From 27C3 public wiki

Jump to: navigation, search

Lightning Talks

Contents

News and Updates

TALKS FROM PEACE MISSIONS PLEASE SUBMIT:

  • Slides you plan to present OR a video of your talk
  • Be prepared for a late night testing session to take place on Day 2 or 3.
  • Use the term "Behind Enemy Lines" in the subject of your submission e-mail.

There are no tickets available for lightning talk presenters. Day tickets will be available each day lightning talks are happening.

Please do not submit your presentation without slides or a background graphic. All presentations will be hosted from one laptop so time is not lost dealing with inevitable projector and display issues. In order to be fair to all presenters and cut down on the number of unprepared speakers, a lightning talk will not be scheduled unless the submission includes attached slides, a background graphic or a plan for a substitute graphical element (like the use of lasers).

About

Contact: E-Mail

Discussion: Lightning Talks Discussion

Description: Lightning Talks are 4-minute talks by *you*.

Other: Everyone can register for this until the list is full.

Content: Your talk can be about a program, a system, a technique, some hardware - or about a cool project, or some strange idea. You may also give us an idea about your real talk, announce your workshop or tell us about your booth. Or you could simply ask people to join you for some DOS attack of the next food store, announcing a key signing party, or maybe a *real* party. Whatever it is... be brief. Four minutes is all you get!

Registration

  DO NOT ADD YOURSELF TO THE SCHEDULE.  

All changes to the schedule not made by a coordinator will be reversed.

Note: We will accept registrations until each session is full. If the sessions fill up, we'll start scheduling backup speakers.

Please submit your proposal and slides/background graphic in an e-mail to: 27c3@nickfarr.org

Please do *not* register by adding any entries to the pentabarf system or by changing the wiki page. Thanks!

We need the following information from you:

  1. Language: DE (Deutsch,German)/EN (English)/Other
  2. Title: What is your presentation called? (12 Words or Less)
  3. Slides: Please submit slides or a background graphic with your contact information in PDF or PNG format
  4. Keywords: (Optional, but helpful.)
  5. Abstract: What are you talking about or presenting? (300 Words or Less)
  6. Links/Other: Anything else you would like people to see

Example:

 # Language: English
 # Title: How to Present a Lightning Talk
 # Keywords: Lightning Talks, Presentation, Speaking, 27c3
 # Slides: How To Give a Lightning Talk
 # Abstract: This talk will cover the very basics of giving a lightning talk
 # Links/Other: http://events.ccc.de/congress/2010/Fahrplan/events/4296.en.html

Questions?: Send an email to 27c3@nickfarr.org or find Nick Farr at the congress.

Day 2: Saal 3

Day 2 in Saal 3
Time Presentation Title Abstract Keywords Presenter
12:45 Your Lightning Talk! A quick introduction to Lightning Talks Lightning Talks, 27c3 It could be you!
12:50 Project DaPriM (Data Privacy Management) der FH Münster. (In German) DaPriM Abstract Datenschutz, Irreversibler Datenverschluss, TPM, FH-Münster Ulrich Greveler, Benjamin Justus, Dennis Löhr
13:00 Project Starfish The goal of Project Starfish is to enable the creation of a world-wide user-controlled network based on a distributed architecture. This is to be achieved through developing the necessary software and hardware which allows users to form such networks in an ad-hoc fashion independent of any centralised control. Its conceived advantages will be the strengthening of net neutrality while diminishing the digital divide, improving local communications and resilience, increased network capacity and renewed personal responsibility. distributed networks, starfish, net neutrality Raffael Kéménczy
13:05 Telecomix DNS Telecomix DNS is a decentralized DNS server network, to complement the single DNS root (ICANN). This presentation will cover the basic layout of the network, as well as what it's good for. Is it live already? DNS, telecomix, decentralization jwalck
13:10 Leaving the Closed Cloud: Debian's FreedomBox FreedomBox: A cheap and simple computer that serves freedom in the home. We are building a Debian based platform for distributed applications. The FreedomBox is about: privacy, control, ease of use, dehierarchicalization, decentralisation. Freedom, Privacy, Embedded, OpenSource, Decentralized, P2P, User-Control Arthur Lutz
13:15 Arduinos For Total Newbies Workshop Arduinos are easy enough for non-geek artists, yet powerful enough for uber-geeks. Learn all you need to get going with an Arduino. (This LT is promoting a workshop being given 14:00h to 17:00h on Day 2 and 3) education, arduino, tv-b-gone, electronics, hardware, hacking, making Mitch Altman
13:20 SAP vs. Sanity Anecdotal evidence why SAP consultants and clients seriously need help SAP, usability, security matthias (at gmail.com: zrjbzz)
13:25 SMS Port Scanner Overview of SMS (short Messaging Service) interface to a port scanner than I plan to provide to users of the Congress GSM network. sms, gsm greenhac
13:30 TSA Screenings & Your Rights Recent privacy & medical issues w/ TSA screenings, security theater psychology, & what everyone can do about 'em TSA, Unreasonable Search, Security Theater Sai
13:35 An Introduction to The Hacking Game NetS-X NetS-X is a project centered around E-Learning on Network Security. NetS-X needs a community, participants who are willing to learn and help. YouTube Trailer community, hacking, education, network security Alexander Ott
13:40 The Revolution Will Be Live Demo of wikileaks cablegate blog sync code and yet another end to censorship. wikileaks, cablegate, python Jesse B Semple

