«
Expand/Collapse
90 items tagged "germany"
Related tags:
europe [+],
chaos communication camp [+],
berlin [+],
troopers [+],
hacks [+],
Software [+],
russia [+],
heidelberg germany [+],
heidelberg [+],
france [+],
usa [+],
stuttgart germany [+],
stuttgart [+],
south america [+],
conference [+],
berlin germany [+],
switzerland [+],
software scene [+],
slovakia [+],
signal [+],
search [+],
ralf bendrath [+],
pci [+],
munich [+],
manuel atug [+],
latin america [+],
israel [+],
incident management [+],
imf [+],
free [+],
encryption [+],
data [+],
austria [+],
abstract overview [+],
white collar crimes [+],
voting [+],
vote [+],
ulrich wiesner [+],
txt [+],
transmission [+],
read [+],
radio [+],
privacy [+],
party hacks [+],
pal [+],
mpeg2 encoder [+],
linux kernel [+],
linux [+],
jacob appelbaum [+],
internet monitoring [+],
implementation [+],
icimp [+],
harald welte [+],
hacktivism [+],
hacking [+],
gsm [+],
german authorities [+],
election event [+],
dvb t [+],
disk encryption [+],
disk [+],
darknet [+],
crime [+],
computer crime legislation [+],
clock reference [+],
christian daniel thomas kleffel [+],
btx [+],
chaos communication congress [+],
wsis [+],
windows [+],
win [+],
weimar republic [+],
webtech [+],
war [+],
walldorf germany [+],
vulnerability assessment [+],
time comming [+],
talk [+],
society [+],
situation [+],
session [+],
schools in germany [+],
school [+],
retention [+],
radio legislation [+],
pulse width modulation [+],
presentation summaries [+],
patrick breyer [+],
participation [+],
paris [+],
oona leganovic [+],
online [+],
nuremberg germany [+],
nuremberg [+],
news for nerds [+],
network [+],
munchen germany [+],
mobipst [+],
military radio equipment [+],
markus beckedahl [+],
marco gercke [+],
mainz germany [+],
legislation [+],
legal [+],
katarzyna szymielewicz [+],
intensive level [+],
information [+],
imf cfp [+],
ilya v. vasilyev [+],
hacker conference [+],
group [+],
google earth [+],
google [+],
georg greve [+],
frank rieger [+],
felix [+],
education relations [+],
directive [+],
dimva [+],
development [+],
dcf [+],
cybercrime [+],
conference call [+],
computer network defense [+],
computer [+],
communication [+],
clock [+],
chaos computer club [+],
chaos [+],
brussels [+],
braunschweig germany [+],
bikes [+],
august 2nd [+],
atomic clock [+],
art [+],
applied network [+],
workshop [+],
wifi [+],
whick [+],
weather balloon [+],
warns [+],
view [+],
video search engines [+],
video [+],
valentin [+],
usb [+],
udo [+],
train [+],
toy [+],
torso [+],
thinkpad [+],
the netherlands [+],
surfers [+],
street view [+],
street [+],
stm [+],
stick [+],
space [+],
soy [+],
soldier [+],
snooping [+],
sniffer [+],
signing [+],
server [+],
security conference [+],
robots [+],
robot [+],
rgb [+],
releases [+],
ralph bruckschen [+],
pushes [+],
purpose design [+],
prompts [+],
project [+],
privacy workshop [+],
privacy event [+],
privacy code [+],
portugal [+],
poor man [+],
pic clock [+],
peltier [+],
pcb [+],
paul wouters [+],
paraguay [+],
paper [+],
out [+],
openpgp [+],
officials [+],
nuclear power plants [+],
nuclear [+],
november 22nd [+],
nokia 1100 [+],
nokia [+],
model trains [+],
model train layouts [+],
model [+],
mission [+],
microsoft [+],
microcontroller [+],
media monopolies [+],
mechanism [+],
massive [+],
mannheim germany [+],
man [+],
malte [+],
mail encryption [+],
locomotives [+],
led [+],
lawful interception [+],
launch [+],
latch [+],
kinects [+],
jpa [+],
jp aerospace [+],
johannes agricola [+],
javascript implementation [+],
javascript [+],
interception [+],
infrastructure [+],
humanoid robot [+],
humanoid [+],
home [+],
harley davidson motorcycle [+],
harley davidson [+],
harley [+],
hackers [+],
government [+],
goettingen germany [+],
gmo [+],
gerhard [+],
gamesec [+],
game theory [+],
fritz [+],
food [+],
flower [+],
fines [+],
fears [+],
enameled wires [+],
dock [+],
discovery kit [+],
design [+],
delays [+],
data execution prevention [+],
contests [+],
contest [+],
contact [+],
conditioner [+],
conclusive answers [+],
close [+],
clock signal [+],
christoph brning [+],
cfp [+],
c unit [+],
brazil [+],
blackberrys [+],
bans [+],
authors [+],
australian privacy commissioner [+],
australian [+],
australia [+],
audio [+],
atomic [+],
anti piracy [+],
andreas lehner [+],
america [+],
allianz [+],
air [+],
ahlers [+],
against [+],
acta [+],
Newbie [+],
Issues [+],
General [+],
Countermeasures [+],
BackTrack [+],
Area [+],
papers [+],
call for papers [+],
call [+],
security [+]
-
-
12:01
»
Hack a Day
[Udo] decided to build a clock using the DCF77 radio module seen above. This of course has been done before: the hardware draws a clock signal from the atomic clock in Braunschweig, Germany. So he grabbed a library for Arduino and got to work. But he was getting rather poor results and upon further investigation realized [...]
-
-
11:26
»
SecDocs
Authors:
Markus Beckedahl Ralf Bendrath Tags:
social Event:
Chaos Communication Camp 2003 Abstract: The World Summit on the Information Society (WSIS) is the latest in a long series of world summits organized by the United Nations that deal with central questions of humanity like the environment, women‚s rights, development, climate change, etc. At the WSIS, information and communication are on the agenda for the first time. The world summit is supposed to develop a common understanding of the information society. In Germany, a WSIS working group initiated by the Network New Media has been meeting continuously since summer 2002. The group has debated the themes of the WSIS, developed civil society positions and planned own interventions. Since January 2003, three open meetings of this working group with members of other non-governmental organizations, alternative media and scientific institutions have been held in Berlin. The working group was expanded and officially established as the "German Civil Society Coordinating Group for WSIS". Delegates of the group have attended important European and world-wide preparatory conferences. They monitor the developments and try to influence the agenda in favor of civil society demands. Single members of the working group are engaged in the sub-committees and caucuses of the international Civil Society Plenary Coordination Group. For the worldwide preparatory meeting in Paris in July, the group sent Georg Greve, President of the Free Software Foundation, Europe, as a civil society delegate into the German governmental delegation. Other members of the group are involved in the counter and alternative summit activities that are currently being planned by media and computer activists, such as the Polymedia lab or the World Forum on Communication Rights. In this panel at the ccc-camp we want to talk about and discuss the topics of the WSIS. What is going on globally and which positions do the different Players like governments, civil society and business have? What are the positions, campains and activities of the global civil society? What is happening especially in Germany? How can civil society use the attention while the WSIS is going on to transport alternative topics like freedoms of information, free software and human rights in the information society?
