{"schedule": {"version": "v9.0", "conference": {"acronym": "gpn18", "title": "18. Gulaschprogrammiernacht", "start": "2018-05-10", "end": "2018-05-13", "daysCount": 4, "timeslot_duration": "00:05", "days": [{"index": 1, "date": "2018-05-10", "day_start": "2018-05-10T00:00:00+02:00", "day_end": "2018-05-11T00:00:00+02:00", "rooms": {"ZKM_Medientheater": [{"id": 1, "guid": "dda720ca-f11b-5ef5-beeb-5e33d2ed3e53", "logo": null, "date": "2018-05-10T16:00:00+02:00", "start": "16:00", "duration": "01:00", "room": "ZKM_Medientheater", "slug": "QUHMNF", "title": "What to hack", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "What to hack: die Er\u00f6ffnung der GPN18", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 1, "name": "obelix", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 183, "guid": "d93e474b-49bf-56c1-a207-d337a9570b1f", "logo": null, "date": "2018-05-10T17:00:00+02:00", "start": "17:00", "duration": "00:30", "room": "ZKM_Medientheater", "slug": "W9DTZA", "title": "Troll-Einf\u00fchrung", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Trolle sind die GPN-Helfer durch die es erst m\u00f6glich wird so eine Veranstaltung auf die Beine zu stellen. Damit alle auf dem gleichen Stand sind und die Abl\u00e4ufe kennen gibt es eine kurze allgemeine Einf\u00fchrung. Fragen k\u00f6nnen direkt gestellt werden oder per Trollsystem, Mail, IRC/hackint, ...", "description": "Die Trolle sind die freundlichen Helfer auf der GPN \u2013 ohne sie g\u00e4be es die GPN nicht. \r\n\r\nWelche Aufgaben es gibt findest du unter https://entropia.de/GPN18:Trolle", "recording_license": "", "do_not_record": false, "persons": [{"id": 158, "name": "jackmccrack", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 130, "guid": "37586acb-300a-55f2-be87-9e3fda19ca9c", "logo": null, "date": "2018-05-10T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "ZKM_Medientheater", "slug": "BT8SGL", "title": "Meltdown and Spectre for normal people", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Meltdown and Spectre are security flaws that gained widespread media coverage in the first days of 2018. Contrary to other security bugs these flaws are\r\n\r\n* hardware, not software based\r\n* the direct consequence of years of performance improvements\r\n* extremely widespread because they affect (nearly all) computer systems, including mobile phones\r\n* difficult to patch\r\n\r\nThis talk fills the gap between _\"Intel caused a terrible security bug. Everybody panic!\"_ and _\"By priming the BPU of the CPU a malicious process can read out of bounds memory via speculative code execution\"_.\r\n\r\n*This talk comes with a side order on \"Understanding CPU architecture\" and \"Managing security vulnerabilities\".*", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 105, "name": "Jens", "biography": "Jens Neuhalfen lives and breathes IT since 20 years. He is convinced that the interface between IT and non-IT is _the_ most important lever to run a successful business for IT-centric ventures.\r\n\r\nFurther he is convinced that sensible IT security not only saves money but opens new business opportunities.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 78, "guid": "ccd8a229-cf7c-5ed8-8fe8-9e388009743b", "logo": null, "date": "2018-05-10T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "ZKM_Medientheater", "slug": "9BXWKP", "title": "Finally - Venenerkennung hacken.", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Die Venenerkennung ist eines der juengsten biometrischen Verfahren und auf Grund des nicht-oeffentlichen Merkmals bisher auch eines der sichersten. Es gibt wenig Forschung zur zur Sicherheit der Systeme, bis jetzt.", "description": "Wir haben es endlich geschafft Venenerkennung zu hacken...\r\nTODO...", "recording_license": "", "do_not_record": true, "persons": [{"id": 51, "name": "starbug", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 13, "guid": "50c2af4c-4826-50ee-bde7-cbed07d3bf2e", "logo": null, "date": "2018-05-10T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "ZKM_Medientheater", "slug": "P77TUK", "title": "Alles was ihr schon immer \u00fcber Glasfasern wissen wolltet", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Ihr habt letztes mal gefragt, also bringen wir euch die Antworten auf Fragen wie:\r\nWas ist Singlemode, was ist Multimode und warum ist Erika eigentlich besser als orange?\r\nWelche Optik brauche ich f\u00fcr was, und warum sind die Dinger eigentlich so teuer? \r\nMuss ich eigentlich Putzen? Was ist ein EDFA und was ist ein RAMAN? Wie funktioniert WDM?", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 10, "name": "momo", "biography": "Network Engineer, Prometheus Lover, 5 in Physik und trotzdem was mit Physik als Tagesgesch\u00e4ft.", "answers": []}, {"id": 12, "name": "Marcnetismus", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}], "HfG_Studio": [{"id": 79, "guid": "ca1800bf-221d-5084-86ea-cbf946d18e04", "logo": null, "date": "2018-05-10T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "HfG_Studio", "slug": "XMJURN", "title": "RFID/NFC-Grundlagen - A Pentesters Perspective", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Eine kleine Einf\u00fchrung und \u00dcbersicht \u00fcber typische RFID/NFC-Techniken aus der Perspektive eines Pentesters.", "description": "Dieser Vortrag soll eine \u00dcbersicht \u00fcber einige der vielen typischen RFID/NFC-Techniken geben. Dabei soll es weniger um den theoretischen Hintergrund gehen, sondern eher um konkrete Vor- und Nachteile verschiedener RFID/NFC-Typen. Besonders in Bezug auf deren Sicherheit! Dabei soll auch gekl\u00e4rt werden, was im Werkzeugkoffer des RFID/NFC-Hackers nicht fehlen sollte.", "recording_license": "", "do_not_record": false, "persons": [{"id": 52, "name": "Gerhard Klostermeier", "biography": "Pentester, SDR and NFC enthusiast and, you know, computers and stuff.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 141, "guid": "ea7536ab-518e-5ec3-a897-7de5b1cc90cf", "logo": null, "date": "2018-05-10T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "HfG_Studio", "slug": "QAUZLU", "title": "HTTP Security & Headers", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Du kennst observatory.mozilla.org oder securityheaders noch nicht? Dann bist du hier richtig; es gibt einen aktuellen \u00dcberblick \u00fcber die M\u00f6glichkeiten eure Anwendungen ein st\u00fcck sicherer zu machen und zu halten...", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 117, "name": "Ives \"dalini\" Laaf", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 127, "guid": "aff905a6-1619-5bb5-a99f-8034189fd1a9", "logo": null, "date": "2018-05-10T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "HfG_Studio", "slug": "GQFMWW", "title": "Automatically Assessing Security and Privacy Properties of Web Sites", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "In this talk, we present PrivacyScore, a tool for making tracking behaviour of Web sites more transparent. With PrivacyScore, you can easily investigate Web sites for their usage of tracking or other privacy invading technologies. It also allows you to create benchmarks to find out what related Web sites have in common. We present details of the inner workings of the tool and how to perform basic analyses of Web sites and lists of related sites.", "description": "This session is for people who are interested in analysing the state of the current Web regarding tracking of its users. It will be interesting to technicians, policy makers, and users.\r\n\r\nWe want to discuss how we can make the tool more useful to users, Web site operators, and data protection agencies s.t. it will be the go-to-point for privacy issues on the Web.\r\n\r\nPrivacyScore.org is a joint project by University of Bamberg, TU Darmstadt, and University of Hamburg.", "recording_license": "", "do_not_record": false, "persons": [{"id": 79, "name": "Tobias Mueller", "biography": "", "answers": []}, {"id": 148, "name": "Pascal Wichmann", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 174, "guid": "f7b220db-e823-5d71-a244-67d9ebe6b372", "logo": null, "date": "2018-05-10T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "HfG_Studio", "slug": "HA8WBF", "title": "robotcowboy: A Wearable One-Man-Band Cyborg Performance Project", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "robotcowboy is an ongoing human-computer wearable performance project using custom hardware and software to meld rock music and realtime algorithmic composition.", "description": "Conceived as an idiosyncratic manifesto on the embodiment of computational sound, the original robotcowboy system was built in 2006-2007 using an belt-mounted industrial wearable computer running GNU/Linux and Pure Data, external stereo USB audio/MIDI interfaces, HID gamepads, and guitar. A second incarnation explores a one-way journey of the first human on Mars with the computing system adapted into a self-contained spacesuit backpack. Now 10 years on, a new \"robotcowboy 2.0\" powers a third iteration with only an iPhone and PdParty, the author\u2019s open-source iOS application which runs Pure Data patches and provides full duplex stereo audio, MIDI, HID game controller support, and Open Sound Control communication. The future is bright, do you have room to wiggle?\r\n\r\nhttp://robotcowboy.com & http://danomatika.com/music/robotcowboy-cabled-madness", "recording_license": "", "do_not_record": false, "persons": [{"id": 145, "name": "Dan Wilcox", "biography": "Dan Wilcox (Artist Engineer Musician Performer) danomatika.com\r\n\r\nDan Wilcox works at ZKM!", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_Vortragssaal": [{"id": 132, "guid": "0e85db0d-afc2-5826-a0ad-7189ffc80601", "logo": null, "date": "2018-05-10T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "CVFFTL", "title": "Seitenkanal-Angriffe innerhalb FPGA-Chips", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Es wird gezeigt wie man die internen Elemente von FPGAs kreativ verwenden kann um Angriffe auf elektrischer Ebene von einem Teil innerhalb des Chips auf einen anderen Teil durchzuf\u00fchren. Die Grundlagen zu FPGAs und entsprechenden Seitenkanal-Angriffen werden nat\u00fcrlich auch erkl\u00e4rt.", "description": "FPGAs werden immer mehr auch als Rechenbeschleuniger (\u00e4hnlich Grafikkarten) eingesetzt, und sind mittlerweile auch in der Amazon Cloud verf\u00fcgbar. Eine kurze Einf\u00fchrung erl\u00e4utert wie FPGAs aufgebaut sind, und deren Auslegung auf digitale Logik, die aber rein durch Software definiert werden kann. Anschlie\u00dfend wird erkl\u00e4rt wie man damit auf kreative Weise auch andere Dinge bewerkstelligen kann, wie Spannungseinbr\u00fcche zu erzeugen, oder Spannung indirekt zu messen. Zus\u00e4tzlich werden die Grundlagen zu Power Analysis Angriffen auf kryptografische Module erkl\u00e4rt (Schul-Mathematik reicht).\r\nLetztendlich wird im Vortrag gezeigt wie damit aktive (Fault) und passive Side-Channel Angriffe (Correlation Power Analysis) von einem Teil des FPGAs auf einen anderen erfolgen k\u00f6nnen.", "recording_license": "", "do_not_record": false, "persons": [{"id": 109, "name": "Dennis", "biography": "bluesceada", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 15, "guid": "b8784439-c77f-505d-a191-1a4ebf27ad48", "logo": null, "date": "2018-05-10T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "YTSUYR", "title": "Channelizing with GnuRadio", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Vorstellung von Channelizing Methoden in GnuRadio, inklusive Detail Vorstellung eines Frequency Domain Channelizers f\u00fcr z.b. Demand Assigned Multiple Access Systeme. Ziel Publikum sind prim\u00e4r GnuRadio Entwickler mit optimalerweise nachrichtentechnischem Hintergrund.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 13, "name": "Gereon Such", "biography": "M.Sc. el. Eng., Schwerpunkt Nachrichtentechnik\r\nEntwickler Software defined Radio L\u00f6sungen\r\nz.Z. Hiwi/Doktorand", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 129, "guid": "f11a2ed0-63f9-59ce-9f7c-f6a9c379be43", "logo": null, "date": "2018-05-10T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "CEQKHF", "title": "Practical Cryptography Patterns", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Unprotected data will put not only your customers at risk. Jens' talk will give you actionable advice on how - and why - cryptography can help you and your managers to get better sleep. His talk will illustrate legal and regulatory requirements, and will then dive into a set of cryptographic patterns to get you started on your way to better and more secure software.\r\n\r\nBetting all your data on your cloud providers security might not be the best way to exercise your accountability. Protecting data with cryptography can ensure that your last line of defense actually holds.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 105, "name": "Jens", "biography": "Jens Neuhalfen lives and breathes IT since 20 years. He is convinced that the interface between IT and non-IT is _the_ most important lever to run a successful business for IT-centric ventures.\r\n\r\nFurther he is convinced that sensible IT security not only saves money but opens new business opportunities.", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_OpenHUB": [{"id": 153, "guid": "33c0a435-974b-5a65-9798-81ee2bfb925b", "logo": null, "date": "2018-05-10T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "UKDYNA", "title": "Einf\u00fchrung: Schlangenprogrammiernacht 2018", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Programmiert eigene Schlangen und lasst sie gegeneinander antreten!", "description": "Das bytewerk bringt zur GPN18 ein neues Programmierspiel mit.\r\n\r\nAlle TeilnehmerInnen k\u00f6nnen sich in der Erschaffung \"k\u00fcnstlicher\" \"Intelligenz\" versuchen und Bots programmieren, die jeweils eine Schlange steuern.\r\nDie Schlangen m\u00fcssen Futter suchen und Gegnern ausweichen - wer in eine gegnerische Schlange f\u00e4hrt, stirbt. Das Ganze orientiert sich an https://slither.io/\r\n\r\nBots werden in Lua programmiert und auf einen zentralen Server geladen, wo sie selbstst\u00e4ndig agieren m\u00fcssen. \r\nDen Code k\u00f6nnt ihr entweder auf einer Webseite mit Online-Editor entwickeln oder per REST API auf den Server schieben.\r\n\r\nAm Tag 4 gibt es hervorragende Preise f\u00fcr die Teilnehmer mit den besten Schlangen.\r\n\r\nIn diesem Einf\u00fchrungstalk zeigen wir kurz das Spiel und wie man seine erste Schlange zum Schl\u00e4ngeln bringt.", "recording_license": "", "do_not_record": false, "persons": [{"id": 129, "name": "Hubert Denkmair", "biography": "", "answers": []}, {"id": 156, "name": "Thomas", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 103, "guid": "d4965df6-fd2c-5b12-bfb7-1302b2827ba5", "logo": null, "date": "2018-05-10T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "L983SC", "title": "Good Patterns for Deep Learning with Tensorflow", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "This talk will explain practical deep learning with tensorflow. No theory, just implementation.\r\nAll steps for implementing a model will be explained using good patterns.", "description": "The talk will introduce a split into model, loss, dataset and estimator that keeps your code clean and easy to understand. For each of those 4 topics details how to implement it in an efficient, reusable way are explained.\r\n\r\nThe talk will assume basic knowledge about deep learning, since it will focus on implementation and no theory.\r\n\r\nYou will learn:\r\n* Writing good quality deep learning code\r\n* Implementing a model from scratch\r\n* Implementing a loss\r\n* Loading a dataset\r\n* Training a model\r\n\r\nYou will *not* learn:\r\n* What to use Deep Learning for?\r\n* What is a CNN, GAN, RNN, etc.?\r\n* That latest super weird feature of tensorflow.\r\n\r\nOne more thing:\r\n\"The answer to the ultimate question of life, the universe and everything is 42.\" [The Hitchhiker's Guide to the Galaxy]\r\n\r\nSamples from slides on: https://github.com/penguinmenac3/starttf\r\nNotebook with description: https://github.com/penguinmenac3/starttf/blob/master/starttf/examples/mnist_starttf_explanation.ipynb", "recording_license": "", "do_not_record": false, "persons": [{"id": 78, "name": "penguinmeanc3", "biography": "I love machine learning and robotics. I am happy to work at a company on deep learning.\r\n\r\nI try to make deep learning simple and fast with this project: https://github.com/penguinmenac3/deeplearning-starterpack\r\n\r\nWhen I do something different, it is usually a little robot (e.g. https://kamaro-engineering.de/ or https://github.com/SimpleRobots).", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 154, "guid": "6057325d-54d0-59d1-929e-880ee1320044", "logo": null, "date": "2018-05-10T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "QKFQWK", "title": "Concepts and Tooling in Reverse Engineering", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Eine \u00dcbersicht \u00fcber verschiedene Konzepte die beim Reverse Engineering von Binaries hilfreich bis essentiell sind, wie bekannte Tools diese verwenden und Tools die Konzepte verwenden die vielleicht nicht jeder kennt.\r\n\r\nDer Vortrag richtet sich sowohl an Anf\u00e4nger die eine \u00dcbersicht erhalten wollen, als auch Erfahrenere die ihre Toolbox erweitern wollen.", "description": "## Beschreibung \r\n\r\nWie versteht man besten API einer propriet\u00e4ren App wenn man seinen eigenen Open Source Client implementieren will? Was wenn man daf\u00fcr einen kryptographischen Schl\u00fcssel braucht der versteckt generiert wird?\r\n\r\nF\u00fcr viele Herausforderungen im Bereich Reverse Engineering reicht es nicht Assembler lesen zu k\u00f6nnen, sondern es ben\u00f6tigt dediziertes Tooling um nicht von der F\u00fclle an Code und Daten \u00fcberw\u00e4ltigt zu werden.\r\n\r\n## (Nicht vollst\u00e4ndige \u00dcbersicht der)Inhalte:\r\nBasics:\r\n - File Parsing\r\n - Basic Tracing on Linux\r\n - Disassembling\r\n - Debugging mit GDB (und Plugins)\r\n\r\n\r\nIntermediate:\r\n * Verschiedene Arten von Emulierung\r\n * Binary Instrumentation \r\n * Disassembly Algorithms and CFG Generation\r\n\r\nAdvanced:\r\n * Symbolic Execution/Program Analysis\r\n * SMT Solving\r\n * Building your own tools", "recording_license": "", "do_not_record": false, "persons": [{"id": 130, "name": "Florian Magin", "biography": "Florian arbeitet als Werkstudent bei der ERNW Research GmbH in Heidelberg und organisiert in seiner Freizeit das CTF Team des CCC Darmstadt \"Wizards Of Dos\".\r\nSeine prim\u00e4ren Interessen sind Theoretische Informatik, Program Analyse und IT-Sicherheit mit Fokus auf Binary Security", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 118, "guid": "56c2a03f-1969-5597-a6d8-b2aac8ef9645", "logo": null, "date": "2018-05-10T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "8ZCKCC", "title": "Binary Ninja plugin development", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Binary.ninja is a \"reverse engineering\" platform comparable to the famous IDA pro.\r\nWhat sets it apart is a rather nice python api that can be used to extend the functionality even further.\r\nThis talk provides the listener with all steps neccesary to write own plugins in binary ninja\r\nand gives some tips on how to ease up the development.", "description": "Rough agenda \r\n\r\n* Short introduction to https://binary.ninja/ \r\n* Introduction to the binary ninja api\r\n* Examples of existing plugins \r\n* Tips for developing plugins", "recording_license": "", "do_not_record": false, "persons": [{"id": 95, "name": "Benedikt Schmotzle", "biography": "Fellow of the church of aleph one.", "answers": []}], "links": [], "attachments": [], "answers": []}], "HfG_Workshoproom": [{"id": 181, "guid": "cc485d27-24e9-5ef8-bba4-777ccd83a802", "logo": null, "date": "2018-05-10T17:30:00+02:00", "start": "17:30", "duration": "00:30", "room": "HfG_Workshoproom", "slug": "RJKRKS", "title": "GameJam Einf\u00fchrung", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Ein GameJam ist ein Spiel-entwicklungs-Schnellhack, bei dem in einer vorgegebenen Zeitspanne (48h) Spiele entwickelt werden, die dann am Samstag gemeinsam pr\u00e4sentiert und getestet werden. Ziel ist es, innerhalb k\u00fcrzester Zeit funktionierende (digitale) Prototypen zu entwickeln. Dabei stehen Inspiration, Innovation und kreative Experimente mit digitalen Technologien im Vordergrund.\r\n\r\nWir haben motivierte Designer aus dem GameLab an der Hand, die sich freuen w\u00fcrden, mit euch zusammen geilo Spiele zu entwickeln, falls ihr euch um die visuelle Komponente Sorgen macht.\r\n\r\nDas Thema wird zu Beginn des Jams bekannt gegeben.\r\n\r\nWir freuen uns auf euch - das GameLab Karlsruhe", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 57, "name": "Princess Punzel", "biography": "Got abducted by the overlord.\r\nHas since then befriended his minions Mux and Gergor (of the goblin race), unsuccesfully tried to charm Eye-cancer (the monster of Loch Poisonne), found a princess-friendly loo and become an ace with the slingshot.