Bestand wählen
Merken

34C3 - Lightning Talks Day 2

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
at a and the
end of the and a bit further in sewers that were killed so just let me know briefly
tell you how all this works for those of you who have never listened to any lightning talks and who never gave a lightning talk how to talk lightning it's pretty easy actually if just
sit in 1 of the front rows submitted a lightning talk and would like to say something here and get on states quickly once your talk comes up I also talks alone right before the start and then talk into the
microphone like me right now do not turn around to see slides because see what happens is you can't union motheaten around you have a monitor down the down there so just look there for your slides if you need to look at them like you right now use the clicker which
always has to remain on this podium to advance slides just right and left here and stay calm like me right now and the delivery of talk the
it's good if you finish on time that's what lightning talks are all about we have a fast-paced session view with 5 minutes for each talk so please finish before the 5 minutes over receive your applause profits
how to listen to lightning talks for those of you in the audience so that's pretty easy you
just the excellent to each other and watch the timekeeper the timekeepers this thing here in front of me but can you see it from from down there can you see it here OK as so watch the timekeeper because this 1 us to check if the 5 minutes all own not others would you like to say something about it just just a few words it's very easy to use that visualizes the remaining talking time all get signal has 2 and a half minutes left and of it starts in clean when you have 5 minutes left and I do know a fast forward so don't Penny give to cream oneself the FDA's like there's still have 2 minutes after yellow signal shows you wouldn't have to have 1 minute left and right now than direct terms of you after 2 seconds left and then when we are just like just to devise begins to bring them this you know you have been to like
can talk to your past 5 4 3 2 1 hour of the day we have to try this again that it is again you have your heart of a new 1 would try 5 for our trees true 1 r news thank you all right and so basically don't panic if you see all yellow then you still have 1 minute bad translations available for the lightning
talks so we have English to German translations english 2 friends and I think we have a german talk up to sold German-to-english I don't know about German friends right now but we'll see no you can't access the translation of smile dictaphones right now so please take the week you with the translations topic streaming don't see 3 lingo . AUC for information on how to listen to the streams and the translations that's it led us to vote and
to begin with the talks while the click of leaves we have 1 more thing that they will be please let the Kepler let let that lives in that let the clicker on this podium the love good morning Congress elected talk fans hopefully were get the slides on no various early morning
still good morning soul earlier this year so Tim Berners-Lee to the call for action uh with aquatic urgency because he thought the Internet as we know it is in danger there is in danger because it is centralizing warm warm becoming the playground of few huge multinational companies 1 of the concerns was that we are losing control over our data so I would like to join the score for action and help doing something again against it there and I want to introduce software for self-hosting Knock microblogging engines or a microblogging engine and I want to talk about microblogging very briefly when narrowed use case and then delivered more in detail about about centralized actually and finally about the the software to like to what so microblogging I use it mostly for the for tagging links defined internet and storing and building some Knowledge Archive a little bit like was back then and I was using the suffer of a great uh french dish the developer which is very simple and does almost what I want but it's not not that easy to show host war so why do I want to supposed it gives me the freedom of choice the software that runs is my choice it gives me the freedom which data to I want to publish and what you're not want to publish on it gives me the sovereignty over which features are available in which features are not dependent on the software use it's free of legally use is I don't have to accept any the terms of conditions because I am the provider of the software and I don't have to give up rights so I do not have small print uh dual hand over usage rights of what I post to anybody else just because it was and it is we must do it yourself uh and however it can be scary and there is some some entry barrier if you know nothing about it so you have to install things there may be dependencies have to choose platforms nearest security issues and there is there is an operational rat's tail so if things go wrong you have to you have to take action yourself and and there may be several issues to choose servers or to pay to its so what can be done about it my approaches to keep things simple and to do a few things that you can take the responsibility for because you know what's going on and I think To better way that is useful and important to leverage experiences that are then used to well known rather old technologies that are there of surprises use small code bases and Have a good usability for the housekeeping tasks so things up and running should be nice and easy to do and now I'm seeing a little bit faster actually there now the softer and I'm about to do which is pretty much a work in progress and will always be the do-it-yourself manner and it is 1 file and 1 step installed the visitors of the mark a block just see static files there's no server crow cold running except the web server itself which delivers flat files the editor that post something through his or her own microblog users joyful for that so the the 1 5 1 install actually uses CGI I did that in goal for a good portability t to various platforms so you can easily run this on your own hardware on the rest the pi or uh you know enough clout computer nerd and uh shared hosting environment as well and it delivers Atom feeds 5 users at Orange read and trend while readable form are thank you thank
you
and next
up as digital information for refugees newcomers this hi and minus the media and hybrid of the non-profit association I write it out the cannot about consumer rights in the digital age and 1 of my projects and currently working in the Ys and dealing the 4 questions on researching how refugees confined to to information on consumer protection more easily than it is nowadays the basically the asking answers the question how should ditch its information for all refugees and newcomers people who you in Germany but also in other countries and it should look like prices and what would allow refugees newcomers also using digital media such as a like like everyone else nowadays and and then they alive in a foreign country they have as much to a certain information the light and finding a place to stay finding a doctor em bed to get asylum and residential life and so on but they also have questions like it's human and vitamin they might not know better distance eucalypts consumer-protection bad and what about buying a surface cannot getting them all by contract and what about a given to you what is a given to you what I'm chooses what instances I needed to be researching how we can get more information on these topics out to the people at the Library out country M. this might be important for you as a more and more people coming in have you migration society and as you might also be the question how to get information whatever kind of consumer protection or any other information to their people like that and that's that of
the search and I'm going to give a few examples of the use of research that this is 1 of of disputes said this is the method used under certain being currently using Apple devices love Apple devices but not mainly distributed and and this focused at in in this this certain at entidad moves so m if you want if you leave things you wanna program and have them you might have focused on AMT like this the
2nd thing that I'll be back out people using the Internet that mainly it's social networks that's for many em messages I talked to many new chemists that M phase that is basically the internet love it's not the internet for myself I have a different standpoint on it that is ironic and form this group of people I really need to get to decision that the other vise my information will not have employed as it should like so if you wanna distribute information you also have to have a standby with standpoint on that at a time totally denied people are using Facebook Avis's media
then please use plain language especially in German language here they're used to having a lot of places explains that very well and this is not very helpful people alive in unit time to some basic German knowledge also think about elastomers students so you don't always have to think about and refugees and newcomers that avid avid groups like the US was used to assess and so on can profit from plain German language s that
I just call effort . m if you and if you providing information use the use and pictures is very helpful them for someone to catch em someone's intentions I am especially the media is a very valid consumed and as I talk to that systematic CDs and pictures also and I am yeah about promoted by session that that's N S content in a better way just tactic many cancer media's
them you can also use subtitles and this this not only accounted for the mad at times but also for German language that he found out that many people really like to practice the German and an effective thing is by German media and if they can find of the German text underneath they can take mal today and the standard light 0 and 1 and may have a success to the for themselves by consuming information and last but not
least and if you give out information digital information piece use examples and their show grant he consequences don't use they may be moved the very key on consequences thank goes out to anyone who participated in research I can be found at the output for Germany example if anyone wants to talk to me after that thank you on the thank you and
so they start to use the meter container if we just code resulted in this all
right OK all 4 followed it would that but I would like to talk about my project in that container and that I made the tissue to make sharing resources like you and me devices a network specialist them easier but I just write it down on the configuration so for example a child at you the divided by the computer uh why doing in that in right way but so let's see the cowering you go to the library from in the container so basically I
wanted to make it as easy as possible so you're using run commands to export resource is example let's say I want to share files with my friend from our director from a laptop so I just give 1 comment the export of their target this drink called to revise and here the same my land use another comment the mounted the direct our on his computer and their addenda inference as against you had the slightest the long string and it contains at all that is needed to indentify uh where their stress this and to security amount presently contains a hash of our public and my public OK of my public keys all of my friends that can be sure that he the accessing what the what you should be accessing OK so metacontent our current has also for free free and there's 2 types of resources and the land and the remote desktops where you can uh use and it can connect to the account of computer after another and present the computer with a remote desktop at and networks so we can for example bridge and so at a networks from 2 buildings are most speaker and microphone Subpart American ideals that stick out from the other by I at a planet from the left for example and I I have other in idea like shining you USB devices are of media arts and parts whatever mn the basic idea
