BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//39th Chaos Communications Congress//events in One
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:events in One
BEGIN:VEVENT
SUMMARY:Opening Ceremony
DTSTART:20251227T093000Z
DTEND:20251227T100000Z
DTSTAMP:20260415T183921Z
UID:0c8b0cb4-6cf9-5ff8-928a-0a0f49558c48
CATEGORIES:official,CCC & Community
DESCRIPTION:Das Opening gibt euch die wichtigsten Infos für den Congress\
 , stimmt euch ein und ... äh ... bis Späti!
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/opening-ceremony
END:VEVENT
BEGIN:VEVENT
SUMMARY:All Sorted by Machines of Loving Grace? "AI"\, Cybernetics\, and F
 ascism and how to Intervene
DTSTART:20251227T100000Z
DTEND:20251227T104000Z
DTSTAMP:20260415T183921Z
UID:304dd87b-7de5-557c-9951-1add24396a0b
CATEGORIES:official,Ethics\, Society & Politics
DESCRIPTION:The idea of the Super-Human is not a new one\, neither is the 
 idea of charismatic „good“ leader nor to sort humans into classes\, ra
 ces\, abilities. The idea of a view controlling many by force and ideas th
 at justify their rulership and cruelties is an old one\, as is the opposin
 g idea of a free society and humans as equals.\nA central aspect is how pe
 ople involved see the human nature and according to that what society they
  want to build. And what role is intended for technology.\nIn the 19th cen
 tury the beliefs of both the opposing sides dripped into science\, as well
  as individual’s heads\, and social movements around the world. While so
 me wanted to form a wold society of equals others wanted to breed a master
  race that to control everything.\n\nThe love of industrial leaders for au
 thoritarianism has played an important role since the beginning in funding
  and providing access to powerful networks. Industrialists like Henry Ford
  loved and promoted ideas at least close to fascism. German\, Italian\, an
 d Austrian counterparts funded Hitler and Mussolini. And it is not that th
 ey did it because they did not understand the fascist leader’s yearning 
 – it was because they shared and loved their aims and violence. \n\nIn F
 uturism\, one of the often overlooked roots of fascism\, and its Manifesto
  the enemies and societal goals are proclaimed crystal clear: “We will g
 lorify war — the only true hygiene of the world — militarism\, patriot
 ism\, the destructive gesture of anarchist\, the beautiful Ideas which kil
 l\, and the scorn of woman.“\n\nAfter WWII most of the people believing 
 in dominating others by force and eugenics lived on\, they and their croni
 es had slaughtered millions and destroyed whole social movements were oppo
 sing them. These people warning us about authoritarian prophets of doom an
 d concentration camps are still missing.\n\nIn the post-war time ideas of 
 authoritarianism met a new player: Cybernetics\, the believe in a future\,
  where all problems will be solved through technology and we are “All Wa
 tched Over by Machines of Loving Grace” (Richard Brautigam\, 1967). The 
 ideas split\, merged\, and melted into new beliefs and quasi-religions. In
 to something that is called “Cyber-Libertarianism” by David Golumbia o
 r “TESCREAL” by Émile P. Torres and Timnit Gebru. \n\nThis talk will 
 address an aspect that is often missing in analyses: What kind of breeding
  ground is it where ideas of fascism hatches best? And how can we stop iFa
 scism instead of participating in it?\n\nFurthermore\, as being sorted by 
 machines is not everyone's secret dream\, ways to stop iFascism will be pr
 ovided.\n\nBecause we are more\, we care for people in need – and we are
  the chaos!