-
11:24
»
SecDocs
Authors:
Markus Beckedahl Ralf Bendrath Tags:
social Event:
Chaos Communication Camp 2003 Abstract: The World Summit on the Information Society (WSIS) is the latest in a long series of world summits organized by the United Nations that deal with central questions of humanity like the environment, women‚s rights, development, climate change, etc. At the WSIS, information and communication are on the agenda for the first time. The world summit is supposed to develop a common understanding of the information society. In Germany, a WSIS working group initiated by the Network New Media has been meeting continuously since summer 2002. The group has debated the themes of the WSIS, developed civil society positions and planned own interventions. Since January 2003, three open meetings of this working group with members of other non-governmental organizations, alternative media and scientific institutions have been held in Berlin. The working group was expanded and officially established as the "German Civil Society Coordinating Group for WSIS". Delegates of the group have attended important European and world-wide preparatory conferences. They monitor the developments and try to influence the agenda in favor of civil society demands. Single members of the working group are engaged in the sub-committees and caucuses of the international Civil Society Plenary Coordination Group. For the worldwide preparatory meeting in Paris in July, the group sent Georg Greve, President of the Free Software Foundation, Europe, as a civil society delegate into the German governmental delegation. Other members of the group are involved in the counter and alternative summit activities that are currently being planned by media and computer activists, such as the Polymedia lab or the World Forum on Communication Rights. In this panel at the ccc-camp we want to talk about and discuss the topics of the WSIS. What is going on globally and which positions do the different Players like governments, civil society and business have? What are the positions, campains and activities of the global civil society? What is happening especially in Germany? How can civil society use the attention while the WSIS is going on to transport alternative topics like freedoms of information, free software and human rights in the information society?
-
-
8:35
»
Packet Storm Security Recent Files
Call For Papers for DIMVA 2013, the 10th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment. This conference will be held from July 18th through the 19th, 2013 in Berlin, Germany.
-
8:35
»
Packet Storm Security Misc. Files
Call For Papers for DIMVA 2013, the 10th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment. This conference will be held from July 18th through the 19th, 2013 in Berlin, Germany.
-
-
7:01
»
Hack a Day
For reasons we can’t comprehend, model train layouts are incredibly popular in Germany. [Gerhard] is one of those model train aficionados that has moved far beyond a layout with a transformer controlling the speed of the train; he sent in a tip for a very tiny Rocrail server he built to control the locomotives moving across his [...]
-
-
21:47
»
SecDocs
Authors:
Andreas Lehner Paul Wouters Tags:
sniffer Event:
Chaos Communication Congress 18th (18C3) 2001 Abstract: Meant by its designers to be a public specification, the Transport of Intercepted IP Traffic is a "secret" document describing the interception and handover of a user's internet data from suspect to government. We'll examine what happens at the sniffer box(S1), the collector box (S2) and the government receivers (T1 and T2), and the encryption used. We'll discuss how the government will tunnel this data to themselves, or what data can't possible be tapped with the current specification. Finally, we'll describe what we know about the digital tapping room, and what a possible target can do to make things really hard for the ISP's and the government.
-
-
21:56
»
SecDocs
Authors:
Felix 'FX' Lindner Tags:
Windows exploiting Event:
Chaos Communication Congress 20th (20C3) 2003 Abstract: The talk could also be called "Lessons learned when the Cisco guys went to Windows land", because there are a number of things quite different in Windows land compared to other environments. One of these things is the frequent use of wide characters and the annoying difficulties that arise from that, including return addresses of 0x00410041. Technically, the speech covers stack based buffer overflows in Win32 applications and services where the buffer content consists of wide characters. Techniques for finding return addresses as well as practical wide character shellcodes (so-called venetian shell code) will be discussed. There will also be some side notes on ASCII based overflows and format string vulnerabilities. This talk is to provide the intermediate hacker with a few more usefull tricks for her/his sleeve, so don't expect any TESO-like magic. Of course, Phenoelit would not dare to show up without some entertaining examples of software engineering, this time comming from Walldorf/Germany.
-
10:40
»
SecDocs
Authors:
Felix 'FX' Lindner Tags:
Windows exploiting Event:
Chaos Communication Congress 20th (20C3) 2003 Abstract: The talk could also be called "Lessons learned when the Cisco guys went to Windows land", because there are a number of things quite different in Windows land compared to other environments. One of these things is the frequent use of wide characters and the annoying difficulties that arise from that, including return addresses of 0x00410041. Technically, the speech covers stack based buffer overflows in Win32 applications and services where the buffer content consists of wide characters. Techniques for finding return addresses as well as practical wide character shellcodes (so-called venetian shell code) will be discussed. There will also be some side notes on ASCII based overflows and format string vulnerabilities. This talk is to provide the intermediate hacker with a few more usefull tricks for her/his sleeve, so don't expect any TESO-like magic. Of course, Phenoelit would not dare to show up without some entertaining examples of software engineering, this time comming from Walldorf/Germany.
-
-
9:41
»
SecDocs
Authors:
Josef Spillner Tags:
Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Overview about the young and still developing Free Software scene in South and Latin America (mostly Brazil), ways to achieve independence of existing structures, and some specific projects. While in Germany people still talk about the ongoing partial migration in Munich, which is mostly in the hands of only few companies, other places have advanced some more already: where interested citizens are part of IT migrations in both companies and organizations. Not only is this a cultural difference, but also gives all hackers the possibility to block decisions heading the wrong way, and to integrate their own perspective.
-
9:41
»
SecDocs
Authors:
Josef Spillner Tags:
Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Overview about the young and still developing Free Software scene in South and Latin America (mostly Brazil), ways to achieve independence of existing structures, and some specific projects. While in Germany people still talk about the ongoing partial migration in Munich, which is mostly in the hands of only few companies, other places have advanced some more already: where interested citizens are part of IT migrations in both companies and organizations. Not only is this a cultural difference, but also gives all hackers the possibility to block decisions heading the wrong way, and to integrate their own perspective.
-
9:41
»
SecDocs
Authors:
Josef Spillner Tags:
Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Overview about the young and still developing Free Software scene in South and Latin America (mostly Brazil), ways to achieve independence of existing structures, and some specific projects. While in Germany people still talk about the ongoing partial migration in Munich, which is mostly in the hands of only few companies, other places have advanced some more already: where interested citizens are part of IT migrations in both companies and organizations. Not only is this a cultural difference, but also gives all hackers the possibility to block decisions heading the wrong way, and to integrate their own perspective.
-
9:41
»
SecDocs
Authors:
Josef Spillner Tags:
Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Overview about the young and still developing Free Software scene in South and Latin America (mostly Brazil), ways to achieve independence of existing structures, and some specific projects. While in Germany people still talk about the ongoing partial migration in Munich, which is mostly in the hands of only few companies, other places have advanced some more already: where interested citizens are part of IT migrations in both companies and organizations. Not only is this a cultural difference, but also gives all hackers the possibility to block decisions heading the wrong way, and to integrate their own perspective.
-
-
21:43
»
SecDocs
Authors:
Jacob Appelbaum Tags:
cryptography Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Jacob Appelbaum will discuss different disk encryption systems in their current implementation. This will include technical as well as legal issues. Jacob Appelbaum will discuss different disk encryption systems in their current implementation, the users rights in their given country (ie: the USA, Germany and the UK), issues with the implementations, commentary on the community surrounding each featured implementation, threats posed by legal systems, requirements for users, as well as ideas for working around the letter of the law.
-
21:43
»
SecDocs
Authors:
Jacob Appelbaum Tags:
cryptography Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Jacob Appelbaum will discuss different disk encryption systems in their current implementation. This will include technical as well as legal issues. Jacob Appelbaum will discuss different disk encryption systems in their current implementation, the users rights in their given country (ie: the USA, Germany and the UK), issues with the implementations, commentary on the community surrounding each featured implementation, threats posed by legal systems, requirements for users, as well as ideas for working around the letter of the law.