because it is an abstraction layer over our open-source project which are used to share resources like as I just as well as all the all Tiger VNC when the IPA and and and and other projects so it's atalaya which make the protease secure and that's the easy and all sorts of by using an interest in online network it makes the it makes it easy to collect a total of computers even behind that so we do not pass through and again can bypass firewalls in the same room and I also have
the initial step off are creating new land masses and other computer resources that can I use their resources there which are shot using definition that I described previously like for example you can create a virtual machine that uses a file on another cost with all without any configuration except for export against an individual machine from that we can start a container on a server that uses the network that is running on the hour that that this in your home for example through and this and that and an example of a wide could be so that so you have a small out of that you want so uh developed a project that in front of there are networks and you have a fast subgraph of computer in your in another place so again easily creating your around the training session and which when it when you when sharing commonly that director with with your project and I think Alice uh we the computer that this the sense that training that uh neural networks
moved so that basic I used a lot of open source technologies metacontent I gave you need to which is the really nice that back pocket pokemon as a when you buy breathing indictment uh dependencies you want to have something that can do it easily I use that govern part of which is also organized LPC protocol and actually this is something in outer part about france and you know that room again something very attention the
understanding that you can visit that website uh are to call have income thanks to a few
limits so as to to be a video introduction into all of you this year included on the of screening and discovery of that so I'm teaching a class every day during the Congress on how to sorta and and how to program an Arduino this is actually a video it's much more spread out than it is in real life just so that the 5 minutes of this ordering that we do in this class in this ordering part takes about an hour and then when I'm done With soldering and we checked that everybody's works then go through and I explain what digital input is and digital output is an analog input an analog output and if there's time I explain non-blocking state machines I n I also selling kits and when you're done with this workshop you should be able to program all of the kids on your on with the exception of 1 that is they are doing ov compatible so the target audience is really
someone who's never sorted before someone who's never program before and there's also 2 other classes that are being typed
everyday over all not every day there's 1 more session of the injured Arduino kit that Mitch Altman teachers and high you spend about 3 hours soldering together a Arduino cloned you do his workshop you can use that Arduino in my workshop if you don't do that workshop I have
doing as you can buy for me as well and then there's another power supply surface-mount workshops where you learn how to users on a minus and solder paste and place all of the components and then he all of the stars the reflow the starter so it looks like you know when you open yourself on those tiny components we need other that class will understand how those are all somewhat only in industry is taking place machines that so yeah that's more or less what we're doing over there and you should combine phenomena sorta you don't know how to program you wanna learn how to program that you to watch the end of the video and the see when it's done this is actually me yeah I the hardware hacking area is walk out this room and then the next fall it's the 1st group of tables on the left is a big projector it's Hardware Hacking area right now or in a couple of minutes probably McDonald asserting his words actually in an hour he starts his squares my courses at 5 30 every day except the last states at 1 o'clock any other questions net so basically I also teach you had unsorted things this and in general as Mitchell teach you that to be had is invariably someone puts on a component backward or fills in a whole that and then we tested in and videos testing and then the video testing that all right so if there more of a Christian so would alert you to run with you and all who who the heck call this the helots tested is legible there only that it does that but the my talk part is not really that line from monitoring and so this is actually held the odd cases like kind of resistors it can detect what the current light state is it and that's the analog sensor plug it in here and we now and then when it's time this is going to be
the test program where it works as a 9 by a can change it and all these different colors because it's a RGB LED them so again the stop that if you when it is related to health and thank thank
Mr. Lewis mutual growth momentum so
it it it
hi my name is Marcus and I want to introduce you to the global problem which is a user
study from 2007 users there are 3 million children dying of cold because of hunger every year so malnutrition prevents the development of brain and body of over 200 million children in affects generations to come but I there is not simply a lack of food it's usually a more complex problem and at the root of it is the lack of information so is this
shop malnourished it's not that easy to answer the question parents and governmental front-line workers often fail to detect even that threatening see them on attrition children way too often children die because they are brought to the hospital when it's already too late in fragile countries like South Sudan and Madagascar governments and also often don't know the MCMC magnitude of crisis them exactly help if needed so in chronic situations like in India with over 40 % of mothers children regular nutrition service of millions of children are needed
of so there is a standard method of measuring but is expensive and even worse it's very time-consuming the people who do the measurement have to be experts that have to undergo regular training and absence of the capabilities to measure children precisely and accurately so how do we detect technologist today the standard system has 3 to 4 parametres is the age of the child the weight of the height there's also the middle upper arm circumference rabbit and cheap indicator but prone to errors and not enough in itself of the of the biggest challenge to an accurate measurement is the height of children children are moving and especially in crisis is very stressful for both the children and the parents if 2 people need to hold on the side on them to measure it against the wouldn't what it is hard to read the data at the process it correctly in the field so 1 centimeter can be used to pinpoint but what if you could do with standardized measurement just with your smart phone no additional cost no experts needed accurate and precise feedback in no time and that is what we are doing
we're building a molar solution that is quick and easy to use with high accuracy and we're doing a non profit publishing all source code under GPL be free this picture the real measurement of my son done by and only prototypes this the the goal of the
project tackles smartphones with using the dual projection of infrared but pattern for a 3 D . 0 3 times per 2nd it's the same technology that is used in Microsoft Kinect and upper space at the opera the single API was a foundation of Google and they are called so if you're familiar with any of that he's come talk to me afterward the because it a convolutional neural network to detect humans in the body parts and regular RGB video and automated measuring process could possibly build predictors for the weight of the child and unhealthy even life-threatening conditions like wasting with children that stunting where children can develop covered by body at and overweight which is the rising problem everywhere in the world is starting the 1st beta tests in India in March and will do a pilot of 3 locations in India from April to June in this area we expect 40 per cent malnourished children and 2 per cent of severe acute malnutrition by simultaneously collecting data from standardized nutrition studies in the field to feed and common machine learning system to get better results over time so we
have a budget for the pilot 2018 whether partner organization that experts in attrition so this we are working on a scientific boards that we have a group if I have a 2nd the 1st generation of convolutional neural network a prototype of yet using tens of flow and project angle Andrew publishers suffer and get up today and the build the 3 so we need
you we need to if you want to contribute please contact me by e-mail or attend the meet up today at 2 PM at the fans automata of sea bass and we need more people building the at the back end in machine learning part of the data scientists of experts in augmented reality solutions and if you have interests that interest in that area a few were knowledge if you have just have time for a talk or want to contribute minutes all states of few time this I think very a port cost than please contact us and I brought to we brought 6 project angle smartphones just like any of the 3 teams in India will use we also want to also discussions about of course a technical implementation but also I think some privacy issues so thank you for attention and opened in theory truth phase few so all mixed up this interview you Bruce Willis from going
to the reduced so and hello
my name is David Munson draw from and the CEO and founder off to stop stop Mansour technologists rose small functions stopped up and this to uh cooperative all companies noble to break the monopole to speak semiconductor manufacturers
so what we're doing we wanna make free and open-source semiconductors the means you can build this stuff in your basement if you like because the specification and it's of the process and the culture you can just take any designed from the Internet to build in your basement and also the chief built on top of the not really sufficient for core ring semiconductor processes and technology so we have talked about before from friends of mine lawyers the lever silicon Public License which is basically innocence GPL above specifically also calls the case is solved how do we manage the sign to physical products um yes and so we also only introduce the smart contract will version of Lorentz schema noted that everyone can actually money by developing free and open source of so why are we doing this MPW's um for to people who are not good where of but that means it's to rifle and these need to project way follows shopping services cost around 20 thousand was useful also more and take a minimum 2 months as always you will know the sign a microchip you're only for years and pay top of 100 thousand of fewer schools and uh you much for you to build your own troops at home and so you've decided because you don't have to decide for us and sometimes the manufacturers 1 and here is from you and for the entities themselves so it's told when saying the paranoid democracy so you see this disclosed