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 38, "guid": "0b172cfd-c34e-509c-a86c-b06c9a5d3f40", "logo": null, "date": "2018-05-10T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "HfG_Workshoproom", "slug": "XYLSFR", "title": "postapokalyptischer schmuck-, goggles- oder fidget spinner workshop", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "elektroabfall-upcycling-workshop", "description": "beim 'postapokalyptischer schmuck-, goggles- oder fidget spinner workshop' k\u00f6nnen teilnehmende der gpn schmuck, brillen gegen gesichtserkennungskameras oder fidget spinner herstellen aus gestelltem material wie kaputten elektroger\u00e4ten, elektronikbauteilen, bunten abf\u00e4llen sowie resten von anderen workshops. es sollen \u00e4sthetikbewusstsein und bewussterer umgang mit ressourcen vermittelt werden, au\u00dferdem werden durch den umgang mit verschiedensten komponenten und materialien die motorik und die handwerklichen f\u00e4higkeiten der teilnehmenden geschult. gleichzeitig wird die abfallmenge der veranstaltung geringf\u00fcgig reduziert. vor allem bei kindern kommt der workshop gut an, keine vorkenntnisse erforderlich. gegen freie spende.\r\neindr\u00fccke vergangener workshops findet ihr hier: https://p0stap0calyptic.wordpress.com/", "recording_license": "", "do_not_record": false, "persons": [{"id": 31, "name": "paulaner", "biography": "kommt aus m\u00fcnchen, mag chaos, macht kunstzeug wie schmuck & vjing.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 120, "guid": "e8bf2c61-ba82-5a61-9c6b-4ea090405f32", "logo": null, "date": "2018-05-10T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "HfG_Workshoproom", "slug": "DRNRYE", "title": "Deep Learning with Tensorflow from Zero to Hero in 60 Minutes", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Dieser Workshop wird die Konzepte die im Vortrag \"Good Patterns for Deep Learning with TF\" vorgestellt wurden in der Praxis umsetzen. Dabei wird aus Zeitgr\u00fcnden nicht erkl\u00e4rt, warum man die Patterns benutzt, dazu bitte den Talk besuchen.", "description": "Dieser Workshop wird die Konzepte die im Vortrag \"Good Patterns vor Deep Learning with TF\" vorgestellt wurden in der Praxis umsetzen. Dabei wird aus Zeitgr\u00fcnden nicht erkl\u00e4rt, warum man die Patterns benutzt, dazu bitte den Talk besuchen.\r\n\r\nZiel des Workshops ist es ein kleines Neuronales Netz in Tensorflow zu implementieren unter Ber\u00fccksichtigung der best practices. Es wird zun\u00e4chst gezeigt, wie man optimal Daten l\u00e4dt, dann wie man ein Model implementiert. Anschlie\u00dfend wird ein loss und ein Optimierer definiert und das ganze trainiert.\r\n\r\n\r\nBitte vorher installieren:\r\n\r\nPython 2.7 or 3.x\r\n\r\n```\r\npip install tensorflow\r\n```\r\n\r\n```\r\npip install https://github.com/penguinmenac3/starttf/archive/master.zip\r\n```\r\n\r\n```\r\npip install https://github.com/penguinmenac3/opendatalake/archive/master.zip\r\n```\r\n\r\nNotebook on github: https://github.com/penguinmenac3/starttf/blob/master/starttf/examples/mnist_starttf_explanation.ipynb", "recording_license": "", "do_not_record": false, "persons": [{"id": 78, "name": "penguinmeanc3", "biography": "I love machine learning and robotics. I am happy to work at a company on deep learning.\r\n\r\nI try to make deep learning simple and fast with this project: https://github.com/penguinmenac3/deeplearning-starterpack\r\n\r\nWhen I do something different, it is usually a little robot (e.g. https://kamaro-engineering.de/ or https://github.com/SimpleRobots).", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_CodeHUB": [{"id": 84, "guid": "d852d194-8963-5cff-ab08-d7e8e4578e14", "logo": null, "date": "2018-05-10T19:00:00+02:00", "start": "19:00", "duration": "00:30", "room": "ZKM_CodeHUB", "slug": "XLT9PJ", "title": "OpenPGP Keys anstarren", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Kontrolle ist besser als Vertrauen. Das gilt in der Informatik insbesondere bei der Kryptografie. Wer einen neuen OpenPGP Key ausstellt, tut gut daran, sich das resultierende Zertifikat genau anzuschauen bevor es auf die Keyserver hochgeladen wird. Ich stelle Tools vor um OpenPGP Zertifikate zu analysieren und helfe bei der Interpretation derer Ausgabe.", "description": "Kontrolle ist besser als Vertrauen. Das gilt in der Informatik insbesondere bei der Kryptografie. Wer einen neuen OpenPGP Key ausstellt, tut gut daran, sich das resultierende Zertifikat genau anzuschauen bevor es auf die Keyserver hochgeladen wird. Ich stelle Tools vor um OpenPGP Zertifikate zu analysieren und helfe bei der Interpretation derer Ausgabe.\r\n\r\nOpenSSL, das ja bekanntlich besonders Benutzerunfreundlich ist, bietet mit `openssl x509` ein geeignetes Werkzeug um den Inhalt von x509 Zertifikaten in eine ~menschenlesbare Form zu bringen. Nachdem man sich mit dem Erstellen eines neuen Zertifikates abgem\u00fcht hat, kann man damit zumindest pr\u00fcfen ob die Werte den Vorstellungen entsprechen. GnuPG, das mindestens genau so benutzerunfreundlich ist, bietet leider keine geeigneten Werkzeuge zur Selbstkontrolle.\r\n\r\nIn diesem Vortrag gehe ich kurz auf das on-board Mittel von GnuPG (--list-packets) ein. Anschliessend zeige ich mit pgpdump und hopenpgp hokey zwei Alternativen auf die den Job besser mache. Es gibt eine kurze Einf\u00fchrung zur Benutzung und zur Interpretation des Output.", "recording_license": "", "do_not_record": false, "persons": [{"id": 59, "name": "vimja", "biography": "I\u2019m an IT student from Bern, Switzerland. In February 2015, I co-founded the local Chaostreff in Bern.\r\n\r\nI\u2019m interested in Free Software, InfoSec, mechanical keyboards and all sorts of stuff. I am also interested in the communities that form around free and open source software.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 178, "guid": "57946a5a-4031-548a-99aa-463ef715284f", "logo": null, "date": "2018-05-10T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "ZKM_CodeHUB", "slug": "F7EQYC", "title": "Can you hug yourself?", "subtitle": "", "track": null, "type": "Workshop", "language": "en", "abstract": "Today, with all the technology in your pocket you can easily send mails, messages or talk to your loved ones, at any moment. But what if you need a hug and there\u2019s no one near?\r\nCould you hug yourself?", "description": "In this workshop we explore what a hug is, what techniques exist to recreate the effect of a hug and try out if they work.", "recording_license": "", "do_not_record": true, "persons": [{"id": 147, "name": "mrybakov", "biography": null, "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 168, "guid": "4a5c3332-4e64-51a2-8f3b-ed071fc7a94d", "logo": null, "date": "2018-05-10T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "ZKM_CodeHUB", "slug": "LQEQ83", "title": "Domain-Automatisierung mit cryptdomainmgr", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Moderne Standards zur Abwehr von Manipulation, Phishing und Spam erfordern die regelm\u00e4\u00dfige Erneuerung von SSL-Zertifikaten, Schl\u00fcsselmaterial und DNS-Eintr\u00e4gen wie TLSA und DKIM. Die Software cryptdomainmgr nimmt die Arbeit ab.", "description": "Das python-Projekt cryptdomainmgr integriert certbot, rspamd und domrobot um automatisiert neue SSL-Zertifikate und DKIM-Schl\u00fcssel zu erzeugen, daraus TLSA- und DKIM-Eintr\u00e4ge zu generieren und im DNS zu ver\u00f6ffentlichen. Priorisierte Konfigurationsdateien erlauben die flexible Zuordnung der Zertifikats- und Domainkonfigurationen. Neue Eintragstypen wie SRV, DMARC, SPF und ADSP werden ebenfalls unterst\u00fctzt.\r\n\r\nSource: https://github.com/TheTesla/cryptdomainmgr\r\n\r\nSliedes: https://github.com/TheTesla/cryptdomainmgr-talk", "recording_license": "", "do_not_record": false, "persons": [{"id": 141, "name": "Stefan Helmert (Tesla42)", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_AckerSpace": [{"id": 131, "guid": "bff89a41-1597-5f6e-ae67-fc0fba3fcb2c", "logo": null, "date": "2018-05-10T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "ZKM_AckerSpace", "slug": "ZRZZVZ", "title": "Sprich mit uns! Eine Ermunterung f\u00fcr neue Speaker.", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Wenn du dich brennend f\u00fcr etwas interessierst, warum sollten das nicht auch andere tun? Trau dich den Talk, der in dir schlummert, einzureichen! \r\nDieser Talk erkl\u00e4rt, welche Vorraussetzungen du nicht brauchst und warum es f\u00fcr uns wichtig ist, dass du dich traust.", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"id": 106, "name": "Leilah", "biography": "Teil des Careteams und mutige Technik-Analphabetin auf der GPN, die hier ihren ersten Talk h\u00e4lt.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 97, "guid": "76ab4f33-711a-5f41-8336-62d7ba6ad597", "logo": null, "date": "2018-05-10T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "ZKM_AckerSpace", "slug": "YMTJBU", "title": "How we CARE", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Die Chaos Awareness Response Entropians (CARE) stellen sich vor: Was tun wir auf der GPN? Welchen Leitprinzipien folgen wir dabei? Welchen inneren Prozess haben wir zur st\u00e4ndigen Fortbildung des Teams entwickelt? Was k\u00f6nnen wir f\u00fcr euch, und was k\u00f6nnt ihr f\u00fcr uns tun? Und wie lauten die Fragen, die bisher noch unbeantwortet sind?", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 72, "name": "inderkuerze", "biography": "DECT6464\r\n@entropia aka Mimi", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 83, "guid": "52f5bda4-f594-5fb9-a522-5241286f4b56", "logo": null, "date": "2018-05-10T21:00:00+02:00", "start": "21:00", "duration": "03:00", "room": "ZKM_AckerSpace", "slug": "WNFSFM", "title": "Workshop Automatisierung - wat nu tuwat", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Eine Stunde open talk f\u00fcr chaosnahe gpn-Teilnehmer, wo wir \u00fcber die kommenden Disruptionen f\u00fcr Arbeitsmarkt und Volkswirtschaft durch technische Innovationen und deren Management sprechen.\r\n\r\nEin offener Workshop, wo Martin und ajuvo vorstellen, was wir zu dem Thema gerade anfangen zu machen mit der Aufforderung und M\u00f6glichkeit, sich mit Ideen und Gedanken dazu einzubringen, ganz ungezwungen.", "description": "Wir bitten um Voranmeldung seitens interessierter Teilnehmer aus der Besucherschaft per e-mail bei ajuvo unter mememe (@) freakmail.de .", "recording_license": "", "do_not_record": true, "persons": [{"id": 50, "name": "martin", "biography": "", "answers": []}, {"id": 58, "name": "ajuvo", "biography": "https://www.damals-tm-podcast.de\r\nhttps://ajuvo.crew.c-base.org\r\nhttps://c-base.org", "answers": []}], "links": [], "attachments": [], "answers": []}], "Anderswo": [{"id": 144, "guid": "8c55304e-d9a2-5b1a-8b30-679eadf49ac0", "logo": null, "date": "2018-05-10T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "Anderswo", "slug": "Q7UX8Y", "title": "Einf\u00fchrung in die Chaosvermittlung", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "2 Draht Technik nicht nur als Backupkommunikation", "description": "Die Chaosvermittlung wurde aus der Intention geboren, allen CCC nahen Leuten die Lust haben mit Feldtelefonen zu spielen eine Anlaufstelle zu bieten. Wir stellen euch in diesem Workshop unsere Technik vor und wie diese funktioniert.", "recording_license": "", "do_not_record": false, "persons": [{"id": 120, "name": "PhilmacFLy", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 179, "guid": "d4dffcf4-be80-5126-bf0d-a63371b9d3b2", "logo": null, "date": "2018-05-10T20:00:00+02:00", "start": "20:00", "duration": "03:00", "room": "Anderswo", "slug": "FTT8A8", "title": "Eurovision Song Contest 2. Semifinal", "subtitle": "", "track": null, "type": "Film / Video", "language": "de", "abstract": "Okay, so the ESC Semifinals are during GPN this year, so let's watch them together and nerd out for a bit.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 55, "name": "Eve Entropia", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}], "Lounge": [{"id": 59, "guid": "8e8f5ad4-e24a-53a5-9185-2114483ac182", "logo": null, "date": "2018-05-10T18:00:00+02:00", "start": "18:00", "duration": "02:00", "room": "Lounge", "slug": "9H9GQK", "title": "Skorpy", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 75, "guid": "e4cd87dd-530e-5813-a6b9-4cc70b4eaa60", "logo": null, "date": "2018-05-10T20:00:00+02:00", "start": "20:00", "duration": "02:00", "room": "Lounge", "slug": "D7JYEX", "title": "faheus", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 60, "guid": "03c94f23-f2cf-59d1-add4-8771058db177", "logo": null, "date": "2018-05-10T22:00:00+02:00", "start": "22:00", "duration": "02:00", "room": "Lounge", "slug": "ATPDYX", "title": "dnc (DnB/Liquid)", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}]}}, {"index": 2, "date": "2018-05-11", "day_start": "2018-05-11T00:00:00+02:00", "day_end": "2018-05-12T00:00:00+02:00", "rooms": {"ZKM_Medientheater": [{"id": 6, "guid": "b9449f30-77c8-5f6a-959d-c31e84e90027", "logo": null, "date": "2018-05-11T14:30:00+02:00", "start": "14:30", "duration": "01:30", "room": "ZKM_Medientheater", "slug": "LTREFT", "title": "Sysadmin Nightmares 2018", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Moderiertes Panel, bei dem jeder auf der B\u00fchne die verr\u00fccktesten Geschichten aus seinem Job erz\u00e4hlen kann. Nat\u00fcrlich ohne laufende Kameras.", "description": "Packt die besten Geschichten eurer Laufbahn in einen kurzen, auch gerne audiovisuell unterst\u00fctzen Vortrag und teilt das Elend dem ihr Herr werden m\u00fcsst mit der Welt.\r\n\r\nAb Beginn des Vortrags kann man sich bei den Nachwuchs BOFHs im Saal auf die Speakerliste setzten lassen. Jeder erh\u00e4lt f\u00fcnf Minuten um eine oder zwei Geschichten zu erz\u00e4hlen.", "recording_license": "", "do_not_record": true, "persons": [{"id": 3, "name": "Rem0te", "biography": "Infosec Red/Blue Team, Layer8 debugger.\r\nBOFH mit Wartungshammer.\r\nD&D DM\r\nMotto: I have a million ideas but they all point to your certain death", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 110, "guid": "16a1a1ce-98ce-5d69-9af1-49ca4f154640", "logo": null, "date": "2018-05-11T16:30:00+02:00", "start": "16:30", "duration": "00:30", "room": "ZKM_Medientheater", "slug": "SHCYUH", "title": "$QL from Hell", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Fundst\u00fccke aus \"organisch gewachsenen\" Datenbanken und was wir daraus lernen k\u00f6nnen.", "description": "Arbeitsbedingt besch\u00e4ftige ich mich regelm\u00e4\u00dfig mit diversen ERP-L\u00f6sungen von \"f\u00fchrenden Anbietern\" und insbesondere deren Datenbanken dahinter, z.B. zur erweiterten Datenauswertung oder Anbindung diverser Services. Daf\u00fcr m\u00fcssen die Datenbanken in der Regel reverse engineered werden (welcher Hersteller liefert schon eine Doku seiner DB mit...) und dabei finden sich immer wieder kleine bis seeehr gro\u00dfe Schnitzer.\r\nDa Humor der beste Lehrer ist, bietet dieser Talk ein \"Best of\" grundlegender Designfails, kreativer Datentypennutzung und sehr speziellen Funktionen \"for the lulz\"!\r\nGrundlegende Datenbankkenntnisse bei Besucherinnen sind zwar von Vorteil aber definitiv nicht Vorraussetzung.", "recording_license": "", "do_not_record": false, "persons": [{"id": 88, "name": "smtw", "biography": "Tut Dinge, zum eigenen Verdruss regelm\u00e4\u00dfig mit Datenbanken.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 143, "guid": "42019c8e-4b3d-51a3-833c-0f83c0f543d5", "logo": null, "date": "2018-05-11T17:30:00+02:00", "start": "17:30", "duration": "01:35", "room": "ZKM_Medientheater", "slug": "BECREE", "title": "Logbuch:Netzpolitik 253", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Logbuch:Netzpolitik ist der Versuch, das netzpolitische Geschehen im deutschsprachigen Raum weitgehend neutral und unaufgeregt in einem regelm\u00e4ssigen Podcast einzufangen.", "description": "Seit mehr als 250 Folgen machen Tim Pritlove und Linus Neumann gemeinsam den Podcast Logbuch:Netzpolitik. Auf der Gulaschprogrammiernacht wollen wir die Gelegenheit nutzen, ein bisschen B\u00fchnenerfahrung zu sammeln.", "recording_license": "", "do_not_record": false, "persons": [{"id": 118, "name": "Linus Neumann", "biography": "Linus Neumann ist einer der Sprecher des Chaos Computer Clubs (CCC). Zusammen mit Tim Pritlove macht er den w\u00f6chentlichen Podcast Logbuch:Netzpolitik. Beruflich setzt er sich mit IT-Security auseinander.", "answers": []}, {"id": 119, "name": "Tim Pritlove", "biography": "Podcaster, Discordian Evangelist", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 44, "guid": "a422a49e-a58d-5822-a561-519d24ae9540", "logo": null, "date": "2018-05-11T19:30:00+02:00", "start": "19:30", "duration": "00:30", "room": "ZKM_Medientheater", "slug": "VDMQAY", "title": "Computational Narratives - Philosophical perspectives on Jupyter Notebook", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "The \"fiction view on models\" compares scientific modeling with authorized role-play games (Frigg 2010). As narratives are the entrance, it now becomes clear why coding and tabletop (e.g. D&D) somehow belong together...", "description": "\"Computers are good at consuming, producing and processing data. Humans, on the other hand, process the world through narratives. Thus, in order for data, and the computations that process and visualize that data, to be useful for humans, they must be embedded into a narrative - a computational narrative - that tells a story for a particular audience and context. \r\n- First, a single computational narrative needs to span a wide range of contexts and audiences. \r\n- Second, these computational narratives need to be reproducible. \r\n- Third, computational narratives are created in collaboration.\u201c (Perez and Granger 2015, ipython.org) \r\n\r\nQuestbook: Beginning-Middle-End, Narrative Framing, Narrative Self-Constituion, Narrative Immersion, Representation\r\n\r\nAdventurers Group: Aristotle, MacIntyre, Walton, Frigg, Salis, Minsc & Boo and some others... \r\n\r\nIn general, I am very interested in further discussion about your practical experience and thoughts on this!", "recording_license": "", "do_not_record": false, "persons": [{"id": 36, "name": "Max Ro\u00dfmann", "biography": "I am a PhD student in philosophy of technology. Last year, I started doing some python coding for statistics and simulation.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 166, "guid": "95457cf6-6e5c-530c-8ce8-8bf9662cb90a", "logo": null, "date": "2018-05-11T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "ZKM_Medientheater", "slug": "EZUTT8", "title": "Geschichte_n der Informatik", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Von tats\u00e4chlichen \"bugs\" \u00fcber abgest\u00fcrzte Raketen, von knapp am Krieg vorbei zu rassistischen Seifenspendern: Eine Reise durch die Geschichte der IT-Fehler, und was wir aus ihnen lernen k\u00f6nnen - und sollten.", "description": "Wieviele Raketenwissenschaftler_innen braucht es, um eine Rakete nicht auf ihrem ersten Flug explodieren zu lassen?\r\nEigentlich nur eine_n - aber die Person sollte die Dokumentation gelesen haben.\r\n\r\nViele Fails sind nicht nur technisch bedingt - wir gehen den organisatorischen und strukturellen Umst\u00e4nden auf den Grund. Und wir werden sehen: in den letzten Jahrzehnten wurden viele Fehler nur unzureichend als Lernm\u00f6glichkeiten genutzt.", "recording_license": "", "do_not_record": false, "persons": [{"id": 139, "name": "pascoda", "biography": "studiert Informatik an der TU Wien (#elituwien), besch\u00e4ftigt sich mit Fails und Ungleichheit in Informatik und Gesellschaft -- und redet dr\u00fcber.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 29, "guid": "412d3bab-a67c-589a-9c70-8bb128ab560e", "logo": null, "date": "2018-05-11T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "ZKM_Medientheater", "slug": "VKKHSH", "title": "That time my great grandfather didn't die", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "All layers in an organisation usually knows what best practice is, yet it\u2019s hard to enforce it.\r\nThe talk will start in a 100 year old accident with personal implications for me personally. A sinking boat, two drowning artists, and my great grandfather being the sole survivor. \r\nThe accident was caused by well-known handling errors, enforced by the whole organisation from top to bottom. Economic considerations as well as tedious, repetitive manual labor caused a well-built boat to sink.