forked from 200ok-ch/media_feed
-
Notifications
You must be signed in to change notification settings - Fork 0
/
feed_todo.xml
817 lines (728 loc) · 76.1 KB
/
feed_todo.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">
<channel>
<title>To watch</title>
<description>Media feed for CCC talks I'd like to watch once up on a time
</description>
<link>https://github.com/mxmo0rhuhn/media_feed</link>
<docs>http://blogs.law.harvard.edu/tech/rss</docs>
<language>en</language>
<generator>media feed build script</generator>
<pubDate>Thu, 30 Jan 2020 23:52:48 +0100</pubDate>
<lastBuildDate>Thu, 30 Jan 2020 23:52:48 +0100</lastBuildDate>
<managingEditor>
impressum@schrimpf.ch (impressum)
</managingEditor>
<webMaster>
impressum@schrimpf.ch (impressum)
</webMaster>
<itunes:owner>
<itunes:email>impressum@schrimpf.ch</itunes:email>
<itunes:name>impressum</itunes:name>
</itunes:owner>
<image>
<url></url>
<title>To watch</title>
<link>https://github.com/mxmo0rhuhn/media_feed</link>
<description>Media feed for CCC talks I'd like to watch once up on a time
</description>
<width>144</width>
<height>144</height>
</image>
<itunes:summary>Media feed for CCC talks I'd like to watch once up on a time
</itunes:summary>
<itunes:author>mxmo0rhuhn</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<itunes:category text="Technology"/>
<itunes:category text="Society"/>
<itunes:category text="Educational Technology"/>
<item>
<title>Correcting copywrongs</title>
<description>After years of debate, EU copyright law is finally being revisited. The Commission will present a proposal for reform within 4 months of 31c3. And it's high time: There has never been a bigger discrepancy between the technical feasibility to share information and knowledge across all physical borders and the legal restrictions to actually do so. This talk outlines the unique opportunity and the challenge to bring copyright into the 21st century that lies in front of us. Hackers ensured that people were heard during last winter's public consultation. Can they now also ensure a progressive outcome of the reform process?</description>
<link>https://events.ccc.de/congress/2014/Fahrplan/events/6350.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2014/Fahrplan/events/6350.html</guid>
<pubDate>Mon, 29 Dec 2014 14:00:00 +0100</pubDate>
<itunes:subtitle>Correcting copywrongs</itunes:subtitle>
<itunes:summary>After years of debate, EU copyright law is finally being revisited. The Commission will present a proposal for reform within 4 months of 31c3. And it's high time: There has never been a bigger discrepancy between the technical feasibility to share information and knowledge across all physical borders and the legal restrictions to actually do so. This talk outlines the unique opportunity and the challenge to bring copyright into the 21st century that lies in front of us. Hackers ensured that people were heard during last winter's public consultation. Can they now also ensure a progressive outcome of the reform process?</itunes:summary>
<itunes:author>Julia Reda</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2014/h264-hd/31c3-6350-en-Correcting_copywrongs_hd.mp4"
length="video/mp4"
type="701497344"/>
</item>
<item>
<title>Preserving arcade games</title>
<description>Old-school arcade games were so protected that hacking is the only way to preserve them before all boards are dead, and the games are lost.</description>
<link>https://events.ccc.de/congress/2014/Fahrplan/events/5997.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2014/Fahrplan/events/5997.html</guid>
<pubDate>Sun, 28 Dec 2014 20:30:00 +0100</pubDate>
<itunes:subtitle>Preserving arcade games</itunes:subtitle>
<itunes:summary>Old-school arcade games were so protected that hacking is the only way to preserve them before all boards are dead, and the games are lost.</itunes:summary>
<itunes:author>Ange Albertini</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2014/h264-hd/31c3-5997-en-Preserving_arcade_games_hd.mp4"
length="video/mp4"
type="640679936"/>
</item>
<item>
<title>Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar</title>
<description>Die Kritik am Freihandelsabkommen TTIP und CETA auf die Chlorhühnchen zu beschränken, greift viel zu kurz. Denn bei den beiden Abkommen zwischen der EU und den USA und der EU und Kanada steht noch viel mehr auf dem Spiel. Egal ob Datenschutz, Demokratie oder Urheberrecht – Abkommen, an denen Konzerne unter Ausschluss der Öffentlichkeit mitschreiben können, sind selten eine gute Idee. Sitzungsdokumente mit “unverbindlichen” Lobby-Vorschlägen und Leaks der Vertragstexte lassen wenig Gutes erwarten. Datenschutzstandards laufen Gefahr zu Handelshemmnissen erklärt zu werden. Konzerne pochen darauf, Staaten vor außerstaatlichen Schiedsgerichten auf Schadensersatz verklagen zu können. Was die Bürger wollen, wurde im ganzen Verhandlungsprozess der beiden Freihandelsabkommen nicht einmal gefragt. Doch “Klicktivismus” war gestern – neue Strategien und Tools halfen dabei, eine Welle des dezentralen Protests loszutreten. </description>
<link>https://events.ccc.de/congress/2014/Fahrplan/events/6342.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2014/Fahrplan/events/6342.html</guid>
<pubDate>Mon, 29 Dec 2014 16:00:00 +0100</pubDate>
<itunes:subtitle>Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar</itunes:subtitle>
<itunes:summary>Die Kritik am Freihandelsabkommen TTIP und CETA auf die Chlorhühnchen zu beschränken, greift viel zu kurz. Denn bei den beiden Abkommen zwischen der EU und den USA und der EU und Kanada steht noch viel mehr auf dem Spiel. Egal ob Datenschutz, Demokratie oder Urheberrecht – Abkommen, an denen Konzerne unter Ausschluss der Öffentlichkeit mitschreiben können, sind selten eine gute Idee. Sitzungsdokumente mit “unverbindlichen” Lobby-Vorschlägen und Leaks der Vertragstexte lassen wenig Gutes erwarten. Datenschutzstandards laufen Gefahr zu Handelshemmnissen erklärt zu werden. Konzerne pochen darauf, Staaten vor außerstaatlichen Schiedsgerichten auf Schadensersatz verklagen zu können. Was die Bürger wollen, wurde im ganzen Verhandlungsprozess der beiden Freihandelsabkommen nicht einmal gefragt. Doch “Klicktivismus” war gestern – neue Strategien und Tools halfen dabei, eine Welle des dezentralen Protests loszutreten. </itunes:summary>
<itunes:author>Katharina Nocun, Maritta Strasser</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2014/h264-hd/31c3-6342-de-Deine_Rechte_sind_in_diesen_Freihandelsabkommen_nicht_verfuegbar_hd.mp4"
length="video/mp4"
type="653262848"/>
</item>
<item>
<title>3D Casting Aluminum</title>
<description>We use microwaves to cast aluminum from 3D printed objects. This gives us the ability to cast high quality 6040 aluminum pieces using a 3D printer and commercially available consumer microwaves. </description>
<link>https://events.ccc.de/congress/2014/Fahrplan/events/6417.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2014/Fahrplan/events/6417.html</guid>
<pubDate>Sat, 27 Dec 2014 12:45:00 +0100</pubDate>
<itunes:subtitle>3D Casting Aluminum</itunes:subtitle>
<itunes:summary>We use microwaves to cast aluminum from 3D printed objects. This gives us the ability to cast high quality 6040 aluminum pieces using a 3D printer and commercially available consumer microwaves. </itunes:summary>