market has limited the development of a semiconductor so the market is continuously falling because it's expensive moment becomes this confortable moping semiconductors
so we work together with the project to a lot of open source projects with bubble to different parts of this tool trained with the world in all developing countries drawing
the that's my company down to speak local the Lancelot electron it
I yeah and as I mentioned to be vulnerable to IP double all posts so using the Democrats critized decentralized a solution ELM and the middleman system like at the removal of a historical so
we go rents to make the halt appalled happening we rented Ulster clean room and equipment from the Hong Kong University of Science and Technology that's pictures from when I was there recently to negotiate renting the room and we can build this basically the whole scene most process reflection parameter from there and the we also have to have been working on a new DA and fully integrated integrate the modern environment the block chips skewed flow down the into
references so in the back and use gray wolf cure alter the Cowles was very lock bolt open-source tools all he link to my presentation slides that screenshots of the tool to children the double so or every right to see a patch frame with pre rotten and on the left you see a text text after in the middle signal Europe sold the signal later circles so we have some interesting we need your help so please um the come to me after world if you know some of C + + q all see and or where we welcomed his hope
yeah please contact me the things the
way you thank you next up to known
because the result known because
Wi-Fi automatic associations text going you
guys i wanna start this book by asking you a few questions how many of
you have stayed in 1 of the hotels mentioned on this slide Wizard of Oz so I can see most of you have well how many
of you have ever set up a grown does device is a Google advisability extreme what you have in your mobile device on your television I can see if you has begin but how many of you
have ever visited the whole sport that belongs to the full network if you don't know what a phone at work is isn't a situation where you can see there are some of your band with and mixing to gun joined Wi-Fi for free OK you can see some and finally how many of you have
connected to the insecure Wi-Fi network here in the Congress Cotega most of you have so so if you raise your hand and I think most of you did then
you may be vulnerable to another that that we coll known become about what we do there is that we use all their old gets point some that actually broadcasts those ends because frames what is a beacon frame and become frame is the message that that is point is going us out to everyone are in order to announce resents so for example if you open up your network monitor from your mobile phone and you see then that would around then there 10 different become friends around so what we're doing is whole thing taking these messages and we tried to simulate an environment where like dosage of net which around up on these networks shower of popular open of public 1 that works so for example all the hotels that we mentioned earlier form that networks home you societies give societies the actual name of the network like public airport test what would and brute force so if you have set up a across because you probably know that in order to set up to connect an open at work other because as in this the cytochrome dust and then or indicators that wouldn't brute force and many others these dictionary is actually getting bigger and bigger thanks to the contributions of the Wi-Fi feature community and the effectiveness of or that is actually based on but what is gonna happen so as soon as we broke as these because frames if you have a default settings that means that you have the older connect flag enabled the other than flags is a special flood that allows you to connect to the Wi-Fi network you know you do leave the area you come back and use your device that has connected to the same Wi-Fi network so we exploit this flood and even if you happen it could once in your life without advice on that network then you will automatically connect to or about is point and then we can mount further attacks with ended that US Navy wouldn't resent freezing phase is and so forth and so on but someone may ask these in this the comet that the guy a very famous about but excludes the active scanning for networks that the station to associated B in the past but this is not the garment that most network monitored nowadays health parts that are protected from Gama because they don't do that is gunning they do the bus is gonna be awards program was framed for networks that they have associated with in the past this about that I'm describing right now the known because explodes only build upon it like that means that even if your network manager these not sending probe Request frames like that of 4 previously connected networks networks is still vulnerable and all network monitors currently available to these a back except from windows of course again the effectiveness of this about has to do with of how his dictionary and when and when to use and if the victim was connected to 1 of the networks but that I have in my dictionary of so this new feature will be included in the new version of Wi-Fi future version 1 . 4 but what's going to be released in the coming days how we have buzzed Jose B for doing this but there are many new features and I wanna thank everyone who helped with this new release and specifically the whether it is a core developers write me than I can band and everyone else of course but was all
but you amounts you thank
you next up color based network analysis
I hello everyone everyone this morning I have my name is for and I want to talk to you about colors that is the problem can a sort of the area but it is in this movie indicate acute and why am I'm I doing this
and nowadays and that hurts are about particles and protocols are defined Iady Dr defined openly uh you and we can read and Nazis or dear those so and property and you have to some kind of reverse-engineering trying to figure out how can we get into it and how can we use it and 1 thing that
came into my mind is MIT found out that if the if the human body in this scene and object it's quite faster to recognize an object in picture than reading a text in finding this object in the text so I think it's more efficient to see method in a different way than we used to at the moment at the moment we often use wire Shakas tcpdump stuff like this and possible genetic information readings staff and find the right point the right that's what I'm trying to introduce is we need we take the the bits and bytes of an IP packet and forms pixels so we have colors and a in the front you can see I cut the IP packets were annotated did the picket put down the bites together into 1 pixel and this for the full amount of their frame so up to 1500 bytes and this so you can create structures and patterns which are a really great
thing and you you can see a difference what will happen if you vary the number of bytes from an IP packet you put into and pixel at 1st on the top level a foot 24 it's often I keep taking into 1 pixel that's the maximum because we have the RGB which are takes up to 8 bytes and in the 2nd 1 I have call from them amount of bytes and put into 1 pixel in the last big in the last button betray their used just 1 byte so just a black and white I'm I see the point that if we take the full color range of RGB as a human we don't see the difference between some colors but if machines these the machines now take a look into it they see the difference in that same you maybe this year difference so I'm
reading here can show you a simple example of how it will look like and I think most of you use some time for boy and there are different speech codecs and you can see them with all the different knowledge about CMA a and all the speech in the Codex how can be efficient and how they can be used and in the lower 1 you can see on the PC may not using the bandwidth as it should be there are a lot of space that is not used
so there's a tool out there and this is like how it looks like if you right on the life at the moment and if you take a look at it at the 1st moment I see lots get faces but don't be scared his just regular patterns and structures and if you take a look into specific ones uh you see structures and counters and everything is quite smooth and simple and you can see quite easily what is happening in what is what's often not happening I see totally to point out that you don't have the information that the color changes what is actually happening but you can identify more easily and more efficient for example from I like
Wireshark divided by a shark is really great for this example I recognizing keystream and I had to take its are modified and with fire-truck I'm it's very difficult to find differences in the packets and on the right hand side you see same information just in colors and I think everyone can see the forest everyone can spot I went to college and changes and rarely difference are made for of my shot point of view everything looks the same but if you take everything into you transport at that point various something is happening and take a look close unity so if you
want to try it out and give it a try to take a look at the code and its online I have fun and make it more customers bird thank you this that few
of the dimension you have low 15 minute break it to vote seen from 2 of the tutorial will provide is that the it
so it yeah good morning my name is are you water uh apologies for not having the store in German but as it addresses purely solely German legal circumstances and issues the talks about cooperatives would have been awesome stuff and of Deutsche 1 the phylogeny
wants to encourage um these surfaces i at the optimum of the dialog don't always the harm you and and stab you in the board would help top would Mahoney buys it for the dinner for did nodes using Gunderson gave him broad Nawrocki even the I'm a litigious the list is this being which by the main ungiddy up we also some constants in which the idea for a moment willful Finanzamt for a bottle and so widen the little that each of us is also fused in nuns my philosopher fight monsters out there what bond for just seems kind of quality but for new we hit that site would in the his them on board of his Gallimard it name this nobody will be members must kind um the ever podcast on minor groove of wooden got old to expunge all this into mice and uh and of of of what we do is in to produce but the norms it's the line and will be but about the you on possible to and then my missing top the orders will call from kind as often as alignment of and and the mean does money not that our final all state kind woman this beautiful outside visors Rubinshteyn doesn't come as most anything like these and jobs I'm Egypt which just the like all the Montpellier someone that problem that want build as well when the models and must is exciting get I'm that room Europe's on vital lighted in the lines and you announced in the order of our quality falls in the minds of stock falls does is that is shifted the gaps would also in phone so cars aside not motive is probably back I'm about about 1 client that most of these tools and tools designed here admin cost and the z for you on to fizzy you felt the parts of statement about we optimize on my uh social unconference could match the arc and and was was utilized in Austin shaft I guess it's afternoon someone at moment CA island would be minus 1 last mission forgets moon fees be the cavities D from finding more my for state reasons was that thoughts science ordered was for hardened you routine guns you would that be endemic dust and that's of the bond cost if he would diagnose sparse must clearly