\r\nI see strong parallells between this accident and my work as an agile tester.", "description": "Key takeaways\r\nComputer engineering differs from any other kind of engineering because of its lack of enforcement of standardised frameworks, checklists and due diligence. I argue that the IT business is about as mature as the physical engineering branches were a 100 years ago, and a combination of the GDPR and agile methods is our best hope of changing from a Wild West business to something more modern.", "recording_license": "", "do_not_record": false, "persons": [{"id": 24, "name": "Emma Lilliestam", "biography": "Emma Lilliestam is a security researcher and exploratory tester working at House of Test in Sweden. She is a chip implanted cyborg and has spoken at various conferences, including being the keynote of Passwordcon 2016\r\nShe is also a co-founder of ada_conf, a tech conference for women and trans people. When there is some time to spare, she blogs about processes, user security, GDPR or other super exciting topics.", "answers": []}], "links": [], "attachments": [], "answers": []}], "HfG_Studio": [{"id": 165, "guid": "8b1d4db8-e064-5273-bf14-8394b432748b", "logo": null, "date": "2018-05-11T11:30:00+02:00", "start": "11:30", "duration": "00:30", "room": "HfG_Studio", "slug": "MZ7TDM", "title": "Offenheit der IT Supply Chain einschlie\u00dflich Tools und Fabs", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "In diesem Talk werden \u00dcberlegungen zur Sicherung der gesamten IT-Wertsch\u00f6pfungskette mit quelloffenen Tools geschildert. Die Diskussion \u00fcber entsprechende Ans\u00e4tze sollen breit in der Gesellschaft verankert werden.", "description": "Der Einreicher ist Mitautor eines White Papers, in dem umfassende M\u00f6glichkeiten zur Erzielung einer wesentlich h\u00f6heren IT-Sicherheit er\u00f6rtert werden. Eines der Schl\u00fcsselergebnisse ist, dass eine offene und transparente Wertsch\u00f6pfungskette am ehesten zum Ziel f\u00fchrt, wobei sich die Offenheit auch auf die verwendeten Entwicklungswerkzeuge bezieht und Fragen der Transparenz von Fabs angesprochen werden. Die Autoren sind sich der Schwierigkeiten der Aufgabe einigerma\u00dfen bewusst. Sie pl\u00e4dieren f\u00fcr eine baldige, globale Diskussion des Ansatzes und f\u00fcr eine breite Unterst\u00fctzung der Entwicklung der (teils bereits entstehenden) Tools durch Enthusiasten, Regierungen und Unternehmen. \r\nDas White Paper ist u.a. beim KIT verf\u00fcgbar:\r\nhttp://www.itas.kit.edu/pub/v/2018/weua18a.pdf\r\nEinen \u00dcberblick gibt die Presseerkl\u00e4rung des KIT:\r\nhttps://www.kit.edu/kit/pi_2018_030_transparente-it-produktion-fur-digitale-souveranitat.php", "recording_license": "", "do_not_record": false, "persons": [{"id": 138, "name": "Arnd Weber", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 104, "guid": "5e49d4ef-b4db-51e3-a5b9-3bb59dea0594", "logo": null, "date": "2018-05-11T12:15:00+02:00", "start": "12:15", "duration": "00:30", "room": "HfG_Studio", "slug": "TPN3H9", "title": "tuwat:Bildung im Gespr\u00e4ch", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Die tuwat-Arbeitsgruppe \u201eBildung\u201c besch\u00e4ftigt sich mit der Pflege und Aufbereitung der Wissensvorr\u00e4te im CCC. Dies beinhaltet sowohl technisches Wissen als auch clubspezifisches Wissen \u00fcber das Selbstverst\u00e4ndnis des CCC und den Umgang miteinander.\r\n\r\nIn den ersten 15 Minuten wollen wir die beiden Pfeiler unserer Arbeit vorstellen: Wissenssammlungen, die Neuen den Zugang zu Erfas, Chaostreffs und dem Chaos \u00fcberhaupt erleichtern, auf der einen Seite und methodische und thematische Hilfestellungen, die Motivierten bei der Weitergabe von inhaltlichem Wissen unterst\u00fctzen k\u00f6nnen, auf der anderen Seite.\r\n\r\nIn den restlichen 15 Minuten m\u00f6chten wir uns mit den Anwesenden dar\u00fcber austauschen, wie die vorhandenen Ideen weiter ausgebaut werden und wie Interessierte sich beteiligen k\u00f6nnen.", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"id": 72, "name": "inderkuerze", "biography": "DECT6464\r\n@entropia aka Mimi", "answers": []}, {"id": 87, "name": "Bildung Workgroup", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 95, "guid": "41f8b9a3-6245-5cf4-9c36-abfa5ffbd666", "logo": null, "date": "2018-05-11T13:00:00+02:00", "start": "13:00", "duration": "01:00", "room": "HfG_Studio", "slug": "RVCXHF", "title": "HowTo: Moving Objects", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Reverse engineering Hoverbard hardware for fun.", "description": "In this talk you will learn how to flash your Hoverboard hardware with custom firmware to use it as an universal platform for all kinds of moving objects including armchairs, beverage crate, go karts...\r\n\r\nWe begin with details and reverse engineering of original hardware and software. You will learn about our own software we developed for this hardware and how to flash it to your board. A good amount of time will be about hands-on tips on how to build you moving objects, both mechanical and electrical advice.\r\n\r\nThere is also a workshop that you can join if you actually plan to build something.", "recording_license": "", "do_not_record": false, "persons": [{"id": 71, "name": "Niklas Fauth", "biography": "Otter", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 164, "guid": "0f7427d2-f0c5-5747-8966-79f0b2b679b5", "logo": null, "date": "2018-05-11T14:30:00+02:00", "start": "14:30", "duration": "00:30", "room": "HfG_Studio", "slug": "ENTHYN", "title": "Using and creating console oriented services (such as wttr.in, cheat.sh, rate.sx, etc)", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "The talk is devoted to console oriented services, like: wttr.in, cheat.sh, rate.sx.\r\nWhich popular console oriented services exist currently and how can they be used in everyday life;\r\nwhat advantages and disadvantages do they have; how services like that could be created.", "description": "## About the talk\r\n\r\nI've created several console oriented services,\r\nthat you are probaly aware of, if you are a vivid\r\nconsole user.\r\n\r\nIf you've never heard about them, you can try to do\r\nthe following in your terminal, just to get the first impression:\r\n\r\n```\r\n $ curl wttr.in/Karlsruhe\r\n $ curl rate.sx/btc\r\n $ curl cheat.sh/lua/:learn\r\n```\r\n\r\nAs we will see, in many cases services creaated using this approach\r\nhas many advantages comparing to browser-orineted services:\r\n* speed;\r\n* portability;\r\n* small footprint and ubiquituous of the client;\r\n* good possibility of integration;\r\n* consciosness;\r\n* anonimity;\r\n* etc.\r\n\r\n\r\nIn the talk I will demostrate several popular\r\nconsole oriented services, that I've created, and tell:\r\n* how such services could be created,\r\n* what tasks could be and should be solved by means of them;\r\n* what advantages (and disatvantages) do they have;\r\n* what changes in curl we are currently doing, to make such services\r\neven easier to use, and even more universal and pervasive.\r\n\r\n\r\nThe talk will be accompanied with many technical examples\r\nand useful practical tips and tricks such as:\r\n\r\n* how to make weather forecast using nothing else but curl;\r\n\r\n* how to bring any text from you console one your smartphone\r\n using nothing else but curl;\r\n\r\n* how to find an answer to (almost) any programming question\r\n not leaving your editor;\r\n\r\nand many other like that.\r\n\r\n\r\nI would be happy to share my ideas with you, discuss them\r\nand get some feedback from you during this discussion.\r\n\r\n## About me\r\n\r\nI'm a software developer, avid opensource user and enthusiast,\r\ncurrenty residing in Nuremberg and working fulltime in a team\r\ndeveloping a distributed relational database management system.\r\nConsole oriented services is my hobby.\r\n\r\n\r\nGithub:\r\n\r\n* https://github.com/chubin\r\n\r\nTwitter:\r\n\r\n * https://twitter.com/igor_chubin\r\n\r\nStackOverflow:\r\n\r\n* https://stackoverflow.com/users/1458569/", "recording_license": "", "do_not_record": false, "persons": [{"id": 137, "name": "Igor Chubin", "biography": "I'm a software developer, avid opensource user and enthusiast,\r\ncurrenty residing in Nuremberg and working fulltime in a team\r\ndeveloping a distributed relational database management system.\r\nConsole oriented services is my hobby.\r\n\r\n\r\nGithub:\r\n\r\n* https://github.com/chubin\r\n\r\nTwitter:\r\n\r\n * https://twitter.com/igor_chubin\r\n\r\nStackOverflow:\r\n\r\n* https://stackoverflow.com/users/1458569/", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 158, "guid": "114a970b-80a3-5f3e-ae08-043c01938921", "logo": null, "date": "2018-05-11T15:15:00+02:00", "start": "15:15", "duration": "00:30", "room": "HfG_Studio", "slug": "EBCZE3", "title": "Hackers in cyberwar", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "This speech is aimed to give a full context of the **role of hackers in cyberwar**, apart from the idea of cyberwar itself. \r\n\r\nThe influence of our data, internet censorship or massive surveillance are some of the main topics.", "description": "Cyberspace has been defined and predicted in many ways through the years. From the H.G.Wells' '_World Brain_' to William Gibson's '_consensual hallucination_', distributed technology and the internet has been a, inspiring communication revolution. \r\n\r\nThe influence of the ideas which grows on social networks as well as the huge personal information left by the users, makes the internet a target for governments and private companies. The** distributed, open and anonymous** nature of the internet is in danger due to **massive surveillance, censorship, security attacks and manipulation**. This is what some people calls cyberwar. In this war, in its front line, there's where the **hackers** are.\r\n\r\nIn the speech I'd like to approach to the cyberwar concept, internet censorship, massive surveillance and which is the role of the hackers in it, either in hacktivism and under governments orders.", "recording_license": "", "do_not_record": false, "persons": [{"id": 131, "name": "Paula", "biography": "I'm a 22 years old senior **computer engineering** student from Spain. I've also coursed investigative journalism at the University of Columbia, NY. I've worked as a systems analyst in Spain, robotics teacher in Switzerland and remote security auditor. \r\n\r\nIn 2016 I founded a digital rights and privacy awareness association in Spain called [Interferencias](interferencias.tech) with aprox 600 members. I [write articles](https://dev.to/terceranexus6/) about computer engineering, hardware and security, and I love open hardware and software.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 121, "guid": "0445cd62-3190-510b-9412-8864cf71098a", "logo": null, "date": "2018-05-11T16:00:00+02:00", "start": "16:00", "duration": "01:00", "room": "HfG_Studio", "slug": "J33XZF", "title": "Wie geht sprechen? Besserwissenswertes aus Computerlinguistik und Phonetik", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Die Sprachlaute der Welt.\r\nWarum verwechseln Chinesen \"L\" und \"R\"?\r\nWie kann es im Deutschen 15 Vokale geben, wenn es nur 5 Buchstaben daf\u00fcr gibt?\r\nWarum ist das Wort f\u00fcr \"Mama\" in vielen Sprachen \u00e4hnlich?\r\nWarum verwechselt man als H\u00f6rer am Telefon \"F\" uns \"S\"?\r\nEine bunte Mischung aus Linguistik, Wahrnehmungspsychologie, Anatomie.\r\nWarum k\u00f6nnen Babys gleichzeitig schlucken und atmen, Erwachsene aber nicht? (Ich wei\u00df, dass Du es gerade selbst ausprobierst!)", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 98, "name": "Caroline Clemens", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 23, "guid": "bc2263a7-7870-55d5-9458-63c8d51c2036", "logo": null, "date": "2018-05-11T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "HfG_Studio", "slug": "7WLFA3", "title": "Go f\u00fcr Programmierer", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Du kannst in irgendeiner Sprache programmieren, und bist an der Programmiersprache Go interessiert? Dieser Talk bringt dir die wichtigsten Konzepte n\u00e4her und macht dich startklar zum einsteigen!", "description": "Go ist eine statisch typisierte, speicher-sichere Programmiersprache, die extrem schnell kompiliert, auf vielen Plattformen l\u00e4uft und die neben einer n\u00fctzlichen Standardbibliothek auf eine gro\u00dfe Community mit vielen Paketen zur\u00fcckgreifen kann.\r\n\r\nKein Wunder, dass die Sprache in den letzten Jahren deutlich an Beliebtheit zugenommen hat (https://heise.de/-3889377).\r\n\r\nIn diesem Vortrag \u00fcberspringe ich gr\u00f6\u00dftenteils den schleppenden Syntax-Teil und konzentriere mich auf die Aspekte, die Go einzigartig machen: interfaces, goroutines und channels \u2014 gr\u00f6\u00dftenteils durch praktische Beispiele (live coding).\r\n\r\nWeiterhin gebe ich eine praktische Einf\u00fchrung in die Entwicklung mit Go. Welche Tools braucht man wirklich, und wie bedient man die m\u00e4chtigen Tools, die Go von Haus aus mitbringt.\r\n\r\nDas Resultat soll sein, dass du als Teilnehmer einen guten Eindruck davon hast, wie sich die Sprache anf\u00fchlt, und dich hinterher in der Lage f\u00fchlst, voll in Go einzusteigen.", "recording_license": "", "do_not_record": false, "persons": [{"id": 16, "name": "Michael Stapelberg", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 117, "guid": "682090d6-32cf-52cd-9c58-c49a9c732200", "logo": null, "date": "2018-05-11T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "HfG_Studio", "slug": "BZUSRT", "title": "Hacking relationships", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Liebe, Regeln, Sex, Menschen\r\n\r\n... oder was man in zwischenmenschlichen Beziehungen noch au\u00dfer Monogamie anstellen kann.", "description": "Polyamorie, offene Beziehung, Relationship Anarchy - Was ist das? Wie funktioniert das? Und warum sollten wir dar\u00fcber reden?\r\n\r\nWir geben einen \u00dcberblick \u00fcber das Thema und die Begriffe. Zudem geben wir unsere eigenen Erfahrungen wieder und erz\u00e4hlen was man unserer Meinung nach tun sollte und was man lieber bleiben l\u00e4sst.\r\n\r\nDer Vortrag ist was f\u00fcr dich wenn du nur neugierig bist, dich schon etwas mehr mit dem Thema besch\u00e4ftigt hast, du schon mit Polybeziehungen in Ber\u00fchrung gekommen bist oder ...", "recording_license": "", "do_not_record": true, "persons": [{"id": 94, "name": "Vera & Martin", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 89, "guid": "f738088c-f2cf-54ab-a6cd-f3f5c5cc8481", "logo": null, "date": "2018-05-11T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "HfG_Studio", "slug": "HERXRF", "title": "gr-iridium: Unter der Haube", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "gr-iridium ist freie Software welche Signale des Iridium-Satellitennetzwerks empfangen und demodulieren kann. Dieser Vortrag schaut unter die Haube von gr-iridium und zeigt wie es 1000 Frames pro Sekunde auf einem 8 Jahre alten quad-core Rechner demodulieren kann.", "description": "Iridium wurde Ende der 90er gestartet. Damals wurde es als sehr schwer angesehen seine Signale aufgrund der hohen Bandbreite und staendig aenderndem Doppelerversatz abzufangen. Mit dem Aufkommen von Software Defined Radio und schnelleren Rechnern ist dies jedoch nicht mehr der Fall.\r\n\r\nDieser Vortrag schaut genauer auf die Struktur von gr-iridium und zeigt wie GNURadio benutzt werden kann um sehr \"burstige\" und sich schnell aendernde Signale zu empfangen, etwas worin es traditionell nicht besonders gut ist. Er wird euch auch eine grundsaetzliche Einfuehrung in das Demodulieren von (Q)PSK Signalen geben.\r\n\r\nNicht behandelt werden die \"hoeheren\" Schichten von Iridium. Da koennt ihr euch die Vortrage vom 33C3 (https://media.ccc.de/v/32c3-7154-iridium_update) und der HOPE (https://www.youtube.com/watch?v=cvKaC4pNvck) anschauen.", "recording_license": "", "do_not_record": false, "persons": [{"id": 66, "name": "schneider", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 81, "guid": "0e0586a7-c3fe-5267-ab12-c2450b961bce", "logo": null, "date": "2018-05-11T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "HfG_Studio", "slug": "JKEB3C", "title": "Building security - Coding", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Building secure software applications. A pragmatic approach - and getting your peers motivated.", "description": "How to code secure software applications. Focus will be on coding practices - especially those that can be introduced into a team without much resistance. As \"designing software\", \"compiling software\" and \"testing software\" are in the same neighbourhood I will add some tips for those as well.\r\nDo not expect fancy ninja tricks. Focus is \"one size fits all\" and \"lots of bang for your buck\" things.\r\nCan contain:\r\n- Psychology\r\n- C programming best practice", "recording_license": "", "do_not_record": false, "persons": [{"id": 56, "name": "Thorsten Sick", "biography": "Several years of experience writing security software (anti malware) and doing crazy things prepared me for this talk :-)\r\n\r\nWitness me", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_Vortragssaal": [{"id": 36, "guid": "a8ff8e31-9253-57e4-bfed-a4220ea2db3c", "logo": null, "date": "2018-05-11T11:30:00+02:00", "start": "11:30", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "MRYYUK", "title": "Recht auf (k)ein Geschlecht", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Vorstellung der deutschlandweiten Aktion, die das Transsexuellengesetz \u00fcberarbeiten und die geschlechtliche Vielfalt in der Gesellschaft sichtbar machen soll, und was die Hackercommunity damit zu tun hat.", "description": "Im Talk wird einerseits gezeigt, wo es schon Bewegungen gab, andererseits, wie alle (nicht nur direkt Betroffene) helfen k\u00f6nnen. Themen werden unter anderem juristische Grundlagen, gesellschaftliche Situation und aktivistische Aufforderung sein.\r\nEventuell mit interaktivem Part. Wir wollen insbesondere auch darauf eingehen, was diese Gesetzes\u00e4nderung f\u00fcr die Datenbanken in Deutschland hei\u00dft, wenn die oft verpflichtende Angabe des Geschlechts nicht mehr in ein boolean passt.", "recording_license": "", "do_not_record": false, "persons": [{"id": 30, "name": "Nanouk", "biography": "Nichtbin\u00e4r transmaskuliner Kreativling mit vielen Verbindungen zum CCC, aber keine Ahnung von Computern. Lebt und arbeitet in Karlsruhe", "answers": []}, {"id": 99, "name": "RyLee", "biography": "# About\r\n\r\nRyLee H\u00fchne, ein Mensch mit nicht-bin\u00e4rer Geschlechtsidentit\u00e4t\r\n\r\nMitarbeit bei:\r\n\r\n* [Aktion Standesamt 2018](http://aktionstandesamt2018.de)\r\n\r\n* [AG Trans*emanzipatorische Hochschul-Politik](http://ag-trans-hopo.org/)\r\n\r\n* [bukof-Kommission f\u00fcr queere* Gleichstellungspolitik an Hochschulen](https://bukof.de/kommissionen-liste/queere-gleichstellungspolitik-an-hochschulen/)\r\n\r\n* [Netzwerk Gender und Diversity in der Lehre](http://netzwerk-gender-diversity-lehre.de/)\r\n\r\nWork:\r\n\r\n* [Fachhochschule S\u00fcdwestfalen, Fachbereich Informatik und Naturwissenschaften](http://www4.fh-swf.de/de/home/ueber_uns/standorte/is/fb_in/doz_in/profs_in/huehne/forschung_20/index.php#)", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 126, "guid": "d72cca24-92a0-50d6-8a89-52fcfaca062a", "logo": null, "date": "2018-05-11T13:00:00+02:00", "start": "13:00", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "SZMAYU", "title": "How the Internet has changed being Intersex", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "A brief journey through my experiences as an intersex person the past years, and the instrumental role that the internet has played hereby. Not just as a contact and information medium, but also as a lifeline with the real world.", "description": "Without the internet I likely would not be here today. Over the past decades my life has changed dramatically on a number of occasions, first by finding out about being intersex, then trying to find some way to deal with it.\r\n\r\nDuring this time, it was the internet which provided me not only with a way to learn about a medical condition which I had never even heard about, which provided me with options, which brought me into contact with others like me, and so much more.\r\n\r\nIt also allowed my voice to carry far and wide, throughout the world, enabling me to reach and educate others, changing lives forever. It got me into contact with a publisher for my autobiography (which I promise to finish one day, really), which - once published - could change the lives of millions.\r\n\r\nMaybe most important of all, thanks to the internet I was able to keep a window open towards a better tomorrow for myself. Despite everything, thanks to the internet I'm still here, still got a future and - most importantly - a life.", "recording_license": "", "do_not_record": false, "persons": [{"id": 104, "name": "Maya Posch", "biography": "Crazy geek girl with an unhealthy interest in science, technology. Raised by cats and computers.\r\n\r\nAlso has a personal website dedicated to her hobbies, easily found using any search engine.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 147, "guid": "85efb535-7d80-58b9-9695-fbaf103a4a6c", "logo": null, "date": "2018-05-11T14:30:00+02:00", "start": "14:30", "duration": "00:30", "room": "ZKM_Vortragssaal", "slug": "EVBQWQ", "title": "Key to Historical Object Juxtaposition", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Our project aims to automatically find inherent relationships between images of objects using existing datasets from the Indian collections of various museums. The application will predict tags for unlabelled images in the museum's collection as well as store them as objects with relationships so that they are searchable. Data from the Indian collections of the British Museum and the Harvard Museums has been used.", "description": "One of the major problems faced by the museums is that most of their data is not tagged and sorted and therefore not easily usable. One of the main goals of our project is to find relationships between unsorted data and existing labelled data and predict tags. This will make the data searchable. The relationships that we find between the data will also enable us to see the artefact in the context of similar pieces. E.g. art may be seen in a global context, or only in a local context, or based on similar colors, etc. depending on how we choose to search it.", "recording_license": "", "do_not_record": false, "persons": [{"id": 122, "name": "Ananya Satoskar; Maitreyi K.V.; Pranit Jaiswal; Mitra Thakker", "biography": "Winners of the Coding Culture Hackathon that took place 1st and 2nd February 2018 in Mumbai, India", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 92, "guid": "6b10f088-835c-580f-875b-f6e5c4cce985", "logo": null, "date": "2018-05-11T15:15:00+02:00", "start": "15:15", "duration": "00:30", "room": "ZKM_Vortragssaal", "slug": "FT9MEF", "title": "Frida - (Game)Hacking mit JavaScript", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Jeder kennt JavaScript. Aber wie viele wissen, dass sich mit JavaScript auch ganz gut Spiele oder Programme hacken lassen? Ich stelle das Frida Framework vor, welches genau das erm\u00f6glicht!", "description": "Frida ist ein Framework, welches es erlaubt JavaScript in Prozesse zu laden.