Day 3: Saal 3

Day 3 in Saal 3
Time Presentation Title Abstract Keywords Presenter
11:30 Freerainbowtables State of the project, how to participate, live from shackspace Rainowtables, BOINC, Developers Stefan
11:35 How to Present 44 sides on giving really effective presentations Public Speaking, Lightning Talks Steve Clement
11:40 Flockscrape Open Data the hard way: a distributed method for retrieving sites that don't want to be scraped. scraping, open data, datentagebau Friedrich Lindenberg
11:45 The Space Federation Three tools for Space Facilitators and Creators Hackerspaces, Co-Working Space, Makerspace Willow Bloo
11:50 Domain Cached Credentials This lightning talk is about the MSCASH2 patch for recovering DCC hashes of modern Windows operating systems. Domain Cached Credentials, password recovery, John the Ripper, MSCASH2 patch Matthias
11:55 Kombucha Workshop What is and how do you participate in the Food Hacking movement? Food Hacking, Workshop, Slow Food, Fermentations Frantisek
12:00 Automated testing of Operating Systems [1] This talk is about how to test whole operating systems in a cool way. QA, automation, KVM Bernhard M. Wiedemann
12:05 What I learned from 091Labs the new hackerspace in Galway I will talk about the experience of starting a hackspace from scratch and some of the great things that I learned. Hackesrpaces, community Adrian Mont
12:10 Libre Projects - for users and developers A directory of non-discriminating community projects that are free, gratis, platform-independent and usable (ideally also anonymous and secure). free software, free culture, meta Jan-Christoph Borchardt
12:15 Chaos Codegolf Challenge Squeeze your logic into the smallest pieces possible! code, golf, short, ruby, python, perl, fun, fun, fun Jan Lelis
12:20 Skype's Bag of Legal Tricks Have you ever wondered where all the Skype "cracking" projects go? Is it really impossible to understand how Skype and its protocol works? Obfuscation is only a part of their protection. Without their legal team all the workings of Skype would already be public long ago. This presentation is about how to publish your results and what to expect when you do. It is not about reverse-engineering. skype, legal, freedom, rights, reverse-engineering Kirils Solovjovs
12:25 Wikileaks, Human Rights and the Uncovering of Government Data As the worldwide debate continues about the release of U.S government information by Wikileaks, history has shown that the uncovering of government data can be an important factor in human rights investigations. In 2010, the Human Rights Data Analysis Group (HRDAG) examined once hidden government documents from Guatemala and Chad that provided key evidence needed to hold former national leaders and security forces accountable for human rights violations. Lightning Talks, Presentation, Speaking, 27c3, Wikileaks, Human Rights Annie Harrison
12:30 CryptoMiniSat The talk will present the award-winning SAT solver CryptoMiniSat and its advantages over other SAT solvers SAT Solving, Cryptography, Mate Soos
12:35 Creeper - simple surveillance of big brother Creeper is a Swedish service that tracks government use of the web. This talk will give you an overview of how it works, and what you can do. Creeper, HTTP, surveillance, web Patrik Wallstrom
12:40 STRETCH BREAK!
12:45 OpenGov on the city level - A call for action Some slides that will tell you why and how you should claim OpenGov/OpenData in your city. OpenGov, OpenData, Transparency, Participation Konrad Förstner
12:50 CUV Library - Combining Fast Number Crunching and Fast Prototyping CUV is a C++ library that provides Python wrappers for CUDA. It can be used to process huge amounts of data very easily and fast. GPU, CUDA, Python, Number Crunching, Machine Learning Andreas Müller
13:00 eLib Science & Fiction Wettbewerb Call 4 papers für die eLib Science & Fiction Textdays. Unter den Teilnehmern wird Gaming-Hardware verlost. Science Fiction, Technology, Call for Papers, Competition gego
13:05 Snow Wild Snow_0_Wild is a literary project dedicated to imagine a future of love encounters through non verbal channels such as traceroutes, brute force and any hacking tool as far as it’s consensual. It aims to question reverse engineering, social engineering and how we can fight for better privacy through education and knowledge. Arts, Traceroutes, Hacking Dreams, Privacy Control, Virtual Sex Shadow
13:10 shackspace - The Stuttgart Hackerspace I'll quickly present the rapidly growing Stuttgart hackerspace 'shackspace' and talk about the uncertain future awaiting us. shackspace, hackerspace, stuttgart, help Hadez
13:15 Seeks : a distributed collaborative search software Seeks is a free and open P2P design and application for enabling social websearch. Its specific purpose is to regroup users whose queries are similar so they can share both the query results and their experience on these results. On this basis, Seeks allows for true real-time, decentralized, websearch to emerge. search, dht, collaborative, free software, p2p Loic Dachary
13:20 STRETCH BREAK!
13:25 Coupwn, p2p sharing of services You can purchase daily train tickets via sms. What happens if an electronic p2p co'op shares them? mobile, p2p, train tickets Benjamin Weber & Nathan Fain
13:30 Lifesaving Crypto with Pehpho - Watch the watchmen without being watched by the watchmen We present a first implementation of a cryptographically secured photo application for Symbian and Linux based mobile phones. Shot pictures are immediately encrypted on the device. Besides of a public key based scheme which avoids decryption of stolen or confiscated devices, our GPL application is also supplying some basis support for upload of pictures and a secret key splitting features. photography, cryptography, avoiding repression Ruediger Weis, Robert Wuttke [2]
13:35 DanKam: Augmented Reality for Color Blindness Is it possible to use a smartphone to correct for colorblindness? Yes! In this quick talk, I'll discuss an interesting diversion into vision science. Color Blind, Augmented Reality, Not Security, Not DNS Dan Kaminsky
13:40 A GPU Exploit Instead of using a GPU for computation, why not use it to attack the host operating system? CUDA, GPU, Local Privilege Escalation, 0day Travis Goodspeed

