We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Chaos Communication Camp 2015: Lightning Talks: Day 3

00:00

Formal Metadata

Title
Chaos Communication Camp 2015: Lightning Talks: Day 3
Title of Series
Number of Parts
85
Author
License
CC Attribution 3.0 Germany:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!
16
49
Thumbnail
19:54
56
58
Thumbnail
47:17
69
Chaos theoryInformation and communications technologyCASE <Informatik>Multiplication signScheduling (computing)State of matterHacker (term)Projective planeEmailDigital mediaWikiSlide ruleLevel (video gaming)SpacetimeSpeech synthesisPlanningProbability density functionPosition operatorLecture/Conference
Chaos theorySlide ruleMultiplication signPotenz <Mathematik>Speech synthesisNeuroinformatikLine (geometry)Phase transitionRight angle2 (number)Computer animationLecture/Conference
Information and communications technologyChaos theoryProjective planeSlide ruleSystem callGradientPhysical systemPerturbation theoryFrequencyRange (statistics)FreewareSoftwareDialectCASE <Informatik>Computer animation
Information and communications technologyChaos theoryGreen's functionAreaBuildingSoftwareConnected spaceCellular automatonSpeech synthesisHand fanAssembly languageFormal languageData structureRobotSpacetimeComputer animation
Information and communications technologyChaos theoryPoint (geometry)TupleHacker (term)Open setCoefficient of determinationDigital photographyFrame problemTelecommunicationSelf-organizationAreaMultiplication signMoment (mathematics)Computer animationMeeting/Interview
Information and communications technologyChaos theoryInformation and communications technologyLimit (category theory)WindowBeat (acoustics)System callMultiplication signGodInternettelefonieAmenable groupFeedbackMedical imagingBitMoment (mathematics)Computer animationMeeting/Interview
Information and communications technologyChaos theoryEnterprise architectureAreaPoint (geometry)GodBulletin board systemWater vaporTelecommunicationField (computer science)Formal languageSoftwareView (database)Lattice (order)Link (knot theory)Noise (electronics)Computer animationMeeting/Interview
Chaos theoryEncryptionInformation and communications technologyTwitterStatement (computer science)Different (Kate Ryan album)Slide ruleMultiplication signEntire functionPairwise comparisonEvoluteProjective planeGodDivisorFeedbackMetric systemAsynchronous Transfer ModeAlgorithmWebsiteWeb 2.0Web browserError messageRule of inferenceFigurate numberMixed realityExtension (kinesiology)Expert systemMereologyInformationContent (media)Connected spaceStudent's t-testProcess (computing)Data miningComputing platformEncryptionPhysical systemInternetworkingWeb pageCryptographyServer (computing)WindowPerformance appraisalGame theoryTransport Layer SecurityDynamical systemMeeting/InterviewLecture/ConferenceComputer animation
Chaos theoryReverse engineeringProcess (computing)InfinityWater vaporPermanentFood energyIntegrated development environmentBoom (sailing)Multiplication signNatural numberLecture/ConferenceComputer animationPanel painting
Information and communications technologyChaos theorySpacetimeTerm (mathematics)PlanningDifferent (Kate Ryan album)Lattice (order)Source codeMultiplication signRenewal theoryComputer animation
Chaos theory2 (number)WebsiteWeb 2.0Decision theoryObject (grammar)BitHacker (term)HTTP cookieSystem callRight angleTrailPlanar graphInformation securityService (economics)Computer animationLecture/Conference
Information and communications technologyChaos theoryLetterpress printingProbability density functionBitWikiMultiplication signProjective planeVirtual machineMachine learningMathematicsLibrary (computing)CodeSlide rulePosition operatorTriangleGame theoryNumberGreatest elementRevision controlRobotAdditionCuboidWebsiteCountingLecture/ConferenceComputer animation
Information and communications technologyChaos theoryInsertion lossJava appletCartesian closed categoryScripting languagePosition operatorGoodness of fitCuboidGraph coloringGame theoryImplementationComputer programmingSlide rulePoint (geometry)Event horizonWaveEndliche ModelltheorieEvoluteComputer animation
Information and communications technologyChaos theorySpeech synthesisMultiplication signDirection (geometry)Digital mediaMereologyInformation securityMusical ensembleLecture/ConferenceComputer animation
Information and communications technologyChaos theoryRight angleMusical ensembleSoftware testingRule of inferenceChemical equationComputer animationLecture/Conference
Integrated development environmentMetropolitan area networkChaos theoryInformation securityInformation privacyHacker (term)Information and communications technologyMusical ensembleDemosceneRule of inferenceChemical equationLie groupOpen sourceInformation securityShared memoryGodAuthorizationRight anglePoint (geometry)Information privacyView (database)SoftwareDigital photographyComputer animationXMLLecture/Conference
VideoconferencingOnline chatComputer-generated imageryAddress spaceTelecommunicationInformation and communications technologyChaos theoryImplementationComputer networkGroup actionSimilarity (geometry)Server (computing)Logical constantData structureAddress spaceInheritance (object-oriented programming)Computer fileInformation and communications technologyPoint cloudShared memorySelf-organizationVideoconferencingOpen setOnline chatInformation securitySet (mathematics)FluidQuicksortSimilarity (geometry)Turbo-CodeInternet forumLecture/Conference
Chaos theoryEmailDescriptive statisticsGroup actionAssociative propertyMultiplication signTheory of relativityNumberSystem administratorMathematicsOperator (mathematics)Service (economics)Staff (military)Sinc functionDigital electronicsLecture/ConferenceMeeting/InterviewJSONXML
Chaos theoryStorage area networkInformation and communications technologyCore dumpTwitterWeb applicationOpen setWeb 2.0Software developerProjective planeQuicksortMobile appData managementCore dumpExterior algebraOpen sourceFreewareSelf-organizationBitCartesian coordinate systemComputer programmingFile systemComputing platformDocument management systemSlide ruleScripting languageXMLLecture/Conference
Beer steinInformation and communications technologyChaos theoryWorld Wide Web ConsortiumInformation securityWordGoogolDensity of statesStorage area networkWritingHacker (term)Data managementImplementationData recoveryServer (computing)Scripting languageUsabilityOrder (biology)Open setText editorSoftware developerComputing platformCartesian coordinate systemSynchronizationDifferent (Kate Ryan album)WindowWeb browserWeb applicationImplementationPatch (Unix)Document management systemVapor barrierIntegrated development environmentStandard deviationWordSelf-organizationMobile appSoftwareStack (abstract data type)Information securityServer (computing)Maxima and minimaData managementProjective planeWeb 2.0Slide ruleQuicksortHacker (term)Web page
Computer programmingPrime idealWritingComputer programRadiusVolumeoutputRandom numberTouchscreenInformation and communications technologyChaos theoryStudent's t-testComputer hardwareIdeal (ethics)Interface (computing)Thermal expansionWorkstation <Musikinstrument>Software developerCartesian coordinate systemMultiplication signTelecommunicationProjective planeStudent's t-testRepository (publishing)Task (computing)Order (biology)Reading (process)CausalityComputer hardwareComputer programmingPower (physics)Price indexNeuroinformatikWhiteboardResultantMicrocontrollerRight angleSpring (hydrology)Universe (mathematics)Variable (mathematics)Interface (computing)Workstation <Musikinstrument>CoprocessorBit rateDirected graphSlide ruleProcess (computing)Lecture/Conference
PrototypeFirmwareMereologyOrder (biology)WhiteboardSoftwareChaos theorySource codeInformation and communications technologyPrototypeStudent's t-testImplementationScaling (geometry)Slide ruleRing (mathematics)Multiplication signVector spaceWhiteboardTask (computing)MereologySource codeBoss CorporationVirtual machineConnectivity (graph theory)TelecommunicationCuboidSineComputer animation
Reverse engineeringWritingStandard deviationSoftwareInformation and communications technologyChaos theoryLimit (category theory)Process (computing)ChainReal numberData storage deviceVirtual machineProjective planeSoftwareDevice driverSlide ruleMultiplication signGroup actionWhiteboardTelecommunicationWorkstation <Musikinstrument>Lecture/ConferenceComputer animation
Expert systemInformation and communications technologyChaos theoryInternetworkingMultiplication signExpert systemSocial classDressing (medical)Physical lawLecture/Conference
InternetworkingDigital mediaGUI widgetChaos theoryIntegrated development environmentExpected valuePhysical lawLimit (category theory)InternetworkingBit rateMereologyDigital mediaConnected spaceRight angleTouchscreenWebsiteFacebookQuicksortElectronic mailing listRefractionMeeting/Interview
Level (video gaming)Firewall (computing)SpywareDirect numerical simulationInformation and communications technologyChaos theoryYouTubeTwitterFacebookUniform resource locatorCommunications protocolVirtuelles privates NetzwerkGoogolProxy serverComputer-generated imageryConfiguration spaceFreewarePlastikkarteInformationService (economics)Internet service providerInformationFacebookCommunications protocolFirewall (computing)WordPlastikkarteBitWebsiteProxy serverService (economics)QuicksortSocial classVirtuelles privates NetzwerkSpywareOpen setInformation privacySound effectSource codeCuboidAndroid (robot)InternetworkingWeb 2.0Block (periodic table)Metropolitan area networkDirect numerical simulationFreewareIntercept theoremUniform resource locatorParticle systemRight angleTwitterMereologyRegulator gene
