Hacking the World (33c3)
In this lecture I wish to reflect on the maturation of the security and hacking communities and their role in larger societal and political participation. We'll reflect on the predominant role that...
View ArticleDer 33 Jahrerückblick (33c3)
The proper relationship of technology and politics have been the subject of an evergreen debate on the floor of the Chaos Communication Congress. Rather than taking a position in this debate, we are...
View ArticleYou can -j REJECT but you can not hide: Global scanning of the IPv6 Internet...
In this talk we will explore and present various IPv6 scanning techniques that allow attackers to peek into IPv6 networks. With the already known difference between IPv4 and IPv6 firewalling (the...
View ArticleGone in 60 Milliseconds (33c3)
More and more businesses are moving away from monolithic servers and turning to event-driven microservices powered by cloud function providers like AWS Lambda. So, how do we hack in to a server that...
View ArticleIn Search of Evidence-Based IT-Security (33c3)
Applied IT security is largely a science-free field. The IT-Security industry is selling a range of products with often very questionable and sometimes outright ridiculous claims. Yet it's widely...
View ArticleWheel of Fortune (33c3)
Secure random number generators play a crucial role in the wider security ecosystem. In the absence of a dedicated hardware True Random Number Generator (TRNG), computer systems have to resort to a...
View ArticleHaft für Whistleblower? (33c3)
Der neue Straftatbestand der Datenhehlerei gem. § 202d StGB kriminalisiert Whistleblower und droht mit Haftstrafe bis zu drei Jahren oder Geldstrafe. Das schwächt die Zivilgesellschaft und verhindert...
View ArticleVon Kaffeeriechern, Abtrittanbietern und Fischbeinreißern (33c3)
Aus ihrem Buch „Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern – Berufe aus vergangenen Zeiten“: es geht darin um Berufe, die einfach verschwunden sind, deren Bezeichnung bereits in...
View ArticleWelcome to the Anthropocene? (33c3)
The Anthropocene is widely understood to mean the current "period of Earth's history during which humans have a decisive influence on the state, dynamics and future" of this planet. For several years,...
View ArticleLockpicking in the IoT (33c3)
"Smart" devices using BTLE, a mobile phone and the Internet are becoming more and more popular. We will be using mechanical and electronic hardware attacks, TLS MitM, BTLE sniffing and App...
View ArticleRecount 2016: An Uninvited Security Audit of the U.S. Presidential Election...
The 2016 U.S. presidential election was preceded by unprecedented cyberattacks and produced a result that surprised many people in the U.S. and abroad. Was it hacked? To find out, we teamed up with...
View ArticleSpace making/space shaping (33c3)
What are the politics and aesthetics of mapping? An introduction how cartography shapes cities and landscapes, creates borders and determines the perception of our environment. How an evolving mix of...
View ArticleNo USB? No problem. (33c3)
How to get USB running on an ARM microcontroller that has no built in USB hardware. We'll cover electrical requirements, pin assignments, and microcontroller considerations, then move all the way up...
View ArticleHacking Reality (33c3)
Inspired by a long history of bold reality hacks this talk considers the kinds of potentials opening up through emerging Virtual Reality (VR) and Mixed Reality technologies. In this current moment of...
View ArticleDie Sprache der Populisten (33c3)
Mit dem Erstarken der Rechtspopulisten (nicht nur in Deutschland) werden populistische Positionen immer häufiger hingenommen, obwohl es sich dabei um vermeintliche "Gewissenheiten" handelt, die bei...
View Article3 Years After Snowden: Is Germany fighting State Surveillance? (33c3)
Germany has a good reputation for strong data protection. It also features the only parliamentary inquiry committee investigating the Snowden revelations. But what are actual results of parliamentary,...
View ArticleOn the Security and Privacy of Modern Single Sign-On in the Web (33c3)
Many web sites allow users to log in with their Facebook or Google account. This so-called Web single sign-on (SSO) often uses the standard protocols OAuth and OpenID Connect. How secure are these...
View ArticleFormal Verification of Verilog HDL with Yosys-SMTBMC (33c3)
Yosys is a free and open source Verilog synthesis tool and more. It gained prominence last year because of its role as synthesis tool in the Project IceStorm FOSS Verilog-to-bitstream flow for iCE40...
View ArticleEinführung zu Blockchains (33c3)
Blockchain ist die Technologie welche moderne Kryptowährungen ermöglicht. In dem Vortrag wird die Funktionsweise von Blockchains ganz allgemein erklärt. Anhand der Bitcoin Blockchain wird ausserdem...
View ArticleSearchwing - Mit Drohnen leben retten (33c3)
Refugees are dying in the Mediterranean Sea. Thousands of them. We are building fixed wing drones, autonomously searching for refugee-vessels in a radius of 50km around a base-ship. The association...
View Article