<itunes:author>Julia Longtin</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2014/h264-hd/31c3-6417-en-3D_Casting_Aluminum_hd.mp4"
length="video/mp4"
type="498073600"/>
</item>
<item>
<title>Tell no-one</title>
<description>For nearly one hundred years, the NSA and its predecessors have been engaging in secret, illegal deals with the American telecom industry, with both virtually immune from prosecution.</description>
<link>https://events.ccc.de/congress/2014/Fahrplan/events/6600.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2014/Fahrplan/events/6600.html</guid>
<pubDate>Sun, 28 Dec 2014 12:45:00 +0100</pubDate>
<itunes:subtitle>Tell no-one</itunes:subtitle>
<itunes:summary>For nearly one hundred years, the NSA and its predecessors have been engaging in secret, illegal deals with the American telecom industry, with both virtually immune from prosecution.</itunes:summary>
<itunes:author>James Bamford</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2014/h264-hd/31c3-6600-en-de-Tell_no-one_hd.mp4"
length="video/mp4"
type="507510784"/>
</item>
<item>
<title>The Invisible Committee Returns with 'Fuck Off Google'</title>
<description>There will be people who resist adopting and using technology, people who want nothing to do with virtual profiles, online data systems or smart phones. Yet a government might suspect that people who opt out completely have something to hide and thus are more likely to break laws, and as a counterterrorism measure, that government will build the kind of ‘hidden people’ registry we described earlier. If you don’t have any registered social-networking profiles or mobile subscriptions, and on-line references to you are unusually hard to find, you might be considered a candidate for such a registry. You might also be subjected to a strict set of new regulations that includes rigorous airport screening or even travel restrictions.</description>
<link>https://events.ccc.de/congress/2014/Fahrplan/events/6459.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2014/Fahrplan/events/6459.html</guid>
<pubDate>Sun, 28 Dec 2014 19:00:00 +0100</pubDate>
<itunes:subtitle>The Invisible Committee Returns with 'Fuck Off Google'</itunes:subtitle>
<itunes:summary>There will be people who resist adopting and using technology, people who want nothing to do with virtual profiles, online data systems or smart phones. Yet a government might suspect that people who opt out completely have something to hide and thus are more likely to break laws, and as a counterterrorism measure, that government will build the kind of ‘hidden people’ registry we described earlier. If you don’t have any registered social-networking profiles or mobile subscriptions, and on-line references to you are unusually hard to find, you might be considered a candidate for such a registry. You might also be subjected to a strict set of new regulations that includes rigorous airport screening or even travel restrictions.</itunes:summary>
<itunes:author>Anonymous member of Tarnac Solidarity Committee, tarnac nine</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2014/h264-hd/31c3-6459-en-de-The_Invisible_Committee_Returns_with_Fuck_Off_Google_hd.mp4"
length="video/mp4"
type="220200960"/>
</item>
<item>
<title>From Computation to Consciousness</title>
<description>How can the physical universe give rise to a mind? I suggest to replace this confusing question by another one: what kind of information processing system is the mind, and how is the mind computed? As we will see, even our ideas of the physical universe turn out to be computational. Let us explore some fascinating scenery of the philosophy underlying Artificial Intelligence.</description>
<link>https://events.ccc.de/congress/2014/Fahrplan/events/6573.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2014/Fahrplan/events/6573.html</guid>
<pubDate>Sun, 28 Dec 2014 11:30:00 +0100</pubDate>
<itunes:subtitle>From Computation to Consciousness</itunes:subtitle>
<itunes:summary>How can the physical universe give rise to a mind? I suggest to replace this confusing question by another one: what kind of information processing system is the mind, and how is the mind computed? As we will see, even our ideas of the physical universe turn out to be computational. Let us explore some fascinating scenery of the philosophy underlying Artificial Intelligence.</itunes:summary>
<itunes:author>Joscha</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2014/h264-hd/31c3-6573-en-de-From_Computation_to_Consciousness_hd.mp4"
length="video/mp4"
type="552599552"/>
</item>
<item>
<title>Computational Meta-Psychology</title>
<description>Computational theories of the mind seem to be ideally suited to explain rationality. But how can computations be subverted by meaning, emotion and love? tomaso: Nachdenken darüber wie wir auf den Ebenen unter der Psyche funktionieren, wie wir lernen. Empfohlen. </description>
<link>https://events.ccc.de/congress/2015/Fahrplan/events/7483.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2015/Fahrplan/events/7483.html</guid>
<pubDate>Tue, 29 Dec 2015 12:45:00 +0100</pubDate>
<itunes:subtitle>Computational Meta-Psychology</itunes:subtitle>
<itunes:summary>Computational theories of the mind seem to be ideally suited to explain rationality. But how can computations be subverted by meaning, emotion and love? tomaso: Nachdenken darüber wie wir auf den Ebenen unter der Psyche funktionieren, wie wir lernen. Empfohlen. </itunes:summary>
<itunes:author>Joscha</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7483-en-Computational_Meta-Psychology.mp4"
length="video/mp4"
type="515899392"/>
</item>
<item>
<title>A New Kid on the Block</title>
<description>The leading social networks are the powerful new gatekeepers of the digital age. Proprietary de facto standards of the dominant companies have lead to the emergence of virtual “information silos” that can barely communicate with one another. Has Diaspora really lost the war? Or is there still a chance to succeed? Tomaso: Wie und warum wachsen soziale Netzwerke? Wo ist und was macht Diaspora? Chancen. Sehr gut analysiert. Empfohlen. </description>
<link>https://events.ccc.de/congress/2015/Fahrplan/events/7403.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2015/Fahrplan/events/7403.html</guid>
<pubDate>Wed, 30 Dec 2015 12:45:00 +0100</pubDate>
<itunes:subtitle>A New Kid on the Block</itunes:subtitle>
<itunes:summary>The leading social networks are the powerful new gatekeepers of the digital age. Proprietary de facto standards of the dominant companies have lead to the emergence of virtual “information silos” that can barely communicate with one another. Has Diaspora really lost the war? Or is there still a chance to succeed? Tomaso: Wie und warum wachsen soziale Netzwerke? Wo ist und was macht Diaspora? Chancen. Sehr gut analysiert. Empfohlen. </itunes:summary>
<itunes:author>Katharina Nocun</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7403-en-A_New_Kid_on_the_Block.mp4"
length="video/mp4"
type="907018240"/>
</item>
<item>
<title>Profiling (In)justice</title>
<description>This talk will focus on the potential ability of data disaggregated by race and ethnicity to reduce discriminatory policing in Germany. In the UK, data has been collected during police procedures, allowing for a monitoring and evaluation of discriminatory policing practices. Unfortunately, such an empirically driven policy approach is not currently possible in Germany. This talk will argue that, as a first step, a policy based off the UK approach towards data collection be implemented in Germany to incorporate, rather than ignore, Germany’s diverse identities, and to allow for empirically driven and more effective policing. max: Wurde mir empfohlen - will ich mal noch sehen. </description>