-
21:43
»
SecDocs
Authors:
Jacob Appelbaum Tags:
cryptography Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Jacob Appelbaum will discuss different disk encryption systems in their current implementation. This will include technical as well as legal issues. Jacob Appelbaum will discuss different disk encryption systems in their current implementation, the users rights in their given country (ie: the USA, Germany and the UK), issues with the implementations, commentary on the community surrounding each featured implementation, threats posed by legal systems, requirements for users, as well as ideas for working around the letter of the law.
-
-
7:45
»
SecDocs
Authors:
Harald Welte Tags:
GSM phone Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This presentation describes the progress of hacking and extending the Motorola series of Linux based Smartphones, with the ultimate goal to replace all proprietary applications with 100% free software. It's been two years since Motorola has released the first Linux Smartphone (A768). More recently, two new models were introduced, the A780 and the E680, the former even officially distributed in Germany and all over the EU. What's so special about a Linux based smartphone? It's special because the Linux kernel acts as an enabler for 3rd party hacks and 3rd party software, like it can be observed with the OpenWRT, OpenTom, NSLU2-Linux, OpenEmbedded, OpenZaurus and other similar projects. The author of this presentation has sucessfully obtained "telnet" access to an A780 cellphone, built a matching cross-compilation toolchain and installed various applications for debugging, such as busybox, iptables, nmap, lsof, strace, etc. While re-engineering efforts are still in a early stage, work is proceeding extremely fast, and important pieces such as the protocol between the PXA270 frontend processor and the ARM7TDMI GSM processor have already been partially re-engineered. The project is expected to progress significantly until 22C3.
-
7:45
»
SecDocs
Authors:
Harald Welte Tags:
GSM phone Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This presentation describes the progress of hacking and extending the Motorola series of Linux based Smartphones, with the ultimate goal to replace all proprietary applications with 100% free software. It's been two years since Motorola has released the first Linux Smartphone (A768). More recently, two new models were introduced, the A780 and the E680, the former even officially distributed in Germany and all over the EU. What's so special about a Linux based smartphone? It's special because the Linux kernel acts as an enabler for 3rd party hacks and 3rd party software, like it can be observed with the OpenWRT, OpenTom, NSLU2-Linux, OpenEmbedded, OpenZaurus and other similar projects. The author of this presentation has sucessfully obtained "telnet" access to an A780 cellphone, built a matching cross-compilation toolchain and installed various applications for debugging, such as busybox, iptables, nmap, lsof, strace, etc. While re-engineering efforts are still in a early stage, work is proceeding extremely fast, and important pieces such as the protocol between the PXA270 frontend processor and the ARM7TDMI GSM processor have already been partially re-engineered. The project is expected to progress significantly until 22C3.
-
7:45
»
SecDocs
Authors:
Harald Welte Tags:
GSM phone Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This presentation describes the progress of hacking and extending the Motorola series of Linux based Smartphones, with the ultimate goal to replace all proprietary applications with 100% free software. It's been two years since Motorola has released the first Linux Smartphone (A768). More recently, two new models were introduced, the A780 and the E680, the former even officially distributed in Germany and all over the EU. What's so special about a Linux based smartphone? It's special because the Linux kernel acts as an enabler for 3rd party hacks and 3rd party software, like it can be observed with the OpenWRT, OpenTom, NSLU2-Linux, OpenEmbedded, OpenZaurus and other similar projects. The author of this presentation has sucessfully obtained "telnet" access to an A780 cellphone, built a matching cross-compilation toolchain and installed various applications for debugging, such as busybox, iptables, nmap, lsof, strace, etc. While re-engineering efforts are still in a early stage, work is proceeding extremely fast, and important pieces such as the protocol between the PXA270 frontend processor and the ARM7TDMI GSM processor have already been partially re-engineered. The project is expected to progress significantly until 22C3.
-
-
21:51
»
SecDocs
Authors:
Ulrich Wiesner Tags:
election Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The voting machines widely used in Germany's recent elections fail to follow both fundamental democratic principles and German legal requirements. Highlights of a recent Irish report on security issues of these machines will be provided. In this year's September elections of the Bundestag, more than 2 Million voters had to submit their vote using voting machines of the Dutch automation provider, Nedap. The machines, which have been subject to a (non-public) governmental certification process, do neither allow the voter to verify that his vote has been correctly stored, nor do they provide a transparent and auditable vote counting process. While the a specimen of the software has been reviewed as part of the certification process, the software installed on the Nedap machines is at no time subject to any authentication or validation by the German authorities. This is of specific interest, as a recent report of an Irish government commission claims that the implemented security measures mainly follow the concept "security by obscurity", and that two minutes of unauthorized access might be sufficient to replace the installed software.
-
9:12
»
SecDocs
Authors:
Ulrich Wiesner Tags:
election Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The voting machines widely used in Germany's recent elections fail to follow both fundamental democratic principles and German legal requirements. Highlights of a recent Irish report on security issues of these machines will be provided. In this year's September elections of the Bundestag, more than 2 Million voters had to submit their vote using voting machines of the Dutch automation provider, Nedap. The machines, which have been subject to a (non-public) governmental certification process, do neither allow the voter to verify that his vote has been correctly stored, nor do they provide a transparent and auditable vote counting process. While the a specimen of the software has been reviewed as part of the certification process, the software installed on the Nedap machines is at no time subject to any authentication or validation by the German authorities. This is of specific interest, as a recent report of an Irish government commission claims that the implemented security measures mainly follow the concept "security by obscurity", and that two minutes of unauthorized access might be sufficient to replace the installed software.
-
9:12
»
SecDocs
Authors:
Ulrich Wiesner Tags:
election Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The voting machines widely used in Germany's recent elections fail to follow both fundamental democratic principles and German legal requirements. Highlights of a recent Irish report on security issues of these machines will be provided. In this year's September elections of the Bundestag, more than 2 Million voters had to submit their vote using voting machines of the Dutch automation provider, Nedap. The machines, which have been subject to a (non-public) governmental certification process, do neither allow the voter to verify that his vote has been correctly stored, nor do they provide a transparent and auditable vote counting process. While the a specimen of the software has been reviewed as part of the certification process, the software installed on the Nedap machines is at no time subject to any authentication or validation by the German authorities. This is of specific interest, as a recent report of an Irish government commission claims that the implemented security measures mainly follow the concept "security by obscurity", and that two minutes of unauthorized access might be sufficient to replace the installed software.
-
-
21:41
»
SecDocs
Tags:
search engine Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The session will focus on the influence of search engines on individuals, societies, education and politics. The session will focus on the influence of search engines on individuals, societies, education and politics. The exponential growth and the decentralized structure of the Internet require automated search solutions which now control our access to information and influence our view of life. With several billions indexed pages, search engines are not only the biggest storage systems worldwide, they are also used by millions of users every day. The session will analyze these developments and pay special attention to media monopolies, political implications, censorship, and privacy violations. Several recent case studies, including but not limited to the Google Book Scan program, Google WiFi, Google Earth, and the self proclaimed support of Open Office and other open software frameworks will be used to explore these monopolies and relationships. The session will focus on the problems arising when the availability of information, knowledge, and values becomes dependent from commercial search services. Information which is not accessible through search engines appears to be even non existent for our information society. This session explains the perils of this development and shows the conflicts between commercial interests of search engines, political influence, censorship, advertising, paid rankings and the freedom of information. The presentation will also discuss the dark side of the force, including but not limited to Google bombing, link farms, guestbook/blog/wiki spam, cloaking, Pagerank prostitution, result hijacking etc. The session will discuss the dangerous implications of search engines used to invade the privacy of individual users, focus on user tracking and profiling, and propose methods and techniques to assess and eliminate the threat. The session will further underline the privacy risks and violations caused by search engines, focusing on the digital breadcrumbs, traces, and cookies left by individual users using internet based search/or related services. The session will include entertaining elements and present basic and advanced search methods of Google Hacking and demonstrate how search engines can be misused to identify insecure server and shopping systems, infiltrate networked appliances including webcams and printers, and collect commercial and private information including passwords, credit card data, user account and other personal information. The session will shed some light on upcoming search engine algorithms, technologies, and implications. Search engine technology is still in its infant stages, many resources are still devoted to the analysis, detection and elimination of search engine marketing, webspam, affiliate or duplicate content. There are new and interesting algorithms, technologies, and proposals, as discussed in a recent patent of Google Inc, used in the Open Source search engine Nutch, or proposed by the peer-to-peer search engine Yacy (A search engine Made in Germany), which provide some insight into the future of search engine technology and knowledge management.
