Hackerspace Design Patterns 2.0 The presentation of the Hackerspace Design Patterns at CCCamp 2007 / 24C3 started the international hackerspace movement! These patterns described what has worked well, and not worked well, for the 40 or so hackerspaces existing at the time. Now that over 2,000 have blossomed all over the planet, it is time to add Patterns from this collective experience. In 2007 there were about 40 hackerspaces in the world, mostly in Germany. From their research of what worked...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Locking the Web Open: Call for a Distributed Web Locking the Net Open: Transforming the Web into a truly distributed system that’s all fun, secure and reliable. Using Javascript, peer-to-peer tech, bitcoin and blockchain, we can build on top of the current web to build a system that protects reader privacy, is reliable against hardware outages and censorship and stays fun. Micro version of the talk: http://blog.archive.org/2015/02/11/locking-the-web-open-a-call-for-a-distributed-web/ 20 years...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
A Torifying Tale Our experiences of building and running Tor servers In the spirit of “Failosophy” we would like to give a brief talk about the mistakes we made, and lessons we learned, in running Tor bridge, relay, and exit nodes. In this talk we will highlight some of the challenges we have faced in building performant Tor relays and exit nodes. We have made plenty of mistakes, and learned from most of them. In the spirit of “Failosophy” we would like to share the lessons we learned...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
How to Destroy a Laptop with Top Secrets How did GCHQ do it to the Guardian's copy of Snowden's files? In the summer of 2013, Guardian employees destroyed computers storing top secret documents from Snowden, on instruction and supervision from GCHQ. With access to the destroyed pieces, we investigated what GCHQ's instructions were and what we can learn from it about securely eradicating data on a machine. While the initial disclosures by Edward Snowden revealed how US authorities are conducting...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Fueling the Revolution Personal production of bio-fuels Bio-fuels from waste can be part of the solution to stabilize climate change, but inaction by governments and industry means such fuels are not readily available. This talk will outline work being done to solve this problem at a personal level, by producing open source designs for equipment for local production of bio-fuels. Bio-fuels are better for the environment and a key way we could be reducing CO2 emissions. However in many countries...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Reconstructing narratives transparency in the service of justice Surveillance, cryptography, terrorism, malware, economic espionage, assassination, interventions, intelligence services, political prisoners, policing, transparency, justice and you. Structural processes and roles are designed to create specific outcomes for groups. Externally facing narratives are often only one of many and they seek to create specific outcomes by shaping discourse. We will cover a wide range of popular...
Topics: Youtube, video, Education, 31c3, CCC, Chaos Computer Club, Lecture, Narrative (Profession),...
Jumping the Paywall How to freely share research without being arrested This presentation will identify and address two safety-critical problems permeating research today: lack of total free access to scholarship, and the looming threat of apprehension for trying to facilitate said free access. In other words, this presentation will explore how to procure access to all-too-often restricted content sequestered behind extortionate academic paywalls, and how to then safely freely disseminate said...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Tor: Hidden Services and Deanonymisation This talk presents the results from what we believe to be one of the largest studies into Tor Hidden Services (The Darknet) to date. There is no public list of onion addresses available; instead, over a period of 6 months, we ran a large number of Tor relays to infiltrate the Distributed Hash Table which Hidden Services publish to. From this, we were able to collect the list of Tor onion addresses AND the number of requests for each site (e.g. loosely...
Topics: Youtube, video, Education, 31c3, CCC, Chaos Computer Club, Lecture, Tor (Software), Hacking,...
To Protect And Infect, Part 2 The militarization of the Internet Speaker: Jacob Applebaum ( @ioerror ) EventID: 5713 Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC] Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany Language: english Begin: Mon, 12/30/2013 11:30:00 +01:00 Lizenz: CC-by Source: https://www.youtube.com/watch?v=vILAlhwUgIU Uploader: CCCen Upload date: 2013-12-30
Topics: Youtube, video, Education, CCC, Chaos Computer Club, 30c3, Talk, Lecture, 2013, Jacob Appelbaum...