<link>https://events.ccc.de/congress/2015/Fahrplan/events/7264.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2015/Fahrplan/events/7264.html</guid>
<pubDate>Mon, 28 Dec 2015 16:00:00 +0100</pubDate>
<itunes:subtitle>Profiling (In)justice</itunes:subtitle>
<itunes:summary>This talk will focus on the potential ability of data disaggregated by race and ethnicity to reduce discriminatory policing in Germany. In the UK, data has been collected during police procedures, allowing for a monitoring and evaluation of discriminatory policing practices. Unfortunately, such an empirically driven policy approach is not currently possible in Germany. This talk will argue that, as a first step, a policy based off the UK approach towards data collection be implemented in Germany to incorporate, rather than ignore, Germany’s diverse identities, and to allow for empirically driven and more effective policing. max: Wurde mir empfohlen - will ich mal noch sehen. </itunes:summary>
<itunes:author>Jeff Deutch</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7264-en-Profiling_In_justice.mp4"
length="video/mp4"
type="341835776"/>
</item>
<item>
<title>Lifting the Fog on Red Star OS</title>
<description>Angae means "Fog" in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea's operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works. max: Hat ein rechtes Medienecho erhalten. Klingt noch spannend... </description>
<link>https://events.ccc.de/congress/2015/Fahrplan/events/7174.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2015/Fahrplan/events/7174.html</guid>
<pubDate>Sun, 27 Dec 2015 16:00:00 +0100</pubDate>
<itunes:subtitle>Lifting the Fog on Red Star OS</itunes:subtitle>
<itunes:summary>Angae means "Fog" in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea's operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works. max: Hat ein rechtes Medienecho erhalten. Klingt noch spannend... </itunes:summary>
<itunes:author>Florian Grunow, Niklaus Schiess</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2015/h264-sd/32c3-7174-en-de-Lifting_the_Fog_on_Red_Star_OS_sd.mp4"
length="video/mp4"
type="233832448"/>
</item>
<item>
<title>Unpatchable</title>
<description>Gradually we are all becoming more and more dependent on machines, we will be able to live longer with an increased quality of life due to machines integrated into our body. However, our dependence on technology grows faster than our ability to secure it, and a security failure of a medical device can have fatal consequences. This talk is about Marie's personal experience with being the host of a vulnerable medical implant, and how this has forced her to become a human part of the "Internet-of-Things". max: Intensives Echo in Medien und sozialen Netzwerken - will ich definitiv noch sehen. </description>
<link>https://events.ccc.de/congress/2015/Fahrplan/events/7273.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2015/Fahrplan/events/7273.html</guid>
<pubDate>Mon, 28 Dec 2015 23:00:00 +0100</pubDate>
<itunes:subtitle>Unpatchable</itunes:subtitle>
<itunes:summary>Gradually we are all becoming more and more dependent on machines, we will be able to live longer with an increased quality of life due to machines integrated into our body. However, our dependence on technology grows faster than our ability to secure it, and a security failure of a medical device can have fatal consequences. This talk is about Marie's personal experience with being the host of a vulnerable medical implant, and how this has forced her to become a human part of the "Internet-of-Things". max: Intensives Echo in Medien und sozialen Netzwerken - will ich definitiv noch sehen. </itunes:summary>
<itunes:author>Marie Moe, Eireann Leverett</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7273-en-Unpatchable_hd.mp4"
length="video/mp4"
type="824180736"/>
</item>
<item>
<title>What does Big Brother see, while he is watching?</title>
<description>Alain: Simon Menner shows a great collection of pictures from the best treasure trove that is accessible to us from surveillance states. He tells a good story on how absurd and dangerous surveillance is at the same time.
It's also curious to hear that only footage from eastern countries is available, the BND only released 14 totally irrelevant pictures of all of the cold war (something like a cork screw...). So of course the easter states totally look illegal compared to just nothing.</description>
<link>https://events.ccc.de/congress/2015/Fahrplan/events/7209.html</link>
<guid isPermaLink="true">https://events.ccc.de/congress/2015/Fahrplan/events/7209.html</guid>
<pubDate>Sat, 09 Jan 2016 14:21:28 +0100></pubDate>
<itunes:subtitle>What does Big Brother see, while he is watching?</itunes:subtitle>
<itunes:summary>Alain: Simon Menner shows a great collection of pictures from the best treasure trove that is accessible to us from surveillance states. He tells a good story on how absurd and dangerous surveillance is at the same time.
It's also curious to hear that only footage from eastern countries is available, the BND only released 14 totally irrelevant pictures of all of the cold war (something like a cork screw...). So of course the easter states totally look illegal compared to just nothing.</itunes:summary>
<itunes:author></itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://c3media.vsos.ethz.ch/congress/2015/h264-hd/32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching_hd.mp4"
length="1009811974"
type="video/mp4"/>
</item>
<item>
<title>Rowhammer.js: Root privileges for web apps?</title>
<description>"Insanity: doing the same thing over and over again and expecting different results." Albert Einstein - Who did not live long enough to see Rowhammer
Recent studies have found that repeated accesses to DRAM rows can cause random bit flips, resulting in the so called Rowhammer vulnerability. We present Rowhammer.js, the first remote software-induced hardware-fault attack, from JavaScript. We also extend our presentation with an overview of cache side-channel attacks, that use the same technique to evict data from the cache.
phil: Frightening bit flipping. Very in depth.</description>
<link>https://media.ccc.de/v/32c3-7197-rowhammer_js_root_privileges_for_web_apps</link>
<guid isPermaLink="true">https://media.ccc.de/v/32c3-7197-rowhammer_js_root_privileges_for_web_apps</guid>
<pubDate>08 Jan 2016 18:28 GMT</pubDate>
<itunes:subtitle>Rowhammer.js: Root privileges for web apps?</itunes:subtitle>
<itunes:summary>"Insanity: doing the same thing over and over again and expecting different results." Albert Einstein - Who did not live long enough to see Rowhammer
Recent studies have found that repeated accesses to DRAM rows can cause random bit flips, resulting in the so called Rowhammer vulnerability. We present Rowhammer.js, the first remote software-induced hardware-fault attack, from JavaScript. We also extend our presentation with an overview of cache side-channel attacks, that use the same technique to evict data from the cache.