-
21:41
»
SecDocs
Tags:
search engine Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The session will focus on the influence of search engines on individuals, societies, education and politics. The session will focus on the influence of search engines on individuals, societies, education and politics. The exponential growth and the decentralized structure of the Internet require automated search solutions which now control our access to information and influence our view of life. With several billions indexed pages, search engines are not only the biggest storage systems worldwide, they are also used by millions of users every day. The session will analyze these developments and pay special attention to media monopolies, political implications, censorship, and privacy violations. Several recent case studies, including but not limited to the Google Book Scan program, Google WiFi, Google Earth, and the self proclaimed support of Open Office and other open software frameworks will be used to explore these monopolies and relationships. The session will focus on the problems arising when the availability of information, knowledge, and values becomes dependent from commercial search services. Information which is not accessible through search engines appears to be even non existent for our information society. This session explains the perils of this development and shows the conflicts between commercial interests of search engines, political influence, censorship, advertising, paid rankings and the freedom of information. The presentation will also discuss the dark side of the force, including but not limited to Google bombing, link farms, guestbook/blog/wiki spam, cloaking, Pagerank prostitution, result hijacking etc. The session will discuss the dangerous implications of search engines used to invade the privacy of individual users, focus on user tracking and profiling, and propose methods and techniques to assess and eliminate the threat. The session will further underline the privacy risks and violations caused by search engines, focusing on the digital breadcrumbs, traces, and cookies left by individual users using internet based search/or related services. The session will include entertaining elements and present basic and advanced search methods of Google Hacking and demonstrate how search engines can be misused to identify insecure server and shopping systems, infiltrate networked appliances including webcams and printers, and collect commercial and private information including passwords, credit card data, user account and other personal information. The session will shed some light on upcoming search engine algorithms, technologies, and implications. Search engine technology is still in its infant stages, many resources are still devoted to the analysis, detection and elimination of search engine marketing, webspam, affiliate or duplicate content. There are new and interesting algorithms, technologies, and proposals, as discussed in a recent patent of Google Inc, used in the Open Source search engine Nutch, or proposed by the peer-to-peer search engine Yacy (A search engine Made in Germany), which provide some insight into the future of search engine technology and knowledge management.
-
-
10:01
»
Hack a Day
[Malte Ahlers] from Germany, After having completed a PhD in neurobiology, decided to build a human sized humanoid robot torso. [Malte] has an interest in robotics and wanted to show case some of his skills.The project is still in its early development but as you will see in the video he has achieved a nice build so [...]
-
-
12:22
»
SecDocs
Authors:
Marco Gercke Tags:
cybercrime Event:
Chaos Communication Camp 2007 Abstract: The need for new investigation instruments in the fight against Cybercrime is a topic that is currently discussed on an intensive level – not only in Germany and not only in Europe. One instrument that is in the focus of the law-makers is the online search. Listening to the promoters of such an instruments it is easy to get the impression that the online search is the key to an effective fight against cybercrime – but is it really? The presentation summaries the discussion, highlights potential difficulties and points out alternative solutions. From my point of view it could be interesting to combine the legal issues with a technical approach.
-
-
21:50
»
SecDocs
Authors:
Marco Gercke Tags:
cybercrime Event:
Chaos Communication Camp 2007 Abstract: The need for new investigation instruments in the fight against Cybercrime is a topic that is currently discussed on an intensive level – not only in Germany and not only in Europe. One instrument that is in the focus of the law-makers is the online search. Listening to the promoters of such an instruments it is easy to get the impression that the online search is the key to an effective fight against cybercrime – but is it really? The presentation summaries the discussion, highlights potential difficulties and points out alternative solutions. From my point of view it could be interesting to combine the legal issues with a technical approach.
-
21:50
»
SecDocs
Authors:
Ilya V. Vasilyev Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: At the beginning of 90s Soviet (now Russian) hackerdom begin to experience same problems, as everywhere. Journalists became to blame computer fandom in virtually every crime they could imagine. At 1996, I have found just another solution by opening the School of Hacking Art very like karate-do Schools. In Germany there was TV Show "Die Hackerschule. Galileo. ProSieben. November, 13, 2000, 19:30 about the School. Also here is something in German, check it: http://web.archive.org/web/20050218210212/hscool.net/about/article2.html The event will be a free-style seminar. The basic idea: What have already been done, what should be done. The history of hacking education, relations/communications with government, business, media, etc. Strength and weakness of this way. Some examples of educational technologies from Russia, that are helpful to the whole underground. Q&A session.
-
21:50
»
SecDocs
Authors:
Ilya V. Vasilyev Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: At the beginning of 90s Soviet (now Russian) hackerdom begin to experience same problems, as everywhere. Journalists became to blame computer fandom in virtually every crime they could imagine. At 1996, I have found just another solution by opening the School of Hacking Art very like karate-do Schools. In Germany there was TV Show "Die Hackerschule. Galileo. ProSieben. November, 13, 2000, 19:30 about the School. Also here is something in German, check it: http://web.archive.org/web/20050218210212/hscool.net/about/article2.html The event will be a free-style seminar. The basic idea: What have already been done, what should be done. The history of hacking education, relations/communications with government, business, media, etc. Strength and weakness of this way. Some examples of educational technologies from Russia, that are helpful to the whole underground. Q&A session.
-
-
21:22
»
Packet Storm Security Recent Files
IMF 2013 Call For Papers - The International Conference on IT-Incident Management and IT-Forensics invites submissions for IMF 2013 being held from March 12th through the 14th in Nuremberg, Germany.
-
21:22
»
Packet Storm Security Misc. Files
IMF 2013 Call For Papers - The International Conference on IT-Incident Management and IT-Forensics invites submissions for IMF 2013 being held from March 12th through the 14th in Nuremberg, Germany.