\r\nEs wird daf\u00fcr der V8 JavaScript Interpreter in einen Prozess geladen, welcher diverse Features mitbringt.\r\nSpeichermanipulation, Hooks, Detours, alles ist m\u00f6glich!\r\n\r\nMehr zu dem Framework auf: https://frida.re/", "recording_license": "", "do_not_record": false, "persons": [{"id": 69, "name": "HappyWingman", "biography": "Ein Name ist nicht wichtig. Wichtig ist die Message.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 116, "guid": "47b7888b-3379-53e2-b2c8-6b004ae00550", "logo": null, "date": "2018-05-11T16:00:00+02:00", "start": "16:00", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "LVBUTJ", "title": "Open Source in High-Performance Networks", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Recent developments in networking such as the Open Compute Project, Software-Defined Networking, OpenFlow, and the P4 language enable the use of open source software with high-performance networking hardware. This talk investigates the state of openness in this hitherto very closed part of the IT industry.", "description": "Recent developments in networking such as the Open Compute Project, Software-Defined Networking, OpenFlow, and the P4 language enable the use of open source software with high-performance networking hardware. This talk investigates the state of openness in this hitherto very closed area of the IT industry.\r\n\r\nUntil a few years ago, getting any information on network switch or router hardware required an NDA. Getting the required SDK or drivers to write open source software for these devices was impossible, even buying switches with an open operating system was difficult if not impossible.\r\n\r\nThis changed with the introduction of the Open Compute Project and OpenFlow. The first introduced pressure on the switch ASIC vendors to open up, the latter provides an API for switch hardware, and comes with an open source ecosystem. As an exemplary result, Broadcom, an incumbent switch ASIC vendor, released open API information on their switch ASICs (SAI, OF-DPA, SDKLT), as well as driver blobs for open source operating systems.\r\nThis, in combination with bare-metal switches and a standardized OS installer, kicked off a wide array of Linux-based operating systems.\r\n\r\nIn this talk investigates the different aspects of networking hardware and their respective state of openness as well as opportunities for implementing new ideas and open source contributions. The goal of the talk is to spread the awareness of this topic and provide an architectural overview on the area.\r\n\r\nThis talk is based on my experiences during my work as a research assistant in the field of Software-Defined Networking and Networks Function Virtualization at Technische Universit\u00e4t Darmstadt.", "recording_license": "", "do_not_record": false, "persons": [{"id": 93, "name": "jgjl", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 105, "guid": "8afc16c2-d76a-53f6-85e4-90494665835d", "logo": null, "date": "2018-05-11T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "DBCWDF", "title": "tmux - Warum ein schwarzes Fenster am Bildschirm reicht", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "tmux erm\u00f6glicht es Euch, innerhalb eines Terminals mehrere Sitzungen parallel zu verwenden. Diese Session gibt eine (hoffentlich) einsteigerInnenfreundliche Einf\u00fchrung in das Tool.", "description": "Oft br\u00e4uchte es zu einem Server mehrere SSH-Sessions/Fenster offen bzw. sollen Anwendungen weiterlaufen, auch wenn die Verbindung zum Server abrei\u00dft. Oder es sollen mehrer Personen in einem Konsolenfenster gleichzeitig arbeiten k\u00f6nnen. -- Diese Anforderungen lassen sich \u00fcber einen \"Terminal Multiplexer\" wunderbar l\u00f6sen. \r\ntmux ist so ein \"Terminal-Multiplexer\", der es erm\u00f6glicht innerhalb eines Terminals (das \"scharze Fenster\") mehrere Sitzungen (\"sessions\") parallel zu erzuegen und zu verwenden. In dieser einsteigerInnenfreundlichen Einf\u00fchrung in tmux zeige ich Euch, warum ihr ohne tmux eigentlich nicht produktiv arbeiten k\u00f6nnt ;).", "recording_license": "", "do_not_record": false, "persons": [{"id": 81, "name": "leyrer", "biography": "Betreibt seit \u00fcber 20 Jahren fortgeschrittene IT-Magie. Mutig die Systeme administrierend, die sonst niemand anzugreifen wagt.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 98, "guid": "25047665-60e0-5bbb-bd15-d5937103dc24", "logo": null, "date": "2018-05-11T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "RNY8QT", "title": "One Brain, One Keyboard, One Editor", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "What do you use to write source code, docs, books or e-mails? Single brain, single pair of hands, single keyboard, but a different keyboard layout for each language and a different text editor for each purpose?", "description": "Do you use an IDE to work on source code, then switch to an e-mail client to write a message, then open a different editor to work on the documentation and finally ssh to a remote server to edit a configuration file? Do you switch languages frequently or are your colleagues named M\u00fcller, Fran\u00e7ois, Mu\u00f1oz or even \u0160ediv\u00fd?\r\n\r\nI'll show you how I am happily typing in several languages on a single standard US keyboard layout and why my CapsLock became so useful. I'll show you how I use a single editor on all my machines to produce all sorts of text, and why you too should master one real text editor, whether it is Emacs or Vim. And I'll show you how to hack all your texts using your favorite programming language far beyond imagination.", "recording_license": "", "do_not_record": false, "persons": [{"id": 73, "name": "Miro", "biography": "Not switching keyboard layouts, not switching text editors.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 138, "guid": "5fcbd225-fb13-57cd-97af-00be56e749b9", "logo": null, "date": "2018-05-11T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "WLYHXC", "title": "Kausalit\u00e4t, nichtlineare Systeme und ein Spiel", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "H\u00f6rt sich kompliziert an? Ist es nicht!\r\n\r\nImmer komplexere System zu schaffen bringt uns an die Grenzen unserer Vorstellungskraft. Immerzu wachsende und nur durch aufwendiges Refractoring in Griff zu bekommende Codeentropie leistet ihren Beitrag zum Problem. Hier geht es darum inhomogene nichtlineare Systeme, deren Vernetzung, deren Chancen und deren Anforderungen an das Denken kennenzulernen und zu diskutieren. Auch m\u00f6chte ich hier etwas \u00fcber die Natur von Information und Wirkung diskutieren und vielleicht auch erfolgreich eine m\u00f6glicherweise etwas ungewohnte Perspektive vermitteln.", "description": "Das Problem ist bekannt, umfangreiche Software wird trotz scheinbar einwandfreier Architektur schnell un\u00fcbersichtlich und schwer wartbar. Jetzt stellt euch vor, eine Software welche aufbauend auf einem klassischen Ausf\u00fchrungsmodell einmal eine ganze Stadt, eine SmartCity, betreiben soll... also mir stellt es da die Haare auf.\r\n\r\nJeder der schon einmal mit dem \"Actor Model\" gearbeitet hat, wird verstanden haben, dass, jenseits des gewohnten Ausf\u00fchrungsmodells, die, in der Anwendung v\u00f6llig neue, Welt der inhomogenen nichtlinearen Systeme existiert. Die Anforderungen inhomogene nichtlineare Systeme zu denken unterscheiden sich grundlegend von denen sequentielle, symmetrisch parallelisierte oder homogene nichtlineare Systeme zu denken.\r\n\r\nDiese Art von Software bietet neue Gestaltungsm\u00f6glichkeiten aus der Bottom-up Perspektive und sollte so den Aufbau umfangreicher und komplexer Systeme bei nahezu stufenloser Skalierbarkeit und bestm\u00f6glichem Loadbalancing erm\u00f6glichen. Ohne, das irgendwer alle Prozesse \u00fcberblicken mu\u00df.\r\n\r\nWelchen Platz nehmen wir Menschen in so etwas komplexem wie einer SmartCity ein? Als klassische Benutzer welche das System zu kontrollieren in der Lage sein m\u00fcssen wird das wohl nichts. Die Interaktion mit ganz typischen Maschinen sollte der Vergangenheit angeh\u00f6ren. Benutzen ist out, Teil davon sein ist in, schon heute.\r\n\r\nMit meinen zwei Projekten Causal und Flow habe ich begonnen ein solches Ausf\u00fchrungsmodell f\u00fcr diese \"neue\" Art von Software f\u00fcr die Programmiersprache D, sp\u00e4ter dann auch C++, zu implementieren. Die Vorstellung ist ein Netz der Wirkung als Weiterentwicklung des Netzes der Daten.", "recording_license": "", "do_not_record": false, "persons": [{"id": 114, "name": "Ralph Alexander Bariz", "biography": "Besch\u00e4ftige mich schon seit einigen Jahren privat mit nichtlinearen Systemen und habe diesen Ansatz auch bei mir ins Unternehmen getragen.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 125, "guid": "acc35999-4707-5ef9-a8af-f3b197f09704", "logo": null, "date": "2018-05-11T22:30:00+02:00", "start": "22:30", "duration": "00:30", "room": "ZKM_Vortragssaal", "slug": "FFCPRC", "title": "Ich komme aus einem anderen Land - Telematik in der Medizin", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Bis zum 1.1.2019 sollen 200.000 Arztpraxen, Krankenh\u00e4user und Apotheken an die Telematikstruktur angeschlossen werden. Die Denkkultur des Gesundheitswesens ist bis heute zu tiefst analog. Daran \u00e4ndern auch ein paar Computer in den Arztpraxen nichts. Die Einf\u00fchrung der Digitalisierung im Gesundheitswesen ist aber der formulierte politische Wille von nunmehr f\u00fcnf Regierungen. Das entstehende Spannungsfeld zwischen dem analogen Alltag der \u00e4rztlichen Sprechstunde und den digitalen Anspr\u00fcchen der Kontrollbeh\u00f6ren ist enorm. Ich bin Hausarzt. Vor der Bestellung der Komponenten zum Telematikanschluss habe ich recherchiert und Fragen gestellt. Am vorl\u00e4ufigen Ende dieses Prozesses bin ich hier auf dieser Veranstaltung gelandet. Ich m\u00f6chte Sie mitnehmen zu den H\u00f6hepunkten dieses CultureClashs.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 103, "name": "Stefan Streit", "biography": "Ich bin Hausarzt, in K\u00f6ln und Betroffener der Digitalisierungswelle des Gesundheitswesen.\r\nSchon l\u00e4nger besch\u00e4ftige ich mich mit Strukturfragen \"im System\". Seit 2017 ist die zweite, v\u00f6llig \u00fcberarbeitete Auflage der \"Prinzipien der Heilkunst\" verf\u00fcgbar, in dem es nicht um Heilkunst, sondern den Bezugsrahmen geht in dem Medizin stattfinden soll. Eine Leseprobe steht unter www.prinzipien-der-heilkunst.de im Netz. Ein kleines Kapitel \u00fcber die Digitalisierung gibt es darin auch. Auf Grund von seinerzeit fehlenden Fakten musste ich mich aber auf hypothetische Szenarien beschr\u00e4nken.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 171, "guid": "ea068ddc-aef6-5367-ba79-cd90ddbf8353", "logo": null, "date": "2018-05-11T23:15:00+02:00", "start": "23:15", "duration": "00:30", "room": "ZKM_Vortragssaal", "slug": "KW3XJ8", "title": "F.U.C.K. Germany - FLTI* und Computer Kram", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Angefangen mit der Heart of Code - einem feministischen Hackspace f\u00fcr Frauensternchen in Berlin - entstehen derzeit einige F.U.C.K. Initiativen in verschiedenen deutschen St\u00e4dten.", "description": "In diesem Vortrag wollen wir euch erz\u00e4hlen was wir tun, was uns antreibt und was uns verbindet. \r\nUnd wie ihr vielleicht auch bei euch um die Ecke eine F.U.C.K. Gruppe starten k\u00f6nnt.", "recording_license": "", "do_not_record": false, "persons": [{"id": 144, "name": "Leli", "biography": "Heart of Code", "answers": []}, {"id": 157, "name": "miriamino", "biography": "F.U.C.K. muc", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_OpenHUB": [{"id": 172, "guid": "dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca", "logo": null, "date": "2018-05-11T11:30:00+02:00", "start": "11:30", "duration": "00:30", "room": "ZKM_OpenHUB", "slug": "QKVB38", "title": "pluto - a not so smart smart watch", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Du wolltest schon immer mal eine Armbanduhr haben, die die Uhrzeit in bin\u00e4r anzeigen und Handyklingelt\u00f6ne abspielen kann, \u00fcber viele Alarme und Countdown-Timer verf\u00fcgt und ein Jahr auf einer Knopfzelle l\u00e4uft? Dann ist pluto die Armbanduhr f\u00fcr dich!", "description": "Du wolltest schon immer mal eine Armbanduhr haben, die die Uhrzeit in bin\u00e4r anzeigen und Handyklingelt\u00f6ne abspielen kann, \u00fcber viele Alarme und Countdown-Timer verf\u00fcgt, ein Jahr auf einer Knopfzelle l\u00e4uft, wasserdicht ist und genauer als 1ppm geht? Dann ist pluto die Armbanduhr f\u00fcr dich! Pluto basiert auf dem Geh\u00e4use und Display der Casio F-91W und ersetzt deren Elektronik durch was mit Mikrocontroller.\r\n\r\nIn dem Talk wird es um den Entwicklungsprozess von pluto und weitere Hintergr\u00fcnde zu dem Projekt gehen. \r\n\r\n[Projektseite auf github](https://github.com/carrotIndustries/pluto)", "recording_license": "", "do_not_record": false, "persons": [{"id": 112, "name": "Lukas K.", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 169, "guid": "a54ad163-540f-5d45-9359-16a5d76da4ae", "logo": null, "date": "2018-05-11T12:15:00+02:00", "start": "12:15", "duration": "00:30", "room": "ZKM_OpenHUB", "slug": "3EFDQW", "title": "Hacking a 15$ Quadcop for Adding a Computer Interface for Flight Control", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "In this talk I will present how I modified the remote control of a cheap 15$ quadcop in order to add a computer interface:\r\n* First, I developed a small hardware board for signal tapping from and signal injection into the quadcop's remote control.\r\n* Next, I connected an Arduino board and developed a small software written in the C programming language, that does real-time signal A/D conversion of incoming / outgoing flight control signals, time-stamping and low-level signal processing of incoming signal data, and buffering of incoming and outgoing signal data.\r\n* Third, I connected a Raspberry Pi 3 board to the Arduino board and developed a Java Application that retrieves flight control signal data from the Arduino with the possibility to record it to a file. Also, the application allows for replaying recorded data back to the Arduino for signal injection into the quadcop's remote control.\r\n* The next step would be to extend the Java application for either editing recorded flight control data or creating completely new flight control data from scratch.\r\n\r\nSchematics and software are available as open source licensed under GNU GPL v3, see here:\r\nhttps://github.com/soundpaint/QuadCopHack", "description": "For a detailed description, look here: https://github.com/soundpaint/QuadCopHack", "recording_license": "", "do_not_record": false, "persons": [{"id": 142, "name": "J\u00fcrgen Reuter", "biography": "Biography will be added later...", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 177, "guid": "541fb98f-16ee-5196-8518-26787321ab94", "logo": null, "date": "2018-05-11T13:00:00+02:00", "start": "13:00", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "LKYQYF", "title": "Gimmicks into Augmented reality", "subtitle": "", "track": null, "type": "Workshop", "language": "en", "abstract": "Participants will learn the how to make a augmented reality apps and have fun exploring the world around them using augmented reality\r\n\r\nYou will learn : \r\nHow to create a marker based Augmentation \r\nHow to interact with an objects in AR.\r\n\r\nSoftwares : Unity, vuforia.", "description": "Please download Unity before the Workshop (https://unity3d.com/de/get-unity/download) \r\nPlease create an account at the Vuforia website : https://developer.vuforia.com/home-page", "recording_license": "", "do_not_record": false, "persons": [{"id": 146, "name": "Yasha Jain", "biography": "I am an augmented and virtual reality developer and I have been developing games for a year.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 11, "guid": "3ff65726-0f21-56a6-893e-19a11bdacaf5", "logo": null, "date": "2018-05-11T14:30:00+02:00", "start": "14:30", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "D3NQEB", "title": "Vorlesungsaufzeichnung an der Uni - vollautomatisch", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Im letzten Wintersemester hat die WWU M\u00fcnster \u00fcber 17 H\u00f6rs\u00e4le verteilt knapp 500 Vorlesungen aufgezeichnet - fast vollst\u00e4ndig automatisiert. Wieso man diese Aufzeichnungen erstellen m\u00f6chte und wie man das ganze technisch und hochschulpolitisch umsetzen kann soll als \u00dcberblick und Anleitung dargestellt werden.", "description": "Geboren aus einer AStA-Initiative erstellt die WWU M\u00fcnster seit einigen Semestern mit Erlaubnis der Dozierenden Aufzeichnungen der Vorlesungen in Bild & Ton. Diese Aufzeichnungen werden von den Studierenden rege genutzt und stellen eine wertvolle Erweiterung des Lehrangebots dar. Der Nutzen reicht hier zum Beispiel von der Pr\u00fcfungsvorbereitung \u00fcber die Nachbereitung bei Krankheitsvers\u00e4umnisen oder zur Entsch\u00e4rfung von terminlichen \u00dcberschneidungen - sowohl durch Gegenveranstaltung oder Arbeitszeiten.\r\n\r\nUm dieses Angebot m\u00f6glichst fl\u00e4chendeckend bereitstellen zu k\u00f6nnen haben wir freie, quelloffene Software wie Opencast und pyCA eingesetzt und zus\u00e4tzliche technische L\u00f6sungen selbst entwickelt. Das Ergebnis ist die Ausstattung von 21 und mehr H\u00f6rs\u00e4len mit vollautomatisierter Aufzeichnungstechnik in hoher Qualit\u00e4t, eine nahtlose Einbindung in bestehende digitale Lernplattformen und das Potenzial f\u00fcr viele neue didaktische Angebote.\r\n\r\nDiese Technik m\u00f6chte ich vorstellen, Anpassungsm\u00f6glichkeiten f\u00fcr andere \u00d6rtlichkeiten aufzeigen und berichten wie Dozierende und Studierende auf das Angebot reagieren.", "recording_license": "", "do_not_record": false, "persons": [{"id": 7, "name": "Jan Koppe", "biography": "Informatik-Mensch und Tontechniker aus M\u00fcnster.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 87, "guid": "8743b645-2a12-55d4-a09e-56585dfdcaa5", "logo": null, "date": "2018-05-11T16:00:00+02:00", "start": "16:00", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "TCHM9C", "title": "Language Without Code: The Extremes of Nonprogrammable and Conceptual Programming Languages", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Why would someone create a programming language that can't be programmed in and, if it can't be programmed in, is it a programming language?", "description": "Why would someone create a programming language that can't be programmed in and, if it can't be programmed in, is it a programming language? Esolangs (esoteric programming languages) have long challenged the norms of programming practice and computing culture. Most esolangs are experiential works; we understand the languages by writing code in them. Through this action, the logic of the language becomes clear. However, a smaller subset of esolangs make their point not through actively writing code, but instead by simply contemplating their rules. We can think of these as conceptual rather than experiential. The most extreme are designed in such a way that they don\u2019t allow any code to be written for them at all. By stepping away from usability, the conceptual esolangs offer the most direct challenge to the definition of programming language, a term which is surprisingly unspecific, and usually understood through utility, despite the fact that programming languages predate digital computers. This paper delves into the conceptual esolangs and looks at their challenge to the terms computer, code, and language.\r\n\r\nThis talk is an expanded version of the paper published with CITARJ available here: http://artes.ucp.pt/citarj/article/view/432", "recording_license": "", "do_not_record": false, "persons": [{"id": 62, "name": "Daniel Temkin", "biography": "Daniel Temkin makes images, programming languages, and interactive pieces that use the machine as a place of confrontation between logic and human thought. His blog esoteric.codes, 2014 recipient of the ArtsWriters.org grant, considers programming languages as an art medium. He has published in journals such as Leonardo and World Picture Journal and has presented at conferences including SXSW, GLI.TC/H, SIGGRAPH, and Notacon.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 17, "guid": "49508056-f5f5-51b5-80d0-01bb0bdba841", "logo": null, "date": "2018-05-11T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "CQBE3J", "title": "automated number plate readers", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "I have attacked the automated number plates reader system at my work. \r\n\r\nhttps://www.youtube.com/watch?v=MEwBLqKwR04\r\n\r\nThe feedback encouraged me to have a deeper look into this system. I give details in this talk.