Lo mejor de… CCC

El Club de Computación Caos (CCC) es la mayor asociación de hackers en Europa, y una de las organizaciones digitales más influyentes y activa en la lucha por la total transparencia de los poderes públicos, la libertad de información, el derecho humano a la comunicación y el acceso universal y gratuito a los ordenadores y la infraestructura tecnológica. Las conferencias que se desarrollan en sus congresos ilustran las complejas formas en que política y tecnología interactúan en el mundo actual.

TítuloIntervieneDescripciónPublicaciónDuración 
Cyborgs Unite! [froscon17]Karen SandlerWhen Karen discovered at a young age that she had a life threatening heart condition, the last thing she expected was to have to worry about software. Now, with a heart device implanted in her body, she has come to understand not only how vulnerable medical devices are but how we are making critical choices about software that will have huge societal impact. Karen will talk about the hacks which show how essential free and open source software is and will discuss her professional and personal view of the issues both as a patient and as a cyborg lawyer. Karen will also touch on potential avenues for accountability, transparency, and access to remedies as we hurtle towards an Internet of Things built on proprietary source code that prevents us from knowing exactly how these vital devices work, what data they are collecting and to what ends, what their vulnerabilities might be, and the extent to which their closed, proprietary nature keeps us from developing societal mechanisms and review processes to keep us safe2017-08-1900:53:38Ficha
Vídeo
Audio
Smart, safe & happy [SHA2017]Ancilla van de LeestPrivacy-minded charities have a hard time going up against silicon valley's army of corporate lawyers. Digital rights are becoming increasingly important in society, but politicians fail to come up with answers. Across the world law after law is being passed, eroding our civil liberties. Ancilla has been fighting to keep our digital rights for the past 5 years. At SHA she will share her lessons and thoughts on what comes next2017-08-0600:52:52Ficha
Vídeo
Audio
How hackers could have hacked all Dutch elections since 2009 [SHA2017]Sijmen RuwhofIn this talk I'll present my findings when researching the security of the Dutch voting system. I quickly found various important security mistakes which would made it very easy to tamper with the results. Based on my research the Dutch government dumped the voting software. #NetworkSecurity #DeviceSecurity2017-08-0600:54:25Ficha
Vídeo
Audio
Building Businesses that we can Buy Into and Believe In [SHA2017]Liz SteiningerIn the age of corporate surveillance, invasive ad-driven business models and lucrative zero-days, it is no surprise that the words “profitable business” can sound destructive to internet freedom and human rights. However, if we want to change this trend and have a lasting impact, we need to make sure we can build profitable businesses on privacy-friendly and open source technologies, that respect all humans, without bias.2017-08-0600:57:27Ficha
Vídeo
Audio
Interplanetary Colonization
the state at the beginning of the 21st Century [33c3]
Liz George & Peter BuschkampThe long term survival of the human species requires that we become an interplanetary species. But we must answer two big questions: where are we going, and how do we get there? We explore what scientists know (and don’t know) about humanity’s potential future homes both inside and outside the solar system, and then we’ll dive into the technological challenges of (and potential solutions for) getting humans to and colonizing a new planet.2016-12-3000:33:52Ficha
Vídeo
Audio
Saving the World with (Vegan) Science [33c3]Benjamin RupertDescribing the science behind new high tech vegan foods which will replace animal agriculture. I will also discuss the potential impact to lessen the severity of climate change and give an update on the Real Vegan Cheese biohacker project.
2016-12-3000:31:07Ficha
Vídeo
Audio
An Elevator to the Moon (and back) [33c3]Markus LandgrafWhy is it so hard to go to the Moon? The curse of Newtonian Mechanics and Tsiolkovsky's Rocket Equation force us to build huge rockets to achieve any meaningful activity on the Moon. There are two strategies to hack the laws of celestial mechanics: making fuel on the Moon and using cables to climb out of the gravity well. Here we focus on the latter, which is the Moon version of the famous space elevator. The difference to an Earth elevator is - anelevator to the Moon's surface is realistic with today's materials. In the talk an introduction to the general problem is given and a starting point for a discussion is given that can easily lead to a sustainable access to the Moon if there is demand to do so.2016-12-2901:01:28Ficha
Vídeo
Audio
Talking Behind Your Back [33c3]Vasilios Mavroudis and Federico MaggiIn the last two years, the marketing industry started to show a fast increasing interest in technologies for user cross-device tracking, proximity tracking, and their derivative monetization schemes. To meet these demands, a new ultrasound-based technology has recently emerged and is already utilized in a number of different real-world applications. Ultrasound tracking comes with a number of desirable features (e.g., easy to deploy, inaudible to humans), but alarmingly until now no comprehensive security analysis of the technology has been conducted. In this talk, we will publish the results of our security analysis of the ultrasound tracking ecosystem, and demonstrate the practical security and privacy risks that arise with its adoption. Subsequently, we will introduce some immediately deployable defense mechanisms for practitioners, researchers, and everyday users. Finally, we will initiate the discussion for the standardization of ultrasound beacons, and outline our proposed OS-level API that enables both secure and effortless deployment for ultrasound-enabled applications.2016-12-2900:59:03Ficha
Vídeo
Audio
Where in the World Is Carmen Sandiego? Becoming a secret travel agent [33c3]Karsten Nohl & Nemanja NikodijevicTravel booking systems are among the oldest global IT infrastructures, and have changed surprisingly little since the 80s. The personal information contained in these systems is hence not well secured by today's standards. This talk shows real-world hacking risks from tracking travelers to stealing flights.2016-12-2800:59:44Ficha