-
-
21:31
»
SecDocs
Authors:
Christian Daniel Thomas Kleffel Tags:
TV Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: As DVB-T is the key technology for terrestrial broadcasting for the next decades, this lecture tries to explain how it works: It covers the way of raw pixel data over MPEG2 video and audio encoding and via multiplexing of several streams and programs to the actual generation of the COFDM signal used for transmission. As the team has built a DVB-T transmitter, we will give a in-depth insight in how things are really done - including a demonstration of the transmitter. Analog PAL based TV transmission is no more - DVB has taken over in Germany. This should be legitimate reason to take a really deep look into how the new technology works and what needs to be done to get your own transmission into the air. The base for our lecture is a standard FBAS signal coming from a video camera. From there we will go with it through all the necessary stages of encoding, framing, multiplexing and modulating. First step is the A/D conversion of the picture and the sound. The resulting 240MBit/s stream is fed into the MPEG2 encoder where video and audio is encoded using the given parameters resulting in a bitstream of defined datarate. To achieve that, the video is divided into single blocks, movement relative to earlier and later frames is detected, and then the data is transferred into the frequency domain and then encoded. A relatively similar thing is done to audio: It is split into several frequency bands and for every band it is decided if the listener will hear this band or not using a psycho accoustical model. Then the remaining data is encoded into a bitstream as well. After that a program clock reference is generated to enable the receiver to keep video and audio in sync while playing back the stream. During the next stage, all video- and audio-streams are multiplexed into one big transport stream and several data tables are added. These tables define, which programs belong to this transport stream and assign video and audio streams to these programs. Electronic program guide and teletext are added and finally the COFDM modulator has the job to generate a base band signal for transmission. Here data is scrambled and interleaved several times, two types of forward error correction are added and then the bits are distributed to the up to 8000 distinct carriers which compose the final signal. As we have built a complete OFDM modulator we will then demonstrate how all these things work together and finally you will be able to watch our transmission using your own DVB-T stick.
-
21:31
»
SecDocs
Authors:
Christian Daniel Thomas Kleffel Tags:
TV Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: As DVB-T is the key technology for terrestrial broadcasting for the next decades, this lecture tries to explain how it works: It covers the way of raw pixel data over MPEG2 video and audio encoding and via multiplexing of several streams and programs to the actual generation of the COFDM signal used for transmission. As the team has built a DVB-T transmitter, we will give a in-depth insight in how things are really done - including a demonstration of the transmitter. Analog PAL based TV transmission is no more - DVB has taken over in Germany. This should be legitimate reason to take a really deep look into how the new technology works and what needs to be done to get your own transmission into the air. The base for our lecture is a standard FBAS signal coming from a video camera. From there we will go with it through all the necessary stages of encoding, framing, multiplexing and modulating. First step is the A/D conversion of the picture and the sound. The resulting 240MBit/s stream is fed into the MPEG2 encoder where video and audio is encoded using the given parameters resulting in a bitstream of defined datarate. To achieve that, the video is divided into single blocks, movement relative to earlier and later frames is detected, and then the data is transferred into the frequency domain and then encoded. A relatively similar thing is done to audio: It is split into several frequency bands and for every band it is decided if the listener will hear this band or not using a psycho accoustical model. Then the remaining data is encoded into a bitstream as well. After that a program clock reference is generated to enable the receiver to keep video and audio in sync while playing back the stream. During the next stage, all video- and audio-streams are multiplexed into one big transport stream and several data tables are added. These tables define, which programs belong to this transport stream and assign video and audio streams to these programs. Electronic program guide and teletext are added and finally the COFDM modulator has the job to generate a base band signal for transmission. Here data is scrambled and interleaved several times, two types of forward error correction are added and then the bits are distributed to the up to 8000 distinct carriers which compose the final signal. As we have built a complete OFDM modulator we will then demonstrate how all these things work together and finally you will be able to watch our transmission using your own DVB-T stick.
-
21:31
»
SecDocs
Authors:
Christian Daniel Thomas Kleffel Tags:
TV Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: As DVB-T is the key technology for terrestrial broadcasting for the next decades, this lecture tries to explain how it works: It covers the way of raw pixel data over MPEG2 video and audio encoding and via multiplexing of several streams and programs to the actual generation of the COFDM signal used for transmission. As the team has built a DVB-T transmitter, we will give a in-depth insight in how things are really done - including a demonstration of the transmitter. Analog PAL based TV transmission is no more - DVB has taken over in Germany. This should be legitimate reason to take a really deep look into how the new technology works and what needs to be done to get your own transmission into the air. The base for our lecture is a standard FBAS signal coming from a video camera. From there we will go with it through all the necessary stages of encoding, framing, multiplexing and modulating. First step is the A/D conversion of the picture and the sound. The resulting 240MBit/s stream is fed into the MPEG2 encoder where video and audio is encoded using the given parameters resulting in a bitstream of defined datarate. To achieve that, the video is divided into single blocks, movement relative to earlier and later frames is detected, and then the data is transferred into the frequency domain and then encoded. A relatively similar thing is done to audio: It is split into several frequency bands and for every band it is decided if the listener will hear this band or not using a psycho accoustical model. Then the remaining data is encoded into a bitstream as well. After that a program clock reference is generated to enable the receiver to keep video and audio in sync while playing back the stream. During the next stage, all video- and audio-streams are multiplexed into one big transport stream and several data tables are added. These tables define, which programs belong to this transport stream and assign video and audio streams to these programs. Electronic program guide and teletext are added and finally the COFDM modulator has the job to generate a base band signal for transmission. Here data is scrambled and interleaved several times, two types of forward error correction are added and then the bits are distributed to the up to 8000 distinct carriers which compose the final signal. As we have built a complete OFDM modulator we will then demonstrate how all these things work together and finally you will be able to watch our transmission using your own DVB-T stick.
-
-
21:31
»
SecDocs
Authors:
Manuel Atug Tags:
credit card PCI DSS Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps. SRC is an auditor approved by MasterCard and Visa to carry out PCI Security Scans and PCI Security Audits. Currently, SRC serves about 3000 merchants and 40 payment service providers around Germany, Austria, Switzerland, France, Russia, Slovakia and Israel. The speaker will first briefly introduce the PCI security requirements. Then, he will disclose the company's experiences and lessons learned when conducting PCI Security Scans and PCI Security Audits.
-
21:31
»
SecDocs
Authors:
Manuel Atug Tags:
credit card PCI DSS Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps. SRC is an auditor approved by MasterCard and Visa to carry out PCI Security Scans and PCI Security Audits. Currently, SRC serves about 3000 merchants and 40 payment service providers around Germany, Austria, Switzerland, France, Russia, Slovakia and Israel. The speaker will first briefly introduce the PCI security requirements. Then, he will disclose the company's experiences and lessons learned when conducting PCI Security Scans and PCI Security Audits.
-
21:31
»
SecDocs
Authors:
Manuel Atug Tags:
credit card PCI DSS Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps. SRC is an auditor approved by MasterCard and Visa to carry out PCI Security Scans and PCI Security Audits. Currently, SRC serves about 3000 merchants and 40 payment service providers around Germany, Austria, Switzerland, France, Russia, Slovakia and Israel. The speaker will first briefly introduce the PCI security requirements. Then, he will disclose the company's experiences and lessons learned when conducting PCI Security Scans and PCI Security Audits.
-
21:31
»
SecDocs
Authors:
Manuel Atug Tags:
credit card PCI DSS Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps. SRC is an auditor approved by MasterCard and Visa to carry out PCI Security Scans and PCI Security Audits. Currently, SRC serves about 3000 merchants and 40 payment service providers around Germany, Austria, Switzerland, France, Russia, Slovakia and Israel. The speaker will first briefly introduce the PCI security requirements. Then, he will disclose the company's experiences and lessons learned when conducting PCI Security Scans and PCI Security Audits.