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 15, "name": "mc.fly", "biography": "old german expat living in the netherlands. Thinks about computers, privacy and security since 1993. I also like trains. :-)", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 133, "guid": "23ed494d-8af0-5be9-8230-7f8ba69f1a5e", "logo": null, "date": "2018-05-11T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "KSB8Q8", "title": "Backstage of the Web: Analysis of IoT Firmwares to Find Web 0-Days", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "In new era of web we are facing different things almost everyday. With this IoT hype web application security gained more respect. Because, almost every IoT device has a web panel. There are 2 options while analyzing IoT devices from perspectives of web app security. First one is classical blackbox web app pentesting. Researcher browse web panel and poke around to find some bugs. Very common one. The second one is extracting source code from firmware. Firmware topic is a huge area. It includes lots of techniques etc. But, for web section; researcher simply extract filesystem from firmware and start analyzing web application's source code to find bugs. While analyzing for bugs inside of this firmware sea researcher will gain him/herself lots of knowledge about firmware, IoT, filesystems and source code analysis ( also reverse engineering ).", "description": "Outline:\r\n\r\nOutline will be step by step.\r\n\r\n\r\n1 - Intro: Speaker will introduce him/herself.\r\n\r\n2- What is IoT? How if effect our life ?\r\n\r\n3- How web applications implemented IoT ?\r\n\r\n4- How IoT bring appsec a new attack surface\r\n\r\n5- Various ways to dump firmwares and get source code\r\n\r\n6- A peek to cgi, php, java and key concepts like api etc.\r\n\r\n7- How to analysis dumped firmware to find web application vulnerabilities\r\n\r\n8- Closing talk. ( Thanks etc. )", "recording_license": "", "do_not_record": true, "persons": [{"id": 110, "name": "Murat", "biography": "-", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 108, "guid": "7a160036-9a93-541d-8cef-a5a663dd03f2", "logo": null, "date": "2018-05-11T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "BXPGQC", "title": "Hold Steering Wheel! Autopilots and Autonomous Driving.", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Hold Steering Wheel! Differences in Automation Between Aircraft and Road Vehicles\r\n\r\nFor decades, airliners and also small aircraft have been flying large portions of their flight, including landing, on autopilot. So why is it so hard to get autonomous driving \"on the road\"? I will briefly talk about aviation and aviation safety, the role of automation in commercial aviation, its benefits, but also its pitfalls and dangers, and compare it to technology in road cars, from simple driver-assist functions up to full Level-5 autonomy (door-to-door without any human intervention or supervision). There are things that are fundamentally different between flying an aircraft and driving a car, most notably the environment, but also levels of training and proficiency, maintenance as well as questions of ethics and liability.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 82, "name": "Bernd Sieker", "biography": "I have studied computer science and have a PhD in engineering (Dr.-Ing.) from the University of Bielefeld. I have always been interested in aviation and computers, and somewhat more recently, in system safety. I have been giving university lectures on computer networks and system safety and security and have done research on safety of autonomous systems, on requirements engineering, software safety and on terminology of safety and security. I have been working on causal analyses of aviation and other transport accidents of microlight aircraft, wide-body airliners and cruise ships for a small engineering consultancy company. I am currently working as the safety manager for a supplier of air traffic management ground systems and hold a private pilot's licence.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 123, "guid": "379ee1b1-ef9a-5572-8e9d-4c9d365278b4", "logo": null, "date": "2018-05-11T22:30:00+02:00", "start": "22:30", "duration": "00:30", "room": "ZKM_OpenHUB", "slug": "YETLV7", "title": "\"Nicht mitten auf der Stra\u00dfe!\" oder was bringt die OSM f\u00fcr uns Fu\u00dfg\u00e4nger?", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Die OpenStreetMap (OSM) beinhaltet das wahrscheinlich weltgr\u00f6\u00dfte digitale Wegenetz f\u00fcr Fu\u00dfg\u00e4nger, doch wie k\u00f6nnen wir sie bei der Wegfindung f\u00fcr Fu\u00dfg\u00e4nger sinnvoll nutzen? Im diesem Vortrag geht es um sichere Wege, Optimierungsverfahren, neue netztopologische Algorithmen und Hinweise f\u00fcr das Mapping in der OSM aus einem Forschungsprojekt f\u00fcr urbane Mobilit\u00e4t f\u00fcr Menschen mit Sehbehinderung.", "description": "Als Fu\u00dfg\u00e4nger kann man die pers\u00f6nliche \u00dcberlebensquote au\u00dferordentlich steigern, wenn man sich haupts\u00e4chlich auf R\u00e4ndern von Stra\u00dfen aufh\u00e4lt - besonders wenn diese auch von Autos bev\u00f6lkert werden. Idealerweise sollte man B\u00fcrgersteige oder dedizierte Fu\u00dfwege nutzen und die G\u00e4nge danach planen. Doch selbst in der der OpenStreetMap (OSM), mit dem wahrscheinlich gr\u00f6\u00dften digitalen Wegennetz f\u00fcr Fu\u00dfg\u00e4nger, hat weltweit nur ein verschwindender Bruchteil der Stra\u00dfen Informationen dazu, ob hier seitliche Gehwege existieren oder nicht.\r\n\r\nF\u00fcr die schw\u00e4chsten Teilnehmer am Stra\u00dfenverkehr wie beispielsweise Fu\u00dfg\u00e4nger, Rollstuhlfahrer, Kinder und Blinde macht es einen riesigen Unterschied, ob man einer Stra\u00dfe auf einer Seite folgt, oder ob man diese \u00fcberquert. Eine Routenplanung muss daher die Seitenorientierung auf einer Stra\u00dfe zur Detektion von \u00dcberquerungen bei einer sehr unterschiedlichen Datenqualit\u00e4t sinnvoll ber\u00fccksichtigen.\r\n\r\nIm Rahmen des Forschungsprojekts TERRAIN wurde eine neue transparente und inkrementelle Transformation der Netztopologie entwickelt, die auf aktuellen OSM-Daten ein seiten-orientiertes Routing erm\u00f6glicht. Damit k\u00f6nnen Routen nach verschiedenen Anforderungen der Nutzungsklassen derart robust optimiert werden, so dass fehlende Daten in der OSM toleriert werden.\r\n\r\nIn der Evaluation ergeben sich verschiedene Herausforderungen in der Interpretation der OSM-Daten, die durch Hinweise f\u00fcr OSM-Mapper in Zukunft vermieden werden k\u00f6nnen.", "recording_license": "", "do_not_record": false, "persons": [{"id": 25, "name": "Sebastian", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 42, "guid": "a3bda554-eb73-5a33-a14c-6303f83cc451", "logo": null, "date": "2018-05-11T23:15:00+02:00", "start": "23:15", "duration": "00:30", "room": "ZKM_OpenHUB", "slug": "U7WFCW", "title": "Disintegrating Rockets - Softwarefehler in der Raumfahrt (und wie wir versuchen sie zu vermeiden)", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Wir alle \"hacken\" gerne irgendwas zusammen. Oft reicht das auch, manchmal aber halt auch nicht. Anhand von bekannten Beispielen aus der Raumfahrt m\u00f6chte ich euch zeigen welche Folgen Nachl\u00e4\u00dfigkeiten im Bereich Software Engineering haben k\u00f6nnen.", "description": "\"In der Vergangenheit wussten wir es nicht besser\" - \"Es ist immernoch RocketScience\" - \"Irren ist menschlich\" - Alles Gr\u00fcnde warum selbst bei den Profis von NASA, ESA, DLR und co mal was schief geht bei der Softwareentwicklung. \r\n\r\nEin indirekter Appell an das strukturierte und saubere Arbeiten. Nicht immer ganz ernst zu nehmen und definitv \u00fcberspitzt.", "recording_license": "", "do_not_record": false, "persons": [{"id": 33, "name": "Carina Haupt", "biography": "Mein Ziel ist es die Qualit\u00e4t der Softwareentwicklung in der Forschung zu verbessern. Daran forsche und arbeite ich jeden Tag. Egal ob im Bereich Software Engineering, Open Source oder Knowledgemanagement.", "answers": []}], "links": [], "attachments": [], "answers": []}], "HfG_Workshoproom": [{"id": 148, "guid": "ffbfac84-c842-5f08-bef9-e78d3359021f", "logo": null, "date": "2018-05-11T11:30:00+02:00", "start": "11:30", "duration": "02:00", "room": "HfG_Workshoproom", "slug": "R9ZKW9", "title": "Persistance of Vision", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Baue als Hardware-Projekt eine phosphorizierende Anzeige.", "description": "LEDs schreiben auf eine rotierende Leuchtfolie beliebigen Text und Graphik. Vertikale Aufl\u00f6sung 8 Bit. \r\n\r\nDer Workshop l\u00e4uft im Rahmen eines EU-Projektes. Deshalb werden alle Bauteile gestellt, der Workshop ist kostenlos. Aber Voranmeldung ist n\u00f6tig (an bildung@fablab-karlsruhe.de) und wir brauchen Leute ab 18 Jahren. Teilnehmerzahl begrenzt", "recording_license": "", "do_not_record": false, "persons": [{"id": 124, "name": "Fablab Karlsruhe", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 94, "guid": "b949b9b8-07bb-56e9-b293-7ec89987ece5", "logo": null, "date": "2018-05-11T15:00:00+02:00", "start": "15:00", "duration": "02:00", "room": "HfG_Workshoproom", "slug": "DMSPLD", "title": "HowTo: Moving Objects (workshop)", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Workshop zum Talk: Hoverboard Hacking: HowTo Moving objects.", "description": "In diesem Vortrag lernt ihr, selber Hoverboard Mainboards umzuflashen, um sie unter Matekisten, Bobby Cars, Sessel oder sonst was zu schrauben. Am Ende habt ihr zwei Motoren mit je 500W, die ca. 30km/h erreichen und sich mittels Joystick steuern lassen.\r\n\r\nGestellt werden f\u00fcr bis zu 20 Teilnehmer je zwei Motoren, Mainboard, Akku und Programmierger\u00e4t.\r\nDie Kosten betragen 100\u20ac. Weitere Interessenten k\u00f6nnen nat\u00fcrlich gerne zuschauen, oder mit einem selbst mitgebrachten, funktionierenden Hoverboard aktiv teilnehmen.\r\n\r\nL\u00f6tkenntnisse sind hilfreich, aber nicht erforderlich. Wenn ihr etwas anderes als einen analogen Joystick zum Steuern wollt, bringt euren Arduino oder PPM Empf\u00e4nger mit. Bitte Laptops mitbringen! (bevorzugt Linux)", "recording_license": "", "do_not_record": false, "persons": [{"id": 71, "name": "Niklas Fauth", "biography": "Otter", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 137, "guid": "ef14bdc3-3c14-5194-8dae-8d8c47640604", "logo": null, "date": "2018-05-11T17:30:00+02:00", "start": "17:30", "duration": "03:00", "room": "HfG_Workshoproom", "slug": "BJJA8B", "title": "How to ... conflict", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "In diesem Workshop soll es um eine Einf\u00fchrung in Theorie und Praxis von Konflikten (und ihrer Moderation bzw. den Umgang mit selbigen) gehen.", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"id": 113, "name": "Caroline", "biography": "Systemische Beraterin & Mediatorin", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 14, "guid": "6db53527-be18-5da1-8594-300582cf88f6", "logo": null, "date": "2018-05-11T21:00:00+02:00", "start": "21:00", "duration": "02:00", "room": "HfG_Workshoproom", "slug": "JRF7LV", "title": "Beziehungsnormativit\u00e4t hacken - Workshop zum Thema Polyamorie", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Austausch und Workshop zum Thema alternative Beziehungsformen und Polyamorie f\u00fcr Anf\u00e4nger und Fortgeschrittene.", "description": "Wie genau und was genau, wird noch erg\u00e4nzt.", "recording_license": "", "do_not_record": true, "persons": [{"id": 92, "name": "Karlsruher Polyamory Gruppe", "biography": "https://kapoly.wordpress.com/", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_CodeHUB": [{"id": 145, "guid": "b7f9f6ce-311c-5148-9c53-b2d1efb43941", "logo": null, "date": "2018-05-11T11:30:00+02:00", "start": "11:30", "duration": "01:00", "room": "ZKM_CodeHUB", "slug": "7MT3HN", "title": "Generative Kunst mit paper.js", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Der Workshop zeigt in einem kleinen Inputvortrag m\u00f6gliche Vorgehensweisen zur Erstellung generativer Kunst. Im Praxisteil nutzen wir paper.js um unsere ersten eigenen kleinen Kunstwerke zu erschaffen.", "description": "Grober geplanter Ablauf:\r\n- Kurzer Inputvortrag zu generativer Kunst generell (Entstehung, Beispiele, Communities)\r\n- Vorstellung m\u00f6glicher Herangehensweisen und Ideenfindungen\r\n- Einf\u00fchung in paper.js\r\n\r\n- Teilnehmer entwickeln eigene erste Idee\r\n- Ich helfe bei der Umsetzung und gebe ein paar Tipps", "recording_license": "", "do_not_record": false, "persons": [{"id": 121, "name": "bleeptrack", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 128, "guid": "d68a254d-52ce-5b0a-9c54-f6c394c16a5b", "logo": null, "date": "2018-05-11T14:30:00+02:00", "start": "14:30", "duration": "01:00", "room": "ZKM_CodeHUB", "slug": "ABVWU9", "title": "Git from the inside", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "\u201cDetached head\u201d und \"Non-fast-forward push denied\" - (Fehler)meldungen bei Git sind nicht immer leicht zu durchschauen und provozieren allzuoft Cargo Cult Handlungen (=> https://xkcd.com/1597/). Git hat sich zwar seit vielen Jahren einen Rang als Platzhirsch unter den Versionskontrollsystemen erarbeitet, um git aber effektiv und effizient nutzen zu k\u00f6nnen ist es wichtig zu verstehen, wie git \u201ctickt\u201d. Der Vortrag f\u00fchrt interaktiv am Whiteboard vom Fragezeichen zum Aha-Erlebnis. Vorkenntnisse in git sind nicht erforderlich. Statt Slides gibt es aktives Nachfragen.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 105, "name": "Jens", "biography": "Jens Neuhalfen lives and breathes IT since 20 years. He is convinced that the interface between IT and non-IT is _the_ most important lever to run a successful business for IT-centric ventures.\r\n\r\nFurther he is convinced that sensible IT security not only saves money but opens new business opportunities.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 119, "guid": "3f01991a-bd72-5133-a515-07cd9f6b3318", "logo": null, "date": "2018-05-11T16:00:00+02:00", "start": "16:00", "duration": "01:00", "room": "ZKM_CodeHUB", "slug": "8389M7", "title": "CCCamp 2019 Badge Ideen und Konzepte", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Das n\u00e4chste Camp steht an und nach dem rad1o Badge von 2015 wollen wir was neues machen.\r\nVorstellen erster Ideen und die Einladung zum mitentwickeln und Diskutieren.\r\nZur Zeit klopfen wir ein paar Hersteller ab, um Interessanten Bauteile gesponsert zu bekommen, auch erste Ideen nach Anwendungen oder auch die Integration ins Camp 2019.\r\n\r\nGenau so sind wir gespannt auf die Ideen von Euch", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 97, "name": "RFguy", "biography": "Mitentwickler des rad1o badges vom camp 2105, Mitglied im muCCC und auf jeder gr\u00f6\u00dferen Chaos Veranstaltung zu finden.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 173, "guid": "f0a76343-03b4-55bb-91a2-1783c7f256ae", "logo": null, "date": "2018-05-11T17:30:00+02:00", "start": "17:30", "duration": "03:00", "room": "ZKM_CodeHUB", "slug": "TTUNAJ", "title": "MicroOrchestra: Electroacoustic Laptop Performance using Pure Data", "subtitle": "", "track": null, "type": "Workshop", "language": "en", "abstract": "An intro to interactive audio using the graphical open source computer music platform, Pure Data. We'll cover some digital audio & musicianship basics and make some beeps, bonks, and various noises along the way. Bring a laptop, a mic, headphones, and things which make interesting sounds.", "description": "http://class.danomatika.com/workhops/micro-orchestra (I'll put up a page here, see this for past reference)\r\n\r\nNote: Pure Data runs on all three desktop platforms. All hackers are welcome. :)", "recording_license": "", "do_not_record": false, "persons": [{"id": 145, "name": "Dan Wilcox", "biography": "Dan Wilcox (Artist Engineer Musician Performer) danomatika.com\r\n\r\nDan Wilcox works at ZKM!", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 161, "guid": "ae354da6-fc87-56f5-8d4a-9a1c2f9c5a74", "logo": null, "date": "2018-05-11T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "ZKM_CodeHUB", "slug": "MW7WH8", "title": "Build your own Twitter bot!", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Einen Twitterbot bauen? Das ist gar nicht so schwierig wie ihr denkt! Ich m\u00f6chte euch in diesem Workshop in die Lage versetzen, eure eigenen, einfachen Bots auf der Grundlage generativer Grammatiken zu erstellen.", "description": "Der Workshop beginnt mit einer Einf\u00fchrung in [Tracery](http://tracery.io), ein einfaches Tool zum Schreiben generativer Grammatiken, gefolgt von einem kurzen Brainstorming. Danach habt ihr dann viel Zeit, eure eigenen Bots zu schreiben. Wir werden die Plattform [Cheap Bots, Done Quick](https://cheapbotsdonequick.com) zum Hosten verwenden.\r\n\r\nDie resultierenden Bots k\u00f6nnen dann zum Beispiel so aussehen: https://twitter.com/small_recipes", "recording_license": "", "do_not_record": false, "persons": [{"id": 134, "name": "blinry", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_AckerSpace": [{"id": 152, "guid": "f811d862-9152-5ba9-aca8-8379a7e92822", "logo": null, "date": "2018-05-11T11:30:00+02:00", "start": "11:30", "duration": "02:00", "room": "ZKM_AckerSpace", "slug": "HWDCTU", "title": "Podcasting Workshop - Fragen und Antwort, Live-Produktion", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Alle Besucher, die sich f\u00fcr Podcasts interessieren, sind eingeladen zu fragen, was sie noch nie zu fragen wagten. Podcaster sind mehrere anwesend. Verantwortlich: @ajuvo (DECT 3370). \r\n\r\nEventuell gibt es im Anschluss einen oder mehrere Livepodcasts.", "description": "Alle Besucher, die sich f\u00fcr Podcasts interessieren, sind eingeladen zu fragen, was sie noch nie zu fragen wagten. Podcaster sind mehrere anwesend. Verantwortlich: @ajuvo (DECT 3370). \r\n\r\nEventuell gibt es im Anschluss einen oder mehrere Livepodcasts.", "recording_license": "", "do_not_record": false, "persons": [{"id": 58, "name": "ajuvo", "biography": "https://www.damals-tm-podcast.de\r\nhttps://ajuvo.crew.c-base.org\r\nhttps://c-base.org", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 112, "guid": "78752d0e-d69e-5a5a-954f-9f24a0f7c802", "logo": null, "date": "2018-05-11T14:30:00+02:00", "start": "14:30", "duration": "01:00", "room": "ZKM_AckerSpace", "slug": "8RCNCQ", "title": "Mitgliederverwaltung mit byro", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Die pluginbasierte Mitgliederverwaltung mit [byro](https://github.com/byro/byro) geht weiter. Beim Workshop wird gezeigt, wo byro steht, was es kann, und wie es weitergehen k\u00f6nnte. Es werden Interessierte gesucht und der Termin f\u00fcrs n\u00e4chste Geekend festgelegt.", "description": "byro ist eine pluginbasierte quelloffene Mitgliederverwaltungssoftware f\u00fcr Vereine. Nachdem wir \u00fcbers letzte Jahr gemeinsam das Datenmodell besprochen haben, ist byro weit gekommen und wird mittlerweile im shackspace eingesetzt. byro *kann* auch in anderen Vereinen eingesetzt werden; um zu gucken, was daf\u00fcr noch fehlt, suchen wir nach Interessierten und werden auch den Termin f\u00fcr das n\u00e4chste Geekend festlegen. \r\n\r\nAuf dem Geekend werden gemeinsam weitere Plugins (wie byro-mailman, das es schon gibt, byro-schleuder, das noch kommt, etc) entwickelt. Interessierte gern gesehen!", "recording_license": "", "do_not_record": false, "persons": [{"id": 64, "name": "rixx", "biography": "Einer der beiden chaos.social-Admins, Entwickler von byro und pretalx.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 109, "guid": "fa717310-68b4-5b49-ac74-9d0fc86821e0", "logo": null, "date": "2018-05-11T16:00:00+02:00", "start": "16:00", "duration": "01:00", "room": "ZKM_AckerSpace", "slug": "AQGAXA", "title": "The Death of Localhost - Hands-on Cloud Development with node.js, PHP, python or your favorite language..", "subtitle": "", "track": null, "type": "Workshop", "language": "en", "abstract": "In this workshop, you will get to know what cloud development is and how to use a cloud development platform to program directly in the cloud to build highly scalable micro-service systems.", "description": "## Imagine you could program node.js, python or even Brainfuck without installing it.\r\nCloud development lets you either work with a browser-based IDE or transfers your source code in real-time to the cloud. By moving your dev runtime from localhost to the cloud, you can get started within seconds and always have an online prototype.\r\n\r\n## What's the roadmap?\r\nIn this workshop, you will get to know what cloud development is and how to use a cloud development platform to program directly in the cloud to build highly scalable micro service systems. You will be able to use your favorite programming language to build a small cloud-based system. You will get free cloud resources during the workshop and you can keep using them even after the GPN.\r\n\r\n## Do I need to use a browser-based IDE? What about VIM?\r\nDon't worry, you will be able to use your favorite editor, even VIM works like a charm.", "recording_license": "", "do_not_record": false, "persons": [{"id": 86, "name": "Lukas Gentele", "biography": "Lukas is founder of the covexo GmbH, a Mannheim-based tech startup. He is building highly scalable web systems for about 10 years and was the owner of a web development company before founding covexo. \r\n\r\nCurrent tech stack: Metal-as-a-Service, CephFS, Kubernetes, Docker, JavaScript (node.js), React, GraphQL, ...", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 113, "guid": "7287fce3-4833-5608-ba4c-92544e34847a", "logo": null, "date": "2018-05-11T17:30:00+02:00", "start": "17:30", "duration": "03:00", "room": "ZKM_AckerSpace", "slug": "YP9RCE", "title": "Crypto f\u00fcr CTFs", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Eine hands-on Einf\u00fchrung in destruktive Kryptographie aus dem CTF-Umfeld. Wir betrachten im Rahmen der Veranstaltung mehrheitlich eigentlich solide kryptographische Werkzeuge, die \"leider\" falsch eingesetzt wurden und entsprechend nicht die erhoffte Sicherheit liefern.