Slide ruleTranslation (relic)Multiplication signHacker (term)DialectGoodness of fitLecture/ConferenceMeeting/Interview
Chaos theoryBitComputer-generated imageryInformation and communications technologyCommodore VIC-20Complete metric spaceMaß <Mathematik>PrototypeBefehlsprozessorPlane (geometry)Turing testGame theoryComputerFrame problemElectronic visual displayData bufferData storage deviceImage resolutionComputer programmingLaptopPhysical systemBootingMereologyAdditionVirtual machineNeuroinformatikSlide ruleError messageGradientPower (physics)Real numberComplex numberMultiplication signFrame problemWhiteboardCASE <Informatik>Physical systemComputer hardwareLevel (video gaming)AdditionCanonical ensembleTask (computing)PrototypeEndliche ModelltheorieAsynchronous Transfer ModeData storage deviceReal-time operating systemMereologyBitSpacetimeOrder (biology)Electronic visual displayBefehlsprozessorGroup actionForm (programming)Beat (acoustics)NP-hardXMLUML
Plane (geometry)Field programmable gate arrayPhysical systemSoftwareSoftware testingKeyboard shortcutInformation and communications technologyChaos theoryInternet forumPrototypeRight angleFirmwareVirtual machinePlastikkartePhysical systemSoftware developerCASE <Informatik>Slide ruleBitHacker (term)Lecture/Conference
Information and communications technologyChaos theoryDigital signalFormal grammarSpacetimeBitHacker (term)Hecke operatorInsertion lossSurjective functionProjective planeField (computer science)Student's t-testLimit (category theory)Power setUML
HierarchyInformation and communications technologyChaos theoryInternet forumHacker (term)Arithmetic meanStudent's t-testShared memoryProjective planeHierarchyStaff (military)SpacetimeLevel (video gaming)Right angleSlide rule
Information and communications technologyChaos theoryInformationKernel (computing)CoprocessorBootingMobile WebSoftwareMereologyFreewarePhysical systemFirmwareDigital electronicsWebsiteProjective planeCASE <Informatik>TwitterHacker (term)Digital electronicsModemComputer hardwareInformation securityDegree (graph theory)MereologyReading (process)RootPhysical systemBootingAbstractionInformation privacySoftwareBefehlsprozessorInformation and communications technologyMobile WebCartesian coordinate systemOperating systemSoftware frameworkKernel (computing)Revision controlView (database)Android (robot)Lecture/Conference
Physical systemFreewareMobile WebChaos theoryOpen sourceBootingInterface (computing)ModemAreaGraphics processing unitComputer hardwareProcess (computing)Reverse engineeringMereologySoftwareData structureMultiplication signAreaInformation privacyPhysical systemComputer hardwarePoint (geometry)Hacker (term)Operating systemFreewareProjective planeOnline helpInformation securityWater vaporBoss CorporationBitBootingMobile WebModemAbstractionGraphics processing unitReplication (computing)Level (video gaming)Operator (mathematics)
PasswordDigital signalInterface (computing)SmartphoneInformation and communications technologyChaos theoryPersonal digital assistantCommunications protocolPortable communications deviceSingle-precision floating-point formatFunction (mathematics)Open setComputer hardwareSoftwareSurfaceGoodness of fitData managementPasswordProjective planeData miningSlide ruleVirtual machineInformationPrototypeMechanism designBitCoefficient of determinationFacebookMultiplication signPoint (geometry)Instance (computer science)Image registrationPoint cloudTerm (mathematics)Menu (computing)Physical lawDatabaseMeeting/InterviewLecture/Conference
Information and communications technologyChaos theoryPasswordData storage deviceComputer hardwareType theoryFirmwareSoftware developerBitProcess (computing)FreewareSoftwareInstance (computer science)Multiplication signMessage passingComputer-assisted translationOpen sourceSpeech synthesisFood energyQuicksortChannel capacityBootingInterface (computing)WebsiteLecture/ConferenceMeeting/Interview
Data modelAnalogyInformation and communications technologyChaos theoryParticle systemWebsiteGame controllerLevel (video gaming)Web browserAnalogyInformation and communications technologyInstance (computer science)InformationStack (abstract data type)Physical systemSlide ruleTask (computing)Projective planeCryptographyElectronic visual displayWeb pageMicrocontrollerSoftware developerData structureSoftwareCommunications protocolWeb 2.0Semiconductor memoryDirection (geometry)Computer animation
Information and communications technologyInformationCodeBuildingDistanceRow (database)NeuroinformatikReduction of orderInternetworkingTotal S.A.DampingComputer animationLecture/ConferenceMeeting/Interview
CodeGame theorySmartphoneCodeTablet computerEmailProcess (computing)WebsiteMultiplication signComputer programmingLink (knot theory)Ferry CorstenHacker (term)Coma BerenicesRow (database)SpacetimeMereologyLecture/Conference
Information and communications technologyChaos theoryMultiplication signPrisoner's dilemmaHacker (term)Process (computing)Inheritance (object-oriented programming)Ferry CorstenBlogTime zonePower (physics)Projective planeComputer-assisted translationComputer animationLecture/Conference
Chaos theoryReading (process)Solitary confinementMultiplication signLeakRight anglePhysical systemGravitationPrisoner's dilemmaPlastikkarteTable (information)10 (number)Denial-of-service attackAddress spaceComputer animation
Information and communications technologyChaos theoryModule (mathematics)Function (mathematics)VideoconferencingProbability density functionProjective planeWikiSlide ruleOnline helpState of matterDigital Equipment CorporationLetterpress printingProduct (business)CuboidVideoconferencingLecture/ConferenceMeeting/InterviewComputer animation
Information and communications technologyChaos theoryVideoconferencingSystem programmingPhysical systemContent (media)Line (geometry)Revision controlWebsiteStreaming mediaFirmwarePhysical systemVideoconferencingProjective planeContent (media)Slide ruleStreaming mediaOnline helpCartesian closed categoryDigital video recorderCuboidUniqueness quantificationGoodness of fitProduct (business)Software testingInterface (computing)TouchscreenContrast (vision)WebsiteMereologyOpen sourceComputer hardwareXMLComputer animationEngineering drawing
Electronic visual displayUniformer RaumChaos theoryFirmwareNP-hardInformation and communications technologyComputer hardwareSign (mathematics)outputFunction (mathematics)Thermal expansionField programmable gate arrayRandom numberWhiteboardParity (mathematics)Physical systemSlide ruleFitness functionFirmwareComputer hardwareOffice suiteType theoryNoise (electronics)WhiteboardRow (database)VideoconferencingFunction (mathematics)EstimatoroutputMultiplication signMixed reality
Streaming mediaPhysical systemVideoconferencingData miningInformation and communications technologyChaos theorySoftwareHacker (term)CodeScripting languageTask (computing)Front and back endsEvent horizonSlide ruleVideoconferencingNeuroinformatikPhysical systemComputerBitPresentation of a groupMixed realitySoftwareWordFile formatWebsitePoint cloudGraphic designOpen sourceEvent horizonDebuggerFront and back endsContent (media)Engineering drawing
Event horizonGoogolComputer networkLine (geometry)Information and communications technologyChaos theoryFacebookPhysical systemInterface (computing)Motion captureVideoconferencingSoftwareBitEvent horizonSlide ruleElectronic mailing listFacebookWebsiteEmailPhysical systemMultiplication signLink (knot theory)Staff (military)IterationGoogle+Loop (music)VideoconferencingLine (geometry)Product (business)Task (computing)Mixed realityMoment (mathematics)MereologyComputer animationLecture/Conference
Chaos theoryInformation and communications technologyBitData miningMechanism designDemo (music)Slide ruleNumberMereologyCountingFormal languageLatent heatVideoconferencingGame theoryOpen setMultimedia1 (number)Execution unitMultiplication signView (database)Digital mediaoutputFile viewerDisk read-and-write head
Information and communications technologyChaos theory2 (number)WebsiteElectronic mailing listMultiplication signCellular automatonQuicksortInfinitySelectivity (electronic)Medical imagingQuantumProjective planeComputer animation
Information and communications technologyChaos theoryPhysical systemYouTubeCASE <Informatik>Multiplication signVideoconferencingSpeech synthesisBarrelled spaceLecture/Conference
Combinational logicMoment (mathematics)Spring (hydrology)
Information and communications technologyChaos theoryGroup actionField (computer science)NumberClosed setFluxLecture/Conference
Projective planeComputer virusHacker (term)WikiGroup actionOpen setRothe-VerfahrenProbability density functionSpacetimeShared memoryProcess (computing)Revision controlChaos theoryAddress spaceAcoustic shadowOpen sourceVirtual machineComputer fileWordMultiplication signWaveConditional-access moduleGame theoryFile formatLattice (order)State of matterTable (information)Server (computing)Digital mediaInformationInformation privacySingle-precision floating-point formatLecture/ConferenceDiagramMeeting/Interview
Roundness (object)Translation (relic)2 (number)Latin squareLecture/ConferenceJSONComputer animation
Transcript: English(auto-generated)
Yes, thank you very much for your interest in this day's lightning talks. I am Zee Fisher. I'm only sitting here. The real work was done by Tseltofil, who is not visible,
but who did all the scheduling and called hundreds of people and emailed, figuratively, thousands of people. Yes, some quick notes. We still need a lot of lightning talks, especially for tomorrow. Tomorrow there will be lightning talks at the same time as today, or maybe at 4pm flat in the best case.
