From ecc0483f9e5c515a24033c4cbcf5a0d989f23b84 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Philip=20H=C3=A4usler?= Date: Sat, 11 Jun 2011 17:18:11 +0200 Subject: [PATCH] import sample files --- .../{27C3_sample.xcs.xml => 27C3_sample.xcs} | 0 import/har2009_sample.xcs | 5451 +++++++++++++++++ 2 files changed, 5451 insertions(+) rename import/{27C3_sample.xcs.xml => 27C3_sample.xcs} (100%) create mode 100644 import/har2009_sample.xcs diff --git a/import/27C3_sample.xcs.xml b/import/27C3_sample.xcs similarity index 100% rename from import/27C3_sample.xcs.xml rename to import/27C3_sample.xcs diff --git a/import/har2009_sample.xcs b/import/har2009_sample.xcs new file mode 100644 index 00000000..c192c046 --- /dev/null +++ b/import/har2009_sample.xcs @@ -0,0 +1,5451 @@ + + + + 2.0 + -//Pentabarf//Schedule #<Conference_release::Row:0x364a6f5f8e90>//EN + HAR2009 Schedule Release #<Conference_release::Row:0x364a6f5f67f8> + HAR2009 Schedule + + PUBLISH + 45@HAR2009@pentabarf.org + 45 + advanced_mysql_exploitation + Advanced MySQL Exploitation + + English + en + 20090813T210000 + 20090813T220000 + 01H00M00S + Advanced MySQL Exploitation + This talk focuses on how MySQL SQL injection vulnerabilites can be used to gain remote code execution on the LAMP and WAMP environments. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/45.en.html + The Birthday Tent + Muhaimin Dzulfakar + + + PUBLISH + 45@HAR2009@pentabarf.org + 45 + advanced_mysql_exploitation + Advanced MySQL Exploitation + + englisch + en + 20090813T210000 + 20090813T220000 + 01H00M00S + Advanced MySQL Exploitation + This talk focuses on how MySQL SQL injection vulnerabilites can be used to gain remote code execution on the LAMP and WAMP environments. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/45.en.html + The Birthday Tent + Muhaimin Dzulfakar + + + PUBLISH + 104@HAR2009@pentabarf.org + 104 + surviving_the_corporate_world + A hackers guide to surviving in the corporate world + + englisch + en + 20090814T120000 + 20090814T130000 + 01H00M00S + A hackers guide to surviving in the corporate world + A hacker’s guide to surviving in the corporate world. + +Large organizations, be it enterprises or government, are also large users of information technology. For people interested in the application of information technology, especially those interested in the risks that information technology brings, understanding the way large organizations work can therefore be very relevant. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/104.en.html + Monty Hall + Peter van Eijk + + + PUBLISH + 104@HAR2009@pentabarf.org + 104 + surviving_the_corporate_world + A hackers guide to surviving in the corporate world + + English + en + 20090814T120000 + 20090814T130000 + 01H00M00S + A hackers guide to surviving in the corporate world + A hacker’s guide to surviving in the corporate world. + +Large organizations, be it enterprises or government, are also large users of information technology. For people interested in the application of information technology, especially those interested in the risks that information technology brings, understanding the way large organizations work can therefore be very relevant. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/104.en.html + Monty Hall + Peter van Eijk + + + PUBLISH + 186@HAR2009@pentabarf.org + 186 + airprobe + Airprobe + Monitoring GSM traffic with USRP + English + en + 20090815T160000 + 20090815T170000 + 01H00M00S + Airprobe- Monitoring GSM traffic with USRP + The GNU Radio project, and the associated Universal Software Radio Peripheral hardware, has for the first time put access to wideband radio reception and digital signal processing into the hands of the average hacker. The airprobe project focuses on a software stack that provides GSM mobile phone reception and decoding. This talk gives a gentle introdoction into GSM, the airprobe software and its practical usage. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/186.en.html + Monty Hall + Harald Welte + + + PUBLISH + 186@HAR2009@pentabarf.org + 186 + airprobe + Airprobe + Monitoring GSM traffic with USRP + englisch + en + 20090815T160000 + 20090815T170000 + 01H00M00S + Airprobe- Monitoring GSM traffic with USRP + The GNU Radio project, and the associated Universal Software Radio Peripheral hardware, has for the first time put access to wideband radio reception and digital signal processing into the hands of the average hacker. The airprobe project focuses on a software stack that provides GSM mobile phone reception and decoding. This talk gives a gentle introdoction into GSM, the airprobe software and its practical usage. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/186.en.html + Monty Hall + Harald Welte + + + PUBLISH + 41@HAR2009@pentabarf.org + 41 + attacking_backbone_tech + All Your Packets Are Belong to Us + Attacking Backbone Technologies + englisch + en + 20090814T130000 + 20090814T140000 + 01H00M00S + All Your Packets Are Belong to Us- Attacking Backbone Technologies + The year 2008 has seen some severe attacks on infrastructure protocols (SNMP, DNS, BGP). We will continue down that road and discuss potential and real vulnerabilities in backbone technologies used in today's carrier space (e.g. MPLS, Carrier Ethernet, QinQ and the like). The talk includes a number of demos (like cracking BGP MD5 keys, redirecting MPLS traffic on a site level and some Carrier Ethernet stuff) all of which will be performed with a new tool kit made available at the con. It's about making the theoretical practical, once more! + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/41.en.html + The Two Envelopes Tent + Daniel Mende + Simon Rich + + + PUBLISH + 41@HAR2009@pentabarf.org + 41 + attacking_backbone_tech + All Your Packets Are Belong to Us + Attacking Backbone Technologies + English + en + 20090814T130000 + 20090814T140000 + 01H00M00S + All Your Packets Are Belong to Us- Attacking Backbone Technologies + The year 2008 has seen some severe attacks on infrastructure protocols (SNMP, DNS, BGP). We will continue down that road and discuss potential and real vulnerabilities in backbone technologies used in today's carrier space (e.g. MPLS, Carrier Ethernet, QinQ and the like). The talk includes a number of demos (like cracking BGP MD5 keys, redirecting MPLS traffic on a site level and some Carrier Ethernet stuff) all of which will be performed with a new tool kit made available at the con. It's about making the theoretical practical, once more! + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/41.en.html + The Two Envelopes Tent + Daniel Mende + Simon Rich + + + PUBLISH + 15@HAR2009@pentabarf.org + 15 + analog_circuit_design + Analog circuit design + How to create analog electronic circuits + English + en + 20090814T130000 + 20090814T140000 + 01H00M00S + Analog circuit design- How to create analog electronic circuits + Digital electronics is ubiquitous in our lives. While it is easy to design digital systems, it seems harder to create circuits amplifying or transforming analog signals. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/15.en.html + The Birthday Tent + Rüdiger Ranft + + + PUBLISH + 15@HAR2009@pentabarf.org + 15 + analog_circuit_design + Analog circuit design + How to create analog electronic circuits + englisch + en + 20090814T130000 + 20090814T140000 + 01H00M00S + Analog circuit design- How to create analog electronic circuits + Digital electronics is ubiquitous in our lives. While it is easy to design digital systems, it seems harder to create circuits amplifying or transforming analog signals. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/15.en.html + The Birthday Tent + Rüdiger Ranft + + + PUBLISH + 122@HAR2009@pentabarf.org + 122 + + An empirical study of division of labour in free software development + the case of the FreeBSD project + englisch + en + 20090816T120000 + 20090816T130000 + 01H00M00S + An empirical study of division of labour in free software development- the case of the FreeBSD project + For an overview of the presentation, see the slides attached. (The slides reflect the state of our research two months ago; but as the research is still in progress, the slides we intend to present at HAR will be further updated). + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/122.en.html + The Two Envelopes Tent + George Dafermos + + + PUBLISH + 122@HAR2009@pentabarf.org + 122 + + An empirical study of division of labour in free software development + the case of the FreeBSD project + English + en + 20090816T120000 + 20090816T130000 + 01H00M00S + An empirical study of division of labour in free software development- the case of the FreeBSD project + For an overview of the presentation, see the slides attached. (The slides reflect the state of our research two months ago; but as the research is still in progress, the slides we intend to present at HAR will be further updated). + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/122.en.html + The Two Envelopes Tent + George Dafermos + + + PUBLISH + 82@HAR2009@pentabarf.org + 82 + anonymous_vs_scientology + Anonymous Vs. Scientology + a case study in 2.0 hacktivism & how it could help future projects + englisch + en + 20090814T190000 + 20090814T200000 + 01H00M00S + Anonymous Vs. Scientology- a case study in 2.0 hacktivism & how it could help future projects + About Social organising via Web 2.0 + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/82.en.html + Monty Hall + Henk de Vries + + + PUBLISH + 82@HAR2009@pentabarf.org + 82 + anonymous_vs_scientology + Anonymous Vs. Scientology + a case study in 2.0 hacktivism & how it could help future projects + English + en + 20090814T190000 + 20090814T200000 + 01H00M00S + Anonymous Vs. Scientology- a case study in 2.0 hacktivism & how it could help future projects + About Social organising via Web 2.0 + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/82.en.html + Monty Hall + Henk de Vries + + + PUBLISH + 49@HAR2009@pentabarf.org + 49 + anti_counterfeiting_agreement + Anti-Counterfeiting Trade Agreement + New legislation for a billion people, made behind closed doors + englisch + en + 20090815T150000 + 20090815T160000 + 01H00M00S + Anti-Counterfeiting Trade Agreement- New legislation for a billion people, made behind closed doors + "Stringent intellectual property rules could hamper the spread of technology needed to fight climate change." + Paul David, professor of economics at Stanford University, California + +"If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close." + David Fewer, staff counsel at the Canadian Internet Policy and Public Interest Clinic, University of Ottawa, after looking at leaked ACTA documents. + + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/49.en.html + The Two Envelopes Tent + Ante Wessels + + + PUBLISH + 49@HAR2009@pentabarf.org + 49 + anti_counterfeiting_agreement + Anti-Counterfeiting Trade Agreement + New legislation for a billion people, made behind closed doors + English + en + 20090815T150000 + 20090815T160000 + 01H00M00S + Anti-Counterfeiting Trade Agreement- New legislation for a billion people, made behind closed doors + "Stringent intellectual property rules could hamper the spread of technology needed to fight climate change." + Paul David, professor of economics at Stanford University, California + +"If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close." + David Fewer, staff counsel at the Canadian Internet Policy and Public Interest Clinic, University of Ottawa, after looking at leaked ACTA documents. + + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/49.en.html + The Two Envelopes Tent + Ante Wessels + + + PUBLISH + 211@HAR2009@pentabarf.org + 211 + + A workshop on the ethics of piracy + (debating the arguments in the earlier talk) + English + en + 20090816T120000 + 20090816T130000 + 01H00M00S + A workshop on the ethics of piracy- (debating the arguments in the earlier talk) + Lots of people had questions, comments and counterarguments to the "Complex Ethics of Piracy" talk. Someone suggested we should have a Workshop to debate them further. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/211.en.html + Bike-shed Red + Peter Eckersley + + + PUBLISH + 211@HAR2009@pentabarf.org + 211 + + A workshop on the ethics of piracy + (debating the arguments in the earlier talk) + englisch + en + 20090816T120000 + 20090816T130000 + 01H00M00S + A workshop on the ethics of piracy- (debating the arguments in the earlier talk) + Lots of people had questions, comments and counterarguments to the "Complex Ethics of Piracy" talk. Someone suggested we should have a Workshop to debate them further. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/211.en.html + Bike-shed Red + Peter Eckersley + + + PUBLISH + 130@HAR2009@pentabarf.org + 130 + beautifulism_delight + Beautifulism & [de]light + Next generation of BlinkenArea projects + English + en + 20090813T160000 + 20090813T170000 + 01H00M00S + Beautifulism & [de]light- Next generation of BlinkenArea projects + After celebrating the 5th anniversary of the founding of the BlinkenArea last year, it is now time to start for the future of researching and operating flashlights. The new meme of beautifulism & [de]light will lead us to the next generation of BlinkenArea projects. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/130.en.html + The Birthday Tent + Juliane Pilster + Stephan 'ST' Kambor + + + PUBLISH + 130@HAR2009@pentabarf.org + 130 + beautifulism_delight + Beautifulism & [de]light + Next generation of BlinkenArea projects + englisch + en + 20090813T160000 + 20090813T170000 + 01H00M00S + Beautifulism & [de]light- Next generation of BlinkenArea projects + After celebrating the 5th anniversary of the founding of the BlinkenArea last year, it is now time to start for the future of researching and operating flashlights. The new meme of beautifulism & [de]light will lead us to the next generation of BlinkenArea projects. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/130.en.html + The Birthday Tent + Juliane Pilster + Stephan 'ST' Kambor + + + PUBLISH + 181@HAR2009@pentabarf.org + 181 + overheid20 + Becoming government 2.0 + + English + en + 20090815T120000 + 20090815T130000 + 01H00M00S + Becoming government 2.0 + Internet and web 2.0 are bringing a fundamental change to how society works and how organisations work. This means government will have to change as well. These changes will not only affect the relationship between citizens and government, but also the internal structure of governmental organizations and the way civil servants work. Quite a challenge. How is this change coming about? And what can be done to accelerate the process? What can you do? Davied van Berlo, founder of the Civil Servant Network (www.ambtenaar20.nl), will share his views and experiences. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/181.en.html + The Two Envelopes Tent + Davied van Berlo + + + PUBLISH + 181@HAR2009@pentabarf.org + 181 + overheid20 + Becoming government 2.0 + + englisch + en + 20090815T120000 + 20090815T130000 + 01H00M00S + Becoming government 2.0 + Internet and web 2.0 are bringing a fundamental change to how society works and how organisations work. This means government will have to change as well. These changes will not only affect the relationship between citizens and government, but also the internal structure of governmental organizations and the way civil servants work. Quite a challenge. How is this change coming about? And what can be done to accelerate the process? What can you do? Davied van Berlo, founder of the Civil Servant Network (www.ambtenaar20.nl), will share his views and experiences. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/181.en.html + The Two Envelopes Tent + Davied van Berlo + + + PUBLISH + 200@HAR2009@pentabarf.org + 200 + yroworkshop2 + Bits of Freedom online freedom activism workshop + + + + 20090815T150000 + 20090815T160000 + 01H00M00S + Bits of Freedom online freedom activism workshop + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/200.en.html + Bike-shed Green + Ot van Daalen + + + PUBLISH + 200@HAR2009@pentabarf.org + 200 + yroworkshop2 + Bits of Freedom online freedom activism workshop + + + + 20090815T150000 + 20090815T160000 + 01H00M00S + Bits of Freedom online freedom activism workshop + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/200.en.html + Bike-shed Green + Ot van Daalen + + + PUBLISH + 199@HAR2009@pentabarf.org + 199 + yroworkshop1 + Bits of Freedom privacy activism workshop + + englisch + en + 20090815T140000 + 20090815T150000 + 01H00M00S + Bits of Freedom privacy activism workshop + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/199.en.html + Bike-shed Green + Ot van Daalen + + + PUBLISH + 199@HAR2009@pentabarf.org + 199 + yroworkshop1 + Bits of Freedom privacy activism workshop + + English + en + 20090815T140000 + 20090815T150000 + 01H00M00S + Bits of Freedom privacy activism workshop + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/199.en.html + Bike-shed Green + Ot van Daalen + + + PUBLISH + 131@HAR2009@pentabarf.org + 131 + blinkenmovie + BlinkenArea - Movie Contest + beautifulism & [de]light + englisch + en + 20090813T200000 + 20090813T230000 + 03H00M00S + BlinkenArea - Movie Contest- beautifulism & [de]light + The BlinkenArea would like to organise a movie contest for HARCade (BlinkenArea project TroiCade, which is showcased somewhere at HAR area). Everybody can create movies shown on the project during the event by using a special software, provided on BlinkenArea website. A jury will be assembled to choose the best movie and to award a prize at the end of HAR. For further information have a look on https://wiki.blinkenarea.org/index.php/HAR2009 from time to time! + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/131.en.html + HARcade (valkennest) + Juliane Pilster + Stephan 'ST' Kambor + + + PUBLISH + 131@HAR2009@pentabarf.org + 131 + blinkenmovie + BlinkenArea - Movie Contest + beautifulism & [de]light + English + en + 20090813T200000 + 20090813T230000 + 03H00M00S + BlinkenArea - Movie Contest- beautifulism & [de]light + The BlinkenArea would like to organise a movie contest for HARCade (BlinkenArea project TroiCade, which is showcased somewhere at HAR area). Everybody can create movies shown on the project during the event by using a special software, provided on BlinkenArea website. A jury will be assembled to choose the best movie and to award a prize at the end of HAR. For further information have a look on https://wiki.blinkenarea.org/index.php/HAR2009 from time to time! + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/131.en.html + HARcade (valkennest) + Juliane Pilster + Stephan 'ST' Kambor + + + PUBLISH + 10@HAR2009@pentabarf.org + 10 + blinkensisters + BlinkenSisters Jump'n'Run + Open Source Retro-Gaming + English + en + 20090814T120000 + 20090814T130000 + 01H00M00S + BlinkenSisters Jump'n'Run- Open Source Retro-Gaming + There was a time when 2D Jump'n'Run games where state-of-the-art and you'd spend the whole weekend trying to get past the last boss monster. That time has long since gone... + +...or has it? + +"BlinkenSisters - Hunt for the Lost Pixels" is an extensible open source Jump'n'Run game that brings back the 80's. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/10.en.html + The Birthday Tent + Rene "cavac" Schickbauer + + + PUBLISH + 10@HAR2009@pentabarf.org + 10 + blinkensisters + BlinkenSisters Jump'n'Run + Open Source Retro-Gaming + englisch + en + 20090814T120000 + 20090814T130000 + 01H00M00S + BlinkenSisters Jump'n'Run- Open Source Retro-Gaming + There was a time when 2D Jump'n'Run games where state-of-the-art and you'd spend the whole weekend trying to get past the last boss monster. That time has long since gone... + +...or has it? + +"BlinkenSisters - Hunt for the Lost Pixels" is an extensible open source Jump'n'Run game that brings back the 80's. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/10.en.html + The Birthday Tent + Rene "cavac" Schickbauer + + + PUBLISH + 135@HAR2009@pentabarf.org + 135 + breaking_hitag2 + Breaking Hitag2 + + English + en + 20090815T120000 + 20090815T130000 + 01H00M00S + Breaking Hitag2 + Hitag2 is a low-frequency RFID system operating on a 120kHz using a proprietary 48-bit stream cipher which is only slightly harder to attack than the much-publicized Mifare Crypto-1 cipher. Hitag2 (with or without encryption) is mostly used for building access control or car immobilizers. + +The low operating frequency and low data rate (2, 4 or 8 kbit/s) makes building sniffers, replayers and emulators especially easy. The maximum frequency of the data signal is in the audio range, so a normal sound card can be used as an A/D and D/A converter, using a very cheap diode detector radio for reception and simple load modulation circuit for transmission. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/135.en.html + Monty Hall + Henryk Plötz + Karsten Nohl + + + PUBLISH + 135@HAR2009@pentabarf.org + 135 + breaking_hitag2 + Breaking Hitag2 + + englisch + en + 20090815T120000 + 20090815T130000 + 01H00M00S + Breaking Hitag2 + Hitag2 is a low-frequency RFID system operating on a 120kHz using a proprietary 48-bit stream cipher which is only slightly harder to attack than the much-publicized Mifare Crypto-1 cipher. Hitag2 (with or without encryption) is mostly used for building access control or car immobilizers. + +The low operating frequency and low data rate (2, 4 or 8 kbit/s) makes building sniffers, replayers and emulators especially easy. The maximum frequency of the data signal is in the audio range, so a normal sound card can be used as an A/D and D/A converter, using a very cheap diode detector radio for reception and simple load modulation circuit for transmission. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/135.en.html + Monty Hall + Henryk Plötz + Karsten Nohl + + + PUBLISH + 92@HAR2009@pentabarf.org + 92 + hacking_contest + Capture the flag + hacking contest + englisch + en + 20090813T130000 + 20090813T140000 + 01H00M00S + Capture the flag - hacking contest + In the talk we will give an introduction to CTF contests in IT security. Starting Friday, 10PM CEST, we will host a live CTF lasting 24 hours. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/92.en.html + The Birthday Tent + Hans-Christian Esperer + mc.fly + + + PUBLISH + 92@HAR2009@pentabarf.org + 92 + hacking_contest + Capture the flag + hacking contest + English + en + 20090813T130000 + 20090813T140000 + 01H00M00S + Capture the flag - hacking contest + In the talk we will give an introduction to CTF contests in IT security. Starting Friday, 10PM CEST, we will host a live CTF lasting 24 hours. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/92.en.html + The Birthday Tent + Hans-Christian Esperer + mc.fly + + + PUBLISH + 36@HAR2009@pentabarf.org + 36 + classic_mistakes + Classic Mistakes + Mistakes made with the Mifare Classic + englisch + en + 20090814T130000 + 20090814T140000 + 01H00M00S + Classic Mistakes- Mistakes made with the Mifare Classic + This lecture gives a broad overview of the vulnerabilities that exists in MIFARE Classic products and the way they are used by system integrators. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/36.en.html + Monty Hall + Roel Verdult + + + PUBLISH + 36@HAR2009@pentabarf.org + 36 + classic_mistakes + Classic Mistakes + Mistakes made with the Mifare Classic + English + en + 20090814T130000 + 20090814T140000 + 01H00M00S + Classic Mistakes- Mistakes made with the Mifare Classic + This lecture gives a broad overview of the vulnerabilities that exists in MIFARE Classic products and the way they are used by system integrators. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/36.en.html + Monty Hall + Roel Verdult + + + PUBLISH + 147@HAR2009@pentabarf.org + 147 + har_closing + Closing Ceremony + So Long, and Thanks for All the ... + englisch + en + 20090816T160000 + 20090816T170000 + 01H00M00S + Closing Ceremony- So Long, and Thanks for All the ... + Closing Ceremony + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/147.en.html + Monty Hall + Aldert Hazenberg + + + PUBLISH + 147@HAR2009@pentabarf.org + 147 + har_closing + Closing Ceremony + So Long, and Thanks for All the ... + English + en + 20090816T160000 + 20090816T170000 + 01H00M00S + Closing Ceremony- So Long, and Thanks for All the ... + Closing Ceremony + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/147.en.html + Monty Hall + Aldert Hazenberg + + + PUBLISH + 210@HAR2009@pentabarf.org + 210 + + coreboot + Beyond the final frontier + + + 20090813T140000 + 20090813T150000 + 01H00M00S + coreboot- Beyond the final frontier + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/210.en.html + Monty Hall + Peter Stuge + + + PUBLISH + 210@HAR2009@pentabarf.org + 210 + + coreboot + Beyond the final frontier + + + 20090813T140000 + 20090813T150000 + 01H00M00S + coreboot- Beyond the final frontier + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/210.en.html + Monty Hall + Peter Stuge + + + PUBLISH + 57@HAR2009@pentabarf.org + 57 + countering_malware_analysis + Countering behavior based malware analysis + + englisch + en + 20090813T200000 + 20090813T210000 + 01H00M00S + Countering behavior based malware analysis + This paper and the talk will deal with behavior-based malware +analysis, it's orgins and some general models. +The paper will describe how malware detection focussing on semantics works, dicuss some simple schemes and the overall +weaknesses of behavior-based malware detection. +The paper and talk will be rather theoretical in nature, although practical examples and explanations are given. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/57.en.html + The Two Envelopes Tent + Nomenumbra + + + PUBLISH + 57@HAR2009@pentabarf.org + 57 + countering_malware_analysis + Countering behavior based malware analysis + + English + en + 20090813T200000 + 20090813T210000 + 01H00M00S + Countering behavior based malware analysis + This paper and the talk will deal with behavior-based malware +analysis, it's orgins and some general models. +The paper will describe how malware detection focussing on semantics works, dicuss some simple schemes and the overall +weaknesses of behavior-based malware detection. +The paper and talk will be rather theoretical in nature, although practical examples and explanations are given. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/57.en.html + The Two Envelopes Tent + Nomenumbra + + + PUBLISH + 187@HAR2009@pentabarf.org + 187 + cracking_a5_crypto + Cracking A5 GSM encryption + State of affairs + englisch + en + 20090815T170000 + 20090815T180000 + 01H00M00S + Cracking A5 GSM encryption- State of affairs + Project web site: http://reflextor.com/trac/a51 + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/187.en.html + Monty Hall + Karsten Nohl + + + PUBLISH + 187@HAR2009@pentabarf.org + 187 + cracking_a5_crypto + Cracking A5 GSM encryption + State of affairs + English + en + 20090815T170000 + 20090815T180000 + 01H00M00S + Cracking A5 GSM encryption- State of affairs + Project web site: http://reflextor.com/trac/a51 + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/187.en.html + Monty Hall + Karsten Nohl + + + PUBLISH + 78@HAR2009@pentabarf.org + 78 + + Cracking Internet + The urgency of DNSSEC + English + en + 20090815T140000 + 20090815T150000 + 01H00M00S + Cracking Internet- The urgency of DNSSEC + This workshop will introduce the problems with DNS that jeapardise the Internet as a whole. We will begin with a general discussion, and argue that the only real solution that is ready now is DNSSEC. We will continue with more detailed discussions of the Kaminsky attack, and explain how to attack the machines that we prepared for attack during HAR2009. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/78.en.html + Monty Hall + Rick van Rein + + + PUBLISH + 78@HAR2009@pentabarf.org + 78 + + Cracking Internet + The urgency of DNSSEC + englisch + en + 20090815T140000 + 20090815T150000 + 01H00M00S + Cracking Internet- The urgency of DNSSEC + This workshop will introduce the problems with DNS that jeapardise the Internet as a whole. We will begin with a general discussion, and argue that the only real solution that is ready now is DNSSEC. We will continue with more detailed discussions of the Kaminsky attack, and explain how to attack the machines that we prepared for attack during HAR2009. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/78.en.html + Monty Hall + Rick van Rein + + + PUBLISH + 149@HAR2009@pentabarf.org + 149 + deep_silicon_analysis + Deep Silicon Analysis + + englisch + en + 20090815T210000 + 20090815T220000 + 01H00M00S + Deep Silicon Analysis + Microchips have long been objects of fascination for hackers and geeks. The manuals of processors and microcontrollers are well studied as are their assembly languages. Now, what if you could dig deeper into a chip and fully understand its hardware implementation? + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/149.en.html + The Two Envelopes Tent + Karsten Nohl + + + PUBLISH + 149@HAR2009@pentabarf.org + 149 + deep_silicon_analysis + Deep Silicon Analysis + + English + en + 20090815T210000 + 20090815T220000 + 01H00M00S + Deep Silicon Analysis + Microchips have long been objects of fascination for hackers and geeks. The manuals of processors and microcontrollers are well studied as are their assembly languages. Now, what if you could dig deeper into a chip and fully understand its hardware implementation? + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/149.en.html + The Two Envelopes Tent + Karsten Nohl + + + PUBLISH + 136@HAR2009@pentabarf.org + 136 + building_a_cyclotron + Design and Build a 2 MeV Cyclotron + + englisch + en + 20090813T170000 + 20090813T180000 + 01H00M00S + Design and Build a 2 MeV Cyclotron + Cyclotrons efficiently generate beams of charged particles at high energies, typically on the order of MeV. These charged particle beams have an immense range of applications in many different scientific and engineering fields--from biological engineering, to material science, to simple particle physics experiments. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/136.en.html + The Birthday Tent + Leslie Dewan + + + PUBLISH + 136@HAR2009@pentabarf.org + 136 + building_a_cyclotron + Design and Build a 2 MeV Cyclotron + + English + en + 20090813T170000 + 20090813T180000 + 01H00M00S + Design and Build a 2 MeV Cyclotron + Cyclotrons efficiently generate beams of charged particles at high energies, typically on the order of MeV. These charged particle beams have an immense range of applications in many different scientific and engineering fields--from biological engineering, to material science, to simple particle physics experiments. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/136.en.html + The Birthday Tent + Leslie Dewan + + + PUBLISH + 37@HAR2009@pentabarf.org + 37 + dev_embedded_devices + Developing embedded devices using opensource tools: application to handheld game consoles + + English + en + 20090814T140000 + 20090814T150000 + 01H00M00S + Developing embedded devices using opensource tools: application to handheld game consoles + Embedded device programming using opensource tools. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/37.en.html + The Birthday Tent + jmfriedt + + + PUBLISH + 37@HAR2009@pentabarf.org + 37 + dev_embedded_devices + Developing embedded devices using opensource tools: application to handheld game consoles + + englisch + en + 20090814T140000 + 20090814T150000 + 01H00M00S + Developing embedded devices using opensource tools: application to handheld game consoles + Embedded device programming using opensource tools. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/37.en.html + The Birthday Tent + jmfriedt + + + PUBLISH + 206@HAR2009@pentabarf.org + 206 + + Distributed social networking + + englisch + en + 20090813T150000 + 20090813T170000 + 02H00M00S + Distributed social networking + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/206.en.html + Bike-shed Red + Henry Story + + + PUBLISH + 206@HAR2009@pentabarf.org + 206 + + Distributed social networking + + English + en + 20090813T150000 + 20090813T170000 + 02H00M00S + Distributed social networking + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/206.en.html + Bike-shed Red + Henry Story + + + PUBLISH + 42@HAR2009@pentabarf.org + 42 + + DNS Security In The Broadest Sense + Why DNS Security does and does not matter + englisch + en + 20090814T140000 + 20090814T150000 + 01H00M00S + DNS Security In The Broadest Sense- Why DNS Security does and does not matter + The Domain Name System underlies almost any transaction on the internet, +from sending email to visiting a web page. Its security and reliability are +therefore of paramount importance. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/42.en.html + The Two Envelopes Tent + Bert Hubert + + + PUBLISH + 42@HAR2009@pentabarf.org + 42 + + DNS Security In The Broadest Sense + Why DNS Security does and does not matter + English + en + 20090814T140000 + 20090814T150000 + 01H00M00S + DNS Security In The Broadest Sense- Why DNS Security does and does not matter + The Domain Name System underlies almost any transaction on the internet, +from sending email to visiting a web page. Its security and reliability are +therefore of paramount importance. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/42.en.html + The Two Envelopes Tent + Bert Hubert + + + PUBLISH + 198@HAR2009@pentabarf.org + 198 + + EDRi meet & greet/workshop + Workshop for EDRi-members and related activist groups + + + 20090814T180000 + 20090814T190000 + 01H00M00S + EDRi meet & greet/workshop- Workshop for EDRi-members and related activist groups + Almost all European countries have one or more activist groups concerned with civil rights in a digital society. EDRi is a European platform for such organisations and has members in virtually all EU member states and the EFTA countries. A lot of the people involved hardly ever meet in person. Vrijschrift/Scriptum Libre would like to take advantage of the fact that quite a few Hacktivists will attend HAR2009 anyway and has found the HAR2009 organisation willing to provide room for just meeting each other as well as discussing the current state of European civil rights online and offline. More specific: what pieces of upcoming EU regulation warrant action by the various groups. This meeting is intended as a mostly free form event for those interested in this subject. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/198.en.html + Bike-shed Red + + + PUBLISH + 198@HAR2009@pentabarf.org + 198 + + EDRi meet & greet/workshop + Workshop for EDRi-members and related activist groups + + + 20090814T180000 + 20090814T190000 + 01H00M00S + EDRi meet & greet/workshop- Workshop for EDRi-members and related activist groups + Almost all European countries have one or more activist groups concerned with civil rights in a digital society. EDRi is a European platform for such organisations and has members in virtually all EU member states and the EFTA countries. A lot of the people involved hardly ever meet in person. Vrijschrift/Scriptum Libre would like to take advantage of the fact that quite a few Hacktivists will attend HAR2009 anyway and has found the HAR2009 organisation willing to provide room for just meeting each other as well as discussing the current state of European civil rights online and offline. More specific: what pieces of upcoming EU regulation warrant action by the various groups. This meeting is intended as a mostly free form event for those interested in this subject. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/198.en.html + Bike-shed Red + + + PUBLISH + 60@HAR2009@pentabarf.org + 60 + elec_engineering + Electrical enginering with free/libre open source software + gEDA, PCB, Emdebian, positive vs negative vs proprietary vs floss standoff + English + en + 20090813T150000 + 20090813T160000 + 01H00M00S + Electrical enginering with free/libre open source software- gEDA, PCB, Emdebian, positive vs negative vs proprietary vs floss standoff + In this talk Jelle is going to talk about hardware development with complete FLOSS based development tools. He is going to show the OpenARM Single Board Computer Project (SBC) and will explains some things about the Emdebbian project and the need of TDEBs. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/60.en.html + Monty Hall + Jelle de Jong + + + PUBLISH + 60@HAR2009@pentabarf.org + 60 + elec_engineering + Electrical enginering with free/libre open source software + gEDA, PCB, Emdebian, positive vs negative vs proprietary vs floss standoff + englisch + en + 20090813T150000 + 20090813T160000 + 01H00M00S + Electrical enginering with free/libre open source software- gEDA, PCB, Emdebian, positive vs negative vs proprietary vs floss standoff + In this talk Jelle is going to talk about hardware development with complete FLOSS based development tools. He is going to show the OpenARM Single Board Computer Project (SBC) and will explains some things about the Emdebbian project and the need of TDEBs. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/60.en.html + Monty Hall + Jelle de Jong + + + PUBLISH + 165@HAR2009@pentabarf.org + 165 + + Exploiting Native Client + Google Native Client Security in a Brave New World + English + en + 20090815T110000 + 20090815T120000 + 01H00M00S + Exploiting Native Client- Google Native Client Security in a Brave New World + In a world buzzing full with concepts of mobile-cloud-virtualized-software-as-a-service-2.0 technology, the science of actually delivering applications over the web has never been more relevant. Enter Google Native Client, a radical new player hoping to match up to the collective powerhouse of Microsoft ActiveX, Sun Java and Adobe Flash. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/165.en.html + The Two Envelopes Tent + Ben Hawkes + + + PUBLISH + 165@HAR2009@pentabarf.org + 165 + + Exploiting Native Client + Google Native Client Security in a Brave New World + englisch + en + 20090815T110000 + 20090815T120000 + 01H00M00S + Exploiting Native Client- Google Native Client Security in a Brave New World + In a world buzzing full with concepts of mobile-cloud-virtualized-software-as-a-service-2.0 technology, the science of actually delivering applications over the web has never been more relevant. Enter Google Native Client, a radical new player hoping to match up to the collective powerhouse of Microsoft ActiveX, Sun Java and Adobe Flash. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/165.en.html + The Two Envelopes Tent + Ben Hawkes + + + PUBLISH + 166@HAR2009@pentabarf.org + 166 + eyeborg + Eyeborg project + + English + en + 20090813T150000 + 20090813T160000 + 01H00M00S + Eyeborg project + Take a one eyed film maker, an unemployed engineer, and a vision for something that's never been done before and you have yourself the EyeBorg Project. Rob Spence and Kosta Grammatis are trying to make history by embedding a video camera and a transmitter in a prosthetic eye. That eye is going in Robs eye socket, and will record the world from a perspective that's never been seen before. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/166.en.html + The Two Envelopes Tent + Kosta Grammatis + + + PUBLISH + 166@HAR2009@pentabarf.org + 166 + eyeborg + Eyeborg project + + englisch + en + 20090813T150000 + 20090813T160000 + 01H00M00S + Eyeborg project + Take a one eyed film maker, an unemployed engineer, and a vision for something that's never been done before and you have yourself the EyeBorg Project. Rob Spence and Kosta Grammatis are trying to make history by embedding a video camera and a transmitter in a prosthetic eye. That eye is going in Robs eye socket, and will record the world from a perspective that's never been seen before. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/166.en.html + The Two Envelopes Tent + Kosta Grammatis + + + PUBLISH + 124@HAR2009@pentabarf.org + 124 + how_to_get_v6 + First woman on native IPv6, and other tales + How to get IPv6 + English + en + 20090814T160000 + 20090814T170000 + 01H00M00S + First woman on native IPv6, and other tales- How to get IPv6 + "All this, and native IPv6" + +Proud to be the first female XS4ALL customer using IPv6. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/124.en.html + The Birthday Tent + BECHA + + + PUBLISH + 124@HAR2009@pentabarf.org + 124 + how_to_get_v6 + First woman on native IPv6, and other tales + How to get IPv6 + englisch + en + 20090814T160000 + 20090814T170000 + 01H00M00S + First woman on native IPv6, and other tales- How to get IPv6 + "All this, and native IPv6" + +Proud to be the first female XS4ALL customer using IPv6. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/124.en.html + The Birthday Tent + BECHA + + + PUBLISH + 74@HAR2009@pentabarf.org + 74 + fishphucker + Flipping the Phishing Con Game - Design and Implementation of FishPhucker + Anti-Phishing Extension + English + en + 20090813T150000 + 20090813T160000 + 01H00M00S + Flipping the Phishing Con Game - Design and Implementation of FishPhucker- Anti-Phishing Extension + Numerous counter-measures against phishing have been evaluated in recent years. Users have been educated; authenticity in Bank websites was improved and out-of-band authentication methods were established, but phishing remains a problem. This work focuses on a new method which attempts to turn the tables on Phishers. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/74.en.html + The Birthday Tent + Dominik Birk + + + PUBLISH + 74@HAR2009@pentabarf.org + 74 + fishphucker + Flipping the Phishing Con Game - Design and Implementation of FishPhucker + Anti-Phishing Extension + englisch + en + 20090813T150000 + 20090813T160000 + 01H00M00S + Flipping the Phishing Con Game - Design and Implementation of FishPhucker- Anti-Phishing Extension + Numerous counter-measures against phishing have been evaluated in recent years. Users have been educated; authenticity in Bank websites was improved and out-of-band authentication methods were established, but phishing remains a problem. This work focuses on a new method which attempts to turn the tables on Phishers. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/74.en.html + The Birthday Tent + Dominik Birk + + + PUBLISH + 203@HAR2009@pentabarf.org + 203 + workshop_restful_auth + FOAF+SSL: RESTful authentication for the Social Web + + English + en + 20090814T160000 + 20090814T180000 + 02H00M00S + FOAF+SSL: RESTful authentication for the Social Web + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/203.en.html + Bike-shed Green + Henry Story + + + PUBLISH + 203@HAR2009@pentabarf.org + 203 + workshop_restful_auth + FOAF+SSL: RESTful authentication for the Social Web + + englisch + en + 20090814T160000 + 20090814T180000 + 02H00M00S + FOAF+SSL: RESTful authentication for the Social Web + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/203.en.html + Bike-shed Green + Henry Story + + + PUBLISH + 65@HAR2009@pentabarf.org + 65 + + Foundry CAM hacking + + Dutch + nl + 20090815T130000 + 20090815T140000 + 01H00M00S + Foundry CAM hacking + De presentatie zal de internals (CAM) tonen van een redelijk standaard chassis gebaseerde switch/router (Foundry), demonstreren dat het (alhoewel unsupported) mogelijk is packet headers te dumpen middels een aantal ongedocumenteerde commando's, en proberen het hackersgevoel te delen dit alles uit te vinden. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/65.en.html + The Birthday Tent + Vincent Bourgonjen + + + PUBLISH + 65@HAR2009@pentabarf.org + 65 + + Foundry CAM hacking + + niederländisch + nl + 20090815T130000 + 20090815T140000 + 01H00M00S + Foundry CAM hacking + De presentatie zal de internals (CAM) tonen van een redelijk standaard chassis gebaseerde switch/router (Foundry), demonstreren dat het (alhoewel unsupported) mogelijk is packet headers te dumpen middels een aantal ongedocumenteerde commando's, en proberen het hackersgevoel te delen dit alles uit te vinden. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/65.en.html + The Birthday Tent + Vincent Bourgonjen + + + PUBLISH + 152@HAR2009@pentabarf.org + 152 + futureshock + Futureshock, don't panic! + how do we deal with accelerating change? + englisch + en + 20090814T210000 + 20090814T220000 + 01H00M00S + Futureshock, don't panic!- how do we deal with accelerating change? + A much improved and updated version of my 2005 What The Hack talk about the future of information, bio and nanotechologies, their convergence and it's consequences. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/152.en.html + Monty Hall + Arjen Kamphuis + + + PUBLISH + 152@HAR2009@pentabarf.org + 152 + futureshock + Futureshock, don't panic! + how do we deal with accelerating change? + English + en + 20090814T210000 + 20090814T220000 + 01H00M00S + Futureshock, don't panic!- how do we deal with accelerating change? + A much improved and updated version of my 2005 What The Hack talk about the future of information, bio and nanotechologies, their convergence and it's consequences. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/152.en.html + Monty Hall + Arjen Kamphuis + + + PUBLISH + 195@HAR2009@pentabarf.org + 195 + + Gnuradio workshop + build your own wireless device in software (using Software Defined Radio) which can transmit and receive any wireless signal + English + en + 20090815T190000 + 20090815T220000 + 03H00M00S + Gnuradio workshop- build your own wireless device in software (using Software Defined Radio) which can transmit and receive any wireless signal + In this workshop you will learn how to use Gnuradio to build Software Defined Radio applications which can transmit or receive any type of radiosignal. We will bring a few USRP's (Universal Software Radio Peripheral) which is an opensource hardware device which will be used as RF-frontend. All the processing (demodulation, modulation and so on) will run on your PC running Linux (Ubuntu jaunty is the easiest). + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/195.en.html + Bike-shed Red + + + PUBLISH + 195@HAR2009@pentabarf.org + 195 + + Gnuradio workshop + build your own wireless device in software (using Software Defined Radio) which can transmit and receive any wireless signal + englisch + en + 20090815T190000 + 20090815T220000 + 03H00M00S + Gnuradio workshop- build your own wireless device in software (using Software Defined Radio) which can transmit and receive any wireless signal + In this workshop you will learn how to use Gnuradio to build Software Defined Radio applications which can transmit or receive any type of radiosignal. We will bring a few USRP's (Universal Software Radio Peripheral) which is an opensource hardware device which will be used as RF-frontend. All the processing (demodulation, modulation and so on) will run on your PC running Linux (Ubuntu jaunty is the easiest). + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/195.en.html + Bike-shed Red + + + PUBLISH + 180@HAR2009@pentabarf.org + 180 + biza + Government and trust + Government 2.0 + englisch + en + 20090814T150000 + 20090814T160000 + 01H00M00S + Government and trust- Government 2.0 + Governments are, on some levels, moving towards more transparency, yet they often are reluctant to really accept citizens' input. In turn, citizens often don't trust that their ideas and stories will really be taken into account. How do we get out of this deadlock? Can we? + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/180.en.html + The Two Envelopes Tent + Arnout Ponsioen + + + PUBLISH + 180@HAR2009@pentabarf.org + 180 + biza + Government and trust + Government 2.0 + English + en + 20090814T150000 + 20090814T160000 + 01H00M00S + Government and trust- Government 2.0 + Governments are, on some levels, moving towards more transparency, yet they often are reluctant to really accept citizens' input. In turn, citizens often don't trust that their ideas and stories will really be taken into account. How do we get out of this deadlock? Can we? + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/180.en.html + The Two Envelopes Tent + Arnout Ponsioen + + + PUBLISH + 137@HAR2009@pentabarf.org + 137 + hackerjeopardy + Hacker Jeopardy + Number guessing for geeks + englisch + en + 20090815T220000 + 20090815T230000 + 01H00M00S + Hacker Jeopardy- Number guessing for geeks + Hacker Jeopardy Quiz Show, entertainment + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/137.en.html + Monty Hall + Ray + Sec + + + PUBLISH + 137@HAR2009@pentabarf.org + 137 + hackerjeopardy + Hacker Jeopardy + Number guessing for geeks + English + en + 20090815T220000 + 20090815T230000 + 01H00M00S + Hacker Jeopardy- Number guessing for geeks + Hacker Jeopardy Quiz Show, entertainment + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/137.en.html + Monty Hall + Ray + Sec + + + PUBLISH + 101@HAR2009@pentabarf.org + 101 + hackerspaces_everywhere + Hackerspaces Everywhere + Building the Future + englisch + en + 20090816T130000 + 20090816T140000 + 01H00M00S + Hackerspaces Everywhere- Building the Future + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/101.en.html + The Two Envelopes Tent + astera + + + PUBLISH + 101@HAR2009@pentabarf.org + 101 + hackerspaces_everywhere + Hackerspaces Everywhere + Building the Future + English + en + 20090816T130000 + 20090816T140000 + 01H00M00S + Hackerspaces Everywhere- Building the Future + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/101.en.html + The Two Envelopes Tent + astera + + + PUBLISH + 96@HAR2009@pentabarf.org + 96 + + Hacking Mona Lisa + Technology and policy for the digital humanities and cultural heritage + englisch + en + 20090814T140000 + 20090814T150000 + 01H00M00S + Hacking Mona Lisa- Technology and policy for the digital humanities and cultural heritage + I'd like to show some examples of the technologies that are used in bringing the the research areas of the humanities - history, art history, literature - and cultural heritage - collections and museums - to the web and present some of the technical and political challenges thereof: How to create novel databases of objects and "thick relations" for islamic manuscripts and how to deal with anonymous authors. How to serve gigabyte-size images of historical architectural drawings and other scans over low bandwidth lines in the web. How to deal with historical texts in diverse dead and living languages either artful with morphological analysis and ontologies or quickly and dirtyly. How to establish open source solutions and open access to historical sources and cultural heritage in some good and some bad examples of technology and policy. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/96.en.html + Monty Hall + Robert Casties + + + PUBLISH + 96@HAR2009@pentabarf.org + 96 + + Hacking Mona Lisa + Technology and policy for the digital humanities and cultural heritage + English + en + 20090814T140000 + 20090814T150000 + 01H00M00S + Hacking Mona Lisa- Technology and policy for the digital humanities and cultural heritage + I'd like to show some examples of the technologies that are used in bringing the the research areas of the humanities - history, art history, literature - and cultural heritage - collections and museums - to the web and present some of the technical and political challenges thereof: How to create novel databases of objects and "thick relations" for islamic manuscripts and how to deal with anonymous authors. How to serve gigabyte-size images of historical architectural drawings and other scans over low bandwidth lines in the web. How to deal with historical texts in diverse dead and living languages either artful with morphological analysis and ontologies or quickly and dirtyly. How to establish open source solutions and open access to historical sources and cultural heritage in some good and some bad examples of technology and policy. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/96.en.html + Monty Hall + Robert Casties + + + PUBLISH + 150@HAR2009@pentabarf.org + 150 + future_of_science + Hacking the Future of Science + + English + en + 20090813T130000 + 20090813T140000 + 01H00M00S + Hacking the Future of Science + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/150.en.html + Monty Hall + Michael Nielsen + + + PUBLISH + 150@HAR2009@pentabarf.org + 150 + future_of_science + Hacking the Future of Science + + englisch + en + 20090813T130000 + 20090813T140000 + 01H00M00S + Hacking the Future of Science + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/150.en.html + Monty Hall + Michael Nielsen + + + PUBLISH + 79@HAR2009@pentabarf.org + 79 + hacking_plants + Hacking with Plants + Permaculture as another domain for (technical) design + English + en + 20090813T200000 + 20090813T210000 + 01H00M00S + Hacking with Plants- Permaculture as another domain for (technical) design + Permaculture makes designs in the domain of (mostly) plants. Surprisingly, the approach in this fields greatly overlaps that of technical design. This means that designing an optimal plant system can be very appealing to a technical mind. And being inspired by nature, we may even learn a thing or two about our technical design style... + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/79.en.html + The Birthday Tent + Rick van Rein + + + PUBLISH + 79@HAR2009@pentabarf.org + 79 + hacking_plants + Hacking with Plants + Permaculture as another domain for (technical) design + englisch + en + 20090813T200000 + 20090813T210000 + 01H00M00S + Hacking with Plants- Permaculture as another domain for (technical) design + Permaculture makes designs in the domain of (mostly) plants. Surprisingly, the approach in this fields greatly overlaps that of technical design. This means that designing an optimal plant system can be very appealing to a technical mind. And being inspired by nature, we may even learn a thing or two about our technical design style... + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/79.en.html + The Birthday Tent + Rick van Rein + + + PUBLISH + 110@HAR2009@pentabarf.org + 110 + + Hack the law! + Defend your freedoms while having fun! + englisch + en + 20090816T120000 + 20090816T130000 + 01H00M00S + Hack the law!- Defend your freedoms while having fun! + What happens when laws try to control the digital environment? Telecoms Package, "three strikes" (HADOPI), content filtering, software patents... It's all about control! + +Is law hackable like code? What can we do to change the law? How to do it? How can a bunch of hackers promote a better and more open society? + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/110.en.html + Monty Hall + Jérémie Zimmermann + + + PUBLISH + 110@HAR2009@pentabarf.org + 110 + + Hack the law! + Defend your freedoms while having fun! + English + en + 20090816T120000 + 20090816T130000 + 01H00M00S + Hack the law!- Defend your freedoms while having fun! + What happens when laws try to control the digital environment? Telecoms Package, "three strikes" (HADOPI), content filtering, software patents... It's all about control! + +Is law hackable like code? What can we do to change the law? How to do it? How can a bunch of hackers promote a better and more open society? + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/110.en.html + Monty Hall + Jérémie Zimmermann + + + PUBLISH + 100@HAR2009@pentabarf.org + 100 + har_network_overview + HAR Network Overview & BlinkenArea movie contest results + + English + en + 20090816T150000 + 20090816T160000 + 01H00M00S + HAR Network Overview & BlinkenArea movie contest results + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/100.en.html + Monty Hall + Elisa Jasinska + Leon Weber + Stephan 'ST' Kambor + + + PUBLISH + 100@HAR2009@pentabarf.org + 100 + har_network_overview + HAR Network Overview & BlinkenArea movie contest results + + englisch + en + 20090816T150000 + 20090816T160000 + 01H00M00S + HAR Network Overview & BlinkenArea movie contest results + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/100.en.html + Monty Hall + Elisa Jasinska + Leon Weber + Stephan 'ST' Kambor + + + PUBLISH + 103@HAR2009@pentabarf.org + 103 + + How to reverse engineer backdoor algoritms hidden in firmware. + Disclosure of a backdoor in Accton based switches (3com and others) + englisch + en + 20090815T140000 + 20090815T150000 + 01H00M00S + How to reverse engineer backdoor algoritms hidden in firmware.- Disclosure of a backdoor in Accton based switches (3com and others) + How we reverse engineered a remote accesible backdoor in Accton-based switches. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/103.en.html + The Birthday Tent + psy + + + PUBLISH + 103@HAR2009@pentabarf.org + 103 + + How to reverse engineer backdoor algoritms hidden in firmware. + Disclosure of a backdoor in Accton based switches (3com and others) + English + en + 20090815T140000 + 20090815T150000 + 01H00M00S + How to reverse engineer backdoor algoritms hidden in firmware.- Disclosure of a backdoor in Accton based switches (3com and others) + How we reverse engineered a remote accesible backdoor in Accton-based switches. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/103.en.html + The Birthday Tent + psy + + + PUBLISH + 153@HAR2009@pentabarf.org + 153 + quantum_crypto + How to use quantum cryptography for secure identification + Making the most of noise + englisch + en + 20090815T140000 + 20090815T150000 + 01H00M00S + How to use quantum cryptography for secure identification- Making the most of noise + The goal of secure identification is to enable a user, Alice, to identify herself to Bob without revealing her password. Unfortunately, like many other interesting cryptographic problems involving two parties, this is impossible to achieve without making assumptions. For example, we could assume that factoring a large number is difficult. However it is not known whether this assumption is correct. In this talk, we will instead assume that it is difficult to store quantum states, in the sense that the quantum memory available to an attacker is noisy. We propose a simple quantum protocol that can be used to solve this task which is implementable using present day hardware. + +No knowledge of quantum cryptography or math will be required. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/153.en.html + The Two Envelopes Tent + Stephanie Wehner + + + PUBLISH + 153@HAR2009@pentabarf.org + 153 + quantum_crypto + How to use quantum cryptography for secure identification + Making the most of noise + English + en + 20090815T140000 + 20090815T150000 + 01H00M00S + How to use quantum cryptography for secure identification- Making the most of noise + The goal of secure identification is to enable a user, Alice, to identify herself to Bob without revealing her password. Unfortunately, like many other interesting cryptographic problems involving two parties, this is impossible to achieve without making assumptions. For example, we could assume that factoring a large number is difficult. However it is not known whether this assumption is correct. In this talk, we will instead assume that it is difficult to store quantum states, in the sense that the quantum memory available to an attacker is noisy. We propose a simple quantum protocol that can be used to solve this task which is implementable using present day hardware. + +No knowledge of quantum cryptography or math will be required. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/153.en.html + The Two Envelopes Tent + Stephanie Wehner + + + PUBLISH + 63@HAR2009@pentabarf.org + 63 + how_we_hack + How we break into domains + What every admin should know about Windows security + englisch + en + 20090815T130000 + 20090815T140000 + 01H00M00S + How we break into domains- What every admin should know about Windows security + It's a cliché that most networks are hard on the outside and soft and chewy on the inside, but it's true. Securing networks is hard and it shows: most domains are easy to break into. I'll describe the weaknesses in networks we abuse to gain access to most, if not all, systems on a LAN. We'll go over some of the basics, such as problems with patching and passwords, but also some more advanced recent developments, such as hijacking Windows access tokens. I will describe how state of the art techniques can be combined to take over a domain, and how to protect your domain and your company. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/63.en.html + Monty Hall + Niels Teusink + + + PUBLISH + 63@HAR2009@pentabarf.org + 63 + how_we_hack + How we break into domains + What every admin should know about Windows security + English + en + 20090815T130000 + 20090815T140000 + 01H00M00S + How we break into domains- What every admin should know about Windows security + It's a cliché that most networks are hard on the outside and soft and chewy on the inside, but it's true. Securing networks is hard and it shows: most domains are easy to break into. I'll describe the weaknesses in networks we abuse to gain access to most, if not all, systems on a LAN. We'll go over some of the basics, such as problems with patching and passwords, but also some more advanced recent developments, such as hijacking Windows access tokens. I will describe how state of the art techniques can be combined to take over a domain, and how to protect your domain and your company. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/63.en.html + Monty Hall + Niels Teusink + + + PUBLISH + 168@HAR2009@pentabarf.org + 168 + quantum_eavesdropping + How we eavesdropped 100% of a quantum cryptographic key + + English + en + 20090814T200000 + 20090814T210000 + 01H00M00S + How we eavesdropped 100% of a quantum cryptographic key + Quantum cryptography, as being based on the laws of physics, was claimed to be much more secure than all classical cryptography schemes. (Un)fortunately +physical hardware is not beyond of an evil control: We present a successful attack of an existing quantum key distribution system exploiting a photon detector vulnerability which is probably present in all existing devices. Without Alice and Bob losing their faith in their secure communication, we recorded 100% of the supposedly secret key. + +The actual eavesdropping hardware we have built will be shown during the conference. + +A brief intro into quantum cryptography will be given at the beginning of the talk. Then, Vadim Makarov will explain the above attack. At the end of the talk, Ilja Gerhardt will (hopefully) present another application of the discovered detector vulnerability, which shall remain a surprise :) + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/168.en.html + Monty Hall + Ilja Gerhardt + Vadim Makarov + + + PUBLISH + 168@HAR2009@pentabarf.org + 168 + quantum_eavesdropping + How we eavesdropped 100% of a quantum cryptographic key + + englisch + en + 20090814T200000 + 20090814T210000 + 01H00M00S + How we eavesdropped 100% of a quantum cryptographic key + Quantum cryptography, as being based on the laws of physics, was claimed to be much more secure than all classical cryptography schemes. (Un)fortunately +physical hardware is not beyond of an evil control: We present a successful attack of an existing quantum key distribution system exploiting a photon detector vulnerability which is probably present in all existing devices. Without Alice and Bob losing their faith in their secure communication, we recorded 100% of the supposedly secret key. + +The actual eavesdropping hardware we have built will be shown during the conference. + +A brief intro into quantum cryptography will be given at the beginning of the talk. Then, Vadim Makarov will explain the above attack. At the end of the talk, Ilja Gerhardt will (hopefully) present another application of the discovered detector vulnerability, which shall remain a surprise :) + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/168.en.html + Monty Hall + Ilja Gerhardt + Vadim Makarov + + + PUBLISH + 75@HAR2009@pentabarf.org + 75 + identity_processes + Identity processes + Why we put our most intimate details on the net and are still worried about our privacy + English + en + 20090814T210000 + 20090814T220000 + 01H00M00S + Identity processes- Why we put our most intimate details on the net and are still worried about our privacy + When trying to understand what privacy is and how it works, it is very helpful to have some idea of what human identity is. In this presentation I will sharpen our concept of privacy by taking a 'discursive' view on identity as starting point. This enables us to understand the privacy challenges the digitalization of our society poses. After this presentation you will know: +- why identities can't be stolen +- why we put our most intimate details on the net and are still worried about our privacy +- why ISP's and search engines are in the frontline of the privacy debate +- what the problem is of modern surveillance +- And of course you will know the most brutal ways to violate somebodies privacy. + + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/75.en.html + The Two Envelopes Tent + Winfried Tilanus + + + PUBLISH + 75@HAR2009@pentabarf.org + 75 + identity_processes + Identity processes + Why we put our most intimate details on the net and are still worried about our privacy + englisch + en + 20090814T210000 + 20090814T220000 + 01H00M00S + Identity processes- Why we put our most intimate details on the net and are still worried about our privacy + When trying to understand what privacy is and how it works, it is very helpful to have some idea of what human identity is. In this presentation I will sharpen our concept of privacy by taking a 'discursive' view on identity as starting point. This enables us to understand the privacy challenges the digitalization of our society poses. After this presentation you will know: +- why identities can't be stolen +- why we put our most intimate details on the net and are still worried about our privacy +- why ISP's and search engines are in the frontline of the privacy debate +- what the problem is of modern surveillance +- And of course you will know the most brutal ways to violate somebodies privacy. + + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/75.en.html + The Two Envelopes Tent + Winfried Tilanus + + + PUBLISH + 209@HAR2009@pentabarf.org + 209 + + IPv6 + + + + 20090815T120000 + 20090815T130000 + 01H00M00S + IPv6 + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/209.en.html + Bike-shed Red + + + PUBLISH + 209@HAR2009@pentabarf.org + 209 + + IPv6 + + + + 20090815T120000 + 20090815T130000 + 01H00M00S + IPv6 + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/209.en.html + Bike-shed Red + + + PUBLISH + 127@HAR2009@pentabarf.org + 127 + java_card + Java Card + Another Java hype or what? + englisch + en + 20090814T120000 + 20090814T130000 + 01H00M00S + Java Card- Another Java hype or what? + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/127.en.html + The Two Envelopes Tent + Eduard Karel de Jong + + + PUBLISH + 127@HAR2009@pentabarf.org + 127 + java_card + Java Card + Another Java hype or what? + English + en + 20090814T120000 + 20090814T130000 + 01H00M00S + Java Card- Another Java hype or what? + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/127.en.html + The Two Envelopes Tent + Eduard Karel de Jong + + + PUBLISH + 68@HAR2009@pentabarf.org + 68 + + Life or Death Cryptology: it is not about the encryption algorithm + + englisch + en + 20090815T170000 + 20090815T180000 + 01H00M00S + Life or Death Cryptology: it is not about the encryption algorithm + Protecting secrets is hard. Some of the things you currently trust to protect your secrets may be totally wrong. Even more so if you look at international espionage and protecting Top Secret information at the government level. A view into the world of state level security may really influence the way you look at protecting secrets. As information becomes more important, more threats arise. It actually all boils down to one thing. Trust. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/68.en.html + The Two Envelopes Tent + Paul Bakker + + + PUBLISH + 68@HAR2009@pentabarf.org + 68 + + Life or Death Cryptology: it is not about the encryption algorithm + + English + en + 20090815T170000 + 20090815T180000 + 01H00M00S + Life or Death Cryptology: it is not about the encryption algorithm + Protecting secrets is hard. Some of the things you currently trust to protect your secrets may be totally wrong. Even more so if you look at international espionage and protecting Top Secret information at the government level. A view into the world of state level security may really influence the way you look at protecting secrets. As information becomes more important, more threats arise. It actually all boils down to one thing. Trust. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/68.en.html + The Two Envelopes Tent + Paul Bakker + + + PUBLISH + 182@HAR2009@pentabarf.org + 182 + lightning_friday + Lightning talks Friday + 7 short lectures in 2 hours + englisch + en + 20090814T110000 + 20090814T130000 + 02H00M00S + Lightning talks Friday- 7 short lectures in 2 hours + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/182.en.html + The Birthday Tent + Don Hopkins + Hoppel + jbe + Melvin Rook + Rene "cavac" Schickbauer + Sébastien Bourdeauducq + tille + + + PUBLISH + 182@HAR2009@pentabarf.org + 182 + lightning_friday + Lightning talks Friday + 7 short lectures in 2 hours + English + en + 20090814T110000 + 20090814T130000 + 02H00M00S + Lightning talks Friday- 7 short lectures in 2 hours + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/182.en.html + The Birthday Tent + Don Hopkins + Hoppel + jbe + Melvin Rook + Rene "cavac" Schickbauer + Sébastien Bourdeauducq + tille + + + PUBLISH + 183@HAR2009@pentabarf.org + 183 + lightning_saturday + Lightning talks Saturday + 7 short lectures in 2 hours + English + en + 20090815T110000 + 20090815T130000 + 02H00M00S + Lightning talks Saturday- 7 short lectures in 2 hours + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/183.en.html + The Birthday Tent + Elger 'Stitch' Jonker + Esther Weltevrede + Harmen P. (Murf) de Ruiter + Kristian Mueller + Menneau + Rene "cavac" Schickbauer + Ruediger Weis + Wouter Tebbens + + + PUBLISH + 183@HAR2009@pentabarf.org + 183 + lightning_saturday + Lightning talks Saturday + 7 short lectures in 2 hours + englisch + en + 20090815T110000 + 20090815T130000 + 02H00M00S + Lightning talks Saturday- 7 short lectures in 2 hours + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/183.en.html + The Birthday Tent + Elger 'Stitch' Jonker + Esther Weltevrede + Harmen P. (Murf) de Ruiter + Kristian Mueller + Menneau + Rene "cavac" Schickbauer + Ruediger Weis + Wouter Tebbens + + + PUBLISH + 32@HAR2009@pentabarf.org + 32 + + Locally Exploiting Wireless Sensors + Breaking AES by Syringe + englisch + en + 20090816T130000 + 20090816T140000 + 01H00M00S + Locally Exploiting Wireless Sensors- Breaking AES by Syringe + Wireless sensors are often built with a microcontroller and a radio chip, connected only by a SPI bus. The radio, not the MCU, is responsible for symmetric cryptography of each packet. When the key is loaded, it is sent as cleartext over the SPI bus, and an attacker with local access can steal the key using a few syringe probes and readily available hardware. This attack and other local attacks against wireless sensor networks will be presented in detail, including a live demo of an AES128 key being extracted from an operational network. Following the conclusion of the lecture, audience members will be brought onstage to perform the attack themselves on various pieces of example hardware. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/32.en.html + The Birthday Tent + Travis Goodspeed + + + PUBLISH + 32@HAR2009@pentabarf.org + 32 + + Locally Exploiting Wireless Sensors + Breaking AES by Syringe + English + en + 20090816T130000 + 20090816T140000 + 01H00M00S + Locally Exploiting Wireless Sensors- Breaking AES by Syringe + Wireless sensors are often built with a microcontroller and a radio chip, connected only by a SPI bus. The radio, not the MCU, is responsible for symmetric cryptography of each packet. When the key is loaded, it is sent as cleartext over the SPI bus, and an attacker with local access can steal the key using a few syringe probes and readily available hardware. This attack and other local attacks against wireless sensor networks will be presented in detail, including a live demo of an AES128 key being extracted from an operational network. Following the conclusion of the lecture, audience members will be brought onstage to perform the attack themselves on various pieces of example hardware. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/32.en.html + The Birthday Tent + Travis Goodspeed + + + PUBLISH + 159@HAR2009@pentabarf.org + 159 + + Lockpicking + How lock-enthousiasts are keeping up with the state of the art + English + en + 20090815T210000 + 20090815T220000 + 01H00M00S + Lockpicking- How lock-enthousiasts are keeping up with the state of the art + This talk will detail the changes in lockpicking. It will tell the story of a rapidly changing universe once dark and mysterious which is now increasingly populated by lock-enthousiasts that simply enjoy the challenge mechanical locks present and freely share what they learn. You will learn how the lock industry is coming to terms with all of this, about new developments in safes, locks and opening techniques and you will get a general idea of how the world of locks and lockpicking is maturing. + +Barry and Han have done entertaining presentations on lockpicking at past hacker events and both take pride in never doing the same talk twice and always coming up with something new to show. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/159.en.html + The Birthday Tent + Barry - The Key - Wels + Han Fey + + + PUBLISH + 159@HAR2009@pentabarf.org + 159 + + Lockpicking + How lock-enthousiasts are keeping up with the state of the art + englisch + en + 20090815T210000 + 20090815T220000 + 01H00M00S + Lockpicking- How lock-enthousiasts are keeping up with the state of the art + This talk will detail the changes in lockpicking. It will tell the story of a rapidly changing universe once dark and mysterious which is now increasingly populated by lock-enthousiasts that simply enjoy the challenge mechanical locks present and freely share what they learn. You will learn how the lock industry is coming to terms with all of this, about new developments in safes, locks and opening techniques and you will get a general idea of how the world of locks and lockpicking is maturing. + +Barry and Han have done entertaining presentations on lockpicking at past hacker events and both take pride in never doing the same talk twice and always coming up with something new to show. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/159.en.html + The Birthday Tent + Barry - The Key - Wels + Han Fey + + + PUBLISH + 205@HAR2009@pentabarf.org + 205 + + Massage for Nerds + + englisch + en + 20090814T210000 + 20090814T220000 + 01H00M00S + Massage for Nerds + Feeling tense? Overworked? Always wanted to know the secrets to good relaxation? + +The massage for nerds workshop may be of help. I will try to teach you some basic massage principles and skills and demonstrate some techniques to relax. +Wear loose clothing, you may want to bring a matress (not the big wobbly instable inflatable ones, they don't work well). Part of it is self-massage, the other part is work with a partner. You can bring your own nerd or find one on the spot. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/205.en.html + Bike-shed Green + + + PUBLISH + 205@HAR2009@pentabarf.org + 205 + + Massage for Nerds + + English + en + 20090814T210000 + 20090814T220000 + 01H00M00S + Massage for Nerds + Feeling tense? Overworked? Always wanted to know the secrets to good relaxation? + +The massage for nerds workshop may be of help. I will try to teach you some basic massage principles and skills and demonstrate some techniques to relax. +Wear loose clothing, you may want to bring a matress (not the big wobbly instable inflatable ones, they don't work well). Part of it is self-massage, the other part is work with a partner. You can bring your own nerd or find one on the spot. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/205.en.html + Bike-shed Green + + + PUBLISH + 77@HAR2009@pentabarf.org + 77 + + MinixWall + rethinking secure systems + English + en + 20090816T120000 + 20090816T130000 + 01H00M00S + MinixWall- rethinking secure systems + Two of the main points are size and isolation. The Minix 3 kernel is less +than thousand times smaller as Linux. All drivers and the IP stack live +in user land. And this time Minix is Open Source. +We show a portation of the netfilter framework, which leads to a +system with better stability and security than the widely used Linux solutions. +Additional we present some new result regarding virtualiced systems using +a small amount of resources to add MinixWall into existing systems. +Additional we present some new result regarding virtualized systems using +a small amount of resources to add MinixWall into existing systems. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/77.en.html + The Birthday Tent + Ruediger Weis + + + PUBLISH + 77@HAR2009@pentabarf.org + 77 + + MinixWall + rethinking secure systems + englisch + en + 20090816T120000 + 20090816T130000 + 01H00M00S + MinixWall- rethinking secure systems + Two of the main points are size and isolation. The Minix 3 kernel is less +than thousand times smaller as Linux. All drivers and the IP stack live +in user land. And this time Minix is Open Source. +We show a portation of the netfilter framework, which leads to a +system with better stability and security than the widely used Linux solutions. +Additional we present some new result regarding virtualiced systems using +a small amount of resources to add MinixWall into existing systems. +Additional we present some new result regarding virtualized systems using +a small amount of resources to add MinixWall into existing systems. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/77.en.html + The Birthday Tent + Ruediger Weis + + + PUBLISH + 204@HAR2009@pentabarf.org + 204 + + Multitouch workshop + Create your own multitouch application. + englisch + en + 20090814T180000 + 20090814T210000 + 03H00M00S + Multitouch workshop- Create your own multitouch application. + In this workshop you will learn the basics of multitouch software development with [libavg](http://libavg.de/ "libavg") and create your own multitouch application. + + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/204.en.html + Bike-shed Yellow + + + PUBLISH + 204@HAR2009@pentabarf.org + 204 + + Multitouch workshop + Create your own multitouch application. + English + en + 20090814T180000 + 20090814T210000 + 03H00M00S + Multitouch workshop- Create your own multitouch application. + In this workshop you will learn the basics of multitouch software development with [libavg](http://libavg.de/ "libavg") and create your own multitouch application. + + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/204.en.html + Bike-shed Yellow + + + PUBLISH + 188@HAR2009@pentabarf.org + 188 + + MultiVerse workshop + Creating an open, decentralized, virtual world. + englisch + en + 20090814T140000 + 20090814T160000 + 02H00M00S + MultiVerse workshop- Creating an open, decentralized, virtual world. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/188.en.html + Bike-shed Green + Gabriel Konat + Melvin Rook + + + PUBLISH + 188@HAR2009@pentabarf.org + 188 + + MultiVerse workshop + Creating an open, decentralized, virtual world. + English + en + 20090814T140000 + 20090814T160000 + 02H00M00S + MultiVerse workshop- Creating an open, decentralized, virtual world. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/188.en.html + Bike-shed Green + Gabriel Konat + Melvin Rook + + + PUBLISH + 145@HAR2009@pentabarf.org + 145 + + My BREIN hurts! + FTD's fight against the "Dutch RIAA" + englisch + en + 20090816T140000 + 20090816T150000 + 01H00M00S + My BREIN hurts! - FTD's fight against the "Dutch RIAA" + Under Dutch copyright law, downloading movies and songs for personal use is entirely legal. This presents a unique legal problem for copyright enforcers like "Dutch RIAA" /Stichting BREIN/. Many sites have popped up that point people to opportunities for legal downloading. One of them is FTD, a place to "spot" binaries posted on Usenet. BREIN has accused Usenet and FTD of "facilitating illegal uploading for profit" and called FTD's activities "a criminal act". In response, FTD has gone to court to demand a ruling that FTD is operating legally, that downloading is legal and that BREIN should just shut up. Dutch IT-lawyer Arnoud Engelfriet, one of the lawyers representing FTD in court, will discuss the court case and the Dutch legal situation. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/145.en.html + Monty Hall + Arnoud Engelfriet + + + PUBLISH + 145@HAR2009@pentabarf.org + 145 + + My BREIN hurts! + FTD's fight against the "Dutch RIAA" + English + en + 20090816T140000 + 20090816T150000 + 01H00M00S + My BREIN hurts! - FTD's fight against the "Dutch RIAA" + Under Dutch copyright law, downloading movies and songs for personal use is entirely legal. This presents a unique legal problem for copyright enforcers like "Dutch RIAA" /Stichting BREIN/. Many sites have popped up that point people to opportunities for legal downloading. One of them is FTD, a place to "spot" binaries posted on Usenet. BREIN has accused Usenet and FTD of "facilitating illegal uploading for profit" and called FTD's activities "a criminal act". In response, FTD has gone to court to demand a ruling that FTD is operating legally, that downloading is legal and that BREIN should just shut up. Dutch IT-lawyer Arnoud Engelfriet, one of the lawyers representing FTD in court, will discuss the court case and the Dutch legal situation. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/145.en.html + Monty Hall + Arnoud Engelfriet + + + PUBLISH + 94@HAR2009@pentabarf.org + 94 + + Native IPv6 deployment at XS4ALL + + English + en + 20090814T150000 + 20090814T160000 + 01H00M00S + Native IPv6 deployment at XS4ALL + XS4ALL is currently rolling out native IPv6 on it's network. This talk will show some of the technology involved and problems encountered. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/94.en.html + The Birthday Tent + Marco Hogewoning + + + PUBLISH + 94@HAR2009@pentabarf.org + 94 + + Native IPv6 deployment at XS4ALL + + englisch + en + 20090814T150000 + 20090814T160000 + 01H00M00S + Native IPv6 deployment at XS4ALL + XS4ALL is currently rolling out native IPv6 on it's network. This talk will show some of the technology involved and problems encountered. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/94.en.html + The Birthday Tent + Marco Hogewoning + + + PUBLISH + 53@HAR2009@pentabarf.org + 53 + openbeer_workshop + OpenBeer Workshop + Learn how to make a delicious home-brew beer + englisch + en + 20090814T150000 + 20090814T170000 + 02H00M00S + OpenBeer Workshop- Learn how to make a delicious home-brew beer + In this workshop we will first discuss the theory behind brewing. After that, we will do the actual brewing. The day after, fermentation starts. Participants can opt in to be sent a bottle of their own brew about 3 weeks after the event. There might also be some tasting sessions. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/53.en.html + Village BSD + tille + + + PUBLISH + 53@HAR2009@pentabarf.org + 53 + openbeer_workshop + OpenBeer Workshop + Learn how to make a delicious home-brew beer + English + en + 20090814T150000 + 20090814T170000 + 02H00M00S + OpenBeer Workshop- Learn how to make a delicious home-brew beer + In this workshop we will first discuss the theory behind brewing. After that, we will do the actual brewing. The day after, fermentation starts. Participants can opt in to be sent a bottle of their own brew about 3 weeks after the event. There might also be some tasting sessions. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/53.en.html + Village BSD + tille + + + PUBLISH + 194@HAR2009@pentabarf.org + 194 + + Open Blueprints + Creative Commons & Design + + + 20090815T150000 + 20090815T180000 + 03H00M00S + Open Blueprints- Creative Commons & Design + A workshop on how to apply a creative commons license for design and the judicial space between copyright and model right. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/194.en.html + Bike-shed Yellow + Ronen Kadushin + + + PUBLISH + 194@HAR2009@pentabarf.org + 194 + + Open Blueprints + Creative Commons & Design + + + 20090815T150000 + 20090815T180000 + 03H00M00S + Open Blueprints- Creative Commons & Design + A workshop on how to apply a creative commons license for design and the judicial space between copyright and model right. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/194.en.html + Bike-shed Yellow + Ronen Kadushin + + + PUBLISH + 185@HAR2009@pentabarf.org + 185 + openbsc + OpenBSC + Running your own GSM network + + + 20090815T150000 + 20090815T160000 + 01H00M00S + OpenBSC- Running your own GSM network + OpenBSC is a Free Software implementation of the minimal subset of +the major backend components of a GSM network, such as BSC, MSC, HLR, EIR. +Using a commercial GSM BTS and attaching it to a Linux system running +the OpenBSC software allows you to run your own GSM "network in a box". + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/185.en.html + Monty Hall + Harald Welte + + + PUBLISH + 185@HAR2009@pentabarf.org + 185 + openbsc + OpenBSC + Running your own GSM network + + + 20090815T150000 + 20090815T160000 + 01H00M00S + OpenBSC- Running your own GSM network + OpenBSC is a Free Software implementation of the minimal subset of +the major backend components of a GSM network, such as BSC, MSC, HLR, EIR. +Using a commercial GSM BTS and attaching it to a Linux system running +the OpenBSC software allows you to run your own GSM "network in a box". + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/185.en.html + Monty Hall + Harald Welte + + + PUBLISH + 85@HAR2009@pentabarf.org + 85 + har_opening + Opening ceremony + Welcome to HAR2009 + English + en + 20090813T110000 + 20090813T120000 + 01H00M00S + Opening ceremony- Welcome to HAR2009 + Opening ceremony. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/85.en.html + Monty Hall + Koen Martens + + + PUBLISH + 85@HAR2009@pentabarf.org + 85 + har_opening + Opening ceremony + Welcome to HAR2009 + englisch + en + 20090813T110000 + 20090813T120000 + 01H00M00S + Opening ceremony- Welcome to HAR2009 + Opening ceremony. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/85.en.html + Monty Hall + Koen Martens + + + PUBLISH + 61@HAR2009@pentabarf.org + 61 + opensolaris_workshop + OpenSolaris Workshop + Why switch? What's better? Why another open source operating system? + English + en + 20090813T200000 + 20090813T220000 + 02H00M00S + OpenSolaris Workshop- Why switch? What's better? Why another open source operating system? + At first glance, you may mistake OpenSolaris for any other Linux distro. It uses GNOME for its desktop and GNU utilities such as sudo and top work as expected. However, as you dig deeper you'll find some nice surprises - a truly granular security framework, a service management facility that replaces antiquated rc*.d scripts, a dynamic tracing utility with incredible insight and a a new file system that is utterly refreshing. In this hands-on-workshop we'll cover the following: + + * The OpenSolaris you already know + o GNOME + o GNU Utilities + * The OpenSolaris you want to know + o RBAC + o SMF + o DTrace + o ZFS w/ TimeSlider + * The OpenSolaris you need to know + o IPS + o Networking + o The Innovation Continues + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/61.en.html + Bike-shed Green + Brian Leonard + + + PUBLISH + 61@HAR2009@pentabarf.org + 61 + opensolaris_workshop + OpenSolaris Workshop + Why switch? What's better? Why another open source operating system? + englisch + en + 20090813T200000 + 20090813T220000 + 02H00M00S + OpenSolaris Workshop- Why switch? What's better? Why another open source operating system? + At first glance, you may mistake OpenSolaris for any other Linux distro. It uses GNOME for its desktop and GNU utilities such as sudo and top work as expected. However, as you dig deeper you'll find some nice surprises - a truly granular security framework, a service management facility that replaces antiquated rc*.d scripts, a dynamic tracing utility with incredible insight and a a new file system that is utterly refreshing. In this hands-on-workshop we'll cover the following: + + * The OpenSolaris you already know + o GNOME + o GNU Utilities + * The OpenSolaris you want to know + o RBAC + o SMF + o DTrace + o ZFS w/ TimeSlider + * The OpenSolaris you need to know + o IPS + o Networking + o The Innovation Continues + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/61.en.html + Bike-shed Green + Brian Leonard + + + PUBLISH + 113@HAR2009@pentabarf.org + 113 + organising_a_con + Organising a Con + + englisch + en + 20090816T140000 + 20090816T150000 + 01H00M00S + Organising a Con + Presentation and discussion from a panel of core conference organizers on their experiences in organizing conferences. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/113.en.html + The Two Envelopes Tent + David Dolphin (tyrion) + + + PUBLISH + 113@HAR2009@pentabarf.org + 113 + organising_a_con + Organising a Con + + English + en + 20090816T140000 + 20090816T150000 + 01H00M00S + Organising a Con + Presentation and discussion from a panel of core conference organizers on their experiences in organizing conferences. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/113.en.html + The Two Envelopes Tent + David Dolphin (tyrion) + + + PUBLISH + 59@HAR2009@pentabarf.org + 59 + government_transparency + Our dutch road to government transparency + Dutch road to help free our government from closed workflows and closed ict-systems + English + en + 20090815T130000 + 20090815T140000 + 01H00M00S + Our dutch road to government transparency- Dutch road to help free our government from closed workflows and closed ict-systems + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/59.en.html + Bike-shed Green + Jelle de Jong + + + PUBLISH + 59@HAR2009@pentabarf.org + 59 + government_transparency + Our dutch road to government transparency + Dutch road to help free our government from closed workflows and closed ict-systems + englisch + en + 20090815T130000 + 20090815T140000 + 01H00M00S + Our dutch road to government transparency- Dutch road to help free our government from closed workflows and closed ict-systems + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/59.en.html + Bike-shed Green + Jelle de Jong + + + PUBLISH + 170@HAR2009@pentabarf.org + 170 + panel_discussion + Panel discussion with Brein and HAR + + English + en + 20090814T170000 + 20090814T180000 + 01H00M00S + Panel discussion with Brein and HAR + Panel discussion with Brein, MPAA and HAR + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/170.en.html + Monty Hall + Arjen Kamphuis + Tim Kuik + Walter van Holst + + + PUBLISH + 170@HAR2009@pentabarf.org + 170 + panel_discussion + Panel discussion with Brein and HAR + + englisch + en + 20090814T170000 + 20090814T180000 + 01H00M00S + Panel discussion with Brein and HAR + Panel discussion with Brein, MPAA and HAR + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/170.en.html + Monty Hall + Arjen Kamphuis + Tim Kuik + Walter van Holst + + + PUBLISH + 193@HAR2009@pentabarf.org + 193 + pgp_and_cacert_key_signing_party + PGP and CAcert key signing party + Have your PGP key signed; have yourself assured + englisch + en + 20090815T180000 + 20090815T200000 + 02H00M00S + PGP and CAcert key signing party- Have your PGP key signed; have yourself assured + PGP public key and CAcert certificate identification is based on multiple (the more the better) persons doing an identification check with official identity document(s), like a driver license, passports, identity cards, etc.: the Web of Trustworthy. The Web of Trust is basically a reciprocal process: one has to identify to each other. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/193.en.html + The Birthday Tent + Udo + + + PUBLISH + 193@HAR2009@pentabarf.org + 193 + pgp_and_cacert_key_signing_party + PGP and CAcert key signing party + Have your PGP key signed; have yourself assured + English + en + 20090815T180000 + 20090815T200000 + 02H00M00S + PGP and CAcert key signing party- Have your PGP key signed; have yourself assured + PGP public key and CAcert certificate identification is based on multiple (the more the better) persons doing an identification check with official identity document(s), like a driver license, passports, identity cards, etc.: the Web of Trustworthy. The Web of Trust is basically a reciprocal process: one has to identify to each other. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/193.en.html + The Birthday Tent + Udo + + + PUBLISH + 151@HAR2009@pentabarf.org + 151 + + Policy hacking + Open Source Lobbying, tips from the trenches + englisch + en + 20090813T140000 + 20090813T150000 + 01H00M00S + Policy hacking- Open Source Lobbying, tips from the trenches + In 2007 The Netherlands became the first western country to have a national policy on the mandatory use of open standards and preferential use of opensource software in all public sector organisations (government, educations, healthcare ...). Having been involved in the process of creating this policy I will share some of my lesson learned about policy hacking. This talk will be an update of my 2007 CCC-talk about the same subject. Many things have happened since then and there are new tales to be told. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/151.en.html + The Birthday Tent + Arjen Kamphuis + + + PUBLISH + 151@HAR2009@pentabarf.org + 151 + + Policy hacking + Open Source Lobbying, tips from the trenches + English + en + 20090813T140000 + 20090813T150000 + 01H00M00S + Policy hacking- Open Source Lobbying, tips from the trenches + In 2007 The Netherlands became the first western country to have a national policy on the mandatory use of open standards and preferential use of opensource software in all public sector organisations (government, educations, healthcare ...). Having been involved in the process of creating this policy I will share some of my lesson learned about policy hacking. This talk will be an update of my 2007 CCC-talk about the same subject. Many things have happened since then and there are new tales to be told. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/151.en.html + The Birthday Tent + Arjen Kamphuis + + + PUBLISH + 133@HAR2009@pentabarf.org + 133 + privacy_and_stylometry + Privacy & Stylometry: Practical Attacks Against Authorship Attribution Techniques + Protecting your identity through your writing style: how can attacking stylometry improve privacy? + englisch + en + 20090814T220000 + 20090814T230000 + 01H00M00S + Privacy & Stylometry: Practical Attacks Against Authorship Attribution Techniques- Protecting your identity through your writing style: how can attacking stylometry improve privacy? + The use of statistical AI techniques in authorship recognition (or stylometry) has contributed to literary and historical breakthroughs. These successes have led to the use of these techniques in criminal investigations and prosecutions. However, few have studied adversarial attacks, motivated by a desire to protect anonymity and privacy in a variety of scenarios, and their devastating effect on the robustness of existing classification methods. Our research demonstrates how various types of attacks can reduce the effectiveness of stylometric techniques down to the level of random guessing and worse. These results are made more significant by the fact that the experimental subjects were unfamiliar with stylometric techniques, without specialized knowledge in linguistics, and spent little time on the attacks. Current work based on these results that looks deeper into implications of stylometry on privacy and anonymity on the Internet is also discussed. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/133.en.html + The Birthday Tent + Mike Brennan + + + PUBLISH + 133@HAR2009@pentabarf.org + 133 + privacy_and_stylometry + Privacy & Stylometry: Practical Attacks Against Authorship Attribution Techniques + Protecting your identity through your writing style: how can attacking stylometry improve privacy? + English + en + 20090814T220000 + 20090814T230000 + 01H00M00S + Privacy & Stylometry: Practical Attacks Against Authorship Attribution Techniques- Protecting your identity through your writing style: how can attacking stylometry improve privacy? + The use of statistical AI techniques in authorship recognition (or stylometry) has contributed to literary and historical breakthroughs. These successes have led to the use of these techniques in criminal investigations and prosecutions. However, few have studied adversarial attacks, motivated by a desire to protect anonymity and privacy in a variety of scenarios, and their devastating effect on the robustness of existing classification methods. Our research demonstrates how various types of attacks can reduce the effectiveness of stylometric techniques down to the level of random guessing and worse. These results are made more significant by the fact that the experimental subjects were unfamiliar with stylometric techniques, without specialized knowledge in linguistics, and spent little time on the attacks. Current work based on these results that looks deeper into implications of stylometry on privacy and anonymity on the Internet is also discussed. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/133.en.html + The Birthday Tent + Mike Brennan + + + PUBLISH + 28@HAR2009@pentabarf.org + 28 + programming_the_cloud + Programming the cloud + What will Cloud computing bring + English + en + 20090813T170000 + 20090813T180000 + 01H00M00S + Programming the cloud- What will Cloud computing bring + Cloud computing is rapidly gaining the interest of service providers, programmers and the public as no one wants to miss the new hype. While there are many theories on how the cloud will evolve no real discussion on the programmability has yet taken place. In this talk a programing language named objic is described, that enables programs to run in a distributed manner in the cloud. This is done by creating an object orientated syntax and interpretation environment that can create objects on various distributed locations throughout a network and address them in a scalable, fault tolerant and transparent way. This is followed by a discussion of the problems faced and an outlook into the future. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/28.en.html + The Two Envelopes Tent + Geerd-Dietger Hoffmann + + + PUBLISH + 28@HAR2009@pentabarf.org + 28 + programming_the_cloud + Programming the cloud + What will Cloud computing bring + englisch + en + 20090813T170000 + 20090813T180000 + 01H00M00S + Programming the cloud- What will Cloud computing bring + Cloud computing is rapidly gaining the interest of service providers, programmers and the public as no one wants to miss the new hype. While there are many theories on how the cloud will evolve no real discussion on the programmability has yet taken place. In this talk a programing language named objic is described, that enables programs to run in a distributed manner in the cloud. This is done by creating an object orientated syntax and interpretation environment that can create objects on various distributed locations throughout a network and address them in a scalable, fault tolerant and transparent way. This is followed by a discussion of the problems faced and an outlook into the future. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/28.en.html + The Two Envelopes Tent + Geerd-Dietger Hoffmann + + + PUBLISH + 155@HAR2009@pentabarf.org + 155 + protheses_for_50_USD + Protheses for $50 instead of $250.000 + + English + en + 20090813T140000 + 20090813T150000 + 01H00M00S + Protheses for $50 instead of $250.000 + Protheses voor $40 ipv $250.000 + +In May 2009 the House of Natural Fiber (HONF) from Indonesia was visiting the Netherlands. Their aim: to build cheap leg protheses. They visidet Fablab Amsterdam to build up a comprehensive knowledge base around making protheses and to make contact with experts in the field. Now they are back in Indonesia and applying their knowledge. While a high-tech prothese costs 200.000 Euro and a standard prothese is available for 10.000, the cheapest ones cost $ 150. These are produced and fitted in one day only by Jaipurfoot. Yet HONF's protheses are going to cost a mere $ 50. + +We will present how HONF have built up their knowledge, what the most relevant experiences were for them to take away. And we will report live from Indonesia how the project proceeds. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/155.en.html + The Two Envelopes Tent + Peter Troxler + + + PUBLISH + 155@HAR2009@pentabarf.org + 155 + protheses_for_50_USD + Protheses for $50 instead of $250.000 + + englisch + en + 20090813T140000 + 20090813T150000 + 01H00M00S + Protheses for $50 instead of $250.000 + Protheses voor $40 ipv $250.000 + +In May 2009 the House of Natural Fiber (HONF) from Indonesia was visiting the Netherlands. Their aim: to build cheap leg protheses. They visidet Fablab Amsterdam to build up a comprehensive knowledge base around making protheses and to make contact with experts in the field. Now they are back in Indonesia and applying their knowledge. While a high-tech prothese costs 200.000 Euro and a standard prothese is available for 10.000, the cheapest ones cost $ 150. These are produced and fitted in one day only by Jaipurfoot. Yet HONF's protheses are going to cost a mere $ 50. + +We will present how HONF have built up their knowledge, what the most relevant experiences were for them to take away. And we will report live from Indonesia how the project proceeds. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/155.en.html + The Two Envelopes Tent + Peter Troxler + + + PUBLISH + 89@HAR2009@pentabarf.org + 89 + + Public transport SMS ticket hacking + + englisch + en + 20090815T200000 + 20090815T210000 + 01H00M00S + Public transport SMS ticket hacking + The primary aim of this presentation is to show a serious inherent vulnerability in the public transport SMS tickets system widely used in many big cities. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/89.en.html + The Two Envelopes Tent + Pavol Luptak + + + PUBLISH + 89@HAR2009@pentabarf.org + 89 + + Public transport SMS ticket hacking + + English + en + 20090815T200000 + 20090815T210000 + 01H00M00S + Public transport SMS ticket hacking + The primary aim of this presentation is to show a serious inherent vulnerability in the public transport SMS tickets system widely used in many big cities. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/89.en.html + The Two Envelopes Tent + Pavol Luptak + + + PUBLISH + 157@HAR2009@pentabarf.org + 157 + + Realizing the RFID Guardian + + English + en + 20090816T130000 + 20090816T140000 + 01H00M00S + Realizing the RFID Guardian + The RFID Guardian Project is an initiative to put practical open-source HW/SW tools for RFID Security and Privacy into the hands of security consultants and the general public alike. This talk will discuss Radio Frequency Identification, its security and privacy implications, and will provide the newest information about Version 4 of the RFID Guardian, which we intend to launch soon to the general public. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/157.en.html + Monty Hall + Serge Keyser + + + PUBLISH + 157@HAR2009@pentabarf.org + 157 + + Realizing the RFID Guardian + + englisch + en + 20090816T130000 + 20090816T140000 + 01H00M00S + Realizing the RFID Guardian + The RFID Guardian Project is an initiative to put practical open-source HW/SW tools for RFID Security and Privacy into the hands of security consultants and the general public alike. This talk will discuss Radio Frequency Identification, its security and privacy implications, and will provide the newest information about Version 4 of the RFID Guardian, which we intend to launch soon to the general public. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/157.en.html + Monty Hall + Serge Keyser + + + PUBLISH + 161@HAR2009@pentabarf.org + 161 + yro2 + Relaunch Bits of Freedom + How have digital rights been affected in The Netherlands since 2006? How will Bits of Freedom defend these rights? + English + en + 20090814T160000 + 20090814T170000 + 01H00M00S + Relaunch Bits of Freedom- How have digital rights been affected in The Netherlands since 2006? How will Bits of Freedom defend these rights? + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/161.en.html + The Two Envelopes Tent + Ot van Daalen + + + PUBLISH + 161@HAR2009@pentabarf.org + 161 + yro2 + Relaunch Bits of Freedom + How have digital rights been affected in The Netherlands since 2006? How will Bits of Freedom defend these rights? + englisch + en + 20090814T160000 + 20090814T170000 + 01H00M00S + Relaunch Bits of Freedom- How have digital rights been affected in The Netherlands since 2006? How will Bits of Freedom defend these rights? + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/161.en.html + The Two Envelopes Tent + Ot van Daalen + + + PUBLISH + 207@HAR2009@pentabarf.org + 207 + + Remote Barcode Injection + + + + 20090814T120000 + 20090814T130000 + 01H00M00S + Remote Barcode Injection + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/207.en.html + The Birthday Tent + jbe + + + PUBLISH + 207@HAR2009@pentabarf.org + 207 + + Remote Barcode Injection + + + + 20090814T120000 + 20090814T130000 + 01H00M00S + Remote Barcode Injection + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/207.en.html + The Birthday Tent + jbe + + + PUBLISH + 35@HAR2009@pentabarf.org + 35 + + Results of a Security Assessment of Common Implementation Strategies of the TCP and IP Protocols + + englisch + en + 20090815T210000 + 20090815T220000 + 01H00M00S + Results of a Security Assessment of Common Implementation Strategies of the TCP and IP Protocols + Fernando Gont will present the results of a security assessment of the TCP and IP protocols carried out on behalf of the UK CPNI (United Kingdom's Centre for the Protection of National Infrastructure). He will explain the security implications arising from the protocol specifications themselves, and from a number of implementation strategies followed by most of the popular TCP/IP stacks, and will also discuss the new insights that were gained as a result of this project that can help to mitigate the aforementioned issues. Finally, Fernando will provide an overview of the ongoing efforts at the IETF community to incorporate these insights into the corresponding protocol specifications and the ongoing efforts in the vendor community to incorporate these recommendations into popular implementations of the protocols. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/35.en.html + Monty Hall + + + PUBLISH + 35@HAR2009@pentabarf.org + 35 + + Results of a Security Assessment of Common Implementation Strategies of the TCP and IP Protocols + + English + en + 20090815T210000 + 20090815T220000 + 01H00M00S + Results of a Security Assessment of Common Implementation Strategies of the TCP and IP Protocols + Fernando Gont will present the results of a security assessment of the TCP and IP protocols carried out on behalf of the UK CPNI (United Kingdom's Centre for the Protection of National Infrastructure). He will explain the security implications arising from the protocol specifications themselves, and from a number of implementation strategies followed by most of the popular TCP/IP stacks, and will also discuss the new insights that were gained as a result of this project that can help to mitigate the aforementioned issues. Finally, Fernando will provide an overview of the ongoing efforts at the IETF community to incorporate these insights into the corresponding protocol specifications and the ongoing efforts in the vendor community to incorporate these recommendations into popular implementations of the protocols. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/35.en.html + Monty Hall + + + PUBLISH + 46@HAR2009@pentabarf.org + 46 + rfid_sniffer_workshop + RFID sniffer workshop + Assemble your own RFID sniffer and find RFID tags in your wallet + English + en + 20090815T130000 + 20090815T170000 + 04H00M00S + RFID sniffer workshop- Assemble your own RFID sniffer and find RFID tags in your wallet + Assemble your own RFID sniffer and find RFID tags in your wallet + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/46.en.html + Bike-shed Red + Marc Boon + + + PUBLISH + 46@HAR2009@pentabarf.org + 46 + rfid_sniffer_workshop + RFID sniffer workshop + Assemble your own RFID sniffer and find RFID tags in your wallet + englisch + en + 20090815T130000 + 20090815T170000 + 04H00M00S + RFID sniffer workshop- Assemble your own RFID sniffer and find RFID tags in your wallet + Assemble your own RFID sniffer and find RFID tags in your wallet + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/46.en.html + Bike-shed Red + Marc Boon + + + PUBLISH + 163@HAR2009@pentabarf.org + 163 + rootkits + Rootkits are awesome + Insider Threat for Fun and Profit + englisch + en + 20090813T170000 + 20090813T180000 + 01H00M00S + Rootkits are awesome- Insider Threat for Fun and Profit + Rootkits are awesome: Insider Threat for Fun and Profit +Addressing the insider threat is now rightly recognised as playing a crucial element in improving the security posture of organisations and preventing all kinds of embarrassment. Recent years have seen a growth in all manner of vendors promising panaceas to address ordinary user activities, but what exactly are the solutions offered? In a lot of instances, legitimate rootkits. This talk examines the current state of the insider threat marketplace, the technical solutions to the issues presented, and an actual analysis of user activities in RL and how they may well negate the the promises of vendors and the expectations of security minded organisations. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/163.en.html + Monty Hall + Mike Kemp + + + PUBLISH + 163@HAR2009@pentabarf.org + 163 + rootkits + Rootkits are awesome + Insider Threat for Fun and Profit + English + en + 20090813T170000 + 20090813T180000 + 01H00M00S + Rootkits are awesome- Insider Threat for Fun and Profit + Rootkits are awesome: Insider Threat for Fun and Profit +Addressing the insider threat is now rightly recognised as playing a crucial element in improving the security posture of organisations and preventing all kinds of embarrassment. Recent years have seen a growth in all manner of vendors promising panaceas to address ordinary user activities, but what exactly are the solutions offered? In a lot of instances, legitimate rootkits. This talk examines the current state of the insider threat marketplace, the technical solutions to the issues presented, and an actual analysis of user activities in RL and how they may well negate the the promises of vendors and the expectations of security minded organisations. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/163.en.html + Monty Hall + Mike Kemp + + + PUBLISH + 169@HAR2009@pentabarf.org + 169 + runtime_osx_kernel_patching + Runtime Kernel Patching on Mac OS X + + englisch + en + 20090813T220000 + 20090813T230000 + 01H00M00S + Runtime Kernel Patching on Mac OS X + This talk will focus on rootkit development on Mac OS X. It will cover the basics as well as a couple of (somewhat) new tricks. +We will also talk about rootkit detection on Mac OS X. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/169.en.html + The Two Envelopes Tent + Bosse Eriksson + + + PUBLISH + 169@HAR2009@pentabarf.org + 169 + runtime_osx_kernel_patching + Runtime Kernel Patching on Mac OS X + + English + en + 20090813T220000 + 20090813T230000 + 01H00M00S + Runtime Kernel Patching on Mac OS X + This talk will focus on rootkit development on Mac OS X. It will cover the basics as well as a couple of (somewhat) new tricks. +We will also talk about rootkit detection on Mac OS X. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/169.en.html + The Two Envelopes Tent + Bosse Eriksson + + + PUBLISH + 91@HAR2009@pentabarf.org + 91 + searchengine_censorship + Search engines and censorship + The law and politics of the digital horizon + English + en + 20090813T200000 + 20090813T210000 + 01H00M00S + Search engines and censorship- The law and politics of the digital horizon + Search engines and censorship: the law and politics of the digital horizon + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/91.en.html + Monty Hall + Joris van Hoboken + + + PUBLISH + 91@HAR2009@pentabarf.org + 91 + searchengine_censorship + Search engines and censorship + The law and politics of the digital horizon + englisch + en + 20090813T200000 + 20090813T210000 + 01H00M00S + Search engines and censorship- The law and politics of the digital horizon + Search engines and censorship: the law and politics of the digital horizon + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/91.en.html + Monty Hall + Joris van Hoboken + + + PUBLISH + 173@HAR2009@pentabarf.org + 173 + securing_networks + Securing networks from an ISP perspective + The role of the JANET CSIRT + English + en + 20090813T220000 + 20090813T230000 + 01H00M00S + Securing networks from an ISP perspective- The role of the JANET CSIRT + As an ISP attempting to secure a large network with 18 million users and 40Gbs link speeds is a challenging task, this talk will discuss how we attempt to make the JANET network a safer place for its users and the Internet. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/173.en.html + The Birthday Tent + Bradley Freeman + + + PUBLISH + 173@HAR2009@pentabarf.org + 173 + securing_networks + Securing networks from an ISP perspective + The role of the JANET CSIRT + englisch + en + 20090813T220000 + 20090813T230000 + 01H00M00S + Securing networks from an ISP perspective- The role of the JANET CSIRT + As an ISP attempting to secure a large network with 18 million users and 40Gbs link speeds is a challenging task, this talk will discuss how we attempt to make the JANET network a safer place for its users and the Internet. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/173.en.html + The Birthday Tent + Bradley Freeman + + + PUBLISH + 167@HAR2009@pentabarf.org + 167 + + Side channel analysis and fault injection + Is that a smart card in your pocket? + English + en + 20090814T150000 + 20090814T160000 + 01H00M00S + Side channel analysis and fault injection- Is that a smart card in your pocket? + This talk explores the world of side channel analysis and fault injection on smart cards. The basics of side channel analysis are explained and it is demonstrated how a differential power attack works on a (not state of the art) smartcard. Furthermore, I will explain how fault injection is performed using a simple flashlight (and an advanced laser setup). + +This is a Side channel '101' lecture and should be interesting for anyone with an interest in hardware hacking, crypto and security. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/167.en.html + Monty Hall + Jasper van Woudenberg + + + PUBLISH + 167@HAR2009@pentabarf.org + 167 + + Side channel analysis and fault injection + Is that a smart card in your pocket? + englisch + en + 20090814T150000 + 20090814T160000 + 01H00M00S + Side channel analysis and fault injection- Is that a smart card in your pocket? + This talk explores the world of side channel analysis and fault injection on smart cards. The basics of side channel analysis are explained and it is demonstrated how a differential power attack works on a (not state of the art) smartcard. Furthermore, I will explain how fault injection is performed using a simple flashlight (and an advanced laser setup). + +This is a Side channel '101' lecture and should be interesting for anyone with an interest in hardware hacking, crypto and security. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/167.en.html + Monty Hall + Jasper van Woudenberg + + + PUBLISH + 132@HAR2009@pentabarf.org + 132 + + Side channel analysis on embedded systems + + englisch + en + 20090815T130000 + 20090815T140000 + 01H00M00S + Side channel analysis on embedded systems + The presentation briefly introduces the state of the art analysis techniques used on smart cards today. Further, we define the types of embedded systems that these attacks may apply to. Then we illustrate the differences and commonalities of side channel analysis on smart cards and embedded systems. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/132.en.html + The Two Envelopes Tent + Job de Haas + + + PUBLISH + 132@HAR2009@pentabarf.org + 132 + + Side channel analysis on embedded systems + + English + en + 20090815T130000 + 20090815T140000 + 01H00M00S + Side channel analysis on embedded systems + The presentation briefly introduces the state of the art analysis techniques used on smart cards today. Further, we define the types of embedded systems that these attacks may apply to. Then we illustrate the differences and commonalities of side channel analysis on smart cards and embedded systems. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/132.en.html + The Two Envelopes Tent + Job de Haas + + + PUBLISH + 139@HAR2009@pentabarf.org + 139 + smallsister_workshop + SmallSister or how to defeat data retention + Circumventing bureaucrats + English + en + 20090814T130000 + 20090814T140000 + 01H00M00S + SmallSister or how to defeat data retention- Circumventing bureaucrats + Data retention is one of the biggest dangers of free speech and a free society. Now there is software that at least secures e-mail. The best of all: it's easy to use and fully functional. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/139.en.html + Bike-shed Green + Brenno de Winter + + + PUBLISH + 139@HAR2009@pentabarf.org + 139 + smallsister_workshop + SmallSister or how to defeat data retention + Circumventing bureaucrats + englisch + en + 20090814T130000 + 20090814T140000 + 01H00M00S + SmallSister or how to defeat data retention- Circumventing bureaucrats + Data retention is one of the biggest dangers of free speech and a free society. Now there is software that at least secures e-mail. The best of all: it's easy to use and fully functional. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/139.en.html + Bike-shed Green + Brenno de Winter + + + PUBLISH + 128@HAR2009@pentabarf.org + 128 + + Sniffing cable modems + + English + en + 20090816T140000 + 20090816T150000 + 01H00M00S + Sniffing cable modems + Cable modems are widely used these days for internet connections or other applications. This talk gives a detailed overview of this mean of communication with a focus on its security. Additionally, I'll show how network forensics can easily be used with this media along with a few new attacks which can now be implemented thanks to the information being gathered. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/128.en.html + The Birthday Tent + Guy Martin + + + PUBLISH + 128@HAR2009@pentabarf.org + 128 + + Sniffing cable modems + + englisch + en + 20090816T140000 + 20090816T150000 + 01H00M00S + Sniffing cable modems + Cable modems are widely used these days for internet connections or other applications. This talk gives a detailed overview of this mean of communication with a focus on its security. Additionally, I'll show how network forensics can easily be used with this media along with a few new attacks which can now be implemented thanks to the information being gathered. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/128.en.html + The Birthday Tent + Guy Martin + + + PUBLISH + 51@HAR2009@pentabarf.org + 51 + statistics_and_law + Statistics and the Law + The case of Lucia de B., alleged serial killer, and others. + englisch + en + 20090815T160000 + 20090815T170000 + 01H00M00S + Statistics and the Law- The case of Lucia de B., alleged serial killer, and others. + The case of Lucia de B. is a highly controversial legal case in the +Netherlands, in which a statistically significant correlation between the +presence of a particular nurse and the occurrence of suspicious medical +incidents on her ward played a central role in getting her a life +conviction for serial murder. However, recent re-investigation of the +meagre medical evidence for wrong-doing, and re-investigation of the +statistics, makes it very plausible that no murders were committed at all, +by anybody. The Dutch supreme court has recently overturned the conviction +and a re-trial has started start. + +However a motto of the Dutch legal system could be "learning represents the possibility of failure and must thus be avoided if possible". Though innocence was obvious (to the well informed), the conviction was legally speaking watertight and irreversible. Yet a small band of "terrorists" (as they were characterized in legal magazines) managed to convince the legal system that this had to change, and change it did. How did they do it? Hacking into a complex human system... use it to make it do the work for you. + +Slides of the talk: http://www.math.leidenuniv.nl/~gill/Lucia.pdf + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/51.en.html + The Two Envelopes Tent + Richard Gill + + + PUBLISH + 51@HAR2009@pentabarf.org + 51 + statistics_and_law + Statistics and the Law + The case of Lucia de B., alleged serial killer, and others. + English + en + 20090815T160000 + 20090815T170000 + 01H00M00S + Statistics and the Law- The case of Lucia de B., alleged serial killer, and others. + The case of Lucia de B. is a highly controversial legal case in the +Netherlands, in which a statistically significant correlation between the +presence of a particular nurse and the occurrence of suspicious medical +incidents on her ward played a central role in getting her a life +conviction for serial murder. However, recent re-investigation of the +meagre medical evidence for wrong-doing, and re-investigation of the +statistics, makes it very plausible that no murders were committed at all, +by anybody. The Dutch supreme court has recently overturned the conviction +and a re-trial has started start. + +However a motto of the Dutch legal system could be "learning represents the possibility of failure and must thus be avoided if possible". Though innocence was obvious (to the well informed), the conviction was legally speaking watertight and irreversible. Yet a small band of "terrorists" (as they were characterized in legal magazines) managed to convince the legal system that this had to change, and change it did. How did they do it? Hacking into a complex human system... use it to make it do the work for you. + +Slides of the talk: http://www.math.leidenuniv.nl/~gill/Lucia.pdf + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/51.en.html + The Two Envelopes Tent + Richard Gill + + + PUBLISH + 86@HAR2009@pentabarf.org + 86 + stoned_bootkit + Stoned Bootkit + The Rise of MBR Rootkits & Bootkits in the Wild + English + en + 20090814T220000 + 20090814T230000 + 01H00M00S + Stoned Bootkit- The Rise of MBR Rootkits & Bootkits in the Wild + Stoned Bootkit is a new Windows bootkit. It is loaded before Windows starts and is memory resident up to the Windows kernel. Thus Stoned is executed beside the Windows kernel and has full access to the entire system. It attacks all Windows versions including XP, Vista and 7. It has exciting features like integrated file system drivers, automatic Windows pwning, plugins, boot applications, and much much more. Inside it is a small operating system! It finally goes back to the roots. So in this way, + +Your PC is now Stoned! ..again + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/86.en.html + The Two Envelopes Tent + Peter Kleissner + + + PUBLISH + 86@HAR2009@pentabarf.org + 86 + stoned_bootkit + Stoned Bootkit + The Rise of MBR Rootkits & Bootkits in the Wild + englisch + en + 20090814T220000 + 20090814T230000 + 01H00M00S + Stoned Bootkit- The Rise of MBR Rootkits & Bootkits in the Wild + Stoned Bootkit is a new Windows bootkit. It is loaded before Windows starts and is memory resident up to the Windows kernel. Thus Stoned is executed beside the Windows kernel and has full access to the entire system. It attacks all Windows versions including XP, Vista and 7. It has exciting features like integrated file system drivers, automatic Windows pwning, plugins, boot applications, and much much more. Inside it is a small operating system! It finally goes back to the roots. So in this way, + +Your PC is now Stoned! ..again + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/86.en.html + The Two Envelopes Tent + Peter Kleissner + + + PUBLISH + 174@HAR2009@pentabarf.org + 174 + + Surveillance Self-Defense + Teaching the community to defend itself against surveillance + englisch + en + 20090815T200000 + 20090815T210000 + 01H00M00S + Surveillance Self-Defense- Teaching the community to defend itself against surveillance + EFF created the Surveillance Self-Defense project (https://ssd.eff.org) to teach individuals and organisations within the U.S. about legal and technological strategies which can be used to minimise surveillance threats from US government actors. In this talk, we will discuss the lessons from this project and how to adapt or extend them to the European context. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/174.en.html + Monty Hall + Peter Eckersley + + + PUBLISH + 174@HAR2009@pentabarf.org + 174 + + Surveillance Self-Defense + Teaching the community to defend itself against surveillance + English + en + 20090815T200000 + 20090815T210000 + 01H00M00S + Surveillance Self-Defense- Teaching the community to defend itself against surveillance + EFF created the Surveillance Self-Defense project (https://ssd.eff.org) to teach individuals and organisations within the U.S. about legal and technological strategies which can be used to minimise surveillance threats from US government actors. In this talk, we will discuss the lessons from this project and how to adapt or extend them to the European context. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/174.en.html + Monty Hall + Peter Eckersley + + + PUBLISH + 171@HAR2009@pentabarf.org + 171 + internetz_are_pwned + Teh Internetz are pwned + How I learned to stop worrying and love teh Internetz + englisch + en + 20090813T160000 + 20090813T170000 + 01H00M00S + Teh Internetz are pwned- How I learned to stop worrying and love teh Internetz + Working as an operational Security Officer at an ISP for the better part of a decade brings with it many adventures, challenges, laughs and tears. This talk will cover some of the most recent issues to be causing hair loss to someone who can't afford it. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/171.en.html + Monty Hall + Scott McIntyre + + + PUBLISH + 171@HAR2009@pentabarf.org + 171 + internetz_are_pwned + Teh Internetz are pwned + How I learned to stop worrying and love teh Internetz + English + en + 20090813T160000 + 20090813T170000 + 01H00M00S + Teh Internetz are pwned- How I learned to stop worrying and love teh Internetz + Working as an operational Security Officer at an ISP for the better part of a decade brings with it many adventures, challenges, laughs and tears. This talk will cover some of the most recent issues to be causing hair loss to someone who can't afford it. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/171.en.html + Monty Hall + Scott McIntyre + + + PUBLISH + 114@HAR2009@pentabarf.org + 114 + tempest + TEMPEST for the casual election hacker + The 80s are calling and want their sploits back + English + en + 20090814T160000 + 20090814T170000 + 01H00M00S + TEMPEST for the casual election hacker- The 80s are calling and want their sploits back + Yes, German NEDAPs have TEMPEST issues too, and we have proof. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/114.en.html + Monty Hall + Andreas Bogk + + + PUBLISH + 114@HAR2009@pentabarf.org + 114 + tempest + TEMPEST for the casual election hacker + The 80s are calling and want their sploits back + englisch + en + 20090814T160000 + 20090814T170000 + 01H00M00S + TEMPEST for the casual election hacker- The 80s are calling and want their sploits back + Yes, German NEDAPs have TEMPEST issues too, and we have proof. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/114.en.html + Monty Hall + Andreas Bogk + + + PUBLISH + 156@HAR2009@pentabarf.org + 156 + censoring_mob + The Censoring Mob + How Social Media Destroy Freedom of Expression - And Why That Might Be a Good Thing + englisch + en + 20090813T220000 + 20090813T230000 + 01H00M00S + The Censoring Mob- How Social Media Destroy Freedom of Expression - And Why That Might Be a Good Thing + Social media is supposed to foster free speech by creating user-friendly web applications that let people talk, share ideas, and organize online. Instead it has created a new form of censorship, led by mobs who flag content as "inappropriate" to remove it, or who troll their victims out of existence. This talk will explore how these mobs work, what their politics are, and whether we should organize to stop them - or join them. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/156.en.html + Monty Hall + Annalee Newitz + + + PUBLISH + 156@HAR2009@pentabarf.org + 156 + censoring_mob + The Censoring Mob + How Social Media Destroy Freedom of Expression - And Why That Might Be a Good Thing + English + en + 20090813T220000 + 20090813T230000 + 01H00M00S + The Censoring Mob- How Social Media Destroy Freedom of Expression - And Why That Might Be a Good Thing + Social media is supposed to foster free speech by creating user-friendly web applications that let people talk, share ideas, and organize online. Instead it has created a new form of censorship, led by mobs who flag content as "inappropriate" to remove it, or who troll their victims out of existence. This talk will explore how these mobs work, what their politics are, and whether we should organize to stop them - or join them. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/156.en.html + Monty Hall + Annalee Newitz + + + PUBLISH + 62@HAR2009@pentabarf.org + 62 + ethics_of_piracy + The Complex Ethics of Piracy + Theft, civil disobedience, or something else? + englisch + en + 20090813T210000 + 20090813T220000 + 01H00M00S + The Complex Ethics of Piracy- Theft, civil disobedience, or something else? + The Complex Ethics of Piracy + +This talk aims to replace the "piracy is good" vs "piracy is theft" debate with a more nuanced understanding. It will investigate when piracy is selfish; when it is civil disobedience; whether it is ever constructive for cultural industries, or whether it is ever, as copyright holders argue, "theft". + +I will conclude that each of these things is *sometimes* true about piracy, and that simple views are inadequate for understanding the ethical dimension of copyright infringement. Both pirates and copyright industries need to develop more subtle understandings of the morality of file sharing. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/62.en.html + Monty Hall + Peter Eckersley + + + PUBLISH + 62@HAR2009@pentabarf.org + 62 + ethics_of_piracy + The Complex Ethics of Piracy + Theft, civil disobedience, or something else? + English + en + 20090813T210000 + 20090813T220000 + 01H00M00S + The Complex Ethics of Piracy- Theft, civil disobedience, or something else? + The Complex Ethics of Piracy + +This talk aims to replace the "piracy is good" vs "piracy is theft" debate with a more nuanced understanding. It will investigate when piracy is selfish; when it is civil disobedience; whether it is ever constructive for cultural industries, or whether it is ever, as copyright holders argue, "theft". + +I will conclude that each of these things is *sometimes* true about piracy, and that simple views are inadequate for understanding the ethical dimension of copyright infringement. Both pirates and copyright industries need to develop more subtle understandings of the morality of file sharing. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/62.en.html + Monty Hall + Peter Eckersley + + + PUBLISH + 95@HAR2009@pentabarf.org + 95 + carrier_grade_nat + The dangers (and merits) of carrier grade nat + Living in the twilight zone + English + en + 20090814T170000 + 20090814T180000 + 01H00M00S + The dangers (and merits) of carrier grade nat- Living in the twilight zone + As the point of IPv4 address depletion comes nearer it's getting clear the world won't be ready for large scale IPv6 deployment, at the same time expectations are IPv4 will be around for the next 40 years. To circumvent the problems this introduces large scale translation needs to take place to have the old world connect to the new world and make sure enough addresses are available. All these solutions introduce large scale NAT deployments or carrier grade nats. This will introduce the basic mechanisms used, after which you as the audience is inivted to comment on it. Hopefully sparking a discussion about the good anf bad things of these concepts and things people should become aware of. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/95.en.html + The Birthday Tent + Marco Hogewoning + + + PUBLISH + 95@HAR2009@pentabarf.org + 95 + carrier_grade_nat + The dangers (and merits) of carrier grade nat + Living in the twilight zone + englisch + en + 20090814T170000 + 20090814T180000 + 01H00M00S + The dangers (and merits) of carrier grade nat- Living in the twilight zone + As the point of IPv4 address depletion comes nearer it's getting clear the world won't be ready for large scale IPv6 deployment, at the same time expectations are IPv4 will be around for the next 40 years. To circumvent the problems this introduces large scale translation needs to take place to have the old world connect to the new world and make sure enough addresses are available. All these solutions introduce large scale NAT deployments or carrier grade nats. This will introduce the basic mechanisms used, after which you as the audience is inivted to comment on it. Hopefully sparking a discussion about the good anf bad things of these concepts and things people should become aware of. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/95.en.html + The Birthday Tent + Marco Hogewoning + + + PUBLISH + 120@HAR2009@pentabarf.org + 120 + jtag_howto + The Embedded JTAG interface HOWTO + What's a JTAG interface and how to find it? + English + en + 20090813T160000 + 20090813T170000 + 01H00M00S + The Embedded JTAG interface HOWTO- What's a JTAG interface and how to find it? + This presentation is all about the JTAG interface, commonly found in embedded devices such as (wireless) routers, satellite receivers and coffee machines. It will start with a trip down memory lane: the intended use of the JTAG interface, and why you would like to have access to it. The story continues with a guide on how to find it - visually and electronically. the round-up is how chip manufacturers like to prevent us from getting access. + + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/120.en.html + The Two Envelopes Tent + Gerrit van der Bij + + + PUBLISH + 120@HAR2009@pentabarf.org + 120 + jtag_howto + The Embedded JTAG interface HOWTO + What's a JTAG interface and how to find it? + englisch + en + 20090813T160000 + 20090813T170000 + 01H00M00S + The Embedded JTAG interface HOWTO- What's a JTAG interface and how to find it? + This presentation is all about the JTAG interface, commonly found in embedded devices such as (wireless) routers, satellite receivers and coffee machines. It will start with a trip down memory lane: the intended use of the JTAG interface, and why you would like to have access to it. The story continues with a guide on how to find it - visually and electronically. the round-up is how chip manufacturers like to prevent us from getting access. + + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/120.en.html + The Two Envelopes Tent + Gerrit van der Bij + + + PUBLISH + 7@HAR2009@pentabarf.org + 7 + as400_introduction + The IBM AS/400 + A technical introduction + English + en + 20090814T110000 + 20090814T120000 + 01H00M00S + The IBM AS/400- A technical introduction + This talk is intended for people who say "what the hell is an AS/400, what's so special about it / how does it work?". + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/7.en.html + The Two Envelopes Tent + Tom van Looy + + + PUBLISH + 7@HAR2009@pentabarf.org + 7 + as400_introduction + The IBM AS/400 + A technical introduction + englisch + en + 20090814T110000 + 20090814T120000 + 01H00M00S + The IBM AS/400- A technical introduction + This talk is intended for people who say "what the hell is an AS/400, what's so special about it / how does it work?". + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/7.en.html + The Two Envelopes Tent + Tom van Looy + + + PUBLISH + 134@HAR2009@pentabarf.org + 134 + power_of_decentralization + The power of decentralization + Agent-based simulation of a decentralized power network + englisch + en + 20090815T160000 + 20090815T170000 + 01H00M00S + The power of decentralization- Agent-based simulation of a decentralized power network + MADMAX AGAINST THE POWER OF DECENTRALIZATION +============================================ + +In a world where oil is scarce, violence, chaos and desperation rein. +But what about our world without power? Electricity has become vital +for all these appliances that make our daily life so enjoyable. Our +network, our tellies our fridges and freezers are as dependent on +their power supply that we are on them. In this paper, or should we +say in this fiction note, we investigate how a citizen based +decentralized power system could work and how an auction based bidding +system could insentivize people to switch off their devices so that +others, more eager to consume, could benefit from their spare capacity. +Would the theory of auction, combined with the next generation of micro +power sources, restore order in a place where scarcity would otherwise +prevail? + +On a more serious tone, we propose to first summarize what decentralized +power means today. We them bring the existing technology to a next hypothetical step +where sophisticated appliances are able to communicate with an electronic exchange +to make deals, confronting demand with offer. + +In order to study such a system, we collect realistic data and build a +simulator where households are equiped with solar panels, micro-turbines and +consumption devices that can potentially postpone or cancel their activity +on the basis of a utility function that is tuned by household members to suit +their need. The added flexibility is twofold. First, an added power capacity +is available due to the endogenous power supply available to the next generation +houses. Secondly, as users can tailor their activities, the aggregated +consumption pattern is smoothed out potentially leaving room for added efficiency. + +The contribution of this research is to shed the light on the quantitative figures +that make up such a network. What amount of flexibility and more crucially how +different should the utility functions be to flatten out the consumption +pattern so typical of our current system? + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/134.en.html + The Birthday Tent + Laurent de Wolf + Vincent Guffens + + + PUBLISH + 134@HAR2009@pentabarf.org + 134 + power_of_decentralization + The power of decentralization + Agent-based simulation of a decentralized power network + English + en + 20090815T160000 + 20090815T170000 + 01H00M00S + The power of decentralization- Agent-based simulation of a decentralized power network + MADMAX AGAINST THE POWER OF DECENTRALIZATION +============================================ + +In a world where oil is scarce, violence, chaos and desperation rein. +But what about our world without power? Electricity has become vital +for all these appliances that make our daily life so enjoyable. Our +network, our tellies our fridges and freezers are as dependent on +their power supply that we are on them. In this paper, or should we +say in this fiction note, we investigate how a citizen based +decentralized power system could work and how an auction based bidding +system could insentivize people to switch off their devices so that +others, more eager to consume, could benefit from their spare capacity. +Would the theory of auction, combined with the next generation of micro +power sources, restore order in a place where scarcity would otherwise +prevail? + +On a more serious tone, we propose to first summarize what decentralized +power means today. We them bring the existing technology to a next hypothetical step +where sophisticated appliances are able to communicate with an electronic exchange +to make deals, confronting demand with offer. + +In order to study such a system, we collect realistic data and build a +simulator where households are equiped with solar panels, micro-turbines and +consumption devices that can potentially postpone or cancel their activity +on the basis of a utility function that is tuned by household members to suit +their need. The added flexibility is twofold. First, an added power capacity +is available due to the endogenous power supply available to the next generation +houses. Secondly, as users can tailor their activities, the aggregated +consumption pattern is smoothed out potentially leaving room for added efficiency. + +The contribution of this research is to shed the light on the quantitative figures +that make up such a network. What amount of flexibility and more crucially how +different should the utility functions be to flatten out the consumption +pattern so typical of our current system? + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/134.en.html + The Birthday Tent + Laurent de Wolf + Vincent Guffens + + + PUBLISH + 56@HAR2009@pentabarf.org + 56 + cartoon_quizz + The Super Awesome Cartoon Quizz 2009 + Test your knowledge on cartoons from past and present + English + en + 20090814T220000 + 20090814T230000 + 01H00M00S + The Super Awesome Cartoon Quizz 2009- Test your knowledge on cartoons from past and present + Quiz with a lot of questions about all sorts of cartoons. Both old and new cartoons will be tested. There are modest prizes to win. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/56.en.html + Monty Hall + Elger 'Stitch' Jonker + + + PUBLISH + 56@HAR2009@pentabarf.org + 56 + cartoon_quizz + The Super Awesome Cartoon Quizz 2009 + Test your knowledge on cartoons from past and present + englisch + en + 20090814T220000 + 20090814T230000 + 01H00M00S + The Super Awesome Cartoon Quizz 2009- Test your knowledge on cartoons from past and present + Quiz with a lot of questions about all sorts of cartoons. Both old and new cartoons will be tested. There are modest prizes to win. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/56.en.html + Monty Hall + Elger 'Stitch' Jonker + + + PUBLISH + 40@HAR2009@pentabarf.org + 40 + zeus_evolution + The ZeuS evolution + A malware case study.. + englisch + en + 20090813T210000 + 20090813T220000 + 01H00M00S + The ZeuS evolution- A malware case study.. + The talk is intended to give an insight view of todays malware - major players, behavior and institutions involved. The focus will be on one of the main malware family we face today: Zeus / Zbot / Wsnpoem. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/40.en.html + The Two Envelopes Tent + Clemens Kurtenbach + + + PUBLISH + 40@HAR2009@pentabarf.org + 40 + zeus_evolution + The ZeuS evolution + A malware case study.. + English + en + 20090813T210000 + 20090813T220000 + 01H00M00S + The ZeuS evolution- A malware case study.. + The talk is intended to give an insight view of todays malware - major players, behavior and institutions involved. The focus will be on one of the main malware family we face today: Zeus / Zbot / Wsnpoem. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/40.en.html + The Two Envelopes Tent + Clemens Kurtenbach + + + PUBLISH + 178@HAR2009@pentabarf.org + 178 + designcontest + (Un)limited design + Open Design + englisch + en + 20090813T130000 + 20090813T140000 + 01H00M00S + (Un)limited design- Open Design + (un)limited Design Contest invites anybody -- designers, makers, amateurs -- to submit their own designs in the area of form, fashion and food. Unique about the (un)limited Design Contest is that all designs are open for anybody to be used, re-interpreted and redesigned. These derivative designs are also entitled to take part in the contest -- even more: copying and improving designs is strongly encouraged. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/178.en.html + The Two Envelopes Tent + Adrian Bowyer + Neil Gershenfeld + Ronen Kadushin + + + PUBLISH + 178@HAR2009@pentabarf.org + 178 + designcontest + (Un)limited design + Open Design + English + en + 20090813T130000 + 20090813T140000 + 01H00M00S + (Un)limited design- Open Design + (un)limited Design Contest invites anybody -- designers, makers, amateurs -- to submit their own designs in the area of form, fashion and food. Unique about the (un)limited Design Contest is that all designs are open for anybody to be used, re-interpreted and redesigned. These derivative designs are also entitled to take part in the contest -- even more: copying and improving designs is strongly encouraged. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/178.en.html + The Two Envelopes Tent + Adrian Bowyer + Neil Gershenfeld + Ronen Kadushin + + + PUBLISH + 190@HAR2009@pentabarf.org + 190 + + (Un)limited design contest - Friday Session + Open Design + englisch + en + 20090814T110000 + 20090814T180000 + 07H00M00S + (Un)limited design contest - Friday Session- Open Design + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/190.en.html + Bike-shed Yellow + Ronen Kadushin + + + PUBLISH + 190@HAR2009@pentabarf.org + 190 + + (Un)limited design contest - Friday Session + Open Design + English + en + 20090814T110000 + 20090814T180000 + 07H00M00S + (Un)limited design contest - Friday Session- Open Design + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/190.en.html + Bike-shed Yellow + Ronen Kadushin + + + PUBLISH + 191@HAR2009@pentabarf.org + 191 + + (Un)limited design contest - Saturday Session + Open Design + englisch + en + 20090815T110000 + 20090815T150000 + 04H00M00S + (Un)limited design contest - Saturday Session- Open Design + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/191.en.html + Bike-shed Yellow + Ronen Kadushin + + + PUBLISH + 191@HAR2009@pentabarf.org + 191 + + (Un)limited design contest - Saturday Session + Open Design + English + en + 20090815T110000 + 20090815T150000 + 04H00M00S + (Un)limited design contest - Saturday Session- Open Design + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/191.en.html + Bike-shed Yellow + Ronen Kadushin + + + PUBLISH + 192@HAR2009@pentabarf.org + 192 + + (Un)limited design contest- Sunday Session + Open Design + englisch + en + 20090816T110000 + 20090816T150000 + 04H00M00S + (Un)limited design contest- Sunday Session- Open Design + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/192.en.html + Bike-shed Yellow + Ronen Kadushin + + + PUBLISH + 192@HAR2009@pentabarf.org + 192 + + (Un)limited design contest- Sunday Session + Open Design + English + en + 20090816T110000 + 20090816T150000 + 04H00M00S + (Un)limited design contest- Sunday Session- Open Design + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/192.en.html + Bike-shed Yellow + Ronen Kadushin + + + PUBLISH + 189@HAR2009@pentabarf.org + 189 + + (Un)limited design contest - Thursday Session + Open Design + englisch + en + 20090813T150000 + 20090813T180000 + 03H00M00S + (Un)limited design contest - Thursday Session- Open Design + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/189.en.html + Bike-shed Yellow + Ronen Kadushin + + + PUBLISH + 189@HAR2009@pentabarf.org + 189 + + (Un)limited design contest - Thursday Session + Open Design + English + en + 20090813T150000 + 20090813T180000 + 03H00M00S + (Un)limited design contest - Thursday Session- Open Design + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/189.en.html + Bike-shed Yellow + Ronen Kadushin + + + PUBLISH + 138@HAR2009@pentabarf.org + 138 + unusual_lockpicking + Unusual lock picking + There's more than five pin tumblers + englisch + en + 20090815T200000 + 20090815T210000 + 01H00M00S + Unusual lock picking- There's more than five pin tumblers + A talk about some not so common, newly developed or unpublished attacks on some special (including maximum security) locks. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/138.en.html + The Birthday Tent + iggy + mh + Ray + + + PUBLISH + 138@HAR2009@pentabarf.org + 138 + unusual_lockpicking + Unusual lock picking + There's more than five pin tumblers + English + en + 20090815T200000 + 20090815T210000 + 01H00M00S + Unusual lock picking- There's more than five pin tumblers + A talk about some not so common, newly developed or unpublished attacks on some special (including maximum security) locks. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/138.en.html + The Birthday Tent + iggy + mh + Ray + + + PUBLISH + 80@HAR2009@pentabarf.org + 80 + sputnik_data + View from the orbit + Sputnik data description and analysis + English + en + 20090814T110000 + 20090814T120000 + 01H00M00S + View from the orbit- Sputnik data description and analysis + This presentation describes analysis of Sputnik data gathered during +24C3 and 25C3. It shows how simple techniques can be used to gather +knowledge about previous Congress participants. + +24C3 was the second Congress during which Sputnik tracking system was +used. Sputnik tags were given new firmware and more stations were +deployed this time. Less participants took part in Sputnik experiment +than during previous congress, but more data was acquired. +During 25C3 tags were equipped with firmware able to detect social +interactions, and tags were able to communicate with each other, +not only with the system. + +Techniques described in this talk can also be used in analysing data gathered from other sources, like cellular phones or bluetooth devices. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/80.en.html + Monty Hall + Tomasz Rybak + + + PUBLISH + 80@HAR2009@pentabarf.org + 80 + sputnik_data + View from the orbit + Sputnik data description and analysis + englisch + en + 20090814T110000 + 20090814T120000 + 01H00M00S + View from the orbit- Sputnik data description and analysis + This presentation describes analysis of Sputnik data gathered during +24C3 and 25C3. It shows how simple techniques can be used to gather +knowledge about previous Congress participants. + +24C3 was the second Congress during which Sputnik tracking system was +used. Sputnik tags were given new firmware and more stations were +deployed this time. Less participants took part in Sputnik experiment +than during previous congress, but more data was acquired. +During 25C3 tags were equipped with firmware able to detect social +interactions, and tags were able to communicate with each other, +not only with the system. + +Techniques described in this talk can also be used in analysing data gathered from other sources, like cellular phones or bluetooth devices. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/80.en.html + Monty Hall + Tomasz Rybak + + + PUBLISH + 126@HAR2009@pentabarf.org + 126 + webappinsec + WebAppInSec : 101 threats + The dirty tricks of the black art of WebAppInSec + englisch + en + 20090814T170000 + 20090814T180000 + 01H00M00S + WebAppInSec : 101 threats- The dirty tricks of the black art of WebAppInSec + About different types of (old)web application threats, how to find them and how to exploit them. The dirty tricks of the black art of WebAppInSec. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/126.en.html + The Two Envelopes Tent + Jacco van Tuijl + + + PUBLISH + 126@HAR2009@pentabarf.org + 126 + webappinsec + WebAppInSec : 101 threats + The dirty tricks of the black art of WebAppInSec + English + en + 20090814T170000 + 20090814T180000 + 01H00M00S + WebAppInSec : 101 threats- The dirty tricks of the black art of WebAppInSec + About different types of (old)web application threats, how to find them and how to exploit them. The dirty tricks of the black art of WebAppInSec. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/126.en.html + The Two Envelopes Tent + Jacco van Tuijl + + + PUBLISH + 16@HAR2009@pentabarf.org + 16 + + When nerds dream big + Nuancing a wireless utopia + English + en + 20090814T200000 + 20090814T210000 + 01H00M00S + When nerds dream big- Nuancing a wireless utopia + This talk will delve into my thesis on the growing criticism of Mark Weiser’s Ubiquitous Computing vision, a twenty year old ideal which still stands at the heart of our craving for location based services, smartphones and self-parking cars. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/16.en.html + The Birthday Tent + Tijmen Schep + + + PUBLISH + 16@HAR2009@pentabarf.org + 16 + + When nerds dream big + Nuancing a wireless utopia + englisch + en + 20090814T200000 + 20090814T210000 + 01H00M00S + When nerds dream big- Nuancing a wireless utopia + This talk will delve into my thesis on the growing criticism of Mark Weiser’s Ubiquitous Computing vision, a twenty year old ideal which still stands at the heart of our craving for location based services, smartphones and self-parking cars. + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/16.en.html + The Birthday Tent + Tijmen Schep + + + PUBLISH + 33@HAR2009@pentabarf.org + 33 + why_tor_is_slow + Why Tor is slow + and what we're doing about it + English + en + 20090814T210000 + 20090814T220000 + 01H00M00S + Why Tor is slow- and what we're doing about it + Many of you have probably tried Tor, and then stopped because you found +it too slow. Now that Tor has several hundred thousand users, our original +design decisions are showing their age. We need to figure out and +deploy some major changes if we want the Tor network to scale up to the +million-user mark. + +Problem #1 is that Tor's congestion control does not work well. We need +to come up with ways to let "quiet" streams like web browsing co-exist +better with "loud" streams like bulk transfer. Problem #2 is that some +Tor users simply put too much traffic onto the network relative to the +amount they contribute, so we need to work on ways to limit the effects +of those users and/or provide priority to the other users. Problem #3 +is that the Tor network simply doesn't have enough capacity to handle +all the users that want privacy on the Internet. We need to develop +strategies for increasing the overall community of relays, and consider +introducing incentives to make the network more self-sustaining. + +In this talk I'll walk through these problems and more: why we think +these are the right problems to solve, and how we're solving them. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/33.en.html + The Birthday Tent + Roger Dingledine + + + PUBLISH + 33@HAR2009@pentabarf.org + 33 + why_tor_is_slow + Why Tor is slow + and what we're doing about it + englisch + en + 20090814T210000 + 20090814T220000 + 01H00M00S + Why Tor is slow- and what we're doing about it + Many of you have probably tried Tor, and then stopped because you found +it too slow. Now that Tor has several hundred thousand users, our original +design decisions are showing their age. We need to figure out and +deploy some major changes if we want the Tor network to scale up to the +million-user mark. + +Problem #1 is that Tor's congestion control does not work well. We need +to come up with ways to let "quiet" streams like web browsing co-exist +better with "loud" streams like bulk transfer. Problem #2 is that some +Tor users simply put too much traffic onto the network relative to the +amount they contribute, so we need to work on ways to limit the effects +of those users and/or provide priority to the other users. Problem #3 +is that the Tor network simply doesn't have enough capacity to handle +all the users that want privacy on the Internet. We need to develop +strategies for increasing the overall community of relays, and consider +introducing incentives to make the network more self-sustaining. + +In this talk I'll walk through these problems and more: why we think +these are the right problems to solve, and how we're solving them. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/33.en.html + The Birthday Tent + Roger Dingledine + + + PUBLISH + 160@HAR2009@pentabarf.org + 160 + wikileaks + Wikileaks + History is the only guidebook civilization has, but who's the publisher? + englisch + en + 20090813T120000 + 20090813T130000 + 01H00M00S + Wikileaks- History is the only guidebook civilization has, but who's the publisher? + History is the only guidebook civilization has, but who's the +publisher? + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/160.en.html + Monty Hall + Daniel Schmitt + Julian Assange + + + PUBLISH + 160@HAR2009@pentabarf.org + 160 + wikileaks + Wikileaks + History is the only guidebook civilization has, but who's the publisher? + English + en + 20090813T120000 + 20090813T130000 + 01H00M00S + Wikileaks- History is the only guidebook civilization has, but who's the publisher? + History is the only guidebook civilization has, but who's the +publisher? + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/160.en.html + Monty Hall + Daniel Schmitt + Julian Assange + + + PUBLISH + 201@HAR2009@pentabarf.org + 201 + wikileaks-followup + Wikileaks -- followup + + englisch + en + 20090813T230000 + 20090814T000000 + 01H00M00S + Wikileaks -- followup + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/201.en.html + Monty Hall + Julian Assange + + + PUBLISH + 201@HAR2009@pentabarf.org + 201 + wikileaks-followup + Wikileaks -- followup + + English + en + 20090813T230000 + 20090814T000000 + 01H00M00S + Wikileaks -- followup + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/201.en.html + Monty Hall + Julian Assange + + + PUBLISH + 208@HAR2009@pentabarf.org + 208 + + Wikileaks panel + + + + 20090814T230000 + 20090815T000000 + 01H00M00S + Wikileaks panel + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/208.en.html + The Birthday Tent + + + PUBLISH + 208@HAR2009@pentabarf.org + 208 + + Wikileaks panel + + + + 20090814T230000 + 20090815T000000 + 01H00M00S + Wikileaks panel + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/208.en.html + The Birthday Tent + + + PUBLISH + 140@HAR2009@pentabarf.org + 140 + wok_the_wob + WokTheWob: FOIA for open source + Experiences of a transparancy nightmare + English + en + 20090815T150000 + 20090815T160000 + 01H00M00S + WokTheWob: FOIA for open source- Experiences of a transparancy nightmare + Many countries have a Freedom of Information Act. People can request transparency from their government in theory. But in practice bureaucrats are going out of their way to prevent 'open' from happening until they meet you. Based on experiences of an ethousiastic wobber you can learn how wobbing works in the Netherlands, what resistance you can expect and how you crack open those archives you already pay for. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/140.en.html + The Birthday Tent + Brenno de Winter + + + PUBLISH + 140@HAR2009@pentabarf.org + 140 + wok_the_wob + WokTheWob: FOIA for open source + Experiences of a transparancy nightmare + englisch + en + 20090815T150000 + 20090815T160000 + 01H00M00S + WokTheWob: FOIA for open source- Experiences of a transparancy nightmare + Many countries have a Freedom of Information Act. People can request transparency from their government in theory. But in practice bureaucrats are going out of their way to prevent 'open' from happening until they meet you. Based on experiences of an ethousiastic wobber you can learn how wobbing works in the Netherlands, what resistance you can expect and how you crack open those archives you already pay for. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/140.en.html + The Birthday Tent + Brenno de Winter + + + PUBLISH + 175@HAR2009@pentabarf.org + 175 + dakami + x509 is considered harmful + You will be amazed + englisch + en + 20090814T200000 + 20090814T210000 + 01H00M00S + x509 is considered harmful- You will be amazed + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/175.en.html + The Two Envelopes Tent + Dan Kaminsky + + + PUBLISH + 175@HAR2009@pentabarf.org + 175 + dakami + x509 is considered harmful + You will be amazed + English + en + 20090814T200000 + 20090814T210000 + 01H00M00S + x509 is considered harmful- You will be amazed + + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/175.en.html + The Two Envelopes Tent + Dan Kaminsky + + + PUBLISH + 116@HAR2009@pentabarf.org + 116 + your_mind + Your Mind: Legal Status, Rights and Securing Yourself + + English + en + 20090815T170000 + 20090815T180000 + 01H00M00S + Your Mind: Legal Status, Rights and Securing Yourself + As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device’s transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore "subpoena proof" server/jurisdiction-hopping platforms, or on social networking sites. Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/116.en.html + The Birthday Tent + James "Myrcurial" Arlen + Tiffany Strauchs Rad + + + PUBLISH + 116@HAR2009@pentabarf.org + 116 + your_mind + Your Mind: Legal Status, Rights and Securing Yourself + + englisch + en + 20090815T170000 + 20090815T180000 + 01H00M00S + Your Mind: Legal Status, Rights and Securing Yourself + As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device’s transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore "subpoena proof" server/jurisdiction-hopping platforms, or on social networking sites. Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself. + PUBLIC + CONFIRMED + Lecture + https://har2009.org/program/events/116.en.html + The Birthday Tent + James "Myrcurial" Arlen + Tiffany Strauchs Rad + + + \ No newline at end of file