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 89, "name": "Christoph Egger", "biography": "[Akademischer Kryptograph](https://www.chaac.tf.fau.eu/person/christoph-egger/), [Debian Mensch](http://people.debian.org/~christoph), [FAUST Mitgr\u00fcnder](https://faust.ninja)", "answers": []}, {"id": 90, "name": "Dominik Paulus", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 124, "guid": "8c442533-b1e7-5bc9-87e7-efa6d97e22ff", "logo": null, "date": "2018-05-11T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "ZKM_AckerSpace", "slug": "BR3EEB", "title": "Editieren unter Unix mit ed(1)", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "", "description": "\"Lern vi haben sie gesagt\". \"Der ist \u00fcberall installiert, haben sie gesagt\".\r\n\r\nUnd dann landet ihr auf einem minimalen Rescue-System[TM] eines Hosters, nutzt eine sparsame Linux-Distribution oder arbeitet mit einem klassischen Unix nur um dann festzustellen das kein vi installiert ist. Es gibt genug Situationen in denen nur \"der einzig wahre Unix-Editor\" (Ken Thomson) verf\u00fcgbar ist. Ziel des Workshops ist es, euch ed(1) n\u00e4her zu bringen, die Angst vor der Benutzung zu nehmen und euch die Grundlagen zu zeigen um schnell und einfach Dateien editieren zu k\u00f6nnen.\r\n\r\nMeinst du das ernst? Na klar. Bist du wahnsinnig? Vielleicht ein bisschen :)\r\n\r\nBitte einen Laptop mitbringen. ed ist auf allen Linuxen und BSDen vorinstalliert, ein SSH auf einen Remote-Server geht nat\u00fcrlich auch.\r\n\r\nWorkshop can be held in English on demand!", "recording_license": "", "do_not_record": false, "persons": [{"id": 102, "name": "xhr", "biography": "DragonFly BSD committer \u25cf OpenBSD user \u25cf Security dude \u25cf CCC \u25cf `https://mastodon.social/@_xhr_` \u25cf `https://twitter.com/_xhr_`", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 135, "guid": "9445bab3-3ac0-56a9-8e2f-76f7b91f084c", "logo": null, "date": "2018-05-11T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "ZKM_AckerSpace", "slug": "HZWN7A", "title": "Chaos West 35c3 Planungsworkshop", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Wir Planen unsere Chaos West Assembly f\u00fcr den 35c3", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"id": 111, "name": "Sandzwerg", "biography": "Organisiert Dinge bei Chaos West", "answers": []}, {"id": 116, "name": "nanooq", "biography": "Chaos West, Hackspace Siegen, Nasebohren", "answers": []}], "links": [], "attachments": [], "answers": []}], "Anderswo": [{"id": 180, "guid": "a65aba06-69a3-5515-9606-25766906cf38", "logo": null, "date": "2018-05-11T15:00:00+02:00", "start": "15:00", "duration": "05:00", "room": "Anderswo", "slug": "79DQBB", "title": "GPN18 Munch: Meetup of kink-minded people during GPN18", "subtitle": "", "track": null, "type": "Workshop", "language": "en", "abstract": "We'll be having a munch of CCC folks, meeting for socializing, food and drinks at the Oxford Pub between Entropia and KIT. \r\n\r\nFor those who want to travel together we meet at 14:25 in front of ZKM.", "description": "Afterwards, around 18:00, some of us are going to [Baumwollseil](https://www.baumwollseil.de/).\r\n\r\nShamelessly copied from [Whipped Cream Zurich](https://sites.google.com/view/whippedcreamzurich/) :\r\n\r\n**About**\r\n\r\n[Munches](https://en.wikipedia.org/wiki/Munch_(BDSM)) are social gatherings for folks interested in BDSM or fetish activities. They take place in public places, like bars and restaurants. No sexual activity or BDSM play happens there: the goal is only to meet, chat, and share drinks with like-minded people. Conversation topics may be kinky or not, depending on the comfort level and mood of participants.\r\n\r\nSince these events happen in public places, we ask participants to be considerate of the other guests. In particular, you should keep your conversations at a reasonable volume, and make sure that the people you talk dirty to are with us.\r\n\r\n**Rules**\r\n\r\nBe nice. Disseminate love! \u2665\r\n\r\nNo hurtful comments. We want people of every sexuality, origin, gender identity, body shape, etc., to feel comfortable, so treat everyone with respect. Ask and use people\u2019s preferred pronouns. The line is drawn not at whether something is \"objectively\" wrong or evil, but whether it's hurting somebody. Everyone makes mistakes \u2014 please take yours as an opportunity to learn and grow, and be compassionate. Being a nice human being is more important than being right.\r\n\r\nNo harassment: only \"yes\" means \"yes\". Munches are relaxed social gatherings, not dating events \u2014 adjust your expectations accordingly. If you have trouble reading signals or are sometimes awkward in social situations, that's okay! You're not the only one. However, insisting when somebody tells you that they're not interested is harassment. Physical touching without explicit consent is also harassment.", "recording_license": "", "do_not_record": false, "persons": [{"id": 152, "name": "raven", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}], "Lounge": [{"id": 65, "guid": "a9418047-05a6-5788-804d-9a61b1488c45", "logo": null, "date": "2018-05-11T00:00:00+02:00", "start": "00:00", "duration": "02:00", "room": "Lounge", "slug": "7KJWNX", "title": "couchsofa", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 62, "guid": "5fc73e18-b11f-5b50-a6fe-cb246ffbcda2", "logo": null, "date": "2018-05-11T02:00:00+02:00", "start": "02:00", "duration": "05:00", "room": "Lounge", "slug": "ZNQWEN", "title": "Schallwelten", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 63, "guid": "7b345dc5-54fa-5e08-88a4-96778c928b50", "logo": null, "date": "2018-05-11T16:00:00+02:00", "start": "16:00", "duration": "02:00", "room": "Lounge", "slug": "KY8NY7", "title": "dnc (Rock/Metal)", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 64, "guid": "e7884465-7a29-5dac-bf57-8a11c597f53f", "logo": null, "date": "2018-05-11T18:00:00+02:00", "start": "18:00", "duration": "02:00", "room": "Lounge", "slug": "3TRGCD", "title": "Latin Lounge", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 72, "guid": "6598f604-b183-5414-a77e-bba684e33ba1", "logo": null, "date": "2018-05-11T20:00:00+02:00", "start": "20:00", "duration": "02:00", "room": "Lounge", "slug": "UDUHXP", "title": "dj-spock", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 77, "guid": "4928e0d0-b223-5ca1-a516-f28e81ed6596", "logo": null, "date": "2018-05-11T22:00:00+02:00", "start": "22:00", "duration": "02:00", "room": "Lounge", "slug": "MYYSEX", "title": "vidister", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}]}}, {"index": 3, "date": "2018-05-12", "day_start": "2018-05-12T00:00:00+02:00", "day_end": "2018-05-13T00:00:00+02:00", "rooms": {"ZKM_Medientheater": [{"id": 8, "guid": "388267a5-1b71-5320-9173-bca8792c3797", "logo": null, "date": "2018-05-12T14:30:00+02:00", "start": "14:30", "duration": "01:00", "room": "ZKM_Medientheater", "slug": "9ZAAX8", "title": "Aerodynamics 101", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Overview of flow patterns around objects. In depth discussion about the wing and its functions.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 4, "name": "Alexander Becker", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 85, "guid": "7de8a55e-c46b-504d-babe-4a25730417cd", "logo": null, "date": "2018-05-12T16:00:00+02:00", "start": "16:00", "duration": "01:00", "room": "ZKM_Medientheater", "slug": "UBH8DS", "title": "M\u00e4rchenhafte Protokolle", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Ein kleine Einf\u00fchrung in die Magie der Authentifizierungs- und Sicherheitsprotokolle", "description": "F\u00fcr die Nutzung der g\u00e4ngigsten Anwendungen und Internetseiten m\u00fcssen sich Menschen authentifizieren. Das gleiche gilt f\u00fcr alle smarten Technologien und Ger\u00e4te, die wir zur Kommunikation nutzen. Doch wie funktioniert die Technik hinter diesen Prozessen? Wie k\u00f6nnen Protokolle unsere Identit\u00e4t sch\u00fctzen und einer anderen Entit\u00e4t gegen\u00fcber versichern? Und wie funktionieren sie? Die gute Fee nimmt euch mit auf eine Reise ins M\u00e4rchenland!", "recording_license": "", "do_not_record": false, "persons": [{"id": 60, "name": "Tatjana", "biography": "Technikbegeisterte Informatikerin, die das Verst\u00e4ndnis von Technologie gerne auf verst\u00e4ndliche Weise teilt und multipliziert.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 86, "guid": "5821f506-1609-55b5-a58d-2ae972df0f78", "logo": null, "date": "2018-05-12T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "ZKM_Medientheater", "slug": "YA3R7J", "title": "Die Katze ist der Chef im Haus... Und der Geek muss es ausbaden.", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Was passiert, wenn drei \u00fcberaus verw\u00f6hnte \"Terrorzwerge\" und ihr Personal ihre Forderungen an einen handwerklich begabten Geek weitergeben k\u00f6nnen? Der muss L\u00f6sungen f\u00fcr nie geahnte Probleme finden - und sie in diesem Talk vorstellen.", "description": "In diesem Talk stellen wir Euch unsere \"Terrorzwerge\", vor allem die zickigste Katze der Welt, und ihre Anspr\u00fcche vor, die uns zur Verzweiflung und den Geek zu Basteleien wie einer nicht fest montierten, aber robusten, Terrassensicherung und einer sich automatisch \u00f6ffnenden Katzenklappe brachten. \r\n\r\nLustig wird's bei den Anekdoten mit Trollkatzen bzw dem Trollen mit Katzen. Ihr glaubt nicht, womit sich Katzengruppen und Katzenforen auf die Palme bringen lassen... \r\n\r\nZur Vorbereitung empfehlen wir die Talks \"Amazon VINE Inside\" vom EH16 und \"Wie man seine Katzen automatisiert\" vom EH18 - aber auch ohne diese beiden Talks werden euch die \"Terrorzwerge\" am\u00fcsieren.", "recording_license": "", "do_not_record": false, "persons": [{"id": 61, "name": "Tanja", "biography": "Das Personal, das die \"Terrorzwerge\" angeblich zu sehr verw\u00f6hnt", "answers": []}, {"id": 63, "name": "Habrok", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 22, "guid": "79bc8dc8-d493-5370-a094-4afe80d94715", "logo": null, "date": "2018-05-12T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "ZKM_Medientheater", "slug": "U3M78G", "title": "AI and the End of the World", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Like any other tool, AI has its benefits and its dangers. But we need to be aware of the dangers, to reap the benefits unharmed.", "description": "Everybody is talking about the benefits of AI and in which areas it could also be applied to. Only a few question if this should be done at all and which dangers might arise with widespread adoption of AI.\r\n\r\nThis non-technical talk will give insights into the different dangers of AI: From Skynet and intelligent war drones to BigBrother and a benevolent but misguided super-intelligence \u00e0 la \"I, Robot\", different scenarios with prerequisites and probabilities are discussed. Although the ultimate end-state of AI maybe 50 years ahead, most people focus solely on that, neglecting the many different dangers on the path to get there. But there are a lot of issues we need to start to address today.\r\n\r\nWe are living in interesting times ... a slightly different talk.", "recording_license": "", "do_not_record": false, "persons": [{"id": 18, "name": "Jeremias R\u00f6\u00dfler", "biography": "Trying to make a difference. @roesslerj is the founder of retest, bringing AI into software testing.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 107, "guid": "3ae378ab-25dd-5336-aaba-510a967785d7", "logo": null, "date": "2018-05-12T21:00:00+02:00", "start": "21:00", "duration": "00:30", "room": "ZKM_Medientheater", "slug": "FFD3KK", "title": "Standards - Gut, dass so Viele zur Auswahl stehen", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Standards bestimmen unser Leben. Vom Internet bis hin zum Desktop, Handy und die (Post)Briefe, die wir schreiben. Ein subjektiver Streifzug durch die wunderbare Welt der Standards.", "description": "RFCs und Internet-Standards. ISO, OSI und OASIS. \u00d6norm, EU-Norm und \"Industrie\"-Normen. Wir kennen und lieben/hassen sie alle. Lasst mich einen Streifzug durch jene Normen machen, von denen ich der Meinung bin, dass Ihr sie als Linux-affines Publikum kennen solltet. Kann Spuren von Sarkasmus, Rants und pers\u00f6nlicher Meinung beinhalten.", "recording_license": "", "do_not_record": false, "persons": [{"id": 81, "name": "leyrer", "biography": "Betreibt seit \u00fcber 20 Jahren fortgeschrittene IT-Magie. Mutig die Systeme administrierend, die sonst niemand anzugreifen wagt.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 24, "guid": "a8a4d912-70e6-5c64-b3dc-c55e4ecf292f", "logo": null, "date": "2018-05-12T22:00:00+02:00", "start": "22:00", "duration": "02:00", "room": "ZKM_Medientheater", "slug": "LEDFE8", "title": "Demoshow", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Die gro\u00dfe Demo-Nachlese des letzten Jahres", "description": "Wir zeigen die besten, interessantesten und verr\u00fccktesten Demos des letzten Jahres", "recording_license": "", "do_not_record": false, "persons": [{"id": 19, "name": "F1fth", "biography": "Ihr kennt mich.", "answers": []}], "links": [], "attachments": [], "answers": []}], "HfG_Studio": [{"id": 90, "guid": "0f649ccf-4188-5ec0-bf0f-0f761c69a709", "logo": null, "date": "2018-05-12T11:30:00+02:00", "start": "11:30", "duration": "01:00", "room": "HfG_Studio", "slug": "3HDQFN", "title": "Warum Henry Ford die besseren Web Applikationen gebaut h\u00e4tte", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Schon vor \u00fcber 100 Jahren erreichte Ford durch den konsequenten Einsatz von Halbfertigfabrikaten und Komponenten eine enorme Produktivit\u00e4tssteigerung. Diese Methoden lassen sich heute durchaus f\u00fcr den Bau von WebApplikationen - mit abstrakten Komponenten, angereichert mit den Ideen und Konzepten von J. Paul Rodker Morrison aus den sp\u00e4ten 60er Jahren - applizieren.", "description": "Wir zeigen eine Methode f\u00fcr den Bau von WebApplikationen in einer durchg\u00e4ngig deklarativen Art, welche mehr an elektronische Schaltpl\u00e4ne erinnert, als an bekannte Code Konstrukte. Und erm\u00f6glichen so einer neuen Schicht von \"Entwicklern\" sauber und zuverl\u00e4ssig, aus vorgefertigten Komponenten, beliebig komplexe WebAnwendungen rein deklarativ (ohne scripting) zu assemblieren. \r\n\r\nMit Hilfe von Webcomponents und den Konzepten von J.P Morrison (Flow-Based Programming) zeigen wir anhand von Beispielen, wie sich dies bewerkstelligen l\u00e4sst.", "recording_license": "", "do_not_record": false, "persons": [{"id": 67, "name": "Veith Z\u00e4ch + Roger M\u00fcller", "biography": "Wir sind seit bald 20 Jahren Softwareentwickler mit Fokus auf Webanwendungen. \r\n\r\nWir arbeiten aktiv an der Digitalisierung von Versicherungsprozessen. Dies machen wir in einem schweizer Softwarehaus f\u00fcr Versicherungssoftware.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 101, "guid": "04527a17-9bce-5ec8-940b-781cf5163a86", "logo": null, "date": "2018-05-12T12:45:00+02:00", "start": "12:45", "duration": "00:30", "room": "HfG_Studio", "slug": "FBYHT7", "title": "Lightning Talks f\u00fcr Fragen", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "\u201cIch habe $Projekt und brauche bei folgendem Baustein Hilfe\u201d", "description": "Bekannterma\u00dfen ist eine der tollen Sachen bei Nerd-Events (und \u00fcberhaupt), zusammen Dinge zu tun. In diesem Slot gibt es sowas wie Lightning Talks f\u00fcr Fragen, wenn man an einer Stelle nicht weiter wei\u00df kann man sein halb fertiges Projekt vorstellen, eine sch\u00f6ne M\u00f6glichkeit neue Menschen zum zusammen rumnerden zu finden. :-) \r\n\r\nKeine Produkte, keine Jobs.", "recording_license": "", "do_not_record": false, "persons": [{"id": 76, "name": "Benjamin Wand", "biography": "arbeitet explorativ und mag Musikinstrumente", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 10, "guid": "615d3190-d8b8-577b-ace4-abe25fff37c2", "logo": null, "date": "2018-05-12T13:30:00+02:00", "start": "13:30", "duration": "00:30", "room": "HfG_Studio", "slug": "VDSYNQ", "title": "AUR Pakete bauen f\u00fcr Anf\u00e4nger", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Du benutzt Arch Linux aber deine lieblings Software ist nur als zip oder debian packet verf\u00fcgbar. Dann schreib doch einfach deine eigene Installations routine und lade sie ins AUR hoch. Wie genau du das anf\u00e4ngst und was es zu beachten gibt erkl\u00e4re ich dir in diesem Vortrag.", "description": "An anhand ein paar Beispiel zeige ich wie man aus Code, Debian Packeten oder einer ZIP eigene Installations routinen f\u00fcr das Arch User Repository (AUR) schreiben und ver\u00f6ffentlichen kann.\r\n\r\nInhalt:\r\n* Wie ich ein neues Paket anfangen kann\r\n* Das erstellen einer PKGBUILD und Erkl\u00e4rung der wichtigsten Punkte\r\n* Generierung von ben\u00f6tigten Informationen\r\n* Updaten des Packets\r\n* Ein paar Worte zur Community und bereits vorhandenen Paketen", "recording_license": "", "do_not_record": false, "persons": [{"id": 6, "name": "Rinma", "biography": "I work as Software Developer and in my free time I fight for Open-Source and Linux. I am interested in most of the programming languages and tools out there. I use AntergOS on nearly all my devices (the last one is an Android ;-)).\r\nWhen I am not at any kind of computer I love to bike, bake and cook.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 9, "guid": "1203a77c-a01a-5a44-9282-d4c988205853", "logo": null, "date": "2018-05-12T14:30:00+02:00", "start": "14:30", "duration": "01:00", "room": "HfG_Studio", "slug": "RAHH8T", "title": "The Basics Of Audio Compressors", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Kompressoren im Sounddesign.\r\nEine kurze Einf\u00fchrung in Transient Shaping, Multi Band Compression und Limiting.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 19, "guid": "98391d79-4f04-5043-966b-25e33ce1bc37", "logo": null, "date": "2018-05-12T16:00:00+02:00", "start": "16:00", "duration": "01:00", "room": "HfG_Studio", "slug": "BRYKKX", "title": "kinX: keyboard hacking", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Ich erz\u00e4hle, wie und warum ich meine Kinesis Advantage Tastatur mit einem selbst entwickelten keyboard controller (und USB hub!) ausgestattet habe. Mit einer Eingabelatenz von nur 0.2ms macht mein controller die Tastatur zur schnellsten (mir bekannten) Tastatur.", "description": "In diesem Vortrag erkl\u00e4re ich am Beispiel der bekannten ergonomischen Kinesis Advantage Tastatur wie Tastaturen eigentlich funktionieren, und weswegen ich seit mittlerweile 5 Jahren einen eigenen keyboard controller in meiner Tastatur einsetze.\r\n\r\nNachdem die Grundlagen etabliert sind, untersuche und eliminiere ich Faktoren f\u00fcr Eingabelatenz, also Verz\u00f6gerung zwischen Tastendruck und Reaktion des Computers.\r\n\r\nMit dem so angeeigneten Wissen baue ich ein Latenz-Messger\u00e4t und messe die Verarbeitungslatenz aktueller Linux-Systeme.", "recording_license": "", "do_not_record": false, "persons": [{"id": 16, "name": "Michael Stapelberg", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 142, "guid": "24126bf1-66d4-53a6-b470-49e65ca4bdee", "logo": null, "date": "2018-05-12T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "HfG_Studio", "slug": "L7EUZN", "title": "Security Champions", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Wie bekommt man Security in die Entwicklungsteams? Der Talk zeigt ein m\u00f6gliches Vorgehen aus dem OWASP Umfeld und ein paar Erfahrungen damit.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 117, "name": "Ives \"dalini\" Laaf", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 106, "guid": "faea7134-21b2-5264-9e02-a8706b63e7fc", "logo": null, "date": "2018-05-12T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "HfG_Studio", "slug": "JGWF8V", "title": "Moderne Kommandozeilen Werkzeuge", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "ls, grep, find, ifconfig. Wir kennen sie alle und nutzen sie t\u00e4glich. Dabei g\u00e4be es mittlerweile, zum Teil bessere, Alternativen. Ein Blick auf die Kommandozeilenwerkzeuge des Jahres 2018.", "description": "Linux ohne einer Kommandozeile ist wie ein Himmel ohne Sterne. Aber wie sieht es eigentlich mit den Tools aus, die wir hier verwenden?\r\nDie meisten Tools, die wir kennen und t\u00e4glich verwenden, stammen entweder aus dem POSIX-Umfeld oder GNU-Userland. POSIX tools und Optionen stammen zum Teil aus 1988, und auch die Kommandozeilen-Werkzeuge aus dem GNU-Umfeld sind nicht viel moderner. Dabei g\u00e4be es durchaus zeitgem\u00e4\u00dfe Alternativen. Lasst uns gemeinsam einen Blick auf ripgrep, exa, fzf, ip und Co. werfen.", "recording_license": "", "do_not_record": false, "persons": [{"id": 81, "name": "leyrer", "biography": "Betreibt seit \u00fcber 20 Jahren fortgeschrittene IT-Magie. Mutig die Systeme administrierend, die sonst niemand anzugreifen wagt.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 41, "guid": "17a278b3-34af-5a04-92d8-e3e26165b410", "logo": null, "date": "2018-05-12T21:00:00+02:00", "start": "21:00", "duration": "00:30", "room": "HfG_Studio", "slug": "CYUTKE", "title": "Publish your research! - Warum \u00f6ffentlich finanzierte Forschung nicht ver\u00f6ffentlicht wird", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "\"Forschung wird gr\u00f6\u00dftenteils aus \u00f6ffentlichen Geldern bezahlt und sollte daher auch der \u00d6ffentlichkeit verf\u00fcgbar gemacht werden.