-
-
21:48
»
SecDocs
Tags:
social Event:
Chaos Communication Camp 2007 Abstract: This talk will present the actual Situation of modern digital controlled Bike and Vehicle Motors. The technology of pulse width modulation is wide spread and simple today, but its a hard and slow path to bring them on the Streets for day to day use. The lean development on the side of the Mass Industries, and the groundbreaking new devices that are build in small Garages and Factory's all over the world are the topic. Also there are some field reports from Drivers experience, the legal Situation in Germany/EU and a whole bunch of News for Nerds who want to move away from Gas. The development of alternative electronic Vehicles is traditionally very slow and on a small border of the gigantic classic automotive market in the world. Bikes with an electronic support Motor are available for nearly 30 Years now, but where are they on the Streets, and why are this first approaches not ready for the Mass? Since a few years there is an ongoing development for modern digital Controlled Motors, more feature-rich and hackable than the classic Brush Motor concept.
-
21:48
»
SecDocs
Tags:
social Event:
Chaos Communication Camp 2007 Abstract: This talk will present the actual Situation of modern digital controlled Bike and Vehicle Motors. The technology of pulse width modulation is wide spread and simple today, but its a hard and slow path to bring them on the Streets for day to day use. The lean development on the side of the Mass Industries, and the groundbreaking new devices that are build in small Garages and Factory's all over the world are the topic. Also there are some field reports from Drivers experience, the legal Situation in Germany/EU and a whole bunch of News for Nerds who want to move away from Gas. The development of alternative electronic Vehicles is traditionally very slow and on a small border of the gigantic classic automotive market in the world. Bikes with an electronic support Motor are available for nearly 30 Years now, but where are they on the Streets, and why are this first approaches not ready for the Mass? Since a few years there is an ongoing development for modern digital Controlled Motors, more feature-rich and hackable than the classic Brush Motor concept.
-
-
2:14
»
SecDocs
Authors:
Oona Leganovic Tags:
radio Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The introduction of radio in the USA and Germany is compared, the role amateurs played and how the respective authorities reacted to them. Questions arise as to how those reactions were models for the treatment of younger communications technologies, and the different approaches to uncontrolled communication will be sketched out. Is "everybody can listen in" a scary thing? The role of radio amateurs in the introduction of radio and the development of radio legislation is sketched out, as well as the ways in which they were treated (by this legislation). The First World War serves as an important point of reference in making clear the differences between the two countries: The American army could already access a significant number of self-educated amateurs, while in Germany many radio operators where educated during the war for the military, and only became effective as independent amateurs after the war, when they seized military radio equipment in great numbers (the phenomen whose name gave this talk its title). While in the USA self-organised amateur organisations where listened to by Congress regarding radio legislation, and their interest actually considered, in Germany the involvement of many amateurs in the November Revolution scared the authorities so much that they became obsessed with the control and taming of radio, censorship and elimination of 'Funkerspuk' - these aims shaped radio legislation in the Weimar Republic. It was noticed how well radio is suited to broadcasting news, but nobody got the idea that freedom of the press might apply to it, too. One of the consequences was that Goebbels did not so much have to build a new control apparatus for radio than seize an existing one. Later the German quest for control boosted the development and spread of magnetic tape, while the economic interests of the commercial radio networks inhibited its use in the USA. More details in the lecture.
-
1:45
»
SecDocs
Authors:
Oona Leganovic Tags:
radio Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The introduction of radio in the USA and Germany is compared, the role amateurs played and how the respective authorities reacted to them. Questions arise as to how those reactions were models for the treatment of younger communications technologies, and the different approaches to uncontrolled communication will be sketched out. Is "everybody can listen in" a scary thing? The role of radio amateurs in the introduction of radio and the development of radio legislation is sketched out, as well as the ways in which they were treated (by this legislation). The First World War serves as an important point of reference in making clear the differences between the two countries: The American army could already access a significant number of self-educated amateurs, while in Germany many radio operators where educated during the war for the military, and only became effective as independent amateurs after the war, when they seized military radio equipment in great numbers (the phenomen whose name gave this talk its title). While in the USA self-organised amateur organisations where listened to by Congress regarding radio legislation, and their interest actually considered, in Germany the involvement of many amateurs in the November Revolution scared the authorities so much that they became obsessed with the control and taming of radio, censorship and elimination of 'Funkerspuk' - these aims shaped radio legislation in the Weimar Republic. It was noticed how well radio is suited to broadcasting news, but nobody got the idea that freedom of the press might apply to it, too. One of the consequences was that Goebbels did not so much have to build a new control apparatus for radio than seize an existing one. Later the German quest for control boosted the development and spread of magnetic tape, while the economic interests of the commercial radio networks inhibited its use in the USA. More details in the lecture.
-
-
21:39
»
SecDocs
Authors:
Ralph Bruckschen Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: Reaching space so far is the business of large companies and national endeavors. However, small groups are working on achieving low cost space access using high end technology. This talk will give a brief insight into JP Aerospace, "America's other space program" and is connected to a real launch of a near space probe. From 2001 to 2004 I was working with JP Aerospace (JPA), a volunteer-based organization that is dedicated to the achievment of low cost space access. This non profit group, run by volunteers is only financed by donations and sponsoring. I will talk about my experiences with this group and about the idea of reaching space using "hacking" methods. The goal of JPA is to reach space using a lighter then air method consisting of 3 stages. The first stage is an airship that transports the payload from ground to the upper stratosphere. The second is a station in the upper stratosphere, acting as a spaceport. The third stage is a gigantic inflatable wing, that is being pushed by ion drives into orbit. To achive this final goal, a lot of small steps are being made to test technologies that are needed. At JPA, these steps are called missions and I was able to participate in several of them. The challenge with each mission is, that you don't really have a budget. You need to work with the parts, that are available (mostly from previous missions) and stuff that you can buy at high end places like "Home Depot" or "Radio Shack". My personal goal was to obtain some high resolution digital imagery from "up there". It has been achieved with the mission "Away 25". I will talk about some of the missions I was participating in and a bit about the oddities and weirdness that is connected with private space projects. As a demonstration, I would like to launch a weather balloon on site. This project is now about 50% completed. Instead of using amateur radio, I will rely on the dense cell phone network of Germany together with GPS. If the mission works out, we will get high resolution digital pictures from an altitude of up to 100.000 feet. Of course, these images can be published on the camp web page. If I may, I would like to auction off a large poster (90cmx2.8m) of a panoramic picture from 96.000 feet that has been made by Away 25 to finance this mission.
-
-
21:37
»
SecDocs
Authors:
Christoph Brüning Kai Schubert Tags:
privacy Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: The lecture intends to give an overview of the Privacy Workshop project started in Siegen (NRW, Germany) and to animate listeners to participate in the project. Update 2008-12-30: we finally put the slides online, but there are still some cc-license tags that need to be fixed for the last pictures. The flickr-links are ok though, so please don't moan and stay tuned.