system vendors even fewer good that keeps the limit you don't need an awesome stuff the incline Amanda on cubby tidy would being done vessels cost time what is poverty element power activity than positive Shaun pond it could design them deal on those orders mouse and a lot of info items off at that site it up my whole position it's referred to it was oral convoy diamond fly t of these of eyes affine number that was endemic and assumed it's wonderful sent a fragment of all the dust disability who but signed the would have to reduce intermediate muscles of the would yeah if an isolated was not to release when the website that all sets also susceptible host and erm on the front or back and set aside and then by the size of the tubes which is probably in but then you have some might contain a leap on the boat importune would that almost instant demonology best-fitting not just at the unity need and demand that um would of Darfur uh off 1 to extend of often from us their purpose
sizes completed would lauded you within 1 that and which Meissner me because unlawful can distort with how this young would evolve in each of the new from cytosol that's got is not a Saudi it's matching funds such as it was yet so diminish widened uh um flight from when put causes momentum is about would as part of his I made it in what is what into this and the Kunegis Poznan food and and and these low contact . 9 then in the land as you all know and therefore you have voyaged uncooked multimedia CCTV enough k definitely in Fort out from the often . school wouldn't the let's and we tested this you need a law it would come in from a to B and those kind of and submit that high by itself right has its moment you could kind of which I have been used of 2 don't you will order whatever it was just device office we marveled at these ideas not and you few
so most of those the real world the talk with their own hardware and and I told him it goes out of his 5 minutes this the OK so this is going to be a demo of a so tried to attach this computer in the approach let's see the the video people could you switch to the VGA podium feet did you bring a VGA hardware track with his pointing at you wouldn't know what he means can somebody wasn't the Jeopardy melody so but this is what happens when you bring your own of recognized funded itself but we use is a lot of always to do is always better and of what can there's the video feed I'm not putting something so you are apparently of putting something and I'm sorry you just start talking maybe alright so you might remember the radio batch from last can and so we are still developing from the forward and the hacker through has made a new feature which is high speed frequency sweeping available for a hacker and I've spent some time during the summer trying to port of number and 2 days can we finally got it to the merchants who are a special branch of the head of the radio from the standard we are the law
of the of the idea and it's a pretty
severe the pretty C 3 3 sir courtesy the free see on the way that I decided hey let's make the radio cyber again for you guys and we
had a look OK a packages and founder and
is interrupted you can speed is pretty fast and it's actually implemented inside the form of the hacker of to allow fast changing of the frequency and then display a power spectrum on his seat so we've added this to the
farmer as has a special program made called skew spectrum analyzer it knows a hacker offended their false most radio and if you add this the the right from the year radio you can use that it's indeed offer emerged branch among because that's 1 of 2 feature sets hacker is also adding it requires security update of the radio Check hacker of documentation what to do that and the idea lead to retain check out of 2 from the 1st to build and now we can have a
look at this work so I for a
program that uh if you launch to
spectrum analyzer you've got frequency selection start and stop and if you starts a kid does not coming life from the radio over here this is device for frequency band and you can see a 2 point 4 gigahertz it starts going and then at 2 . 4 8 gigahertz there's a sudden drop and that's where Wi-Fi ends the upload 20 megahertz or we are not used so this is a 100 megahertz band and is pretty fast we can also have a look at maybe some frequencies which are related to user from 800 megahertz to it would follows a megahertz means to a megahertz band is of its
law here in the Wi-Fi frequency region we have a much faster scanning rate than in the other frequency regions but you can see over here there's obviously some cues M activity going on this on probably and if you reduce the frequency standard from around 800 to 900 you go the more speech so we scanning around 1 year it's the 2nd and the hacker can do I think around 60 guards the 2nd still working on making this faster but it's pretty good already and it gives you a nice overview over the spectral and you can do arbitrary large veins user can go that's a 400 megahertz to 2 thousand 702 megahertz of the standard a gets lost so this will take around 2 to 3 seconds now to complete but you can get an overview like the various spectrum analyzer of what's going on around you right thank very much and the hacker all guys also doing nice so you is the smoothing attacks using them boards and radio actually has to use the ports of that that anyone want support that we would theory thank
you thank you have few there is going to be another talk with the old world will so we see of a set of words that for both taking a piano it it and and lessons the topic all right there we go
but of course now you don't have lives so this so and doubt my name is modified and this is my Trent Lott not exactly this is the type
can know that this is really about uh I 1st like a few months ago about this is so it's nice to have an USB part and you can much whatever you like the infamous be part so I decided under try to hunt and take control of went to that we date so and that's going to tell you I'm going to try out anything just challenge to it that was that just play is
it's actually supposed to uh throughout your number the audio doesn't seem to up to that you're supposed to actually play the instant like in the
basically the now the way to go you have to and each a month ago you had 13 as we can exploit that that out in October for the latent scanner and most of those of you know of services of basically well you have the use of to freeze you have no approach and so what I have the time to look at them but what I can tell you that you would put much exploit 1 of them with general and get to that can exploit unit out that but select lead to me and finally I have the ability to subject to non 0 actually hides general uh the uh light debate system basically combust just 2 strings said to take the going so you can pretty much have you hold date for you is USB doesn't need the daytime and it makes no sense section fairly easy but if you want to see how like to eat the about and how it works inside out at all and introduction to lacking but you can take this video of phenomena out there if it actually makes no sense is going to actually makes no sense so that you have access to the daytime do the same thing with food daytime so don't try to apply to me any something I'd like to give a broad overview but please just we said to your subject you want them how act thanks and alleged interview have nice a insulated few for you sold this is what we have 1 2
and 3 would come back to a lot mitosis and the position of the starting with living on a dollar a day I make us silent talk of mean F speak a lot of so here a lot of words and have shown that people of things of moons and we give you want him to keep in mind it's paid by hour what Texas and we have also sold that we also part of the problem
that it is essential that all
and
we you and
the
graph the chess
UCL the pictures we have to be paid for this further up however takes those of you who yell well yes so the end of those seen for these hell host of waste every cell thank many many things so without
and thank you enter the tho
so example 1 of the user reviews aspects of a lightning talk sessions TDR in good morning I'd like to talk about TDR and the T 1 should do and radiation monitoring system I gave a similar talk last
year and I will give you a brief recap
Tianjin to allied to nuclear power plants closely to where I live in Austin and they had several teachers and have full features and this is of great concern to us because in case of radioactive followed not only after much internal primase this failure is in danger we decided to play a part in making our region
safer by providing senses
these are distributed in a strategic locations around the power plants are and we get measurements of radiation so what's new
1st of all it's not just us there several other organizations that play a part in protesting against these power plants for example you can see a human chain from 50 thousand people from 3 countries or the
projection of the message stop the homes and dual onto the nuclear power plants tower also the usual things
posters protesters or what have you
so what did we do 1st of all we decided to improve all websites to reach out to more people to make the data easier to interpret it easier to read we had a product project with students from the Faculty of Media of the University of Applied Sciences and Düsseldorf that created a web app that not only shows you information and details
but also measurements of the radiation that you can interpret at 1st glance how did we get these measurements at 1st we used pi
GI boards so Geiger Müller tubes and arrest very pi the set some problems due to the high water supply so we decided to switch to semiconductors which are unfortunately more expensive and less accurate we fix the problems we're back to pi G I know we get measurements and create a sliding window average which is send encrypted to or server earlier this year some physics
dunes approached us they're building a highly sensitive gamma sensor this sensor can distinguish different levels of energy and both allows us to recognize different isotopes it's a work-in-progress their prototypes and we're looking forward to use these new sensors
so what happens with the data 1st of all we provide raw data you conceive measurements for every station for every cluster of stations for everybody who wants to analyze late analyzed the data in more detail and has already shown we have easy to interpret renderings of the current readings for people who just want to know whether they should run away and we have some data that's also easy to interpret but more detailed for example for catastrophe management this is important to us as going the official way with all the bureaucracy involved with communicating with Belgium authorities and so on it takes hours which is too long so we provide data in minutes we're still working on how to get all these information together and how to display them it's a work in progress but we're confident that we'll have a good website later