And if you want to present your project, if you want to present something cool you did at your Hackerspace or at home, or that you did in politics, something you drew, some art you're doing, some instrument you're playing, you can get your five minutes of fame at the lightning talks. Just submit it.
The instructions are all on the wiki. You can find it when you look for lightning talks. It's just an email and a PDF upload of your slides and we'll be very happy to host you tomorrow. Every lightning talk will be recorded and streamed, so you can enjoy your glory years later by watching it on media.ccc.de.
Some quick notes for the speakers today. Please, if your talk is next, you can see it from the schedule on the wiki and you should also have gotten an email that tells you your position. Please come behind the stage, sit in the chair that is provided for you
and when the speaker that talks before you finishes, just come right on stage, come here, adjust the microphone, you can talk into it, and then start your talk. Please repeat questions you're being asked if the person from the audience who's asking didn't step up to the microphone.
To the people from the audience, please step up to the microphone to ask questions and ideally already line up doing the talk so that we don't lose any time. For the speakers, I will play your slides on this computer. Please just give me a quick nod or say next when I shall advance your slides and then everything is going to work out.
So, maybe our first speaker is already here. I think the timekeeping device here, I don't have to explain. Just a note for the speakers. Your speaking time does not end when the green line is on the top because if I show you, you have five minutes.
So, let's do this fast forward. The green line will rise up during the first four minutes of your talk. So, if it's on top, like this is a few seconds, then you still have one minute left.
Then during the yellow phase, these are the first 30 seconds of your one minute that is left and when it gets red, then you have 30 seconds left and now you have an hour in the last second. So, you don't need to rush. You have five minutes, not only four minutes.
Yes, our first talk will be given by Katja Lopez, who is talking about the right to dream.
Please give her a warm welcome.
So, I'm going to show you some slides and I'm going to talk about the project that I've been filming in the last year.
It's about the first case worldwide of cost free assignments of GCM frequencies and this extraordinary thing is happening in Oaxaca, in Mexico,
where some people working with the Mexican community, indigenous community from our region, it's called Oaxaca in Mexico and it's one of the poorest regions of the country. Now they have this free range of network of GCM.
This documentary is a travel. It's a travel about the open knowledge that made possible that this technology now is developing and is used for people in rural areas of Mexico that before this technology arrived then,
there was not other kind of GCM networks because no one in private industry was interested to supply them these connections. As you can see in the slides, it's a very rural area where all the people is eating all the cultivated
and even in this area, the people doesn't speak Spanish. They speak Zapotec, Mije and other kind of indigenous region or new indigenous languages. Also this area, they work in assemblies
where they decide the things. They still don't have political parties in these villages and they organize by the same in assemblies and in these pre-Hispanic structures.
So the point is that it could be some strength but these people share a lot of things with the hacker ethics about how to share things and about the open knowledge. They, for example, have one thing that is called tequio
that it means that you have to work for the community and you have to share these things. So as you see in the photos, they are extracted frames. So in this area, with this extraordinary situation
about the political organization, I arrived to one organization and it's called Rhythmatica who is building these GCM networks and it's like some kind of do-it-yourself telecoms. You can see in the images, some different images, these guys are assembling these antennas
and at the same time they are collaborating and working with the people in the communities. And it is really funny because in this moment that the people start to work with each other, they really learn about the experience from one to another. The people of these communities decide
how they want to manage the communication and how to work with the limits and how to manage it. They decide to set up a small amount of money each month and this is the cost of the telephony. You can call inside of the village and this is the price to make all the calls.
If you want to call outside, you need to give another amount of money and this is using a VoIP technology. So the documentary is still in production. We are going to launch a campaign in October
and we came here to show some images to talk about and maybe to find some kind of feedback or even we bring some t-shirts to sell and we wanted to share this small piece of history. Could you be a little bit more fast?
So, wait one moment. All people know... The another one? Yes, the telephone? Yeah. No. That one.
All people know Mexico, people know Ayotzinapa, all people know all the things that are happening, but the point is that now the technology in this country is entering in some of these areas like decolonization technology. It's not a big enterprise who is going there. Maybe you know about Carlos S. Lind,
who is the richest person in the world. So he is the owner of all the telecoms in Mexico, the biggest telecoms. So this story is also about Goliad, the small against the small.
It's an observational documentary. It's not that I am entering into the field and provoking things. As you can see, for example, in this image, all the networks are using the languages of these own abilities. This language is Mije, because the people of the village
decided that this is the language that needs to be used. Thanks a lot.
Our next speaker is Frick, talking about TLSCompare.org. So, hello everyone. My name is Martin. Frick is my Twitter handle. I'm going to talk about TLSCompare today,
because I think it's an interesting experiment that we did back in Vienna. Next slide please. So one of the, I'm probably sure you all know TLS and you know what it does and what it can do. One of the problems with TLS is that it's not that widespread in use, as it could be or it should be.
So passive, observing, dragnet surveillance, those are all very common threats on the internet. HTTPS would be perfectly securing it and making it harder to attack. So one of the problems is it's not used enough. There are two really good projects from the EFF.
One is Let's Encrypt and the other one is HTTPS Everywhere. I really recommend you to watch the talk of Peter Eckersley on Let's Encrypt on Monday, I think, in the afternoon, because this will change the entire HTTPS ecosystem, which is really a game changer. And the other slide is, the other project is Let's Encrypt HTTPS Everywhere,
which is a browser extension which manages a rule set to upgrade website connections to TLS where available. You can download it for almost every platform and if you use a browser you definitely should install it because it makes encryption more pervasive and more expensive to attack.
Next slide please. So what we did, and in particular to students of mine, Dominic and Willy, we tried to automate the process of creating rules for HTTPS Everywhere. So right now it's a manually maintained set of about 10,000 rules
and we started with the idea, okay, we have Alexa, one million websites, how many of them support HTTPS and how many of them deliver the same content? So the first thing we did is to crawl the Alexa top one million on both ports for HTTP and HTTPS and then we had the problem, we had to compare those two websites
and to see if they're equal or not and if they're equal to generate a rule for HTTPS Everywhere. Problem is, dynamic content is really tricky, so websites that look similar can be totally different and vice versa, so you really have to have different metrics in place to compare the websites
and this is where tlscompare.org comes into place. Next slide please. So two of the most promising metrics we had are shown in the figure. You can clearly see that there are a lot of websites which are probably the same and a lot of which are definitely not the same.
Next slide please. And the problem with those 120,000 rules that we created is for one, it crashes the browser because the browser extension is not manageable for such a large rule set and it's automatically generated, so we really need some efforts to manually verify those rules
and to see if those rules make sense or not. So this is where tlscompare.org comes into place. You can see a screenshot. It's really easy, it has three buttons in the regular mode, so you click the middle button and say you want to compare two websites. Next slide please. And then two windows pop up where you can visually compare those pages
and can then click the green or the yellow button if they are factually the same websites or not. Next slide please. We also have an expert mode, so if you know what the 404 error is or if you know what mixed content warning is,
then you should check out the expert mode. It has much more detailed information you can provide. And what we are hoping to do with this platform is to make the most popular parts of the web protected by HTTPS everywhere. So right now there are a lot of rules in there, but we could really add another 10,000,
like doubling the size of the rule set with not that much cost. So if everybody goes to tlscompare.org and clicks five times, next slide please, then we can really blow up this rule set until Let's Encrypt is ready for rolling out.
So please go to tlscompare.org, have a look. If you have any questions, I'd be happy to answer questions. Most of the times I'm at live on right outside of the tent, so you can find me there. But you can also find me on, next slide please,
you can also find me on Twitter. The whole project is on Twitter, and I'd be happy to get any feedback or a lot of evaluations from you. Thank you very much. Thank you very much. Next up is the person who originally was meant to go first,
namely Stivak, 99. Hello, my name is Michael. I'm 28 years old, four and a half years in the UK, and I had my first psychedelic experience in 2008 and ever since I've been tripping. Basically, I imagine what would happen if anything was possible
and I was to Ozora, boom, Burning Man, and now I'm here and I want to keep this spirit with me at all times. I am determined to buy a land in southern Portugal and establish a permanent permaculture,
harvest energy from the sun, harvest water from the ocean, using process of reverse osmosis, have infinite amount of energy, infinite amount of fresh water, and using beautiful nature, have delicious organically grown food. This is a perfect place for hacking environment
and for many years it wasn't possible because of the money, because of money this, money this, money that, and when I was traveling, I'm originally from Poland. Most of you are from Germany. There was like many differences in terms of,
yes, there were some differences, but it's not about differences. It's about being open to new opportunities, new possibilities. Me living in London, I have finally financial opportunity to either buy the land after two years of work.
This is just me working for two years buying a land or I can invest this money. I have a plan. Rent a house with a large garden and some parking space and invite all you guys, you and you and you, to come and visit me in my new place in London
and just start creating foundation because the genesis, what does it mean? Genesis is the beginning source origin. RE, just like renew, reset, restart, and technology is there. Future is there.
The future is now. It's basically, it is happening. And sometimes I was thinking, someone will do this. Someone will make it happen. But in reality, every one of us creates this festival and I don't want to wait another four years to make this happen.