-
-
21:35
»
SecDocs
Tags:
science Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: Soy is the magic ingredient that we often look to for our alternative, healthier, and more responsible diets. Yet the soy industry, with its boom in profits and global reach, behaves the exact opposite way. Genetically Modified, Resource Greedy, and Appearing at a Supermarket Near You The silent march of the multinational GMO soy industry and its growing power in South America, the EU, and around the World. For any of us in the last 20 years who have chosen to become vegetarians or just reduce the amount of meat that we eat, soy has long been our best friend. Soy, our good alternative food source friend which was our good source of protein and came in all kinds of shapes and forms, sometimes it even tasted like that old sausage or that filet mignon, only it was tofu. And that's how it has been for many alternative eaters, for a very long time, meat is bad, and hey – we've got soy as a healthy and not meat source of goodness. Meanwhile, by the time the late 90's rolled around, in the corridors of the European Commission, there was talk of a new kind of food crop, one that had been engineered to resist typical farming concerns like weeds and pests. Some even promised to reduce the amount of work required to grow it, saving farmers on labor costs. Experts and regular citizens around the world began to ask questions such as what would the long term effects be if people would consume this soy? What about the effects on agriculture if these types of crops are grown near regular soy? And from there.. more questions and frequently, few conclusive answers. One result was the EU's ban on GMO soy for human consumption. Yet despite this ban, GMO soy could be used for animal feed. Indeed by 2006, the European Union became the leading importer of soy, including GMO soy, from South America, 85% of which went towards livestock feeding. Livestock which eventually are consumed by humans. But the story is much larger than the EU and genetically modified food. Because with the growing scope and power of big soy agribusiness, nations like Brazil and Paraguay would experience a quiet soy revolution. A revolution that would bring an end to the way of life for many indigenous people, as well as destroy a significant amount of the amazon rain forest, all in the name of soy. While all this is going on, so to is the fair trade and alter-globalization movement of the late 1990's. Following in their tradition, throughout the 00's, activists from across Europe take matters into their own hands, in countries such as Portugal and Germany, physically going to GMO plantations and destroying the crops as an act of civil disobedience. This is but a snapshot of a very complex struggle that effects not only anyone who eats soy products, but all food. An issue that involves not only policy makers and farmers, but our collective future and public health. It has been called, the omnivore's dilemma, what some in the media feel is too complicated to report about. This is the story of our soy industry, whether we like it our not.
-
-
21:38
»
SecDocs
Authors:
Katarzyna Szymielewicz Patrick Breyer Ralf Bendrath Tags:
law privacy Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: 2011 will again be a crucial year in the battle against data retention and blanket surveillance. The EU Commission is planning to publish its review of the directive in December (right in time before 27C3), and the lobbying and PR battle has already begun. In six months from now, we will see the legislative proposal from the EU commission for the revision of data retention. The talk will give a full picture of the legal state of play, what is going on in Brussels, what is already being done and of course where you can help. The speakers are closely involved in the process on the European and national level. In December 2005, the European Parliament agreed to the data retention directive that introduced mandatory retention of the telecommunications behaviour of half a billion EU citizens and residents. That was a huge disappointment and perceived by many as the final opening of the floodgates. Frank Rieger and Rop Gongrijp at 22C3 even declared that "we lost the war" over privacy. But things turned out different than expected. Now, five years later, a new privacy movement has risen in Germany and elsewhere, a number of constitutional courts all across Europe have declared national data retention laws illegal, a case against the whole directive is pending at the European Court of Justice, and the EU has a justice commissioner who openly said that she would not have suggested the whole thing in the first place, and a home affairs commissioner who voted against the directive when she was still a Member of Parliament. The talk will give a full picture of the legal state of play, what is going on in Brussels, what is already being done and of course where you can help. The speakers are all active in European Digital Rights (EDRi.org) and are closely involved in the process on the European and national level.
-
21:38
»
SecDocs
Authors:
Katarzyna Szymielewicz Patrick Breyer Ralf Bendrath Tags:
law privacy Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: 2011 will again be a crucial year in the battle against data retention and blanket surveillance. The EU Commission is planning to publish its review of the directive in December (right in time before 27C3), and the lobbying and PR battle has already begun. In six months from now, we will see the legislative proposal from the EU commission for the revision of data retention. The talk will give a full picture of the legal state of play, what is going on in Brussels, what is already being done and of course where you can help. The speakers are closely involved in the process on the European and national level. In December 2005, the European Parliament agreed to the data retention directive that introduced mandatory retention of the telecommunications behaviour of half a billion EU citizens and residents. That was a huge disappointment and perceived by many as the final opening of the floodgates. Frank Rieger and Rop Gongrijp at 22C3 even declared that "we lost the war" over privacy. But things turned out different than expected. Now, five years later, a new privacy movement has risen in Germany and elsewhere, a number of constitutional courts all across Europe have declared national data retention laws illegal, a case against the whole directive is pending at the European Court of Justice, and the EU has a justice commissioner who openly said that she would not have suggested the whole thing in the first place, and a home affairs commissioner who voted against the directive when she was still a Member of Parliament. The talk will give a full picture of the legal state of play, what is going on in Brussels, what is already being done and of course where you can help. The speakers are all active in European Digital Rights (EDRi.org) and are closely involved in the process on the European and national level.
-
-
12:01
»
Hack a Day
We see plenty of clock projects come through, but usually it is their visual or mechanical design that stands out. The DCF-77 LED PIC clock is fun because it is synchronized with the Atomic clock in Braunschweig Germany. The clock picks up the radio signal at 77.5 KHz known as DCF77, and that’s where it [...]
-
-
21:55
»
SecDocs
Authors:
Kai Denker Tags:
social Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: Do you remember those days when hackers were “real men?” When hacking was not yet a crime and the cyberspace an undiscovered land? Just before anti-hacking laws were introduced in Germany? Back in these days, the famous founding father of the CCC made the Bundespost (Germany's Federal Mail Service) meet its Waterloo, when they hacked Bildschirmtext (Btx)—the epitome of both technological utopias and dystopias at that time. But soon, hackers suffered a setback: new laws criminalized hacking in the name of fighting white-collar crimes. Simultaneously to the laws, things were getting rougher in the media and the public opinion. While being seen as a weird vanguard of technology before, hackers soon became pranksters and outlaws. Apparently hacktivism, the portmanteau word for hacking activism, had failed to shape the policies in the dawning information society. However, there are evidences that hacktivism had an impact on the new computer crime legislation—not in terms of having more, but less restrictions implemented in the law. In my talk, I take a historian's point of view. First, I will show in which atmosphere of anxiety and excitement information technology evolved in Germany in the early 1980s. Then, I will give a very short description of the Btx hack, which is usually neglected in historical science. After giving this background, I will reconstruct the debates of white-collar crime law-making in context of the “2. WiKG” (Zweites Wirtschaftskriminalitätsbekämpfungsgesetz) in 1984-86. I will show, how different stakeholders demanded a strict law that penalized virtually every aspect of hacking while the politicians—even those from the conservative party—honored the guys who unveiled security flaws in Btx. This had led to the invention of “good” and “bad” hackers in juridical discourses. This distinction has been maintained in law journals, but likewise neglected in most court decisions. My talk will conclude by arguing that hacktivism matters in shaping policies by indirectly changing mind-sets, even if it fails to win every single battle. So, the impact of hacktivism is not part of a rational debate, but of a more complex strategic situation in which rational arguments only play a minor role.
-
21:55
»
SecDocs
Authors:
Kai Denker Tags:
social Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: Do you remember those days when hackers were “real men?” When hacking was not yet a crime and the cyberspace an undiscovered land? Just before anti-hacking laws were introduced in Germany? Back in these days, the famous founding father of the CCC made the Bundespost (Germany's Federal Mail Service) meet its Waterloo, when they hacked Bildschirmtext (Btx)—the epitome of both technological utopias and dystopias at that time. But soon, hackers suffered a setback: new laws criminalized hacking in the name of fighting white-collar crimes. Simultaneously to the laws, things were getting rougher in the media and the public opinion. While being seen as a weird vanguard of technology before, hackers soon became pranksters and outlaws. Apparently hacktivism, the portmanteau word for hacking activism, had failed to shape the policies in the dawning information society. However, there are evidences that hacktivism had an impact on the new computer crime legislation—not in terms of having more, but less restrictions implemented in the law. In my talk, I take a historian's point of view. First, I will show in which atmosphere of anxiety and excitement information technology evolved in Germany in the early 1980s. Then, I will give a very short description of the Btx hack, which is usually neglected in historical science. After giving this background, I will reconstruct the debates of white-collar crime law-making in context of the “2. WiKG” (Zweites Wirtschaftskriminalitätsbekämpfungsgesetz) in 1984-86. I will show, how different stakeholders demanded a strict law that penalized virtually every aspect of hacking while the politicians—even those from the conservative party—honored the guys who unveiled security flaws in Btx. This had led to the invention of “good” and “bad” hackers in juridical discourses. This distinction has been maintained in law journals, but likewise neglected in most court decisions. My talk will conclude by arguing that hacktivism matters in shaping policies by indirectly changing mind-sets, even if it fails to win every single battle. So, the impact of hacktivism is not part of a rational debate, but of a more complex strategic situation in which rational arguments only play a minor role.