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/all-sorted-by-mac
 hines-of-loving-grace-ai-cybernetics-and-fascism-and-how-to-intervene
END:VEVENT
BEGIN:VEVENT
SUMMARY:Zentrum für Politische Schönheit: Ein Jahr Adenauer SRP+ und der
  Walter Lübcke Memorial Park
DTSTART:20251227T105500Z
DTEND:20251227T113500Z
DTSTAMP:20260415T183921Z
UID:926c987a-2dd9-54f6-9a3a-45222dc9c4b7
CATEGORIES:official,Art & Beauty
DESCRIPTION:Es ist genau ein Jahr her\, dass der Adenauer SRP+ in der Hall
 e des 38C3 stand. Damals war er noch eine Baustelle\, aber schon bald mach
 te er sich auf den Weg\, um Geschichte zu schreiben. Wir nehmen euch mit a
 uf eine Reise: von Blockade über Protest\, von Sommerinterviews bis zu Po
 lizeischikanen lassen wir ein Jahr Adenauer SRP+ Revue passieren. Das kön
 nte lustig werden.\nAußerdem: alles zum Walter Lübcke-Memorial-Park\, de
 n wir gerade direkt vor die CDU-Zentrale gebaut haben.\n\nOwei owei: Das w
 ird viel für 40 Minuten.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/zps-ein-jahr-aden
 auer-srp-und-mehr
END:VEVENT
BEGIN:VEVENT
SUMMARY:Building hardware - easier than ever - harder than it should be
DTSTART:20251227T115000Z
DTEND:20251227T123000Z
DTSTAMP:20260415T183921Z
UID:4bfb9f9c-a8cd-5bcb-8b0f-ce20509f2a36
CATEGORIES:official,Hardware
DESCRIPTION:Electronics is easier and more fun to get into than it's ever 
 been before. All the tools and resources are easily accessible and super c
 heap or free. There's an enormous amount of things to build from and build
  on.\n\nIt's also never been more important to be able to build and unders
 tand electronics\, as assholes running corporations are wasting their work
 ers' unpaid overtime on making all the electronics in our lives shittier\,
  more full of ads\, slop\, and spyware\, and more frustrating to use. Enco
 untering a device that works for you instead of against you is a breath of
  fresh air. Building one is an act of resistance and power. Not depending 
 on the whims of corporate assholes is freedom.\n\nHowever\, the culture ar
 ound electronics and the electronics industry is one of exclusion and gate
 keeping. It doesn't need to be. It would be stupidly easy to make things b
 etter\, and we should. I've been teaching absolute beginners advanced elec
 tronics manufacturing skills for many years now. It's absolutely shocking 
 how much more diverse the people who I teach are compared to the industry.
  The "hardware is hard" meme is true in some cases but toxic when worn as 
 a badge of pride or a warning to people attempting it.\n\nI will tell you 
 why designing and building electronics is not nearly as hard as it seems\,
  how it's almost never been easier to get into it\, and why it's very impo
 rtant that people who think or have been told they can't do it should be d
 oing more of it. I'll tell you my experiences of what building devices is 
 like\, show and tell a few useful skills\, and tell the story of how tryin
 g to prove someone wrong on the internet turned into a decade of teaching 
 people with zero experience how to handle the most complex electronic comp
 onents at all sorts of community events.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/building-hardware
 -easier-than-ever-harder-than-it-should-be
END:VEVENT
BEGIN:VEVENT
SUMMARY:Liberating Bluetooth on the ESP32
DTSTART:20251227T125000Z
DTEND:20251227T133000Z
DTSTAMP:20260415T183921Z
UID:760c1f6b-349e-5ee3-9eeb-4a0f20dc902a
CATEGORIES:official,Hardware
DESCRIPTION:The ESP32 has become an ubiquitous platform in the hacker and 
 maker communities\, powering everything from badges and sensors to mesh ne
 tworks and custom routers. While its Wi-Fi stack has been the subject of p
 revious reverse engineering efforts\, its Bluetooth subsystem remains larg
 ely undocumented and closed source despite being present in millions of de
 vices.\n\nThis talk presents a reverse engineering effort to document Espr
 essif’s proprietary Bluetooth stack\, with a focus on enabling low-level
  access for researchers\, security analysts\, and developers to improve ex
 isting affordable and open Bluetooth tooling.\n\nThe presentation covers t
 he reverse engineering process itself\, techniques and the publication of 
 tooling to simplify the process of peripheral mapping\, navigating broken 
 memory references and symbol name recovery.\n\nThe core of the talk focuse
 s on the internal workings of the Bluetooth peripheral. The reverse engine
 ering effort led to the discovery of the peripheral architecture\, it’s 
 memory regions\, interrupts and a little bit of information about other re
 lated peripherals.\n\nBy publishing open tooling\, SVD files and other doc
 umentation\, this work aims to empower researchers\, hackers\, and develop
 ers to build custom Bluetooth stacks\, audit existing ones\, and repurpose
  the ESP32 for novel applications. This may interest you if you care about
  transparency\, low-level access\, and collaborative tooling.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/liberating-blueto
 oth-on-the-esp32
END:VEVENT
BEGIN:VEVENT
SUMMARY:Opening pAMDora's box and unleashing a thousand paths on the journ
 ey to play Beatsaber custom songs
DTSTART:20251227T134500Z
DTEND:20251227T144500Z
DTSTAMP:20260415T183921Z
UID:3aa9e859-d4b0-5e7d-8f5c-7741e6c9856e
CATEGORIES:official,Security
DESCRIPTION:# BACKSTORY\n---------------\nSo here is the backstory of how 
 it all started:\n- I bought a commercial gaming console\n- Then bought a V
 R headset (for this console) because of exclusive game\n- But also wanted 
 to play beatsaber\n- I could\, but builtin song selection was very limited
 \n- Custom songs exist (for example on steam)\, but not for this console\n
 - I didn't want to buy a second headset for steam\nThat's when i decided i
  want to hack this console so that i can port community created customs so
 ngs to the console and play them there with the VR headset i already have.