\" - Dies ist eine oft ge\u00e4usserte Forderung und auch ein guter Grund Software und Daten als Open Source Software bzw. Open Data zu ver\u00f6ffentlichen. Leider ist das aber leichter gesagt als getan.", "description": "Basierend auf meinen Erfahrungen aus dem Deutschen Zentrum f\u00fcr Luft- und Raumfahrt (DLR) m\u00f6chte ich euch aufzeigen welche H\u00fcrden Wissenschaftler \u00fcberwinden m\u00fcssen um ihren Code und ihre Daten zu ver\u00f6ffentlichen. Und es deshalb oft nicht machen. Da reines jammern aber keinem weiterhilft, m\u00f6chte ich ebenfalls vorstellen welche Schritte wir im DLR ergreifen um diesen Missstand zu \u00e4ndern.", "recording_license": "", "do_not_record": false, "persons": [{"id": 33, "name": "Carina Haupt", "biography": "Mein Ziel ist es die Qualit\u00e4t der Softwareentwicklung in der Forschung zu verbessern. Daran forsche und arbeite ich jeden Tag. Egal ob im Bereich Software Engineering, Open Source oder Knowledgemanagement.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 176, "guid": "209160e8-ec2b-551d-8d98-3cc6f0a3169c", "logo": null, "date": "2018-05-12T22:00:00+02:00", "start": "22:00", "duration": "02:00", "room": "HfG_Studio", "slug": "BFTDCP", "title": "Demoshow \u00dcbertragung", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "\u00dcbertragung der Demoshow vom Medientheater ins Studio", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 19, "name": "F1fth", "biography": "Ihr kennt mich.", "answers": []}, {"id": 55, "name": "Eve Entropia", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_Vortragssaal": [{"id": 160, "guid": "e489d4d3-c938-53b4-839b-45c705b0878c", "logo": null, "date": "2018-05-12T11:30:00+02:00", "start": "11:30", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "UFXMWQ", "title": "Cloud Security Suite - One stop tool for AWS & GCP Security Audit", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Nowadays, cloud infrastructure is pretty much the de-facto service used by large/small companies. Most of the major organizations have entirely moved to cloud. With more and more companies moving to cloud, the security of cloud becomes a major concern.\r\n\r\nWhile AWS and GCP provide you protection with traditional security methodologies and has a neat structure for authorization/configuration, their security is as robust as the person in-charge of creating/assigning these configuration policies. As we all know, human error is inevitable and any such human mistake could lead to catastrophic damage to the environment.\r\n\r\nFew vulnerable scenarios: \r\n- Your security groups, password policy or IAM policies are not configured properly\r\n- S3 buckets are world-readable \r\n- Web servers supporting vulnerable ssl ciphers\r\n- Ports exposed to public with vulnerable services running on them\r\n- If root credentials are used\r\n- Logging or MFA is disabled\r\nAnd many more such scenarios...\r\n\r\nKnowing all this, audit of cloud infrastructure becomes a hectic task ! There are a few open source tools which help in cloud auditing but none of them have an exhaustive checklist. Also, collecting, setting up all the tools and looking at different result sets is a painful task. Moreover, while maintaining big infrastructures, system audit of server instances is a major task as well.\r\n\r\nCS Suite is a one stop tool for auditing the security posture of the AWS & GCP infrastructure and does OS audits as well. CS Suite leverages current open source tools capabilities and has custom checks added into one tool to rule them all.\r\n\r\nThe major features include:\r\n- Simple installation with support of python virtual environment and docker containers\r\n- GCP Audit\r\n- Initiate all tools/audit checks in one go\r\n- AWS Infra Audit:\r\n\tEasify your \u201copen source setup\u201d pain.\r\n\tCompilation of all audit checks in one place\r\n\tCentralized portable reports\r\n\tAudits individual systems\r\n\r\n- AWS Instance Audit\r\n\tIP based auditing\r\n\tRegion independent Audit (Public IP)\r\n\tSupports both public and private IPs for Default region\r\n\tAutomatic Report Generation and Fetching\r\n\tPortable HTML report\r\n- JSON output\r\n- Integration of AWS Trusted Advisor", "description": "Detailed Outline of the Presentation:\r\n\r\n- Introduction to the cloud and how it is being adapted by small and large firms.\r\n- Gartner quadrant showing how much stake AWS and GCP have among all cloud service providers.\r\n- Why more and more firms are migrating to cloud providers.\r\n- Default security offered by AWS and GCP.\r\n- What doesn't get covered due to misconfiguration of services done by DevOps/ITOps team.\r\n- What are the consequences of these misconfigurations.\r\n- How major firms have been exposed to the same threats and have fallen prey.\r\n- How this can be fixed ? Either by hiring a third party or using open source tools.\r\n- Third party security company costs money and involves providing your access to that company.\r\n- Open source requires a lot of research and involves successful configuration of all the tools.\r\n- How cloud secuity suite solves the above stated problems.\r\n- Showcasing the research done to integrate the available open source tools, addition of custom checks to help audit the infra further. Also, how easy it is to get the tool up and running. (Demo)\r\n- Showcase the OS audit capability of the tool where it can scan the OS of an instance belonging to the same infrastructure.(Demo)\r\n- Showcasing the report structure and how portable they are. (Demo)\r\n- Virtual environment and docker support.\r\n- Q&A\r\n- End", "recording_license": "", "do_not_record": false, "persons": [{"id": 133, "name": "Jayesh Singh Chauhan", "biography": "Jayesh Singh Chauhan is a security professional with more than 6 years of experience in the security space. In past, he has been part of security teams of PayPal, PwC and currently works as the senior security engineer for Sprinklr. He has authored CS-Suite, OWASP Skanda, RFID_Cloner and CSRF PoC generator and has presented in Blackhat Asia Arsenal 2018, BlackHat EU Arsenal 2017, c0c0n 2017, 2015, 2013, GES 2014 and Ground Zero 2015. He is the project leader for OWASP Skanda and leads the NULL Bangalore chapter.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 34, "guid": "2b148a03-ea3f-5aa8-8a6d-9cb7624f303e", "logo": null, "date": "2018-05-12T12:45:00+02:00", "start": "12:45", "duration": "00:30", "room": "ZKM_Vortragssaal", "slug": "9UXRRB", "title": "Datacenter in a Box - High Performance Computing mobil", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Wie schafft man es, High Perfomance Computing mobil und deutlich leistungsfaehiger als Strukturen in klassischen Rechenzentren abzubilden?\r\n\r\nIch habe das letzte Jahr an einem Projekt gearbeitet, das Rechenzentren in Seecontainer umformatiert, und dort eine deutlich hoehere Leistung bieten kann als uebliche RZs es koennen - und dann diese Container in eine ehemalige Mine in Norwegen stellt, um vollends Green zu werden.\r\n\r\nDieser Talk erzaehlt ueber die Infrastruktur, die Stolpersteine, warum Physik immer gemein zu Ingenieuren ist - und wo die Limits liegen.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 28, "name": "Tom Eichhorn", "biography": "Doing things in infrastructure innovations", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 37, "guid": "707ad08f-3a7a-5b72-8acf-2a4d203a1a20", "logo": null, "date": "2018-05-12T14:30:00+02:00", "start": "14:30", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "9RLKBG", "title": "ada_conf - the making of a separatistic IT conference", "subtitle": "", "track": null, "type": "Workshop", "language": "en", "abstract": "ada_conf is an ordinary IT conference, but with one difference: it's only for women and trans people.\r\n\r\nWe created ada_conf for a simple reason: there was a demand for it. \r\n\r\nIn this session I will share the experiences of organizing two conferences in a very short time. What did we excel at, what did we learn? And, are there really enough qualified women to fill a whole tech conference?", "description": "This session will be one part prepared talk, and one part discussion and knowledge sharing.\r\n\r\nAgenda:\r\nInspiration\r\nWhy we don't speak about diversity\r\nada_conf's organizational structure\r\nEnabling people's super powers\r\nGetting speakers\r\nGetting (and enabling) volunteers\r\nAgile conference development \r\nDiscussion", "recording_license": "", "do_not_record": false, "persons": [{"id": 24, "name": "Emma Lilliestam", "biography": "Emma Lilliestam is a security researcher and exploratory tester working at House of Test in Sweden. She is a chip implanted cyborg and has spoken at various conferences, including being the keynote of Passwordcon 2016\r\nShe is also a co-founder of ada_conf, a tech conference for women and trans people. When there is some time to spare, she blogs about processes, user security, GDPR or other super exciting topics.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 80, "guid": "09e5e0a8-aa77-516d-8d3a-31f58c912057", "logo": null, "date": "2018-05-12T16:00:00+02:00", "start": "16:00", "duration": "02:00", "room": "ZKM_Vortragssaal", "slug": "ED7KMF", "title": "CCC Regiotreffen", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Das Treffen der regionalen Gruppen des Chaos Computer Clubs. G\u00e4ste sind willkommen - aber Achtung, das wird Euch vermutlich schnell langweilig ;)", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"id": 54, "name": "Twi", "biography": null, "answers": []}, {"id": 68, "name": "sva", "biography": "etoomanythings.... \r\n\r\nPrivacy extremist, floss & alternative routing ambassador, event organizer and radical connector\r\n\r\n\r\nsva is boardmember of the Chaos Computer Club and (co-)founded, mentored and organized various hackspaces and -events, e.g. hillhacks.in, hackbeach.in or CCC/C3-confs. She is part of the cryptoparty core-team and wants to implement mass encryption with the Swiss p\u2261p foundation to create privacy by default for everyone.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 93, "guid": "293f93c2-2574-5683-91af-5b83b08fe8bf", "logo": null, "date": "2018-05-12T18:15:00+02:00", "start": "18:15", "duration": "00:30", "room": "ZKM_Vortragssaal", "slug": "S7DECU", "title": "U2Fishing: Potential Security Threat Introduced by U2F Key Wrapping Mechanism", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "Universal 2nd Factor (U2F) is an open authentication standard that strengthens and simplifies two-factor authentication and has been used by Facebook, Google, Github etc. The keys stored in U2F tokens with secure element chips are considered impossible to be extracted. However, the capability of key pairs storage is limited by secure element chips, FIDO U2F standard allows a key wrapping mechanism which enables unlimited key pairs with limited storage. It's considered safe, but not with an evil manufacturer.\r\n\r\nIn this talk, we will give a real-world example of U2F phishing attack by retrieving the master secret from an open source U2F token during the manufacturing process and then give that U2F token to a victim user. Then we can clone that U2F token by implementing the same key wrapping mechanism with the master secret recorded. We will give a demo that Github, Gmail, Facebook can be affected using this kind of U2Fishing method.\r\n\r\nSome countermeasures will be discussed. Investigating some websites that provide U2F as a two-factor authentication method, we found out that some of them haven't implemented cloning detection function which is recommended by FIDO Alliance so that U2Fishing victims will not be aware of when the attack is started.\r\n\r\nThis attack will still work even if cryptography secure element chip such as Atmel ATECC508A is used by U2F token with key wrapping mechanism. It's recommended that end users should at least do a master secret regeneration process when given a new U2F token with key wrapping mechanism. It's currently unavailable for Yubikey.", "description": "More details \r\n------------\r\n\r\nBasically, it's because FIDO standard allows Key Wrapping Mechanism. So that the U2F device can only keep a master secret when secure storage capacity has a limit.\r\n\r\nhttps://fidoalliance.org/specs/fido-u2f-v1.0-nfc-bt-amendment-20150514/fido-u2f-overview.html#allowing-for-inexpensive-u2f-devices\r\n\r\nMy attack scenario is: \r\n\r\n1. The attacker extracts the master key during the manufacturing process of an open-source U2F key, in my case is U2F Zero. \r\n2. Attacker clone this U2F key. (In my case, I integrated it with a software U2F implementation.)\r\n3. Attacker gives this U2F key to a victim.\r\n4. assume the victim use this U2F key to register with Google. \r\n5. Attacker gets to know the password from another source. (such as social engineering, or other ways of password phishing)\r\n6. Login.\r\n\r\nYou can find my PoC here:\r\n\r\nhttps://github.com/scateu/U2Fishing/blob/master/03-key-wrapping.py\r\n\r\nIn fact, this attack can be detected when an anti-clone counter is well checked, because:\r\n\r\n1. It's needed that attacker chooses a bigger counter number so that it's bigger than the last counter number that victim used to login. The best luck of the attack is choosing a counter number only 1 bigger than the counter number in the victim's device.\r\n2. The next time when the victim login, his counter number is smaller than the number recorded on the website.\r\n3.1 Maybe the victim think it is just a matter of network issue, and ignore it. And try again (the counter will increase by 1), and login successfully. In this case, the attacker will not be noticed.\r\n3.2 When the counter number chosen by the attacker is much bigger, the victim will never login to the website again. Because the victim has to press the button on the U2F device a lot of times to make the counter bigger than the last success counter recorded on the website.\r\n3.3 Another chance is that the website doesn't check the counter at all.\r\n\r\nAfter some investigation, I found out that when a counter number revert incident occurs:\r\n\r\n1. Some website like Gmail doesn't give a prompt, the webpage doesn't even blink. I don't think a victim will notice anything when this happens.\r\n2. Worse, my email provider Fastmail.com doesn't check the counter at all. That means, at first victim login with a counter number (say 123), then the attacker login with a bigger counter number (say 9999) to pass the counter check, then victim login with a counter number plus one (this time, 124). Fastmail.com will not check. I have already written to them, and get confirmed.\r\n\r\n\r\nA quick view of my experiment on youtube: \r\nhttps://www.youtube.com/watch?v=axKrtrOTfcY\r\n\r\nYubikey doesn't offer secret key regeneration. You can see an official answer from https://forum.yubico.com/viewtopic.php?f=33&t=2484\r\n\r\nAs for other U2F keys, https://github.com/hillbrad/U2FReviews provides a glance at Yubico U2F Security Key, Thetis U2F Security Key, Feitian ePass, Bluink, KEY-ID FIDO U2F Security Key, HyperFIDO Mini, HyperFIDO U2F Security Key, Plug-Up Card Key, Fidesmo Card, SurePassID TapID Card, Feitian MultiPass and VASCO DigiPass SecureClick. At least none of them allegedly supports secret key regeneration.", "recording_license": "", "do_not_record": false, "persons": [{"id": 70, "name": "Wang Kang", "biography": "Wang Kang is a Security Expert of the Mobile Security team of Alibaba Group. He is a contributor of Linux Kernel. (TDD-LTE USB Dongle support) as well as a Founder of the Tsinghua University Network Administrators (https://tuna.tsinghua.edu.cn). He was a speaker of Black Hat Europe 2015 and Black Hat USA 2017.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 136, "guid": "bb78ae4c-4e29-5aad-9b71-0596ef2a2303", "logo": null, "date": "2018-05-12T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "AHDMP3", "title": "horizon EDA - ein Jahr sp\u00e4ter", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "In diesem Talk wird es darum gehen was sich in der neuen EDA-Applikation horizon seit dem Vortrag letzten Jahres alles getan hat und wie es mit dem Projekt weiter geht.", "description": "Was macht man wenn einem Software und Elektronik Spa\u00df machen? Man schreibt seine eigene EDA-Software! So ist vor ca. 1\u00bd Jahren horizon entstanden und ist mittlerweile f\u00fcr kleine bis mittelgro\u00dfe Projekte einsetzbar.\r\n\r\nIn dem Talk werden u.a. neue Features gezeigt und auf einige Implementierungsdetails eingegangen. Schwerpunkt wird auf Live-Demo liegen. \r\n\r\n[Projektseite auf github](https://github.com/carrotIndustries/horizon/)", "recording_license": "", "do_not_record": false, "persons": [{"id": 112, "name": "Lukas K.", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 139, "guid": "dec42c0a-dd8c-5a7e-92e4-e6d5520206e5", "logo": null, "date": "2018-05-12T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "GPNARX", "title": "Linux Network Namespaces vs. VRFs", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 115, "name": "Skorpy", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 16, "guid": "03d4ed95-6a03-5ac1-93dd-72648c701da7", "logo": null, "date": "2018-05-12T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "ZKM_Vortragssaal", "slug": "JDNDLG", "title": "SSH Certificates", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Wir alle lieben SSH!\r\nAber wie benutzt man es wirklich sicher?\r\nEinige der Probleme lassen sich mit SSH-Zertifikaten l\u00f6sen.\r\nWir schauen uns das mal genauer an...", "description": "Wir alle lieben SSH!\r\n\r\nUnd nat\u00fcrlich verwenden wir immer sch\u00f6n SSH-Benutzerschl\u00fcssel f\u00fcr den Zugriff,\r\ninstalliert auf den Zielsystemen als sog. \"authorized keys\".\r\n\r\nAllerdings verleiten viele gut gemeinte Anleitungen im Internet zu einer\r\nbequemen, aus Sicherheitssicht eher fragw\u00fcrdigen Nutzung von SSH-Schl\u00fcsseln.\r\n\r\nInsbesondere stellen sich folgende Fragen:\r\nWie werden private Schl\u00fcssel sicher gespeichert?\r\nWie setzt man zentral starke Passphrases durch?\r\nOder doch lieber Smartcards nutzen? Hardware-Treiber? (argh!)\r\nWie funktioniert die Nutzung auf mehreren Clients und Gateways?\r\nUnd wie wird die Authentizit\u00e4t der \u00f6ffentlichen Schl\u00fcssel gew\u00e4hrleistet?\r\nWie werden zuverl\u00e4ssig obsolete Schl\u00fcssel wieder von Zielsystemen entfernt?\r\n\r\nEine L\u00f6sungsm\u00f6glichkeit stellt die Nutzung von nur kurzzeitig g\u00fcltigen\r\nSSH-Schl\u00fcsselzertifikaten dar, welche einem Benutzer nach erfolgreicher\r\nMehrfaktor-Authentifizierung ausgestellt werden. Eine entsprechende\r\nImplementierung wird im Vortrag vorgestellt.\r\nDabei wird insbesondere auch erl\u00e4utert, warum eine Nutzung von\r\nSmartcards in diesem Anwendungsfall nicht geeignet war.\r\n\r\nFerner wird noch dargestellt, wie man SSH-Host-Zertifikate ausstellt und nutzt.", "recording_license": "", "do_not_record": true, "persons": [{"id": 14, "name": "Michael Str\u00f6der", "biography": "Michael macht so Verschiedenes im Bereich LDAP/IAM und angewandte Verschl\u00fcsselung.", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_OpenHUB": [{"id": 18, "guid": "41e37228-4544-5ec1-8b08-05846cf7b470", "logo": null, "date": "2018-05-12T14:30:00+02:00", "start": "14:30", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "X87YZZ", "title": "an introduction into digital model railroads", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "In this talk i will give an introduction into digital model railway control systems and their hacking and making opportunities.", "description": "\"modern\" model railway control systems are digital - since 1979. Several standards evolved out of that. As this is today one of the older used standards there are plently of hacking and making opportunities in there. \r\nI realized that a lot of the people in our scene have model railroads somewhere on the attic at home which in my opinion are worth being found, brought to the hackerspace, modded and played around with.", "recording_license": "", "do_not_record": false, "persons": [{"id": 15, "name": "mc.fly", "biography": "old german expat living in the netherlands. Thinks about computers, privacy and security since 1993. I also like trains. :-)", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 146, "guid": "969a44aa-a3ee-5e4c-a2eb-74cf8229a38d", "logo": null, "date": "2018-05-12T16:00:00+02:00", "start": "16:00", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "JMNDPS", "title": "Pilot I: Decentralised Autonomous Organisation eine Diskussion", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "", "description": "Diese Sitzung soll eine Diskussionsrunde sein und keine Pr\u00e4sentation. Ich werde eine kurze Einf\u00fchrung in das Thema geben, aber die Teilnehmer werden ermutigt, ihr Wissen und ihre Meinung zu diesem Thema zu teilen. Es wird ein diskursives Gespr\u00e4ch sein. \r\n\r\nDas Web 3.0 steht f\u00fcr eine verlockende Vision mit der zunehmenden Bedeutung der Blockchain. Das Potenzial der Blockchain zur Revolutionierung sozialer Institutionen wird am deutlichsten sichtbar in den so genannten Decentralised Autonomous Organisations (DAO). Die Blockchain-Technologie bietet die M\u00f6glichkeit, Plattformwirtschaften zu disintermediieren, indem vollst\u00e4ndig verteilte Organisationssysteme geschaffen werden, ohne dass eine zentralisierte Organisation die Plattform unterst\u00fctzen muss.