loading...
Cover image for πŸ’»πŸ‘‰My top 6 talks from the second day of the #36c3 congress aka chaos communication congress 2019

πŸ’»πŸ‘‰My top 6 talks from the second day of the #36c3 congress aka chaos communication congress 2019

lampewebdev profile image Michael "lampe" Lazarski ・3 min read

36c3 (4 Part Series)

1) πŸ’»πŸ‘‰My top 6 talks from the first day of the #36c3 congress aka chaos communication congress 2019 plus one bonus 2) πŸ’»πŸ‘‰My top 6 talks from the second day of the #36c3 congress aka chaos communication congress 2019 3) πŸ’»πŸ‘‰My top 6 talks from the third day of the #36c3 congress aka chaos communication congress 2019 4) πŸ’»πŸ‘‰My top 6 talks from the fourth day of the #36c3 congress aka chaos communication congress 2019

What is the chaos communication congress?

The Congress offers lectures and workshops and various events on a multitude of topics including (but not limited to) information technology and generally a critical-creative attitude towards technology and the discussion about the effects of technological advances on society.

Some of the talks are in German?

Yes a lot of the talks are in German but there are translations for almost all talks in English. Some even have a French translation.
You can change the language in the settings in the bottom right of the video.

Talks:

BahnMining - PΓΌnktlichkeit ist eine Zier (TrainMining)

πŸ‘‰LinkπŸ‘ˆ
Starting in early 2019 David has tracked every stop of every long distance train in Germany and he saved it systematically. He also saved every delay and everything surrounding it. We weal hear about this in this talk and we will have some fun with the data he stored.

All wireless communication stacks are equally broken

πŸ‘‰LinkπŸ‘ˆ
Wireless connectivity is an integral part of almost any modern device. These technologies include LTE, Wi-Fi, Bluetooth, and NFC. Attackers in wireless range can send arbitrary signals, which are then processed by the chips and operating systems of these devices. Wireless specifications and standards for those technologies are thousands of pages long, and thus pose a large attack surface.

Wireless exploitation is enabled by the technologies any smartphone user uses everyday. Without wireless connectivity our devices are bricked. While we can be more careful to which devices and networks we establish connections to protect ourselves, we cannot disable all wireless chips all the time. Thus, security issues in wireless implementations affect all of us.

Harry Potter and the Not-So-Smart Proxy War

πŸ‘‰LinkπŸ‘ˆ
Taking a look at a covert CIA virtual fencing solution.

In this talk we will take a look at the 'Vault 7' Protego documents, which have received very little attention so far, and challenge the assertion that Protego was a 'suspected assassination module for [a] GPS guided missile system ... used on-board Pratt & Whitney aircraft' based on system block diagrams, build instructions and a few interesting news items. In addition, we will discuss hypothetical weaknesses in systems like it.

In March 2017, WikiLeaks published the 'Vault 7' series of documents detailing 'cyber' activities and capabilities of the United States' Central Intelligence Agency (CIA). Among a wide variety of implant & exploit frameworks the final documents released as part of the dump, related to a project code-named 'Protego', stood out as unusual due to describing a piece of missile control technology rather than CNO capabilities. As a result, these documents have received comparatively little attention from the media and security researchers.

Mathematical diseases in climate models and how to cure them

πŸ‘‰LinkπŸ‘ˆ
Making climate predictions is extremely difficult because climate models cannot simulate every cloud particle in the atmosphere and every wave in the ocean, and the model has no idea what humans will do in the future. I will discuss how we are using the Julia programming language and GPUs in our attempt to build a fast and user-friendly climate model, and improve the accuracy of climate predictions by learning the small-scale physics from observations.

Climate models are usually written in Fortran for performance reasons at the expense of usability, but this makes it hard to hack and improve existing models.

Der Deep Learning Hype (The Deep Learning Hype)

πŸ‘‰LinkπŸ‘ˆ
Deep Learning is the dead end for ultimately having a solution for all machine learning problems - and also some others. But how good is that trend really? And how error prone is it?

We talk about scientific sustainability, social impact, and the aftermath for our resources, our power consumption, and with that with our planet.

β€œComputer says no”: WorΓΌber sollen Algorithmen entscheiden dΓΌrfen ("Computer says no": about what should algorithms decide?)

πŸ‘‰LinkπŸ‘ˆ
We have enough ethical guidelines for the application of algorithms. Cooperation's and organizations overthrew each other how ethical they are, that a human is central to every decision a machine makes, that the systems are fair and comprehensible. But it does not matter if they come from Google or IBM, if they come from standardization body like the IEEE or the OECD. They have one thing in common: they are legally not enforceable. So the question is: Who has the most profit from them?

πŸ‘‹Say Hello! Instagram | Twitter | LinkedIn | Medium | Twitch | YouTube

36c3 (4 Part Series)

1) πŸ’»πŸ‘‰My top 6 talks from the first day of the #36c3 congress aka chaos communication congress 2019 plus one bonus 2) πŸ’»πŸ‘‰My top 6 talks from the second day of the #36c3 congress aka chaos communication congress 2019 3) πŸ’»πŸ‘‰My top 6 talks from the third day of the #36c3 congress aka chaos communication congress 2019 4) πŸ’»πŸ‘‰My top 6 talks from the fourth day of the #36c3 congress aka chaos communication congress 2019

Posted on by:

lampewebdev profile

Michael "lampe" Lazarski

@lampewebdev

I'm a full-stack web developer. I love to help people.

Discussion

markdown guide