 \n\nInitially starting with an approach similar to the usual "entrypoint t
 hrough browser"\, then go for kernel and call it a day\, but quickly annoy
 ing hurdles blocked my way. For one\, the Hypervisor makes your live just 
 miserable with it's execute only kernel text blind exploitation. Other iss
 ues were that one needs to be on latest version to download the game\, whi
 ch exists only as digital purchase title\, preventing me to share my effor
 ts with others even if i can get it working on my console.\nThough\, what 
 finally put the nail in the coffin was when porting a kernel zeroday to th
 e console failed because of heavy sandboxing\, unreachable syscalls or eve
 n entirely stripped kernel functions. \nSome may call it "skill issue". An
 yways\, that's when i was full of it and decided to bring this thing down 
 for good.  \nEverybody does glitching nowadays and according to rumors peo
 ple did have success on this thing with glitching before\, so how hard can
  it really be\, right? \n\nSo the question became: Is it possible to build
  a modchip\, which glitches the board and lets me play beatsaber custom so
 ngs?  \nStuff like that has been done on other consoles before (minus the 
 beatsaber part :P) \n\nTurns out that when manufacturing produces chips wi
 th broken GPUs\, they are sold as spinoff desktop mainboards (with disable
 d GPU) rather than thrown away. Which is great\, because those mainboards 
 are much cheaper\, especially if you buy broken spinoff mainboards on ebay
 .   \n\nSo on the journey to beatsaber custom songs\, breaking this deskto
 p mainboard became a huge chunk of the road. Because if i can glitch this 
 and build a modchip for it\, surely i can also do it for the console\, rig
 ht? I mean it's the exact same SoC afterall! \nBack when i started i didn'
 t know i would be about to open pAMDoras box and discover so many bugs and
  hacks.  \n\n# Actual talk description\n---------------\n**Disclaimer: Thi
 s is not a console hacking talk!**  \nThis talk is gonna be about breaking
  nearly every aspect of the AMD Platform Security Processor of the desktop
  mainboard with the same SoC as the console. While certainly usefuly for _
 several_  other AMD targets\, unfortunately not every finding can directly
  be ported to the console. Still\, it remains very useful nonetheless!\n\n
 Note: The final goal of custom songs on beatsaber has not been reached yet
 \, this talk is presenting the current state of things.\n\nIn this talk yo
 u'll be taken on a ride on how everything started and how almost every asp
 ect of the chip was broken. How bugs were discovered\, what strategies wer
 e used to move along.  \nNot only will several novel techniques be present
 ed for applying existing physical attacks to targets where those couldn't 
 really be applied before\, but also completely new approaches are shared w
 hich bring a whole different perspective on glitching despite having lots 
 of capacitors (which we don't really want to remove) and extremely powerfu
 ll mosfets (which smooth out crowbar attempts in a blink of an eye).  \n\n
 But that's not all!  \nWhile trying to perform physical attacks on the har
 dware\, the software would just start falling apart by itself. Which means
 \, at least **6 unpatchable\\* bugs** were discovered\, which are gonna be
  presented in the talk alongside with **5 zero-day exploits**. Getting EL3
  code execution on the most secure core inside AMDs SoC? No Problem! \nApa
 rt from just bugs and exploits\, many useful techniques and discovery stra
 tegies are shared which will provide an excellent knowedgle base and attac
 k inspiration for following along or going for other targets.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/opening-pamdora-s
 -box-and-unleashing-a-thousand-paths-on-the-journey-to-play-beatsaber-cust
 om-songs
END:VEVENT
BEGIN:VEVENT
SUMMARY:All my Deutschlandtickets gone: Fraud at an industrial scale
DTSTART:20251227T150000Z
DTEND:20251227T160000Z
DTSTAMP:20260415T183921Z