Day 4: Saal 3

Day 4 in Saal 3
Time Presentation Title Abstract Keywords Presenter
1 Freerainbowtables State of the project, how to participate, live from shackspace Rainowtables, BOINC, Developers Stefan
2 f2fify - keep the music free building a decentralized on-demand music service music, python, json, free software adisbladis
3 Problems of the Criminalisation of Aviation Accidents Criminal proceedings in the wake of accidents may hinder the main goal of the accident investigation in this way: To find out the causes for the accident, testimonies of involved persons are very important. The goal of these investigations is to prevent reoccurrences. If involved people have to fear a criminal investigation for negligence, they may choose to remain silent. (None Supplied) Bernd Sieker
4 DNSSEC myths - a response to Daniel Bernstein Daniel Bernstein had a talk about high-speed high-security cryptography. But it was more a talk against DNSSEC rather then focusing on his own solution. This talk will respond to the arguments that Daniel had against DNSSEC. DNSSEC, myths Rickard Bellgrim
5 MoinMoin Wiki 2.0 - redesigning moin as it should be moin2 - what's new/different, what we use, coders wanted. MoinMoin, Wiki, Python, Web, WSGI, python libraries Thomas Waldmann
6 FAT lighting talk FUCK GOOGLE Brief presentation of fat lab, a crew of hackers, street artist, lawyers, makers and activists interested in the intersection of open source and pop culture. in feb 2010 we construct a fake google car, tweet that we put a gps on it.. and troll it over Berlin. This is what happened. (None Supplied) Geraldine
7 Announcing CIPHER 7 - a Call for Participation We are announcing CIPHER 7, a classical capture-the-flag contest, which is supposed to take place in Juli 2011. CIPHER 6 had to be called off due to missing contributions :-( The Lightning Talk is our Call for Participation: We are looking for people who commit to write vulnerable services (in a language of their choice), review and rate advisories for their services and help with setup and operations during the contest. Cipher 7, Capture-the-Flag Contest, Vulnerable Services lexi
8 Privacy/Transparency and the Social Web Wikileaks tought us that the government is intent on defining its right to confidentiality, but this does not seem to be a right that they deem worth protecting for their citizens. What goes? social web, wikileaks, privacy, transparency Henry Story
9 OpenSCAD Demo Solid 3D CAD modeling for programmers. Intro to OpenSCAD by live coding metalab, openscad, 3d printing, reprap, makerbot, lazzzor, lasercutting Marius Kintel
10 Open Source laser cutter driver VIDEO Love laser cutters? Hate having to deal with Windows and CorelDraw? Let us fix you up. metalab, lazzzor, lasercutting Amir Hassan
11 Flying Salamis? VIDEO Salami Rocket is about building a hybrid fuel rocket with a gaseous oxydizer (N20) and salami as propellants. Salami Rocket, Hybrid Rocket, metalab Prof. KallaBalla
12
13
12:30 OpenLase: Open Realtime Laser Graphics OpenLase is an open framework for realtime laser visualization and 2D/3D rendering. You can build your own DIY projector to use with it. Example projects: realtime MIDI or music visualization, laser vector videogames, laser video, etc. laser, openlase, realtime, electronics, art Hector Martin "marcan"
12:45 Console Hacking 2010: PS3 Demo Demo of the attack presented on Day 3 Console Hacking, PS3, Linux, Demo Hector Martin
16 BOFH meets SystemTap SystemTap as a rootkit framework for the lazy. This is about subverting an enterprise tracing debugging tool to annoy and spy on users with very little effort. linux, rootkit, kernel, privacy Adrien "Krunch" Kunysz
17 ATTENTION: Apache ALOIS knows what you did last summer! Apache ALOIS is a log collection and correlation software with reporting and alarming functionalities. ALOIS stands for "Advanced Log Data Insight System" and is meant to be a fully implemented open source SIEM security information and event management system. Since October 2010, ALOIS is an incubation project of the Apache Foundation. Unless other tools in this domain, Apache ALOIS should become a true community project, with no dependency to a company. Apache ALOIS, SIEM, logging, data retention Marcus Holthaus
18 TV-B-Gone for the N900 TV-B-Gone is a neat remote control to cover a wide range of tv switch off codes. This talk will present an implementation of this idea for the N900 (which incorporates a IR transmitter) and will show some of the difficulties encountered. TV-B-Gone, N900, IR Simon Budig
19
20 Malware monitoring / visiting ZeuS almighty Few words about our work at CERT Polska on malware analysis zeus,spyware, monitoring, malware Tomasz Bukowski
21 eLib Science & Fiction Wettbewerb Call 4 papers für die eLib Science & Fiction Textdays. Unter den Teilnehmern wird Gaming-Hardware verlost. Science Fiction, Technology, Call for Papers, Competition gego
22 Hacking Governments. HOWTO Win The #Infowar A practical approach from the Political Science to the concept of Hacking Governments: what an # infowar is, lessons learnt from the past and guidelines for the future, i.e.: HOWTO Win an #infowar. This is a proof of concept to propose a talk about this on 28c3: your feedback is welcome! political science, hacking, government, 27c3, 28c3 Suso Baleato
23
24
13:40 dragonCopter - FOSS Quadrocopter Design Fresh hardware and software design for quadrotors quadrocopter, flying objects, uav Helge