I won't have this feeling with me at all times. London is a beautiful place. I need to admit it is expensive and when I first moved in 2011, I was living on a squat. I had no money at all and it is tough. I decided that money is no longer an issue.
Money is no longer an object and I make decisions based on value. And we have a mission to make and in the last few seconds, I just invite you to visit the website, genesis.re. Of course, it was hacked, just like everything on the hacker festival, but it is no cookies, no tracking, no JavaScript,
just a little bit of a plain text explaining what I have to say right here, right now. And this is a beautiful visionary artwork of Alexander Ward, who is my friend. And I wish you best of luck on this journey.
Be excellent to each other. Genesis.re is the site I would like you to visit. Basically, this is it. Have an excellent festival and I wish you best of luck in this journey. Thank you very much.
Next up is a short public service announcement. Most people of you will already have heard it. This is for those who just came in. Please make sure, if you're not sure if your tent is really secured and everything is watertight,
please go to your tent and secure it. We're expecting a bit of gusty wind, nasty gusty wind and a bit of rain, so keep your stuff secured, please. And another announcement for me to the people who just came in. We're still looking for lightning speakers for tomorrow, so if you have a project to present, please just go to the Wiki page about lightning talks,
submit a PDF with your slides and be talking at this spot at this time tomorrow. Thank you. And next up is MS Crocs talking about machine learning. Welcome, MS Crocs. Hello, hello, everyone. I am Matthew, and I am from London. And when I'm in London, I spend most of my time doing maths.
And I'm going to talk to you about one bit of maths that I think is very interesting. So I'm going to tell you today about MENIS, which stands for the Machine-Educable Noughts and Crosses Engine. Next slide, please. So MENIS was built by Donald Michie in 1960. He previously worked at Bletchley Park with Alan Turing during the war
and broke the Tunney Code when he was there. And this is a while after 1960. And he built MENIS out of 304 matchboxes. Next slide. And next slide. So those are two pictures of MENIS. This is a close-up version. You can see, hopefully, there are a lot of new matchboxes. Each matchbox has one Noughts and Crosses edition drawn on it,
a triangle of cardboard at the bottom, and some counters inside. And how you play against MENIS is you take the matchbox for the position you're currently playing in, you give it a shake, you open it, and whichever counter comes to the bottom tells you where to play next. MENIS can also only go first. To reduce the number of matchboxes, it only plays first.
So I'm going to play an example game against MENIS now. Next slide, please. So MENIS is playing as Noughts. We're playing as Crosses. So first of all, I pick the first box, I give it a shake, I open it, and we get a red counter. And a red counter means play there. Now the human player plays,
and the human player might play here. Now we take the next box, which has this position on it. We give it a shake, we open it, and then it tells us to play there. Then the human player plays here. Then we take the box with that position drawn on it, we give it a shake, we open it, the green tells us to play here. Then the human player plays here, we take the box with that position on it,
we give it a shake, we open it, we get that color, it tells us to go there, human player, go there. And now the human player has won. So this is a game you might play against MENIS earlier on and it hasn't done much learning. And now it needs to do some learning. So, you take away the four marbles that were open there, you close the boxes, and you put them back. And now, one of the problems Menace had there was,
at this point, it moved in the right middle, which was a really bad move because it let, again, it let the human player do this when it had a double win and is going to win always. So by taking the marbles out, Menace has now learned that that was a bad move and it will do it less often. Next, please. And there's a few more things you need to know.
So if you lose, you take one marble out. If you draw, you put one extra marble of that color in, and if you win, you put three extra marbles in. And in this way, Menace very quickly learns how to at least draw with good players at Noughts and Crosses. And after about 20 or 30 games, it should be consistently drawing with you. Next slide.
Okay, so this week at CCC, I've been quite busy during the Siestas programming. I've made a JavaScript implementation of this, which I've put on my website. So if anyone would like to play against Menace, the URL is there. Thank you for listening. The URL is there again. I guess I can stop.
Thank you for speaking. We still have time for a few questions. Anyone? No questions, then. Thanks for speaking and have a great time. Next up is Peggy.
So a reminder, if you decide to have questions, you'll see how many time we have left for speaker. Then please go to the microphone and you can ask your question directly. Hi, I'm Peggy. I speak about Flabber Berlin, which is a new initiative from Berlin, from the Kausmachschule,
which is actually the school part of the CCC, which is emphasized on hands-on technologies, some knowledge about data security and media competence. So what we realize quite a lot at schools,
that tools like WhatsApp are really very well known and really very loved. But what you see is there's something behind, which is not so lovely, which shows Berndas Prod. I don't know if you can see the movie. Short movie.
No sound?
No sound. Okay, it explains actually how social networks suck more and more people into it. So do you want to have a friend? I can give you thousands of friends. So I don't want to have friends, but it doesn't care. And it's very, it's quite funny made actually.
Sound? You can learn even from German television. Gradually the band to be states online.
Online. To us. Six on that. See, but not to find a balance. To solve this, to be states online. Gradually the band to be states online.
To us. Six on that. See, but not to find a balance. To solve this even it was a postman. Many postmen. They're just brief. Take up a solid approach. I couldn't get it. Thank you.
I switched to German, sorry. It's actually about how children, especially children are likely to be by their friends
involved more and more into social networks. So what we actually want is, okay, you have your social networks, but please use other tools. Use secure open source tools. And we are now at the point that it's not so bad, not so difficult to get into it.
So our philosophy is actually based on that data security is a human right. We have a right of privacy. Children have to learn and they have to be aware of it. And we follow the Hecker philosophy like, my God.
Okay, so distrust authorities. And which is actually quite a big deal when you go to schools, because it means it's actually a clash. So all of these trust authorities and you make a community of sharing and caring knowledge. So how do you control knowledge?
So in the end it's something like we rethink the structure of school and we make this experiment to put it into the communities. Let's say everybody can share knowledge, can have a calendar,
can use something like own cloud for file sharing, can communicate, have an address book and all these kind of things what you use for daily communication. You can also use for school communication and it doesn't make the border between teachers, pupils, parents. And we open up actually the whole idea of school
as especially in Germany is a very strict hierarchical organized organization. So we made a first fluid tool set. So it's not about to propagate this tool set, it's about to think about what tools you can use. So for example, Open Fire as a server, own cloud,
Chitzi for video for me which is also possible to encrypt, Etherpets for working together on documents and Chat Secure for chatting. And then we want to put it into existing communities in schools like for example engaged pupils
or parents which are organized or engaged teachers. And if you want to support us, I know for example, tactical techs have a very similar idea but on an international way for NSHOs.
Please, people like technical tech, come to us, write to us, you can support us by developing the idea and administrate technically and whatever.
We are open for everything, what you want to communicate. So we have even a pet, so if you have any ideas just open the pet, put it on it, put your links, put your inspiration, put your critics, everything. I'm happy, we are happy, very happy when you say anything or you contact us by email
at contact at flabberglid. Thank you. Thank you. Next up is CC3E talking about Q6.
General recommendation on telephone switching and signaling. International, automatic and semiautomatic working. Advantages of international automatic working.
ITUT recommendation Q.6. Extract from the Blue Book. New Delhi, 1960. The CCITT considering that the advantage of semiautomatic working mentioned in recommendation Q.5 apply us well to automatic working in respect of reliability, associate efficiency
and the satisfaction given to subscribers. That the advantages of automatic working are even greater as regards staff economy since outgoing operators are dispensed with. That the changeover from semiautomatic to automatic working may be accomplished without any major modification on the international circuits
or the switching equipment at transit and incoming exchanges. That by 1960, the above advantages had been widely confirmed by experience on a number of international relations which had been using automatic service up to that time. But such experience has also shown that when relation changes from demand working, manual or semiautomatic to automatic working,
there is a considerable increase in traffic. That the introduction of an international automatic service follows logically on the introduction of a national automatic service. Draws the attention of the administrations to the additional advantages resulting from the introduction of an international automatic service.
Thank you for your careful attention. And you can follow us on Twitter. Thanks a lot. Next up is Jack Singleton talking about open web apps.
Did you plan on showing a web app? Yeah, unfortunately we can't do that. That's fine, I'll just talk. Okay. So you get to hear about open web apps, you don't get to see them. So I'm gonna talk to you about my experience with a project called Sandstorm.
Sandstorm is an open source platform for self-hosting web applications. You don't have to host applications for yourself. You can also host them for other people. So we're hopeful that this project will let organizations host alternatives to Google Docs as well as individuals with their own data.
So who am I? I'm not a core developer of Sandstorm but I picked up Sandstorm and wrote an app for it. So if you have any serious questions, I'd recommend going to a core member of the team. But as for the experience you might have building an application for Sandstorm, you can ask me.
Next slide. So before I talk about Sandstorm specifically, I want to talk about Unix because I think everyone here will know a little bit about Unix. And in Unix, we have lots of small programs and the OS gives us a lot. The OS gives us user management.
We have document management with the file system. We get a lot of stuff for free. And for me, that's really nice because I can sit down at my laptop and write a script and there's very little I have to do in order to get something usable. And in fact, all I really have to do is translate standard in to standard out.