-
21:55
»
SecDocs
Authors:
Kai Denker Tags:
social Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: Do you remember those days when hackers were “real men?” When hacking was not yet a crime and the cyberspace an undiscovered land? Just before anti-hacking laws were introduced in Germany? Back in these days, the famous founding father of the CCC made the Bundespost (Germany's Federal Mail Service) meet its Waterloo, when they hacked Bildschirmtext (Btx)—the epitome of both technological utopias and dystopias at that time. But soon, hackers suffered a setback: new laws criminalized hacking in the name of fighting white-collar crimes. Simultaneously to the laws, things were getting rougher in the media and the public opinion. While being seen as a weird vanguard of technology before, hackers soon became pranksters and outlaws. Apparently hacktivism, the portmanteau word for hacking activism, had failed to shape the policies in the dawning information society. However, there are evidences that hacktivism had an impact on the new computer crime legislation—not in terms of having more, but less restrictions implemented in the law. In my talk, I take a historian's point of view. First, I will show in which atmosphere of anxiety and excitement information technology evolved in Germany in the early 1980s. Then, I will give a very short description of the Btx hack, which is usually neglected in historical science. After giving this background, I will reconstruct the debates of white-collar crime law-making in context of the “2. WiKG” (Zweites Wirtschaftskriminalitätsbekämpfungsgesetz) in 1984-86. I will show, how different stakeholders demanded a strict law that penalized virtually every aspect of hacking while the politicians—even those from the conservative party—honored the guys who unveiled security flaws in Btx. This had led to the invention of “good” and “bad” hackers in juridical discourses. This distinction has been maintained in law journals, but likewise neglected in most court decisions. My talk will conclude by arguing that hacktivism matters in shaping policies by indirectly changing mind-sets, even if it fails to win every single battle. So, the impact of hacktivism is not part of a rational debate, but of a more complex strategic situation in which rational arguments only play a minor role.
-
-
13:26
»
Packet Storm Security Recent Files
Call For Papers for MobiPST 2012 - The Second International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2012) will be held in Munchen, Germany, July 30th through August 2nd, 2012.
-
13:26
»
Packet Storm Security Misc. Files
Call For Papers for MobiPST 2012 - The Second International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2012) will be held in Munchen, Germany, July 30th through August 2nd, 2012.
-
-
10:11
»
Packet Storm Security Exploits
ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection, Call For Papers has been announced. It will take place May 27th through June 1st, 2012 in Stuttgart, Germany.
-
10:11
»
Packet Storm Security Recent Files
ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection, Call For Papers has been announced. It will take place May 27th through June 1st, 2012 in Stuttgart, Germany.
-
10:11
»
Packet Storm Security Misc. Files
ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection, Call For Papers has been announced. It will take place May 27th through June 1st, 2012 in Stuttgart, Germany.
-
-
21:41
»
Packet Storm Security Recent Files
Call for participation for the 28C3 Chaos Communication Congress. The Chaos Communication Congress is the annual four-day conference organized by the Chaos Computer Club (CCC) in Berlin, Germany. First held in 1984, it has since established itself as "The European Hacker Conference" attracting a diverse audience of thousands of hackers, scientists, artists, and utopists from all around the world. It will be held from December 27th through the 30th, 2011.
-
21:41
»
Packet Storm Security Misc. Files
Call for participation for the 28C3 Chaos Communication Congress. The Chaos Communication Congress is the annual four-day conference organized by the Chaos Computer Club (CCC) in Berlin, Germany. First held in 1984, it has since established itself as "The European Hacker Conference" attracting a diverse audience of thousands of hackers, scientists, artists, and utopists from all around the world. It will be held from December 27th through the 30th, 2011.
-
-
10:01
»
Hack a Day
It’s summer in Germany, and [Valentin’s] room was getting hotter than he could handle. Tired of suffering through the heat, and with his always-on PC not helping matters any, he decided that he must do something to supplement his home’s air conditioner. The result of his labor is the single room poor man’s A/C unit [...]
-
-
8:30
»
Hack a Day
Hackers at the “RaumZeitLabor” hackerspace in Mannheim Germany have noticed that the locking mechanism on the thinkpad mini dock is extremely easy to circumvent. Sold as an additional layer of security, the mechanism itself is not really secured in any way. The button that actuates it is locked by a key, but the latch isn’t [...]
-
-
7:00
»
Hack a Day
[Johannes Agricola] recently held a workshop at the Peace Mission in Goettingen, Germany where he shared his RGB LED flowers. The small round PCB hosts an ATmega88 microcontroller which is running the V-USB stack so that the unit can be controlled by a computer. Each flower blossom is an RGB LED connected with four enameled wires [...]
-
-
9:00
»
Hack a Day
EBVElectronik of Germany is hosting a design contest based around the STM32F microcontroller. They are inviting engineers and inventors to come up with the best general purpose design ideas, with prizes including a Harley Davidson Motorcycle and a 1000 euro Apple voucher. Even better, they are offering a free STM32 Discovery Kit to anyone who [...]
-
-
17:15
»
Packet Storm Security Misc. Files
IMF 2011 Call For Papers - The International Conference on IT-Incident Management and IT-Forensics invites submissions for IMF 2011 being held from May 10th through the 12th, 2011 in Stuttgart, Germany.
-
17:14
»
Packet Storm Security Recent Files
IMF 2011 Call For Papers - The International Conference on IT-Incident Management and IT-Forensics invites submissions for IMF 2011 being held from May 10th through the 12th, 2011 in Stuttgart, Germany.
-
-
18:00
»
Packet Storm Security Misc. Files
GameSec 2010 Call For Papers - This is conference on decision and game theory for security. It will take place in Berlin, Germany November 22nd through the 23rd, 2010.
-
-
13:56
»
Packet Storm Security Misc. Files
Call For Papers for EC2ND - The sixth European Conference on Computer Network Defense (EC2ND) will be held at the Faculty of Electrical Engineering and Computer Science at Berlin Institute of Technology (TU Berlin). The conference brings together researchers from academia and industry within Europe and beyond to present and discuss current topics in applied network and systems security. It will occur from October 28th through the 29th, 2010 in Berlin, Germany.
-
13:56
»
Packet Storm Security Recent Files
Call For Papers for EC2ND - The sixth European Conference on Computer Network Defense (EC2ND) will be held at the Faculty of Electrical Engineering and Computer Science at Berlin Institute of Technology (TU Berlin). The conference brings together researchers from academia and industry within Europe and beyond to present and discuss current topics in applied network and systems security. It will occur from October 28th through the 29th, 2010 in Berlin, Germany.
-
-
11:27
»
remote-exploit & backtrack
Hello,
im new here and i'm from Germany :)
I have a Fritz! Wlan USB Stick N, but it doesn't work with BackTrack ! Can someone tell me a good USB Stick ?? Please also tell me about the drivers and things like that, whick i'll need to use the usb stick with BackTrack !
Hope you can help me !
donfellone