skills to that work so the
y solve problems through code these are a few particular examples tabula is a tool that solves the problem of extracting tabular data from pdfs the grid is an example of analyzing metrics data to understand how people use interactives on a website and that's a picture of a little girl playing with an arduino to figure out when the cicadas were going to come out in and around new york city uh last year so news nerds also work on really challenging important issues uh secure drop is a really important project that's happening to help sources uh communicate with journalists more securely and there's also a lot of other topics and projects both with international relevance but also things going on in your local community so you can become a news nerd as well how so getting involved in your local area is a great way to get started um this is a map of local journalism hack related events that open news has sponsored around the world you can definitely see a concentration in a few areas but we're very interested in supporting events that are happening related to this space all over the world there's organizations like hacks hackers like the open knowledge foundation data driven journalism groups that are also doing work in this area and might be working in your in your town you can also learn more on our website source source.opennews.org there are learning guides there are code repos of journalism-related projects and there's even a job listing site if you're interested in working full-time in the field you can also find journalism-related projects to work on this site lists a lot of github repos that are projects that are being developed in in and around news organizations and so if you just want to dive right into the code you can do that as well and you can also become a nightmozilla fellow which is a program that we have uh where we embed developers designers people who like solving problems through code with news organizations for 10 months for a paid fellowship and
a couple of our former fellows are actually here at the congress and i'd be very happy to talk with you about this opportunity as well so please join the news nerds very happy to talk more there's some contact information there so thanks for your time thank you very much
so that concludes today's lightning talk session which was a very interesting session from my point of view and not only did we have a large diversity of topics we also had every speaker on time so we didn't even have to buzz anyone out which is very great so please give a big hand to all of the talkers also thanks to the awesome translation team which is a very hard job especially in the lightning talk sessions due to such many different topics for translating all these talks into german
and then let me quickly announce the sessions tomorrow and the day after that so at the same time in the same room there will be the lightning talk sessions 2 and 3 which are probably full by now so we have the same amount of talks tomorrow and the day after that see you
you