so in summary we started detect project the whole thing gained a lot of momentum not only we but also other organizations reach more people drew more attention to the problems we provided a simple method to get data and this enables us and others to raise awareness and start a discussion about these problems so what's in store for the next 2 years
we dream because we want to also correlate our information with wind and weather data we want to reach more non take people the normal people for example with social media and other channels we would like to provide the the improved network which is more difficult than it sounds because in the case of nuclear disaster we have to ensure reliability and of course we would always like to improve the sensors and the distribution of sensors more people better collaboration with most of
the things that we aren't experts so if you know anything about any of these things if you're enthusiastic about making the world a better place to what comes last talk to us we at the 5th Assembly you can contact us by e-mail the project has a mailing list I am dust point of view on Twitter you can reach me there and also thank you for your attention figure few
mixed up the story of the rule and during good taken down for a day
the morning everybody while I'm a student at 1 university in also network administrators and I would tell you a story however that taken down for a day and I assure you it's quite peculiar so
1st the scenario imagine you go into your office on a Monday morning and users start calling in and clay mineral is working well 1st you think well it's gotta be useful to accept that wasn't their own somehow it's not working over the weekend then I want to invite you on the
journey and how we fight of of all the issue and how we fix it well the 1st thing you do is you try to associate your climbed with without room and see if it's working and what's not working if anything that's going on and what we found was that we were not getting an IP address so of course it's gonna be the it's piece Eranian well except except that so this strange because actually we monitor cities quite close here we did notice anything strange happening so it was not the YouTube user we locked in on the box and we didn't see anything wrong with it so we started sniffing the network and but that may be refined the issue there and I'm sure you
all have seen that a wide trace but before we analyze this I wanted to give you a quick reminder
not using the words are the client joins the network it basically shots into the net require broadcast take is anybody there can anybody give me an IP addresses some information on the net rate modern art to which a server replies with an offer so basically it says that you can have this IP address take the settings and what not and this is followed by the request whether Clyde request this as specific IP address and the whole thing is computed by an acknowledged so what
do we see here while at the marker we see it used to be discovered we see twice strangely but there's the offer missing so something is going on in the network strangely enough when we get the same sniffing at the due to be server-side we saw that the Sara received all discovers send out all the others but the operas never reach the client so at this point you start to sweat as a network administrator because obviously what what is going on what is going on you don't know so what we
did was actually well this than others like where I can where I can show you again the opera was missing it was not received by the client so we had a trace the wave packet and this is a very short we get a lot of things to actually find out whether packets were going and if you're interested in how we did it and how we correlate multiple loading database entries and so on you can visit me at the at the Open Knowledge Foundation and assembly and when we trace back at what cost a quick word on our network we have a highly redundant structure in our university with about 1400 switches everything is redundant connected into loops so obviously we have to use spanning tree protocol to ensure that there are no loops in the network and only 1 path is active and as you can see here there multiple distributions which is and then at some point the axis which is where my so what happens was that 1 UCB the server that we see over here send its offer it should go the red weight to the cell phone down here but for some reason was not going that way and it received that was received by a totally different port where I do this little clout you know the 1st thing you do is go to the office with the sport is located and have a look what's on the spot and this thing was on
the spot so this looks quite interesting and this thing here represents a back and I I rebuild it's in our assembly so it's not exactly what we found that this thing here with is the back and we have that you switch them there we have a disassemble Cisco excessive 1 that we wanted to fix the because we don't have support contracts for them anymore what happens is that we don't know what to do next but then 1 of our colleagues have a closer look at the whole thing and what you notice is that this a test point is not power will it's no power court connected this is not a power of Ethernet switch so actually it should be fine accept it wasn't because when you take a
closer look at the net use which you know support was up so how the hell can that happened while it's quite easy that which obviously or apparently has a mast yielding problem so all the shielding of Ethernet cable and the ball to supplied by the data lines the accessible and got powered up get not powered up entirely so what happened was that the networks with the network chip on the exist when gets pulled slightly up which costs all of its inputs go to high impedance state which positive like all incoming network packets so this little switch here negotiated a 100 MB link with itself so I talked about spending 3 1st from and usually if you have a back reflector unit we're going I'm spending the notice the whole thing and blocks the connected except when this board we use it for testing purposes and disabled building a few months ago so you see the whole thing was quite
peculiar what happens the client sends that used to be discovered this point everything's working fine discover it reached the views should be server at the same time the discover reach the exact point the accessible and reflect that the whole thing why the a it wasn't processing the packet and this cost because of the reflection was the same source MAC address that all forwarding database entries in all switches in our university flips who's 1 peculiar bought and all the answers were going to the sport and this is how the Rome got taken down for a date by htaccess point that had no power to thank you for who few
mixed up the 2 you know me and all data mining in the parliament OK I have 1 and I'm going to be briefly talking about the data in search of a problem that it wants to solve so on you
Germany we and you really have some Open Data staffed so for example in the last um according to 1 side stock between is the density to they said yeah we want to make our stay very transparent and we want to make all of stuff available and so on and which is funny on many levels and they they never did it in the and so and what's them does
exist is the parliamentary documentation system and that the system hosted by the Bundestag that contains all the year and uh all the agenda items all the laws that were drafted stands and all the protocols from the from the plenary sessions of basically contains everything and but since it's run by a state institution that basically has no API it has no capability fall apart downloads that's is PDF document so it's not very machine readable and it has no all nice way to get access to metadata so there is some external system that has metadata but it use different identifiers and in the end it's less work to just basically scrape the system as is and you so there are some signs to the system and the pdfs actually do have a text TREC going back to 1946 sold to the 1st session of the German parliament they have the text right with a very very good OCR so it's really nice I haven't found any error so far and the where these PDFs are saved are highly predictable and they have a decent HTML Web sites that's um can be scraped fairly easily and they have a very friendly take to use I basically call them up and all that do you have some capability for about Dole loads and all like now we don't have that but feel free to scrape adjust was at nite so what that was very friendly and and so the result is roughly 500 lines of code of Python that are released on the URL shown here and I don't know that about 19 thousand uh kind and hardened which is for the people not from Germany and well a political party can ask the user and the government a question the government has to answer within a certain time frame and there are around 10 thousand draft laws 4 thousand 10 protocol um and uh in total about 130 thousand documents that has 76 gigabytes and this pdf and I think I deleted exteriors by now but young and it also for good measure just just before the break-up of everything on archived along just in case all democracy ever goes missing and then we'll have a backup and so what's next I have no
idea what I'm doing so I have no idea about machine learning I've no d about text mining and I think there could be some really cool things you could do with this data set but I don't have the skill set so that's when you're on if you have a cool
idea what you want to do with this then you can grab the dataset using 1 of these methods you can download it from from the internet archive using the um I a Python client that they provide and it takes quite a while it's actually faster to just scrape it again from the bank and because the Internet Archive the social but would at nite and you can grab it from my sum over HTTP as common as stodgy that filed them if everyone does that at once myself will go down and then and the soul maybe do some rate-limiting and you obviously collected yourself and there's the source code and uh yet only brother that nite and I think that's already it so if there are any very quick questions so I don't know if we can do that the so and I can't do it because I don't have to stay the same laptop for this right now but if someone wants to do it ends and sent me the information and I couldn't tweet developed on its monarchs mother wanted us so and a o E X and AU the E I forgot to put it on the slides apparently OK great honor and I'll put the link on the on the you out there the more the all right the you mentioned few
minutes the blues and the you're
yeah so high high-temperature coding and this it talks about a project and called imperfect yard um
the hour is relatively still relatively new for most people and they have questions like this 1 or this 1 I live in
Rex it written so this is an interesting question
um or even this question this is also like to see the British tabloid so you see how the for the depict the evil scientist with you and
um but what people are looking for in the R is actually this so this is your face and uh and most people would like to buy uh br face and you pay someone uh some money and they give you this
and then OK The Simpsons the slides and so
um imperfect the hours about a different approach to the art uh it's about um uh the idea that everyone can uh make can create of yards and and everyone means that people who don't have coding experience I started R is a virtual that electromagnetic field last year and I and I've given 10 workshops as so far and most of my attendance have have never coded before and what they're doing in there like about 2 hours is basically do at hello of beyond