phil: Frightening bit flipping. Very in depth.</itunes:summary>
<itunes:author></itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7197-en-Rowhammerjs_Root_privileges_for_web_apps.mp4"
length="143094416"
type="video/mp4"/>
</item>
<item>
<title>Where in the World Is Carmen Sandiego?</title>
<description>Travel booking systems are among the oldest global IT infrastructures, and have changed surprisingly little since the 80s. The personal information contained in these systems is hence not well secured by today's standards. This talk shows real-world hacking risks from tracking travelers to stealing flights. max: Media, 0 day </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7964.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7964.html</guid>
<pubDate>Tue, 27 Dec 2016 21:45:00 +0100</pubDate>
<itunes:subtitle>Where in the World Is Carmen Sandiego?</itunes:subtitle>
<itunes:summary>Travel booking systems are among the oldest global IT infrastructures, and have changed surprisingly little since the 80s. The personal information contained in these systems is hence not well secured by today's standards. This talk shows real-world hacking risks from tracking travelers to stealing flights. max: Media, 0 day </itunes:summary>
<itunes:author>Karsten Nohl, Nemanja Nikodijevic</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-7964-eng-Where_in_the_World_Is_Carmen_Sandiego.mp4"
length="video/mp4"
type="395313152"/>
</item>
<item>
<title>Build your own NSA</title>
<description>When thinking about surveillance, everyone worries about government agencies like the NSA and big corporations like Google and Facebook. But actually there are hundreds of companies that have also discovered data collection as a revenue source. We decided to do an experiment: Using simple social engineering techniques, we tried to get the most personal you may have in your procession. max: Media, friends </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8034.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8034.html</guid>
<pubDate>Wed, 28 Dec 2016 20:30:00 +0100</pubDate>
<itunes:subtitle>Build your own NSA</itunes:subtitle>
<itunes:summary>When thinking about surveillance, everyone worries about government agencies like the NSA and big corporations like Google and Facebook. But actually there are hundreds of companies that have also discovered data collection as a revenue source. We decided to do an experiment: Using simple social engineering techniques, we tried to get the most personal you may have in your procession. max: Media, friends </itunes:summary>
<itunes:author>Andreas Dewes, @sveckert</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8034-deu-Build_your_own_NSA.mp4"
length="video/mp4"
type="632291328"/>
</item>
<item>
<title>Predicting and Abusing WPA2/802.11 Group Keys</title>
<description>We analyze the generation and management of WPA2 group keys. These keys protect broadcast and multicast Wi-Fi traffic. We discovered several issues and illustrate their importance by decrypting all group (and unicast) traffic of a typical Wi-Fi network. max: Friends </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8195.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8195.html</guid>
<pubDate>Tue, 27 Dec 2016 14:00:00 +0100</pubDate>
<itunes:subtitle>Predicting and Abusing WPA2/802.11 Group Keys</itunes:subtitle>
<itunes:summary>We analyze the generation and management of WPA2 group keys. These keys protect broadcast and multicast Wi-Fi traffic. We discovered several issues and illustrate their importance by decrypting all group (and unicast) traffic of a typical Wi-Fi network. max: Friends </itunes:summary>
<itunes:author>Mathy Vanhoef</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8195-eng-Predicting_and_Abusing_WPA2_80211_Group_Keys.mp4"
length="video/mp4"
type="241172480"/>
</item>
<item>
<title>3 Years After Snowden: Is Germany fighting State Surveillance?</title>
<description>Germany has a good reputation for strong data protection. It also features the only parliamentary inquiry committee investigating the Snowden revelations. But what are actual results of parliamentary, journalistic and public engagement? max: Snowden live at CCC </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8117.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8117.html</guid>
<pubDate>Wed, 28 Dec 2016 17:15:00 +0100</pubDate>
<itunes:subtitle>3 Years After Snowden: Is Germany fighting State Surveillance?</itunes:subtitle>
<itunes:summary>Germany has a good reputation for strong data protection. It also features the only parliamentary inquiry committee investigating the Snowden revelations. But what are actual results of parliamentary, journalistic and public engagement? max: Snowden live at CCC </itunes:summary>
<itunes:author>anna, Andre Meister</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8117-eng-3_Years_After_Snowden_Is_Germany_fighting_State_Surveillance.mp4"
length="video/mp4"
type="714080256"/>
</item>
<item>
<title>Es sind die kleinen Dinge im Leben</title>
<description>Jeder weiß ungefähr was ein Mikroskop ist und vielleicht hat man auch mal davon gehört das da immernoch dran geforscht wird – Stichwort Hochauflösungsmikroskopie (Nobelpreis 2014 in Chemie). Es gibt deutlich mehr Mikroskope in der professionellen Forschung als es Teleskope gibt, deutlich mehr – und da könnte man sich jetzt fragen: "Warum sehe ich so viele Bilder von Sterne, aber kaum Mikroskopiebilder von öffentlichen Einrichtungen und Stellen?". Um diese Frage zu beantworten will ich kurz in die Welt der Hochauflösungsmikroskopie einführen und die Techniken erklären. Ein bisschen über die Community erzählen und versuchen klar zu machen, warum es hier mit der Offenheit noch etwas hapert. UND: Es soll auch mikroskopiert werden. max: Media, seems to have great pictures </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8237.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8237.html</guid>
<pubDate>Wed, 28 Dec 2016 11:30:00 +0100</pubDate>
<itunes:subtitle>Es sind die kleinen Dinge im Leben</itunes:subtitle>
<itunes:summary>Jeder weiß ungefähr was ein Mikroskop ist und vielleicht hat man auch mal davon gehört das da immernoch dran geforscht wird – Stichwort Hochauflösungsmikroskopie (Nobelpreis 2014 in Chemie). Es gibt deutlich mehr Mikroskope in der professionellen Forschung als es Teleskope gibt, deutlich mehr – und da könnte man sich jetzt fragen: "Warum sehe ich so viele Bilder von Sterne, aber kaum Mikroskopiebilder von öffentlichen Einrichtungen und Stellen?". Um diese Frage zu beantworten will ich kurz in die Welt der Hochauflösungsmikroskopie einführen und die Techniken erklären. Ein bisschen über die Community erzählen und versuchen klar zu machen, warum es hier mit der Offenheit noch etwas hapert. UND: Es soll auch mikroskopiert werden. max: Media, seems to have great pictures </itunes:summary>
<itunes:author>André Lampe</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8237-deu-Es_sind_die_kleinen_Dinge_im_Leben.mp4"
length="video/mp4"
type="329252864"/>
</item>
<item>