UID:a2dd3dc7-ecae-50b3-82d9-266ad02f7a40
CATEGORIES:official,Security
DESCRIPTION:At last years Congress Q presented [a deep-dive into the techn
 ical details of train ticketing](https://media.ccc.de/v/38c3-what-s-inside
 -my-train-ticket) and its [Zügli](https://zügli.app) platform for this\;
  since then\, things have gone rather out of hand. The little side-project
  for looking into the details of train tickets turned into a full-time pro
 ject for detecting ticketing fraud. This talk details an executive summary
  of the madness that has been the past year\, and how we accidentally ende
 d up in national and international politics working to secure the Deutschl
 andticket.\n\nShortly after last year's talk\, we were contacted about som
 e *interesting* looking tickets someone noticed\, issued by the Vetter Gmb
 H Omnibus- und Mietwagenbetrieb - or so they claimed to be. These were nor
 mal Deutschlandtickets\, but with a few weird mistakes in them. At first\,
  we thought nothing much of it\; mistakes happen. But\, on further investi
 gation\, these turned out to not be legitimate tickets at all\, but rather
  from a fraudulent website by the name of d-ticket.su\, using the private 
 signing key obtained under suspicious circumstances. How exactly this key 
 came into the wrong hands remains unclear\, but we present the possible ex
 planations for how this could've happened\, how many responsible have been
  thoroughly uncooperative in getting to the bottom of this\, and how the s
 upporting systems and processes of the Deutschlandticket were unable to co
 pe with this situation.\n\nParallel to this\, another fraud has been drain
 ing the transport companies of their much-needed cash: SEPA Direct Debit f
 raud. Often\, a direct debit payment can be setup online with little more 
 than an IBAN and ticking a box\; and most providers of the Deutschlandtick
 et offer an option to pay via direct debit. Fraudsters have noticed this\,
  and mass purchase Deutschlandtickets with invalid or stolen IBANs before 
 flipping them for a discounted price on Telegram\; made easier because mos
 t transport companies issue a ticket immediately\, before the direct debit
  has been fully processed. The supporting systems of the Deutschlandticket
  in many cases don't even provide for the revocation of such tickets. We w
 ill detail the hallmarks of this fraud\, how transport companies can work 
 to prevent it\, and how we tracked down the fraudsters by their own carele
 ss mistakes.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/all-my-deutschlan
 dtickets-gone-fraud-at-an-industrial-scale
END:VEVENT
BEGIN:VEVENT
SUMMARY:To sign or not to sign: Practical vulnerabilities in GPG & friends
DTSTART:20251227T161500Z
DTEND:20251227T171500Z
DTSTAMP:20260415T183921Z
UID:e448ef16-47cf-57ad-9fbd-a5f91aa4aa3b
CATEGORIES:official,Security
DESCRIPTION:Beyond the underlying mathematics of cryptographic algorithms\
 , there is a whole other layer of implementation code\, assigning meaning 
 to the processed data. For example\, a signature verification operation bo
 th needs robust cryptography **and** assurance that the verified data is i
 ndeed the same as was passed into the signing operation. To facilitate the
  second part\, software such as *GnuPG* implement parsing and processing c
 ode of a standardized format. Especially when implementing a feature rich 
 and evolving standard\, there is the risk of ambivalent specification\, an
 d classical implementation bugs.\n\nThe impact of the vulnerabilities we f
 ound reaches from various signature verification bypasses\, breaking encry
 ption in transit and encryption at rest\, undermining key signatures\, to 
 exploitable memory corruption vulnerabilities.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/to-sign-or-not-to
 -sign-practical-vulnerabilities-i
END:VEVENT
BEGIN:VEVENT
SUMMARY:Die Känguru-Rebellion: Digital Independence Day
DTSTART:20251227T181500Z
DTEND:20251227T191500Z
DTSTAMP:20260415T183921Z
UID:514cda00-fd8e-5417-ba56-a882572a660e