roles and it's it's quite underwhelming it's not it's not something really amazing that this takes like 2 hours and 2 codes um and and to set up and um that basically I
show you that the whole and a workshop basically this is this is the code of your writing so that all the things that you need is a um you need a smart phone you need a card court that you can that you can and Lisa cut yourself over but yourself and you need to have a a framework or a frame which is open source made by people from was lot and then you can create a yard and you get the our face but this time you have made it yourself and
all that's that's the wrong slots on and so coming back to the idea that we we we think about like where do we get our where do we get our our media from where when how how do we get access to media and this is the
people who who sell you are and and there
there's um and I don't have my personal just as much to compared to be honest uh but um I think the question is then what
is the what is the reason behind it was the reason behind building these things the on and this the wrong slides I have to go very
fast so this is and this gets a little bit uncanny and um and affect the hour is a different
approach it's um it it affect
the IRA basically looks like this and it's made by it's made by you and it's
comes from a culture um of of the and that is about a medium it's not it's not just the business and this culture has been around
for a long time and this is from from the nineties and it's coming back
and again this is this symposium about encode which from last year and
the artists um like Jenny Bailey and and uh
to seek out and then there's pitch are
at this see new users get shot in the yard the and this is high from lab uh
not a strong voice in in this
field and this is Jane want let's and
this is the end of the lab and this
is an ad to Austin and as salaries of food that was disconnected tosses spent 48 hours and the of
and this is the dream machine barangays soon uh it produces flicker so you get your own virtual reality the and I had to keep a Chris a
marginally laser suffused uh the
constitutes a tap Phobos
and this is a weird uh sense tagging experiment so to wrap it
up it's at our choice um IV the creators inheritance of which revolves you
decide if you want to buy new stuff from large corporations or if you want to do it just south uh and um you choose um
2 that's uh this is imperfecti or creative coding thank you you few
minutes the blues soon but long distances what is coming all right let's go hi I'm sorry and I will talk about the bipartite spearmint flying on what salt what is the richest program
rections means rocket experience point in was to students and is a program geologic and as the the German into as a Swedish Space Administration and it provides the possibility for students to build this space project them with the full project cycle of about 1 in 4 years from the 1st proposal from already use and argumentation and so on and after the rocket launch the rocket itself from that
it's it has a mass of 4 at 50 U kg and about topology of magic images so I provides around 2 or 3 minutes of time for experiments in microgravity on and it has just about 55 kilograms so 1 the there's space for around 2 of 5 small experience home yeah it will start from the European Space and sounding rocket range as range is in Q 1 another in Sweden and Oracle will start in March 2000
Our complete experiment was part of the project as a means of addressing was penetration spearmint 1 rocket aren't we penetrate into all lies on the low pressure and low gravity environment and want to collect some that are all the eyes making protein of but this was making process only there are a few interesting things costs and below seats only by of pressure there's no liquid phase and so little bias will simply made some overrides instantly if you not come into it in them with some of the research groups doing numerical simulations in this process and we want to connect the dots are to verify those simulations on these are common conditions in specifications and we use this to assimilate and still others like environment but what is Enceladus at 7 and status it is
a subtle moon it has a rocky core with a global raw ocean around this what you call that polar global ocean there's a big eyes trust and liquid water and can be very interesting for the search for life and now you have to go through this very big eyes crossed if you want to get to the liquid water and so there's a project the Enceladus explore incentive come mainly by the dealer and they try to build the manifold possible permission to enter the and here we do some the search for them a quick overview of
some of our city of I cannot go in detail because of the tone from the hard part is that this great unit in the middle it contains 3 small ice and those from all right you can see in yellow and red the probes for into the eyes from the oppression nice by springs on blue and so as to be with you with the uh cylinders and agreed to the level of it completed just unit so no way Paul possible leave water can escape into the rocket motor will come a only can escape to a when mostly on top of the rocket reasons for
participating in the x project and you learn a lot of stuff there was a can teach you practical stuff but also all things like interdisciplinary work and watching and begin to use you will contribute to relevant research public the published papers and so on and you meet people from all over Europe you can travel around and last but not least from you in 2 weeks and as rent space and so if you have the chance to participate in such a product to what that thank you
thank you wanted
me to kind of information things next up this unlock you the clock
from solar restrictions Hey I can you please don't pull all anything there but no no not not good and I just love the land that was already on won't be next a lightning talk so climate would be about lights after 10 years of watching CCC videos I thought it's time to throw something back at you know what I want to tell you about new and think it's really which I saw the 1st time a scientist talking about it on TV like 15 years ago and study society to places like the eighties sold yet it's not you I've been preaching about it to everybody I C and it's getting a little bit more attractive lately but still people do not use these kind of energy source to the full potential so that he is the thing really create at ever wondered why
people sleep at nite and active at the day some of you might think about it the other way around but you do realize most people that were right also so people are more active in the summer and I have a better mood in the summer and have a less moved in the winter they sleep more and more some say they get depressed so why is it there must be a reason to something that maybe you want but you can turn up the heat and the like some might make it to blood flowing a little bit but it's not the same some say vitamin D. but we can't take vitamin D. infliximab doesn't work so what is it that you've experienced this 100 of time and see it when the spring comes days London everybody's going outside sitting in front of 2 coffees everybody to raising the head in the sky to get a tiny fraction of sunlight so obviously it's the light but what is the difference between satellite and every other nite you have around you when you see
it here like this this like pipe and the natural sound that you see it in the light of almost have a completely lake of real frequencies in the spectral index this homicide if it's light is and that's a really stupid so as to have around you as it a daylight light source so because by the amount of the color blue that is how you body between nite and day between summer and winter I territory
cut works so you have receptors in dialect for seeing that for the colors blue red green some for brightness some for movement to trigger the attention and something's going on on side of the signals they go into the nerve into 2 parts of your brain the imagery is processed right so but you do have receptors in your eye that only receptor colored blue and a signif they do not going to be seeing that they do not into parts of your brain the imagery is processed they go right back to the ancient world part of your brain to an area college suprachiasmatic nucleus come from migrate worked for Sun suprachiasmatic nucleus and when the blue light Cygnets hit that area of holy shit load of things going on in the most important thing is it cuts off to sleep hormone production and the production of melatonin and that is what you want to half during the day because if you don't have it to keep it thinks is already evening and prepares you for like time and makes sleepy also serotiny the chemicals in your brain that make you happy and activating trees that pressure rises heart rate increases and that is what you want to have to new data and that comes from blue light signal in your eye so
that's decided what slides apparently
and yet so this kind of light which I brought with me and proper to have someone ends with me with this kind of life it's is magic cost a thousand let the IT depression therapy lands for hundreds of euros but you going to buy that you can't have them really cheap this 1 was like 30 years and and and the number you want to focus on the technology of demand doesn't matter at all the number you want to focus on is 6 thousand 500 K it's like a color temperature with sites 2000 is really tells you and 6 thousand 500 meter to test the same color temperature that is some heads in this summer so it means it has enough blue light signals to get you activated during the day and that is what you want to make use of that is what I wanted to share with you thank you so that the sum of the snaps around with me
I'm meant appease approach me if you want to pick a space with some of these names and yeah yet I'm happy to share the you thank you thank
you mixed-up called toward that headhunters
from now I want to show some experience practices aside from my side when dealing with headhunters the clicker this the the 1st could be a point at the start to of you have been told about the contact with the hand under ever had LinkedIn or existing also called because not from the lower recruiter OK approximately 10 % would say and what you actually got his current job wire metric the the interesting 1 2 3 4 Pinterest and some of us have a look what had happened actually just well it's pretty straightforward he wants to earn money that's nothing bad and as he believes that big database of complications and applicants that you can suffer from where business platforms and and and he goes to the employer and the show similar this applicants which has the best match and he tries to earn money you where basically 2 several sources of and of course the wire signed contract that they manage but you know that engine
divisions so depending on the part of you that handled of course you want the money the most money is nature where the assigned contract which is the part of the good side of the 1 used celery which can be quite much you know how we would see you know that we can of course he wants to have fast application wants to have the job of some lines often told by at and so I want to go on to this point and the employer of course wants to have an application the most times for jobs where you can not find that the Applicant crossed over there are very rare so this seems like a triple-A when situations where 1