<title>Visiting The Bear Den</title>
<description>Sednit, a.k.a Fancy Bear/APT28/Sofacy, is a group of attackers operating since at least 2004 and whose main objective is to steal confidential information from specific targets. Over the past two years, this group's activity increased significantly, in particular with numerous attacks against foreign affairs ministries and embassies all over the world. They are supposedly behind the DNC hack, and the WADA hack, which happened earlier this year. This talk presents the results of a two-year hunt after Sednit, during which we dug up and analyzed many of their software. </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8094.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8094.html</guid>
<pubDate>Tue, 27 Dec 2016 23:00:00 +0100</pubDate>
<itunes:subtitle>Visiting The Bear Den</itunes:subtitle>
<itunes:summary>Sednit, a.k.a Fancy Bear/APT28/Sofacy, is a group of attackers operating since at least 2004 and whose main objective is to steal confidential information from specific targets. Over the past two years, this group's activity increased significantly, in particular with numerous attacks against foreign affairs ministries and embassies all over the world. They are supposedly behind the DNC hack, and the WADA hack, which happened earlier this year. This talk presents the results of a two-year hunt after Sednit, during which we dug up and analyzed many of their software. </itunes:summary>
<itunes:author>Jessy Campos</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8094-eng-Visiting_The_Bear_Den.mp4"
length="video/mp4"
type="266338304"/>
</item>
<item>
<title>Kampf dem Abmahnunwesen</title>
<description>Im Spannungsfeld zwischen der Vorderfront der Computertechnik und einem Spezialbereich des Urheberrechts hat sich eine Industrie eine Nische geschaffen, in der sie durch Hochspezialisierung und Automatisierung ein einträgliches Geschäft aufgezogen haben. Dabei nehmen sie als Kollateralschaden in Kauf, dass Unschuldige durch die Drohkulisse zum Zahlen bewegt und zum Schließen ihres offenen Netzwerks gebracht werden. Wir beschreiben, was man dagegen tun kann und was wir dagegen schon getan haben. max: Media </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8388.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8388.html</guid>
<pubDate>Tue, 27 Dec 2016 16:45:00 +0100</pubDate>
<itunes:subtitle>Kampf dem Abmahnunwesen</itunes:subtitle>
<itunes:summary>Im Spannungsfeld zwischen der Vorderfront der Computertechnik und einem Spezialbereich des Urheberrechts hat sich eine Industrie eine Nische geschaffen, in der sie durch Hochspezialisierung und Automatisierung ein einträgliches Geschäft aufgezogen haben. Dabei nehmen sie als Kollateralschaden in Kauf, dass Unschuldige durch die Drohkulisse zum Zahlen bewegt und zum Schließen ihres offenen Netzwerks gebracht werden. Wir beschreiben, was man dagegen tun kann und was wir dagegen schon getan haben. max: Media </itunes:summary>
<itunes:author>Beata Hubrig, erdgeist</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8388-deu-Kampf_dem_Abmahnunwesen.mp4"
length="video/mp4"
type="501219328"/>
</item>
<item>
<title>Shut Up and Take My Money!</title>
<description>FinTechs increasingly cut the ground from under long-established banks’ feet. With a "Mobile First" strategy, many set their sights on bringing all financial tasks—checking the account balance, making transactions, arranging investments, and ordering an overdraft—on your smartphone. In a business area that was once entirely committed to security, Fintechs make a hip design and outstanding user experience their one and only priority. Even though this strategy is rewarded by rapidly increasing customer numbers, it also reveals a flawed understanding of security. With the example of the pan-European banking startup N26 (formerly Number26), we succeeded independently from the used device to leak customer data, manipulate transactions, and to entirely take over accounts to ultimately issue arbitrary transactions—even without credit. max: 0 day </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7969.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7969.html</guid>
<pubDate>Tue, 27 Dec 2016 16:45:00 +0100</pubDate>
<itunes:subtitle>Shut Up and Take My Money!</itunes:subtitle>
<itunes:summary>FinTechs increasingly cut the ground from under long-established banks’ feet. With a "Mobile First" strategy, many set their sights on bringing all financial tasks—checking the account balance, making transactions, arranging investments, and ordering an overdraft—on your smartphone. In a business area that was once entirely committed to security, Fintechs make a hip design and outstanding user experience their one and only priority. Even though this strategy is rewarded by rapidly increasing customer numbers, it also reveals a flawed understanding of security. With the example of the pan-European banking startup N26 (formerly Number26), we succeeded independently from the used device to leak customer data, manipulate transactions, and to entirely take over accounts to ultimately issue arbitrary transactions—even without credit. max: 0 day </itunes:summary>
<itunes:author>Vincent Haupert</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-7969-eng-Shut_Up_and_Take_My_Money.mp4"
length="video/mp4"
type="163577856"/>
</item>
<item>
<title>Syrian Archive</title>
<description>Journalists and human rights groups need to find and use verified visual evidence in order to accurately report about what’s happening in conflict zones. In the case of Syria, there are more hours of online footage online than there have been hours of conflict. max: media coverage </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7909.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7909.html</guid>
<pubDate>Wed, 28 Dec 2016 12:15:00 +0100</pubDate>
<itunes:subtitle>Syrian Archive</itunes:subtitle>
<itunes:summary>Journalists and human rights groups need to find and use verified visual evidence in order to accurately report about what’s happening in conflict zones. In the case of Syria, there are more hours of online footage online than there have been hours of conflict. max: media coverage </itunes:summary>
<itunes:author>Jeff Deutch, Hadi Al-Khatib</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-7909-eng-Syrian_Archive.mp4"
length="video/mp4"
type="244318208"/>
</item>
<item>
<title>Geolocation methods in mobile networks</title>
<description>This talk presents the results of the technical analysis for the German Parliamentary Committee investigating the NSA spying scandal on geolocation methods in mobile networks.
</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7966.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7966.html</guid>
<pubDate>Tue, 27 Dec 2016 17:30:00 +0100</pubDate>
<itunes:subtitle>Geolocation methods in mobile networks</itunes:subtitle>
<itunes:summary>This talk presents the results of the technical analysis for the German Parliamentary Committee investigating the NSA spying scandal on geolocation methods in mobile networks.