If I want to do more, I can but that's the minimum. In the modern web, we have a different situation and application developers are responsible for everything. If you have an idea and you want to get that out to lots of people quickly, first you have to implement user management, document management, permissions, deployment,
and then you've got to take care of all of the security and that's not something you do once. That's something you do and then you get a pager at 3 a.m. and you have to wake up and patch servers. So it's a big barrier to entry in order to develop an open web application. So on with desktop software,
we have this thing with Microsoft Word and LibreOffice and the people in this room will tell everyone, oh, use LibreOffice, don't use proprietary software. But what do we have for Google Docs? We don't have anything right now and I think this is a problem.
So Sandstorm is a platform which is Apache 2 licensed. You can run apps in Linux containers and it's hosted by anybody. It could be hosted by yourself under your bed or it could be hosted by an organization that you actually trust unlike an organization like Google. So the application that I wrote for Sandstorm
is called Hacker Slides. It's really, really simple. All of the credit goes to Ace Editor and RevealJS, which are two great projects. All I wanted to do is have both of those in a browser window and then sync them up nicely. So that's what I did. It took me a couple of days and there's a lot of stuff that I didn't have to do
when I wrote that. I didn't have to do all of this login stuff. I didn't have to do document management because the platform does this for me. All that said, I still got a full Linux environment and I still got to pick my technology stack because Sandstorm runs apps in Linux containers. So you don't have to use a PHP API or something
that you really would rather not use. And because I'm not hosting this application for people, it means that I don't stay up all night worrying about security, worrying about how I'm going to patch the next heart bleed when it comes out at 3 a.m. So weather permitting,
we'll be having a workshop after these lightning talks. It actually won't be at 1700, it'll be at 1800, which is when this whole session ends. Come by and talk to us about Sandstorm, talk to us about ideas that you have and if you're interested, you can ask me about the applications that I'm developing. Thanks.
Thank you very much. We might still have time for a question. I really can't see the audience at all so if you have a question, just step up and ask it. No questions then, thanks a lot.
Next up is Yannick talking about manufacturing electronics, fast and low cost. Hello Yannick. Hello everybody, thanks you for joining me. In the next five minutes, I'd like to talk to you about a project we did in the Brussels University this spring. Next slide please. Not sure which of you have studied in university
but in engineering school, informatics is kind of a mandatory thing and yeah, it's not really inspiring. Here you see some typical examples of programming assignments students get. It's pretty obvious that these are not really the most motivating assignments.
Next slide please. Which results in motivation sinking and disappearing faster than the rate of matter here at CCC. Coincidentally, students really need this kind of knowledge to progress further so we were looking for the causes of this problem
and the problem is that we are actually teaching them to program but without a real purpose. We're giving them assignments but we're not giving them a task. So we thought well, instead of giving them just programming assignments, let's giving them a real purpose like giving them a piece of external hardware they could drive or giving them a piece of device
they need to extract data from. Next slide please. Now the problem is that there is so much stuff online already if you take any piece of existing hardware, yeah, you find lots of documentation and yeah, I'm looking at the Arduino guys, thank you.
So it's really impossible to give any assignment at all without students easily finding solutions online and if they just have to copy a GitHub repository, yeah, then it's not really an assignment obviously. So well, what's the easy solution? Let's develop our own hardware. Well, it's an improvised project and there were a few minor issues.
There was no budget, no time, no manpower. So these are actually quite clear indications that the project may go wrong but since we're insane, we thought it was a great challenge so let's go along with it. Next slide. So the idea was really simple. Let's take a few really cheap sensors,
whack them on a board and let's call it a weather station and the weather station can then monitor a few variables, students can extract it and display it in a nice interface. So we put a microcontroller on it, microcontroller process the data, send it over UART to USB students, connect their board to their computer and they could read out the data, yep.
Next slide. So there's a prototype and of course I have it with me here. It's really simple and not so hard to manufacture. You only have to make one but we had to make it for all our students which were 60 students at a time. So instead of soldering one,
we were thinking of large scale implementations and we never did that before so we had to find it out and that in a timeframe of six weeks. Yeah, not that easy. Next slide. So how do you do this? Well, you design it to be easy manufacturable. Take easy to source parts, make sure that the board is really easy to manufacture, that it is not too expensive.
Boards are actually pretty easy to obtain and not that expensive if you order them in some certain Asian country which I won't mention. However, the assembly, so the soldering of the parts is an expensive task and we had to think of solutions for that. Next slide. So we already had the soldering oven,
we had a stencil machine, no problem about that but how are you going to solder all these parts on 60 individual boards? It's like 50 parts times 60 boards at a whole lot of components and lately, modern electronics, these parts are extremely small, you can barely see them and if they're landing on your desk and you sneeze and you suddenly have 3,000 capacitors laying on the floor
which is not really such a nice thing to have. So yeah, how are we going to place these components on the board? Next slide. We were lucky to find a real pick and place machine somewhere in a storage room and that is quite suspicious. Why would you put it in a storage room? And it turned out that while it was a really nice Chinese machine
and the manual was also written in perfect Chinese. The driver software was equally user-friendly and one of the nozzles was missing and a reel was broken. So first thing to do, well, little side project, within these six weeks we had, we had to develop our own driver software for this machine
which we eventually managed. Next slide. This is the machine in action. The boards arrived one day before deadline so one day before we actually had delivered the boards we were manufacturing them and we still had the whole night to write the documentation about it. So well, really great on time.
So to conclude, what did you learn from this? Well, you can actually manufacture electronics yourself if you respect a few basic ideas and use your mind. I have a few boards to hand out so if you like to talk to the project about me join me at the Belgian Village for a drink or a discussion about weather stations. Thank you.
And if you have any questions I'll be glad to answer them. Is there a time? No. Okay, sorry. Thanks a lot. Next up will be NF talking about the internet in Iran.
Hello, I'm NF. I'm from Australia. I came a long way to be at camp. How awesome is camp? Come on. Yeah, yeah, all right. So I just wanted to talk briefly about the internet in Iran. I just want to say I'm not an expert on the Middle East or even the internet.
I'm just a nerd that went there and I thought you might be interested in what I found. So I don't know what your ideas of what Iran is now but it's a religious country. We all know that. It has a conservative government. If you read the papers you know that. They have these draconian social laws. Women have to dress modestly. You can't sing and dance in public and so on.
And of course foreign sanctions imposed by the West have crippled the country industrially and economically. But it's also quite different to what I expected. There's a really large and growing middle class in Iran that are highly educated and they tend to be very progressive. Like while they identify ostensibly as Muslim,
they also tend to identify with other religions and some of them are even secular. And of course they're very interested in the outside world. And also contrary to my expectations, it was an incredibly safe and friendly environment. I've been to nearly 40 countries and of all the countries I've visited it was by far the safest and most friendly country
that I visited. So the government is very controlling of the media and that's probably the topic of a whole nother talk. But of course part of that is controlling the internet. And so in Iran internet access is everywhere. Like in many countries. Every hotel I visited had the net. Everyone I met had internet access at home.
And of course you can get 3G coverage in most cities. And internet access is cheap. But it's also slow. By law they're required to limit internet connections to 128 kilobits. I guess to limit the amount of influence that can come down the pipe. But the internet use in Iran is growing at a huge rate.
If you try to access a forbidden sort of resource, this is the screen that you see. It redirects you to this site. And it has basically a list of recommendations. So if you try to access Facebook it recommends you to some other Iranian government site related to social networking. Or if you try to access pornography
it will offer you some spiritual guidance. And so to make this possible they operate a great firewall much like China. Although it's a bit different I suppose. They practice request hijacking of HTTP. They poison DNS to redirect common sites. And they block various hosts and ports outright.
So all of this interception makes regular HTTP quite slow. So if you use HTTPS it's much faster. I sort of looked around at what was blocked. And unsurprisingly Facebook, Twitter, they were blocked. Reddit, source of all evil is blocked. YouTube, GitHub, even the BBC was blocked.
And I also noticed that in visiting various news sites if the URL contained a bad word like I clicked on a news article about a rape and that was blocked. So they actually inspect the requests and you can access the rest of the site but not those URLs. And also the common VPN protocols also outright blocked. What was not blocked was Google.
Google web searches worked. Gmail worked. Instagram worked. And the New York Times worked which I thought was strange considering the BBC was blocked. Most HTTPS sites worked pretty well. SSH worked to various hosts that I tried. And also the open VPN protocols worked which was great.
So if you want to bypass the firewall in Iran you should use a VPN. As I said you can't use LTP or PPTP. And many devices like iPhones and Android devices only support those natively out of the box. So that's kind of disappointing. But use open VPN. You can use SSH tunneling but the latency tends to be pretty bad.
So try and avoid it if you can. But interestingly a lot of the foreign VPN endpoints are not blocked. So if you sign up for a VPN in advance you can access those. You can also use various CGI proxies like various free sites let you bounce through them. But of course you can't log into your personal stuff
that way or the man in the middle of you. I talked to a lot of Iranians about how they access the internet. And one of the major stumbling blocks for them is they can't pay for VPN services like we can because sanctions prevent them from owning credit cards. But there are actually many foreign run VPNs or proxies that they use.
And everyone seems to have this friend who knows how to set up the VPN for them. I found that the effects of the censorship were pretty neutered. The middle class tends to know a lot about the outside world. A lot of everyone I spoke to wanted to add me on Facebook and Instagram. And many people talked to me about pirated western movies that they'd seen. So the information clearly wants to be free.
