Schedule 35th Chaos Communication Congress


Version Columbo

Events

Thursday

11:00

35C3: Refreshing Memories

Adams (en)

11:30

Tearing down paywalls in scholarly communication

Clarke (en)

Why and How the Precariat will define the Global Transformation to save our planet.

Adams (en)

From doodle to manufacture: how I make mechanically complicated PCBs.

Dijkstra (en)

Neutrino Astronomy with Hyper-Kamiokande

Eliza (en)

12:30


12:50

Why It's Both Better and Worse Than We can Imagine

Borg (en)

Will the U.S. be ready for 2020?

Adams (en)

Decentralizing semiconductor manufacturing

Eliza (en)

13:30

Das Grenzüberwachungssystem EUROSUR führt Aufklärungsdaten von Satelliten, Flugzeugen, Drohnen und bald auch Fesselballons zusammen

Dijkstra (de)

14:10

Possible paths from today's ghastly hackery to what computing should be

Adams (en)

How I Learned to Stop Worrying and Love the Backdoor

Eliza (en)

14:30


16:10

Dissecting the radio protocol of Sigfox, the global cellular network for the IoT you have probably never heard of

Adams (en)

The decentralized P2P gossip protocol

Eliza (en)

An explanation of Inter-Net and everyday protocols

Borg (en)

An introduction to Spacecraft Operations

Clarke (en)

17:10

Die digitale Seite der häuslichen Gewalt

Dijkstra (de)

From cells to dynamic models of biochemical pathways and information theory, and back.

Eliza (en)

17:30

Software Defined Radio Basics and some Modulation Theory

Clarke (en)

Hacking the most popular cryptocurrency hardware wallets

Borg (en)

18:10

VR experience "Beyond Slavery"

Eliza (en)

Verantwortung und Ethik beim schöpferisch-kritischen Umgang mit Technologie

Adams (de)

18:50

A call to action to defend our ePrivacy and eliminate upload filters

Clarke (en)

Fünf Monate nach dem Urteil im ersten NSU-Prozess

Borg (de)

19:10

Vom Fall der letzten Bastion biometrischer Systeme

Adams (de)

20:50

some technofeminist reflections on Wikileaks

Eliza (en)

Hacking your network likes it's 1980 again

Borg (en)

21:50

“Eine neue Hoffnung” oder “Angriff der Klonkrieger”?

Borg (de)

22:10

Activism and Performance In Hostile Spaces Online

Eliza (en)

"So sicher wie beim Online-Banking": Die elektronische Patientenakte kommt - für alle.

Adams (de)

22:50

Hardware implants in the supply-chain

Borg (en)

23:30

Five Eyes’ Quest For Security Has Given Us Widespread Insecurity

Clarke (en)

Endlich viele neue Gründe zu demonstrieren

Adams (de)

How Data Scientists can help to avoid a sixth global extinction

Dijkstra (en)

How to hack software defined network and keep your sanity?

Eliza (en)

23:50

(Ab)Using AMD Microcode for fun and security

Borg (en)

00:40

Ein Demotivationsworkshop zur politischen Lage.

Adams (de)

11:30

From Cyberfeminism to XenoFeminism

Eliza (en)

Towards correct software that enriches our lives

Dijkstra (en)

12:50

A fully FOSS, Verilog to bitstream, timing driven, cross FPGA, usable toolchain.

Clarke (en)

14:10

An African tale of art, culture and technology

Eliza (en)

the next step forward in open source FPGA tools

Clarke (en)

16:10

Praktische Hinweise für den Kontakt mit der Staatsmacht

Borg (de)

An update on the fate of the Snowden Refugees

Adams (en)

How high-level scripting languages make your hardware project beautifuly easy

Dijkstra (en)

Integrating nearby and offline connectivity with the Internet

Eliza (en)

Introduction to sex- and gender-sensitive medicine

Clarke (en)

17:30

Enabling students over example-driven teaching

Borg (en)

Ein open-source Hardware- und Software-Design für vierbeinige Laufroboter

Eliza (de)

Wie der Weg ins digitale Zuhause zum Spaziergang wird

Adams (de)

18:30

Inclusive and Diverse Spaces and Communities

Dijkstra (en)

18:50

Wie das BAMF seine Probleme mit Technik lösen wollte und scheitert

Borg (de)

Warum DatenschützerInnen aufhören müssen von individueller Privatheit zu sprechen.