</itunes:summary>
<itunes:author>Erik</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-7966-eng-Geolocation_methods_in_mobile_networks.mp4"
length="video/mp4"
type="257949696"/>
</item>
<item>
<title>Dieselgate – A year later</title>
<description>At 32C3 we gave an overview on the organizational and technical aspects of Dieselgate that had just broken public three months before. In the last year we have learned a lot and spoken to hundreds of people. Daniel gives an update on what is known and what is still to be revealed.</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8131.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8131.html</guid>
<pubDate>Tue, 27 Dec 2016 19:00:00 +0100</pubDate>
<itunes:subtitle>Dieselgate – A year later</itunes:subtitle>
<itunes:summary>At 32C3 we gave an overview on the organizational and technical aspects of Dieselgate that had just broken public three months before. In the last year we have learned a lot and spoken to hundreds of people. Daniel gives an update on what is known and what is still to be revealed.</itunes:summary>
<itunes:author>Daniel Lange (DLange)</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8131-eng-Dieselgate_-_A_year_later.mp4"
length="video/mp4"
type="230686720"/>
</item>
<item>
<title>Software Defined Emissions</title>
<description>A technical talk on how to reverse-engineer electronic control units in order to document what was left apparently intentionally undocumented by the vendor – including how Volkswagen tweaked their cycle detection code while already being investigated by the EPA, how different the Volkswagen approach is really to the rest of the industry, and of course some trivia on how the „acoustic function“ got its name.</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7904.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7904.html</guid>
<pubDate>Tue, 27 Dec 2016 20:30:00 +0100</pubDate>
<itunes:subtitle>Software Defined Emissions</itunes:subtitle>
<itunes:summary>A technical talk on how to reverse-engineer electronic control units in order to document what was left apparently intentionally undocumented by the vendor – including how Volkswagen tweaked their cycle detection code while already being investigated by the EPA, how different the Volkswagen approach is really to the rest of the industry, and of course some trivia on how the „acoustic function“ got its name.</itunes:summary>
<itunes:author>Felix „tmbinc“ Domke</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-7904-eng-Software_Defined_Emissions.mp4"
length="video/mp4"
type="311427072"/>
</item>
<item>
<title>Hacking the World</title>
<description>In this lecture I wish to reflect on the maturation of the security and hacking communities and their role in larger societal and political participation. We'll reflect on the predominant role that technology has been growing into our lives, and the responsibilities we have in nurturing it. After having spent the last years in researching, exposing, and preventing the electronic targeting of dissidents and journalists, I hope to synthesize my experience and suggest how to reconsider our tactics, the successes, and the failures, and hopefully draw some inspiration for a brighter future.</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8349.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8349.html</guid>
<pubDate>Wed, 28 Dec 2016 13:00:00 +0100</pubDate>
<itunes:subtitle>Hacking the World</itunes:subtitle>
<itunes:summary>In this lecture I wish to reflect on the maturation of the security and hacking communities and their role in larger societal and political participation. We'll reflect on the predominant role that technology has been growing into our lives, and the responsibilities we have in nurturing it. After having spent the last years in researching, exposing, and preventing the electronic targeting of dissidents and journalists, I hope to synthesize my experience and suggest how to reconsider our tactics, the successes, and the failures, and hopefully draw some inspiration for a brighter future.</itunes:summary>
<itunes:author>Claudio "nex" Guarnieri</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8349-eng-Hacking_the_World.mp4"
length="video/mp4"
type="235929600"/>
</item>
<item>
<title>Nintendo Hacking 2016</title>
<description>This talk will give a unique insight of what happens when consoles have been hacked already, but not all secrets are busted yet. This time we will not only focus on the Nintendo 3DS but also on the Wii U, talking about our experiences wrapping up the end of an era. We will show how we managed to exploit them in novel ways and discuss why we think that Nintendo has lost the game.
</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8344.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8344.html</guid>
<pubDate>Tue, 27 Dec 2016 20:30:00 +0100</pubDate>
<itunes:subtitle>Nintendo Hacking 2016</itunes:subtitle>
<itunes:summary>This talk will give a unique insight of what happens when consoles have been hacked already, but not all secrets are busted yet. This time we will not only focus on the Nintendo 3DS but also on the Wii U, talking about our experiences wrapping up the end of an era. We will show how we managed to exploit them in novel ways and discuss why we think that Nintendo has lost the game.
</itunes:summary>
<itunes:author>derrek, nedwill, naehrwert</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8344-eng-Nintendo_Hacking_2016.mp4"
length="video/mp4"
type="241172480"/>
</item>
<item>
<title>Copywrongs 2.0</title>
<description>EU copyright reform plans threaten freedom of expression: Commissioner Günther Oettinger wants to make sharing even the tiniest snippets of news content subject to costly licensing, and obligate internet platforms to monitor all user uploads. We can still stop these proposals – if you join the fight now.
</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8229.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8229.html</guid>
<pubDate>Wed, 28 Dec 2016 16:00:00 +0100</pubDate>
<itunes:subtitle>Copywrongs 2.0</itunes:subtitle>
<itunes:summary>EU copyright reform plans threaten freedom of expression: Commissioner Günther Oettinger wants to make sharing even the tiniest snippets of news content subject to costly licensing, and obligate internet platforms to monitor all user uploads. We can still stop these proposals – if you join the fight now.
</itunes:summary>
<itunes:author>Julia Reda</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8229-eng-Copywrongs_20.mp4"
length="video/mp4"
type="653262848"/>
</item>
<item>
<title>You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet</title>
<description>In this talk we will explore and present various IPv6 scanning techniques that allow attackers to peek into IPv6 networks. With the already known difference between IPv4 and IPv6 firewalling (the latter is worse... ) we then demonstrate how these techniques can be combined and used to obtain a large-scale view on the state of IPv6 in infrastructures and data centers. To give the whole issue a somewhat more fun dimension, we will also look at some (security) sensitive applications of this technique. Complimentary code-snippets will be provided.</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8061.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8061.html</guid>
<pubDate>Tue, 27 Dec 2016 23:00:00 +0100</pubDate>
<itunes:subtitle>You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet</itunes:subtitle>
<itunes:summary>In this talk we will explore and present various IPv6 scanning techniques that allow attackers to peek into IPv6 networks. With the already known difference between IPv4 and IPv6 firewalling (the latter is worse... ) we then demonstrate how these techniques can be combined and used to obtain a large-scale view on the state of IPv6 in infrastructures and data centers. To give the whole issue a somewhat more fun dimension, we will also look at some (security) sensitive applications of this technique. Complimentary code-snippets will be provided.</itunes:summary>