There's a lot of awful stuff that happens in Iran like the government monitors various social networking and stuff to find dissidents and prosecute them. People get questioned when they return to Iran about their use of Facebook and are forced to log in and show them what they've done. And also the US sponsors an anonymizer proxy service that Iranians can use.
So they're in the interests of Iranians having privacy contrary to their own citizens, I guess. So if you go to Iran, set up your VPN in advance, enjoy the amazing people, sites, and food, and bring money for carpets. I only had a bit, I should have brought more. Thank you very much.
So to everyone who just entered the lightning talks, we have a slight delay of 20 minutes. But we will bring all the talks. We have enough time for this. And we even, how awesome is this, have translations for lightning talks. So if you want or need a translation,
just dial in 8-0-1-2 and you will get English talks translated to German and vice versa. Thank you. Next up is Algoldor talking about the food hacking base now. Okay, Algoldor, are you here to talk? It's your spot now. If not, then we'll reduce our delay
by skipping the stop at Wolfsborg and continuing with Mac Freak 109. Is he there? Have I missed? No. Okay, I'm sorry, you are next.
Yeah, okay. Do you have slides? Yeah, mega 65. Oh, good. That's a great coincidence. Then, yes, enjoy. Hi, I'm here to introduce to you the recreation of the holy grail of 8-bit computing. You can tell about that there are two holy grails,
one being the very first 8-bit computer that has been sold, that's the Apple One, that's been gone for about one million dollars, something like this. But I'm talking about the machine that got at the end of the 8-bit era. A slide, please. This is this one. It's called the Kyomura 65. It was the planned successor of the C64.
Slide, please. And you might say, okay, the 128 was the successor, but this one was a computer that had an extra mode and was 100% backward compatible. This one is a bit different because it has a lot more power than the original one
and claims to be about 70, 80% compatible, more on an AP level than on the low level of the hardware. That gives you access to some really, really cool 8-bit hardware, probably the coolest 8-bit hardware that's ever been made. Slide, please. We are trying to recreate this one using an FPGA design.
The CPU is about 45 times faster than the original C64 was. The C65 was about three times faster than the original C64. We've got full HDMI, 1200p display, not using a frame buffer,
but really the original way the graphics were displayed on C64 and C65. We've got some additional new hardware like Ethernet port or microSD storage. We've got also some stuff that the original C65 does not include, like enhanced sprites, and a few other stuff.
Slide, please. If you think that this is cool, or why are we doing this? We are doing this because it is the recreation of something that has been built for just about 200 up to 2,000 models.
They are only prototypes available, and we want to complete this task on having a complete system that you can put on your desktop and have the coolest 8-bit hardware you ever can get. And it's also intended to use for teaching because I would say understanding a computer back then was much more easy at this time.
And also Paul, who initialized the whole stuff, wanted to have an 8-bit computer he could do SSH with so he's safe from the NSA. Okay, slide, please. What we have right now is a system that largely works. As Paul put it this way,
think of the Death Star in Return of the Jedi. The big cannon works, but there are something like the toilet door that can, when you open it, suck you out into space. So the real machine works, but there are a lot of tiny things to take care of. And the whole machine is about,
the real part on slide, please. What's still missing? How of these little stuff? We are also trying to recreate the original casing in a way that will work with our design board. And we want to have,
um, man, you need good eyes up here. Yeah, also to have a board that is, contains all the IO ports of the original hardware and also sockets for the original sound chips,
which are some very special chips. You can, when you try to buy them on eBay, they get real pricey. You can put them in there instead of the FPGA recreation of the original one. Slide, please. So if you want to participate, we need a FPGA developer. We need people who know how to build cases.
We need guys who like to work on the firmware of the machine. So something like accessing the SD card can work from the 8-bit system. And we are also people who just like to play with it and test it. So slide, please. This is the machine.
This is where you can find us. And I've brought a prototype with me that will be available for showing tomorrow between 1600 and 1800 hours at the Leidställer right outside the tent here. Thank you.
Thank you very much. Next up is MacFreed109 talking about bringing hacker culture to schools. Hi. I call in peace. And I say this because I'm kind of incorporating the enemy here because I'm a government employee. Yay, I teach.
So I have been in hacking around for 30 years. And I thought it would be a great idea if we could commit the hacker space mentality towards schools. So kind of making people more involved into technology. But first, let's talk a bit about where I come from. Next slide, please. So where the heck is Luxembourg?
I'm originated in Luxembourg, which is the tiny bit of country insert between Belgium, France, and Germany. So we have a few inhabitants and we have a very nice ground to do experimentation. Next slide, please. So the Ministry of Education launched something called Digital for Education Project because they all of a sudden discovered
that, well, we are missing ICT people. So they all wanted to do something ICT-ish. And so I came up with the idea, hmm, why not push maker spaces onto schools? So we created an initiative called Be Creative, Be E-Creative, actually. And this aims to establish a field
where people can have workshops, people can develop their projects, but can also be sensitized to new technology. So we gather around kids starting from age 10 up to, well, actually there's no limit. We offer them a free access to something called a maker space, which means that every school should get a room equipped, hacker space-ish.
And the access for the students is free of charge. So what it is, it's kind of a hacker space, but of course you cannot have kids running around without the attention, so we put mentoring on top of it. That means that a teacher, which is a motivated person,
yes, he is, normally, should be sitting around, giving workshops, explaining stuff, and initiating that kind of creativity that we are missing in our schools, because we all know it, school sucks, and it's boring. So we want to change that. How do we do that? Well, we try to implement a common infrastructure. We try to flatten down the hierarchy,
meaning that the teacher willing to give workshops is not sitting at the top, and the student has to shut up and sit down. But both are more or less equal on one level, and should exactly talk to each other and share knowledge and persist in their projects. So right now, this slide is kind of not accurate.
When is this going to happen, and where is it happening? Well, right now, as I speak, we count five actual maker spaces opening up in November this year. So we have one base located at Luxembourg City, Luxembourg Centre, which is a school-independent maker space that is kind of a hacker space,
because it is opened 40 hours per week, whereas the other maker spaces are open as soon as a teacher is having a workshop there. So why are we here, and why do I keep on talking like this? Well, we are looking for partnerships. We are looking for hackers who want to help us out with their knowledge, expertise, and everything.
So we're looking for maybe project ideas, or maybe little workshops, or stuff that you wanted to teach some kids, or maybe have an idea of what we could implement. If that's the case, if you think that you can help us out, you can visit us on one of these websites. We also have Twitter handles,
or you can contact me directly. That's my Gmail there, and my Twitter handle is also McFreak109. Thank you. So maybe if there's a question. Okay, thanks. Thank you, McFreak.
Thank you, McFreak. Next up is Paul Kay, talking about liberating mobile devices. All right, so let's talk, sorry, slide, please. All right, greetings, everyone. So let's talk about another view
of software and mobile devices. So on the main processor, it all starts with the boot loaders that will then load an operating system that is composed of very different layers. At first, you get the Linux kernel that we all know, and then you have other abstraction layers that handle various aspects of the hardware, and on top of that, you have frameworks and applications. Next slide, please.
When it comes to community mobile devices, well, what you get is basically non-free software on those hardware abstraction layers, and this is actually a pretty serious problem. On the first hand, this is a problem for privacy and security, because those non-free blobs actually run on the system, and they run as privileged users, so they can access both your data
and your communications. So sometimes they actually even run as roots, so this is a very serious problem, but there is also the fact that those parts being non-free is also them denying you some very basic freedom about understanding how it works and understanding how your device works and what it does, and enabling you to change.