How it Works

  1. Submit your talk in advance. You must submit your slides or background graphic in advance to guarantee a spot on the schedule.
    • Exceptions will be made only for top secret demos and specialized hardware which MUST have a VGA out ready to go. You must bring your own VGA adapter. There will be a hard cut after 4 minutes.
  2. Practice your talk with friends.
  3. Be present in the room 5 minutes before the session starts
  4. Introduce yourself to the moderator and sit in the front row
  5. When called, get on stage
  6. Adjust the microphone.
  7. Introduce yourself
  8. Check your slides or background graphic
    • Say who you are
    • Mention the title again.
  9. If you are using slides, say "next slide" when you want to advance your slide
  10. Speak clearly and loud.
    • Only say the most interesting stuff.
    • Say everything else on your webpage.
  11. When you hear the gong, say goodbye and leave the stage quickly.
  12. Be prepared to meet interested people after the session.
    • Have a flyer, handout and/or business card ready.
    • Get back to them during the congress.

If you are bringing your own display hardware

  • There will be only VGA inputs available
  • If you need to feed in some other type of signal (e.g. from a camera-to show small things (CVBS,S-video), an ultra new laptop which has only HDMI, some weird gaming console that you will crack (YUV), or whatever) bring a device which can really *convert* these signals.
    • Simple passive adapters mostly do not work (e.g. there are adapters from HDMI to DVI and from DVI to VGA, but with the you will *never* be able to convert a HDMI signal into VGA, without a real converter).
    • We will NOT have adapters available
    • You will have 30 seconds to get your display hardware working. If it does not, then we will proceed to the next talk.

Notes

Remember:

  • There is no need to fill the available time.
  • There is no need for any catchy slides, a background graphic is fine.
  • Just be informative, be quick, be smart.
  • Tell people how to get involved and how they can contact you.
  • Add links to the description here in the wiki.
  • Add links to your contact info (ie a dect/phone number, and an email address).

Include the following things in your last slide:

  • Name
  • Contact (DECT, email, fon)
  • Links (project homepage)
  • Place of contact (booth, room, party)
Archived page - Impressum/Datenschutz