<itunes:author>Tobias Fiebig</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8061-eng-You_can_-j_REJECT_but_you_can_not_hide_Global_scanning_of_the_IPv6_Internet.mp4"
length="video/mp4"
type="309329920"/>
</item>
<item>
<title>Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule</title>
<description>Die Lebenswelt von Kindern und Jugendlichen sowie die der Schulen könnte in Bezug auf die Digitalisierung kaum gegensätzlicher sein: Schülerinnen und Schüler leben und entfalten sich begeistert in der digitalen Welt, aber die Schule ist kaum in der Lage, Schülern ihre drängenden Fragen rund um die komplexe digitale Welt zu beantworten. In unserem Talk möchten wir anhand unserer Erfahrungen aus dem Projekt "Chaos macht Schule" u.a. diskutieren, wie man die heranwachsende Generation u. a. für Themen wie Datenschutz und Überwachung sensibilisieren und gleichzeitig Technikbegeisterung bei jungen Menschen fördern kann.</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8262.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8262.html</guid>
<pubDate>Tue, 27 Dec 2016 14:00:00 +0100</pubDate>
<itunes:subtitle>Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule</itunes:subtitle>
<itunes:summary>Die Lebenswelt von Kindern und Jugendlichen sowie die der Schulen könnte in Bezug auf die Digitalisierung kaum gegensätzlicher sein: Schülerinnen und Schüler leben und entfalten sich begeistert in der digitalen Welt, aber die Schule ist kaum in der Lage, Schülern ihre drängenden Fragen rund um die komplexe digitale Welt zu beantworten. In unserem Talk möchten wir anhand unserer Erfahrungen aus dem Projekt "Chaos macht Schule" u.a. diskutieren, wie man die heranwachsende Generation u. a. für Themen wie Datenschutz und Überwachung sensibilisieren und gleichzeitig Technikbegeisterung bei jungen Menschen fördern kann.</itunes:summary>
<itunes:author>benni, Dorina</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8262-deu-Zwischen_Technikbegeisterung_und_kritischer_Reflexion_Chaos_macht_Schule.mp4"
length="video/mp4"
type="881852416"/>
</item>
<item>
<title>Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken</title>
<description>Auf der Hoaxmap werden seit vergangenem Februar Gerüchte über Geflüchtete und deren Widerlegungen gesammelt, sortiert und in Kartenform präsentiert. Die Themen sind dabei so vielfältig wie die Erzählformen.</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8288.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8288.html</guid>
<pubDate>Tue, 27 Dec 2016 19:00:00 +0100</pubDate>
<itunes:subtitle>Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken</itunes:subtitle>
<itunes:summary>Auf der Hoaxmap werden seit vergangenem Februar Gerüchte über Geflüchtete und deren Widerlegungen gesammelt, sortiert und in Kartenform präsentiert. Die Themen sind dabei so vielfältig wie die Erzählformen.</itunes:summary>
<itunes:author>fraulutz, NoAverageRobot</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8288-deu-Bonsai_Kitten_waren_mir_lieber_-_Rechte_Falschmeldungen_in_sozialen_Netzwerken.mp4"
length="video/mp4"
type="328204288"/>
</item>
<item>
<title>The Fight for Encryption in 2016</title>
<description>Both strong end-to-end communications encryption and device encryption are legal in most jurisdictions today, and remain widely available. Yet software programmers and hardware producers are increasingly under pressure from law enforcement and policy makers around the world to include so-called backdoors in encryption products.</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8295.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8295.html</guid>
<pubDate>Tue, 27 Dec 2016 12:45:00 +0100</pubDate>
<itunes:subtitle>The Fight for Encryption in 2016</itunes:subtitle>
<itunes:summary>Both strong end-to-end communications encryption and device encryption are legal in most jurisdictions today, and remain widely available. Yet software programmers and hardware producers are increasingly under pressure from law enforcement and policy makers around the world to include so-called backdoors in encryption products.</itunes:summary>
<itunes:author>Kurt Opsahl</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8295-eng-The_Fight_for_Encryption_in_2016.mp4"
length="video/mp4"
type="395313152"/>
</item>
<item>
<title>Retail Surveillance / Retail Countersurveillance</title>
<description>From geo-magnetic tracking for smartphones to facial recognition for email marketing, from physical shopping cart fingerprinting to computer vision algorithms that use your clothing as metadata, this talk will explore the emerging landscape of hyper-competitive retail surveillance. Instead of dramatizing these technologies which can lead to calcification and normalization, the aim of this talk is to energize discourse around building creative solutions to counter, adapt to, or rethink emerging surveillance technologies.</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8238.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8238.html</guid>
<pubDate>Fri, 30 Dec 2016 13:00:00 +0100</pubDate>
<itunes:subtitle>Retail Surveillance / Retail Countersurveillance</itunes:subtitle>
<itunes:summary>From geo-magnetic tracking for smartphones to facial recognition for email marketing, from physical shopping cart fingerprinting to computer vision algorithms that use your clothing as metadata, this talk will explore the emerging landscape of hyper-competitive retail surveillance. Instead of dramatizing these technologies which can lead to calcification and normalization, the aim of this talk is to energize discourse around building creative solutions to counter, adapt to, or rethink emerging surveillance technologies.</itunes:summary>
<itunes:author>Adam Harvey</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8238-eng-Retail_Surveillance_Retail_Countersurveillance.mp4"
length="video/mp4"
type="192937984"/>
</item>
<item>
<title>The DROWN Attack</title>
<description>We present DROWN, a novel cross-protocol attack on TLS that uses a server supporting SSLv2 as an oracle to decrypt modern TLS connections. Using Internet-wide scans, we find that 33% of all HTTPS servers are vulnerable to this protocol-level attack. max: Have been told that its very technical
</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7821.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/7821.html</guid>
<pubDate>Tue, 27 Dec 2016 14:00:00 +0100</pubDate>
<itunes:subtitle>The DROWN Attack</itunes:subtitle>
<itunes:summary>We present DROWN, a novel cross-protocol attack on TLS that uses a server supporting SSLv2 as an oracle to decrypt modern TLS connections. Using Internet-wide scans, we find that 33% of all HTTPS servers are vulnerable to this protocol-level attack. max: Have been told that its very technical
</itunes:summary>
<itunes:author>Sebastian Schinzel</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-7821-eng-The_DROWN_Attack.mp4"
length="video/mp4"
type="310378496"/>
</item>
<item>
<title>A world without blockchain</title>
<description>Instant money transfer, globally without borders and 24/7. That’s one of the promises of Bitcoin. But how does national and international money transfer work in the world of banks? max: maybe </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8315.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8315.html</guid>
<pubDate>Wed, 28 Dec 2016 18:30:00 +0100</pubDate>
<itunes:subtitle>A world without blockchain</itunes:subtitle>
<itunes:summary>Instant money transfer, globally without borders and 24/7. That’s one of the promises of Bitcoin. But how does national and international money transfer work in the world of banks? max: maybe </itunes:summary>
<itunes:author>Mark van Cuijk</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8315-eng-A_world_without_blockchain.mp4"
length="video/mp4"
type="389021696"/>
</item>
<item>
<title>The Untold Story of Edward Snowden’s Escape from Hong Kong</title>
<description>On June 9, 2013, Edward Snowden revealed massive civil rights abuses by the NSA. On June 10, Snowden didn’t know where to hide. max: maybe </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8416.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8416.html</guid>