gets what she once every robotics happy but only at the host plants at the 1st but at 2nd glance at you will see there are some problems and studio are you as the applicant decrease your chances to get the job because of higher fees for the employer and those can be quite big so here we have in our which free applicants the first one that applies with all that talent agriculture to with the hand Hunter there's a minor get at the matching basically some constants missing like he has knowledge knowledge as so whatever but that's not that's news for the job that that's can basically all of them based on the can do the job and so you could also do the mind because we already if you think of things you can see your slides on 1 all so you don't have to turn around there I want to point out the important things but yeah and so form part of your employer um to growing the also want to save money as a as you know need to take this at the can because has the same matching but the employers them pay this money and so why should you do this it's just fun money um well there's an exception to this term and which is so if they hadn't has exclusive that all the job is not efficient distant uh which means this applicant vengeance and all only dolls applicants left over so the chances are again group and its should you care to take advantage primates mice action diagram which I follow when encountering contact with the handle and we don't know that of the following way it's pretty safe explanatory excessive explaining so I won't go into this point of thank you for your attention and of Congress and so so the last talk
in this going to be pretty easy privacy the kind and slam the
sorry and I wanna tell you about pretty easy privacy this is uh and some half a lot and Pretty Good Privacy to would which trains to rule out mass encryption encryption for the masses and sold this is more a hassle long-term projects we also wrote an Internet-Draft and i've see I read out loud The 1st sentence building on already available security formats and message transports pretty easy privacy describes particles to ultimate highs operations like key management he discovery and private key handling yeah alone
so packed probably college is a cross-platform application to easy use existing trip to tools it's designed to include all digital written communications and that the starting point of you know it includes automatically whenever and with whatever most privacy-enhancing trip to standard is available to the following the opportunistic approach and and all and user software shall be hassle free and 0 touch and it's not yet another trip to tool that the closed user base it's not any platform provider it's not implementing any old trip to and it's not replacing any trip to true per se but compatible with stuff that's there it's also not just an e-mail encryption tool even though that this is the beginning this is how we start so at the moment is just an e-mail encryption
tool and yet we wanna roll out mass encryption to optimize the cost of mass surveillance and we wanna make the use of crypto pretty easy so I'm not only for the users but also for developers they can plug had just into existing apps and users can then just use it without any hassle by
default and this is the architecture so you have your app at the bottom at the at the top and then as we have actors in various languages The coming in the next slide and then at this adapter you'll plug in the engine and the engine knows about the Cryptall has to be adapters is kind of bindings for the engine API to the engine knows about the transport protocols about a different trip to all of standards that that there and then as a developer you only have to care for the interface between your app and the adapter and if any trip to break so something then the fixed the engine the engine is called out it'd and open source which work of the and this is the list of
adapters so betrayed to have everything like and i for a Java and C hash for Windows stuff Jason objects C and for I lessons that Python C + + and you and this is what it does at the moment it handles OpenPGP enhanced mind without any hassle for the users would automatically and trips it encrypts the subject enlightened and there's no key management needed there is no peace over any other centralized infrastructure fingerprints we translate into trust words and we have not tests and marked and pass-phrase and the header is included an obfuscated and we have assumed
protocol and this is the trust words instead their fingerprints and this is the same so
you soon Q at peace contacts and calendar over various devices on the view on devices using I meant for that so actually you sink not over the cloud which is
just other people's computers but you on computers I will be trying to do
everything right so it's end to end its peer-to-peer there is no centralized infrastructure n equals service and it's free software with cold out it's and we wanna be compatible that would look at the technological technology so at the moment it's PGP as my in and out of the air the GBT and there's going to be Audi R and only more hand ax local and what else is there saying that message transport at the moment it's SMTP Aston and exchange and that stuff that deals with a goal for its pp and even arsonists and stuff multiple platforms multiple languages and that content encryption is that everything I think this audience and this was this very well
so in the future than those guys already be also when a pipe everything to the moon and if you don't know about Connecticut out they also hear animal to having an
assembly plant as mesh routing layer decide to be placed in the old in securing an internet protocol stack you know this is often the seventies so we need to have a gap nowadays internet um so that does with the use of would 1 to do so what we did do is instead of writing on tour guides which we all did that coming from the crypto party movement in these things and the do right the user expectations into softened particles to take away the crypto needs from the user's perspective so we actually given up on the user and understanding why to use and how to use crypto and we just looking at in so users don't have to think about the trip to anymore they can just use it by default the value of so what to and
the effect of the thing and it it it would not be completely and he did
Rechenschieber
Datensatz
Bit
Kanal <Bildverarbeitung>
Aggregatzustand
Sichtenkonzept
Zwei
Güte der Anpassung
Wort <Informatik>
Term
Rechenschieber
Netzwerktopologie
Streaming <Kommunikationstechnik>
Fächer <Mathematik>
Güte der Anpassung
Translation <Mathematik>
Information
Bit
Freeware
Hochdruck
Gruppenoperation
Computer
Term
Systemplattform
Service provider
Code
Internetworking
Task
Benutzerbeteiligung
Bildschirmmaske
Arithmetische Folge
Software
Stützpunkt <Mathematik>
Softwareentwickler
Speicher <Informatik>
Mobiles Endgerät
Hilfesystem
Auswahlaxiom
Feuchteleitung
Nichtlinearer Operator
Hardware
Benutzerfreundlichkeit
Computersicherheit
Güte der Anpassung
Systemaufruf
p-Block
Binder <Informatik>
Elektronische Publikation
Packprogramm
Texteditor
Berners-Lee, Tim
Spezialrechner
Twitter <Softwareplattform>
Rechter Winkel
Konditionszahl
Server
Gamecontroller
Dualitätstheorie
Steuerwerk
Programmierumgebung
Mikroblog
Assoziativgesetz
Videospiel
Information
Design by Contract
Digitalsignal
Rechter Winkel
Flächentheorie
Digitalisierer
Hypermedia
Programmbibliothek
Projektive Ebene
Information
Abstand
Hybridrechner
Instantiierung
Facebook
Formale Sprache
t-Test
Gruppenkeim
Information
Entscheidungstheorie
Internetworking
Hypermedia
Bildschirmmaske
Einheit <Mathematik>
Formale Sprache
Datennetz
Hypermedia
Information
Optimierung
Message-Passing
Hilfesystem
Videokonferenz
Digitalisierer
Formale Sprache
Hypermedia
Information
Inhalt <Mathematik>
Information
Peer-to-Peer-Netz
Funktion <Mathematik>
Public-Key-Kryptosystem
Inferenz <Künstliche Intelligenz>
Bridge <Kommunikationstechnik>
Computer
Information
Digitalsignal
RPC
Serielle Schnittstelle
Datennetz
Notebook-Computer
Datentyp
Hash-Algorithmus
Virtuelle Realität
Meter
Konfigurationsraum
Expertensystem
Meta-Tag
Elektronische Publikation
Datennetz
Computersicherheit
Gebäude <Mathematik>
Farbverwaltungssystem
Ideal <Mathematik>
Elektronische Publikation
Videokonferenz
Hypermedia
Mereologie
Zahlzeichen
Projektive Ebene
Streaming <Kommunikationstechnik>
Normalspannung
Zeichenkette
Total <Mathematik>
Wellenpaket
Firewall
Puls <Technik>
Computer
Computerunterstütztes Verfahren
Virtuelle Maschine
Datennetz
Virtuelle Realität
Konfigurationsraum
Meta-Tag
Datennetz
Open Source
Computersicherheit
Abstraktionsebene
Netzwerkbetriebssystem
Ruhmasse
Ausnahmebehandlung
Elektronische Publikation
Teilgraph
Emulation
Server
Projektive Ebene
Zentraleinheit
Neuronales Netz
Videospiel
Protokoll <Datenverarbeitungssystem>
Zustandsmaschine
Puls <Technik>
Open Source
Klasse <Mathematik>
Systemaufruf
Ausnahmebehandlung
Ein-Ausgabe
Software Development Kit
Gruppenoperation
Videokonferenz
Emulation
Mereologie
Inverser Limes
Analogieschluss
Innerer Punkt
Funktion <Mathematik>
Softwaretest
Hardware
Hecke-Operator
Klasse <Mathematik>
Gruppenkeim
Systemaufruf
Software Development Kit
Videokonferenz
Virtuelle Maschine
Quadratzahl
Flächeninhalt
Mereologie
Wort <Informatik>
Zusammenhängender Graph
Optimierung
Hacker
Beamer
Brennen <Datenverarbeitung>
Gerade
Analogieschluss
Tabelle <Informatik>
Aggregatzustand
Softwaretest
Beobachtungsstudie
Impuls
Subtraktion
Rootkit
Transinformation
Markov-Ketten-Monte-Carlo-Verfahren
Dienst <Informatik>
Generator <Informatik>
Regulärer Graph
Vererbungshierarchie
Größenordnung
Kantenfärbung
Information
Optimierung
Softwareentwickler
ARM <Computerarchitektur>
Rückkopplung
Expertensystem
Prozess <Physik>
Gewicht <Mathematik>
Wellenpaket
Spieltheorie
Signiertes Maß
Quellcode
Physikalisches System
Open Source
Datenfeld
Regulärer Graph
Standardabweichung
Vererbungshierarchie
Mobiles Internet
Messprozess
Indexberechnung
Smartphone
Parametrische Erregung
Einflussgröße
Prototyping
Fehlermeldung
Resultante
Chipkarte
Prozess <Physik>
Gewicht <Mathematik>
Selbst organisierendes System
Gruppenkeim
Maschinelles Lernen
Raum-Zeit
Whiteboard
Videokonferenz
Virtuelle Maschine
Regulärer Graph
Mustersprache
Erweiterte Realität <Informatik>
Prototyping
Beobachtungsstudie
Softwaretest
Expertensystem
Prozess <Informatik>
Sondierung
Zehn
Winkel
Physikalisches System
Datenfluss
Generator <Informatik>
Datenfeld
Flächeninhalt
Konditionszahl
Faltungsoperator
Ablöseblase
Dualitätstheorie
Projektive Ebene
URL
Smartphone
Standardabweichung
Neuronales Netz
Lineares Funktional
Expertensystem
Softwareentwickler
Datenmissbrauch
Winkel
Automat <Automatentheorie>
Implementierung
Sprachsynthese
Twitter <Softwareplattform>
Physikalische Theorie
Virtuelle Maschine
Erweiterte Realität <Informatik>
Rückkopplung
Flächeninhalt
Fächer <Mathematik>
XML
Front-End <Software>
Mereologie
Projektive Ebene
Phasenumwandlung
Aggregatzustand
Umwandlungsenthalpie
Elektronische Publikation
Prozess <Physik>
Prozess <Informatik>
Momentenproblem
Vererbungshierarchie
Open Source
Versionsverwaltung
Vorzeichen <Mathematik>
Biprodukt
Internetworking
Design by Contract
Data Mining
Arithmetisches Mittel
Dienst <Informatik>
Umwandlungsenthalpie
Unterring
Vorzeichen <Mathematik>
Abgeschlossene Menge
Projektive Ebene
Speicherabzug
Softwareentwickler
Parametersystem
Chipkarte
Softwareentwickler
Kollaboration <Informatik>
Spiegelung <Mathematik>
Prozess <Physik>
Prozess <Informatik>
Open Source
Systemplattform
Physikalisches System
p-Block
Datenfluss
Demoszene <Programmierung>
Open Source
OISC
Entwurfsautomation