CATEGORIES:official,CCC & Community
DESCRIPTION:Vielleicht auch was von Elon und Jeff on Mars.\nUnd dann ruft 
 das Känguru zum Digital Independence Day auf.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/die-kanguru-rebel
 lion-digital-independence-day
END:VEVENT
BEGIN:VEVENT
SUMMARY:Chatkontrolle - Ctrl+Alt+Delete
DTSTART:20251227T193000Z
DTEND:20251227T203000Z
DTSTAMP:20260415T183921Z
UID:9296cd85-f869-5687-94cb-e87d805249a2
CATEGORIES:official,Ethics\, Society & Politics
DESCRIPTION:Die Chatkontrolle liest sich mehr wie eine tragische Komödie\
 , als ein Gesetzgebungsverfahren. Nach dem dramaturgischen Rückblick auf 
 dem 37C3 wird es nun Zeit einen Blick auf die Seite der Rebellen zu werfen
 . \nMarkus Reuter und khaleesi haben den Gesetzgebungsprozess rund um die 
 Chatkontrolle von Anfang an eng begleitet\, er aus der der journalistische
 n\, sie aus der Policy-Perspektive. \nNach den ersten Jahren mit großen R
 ummel und Hollywoodstars ist es nach den EU-Wahlen doch etwas ruhig geword
 en. Doch die Gefahr ist nicht vom Tisch: \n\nZwar steht die Position des E
 U-Parlaments gegen die Chatkontrolle - aber wie sicher sie wirklich ist\, 
 ist unklar.\nDerzeit hängt alles am Rat: Es gab sehr positive Vorschläge
  (polnische Ratspräsidentschaft) und negative Vorschläge (dänische Rats
 präsidentschaft) - doch einigen können sich die Länder nicht und eine M
 ehrheit will die Chatkontrolle\, kann sich aber nicht durchsetzen.\n\nUnd 
 auch in Deutschland hat die Chatkontrolle den ganz großen Sprung in die 
 Öffentlichkeit geschafft und die Gegner:innen einen Etappensieg errungen.
  Was dieser Erfolg mit der Arbeit der letzten vier Jahre zu tun hat und wa
 rum auch in Deutschland noch nichts in trockenen Tüchern ist\, erzählen 
 wir in diesem Talk.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/episode-ii-der-ra
 t-schlagt-zuruck
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacking washing machines
DTSTART:20251227T204500Z
DTEND:20251227T214500Z
DTSTAMP:20260415T183921Z
UID:efa55b63-86b6-56c5-88ab-46408b59b18d
CATEGORIES:official,Hardware
DESCRIPTION:Modern home appliances may seem simple from the outside\, but 
 inside they contain complex electronic systems\, proprietary communication
  protocols\, and diagnostic interfaces rarely documented outside the manuf
 acturer. In this talk\, we'll explore the challenges of reverse-engineerin
 g these systems: from analyzing appliance control boards and internal comm
 unication buses to decompiling and modifying firmware to better understand
  device functionality.\n\nWe'll also look at the security mechanisms desig
 ned to protect diagnostic access and firmware readout\, and how these prot
 ections can be bypassed to enable deeper insight into device operation. Fi
 nally\, this talk will demonstrate how the results of this research can be
  used to integrate even legacy home appliances into popular home automatio
 n platforms.\n\nThis session combines examples and insights from the rever
 se-engineering of B/S/H/ and Miele household appliances.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/hacking-washing-m
 achines
END:VEVENT
BEGIN:VEVENT
SUMMARY:Bluetooth Headphone Jacking: A Key to Your Phone
DTSTART:20251227T220000Z
DTEND:20251227T230000Z
DTSTAMP:20260415T183921Z
UID:887fe87e-6ef2-5d94-98c8-f582cb22f442
CATEGORIES:official,Security
DESCRIPTION:Airoha is a vendor that\, amongst other things\, builds Blueto
 oth SoCs and offers reference designs and implementations incorporating th
 ese chips. They have become a large supplier in the Bluetooth audio space\
 , especially in the area of True Wireless Stereo (TWS) earbuds. Several re
 putable headphone and earbud vendors have built products based on Airoha
 ’s SoCs and reference implementations using Airoha’s Software Developm
 ent Kit (SDK).\n\nDuring our Bluetooth Auracast research we stumbled upon 
 a pair of these headphones. During the process of obtaining the firmware f
 or further research we initially discovered the powerful custom Bluetooth 
