What is the chaos communication congress?
The Congress offers lectures and workshops and various events on a multitude of topics including (but not limited to) information technology and generally a critical-creative attitude towards technology and the discussion about the effects of technological advances on society.
Some of the talks are in German?
Yes a lot of the talks are in German but there are translations for almost all talks in English. Some even have a French translation.
You can change the language in the settings in the bottom right of the video.
Talks:
Inside the Fake Like Factories
๐Link๐
This talk investigates the business of fake likes and fake accounts: In a world, where the number of followers, likes, shares and views are worth money, the temptation and the will to cheat is high. With some luck, programming knowledge and persistence we obtained thousands of fanpages, You Tube and Instagram account, where likes have been bought from a Likes seller. We were also able to meet people working behind the scenes and we will prove, that Facebook is a big bubble, with a very high percentage of dead or at least zombie accounts. The talk presents the methodology, findings and outcomes from a team of scientists and investigative journalists, who delved into the parallel universe of Fake Like Factories.
Letโs play Infokrieg
๐Link๐
Some games you want to win, some you just want play. In a lot of games you want both, to play is fun but winning also. Why not play everywhere and every time? Why not play politics like a multiplayer-fps? With motivated friends and clueless opponents? With breakable surroundings, successful missions and to capture the flag? Parts of the radical right is doing that and they are winning. The video looks at this with examples from Germany and the USA.
The KGB Hack: 30 Years Later
๐Link๐
This talk aims to focus on the uncovering of the KGB Hack, which began in 1986 when Clifford Stoll, a systems administrator at the University of California in Berkeley, noticed an intruder in his laboratoryโs computer system โ and, unlike other admins of the time, decided to do something about it. It took three more years of relentless investigation on Stollโs part and laborious convincing of the authorities of the United States and the Federal Republic of Germany to trace back the intruder to a group of young men loosely connected to the CCC who worked with the KGB, selling information gained from breaking into US military computers to the Soviet Union.
The Internet of rubbish things and bodies
๐Link๐
Once you start looking at electronic trash you see it everywhere: in laptops of course but also increasingly in cars, fridges, even inside the bodies of humans and other animals. The talk will look at how artists have been exploring the e-junk invasion.
Rรฉgine Debatty is a curator, critic and founder of http://we-make-money-not-art.com/, a blog which has received numerous distinctions over the years, including two Webby awards and an honorary mention at the STARTS Prize, a competition launched by the European Commission to acknowledge "innovative projects at the interface of science, technology and art".
Rรฉgine writes and lectures internationally about the way artists, hackers, and designers use science and technology as a medium for critical discussion. She also created A.I.L. (Artists in Laboratories), a weekly radio program about the connections between art and science for Resonance104.4fm in London (2012โ14), is the co-author of the โsprint bookโ New Art/Science Affinities, published by Carnegie Mellon University (2011) and is currently co-writing a book about culture and artificial intelligence.
Was hat die PSD2 je fรผr uns getan?(What has the PSD2 ever done for us?)
๐Link๐
Start from November 14 the EU regulation 2015/2366 is active and enforceable. This has costs banks a lot of work, money and anger. But why?
This speech gives an overview about the Payment Services Directive, what it should bring and what the directive actually causes.
Tales of old: untethering iOS 11
๐Link๐
This talk is about running unsigned code at boot on iOS 11. I will demonstrate how you can start out with a daemon config file and end up with kernel code execution.
This talk is about achieving unsigned code execution at boot on iOS 11 and using that to jailbreak the device, commonly known as "untethering". This used to be the norm for jailbreaks until iOS 9.1 (Pangu FuXi Qin - October 2015), but hasn't been publicly done since. I will unveil a yet unfixed vulnerability in the config file parser of a daemon process, and couple that with a kernel 1day for full system pwnage. I will run you through how either bug can be exploited, what challenges we faced along the way, and about the feasibility of building a kernel exploit entirely in ROP in this day and age, on one of the most secure platforms there are.
Bonus: Hacker Jeopardy
๐Link๐
The Hacker Jeopardy is a quiz show.
The well known reversed quiz format, but of course hacker style. It once was entitled โnumber guessing for geeksโ by a German publisher, which of course is an unfair simplification. Itโs also guessing of letters and special characters. ;)
Three initial rounds will be played, the winners will compete with each other in the final.
๐Say Hello! Instagram | Twitter | LinkedIn | Medium | Twitch | YouTube
Top comments (2)
To hijack the comments for a second: For those of you who were interested in "Technical aspects of the surveillance in and around the Ecuadorian embassy in London" the day before yesterday, but suffered from the broken stream - the talk will be held a second time tomorrow.
I will have a blog post for every day :)
I will look into that video :)
Thanks