Standardabweichung
Mereologie
Projektive Ebene
Programmierumgebung
Resultante
Router
Mathematische Logik
Rahmenproblem
Wellenlehre
Desintegration <Mathematik>
Kombinatorische Gruppentheorie
E-Mail
Nonstandard-Analysis
Standardabweichung
XML
Computersicherheit
Hilfesystem
Assoziativgesetz
Prozess <Informatik>
Open Source
Marketinginformationssystem
Rechenschieber
Patch <Software>
Assoziativgesetz
Entwurfsautomation
Suite <Programmpaket>
Rechter Winkel
Touchscreen
Zellularer Automat
Datenfluss
Viewer
Offene Menge
Punkt
Rahmenproblem
Freeware
Versionsverwaltung
Gefrieren
Bildschirmmaske
Netzwerkverwaltung
Fahne <Mathematik>
XML
Datennetz
Fahne <Mathematik>
Arbeitsplatzcomputer
Bildschirmfenster
Speicherabzug
Data Dictionary
Indexberechnung
Optimierung
Softwareentwickler
Default
Phasenumwandlung
Softwaretest
Soundverarbeitung
DoS-Attacke
Videospiel
Softwareentwickler
Datennetz
Einfach zusammenhängender Raum
Arbeitsplatzcomputer
Data Dictionary
Rahmenproblem
Funktion <Mathematik>
Forcing
Flächeninhalt
Menge
Zahlzeichen
Mereologie
Bandmatrix
Bus <Informatik>
Speicherabzug
Ordnung <Mathematik>
Explosion <Stochastik>
Programmierumgebung
Benutzerführung
Message-Passing
Bit
Punkt
Pixel
Rahmenproblem
Momentenproblem
Protokoll <Datenverarbeitungssystem>
Kategorie <Mathematik>
Stab
Quick-Sort
Demoszene <Programmierung>
Objekt <Kategorie>
Bildschirmmaske
Flächeninhalt
Standardabweichung
Rechter Winkel
Reverse Engineering
Mustersprache
Kantenfärbung
Partikelsystem
Datenstruktur
Lesen <Datenverarbeitung>
Codec
Virtuelle Maschine
Spannweite <Stochastik>
Subtraktion
Pixel
Extrempunkt
Zahlenbereich
Systemaufruf
Sprachsynthese
Bandmatrix
Kantenfärbung
Raum-Zeit
Übergang
Umwandlungsenthalpie
Schnittstelle
Videospiel
Subtraktion
Wald <Graphentheorie>
Sichtenkonzept
Punkt
Momentenproblem
Mathematisierung
Eins
Regulärer Graph
Einheit <Mathematik>
Rechter Winkel
Mustersprache
Information
Kantenfärbung
Datenstruktur
Web Site
Momentenproblem
Wasserdampftafel
Hausdorff-Dimension
PASS <Programm>
Whiteboard
Code
Monster-Gruppe
Client
Informationsmodellierung
Knotenmenge
Flächentheorie
Prozess <Informatik>
Kontrollstruktur
Gerade
Befehl <Informatik>
Web Site
Mailing-Liste
Schwach besetzte Matrix
Konstante
Arithmetisches Mittel
Mereologie
Elektronischer Fingerabdruck
Ordnung <Mathematik>
Normalvektor
Aggregatzustand
Multimedia
Impuls
Web Site
Ortsoperator
Röhrenfläche
Momentenproblem
Zahlenbereich
Element <Mathematik>
Twitter <Softwareplattform>
E-Mail
Gesetz <Physik>
Eins
Rechenschieber
Inverser Limes
Affiner Raum
Hacker
URL
Leistung <Physik>
Physikalisches System
Office-Paket
Rhombus <Mathematik>
Menge
Mereologie
Information
Geneigte Ebene
Ordnung <Mathematik>
Demo <Programm>
Hardware
VHDSL
Sweep-Algorithmus
Verzweigendes Programm
Zahlenbereich
Computer
Frequenz
Gesetz <Physik>
Videokonferenz
Weg <Topologie>
Stapelverarbeitung
Hacker
Standardabweichung
Schreib-Lese-Kopf
Videospiel
Cybersex
Punkt
Quilt <Mathematik>
Installation <Informatik>
Cybersex
Schiefe Wahrscheinlichkeitsverteilung
Verzweigendes Programm
Bildauflösung
Firmware
Punktspektrum
Frequenz
Netzwerktopologie
Open Source
Software
Bildschirmmaske
Menge
Rechter Winkel
Trennschärfe <Statistik>
Gruppe <Mathematik>
Tropfen
Hacker
Optimierung
Hacker
Leistung <Physik>
Zwei
Sprachsynthese
Glättung
Hacker
Gesetz <Physik>
Frequenz
Dialekt
Whiteboard
Standardabweichung
Menge
Mereologie
Datentyp
Gamecontroller
Wort <Informatik>
Hacker
Gebundener Zustand
Chipkarte
Kernel <Informatik>
Stellenring
Zahlenbereich
Physikalisches System
Zeiger <Informatik>
Exploit
Videokonferenz
Hypermedia
Physikalisches System
Dienst <Informatik>
Einheit <Mathematik>
Funktion <Mathematik>
Exploit
Trennschärfe <Statistik>
Speicherabzug
Garbentheorie
Zeichenkette
Arithmetisches Mittel
Ortsoperator
Mereologie
Wort <Informatik>
Computerschach
Graph
Temperaturstrahlung
ATM
Güte der Anpassung
Mathematisierung
Zellularer Automat
Physikalisches System
E-Mail
Twitter <Softwareplattform>
Ereignishorizont
Web Site
Selbst organisierendes System
Web-Applikation
t-Test
Biprodukt
Temperaturstrahlung
Verkettung <Informatik>
Mereologie
Dualitätstheorie
Projektive Ebene
Turm <Mathematik>
URL
Information
Einflussgröße
Message-Passing
Autorisierung
Web Site
Sensitivitätsanalyse
Subtraktion
Röhrenfläche
Physikalismus
Strömungsrichtung
Katastrophentheorie
Whiteboard
Übergang
Temperaturstrahlung
Energiedichte
Arithmetische Folge
Bereichsschätzung
Datenverwaltung
Mittelwert
Arbeitsplatzcomputer
Bildschirmfenster
Nichtunterscheidbarkeit
Volumenvisualisierung
Information
Gammafunktion
Einflussgröße
Lesen <Datenverarbeitung>
Impuls
Distributionstheorie
Expertensystem
Punkt
Sichtenkonzept
Datennetz
Selbst organisierendes System
Mailing-Liste
Kollaboration <Informatik>
Twitter <Softwareplattform>
Hypermedia
Projektive Ebene
Information
Speicher <Informatik>
Normalvektor
Figurierte Zahl
E-Mail
Server
Dynamic Host Configuration Protocol
Netzwerkverwaltung
Quader
XML
Adressraum
t-Test
YouTube
Grundraum
Beobachtungsstudie
Netzadresse
Office-Paket
Distributionstheorie
Gewicht <Mathematik>
Punkt
Wellenpaket
Euler-Winkel
NP-hartes Problem
Kartesische Koordinaten
Broadcastingverfahren
Netzadresse
Netzwerktopologie
Loop
Netzwerkverwaltung
Client
XML
Datennetz
Datenstruktur
Umwandlungsenthalpie
Datennetz
Protokoll <Datenverarbeitungssystem>
Datenhaltung
Bitrate
Office-Paket
Dynamic Host Configuration Protocol
Menge
Einheit <Mathematik>
Server
Wort <Informatik>
Information
Innerer Punkt
Softwaretest
Punkt
Datennetz
Gebäude <Mathematik>
p-Block
Binder <Informatik>
Ein-Ausgabe
Whiteboard
Design by Contract
Einheit <Mathematik>
Wellenwiderstand <Strömungsmechanik>
Gerade
Leistung <Physik>
Aggregatzustand
Offene Menge
Server
Punkt
Spiegelung <Mathematik>
Adressraum
Fächer <Mathematik>
Hecke-Operator
Übergang
Data Mining
Client
Digitalsignal
Grundraum
Virtuelle Adresse
Leistung <Physik>
Sichtenkonzept
Datenhaltung
Quellcode
Dichte <Physik>
Dynamic Host Configuration Protocol
Koalition
Offene Menge
Physikalische Theorie
Server
Client
Data Mining
Resultante
Offene Menge
Web Site
Metadaten
Rahmenproblem
Weg <Topologie>
Schriftzeichenerkennung
Information
Datensicherung
Datensicherung
Gesetz <Physik>
Code
Physikalisches System
Metadaten
Virtuelle Maschine
Vorzeichen <Mathematik>
Total <Mathematik>
Protokoll <Datenverarbeitungssystem>
Skript <Programm>
Einflussgröße
Gerade
URL
Virtuelle Adresse
Protokoll <Datenverarbeitungssystem>
sinc-Funktion
Web Site
Dichte <Stochastik>
Physikalisches System
Packprogramm
Gesetz <Physik>
Text Mining
Existenzsatz
Menge
Rechter Winkel
Last
Aggregatzustand
Fehlermeldung
Server
Gewichtete Summe
Installation <Informatik>
Quellcode
Binder <Informatik>
Packprogramm
Internetworking
Rechenschieber
Client
Twitter <Softwareplattform>
Rechter Winkel
Notebook-Computer
Client
Information
Implementierung
Videokonferenz
Rechenschieber
Datenfeld
Wellenpaket
Wärmeübergang
Spektrum <Mathematik>
Codierung
Vorzeichen <Mathematik>
Projektive Ebene
Reelle Zahl
E-Mail
Rechenschieber
Rahmenproblem
Datennetz
Open Source
Hypermedia
Codierung
Facebook
Smartphone
Framework <Informatik>
Code
Zuckerberg, Mark
Chipkarte
Magnetbandlaufwerk
Virtuelle Maschine
Bit
Datenfeld
Gewicht <Mathematik>
Virtuelle Realität
Informationsverarbeitung
Booten
Decodierung
Menge
Programm
Parametersystem
Punkt
t-Test
Bipartiter Graph
Dreiecksfreier Graph
Vererbungshierarchie
Codierung
Projektive Ebene
Maschinelles Sehen
Abstand
Optimierung
Auswahlaxiom
Shape <Informatik>
Umwandlungsenthalpie
Prozess <Physik>
Gravitation
Raum-Zeit
Gruppenkeim
Ruhmasse
Programmierumgebung
Flüssiger Zustand
Menge
Raum-Zeit
Spannweite <Stochastik>
Netzwerktopologie
Arithmetisches Mittel
Druckverlauf
Spannweite <Stochastik>
Skalarprodukt
Diskrete Simulation
Konditionszahl
Mereologie
Phasenumwandlung
Projektive Ebene
Gasdruck
Simulation
Programmierumgebung
Bildgebendes Verfahren
Lie-Gruppe
Funktion <Mathematik>
Quelle <Physik>
Videospiel
Einheit <Mathematik>
Wasserdampftafel
Polare
Mereologie
Speicherabzug
CAD
Projektive Ebene
Speicherabzug
Topologische Mannigfaltigkeit
Kreiszylinder
Übergang
Energiedichte
Bit
Projektive Ebene
Quellcode
Information
Biprodukt
Innerer Punkt
Raum-Zeit
Videokonferenz
Quelle <Physik>
Bruchrechnung
Satellitensystem
Bit
Subtraktion
Reelle Zahl
Automatische Indexierung
Punktspektrum
Kantenfärbung
Frequenz
Sommerzeit
Schreib-Lese-Kopf
Kern <Mathematik>
Videospiel
Web Site
Gewichtete Summe
Existenzaussage
Zahlenbereich
Übergang
Bitrate
Biprodukt
Kern <Mathematik>
Dialekt
Rechenschieber
Netzwerktopologie
Druckverlauf
Flächeninhalt
Vorzeichen <Mathematik>
Last
Mereologie
Meter
Gasdruck
Kantenfärbung
Bitrate
Schnitt <Graphentheorie>
Schreib-Lese-Kopf
Punkt
Matching <Graphentheorie>
Prozess <Informatik>
Datenhaltung
Kartesische Koordinaten
Strömungsrichtung
Dienst <Informatik>
Quellcode
Systemplattform
Raum-Zeit
Datenhaltung
Design by Contract
Prozess <Informatik>
Ablöseblase
Punkt
Ausnahmebehandlung
Prozess <Informatik>
Natürliche Zahl
Gruppenoperation
Gruppenkeim
Ausnahmebehandlung
Kartesische Koordinaten
Information
Matching
Term
Systemaufruf
Division
Strategisches Spiel
Design by Contract
Konstante
Rechenschieber
Quellcode
Diagramm
Prozess <Informatik>
Design by Contract
Mereologie
Ruhmasse
Disjunktion <Logik>
Gerade
Public-Key-Kryptosystem
Maschinenschreiben
Wellenpaket
Punkt
Momentenproblem
Freeware
Abgeschlossene Menge
Gebäude <Mathematik>
Kartesische Koordinaten
E-Mail
Abstraktionsebene
Transportproblem
Systemplattform
Datenmissbrauch
Service provider
Chiffrierung
Service provider
Physikalisches System
Message-Passing
Font
Datenverwaltung
Software
Typentheorie
Zentralisator
E-Mail
Nichtlinearer Operator
Datenmissbrauch
Synchronisierung
Schlüsselverwaltung
Computersicherheit
Kryptologie
Default
Gebäude <Mathematik>
Güte der Anpassung
Systemplattform
Ruhmasse
Telekommunikation
Software
Auswahlaxiom
Chiffrierung
Ruhmasse
Elektronischer Fingerabdruck
Dateiformat
Projektive Ebene
Partikelsystem
Schlüsselverwaltung
Message-Passing
Standardabweichung
Humanoider Roboter
Zentralisator
Server
Momentenproblem
Formale Sprache
Applet
E-Mail
Chiffrierung
Datenverwaltung
Hash-Algorithmus
Minimum
Bildschirmfenster
Elektronischer Fingerabdruck
Softwareentwickler
Gleitendes Mittel
Default
E-Mail
Schnittstelle
Schnelltaste
App <Programm>
Softwareentwickler
Schlüsselverwaltung
Synchronisierung
Protokoll <Datenverarbeitungssystem>
Open Source
Default
Kryptologie
Applet
Ruhmasse
Rechenschieber
Objekt <Kategorie>
Software
Chiffrierung
Datenverwaltung
COM
Anpassung <Mathematik>
Elektronischer Fingerabdruck
Ruhmasse
Wort <Informatik>
Computerarchitektur
Zentralisator
Freeware
Momentenproblem
Formale Sprache
Polygonnetz
IP
Dienst <Informatik>
Computerunterstütztes Verfahren
Internetworking
Open Source
Chiffrierung
Message-Passing
Erwartungswert
Multiplikation
Datenverarbeitungssystem
Gruppentheorie
Perspektive
Software
Kryptologie
Code
Protokoll <Datenverarbeitungssystem>
Elektronischer Fingerabdruck
Elektronischer Programmführer
Inhalt <Mathematik>
Default
Hacker
Streuungsdiagramm
Sichtenkonzept
Schlüsselverwaltung
Synchronisierung
Protokoll <Datenverarbeitungssystem>
Default
Kryptologie
Stellenring
Systemplattform
Peer-to-Peer-Netz
Sichtenkonzept
Portabilität
Software
Dienst <Informatik>
Chiffrierung
Rechter Winkel
Wort <Informatik>
Polygonnetz
Partikelsystem
Message-Passing
Streuungsdiagramm
Soundverarbeitung
Hypermedia
Systemprogrammierung
Medianwert

Metadaten

Formale Metadaten

Titel 34C3 - Lightning Talks Day 2
Serientitel 34th Chaos Communication Congress
Autor gedsic
bigalex
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34904
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!
Schlagwörter CCC

Zugehöriges Material

Video wird in der folgenden Ressource zitiert

Ähnliche Filme

Loading...
Feedback