Eliza (de)

Algorithms define your priorities. Who else besides you can know what you need?

Clarke (en)

20:50

Massenüberwachung, Netzsperren und andere netzpolitische Schauplätze in der Schweiz

Eliza (de)

Efail, other attacks and lessons learned.

Adams (en)

21:50

How (not) to protect private keys

Eliza (en)

22:10

An Artificial Intelligence Perspective on the Soul

Adams (en)

What Virtual Universes Can Tell Us About Our Own

Dijkstra (en)

… und das Rennen um den schnellsten Computer der Welt

Clarke (de)

A demystification of the exploit development lifecycle

Borg (en)

22:50


23:30

Answers & practical guidelines for engineers.

Clarke (en)

Explaining in detail just how those little COM files infected and played with us back in the day

Borg (en)

23:50


00:30

a utopian documentary about the digital age

Borg (en)

11:30

a try to explain the ecosystem

Eliza (en)

Kann man empirischen Studien trauen?

Adams (de)

How I learned to stop worrying and love the backdoor

Dijkstra (en)

12:50

Interdisciplinary research in Painting and Robotics. with Prof. Oliver Deussen, PhD candidate Marvin Guelzow, and the Artist Liat Grayver.

Eliza (en)

How to write PCIe drivers in Rust, go, C#, Swift, Haskell, and OCaml

Dijkstra (en)

About the Texas Blazar and Multi-Messenger Astrophysics

Clarke (en)

14:10

Transparenz mit der Brechstange

Adams (de)

How using critical thinking in technological practice can make a difference

Borg (en)

How soft and hardware can play a key role in saving lives at sea and why Frontex doesn´t like it

Eliza (en)

weaknesses in the encryption of solid state drives (SSDs)

Dijkstra (en)

16:10

Welche Daten speichert Amazon über uns?

Adams (de)

Hacking the most secure handheld console

Borg (en)

Tamper Proofing Commodity Hardware and other Applications

Eliza (en)

17:10

Hierarchical decentralized naming system used since 30 years

Clarke (en)

17:30

Enforcing strong network segmentation, without anyone noticing

Eliza (en)

why clearing memory is hard.

Borg (en)

18:10

When your browser is mining coins for other people

Clarke (en)

18:50

Wie die GFF mit strategischen Klagen für Freiheitsrechte kämpft und was in 2019 auf uns zukommt

Borg (de)

Reliably finding bugs to escape the Chrome sandbox

Eliza (en)

19:10

Essential Tools for Developing, Testing and Debugging Systems Interacting with the Real World

Clarke (en)

How Curiosity's Onboard Computer works, and what you can learn from how it was designed

Adams (en)

Blockchain origins and related buzzwords, described in pictures.

Dijkstra (en)

20:50

From 1 000 000 000 000 000 to 10: Breaking down 14 Orders of Magnitude

Borg (en)

21:50


22:10

Wie wir alle regelmäßig den Behörden ins Netz gehen und wie man immerhin mehr Transparenz schaffen kann

Clarke (de)

22:50

How cooperative online structures can facilitate sustainable offline activism

Eliza (en)

A long way to a vibrant future

Borg (en)

23:10


23:30

Über kreative Organisation, poltische Aktionen und das Bedürfnis nach vernetztem Aktivismus

Clarke (de)

23:50

Ein Jahr unter der rechtsextremen Regierung

Dijkstra (de)

… und warum ihr dabei mitmachen solltet

Eliza (de)

00:10

The sumo robot fight for the technically ungifted

Adams (en)

01:10

Technische Liebesgedichte & Horrorgeschichten im Dichterwettstreit

Adams (de)

11:30

Fantastic Media Manipulation

Eliza (en)

exploring the relations between design and perception of machines and the dynamics in between

Dijkstra (en)

12:30

OpenSchufa und OffeneGesetze

Eliza (de)

Von Cambridge Analytica zur EU-Wahl

Adams (de)

12:50

Unlocking God Mode on Linux

Dijkstra (en)

13:30

Die Höhen und Tiefen der deutschen und europäischen Netzpolitik

Adams (de)

14:10

Preserving access to the open Internet with circumvention technology

Clarke (en)

14:30

Ein Erfahrungsbericht aus unbetreuter Vereinsmeierei

Eliza (de)

16:10

Up and to the right: All the statistics about this event you could wish for

Borg (en)

17:10