it or not. So those community Android versions operating systems do not care about the boot loaders as well, and those are usually non-free. There is also software running on various other parts of the device. You have fine-wares running on integrated circuits, but also a full system running on the modem, and those two aspects are usually non-free as well,
and they are a very serious problem for the same reasons to a lower or higher degree. So this problem can be solved one step at a time, and the first step to solve it is to create a fully free operating system, and that's exactly what Replicant is. The idea is to replace the non-free parts in the
hardware abstraction layers with fully free replacements, and we also want to have a usable system, because when we cannot replace those non-free parts, we just won't ship them, but we still want it to work, so we need to have some basic features that are working. And this is actually only a first step
for privacy and security, because bear in mind that there are still many other ways to spy on the user, and there will also be other non-free software running on the device. At this point, at Replicant, we support up to 12 different devices, and we have written free software replacement for various aspects of the hardware, and those are even included back in
other mobile operating systems, such as CyanogenMod and Omni, and we're also working on freeing the boot loaders when it's possible. There are, however, some areas that we do not work on, such as the modem system, FireMOS or GPU. Some other projects are actually dedicated to freeing those
bits. All right, so we really, really need more people to get involved, so your help is welcome, and it's actually a pretty fun way to learn about low level hardware hacking, and actually, when I started working on that, I had about no clue about what I was doing, and I really learned a lot along the way,
so if you're interested in that, well, your help is welcome, you can get involved, and if you cannot spare the time to do it, we also accept donations and they're welcome as well. So thank you. I'll be giving a longer talk
about these issues at the Neo Village tomorrow evening, so you're welcome to come and ask questions as well. If you have any now, I would be happy to answer them. Well, no questions. Thanks a lot. Thank you. Next up is
W.P. Vrack, talking about another password manager. Good afternoon. My name is Win Almesberger, and I'm going to talk about this little project of mine, which is called Unlock. Next slide, please. Well, everybody loves passwords, right? That's why there are so many of them. Alone, for this
camp, for instance, you probably generated something between two and four or five passwords that you needed for various registrations and things, so passwords are everywhere, and they're not really going away, and of course, to make things a bit more interesting, your passwords should not be too easy, they should not be guessable, so don't use the
name of your dog as your password, and also, if a password database, for instance, gets stolen somewhere, then the password shouldn't be crackable, so your password should also be complicated enough that even a machine cannot crack them. But at the same time, it would be very nice if you could actually remember them. Now, that's unlikely that you could do
both things at the same time. So, what can you do? Well, you could, for instance, follow the advice of Bruce Schneier, and take a piece of paper, write your passwords down, and stick them in your wallet. Okay. That's not a bad idea, but then, if you lose your wallet or somebody steals it, then they also have your passwords, and bad things might
happen. You could store them in a password safe, for instance, on your PC or on your smartphone, and keep them there, so you have them with you where you need them, and so on, but then, those machines are complex, and it can easily happen that bad things happen to those machines, and these things get stolen, and of course, the
password safe on those machines will be an attractive target. So, again, there are risks. Of course, you could store them in the cloud, and let's say Facebook takes care of managing your access information. Well, you may like this, or maybe not. So, next slide, please. And so, then
the, this is now what Unlock tries to help with. What Unlock does, it's a little device about, I have one, I have a prototype, a mechanical prototype here, about this size, so about the size of a cigarette lighter, and it's meant to store your
personal passwords. It's also meant to store passwords that are meant for human use, so things that you would actually type in. So, but perhaps also passwords that are a bit more complicated than this, and it is meant to be something that you can carry around with you everywhere, and it keeps the password safe by
encrypting them on the internal storage. And one thing that's very important for this type of projects, for this type of device, is that you can trust it, so, and it's completely open. It is, the firmware is open source, the hardware is completely open, schematics and layout, and you also use only open tools. So, for instance, the electrical stuff is done
with KiCad, which is free software, the CAD work is done with FreeCAD, which is also free software, and also the development process is completely open. Next slide, please. Oh, sorry. And so this is what is in there.
You can see in the middle, a big OLED, and on the side, there's a capacitive slider. It's powered by a AAA battery. It has USB, and it also has a radio interface that should someday speak Bluetooth low energy. Next slide, please.
This slide shows, gives a quick overview of the internal structure, and you have basically two microcontrollers in there, and a system on a chip that has another tiny microcontroller and a radio interface. Then one microcontroller, the communication microcontroller takes care of implementing the protocol stacks, and the
third one is the secure microcontroller, which takes care of all the crypto tasks. It has access to, direct access to the display and to the slider, and also the memory card, where the encrypted information is stored. Next slide, please. Now, if you would like to know more about this,
then you can find me at the Neo village, which is just right over there across the street. And you can also go to the website of the project, that's unlock.com, it's written A-N-E-L-O-K dot com. And the project, in this project, there are lots of things to do still, there's plenty of opportunity
for software developers, at a low level, at a medium level, or at a higher level, there are other things that need to be done, for instance, for making the communication between the unlocked device and a PC, for instance, if you want to have a web browser, that when you go to a page, and it asks for log information, then the web browser could send something down the stack
to unlock and request information. Lots of things to do, thank you. We have a question from the audience, I believe. No, no question from the audience. Okay, then, thank you very much. Next up is Platzian, talking about the Coda Dojo. And an advice for all speakers and future speakers,
please keep the distance between your mouth and the microphone as small as possible, because if you take away the microphone, you will not hear me any longer. Okay, hi, we are actually not Platzian, we are both. We are Philip, called Platzian, and Nico. We are from the Coda Dojo in Berlin, in Potsdam,
and we want to talk about the Coda Dojo. So, what is a Coda Dojo? Coda Dojo means you teach kids how to code. So, technically, we meet once a month, on a Saturday, for four hours, and there are like 40 kids coming,
and there are mentors. One mentor has to care about two to three kids, and they then do whatever the kids want to do, and if they're total beginners, we do scratch. So, why do we do that? When this whole computer thing came up, we thought that if you want to grow up with the internet,
or if you grow up with the internet, you learn how it works, and this is nothing new. This just doesn't work. So, we need to have a way to spark this curiosity in the kids, that how their smartphone, how their tablet, how their anything, works. And, like this, okay.
And we can do this, okay. And we can do this by letting them code whatever they want, mostly it's games, and so then they know how games work. So, and we are here, so we want to tell you, do your own Coder Dojo, there is no reason why
not every hackerspace should have a Coder Dojo once a month, and Nico is going to tell you how to do that. Thank you. It is very easy to create your own Coder Dojo, you just need a space, you take some time
in the week or in the month, and then you invite people to mentor our kids, and that's about it. If you want to have your Coder Dojo listed on the Dojo website, then you just write an email to the people and they will, yeah, link your Coder Dojo, and this is the whole process
for you and your kids to learn programming and get into programming. So, and we both do this, we do this in Berlin for like two years, Potsdam does this for a year, and if you have any questions, if you need any help, go to our Dojo website that you can find
on CoderDojo.com and contact us. And if you have other questions, you can call me at 7524, and you can grab us at the exit, thanks.
We might still have time for questions if you want to answer any. Oh, yeah, sure, sorry. Questions? No questions. Okay, you can find us at the exit, thanks. Thank you very much. Next up is Dosh talking about writing postcards
to hackers in prison. Hello, everyone. Super nice to see so many of you. I heard we're like over 4,500 people here every day sipping on our matte and drinking our beer, and that's wonderful. Lots of you working on great projects. It just saddens me sometimes that there are some people
that we wish were here, but they can't. I'm talking about the likes of Chelsea Manning, Jeremy Hammond, Ana Kata, the Zone 9 bloggers in Ethiopia, people in Syria who have been locked away and jailed
for things that we all find important. They didn't do it for money, they didn't do it for fame, but they took out and showed the powers that are being abused against all the people in their countries and all in the world. Some of these people will be in jail by the time you're going to take your pension leave, or by the time you're graduating, maybe.
Many years from now, they will still be locked, and like Chelsea Manning right now, I just heard, is again once in solitary confinement. These people get a lot of attention when they are bringing out their leaks, and the fallout that follows afterwards, we look on the WikiLeaks, we look on, I don't know, Digitalica, we look on all the website, read about them, and then two years, three years,
maybe five years later, we kind of move on with our lives but these people are still in jail, and they shouldn't be there, they should be here with us today, and we know that they really appreciate to know that we are thinking about them and still think their work was really important for us.
So what we did was we made two and a half thousand cards. I have a bunch of them here with me here. There are more at Le Quadrature, but there is also, here at the end of the tent, there's a little table, we have all the addresses there, and the one small tiny thing you could do to show these people, to let them know
that we're still thinking about them, to show them your gratitude, is write them a card, they really appreciate it. Small perk on the side is if we send all two and a half thousand, maybe we can also kind of DDoS the German postal system in due course. Please come to the end of the tent or later to Le Quadrature, write a card,
and free all the political prisoners in jail. Thank you very much. Thanks a lot, and a quick announcement. If you still want to hold a lightning talk tomorrow,
you can still do that. You can submit your talk on the wiki, search for lightning talks, and then just send us a PDF with your slides, and we'll be very happy to host you and your talk tomorrow. Next up is Tim, who was already here yesterday, talking about some more of his projects. Hi, I'm Tim.
Next slide. That's me. Next slide. I'm from Australia, and next slide. And I have too many projects. I also have too many slides. Next slide. I need help, I really need to sleep. Next slide. If you use Python, these two things should be good for you. Next slide. If you use dates, use Python DateTimeTZ.
It will make your dates correct when you're going around the world. Next slide. Also use Q if you're tired and you're trying to debug something in production, and print won't work. It's basically print on steroids. Next slide. I don't just like doing small projects. I also like doing big projects. Next slide.
Tim's video is basically a bunch of projects to do conference and video recording. Basically, we want to do what the CCC here is doing, except without having you to be as smart as them. Next slide. I've trained to develop a system in a box. We need your help doing that.
Next slide. Before we stream it though, you need good content. I can't help you make better content, but I can help you make better readable content. Next slide. So I developed a tool called SlideLint that actually tests your slides. Next slide. It's basically got a command line interface
if you want to run it locally. Next slide. It has a website interface. Next slide. And it tells you whether your text is too close to the edge of the screen, whether it's low contrast, ETC. Next slide. So how do you do live streaming? Next slide. This is how you do it. The things in red are the parts I'm working on.
Next slide. The first thing is you need to be able to capture the presentation. And so we're developing a piece of open source hardware called HDMI USB. It's based around FPGA. Next slide. This is kind of where it fits in the system. Next slide. Those two things there. Next slide.
There is two firmwares. There's an old firmware written in VHDL and Verilog. There's a new firmware written in Python. Next slide. The new firmware's really good. It's much easier to work with than the old stuff. Next slide. We also have developed open hardware because it doesn't matter if your firmware's open,
if your hardware isn't. Next slide. So we're about to try and get these available. You go to get office and you can get one. Next slide. It has two HDMI inputs, two HDMI outputs, DisplayPort in, DisplayPort out, USB, gigabit ethernet.