\r\n\r\nDiese Technologie, die sich derzeit noch in einem sehr fr\u00fchen Stadium befindet, hat das Potenzial, die Art und Weise, wie wir die Gesellschaft organisieren, stark zu ver\u00e4ndern. K\u00f6nnten DAOs f\u00fcr eine direkte Demokratie eintreten? Was sind seine Potentiale und was sind seine Herausforderungen?", "recording_license": "", "do_not_record": true, "persons": [{"id": 125, "name": "Yasemin Keskintepe", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 35, "guid": "93474b10-fc14-5cd4-b316-77ffc49ff668", "logo": null, "date": "2018-05-12T17:30:00+02:00", "start": "17:30", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "XGLAAX", "title": "Interfacedesign aus Designersicht", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 29, "name": "Art", "biography": "Kommunikationsdesignstudentin mit den Schwerpunkten Interaktive Medien und Kommunikation im Raum.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 151, "guid": "2c46ce35-9267-5c2a-9c45-0a7acd4406a4", "logo": null, "date": "2018-05-12T19:00:00+02:00", "start": "19:00", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "CTPY3C", "title": "Lasst uns Massenverschl\u00fcsslung ausrollen!", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Einfache Verschl\u00fcsselung f\u00fcr alle: E-Mails und Nachrichten werden standardm\u00e4\u00dfig \u00abby default\u00bb verschl\u00fcsselt und anonymisiert, ohne dass der Nutzer gro\u00dfen Aufwand damit hat, sondern seine Standardanwendungen verwendet. End-To-End, Peer-to-Peer und ohne zentrale Infrastruktur, Open Source mit Code Reviews und Unterst\u00fctzung von \u00fcblichen Cryptostandards (S/MIME, PGP, OTR) \u2013 und am Ende zur Anonymisierung sogar noch durch GNUnet geschickt.\r\n\r\nWie das gehen soll? Wir versuchen es! Kleine Vorstellung des Projektes, des Stands der Organisation und Software und der aktuellen Implementierung der Ideen und Standards, wie z.B. Trustwords als nutzbare Erweiterung des Konzeptes des Fingerprints oder das leidige Problem der Keyserver bei GPG.", "description": "Der erste Teil des Talks richtet sich an absolute Beginner, der zweite Teil setzt ein wenig mehr technisches Verst\u00e4ndnis / Cryptowissen voraus.", "recording_license": "", "do_not_record": false, "persons": [{"id": 68, "name": "sva", "biography": "etoomanythings.... \r\n\r\nPrivacy extremist, floss & alternative routing ambassador, event organizer and radical connector\r\n\r\n\r\nsva is boardmember of the Chaos Computer Club and (co-)founded, mentored and organized various hackspaces and -events, e.g. hillhacks.in, hackbeach.in or CCC/C3-confs. She is part of the cryptoparty core-team and wants to implement mass encryption with the Swiss p\u2261p foundation to create privacy by default for everyone.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 175, "guid": "641f2cd4-5a49-5663-8105-0b4e2c13a724", "logo": null, "date": "2018-05-12T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "ZKM_OpenHUB", "slug": "ULKSJJ", "title": "Dezentrale soziale Netzwerke \u2013 Theorie und Praxis", "subtitle": "", "track": null, "type": "Talk", "language": "en", "abstract": "ActivityPub, Mastodon, und 1 Jahr chaos.social", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 64, "name": "rixx", "biography": "Einer der beiden chaos.social-Admins, Entwickler von byro und pretalx.", "answers": []}], "links": [], "attachments": [], "answers": []}], "HfG_Workshoproom": [{"id": 96, "guid": "2fad23f2-a37f-5f8e-8708-541606303f38", "logo": null, "date": "2018-05-12T11:00:00+02:00", "start": "11:00", "duration": "02:00", "room": "HfG_Workshoproom", "slug": "QBM7MH", "title": "Haecksenfryhstyck feat. F.U.C.K.", "subtitle": "", "track": null, "type": "Workshop", "language": "en", "abstract": "Meet'n'Greet for all women* at GPN. Doesn't matter whether you are already part of an Erfa/Chaostreff or not. This is where the magic happens.\r\nP. S.: Bring something yummy, if you can, but don't feel obliged to.", "description": "A great opportunity to connect, exchange ideas and experiences, support each other and scheme how to influence tech culture in order for it to become more inclusive and truly diverse. Inspired by the annual Haecksenfr\u00fchst\u00fcck at Chaos Communicaton Congress and the F.U.C.K. (Frauen/FLTI und Computer-Kram) initiative.", "recording_license": "", "do_not_record": true, "persons": [{"id": 72, "name": "inderkuerze", "biography": "DECT6464\r\n@entropia aka Mimi", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 149, "guid": "b8c9cbd0-b581-568e-9aeb-3af8027b5e4b", "logo": null, "date": "2018-05-12T13:30:00+02:00", "start": "13:30", "duration": "03:00", "room": "HfG_Workshoproom", "slug": "XZRBZC", "title": "Laserlabyrinth", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Baue ein Denkspiel aus Holz und etwas Elektronik. F\u00fcr Kinder zwischen 10 und 14 Jahren", "description": "In diesem Projekt erstellen die Teilnehmer ein Spiel, bei dem Laserstrahlen mit Hilfe von Spiegeln und Strahlteilern an Hindernissen vorbei auf eine Zielfl\u00e4che umgelenkt werden. Die Teilnehmer lernen den grundlegenden Umgang mit Lasern.\r\n\r\nDer Workshop l\u00e4uft im Rahmen eines EU-Projektes. Deshalb werden alle Bauteile gestellt, der Workshop ist kostenlos. Aber Voranmeldung ist n\u00f6tig (an bildung@fablab-karlsruhe.de) und ist f\u00fcr Kinder im Alter zwischen 10 und 14 Jahren gedacht. Teilnehmerzahl begrenzt", "recording_license": "", "do_not_record": false, "persons": [{"id": 124, "name": "Fablab Karlsruhe", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 150, "guid": "67bc90d7-fa26-59ae-a733-1241019f01d3", "logo": null, "date": "2018-05-12T17:00:00+02:00", "start": "17:00", "duration": "03:00", "room": "HfG_Workshoproom", "slug": "XZADTV", "title": "Heliostat", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Wie w\u00e4re es dein Smartphone mit reinem Sonnenlicht aufzuladen? Baue ein Ger\u00e4t, das eine Solarzelle immer auf die Sonne ausrichtet.", "description": "In diesem Projekt wird ein Heliostat gebaut, der eine Solarzelle immer zur Sonne ausrichtet und damit Strom z.b. f\u00fcr das Aufladen eines Smartphones liefert.\r\n\r\nDer Workshop l\u00e4uft im Rahmen eines EU-Projektes. Deshalb werden alle Bauteile gestellt, der Workshop ist kostenlos. Aber Voranmeldung ist n\u00f6tig (an bildung@fablab-karlsruhe.de) und ist f\u00fcr Kinder im Alter zwischen 15 und 18 Jahren gedacht. Teilnehmerzahl begrenzt", "recording_license": "", "do_not_record": false, "persons": [{"id": 124, "name": "Fablab Karlsruhe", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 20, "guid": "8d44d88b-8b19-5cb6-9b2f-f42f61d014c0", "logo": null, "date": "2018-05-12T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "HfG_Workshoproom", "slug": "PUXFW7", "title": "Rope Beginners", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Nach dem spontanen Seilwahnsinn des letzten Jahres, machen wir uns dieses Jahr daran, noch mehr Menschen zu Zeigen, was man mit Seilen und Menschen anstellen kann.", "description": "Dieses Jahr w\u00fcrde ich den Workshop gerne aufteilen in eine Beginnerklasse, in dem ich nochmal einen breiten \u00dcberblick gebe, was es in dem Feld gibt, welche Sicherheitshinweise man beachten sollte, und einen ersten Einstieg gebe. Dar\u00fcber hinaus soll es noch einen Fortgeschrittenen Kurs geben", "recording_license": "", "do_not_record": false, "persons": [{"id": 17, "name": "Zinboo", "biography": "Dev Guy, IT Manager & Leader, positively boring.\r\n\r\nKinkster, RopeArtist, Junior Hypnotist, Driven.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 28, "guid": "5e70dd3f-d036-559f-82ba-7660c64e6843", "logo": null, "date": "2018-05-12T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "HfG_Workshoproom", "slug": "B9RCDD", "title": "Die Werw\u00f6lfe von D\u00fcsterwald", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Eine Open-End-Runde Werw\u00f6lfe von D\u00fcsterwald", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 3, "name": "Rem0te", "biography": "Infosec Red/Blue Team, Layer8 debugger.\r\nBOFH mit Wartungshammer.\r\nD&D DM\r\nMotto: I have a million ideas but they all point to your certain death", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_CodeHUB": [{"id": 7, "guid": "94b2db2b-8b85-519f-9dcf-71156090e90d", "logo": null, "date": "2018-05-12T14:30:00+02:00", "start": "14:30", "duration": "03:00", "room": "ZKM_CodeHUB", "slug": "3ARQAQ", "title": "Building your Pen & Paper world", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Planung und Aufbau einer Welt im D&D, DSA oder vergleichbaren Pen and Paper Kontext. Der Workshop vermittelt geomorphologische Grundprinzipien und gibt Einsicht in die Entstehung und den Aufbau von Siedlungen.", "description": "Dieser Workshop deckt folgende Punkte f\u00fcr die Erstellung einer Welt f\u00fcr Rollenspiele ab:\r\n- Planen und Erstellen einer Welt anhand geomorphologer Prinzipien\r\n- Planen und Erstellen von Siedlungen und St\u00e4dten anhand von Stadtentwicklungsgesichtspunkten des Mittelalters inklusive Wehranlagen\r\n- Erstellen und Nutzung von NPCs\r\n- Umriss einer Kampagne die dort stattfinden kann", "recording_license": "", "do_not_record": false, "persons": [{"id": 3, "name": "Rem0te", "biography": "Infosec Red/Blue Team, Layer8 debugger.\r\nBOFH mit Wartungshammer.\r\nD&D DM\r\nMotto: I have a million ideas but they all point to your certain death", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 82, "guid": "fbb270d5-742a-5d15-90d5-48a9933f66d5", "logo": null, "date": "2018-05-12T18:00:00+02:00", "start": "18:00", "duration": "01:30", "room": "ZKM_CodeHUB", "slug": "8KWAXG", "title": "World Domination - more achievable than ever? - GameJam@GPN", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Was Lex Luthor und Lord Voldemort nicht schaffen, haben Firmen wie Google, Facebook und Apple innerhalb k\u00fcrzester Zeit und in internationalen Ausma\u00dfen erreicht. World Domination beginnt immer mit einer handvoll motivierter Menschen und einer guten Idee.\r\nIn dem Workshop \u201eWorld Domination\u201c werden Projekte entwickelt, die die M\u00f6glichkeiten und Grenzen einer digital vernetzten Welt erkunden und an den Fronten der wissenschaftlichen Entwicklung denken.\r\nDabei werden neue Technologien erkundet, neu entstehende Forschungsfelder vorgestellt und deren Verkn\u00fcpfungsm\u00f6glichkeiten auskundschaftet.\r\nZiel des Workshops sind Ideen-Skizzen oder Prototypen, die in interdisziplin\u00e4ren Teams aus Informatik-Begeisterten, Gestaltenden, Codenden, Umsetzenden, Bastelnden, Designenden und Kunst-Treibenden erdacht und entwickelt wurden.\r\nDer Workshop wird eingeleitet durch die Pr\u00e4sentationen der Games aus dem GameJam", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 57, "name": "Princess Punzel", "biography": "Got abducted by the overlord.\r\nHas since then befriended his minions Mux and Gergor (of the goblin race), unsuccesfully tried to charm Eye-cancer (the monster of Loch Poisonne), found a princess-friendly loo and become an ace with the slingshot.", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 159, "guid": "4a99b0cb-0440-5e20-b3a0-d4adf04b324d", "logo": null, "date": "2018-05-12T21:00:00+02:00", "start": "21:00", "duration": "01:00", "room": "ZKM_CodeHUB", "slug": "9HKJNP", "title": "Chipmusic for everyone!", "subtitle": "", "track": null, "type": "Workshop", "language": "en", "abstract": "How to make music using old video game consoles? A quick overview of the amazing world of chiptune, followed by a beginner class on how to use LSDJ (a tracker for Nintendo Gameboys) by 3D63, French chipmusician.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 132, "name": "3D63", "biography": "- chiptune artist, infosec waifu & cyberkat -\r\n\r\nhttps://3d63.net/", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 170, "guid": "90bea0d1-7e0f-5573-9478-da99d0ad35f1", "logo": null, "date": "2018-05-12T22:30:00+02:00", "start": "22:30", "duration": "01:00", "room": "ZKM_CodeHUB", "slug": "TNJALX", "title": "Hackerspaces.org - Quo vadis?", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Hilfe f\u00fcr hackerspaces.org ist immer willkommen, wir stellen auch kurz den planet vor.", "description": "Hackerspaces.org - Maintainer gesucht!\r\n\r\nHackerspaces.org ist eine zentrale Ressource die gepflegt und weiterentwickelt werden will. Wir sind immer auf der Suche mehr Leute einzubinden und freuen uns \u00fcber jedes Wesen das mithelfen m\u00f6chte.\r\n\r\nIn diesem Workshop wird einmal der planet vorgestellt und wie man seinen Space integrieren kann oder will, als auch \u00fcber die Zukunft diskutiert. Was k\u00f6nnen wir besser machen, wer m\u00f6chte helfen und bis wann kriegen wir das hin? \r\nWas wollen die Spaces und wer setzt es dann auch um?", "recording_license": "", "do_not_record": true, "persons": [{"id": 143, "name": "mwfc", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_AckerSpace": [{"id": 182, "guid": "d5f39109-a53f-5f5e-8c38-a1bab055c68e", "logo": null, "date": "2018-05-12T14:30:00+02:00", "start": "14:30", "duration": "01:00", "room": "ZKM_AckerSpace", "slug": "YFR9SW", "title": "Ein Exzellenzkodex f\u00fcr den Congress", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Wir m\u00f6chten mit allen Interessierten einen Verhaltenskodex f\u00fcr\r\nden Kongress entwickeln. Unsere Idee ist, das dezentral \u00fcber Github zu\r\ntun. Wir stellen euch unsere Idee kurz vor und m\u00f6chten dann mit euch\r\ndiskutieren.", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"id": 111, "name": "Sandzwerg", "biography": "Organisiert Dinge bei Chaos West", "answers": []}, {"id": 155, "name": "blackspear", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 88, "guid": "d2090c1b-2e81-5ccd-b5e4-98233bc3fac1", "logo": null, "date": "2018-05-12T16:00:00+02:00", "start": "16:00", "duration": "01:00", "room": "ZKM_AckerSpace", "slug": "79DR9V", "title": "chaos.social-Meetup", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "chaos.social ist die/eine chaotische Mastodon-Instanz. F\u00fcr mehr direkte Vertrauensketten treffen wir uns mal \u2013 beide Admins werden da sein.", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"id": 64, "name": "rixx", "biography": "Einer der beiden chaos.social-Admins, Entwickler von byro und pretalx.", "answers": []}, {"id": 65, "name": "Leah", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}], "Anderswo": [{"id": 162, "guid": "ebb44e3f-a4cd-5d55-8d82-a4f52f4bfd9d", "logo": null, "date": "2018-05-12T11:00:00+02:00", "start": "11:00", "duration": "01:00", "room": "Anderswo", "slug": "8EDFHH", "title": "Moderne Stoffwindelsysteme", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Moderne Stoffwindeln als Alternative zu Pampers und Co.", "description": "Ein Vortrag von Lay auf der GPN18.\r\n\r\nModerne Stoffwindeln als Alternative zu Pampers und Co.\r\n\r\nDer Workshop findet im ersten OG der HFG statt (im Schnuller Operation Center)\r\n\r\nEin Workshop f\u00fcr Eltern und solche die es werden wollen :)\r\nIch werde auf die Vor- und Nachteile von Stoffwindeln eingehen, euch die verschiedenen Systeme vorstellen und von unseren Erfahrungen damit berichten.\r\n\r\nZum Workshop kann man gerne auch sein Baby mitbringen (falls schon vorhanden). Es w\u00e4re sch\u00f6n wenn ihr mir kurz per Email lay@ixix.de bescheid gebt oder euch direkt in die Teilnehmerliste eintragt. Wenn es tats\u00e4chlich mehr als 10 Interessenten geben sollte w\u00fcrde ich einen zweiten Workshop am Sonntag oder Freitag anbieten.\r\n\r\n\r\n==Teilmehmer Samstag 11 Uhr==\r\n\r\n* Anna\r\n* Teresa\r\n* Birgit (bibbit) mit baby\r\n* Sarah & Stefan mit Merle\r\n* Rebecca\r\n* Anja\r\n\r\n== Stoffwindeln ==\r\n\r\nDie Aufgef\u00fchrten Stoffwindelmarken bringe ich zum Workshop mit. Gerne k\u00f6nnen Teilnehmer auch noch andere Marken zum Anschauen und Berichten mitbringen.\r\n\r\n===All-in-Ones===\r\n\r\n* Totsbots \r\n* BumGenius \r\n* Bambino Mio\r\n\r\n===All-in-Twos===\r\n\r\n*Culla di Teby Schwimmwindel\r\n\r\n===All-in-Threes===\r\n \r\n*Windelmanufaktur\r\n*Culla di Teby\r\n\r\n===H\u00f6schenwindeln===\r\n\r\n*Hu-da \r\n*Petit Lulu\r\n*Anavy\r\n*Imse Vimse\r\n \r\n===Saugeinlagen===\r\n\r\n*Baumwolle\r\n*Bambus\r\n*Zorb\r\n\r\n===Fleece===\r\n\r\n*von Hansnatur, Little Lamp, Bambio Mio und viele mehr\r\n\r\n===\u00dcberhosen===\r\n\r\n*Popolini\r\n*Imse Vimse\r\n*Hu-da", "recording_license": "", "do_not_record": true, "persons": [{"id": 135, "name": "Lay", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 25, "guid": "8815f6b5-9fd3-53bd-ad53-2576c13b1057", "logo": null, "date": "2018-05-12T20:15:00+02:00", "start": "20:15", "duration": "03:00", "room": "Anderswo", "slug": "WMMLGB", "title": "Eurovision Song Contest Finals", "subtitle": "", "track": null, "type": "Film / Video", "language": "de", "abstract": "Okay, so the ESC Finals are during GPN this year, so let's watch them together and nerd out for a bit.", "description": "Germany: Zero Points", "recording_license": "", "do_not_record": false, "persons": [{"id": 55, "name": "Eve Entropia", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}], "Lounge": [{"id": 66, "guid": "f4090cbd-5f98-55d9-b346-11b622a0481a", "logo": null, "date": "2018-05-12T00:00:00+02:00", "start": "00:00", "duration": "02:00", "room": "Lounge", "slug": "PRD9DS", "title": "Bobo_PK & Tobi", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 67, "guid": "8aafff25-d996-5f04-8794-0275a8cf478c", "logo": null, "date": "2018-05-12T02:00:00+02:00", "start": "02:00", "duration": "05:00", "room": "Lounge", "slug": "ECHYWH", "title": "morelle", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 68, "guid": "cc05f526-8a70-5466-838b-5ad2e8315058", "logo": null, "date": "2018-05-12T16:00:00+02:00", "start": "16:00", "duration": "02:00", "room": "Lounge", "slug": "QCEZRY", "title": "Classic Lounge", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 69, "guid": "4fa7e87e-a3e8-550c-b199-7a4310ebdbc1", "logo": null, "date": "2018-05-12T18:00:00+02:00", "start": "18:00", "duration": "02:00", "room": "Lounge", "slug": "SGFAGB", "title": "K/B", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 70, "guid": "525578f9-9f41-51b9-945a-8978d60a31ab", "logo": null, "date": "2018-05-12T20:00:00+02:00", "start": "20:00", "duration": "01:30", "room": "Lounge", "slug": "BRXDSQ", "title": "FlipFloater (Ambient)", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 73, "guid": "c99c4d2d-ea0d-5015-8a7e-d73a9f15ac62", "logo": null, "date": "2018-05-12T21:30:00+02:00", "start": "21:30", "duration": "02:00", "room": "Lounge", "slug": "ZCHJLC", "title": "bam", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 71, "guid": "84dbc6e0-81ae-5522-ad89-4b50dc37c82c", "logo": null, "date": "2018-05-12T23:30:00+02:00", "start": "23:30", "duration": "01:00", "room": "Lounge", "slug": "TMAG8X", "title": "FlipFloater (Beat)", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}]}}, {"index": 4, "date": "2018-05-13", "day_start": "2018-05-13T00:00:00+02:00", "day_end": "2018-05-14T00:00:00+02:00", "rooms": {"ZKM_Medientheater": [], "HfG_Studio": [{"id": 134, "guid": "04aa908d-9a64-508f-b6b9-857a824e846a", "logo": null, "date": "2018-05-13T12:00:00+02:00", "start": "12:00", "duration": "02:00", "room": "HfG_Studio", "slug": "FTVPKM", "title": "Cybermorningshow", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "Es gibt sie noch und fast p\u00fcnktlich zur GPN ist uns das auch aufgefallen.\r\nEine frische Episode Morningshow aus der 3D-Printed HTML-Blockchain Cyber-Cloud.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 5, "guid": "1c78884b-36cd-5600-8ee6-df144c004259", "logo": null, "date": "2018-05-13T14:00:00+02:00", "start": "14:00", "duration": "01:00", "room": "HfG_Studio", "slug": "NLUJFV", "title": "Infrastructure Review and Closing", "subtitle": "", "track": null, "type": "Talk", "language": "de", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 1, "name": "obelix", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_Vortragssaal": [], "ZKM_OpenHUB": [], "HfG_Workshoproom": [{"id": 21, "guid": "305d29b9-2cfe-58fe-9909-41fb8c345716", "logo": null, "date": "2018-05-13T12:00:00+02:00", "start": "12:00", "duration": "01:00", "room": "HfG_Workshoproom", "slug": "NGV7PU", "title": "Rope Advance", "subtitle": "", "track": null, "type": "Workshop", "language": "de", "abstract": "Nach dem spontanen Seilwahnsinn des letzten Jahres, machen wir uns dieses Jahr daran, noch mehr Menschen zu Zeigen, was man mit Seilen und Menschen anstellen kann. Dieser Kurs richtet sich an Menschen die schonmal Seil in der Hand hatten.", "description": "Dieses Jahr w\u00fcrde ich den Workshop gerne aufteilen in eine Beginnerklasse, und diesen Fortgeschrittenenkurs, den wir auch auf dem Kongress gehalten haben. Dabei zeigen wir grundlegende Torso-Fesslungen, die Seilinteressierte lange Zeit begleiten werden.", "recording_license": "", "do_not_record": false, "persons": [{"id": 17, "name": "Zinboo", "biography": "Dev Guy, IT Manager & Leader, positively boring.\r\n\r\nKinkster, RopeArtist, Junior Hypnotist, Driven.", "answers": []}], "links": [], "attachments": [], "answers": []}], "ZKM_CodeHUB": [], "ZKM_AckerSpace": [], "Anderswo": [], "Lounge": [{"id": 91, "guid": "6a44a685-9a55-5611-b9e2-2b158b708156", "logo": null, "date": "2018-05-13T00:30:00+02:00", "start": "00:30", "duration": "01:00", "room": "Lounge", "slug": "DYEYJR", "title": "Tschunkelmusik", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}, {"id": 61, "guid": "8d268f35-541f-5a75-ab45-8546480764d5", "logo": null, "date": "2018-05-13T01:30:00+02:00", "start": "01:30", "duration": "05:00", "room": "Lounge", "slug": "MAYUSE", "title": "Project Poltergeist", "subtitle": "", "track": null, "type": "DJ-Set", "language": "en", "abstract": "", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"id": 5, "name": "couchsofa", "biography": "", "answers": []}], "links": [], "attachments": [], "answers": []}]}}]}}}