<pubDate>Wed, 28 Dec 2016 18:30:00 +0100</pubDate>
<itunes:subtitle>The Untold Story of Edward Snowden’s Escape from Hong Kong</itunes:subtitle>
<itunes:summary>On June 9, 2013, Edward Snowden revealed massive civil rights abuses by the NSA. On June 10, Snowden didn’t know where to hide. max: maybe </itunes:summary>
<itunes:author>Lena Rohrbach, Sönke Iwersen, Robert Tibbo</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8416-eng-The_Untold_Story_of_Edward_Snowdens_Escape_from_Hong_Kong.mp4"
length="video/mp4"
type="789577728"/>
</item>
<item>
<title>Stopping law enforcement hacking</title>
<description>We didn’t win the second crypto wars. Governments merely made a strategic retreat and they’ll be back. Although they will likely give up on trying to regulate or prohibit encryption, we should expect that malware and law enforcement hacking will play a starring role in the next battle in the crypto wars. max: maybe </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8136.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8136.html</guid>
<pubDate>Wed, 28 Dec 2016 18:30:00 +0100</pubDate>
<itunes:subtitle>Stopping law enforcement hacking</itunes:subtitle>
<itunes:summary>We didn’t win the second crypto wars. Governments merely made a strategic retreat and they’ll be back. Although they will likely give up on trying to regulate or prohibit encryption, we should expect that malware and law enforcement hacking will play a starring role in the next battle in the crypto wars. max: maybe </itunes:summary>
<itunes:author>Christopher Soghoian</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8136-eng-Stopping_law_enforcement_hacking_hd.mp4"
length="video/mp4"
type="452984832"/>
</item>
<item>
<title>The Clash of Digitalizations</title>
<description>This talk discusses the representation of Arab males in video games and the adverse effect it has on the collective political imagination. Anonymous military-aged Arab men become increasingly the exception to the laws of human rights, and become default targets for conventional and unmanned drone attacks. This devolution is seen through the lens of the changing nature of conflict through digitalization, the collapse of the nation state in Iraq and Syria, and the future of war. max: maybe </description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8419.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8419.html</guid>
<pubDate>Wed, 28 Dec 2016 12:15:00 +0100</pubDate>
<itunes:subtitle>The Clash of Digitalizations</itunes:subtitle>
<itunes:summary>This talk discusses the representation of Arab males in video games and the adverse effect it has on the collective political imagination. Anonymous military-aged Arab men become increasingly the exception to the laws of human rights, and become default targets for conventional and unmanned drone attacks. This devolution is seen through the lens of the changing nature of conflict through digitalization, the collapse of the nation state in Iraq and Syria, and the future of war. max: maybe </itunes:summary>
<itunes:author>Saud Al-Zaid</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8419-eng-The_Clash_of_Digitalizations.mp4"
length="video/mp4"
type="209715200"/>
</item>
<item>
<title>Netzpolitik in der Schweiz 2016</title>
<description>Ein Überblick zur netzpolitischen Situation in der Schweiz. Wir geben einen umfassenden Rückblick auf das ereignissreiche Jahr 2016, in dem die Schweizer Bevölkerung über gleich zwei Massenüberwachungsgesetze entschieden hat. Die netzpolitischen Gruppierungen haben mit viel Einsatz gegen die Gesetze gekämpft . Wir berichten darüber, wie wir das angengangen sind, wie es ausgegangen ist und was wir dabei gelernt haben. Zudem machen wir einen Ausblick auf kommende netzpolitische Herausforderungen. max: Hoffentlich besser als letztes Jahr</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8264.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8264.html</guid>
<pubDate>Tue, 27 Dec 2016 20:30:00 +0100</pubDate>
<itunes:subtitle>Netzpolitik in der Schweiz 2016</itunes:subtitle>
<itunes:summary>Ein Überblick zur netzpolitischen Situation in der Schweiz. Wir geben einen umfassenden Rückblick auf das ereignissreiche Jahr 2016, in dem die Schweizer Bevölkerung über gleich zwei Massenüberwachungsgesetze entschieden hat. Die netzpolitischen Gruppierungen haben mit viel Einsatz gegen die Gesetze gekämpft . Wir berichten darüber, wie wir das angengangen sind, wie es ausgegangen ist und was wir dabei gelernt haben. Zudem machen wir einen Ausblick auf kommende netzpolitische Herausforderungen. max: Hoffentlich besser als letztes Jahr</itunes:summary>
<itunes:author>Hakuna MaMate</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8264-deu-Netzpolitik_in_der_Schweiz_2016.mp4"
length="video/mp4"
type="846200832"/>
</item>
<item>
<title>Deploying TLS 1.3: the great, the good and the bad</title>
<description>Transport Layer Security (TLS) 1.3 is almost here. The protocol that protects most of the Internet secure connections is getting the biggest ever revamp, and is losing a round-trip. We will explore differences between TLS 1.3 and previous versions in detail, focusing on the security improvements of the new protocol as well as some of the challenges we face around securely implementing new features such as 0-RTT resumption. At Cloudflare we will be the first to deploy TLS 1.3 on a wide scale, and we’ll be able to discuss the insights we gained while implementing and deploying this protocol.</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8348.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8348.html</guid>
<pubDate>Tue, 27 Dec 2016 21:45:00 +0100</pubDate>
<itunes:subtitle>Deploying TLS 1.3: the great, the good and the bad</itunes:subtitle>
<itunes:summary>Transport Layer Security (TLS) 1.3 is almost here. The protocol that protects most of the Internet secure connections is getting the biggest ever revamp, and is losing a round-trip. We will explore differences between TLS 1.3 and previous versions in detail, focusing on the security improvements of the new protocol as well as some of the challenges we face around securely implementing new features such as 0-RTT resumption. At Cloudflare we will be the first to deploy TLS 1.3 on a wide scale, and we’ll be able to discuss the insights we gained while implementing and deploying this protocol.</itunes:summary>
<itunes:author>Filippo Valsorda, Nick Sullivan</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8348-eng-Deploying_TLS_13_the_great_the_good_and_the_bad.mp4"
length="video/mp4"
type="562036736"/>
</item>
<item>
<title>The Economic Consequences of Internet Censorship</title>
<description>Internet censorship today is widespread, both by governments and by private entities. Much of the discussion so far has focused on political and social effects of this censorship. However, censorship also has a clear effect on the economic structure of society that has not been explored.</description>
<link>https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8170.html</link>
<guid isPermaLink="true">https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8170.html</guid>
<pubDate>Fri, 30 Dec 2016 11:30:00 +0100</pubDate>
<itunes:subtitle>The Economic Consequences of Internet Censorship</itunes:subtitle>
<itunes:summary>Internet censorship today is widespread, both by governments and by private entities. Much of the discussion so far has focused on political and social effects of this censorship. However, censorship also has a clear effect on the economic structure of society that has not been explored.</itunes:summary>
<itunes:author>Toni</itunes:author>
<itunes:image href=""/>
<itunes:explicit>Yes</itunes:explicit>
<itunes:keywords>it,programming,software,hardware,security,society</itunes:keywords>
<enclosure url="http://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8170-eng-The_Economic_Consequences_of_Internet_Censorship.mp4"
length="video/mp4"
type="153092096"/>
</item>
</channel>
</rss>