It's great if you want to do some type of video stuff. Next slide. It could also be used for other things rather than conference recording. If you're into Milky Mist or flicker noise or any of those type of things, we'd love for you to take a look at this board and see if you can do something interesting. Next slide. We also want to support more boards than just our two.
If you're interested, come and chat to me. Next slide. But once you've got it captured, you still need to mix it so that you can have the presenter and the slides and the video mixed. And so I developed a software system called GST switch.
Next slide. It's this bit here. It sits on the computer up the back. Next slide. It's written in C. Next slide. The CC guys didn't like that it was written in C, so they rewrote it in Python. We are now seeing whether we can use that instead. So that's Voctomix.
Next slide. You also need to do encoding because on the cloud, there's not one supported format. And you also need a website. So next slide. This is kind of the streaming system and where it sits. Next slide. We have basically an open source one of those.
This is kind of what it looks like. We would really love a graphics designer to come and make it look less ugly. Next slide. The front end is written in Django. The back end is written in FluMotion and Python. Next slide. The other thing though is even if you have all this content there and you have an awesome event,
if nobody knows about it, then nobody comes. So next slide. I've also got a tool that publishes your event to all the popular social networks, including mailing lists and Facebook and Google+. That needs a lot of love. It's in a little bit of disrepair. Next slide. And that is everything.
So just to reiterate, Tim's video, slide link to check your slides, HDMI to USB to do capture, GST switch or Voctomix for mixing, the streaming system for the website stuff, and events everywhere to get your events everywhere. Thank you. Thank you. Thank you.
Perfectly on time. I have too many projects. Don't forget your phone, please. And it was awesome. It was just on time. Next up is Peter Pertzi talking about his Kickstarter launch. Hi, this is my very first talk. I will make it in German.
Hello, I'm Peter. Okay. Hello, I'm Peter. We have guests from two camps and a Kickstarter company just started. We have a lot of money to work with and the task is to produce a product. This is a product that I've come up with a lot of money. The goal is to make it available to you.
We are working with an e-bike van, and so on, so you can take it to the next stage. We have guests just started. We have a midlife of 13,000 people. Also, you can spend time on Kickstarter. Next slide. This is a little bit of a gift for those of you who haven't already seen it. The motor will be used in the F3
and the mechanics are open so that you can use them and ship them with the 812 with one. We have the first Kickstarter for you, and we have a lot of questions coming. I don't know why, I don't know the exact question, I don't know if that's my question, and then we have the FAQ and also the edit,
and you're the most likely to see it than even the friends of mine. Next slide. Just to add a little bit of specifics and what we've already done. We've already done it in two months. We've already done it in 10 years, and we've done it in 10 years. Also, we've already done it in a year. The Google Translate has already done it
in the last year. Our campaign is already doing it. You can see screenshots of our videos. For example, our 3rd birthday is coming, but everything is still in 3 years, and it's still in 3 years. You can also see that our videos are coming. Fastly Health from our video views came directly from the society,
all things up to 19% back. We also have Google Analytics for Windows, and we also have a list of all the people who are coming. Also, this blog, this list is coming directly from Kickstarter, and we have a lot of questions coming from X in a new site. Next slide. The most people are coming to our campaign and of course, they are coming to our campaign because they are the largest and the most popular in the world.
You can see that the most people are coming to my OSR and it's starting to become the 3rd and 4th, and they are coming. I've already done it in the last year. I've already done it in the last year, so I'm going to do it in the next year. And I'm going to do it in the next year.
And the biggest problem of the campaign is that I've already done it. Also, we've already done it in the last year. The most important thing is that we've already done it in the last 10 seconds. We've already done it in the 3rd and 4th. We've already done it in the campaign. Also, we've already done it in the last year. And of course, we've already done it in the congress. Thank you.
Thanks very much. We might still have time for questions. How is it called? The project, how is it called? It is called Go E. The website is go-e.bike. You can support me on Kickstarter.
Another question? No? Okay then, thank you very much. Next up is Anus. You're not Anus.
But you're talking about the fish thing. Oh yeah, search for me. Yeah. Of course. Hello? Oh. Hello? Yeah. So, my name is Daniel. I work as a chef in Sweden.
And... Here? Okay, yeah, sorry. My name is Daniel. I come from the Swedish embassy with support from the fest. And I'm going to talk about surströmming, which is sour herring. And the reason why I have this speech is to inform everyone about this very beautiful tradition
that we have in the north of Sweden. So here we go. Surströmming is a lightly salted Baltic Sea herring. And it's just enough salt to not let it rot. So the fermentation is... Not outlicious fermentation.
And along with the bacteria, it makes a really, really hard smell, which I think is really good, but most people hate it. Oh, oh, sorry. Let's see. Thank you. The history of this is really kind of unknown,
but due to war times in the 16th century, we couldn't use as much salt as we wanted. So we used a little salt as possible, and then we got, well, surströmming.
And then we put it in big wooden barrels, which they'll do today. And we let it ferment for around six months until it's ready, around the third Thursday in August. And most people maybe have seen videos from YouTube
where they eat those fillets like whole. You should never do that. You should eat it with thin crisp potatoes and the herring along with the chopped onions, traditionally. And then you can add the sour cream.
And let's see here. There's actually a court case in German from 1981 that one tenant in an apartment smeared surströmming all over the apartment and got evicted. And later in court was terminated
because the jury smelled the surströmming and thought that, well, this is reasonable. So thank you, Germany. Let's see here.
And yes, in a moment. How much time? Two minutes. Oh, nice. So talking about the fermentation in the fish bones, there's a lactic acid that starts to ferment.
And in combination with bacteria, that creates the really, really strong smell. And if you're interested in this and interested in to taste this, we have one can with us, which will be enough for plenty of people to share. And we will serve it the correct way.
In the Swedish embassy around, what is this, six? I think, six. We'll go someplace safe. I wish I could have it with me here, but we would be banned from CCC for the rest of lives. So I can't do that, but please welcome.
You're all welcome. Thank you. Thanks. We still have a question. Please go to the microphone for the question. So is it true that at this Sustraming tasting,
you will also offer traditional Swedish alcohol? Oh, I completely forgot. Yes, we have schnapps, and it's not schnapps. It's schnapps, which we'll serve. And you should traditionally also drink it with light beer. And we're here in German, so thank you. So come join us at this Swedish embassy
at six in 15 minutes. You can get drunk and watch people eat fermented fish. Yes. I also have a question. How does the Swedish embassy currently get along with its neighbors? Sorry? We thought of opening it close to Danes, but that would almost be, that would be racist, actually.
Because that would probably be taking us something very, well, evil to them. So final note, if you want to find the Swedish embassy, we're right next to the Danes, and they have huge Danish flags and shit. And please come by and talk more
about the fermentation process, which I couldn't cover around this five minutes. So thank you. Thank you. And before we're coming to our last lightning talk, I would like to ask you all to submit lightning talks for tomorrow.
We still have plenty of open spots. You can talk about your favorite project that you did at home, that you did at your hacker space, that you're doing in politics or at school, really anywhere where you're doing a group project and want to talk about it in front of a large crowd, get contributors, just tell people
what they should or shouldn't do. Please submit a lightning talk. The instructions are all on the Wiki. You just need to send us your PDF with slides, and we'll be happy to host you tomorrow. Thank you. Okay. Don't move too much. The microphone is quiet.
Hello. I'm Kate. I'm staying in the Open Data camp. And over the past couple of days, we've come up with a few songs that might be familiar to you, but in a new version that addresses more kind of chaos topical themes. So I thought I'd share two of them and say that we're still in this process
of making up songs. So if you have ideas for fun melodies or things you'd like to hear on the ukulele, come find me. So the first one is called NSA. Good? Okay.
NSA, all my data seems to flow your way. It's like every little thing I say, you store away. Oh NSA, BND, you've lost the trust of Germany.
There's a shadow hanging over me and it is you. Oh BND, why they had to know, we don't know, you wouldn't say. You did something wrong when you gave our data away.
NSA, you're running out of games to play. And you're too big now to hide away. Oh, we can see you, NSA.
That was a little note, yes, to the NSA. And so on a more uplifting topic, here's Liberate Your Data, which is the, I think so far,
the official open data cam song. So it's called, well, Liberate Your Data, CSV. And feel free to sing along if you get the gist of it. And wave lighters if you're into burning things down.
When I find myself in times of trouble, open data comes to me. Whisper words of wisdom, CSV. And in my hour of darkness, I have files that machines can read. Delimited with commas, CSV, CSV, CSV, CSV.
Oh, CSV, oh, CSV. Liberate your data, CSV. CSV, CSV, CSV.
Liberate CSV. And even hostile file formats like PDFs and PPTs. We will scrape your tables, CSV. Locked away on corporate servers, we demand transparency.
Liberate your data, CSV, CSV. Liberate your data, CSV, CSV.
With appropriate provisions for privacy, such as anonymization and the removal of identifying information, CSV.
Oh, what a finish for the second Leitentoch session. This was really, really great. So, I would like to thank every speaker who was here. I would like to thank Zefilscher and Zaltofil for organizing this stuff.
I would like to thank Davidia and all the people for doing all this stuff. And last but not least, we have a live translation team here, which was really, really great. So, please give to all these people a big round of applause. That's Zaltofil. Thank you.