Vídeo
Audio
Stopping law enforcement hacking [33c3]Christopher SoghoianWe didn’t win the second crypto wars. Governments merely made a strategic retreat and they’ll be back. Although they will likely give up on trying to regulate or prohibit encryption, we should expect that malware and law enforcement hacking will play a starring role in the next battle in the crypto wars.
Download
2016-12-2801_04:22Ficha
Vídeo
Audio
On Computing Numbers, with an Application to Problems of our Society [32c3]Stefan WehrmeyerJournalists, while structurally and economically under threat, are bringing computer science into their newsrooms. Their tools and techniques benefit from computer science in areas such as databases, graph analysis and machine learning and allow journalists to tackle new kinds of stories.2015-12-3000:30:44Ficha
Vídeo
Audio
A New Kid on the Block [32c3]Katharina NocunThe leading social networks are the powerful new gatekeepers of the digital age. Proprietary de facto standards of the dominant companies have lead to the emergence of virtual “information silos” that can barely communicate with one another. Has Diaspora really lost the war? Or is there still a chance to succeed?2015-12-3001:02:57Ficha
Vídeo
Audio
The Price Of Dissent [32c3]CAGE & Cerie BullivantCAGE exists to highlight abuses of the War on Terror. It has uncovered many secrets of governments that they would like to remain secret, and is now one of the most targeted organisations in the UK. Hear how the state attempts to suppress dissent, and yet we manage to speak out.2015-12-2901:02:57Ficha
Vídeo
Audio
Satellite Imagery in Agriculture [cccamp15]Lisa GutermuthSatellite imagery has been used since the 1960s to monitor agricultural activities at a national and international level. It is only now that the image quality and cost feasibility have made satellite imagery available to individual farmers in application to crop quality analysis, yield prediction, and other measures related to precision farming. Farmers can now pinpoint problem areas of their fields and address them on the spot, rather than blanketly spraying fertilizer and pesticides, which has the potential for environmental and economic benefits. However, this development has launched agriculture into new territory ridden with issues of privacy, data protection, and autonomy of farm inputs and activities. This is a discussion of the state of affairs in agricultural earth observation and what we can do to ensure that it is used for improved practices and not against the producers of our food.2015-08-1700:30:47Ficha
Vídeo
Audio
Bugged Files - Is Your Document Telling on You? [cccamp15]Daniel "unicornFurnace" CrowleyCertain file formats, like Microsoft Word and PDF, are known to have features that allow for outbound requests to be made when the file opens. Other file formats allow for similar interactions but are not well-known for allowing such functionality. In this talk, we explore various file formats and their ability to make outbound requests, as well as what that means from a security and privacy perspective. Most interestingly, these techniques are not built on mistakes, but intentional design decisions, meaning that they will not be fixed as bugs. From data loss prevention to de-anonymization to request forgery to NTLM credential capture, this presentation will explore what it means to have files that communicate to various endpoints when opened2015-08-1600:46:39Ficha
Vídeo
Audio
Resisting Surveillance: it's is not just about the metadata [cccamp15]"Lily", harryhalpin and JasonThis talk is given by three activists who were all targeted by UK police spy Mark Kennedy and who have direct personal experience of that and other physical surveillance. It will look at experiences of infiltration of social justice movements by the state and private contractors and some of our responses.2015-08-1601:00:21Ficha
Vídeo
Audio
Mexican Botnet Dirty Wars [cccamp15]Erin GallagherPeñabots have been active in Mexican networks since the 2012 presidential elections. Named after President Enrique Peña Nieto, armies of bots have become a political weapon to combat protests and attack critics of the Mexican government online. Bots are waging a dirty war in Mexican social media. They are weaponized censors that silence dissent and cover up crimes.2015-08-1500:28:51Ficha
Vídeo
Audio
Drones, ships, pills and the Internet [cccamp15]Rebecca GompertsWomen on Waves and Women on Web, 2 non profit organisations use all possible loopholes and undetermined legal spaces to make sure that also women in countries where abortion is illegal can access safe abortion services.2015-08-1500:54:26Ficha
Vídeo
Audio
Executable Documentation for everyone (even you)Nikolas MartensSometimes good documentation makes the difference between just another dead github repository and a successful, widely used library. But writing documentation is tedious and boring and maintaining it ten times so. But wrong documentation is sometimes worse than none so updating it is even more important than writing it.

If only there was a way to write documentation of software systems that validates itself, making sure it doesn't lies. But wait, there is! Every automated test program is a piece of self-validating documentation. The only thing missing now is a way to make it accessible and understandable for everybody, not only technical experts. This is where 'dox' comes into play - a tool that publishes test code in a pleasant-to-read form. So let me show how, together with some good engineering practices, your wildest (documentation) dreams can come true.
2014-08-2400:55:23Ficha
Vídeo
Web-App-Encryption
Is your data secure by default?
Didi HoffmannThis talk will detail the different threats a web application faces today and how different types of encryption can solve many of these problems. We will discuss the whole web-stack and show various technologies to deploy secure encryption. The main focus will be on using Django as a web-frontent in a highly distributed and load optimised environment.2014-08-2301:03:47Ficha
Vídeo