 protocol called *RACE*. The protocol provides functionality to take full c
 ontrol of headphones. Data can be written to and read from the device's fl
 ash and RAM.\n\nThe goal of this presentation is twofold. Firstly\, we wan
 t to inform about the vulnerabilities. It is important that headphone user
 s are aware of the issues. In our opinion\, some of the device manufacture
 rs have done a bad job of informing their users about the potential threat
 s and the available security updates. We also want to provide the technica
 l details to understand the issues and enable other researchers to continu
 e working with the platform. With the protocol it is possible to read and 
 write firmware. This opens up the possibility to patch and potentially cus
 tomize the firmware.\n\nSecondly\, we want to discuss the general implicat
 ions of compromising Bluetooth peripherals. As smart phones are becoming i
 ncreasingly secure\, the focus for attackers might shift to other devices 
 in the environment of the smart phone. For example\, when the Bluetooth Li
 nk Key\, that authenticates a Bluetooth connection between the smart phone
  and the peripheral is stolen\, an attacker might be able to impersonate t
 he peripheral and gain its capabilities.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/bluetooth-headpho
 ne-jacking-a-key-to-your-phone
END:VEVENT
BEGIN:VEVENT
SUMMARY:Unnecessarily Complicated Kitchen – Die Wissenschaft des guten G
 eschmacks
DTSTART:20251227T232000Z
DTEND:20251228T002000Z
DTSTAMP:20260415T183921Z
UID:341961a3-599d-52b9-8262-34c1757c9698
CATEGORIES:official,Entertainment
DESCRIPTION:Willkommen in der „Unnecessarily Complicated Kitchen“ – 
 einer Küche\, in der Naturwissenschaft\, Technik und kulinarisches Chaos 
 aufeinandertreffen.\nWir sezieren das Kochen aus der Perspektive von Hacke
 r*innen: Warum Hitzeübertragung ein deinen Tschunk kühlt\, warum Emulsio
 nen wie BGP funktionieren und wie sich die Kunst des Abschmeckens in Daten
 punkten erklären lässt.\n\nIn diesem Talk verbinden wir naturwissenschaf
 tliche Experimente mit kulinarischer Praxis. Wir erhitzen\, rühren\, mess
 en und analysieren – live auf der Bühne. Dabei übersetzen wir Physik u
 nd Chemie in Geschmack\, Textur und Aha-Momente.\nKochen wird so zum Labor
 versuch\, zum Hack\, zum Reverse Engineering des guten Geschmacks.\n\nIch 
 zeige\, dass hinter jeder gelungenen Marinade ein Protokoll steckt\, hinte
 r jeder Soße ein Algorithmus – und dass man auch in der Küche mit Tria
 l & Error\, Open Source und einer Prise Chaos zu erstaunlichen Ergebnissen
  kommt.\n\nAm Ende steht nicht nur Erkenntnis\, sondern auch Genuss: Denn 
 wer versteht\, warum etwas schmeckt\, kann die Regeln brechen – und sie 
 dabei besser würzen.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/unnecessarily-com
 plicated-kitchen-die-wissenschaft-des-guten-geschmacks
END:VEVENT
BEGIN:VEVENT
SUMMARY:Protecting the network data of one billion people: Breaking networ
 k crypto in popular Chinese mobile apps
DTSTART:20251228T100000Z
DTEND:20251228T110000Z
DTSTAMP:20260415T183921Z
UID:a19d5bca-7949-5353-abaf-1c43655f7c26
CATEGORIES:not recorded,official,Security
DESCRIPTION:TLS is not as universal as we might think. Applications with h
 undreds of millions of active users continue to use insecure\, home-rolled
  proprietary network encryption to protect sensitive user data. This talk 
 demonstrates that this is a widespread and systemic issue affecting a larg
 e portion of the most popular applications in the world. These issues are 
 particularly concentrated in mobile applications developed in China\, whic
 h have been overlooked by the global security community despite their mass
 ive popularity and influence.\n\nWe found that 47.6% of top Mi Store appli
 cations used proprietary network cryptography without any additional encry
 ption\, compared to only 3.51% of top Google Play Store applications. We a
 nalyzed the most popular of these protocols\, including cryptosystems desi
 gned by Alibaba\, iQIYI\, Kuaishou\, and Tencent. Of the top 9 protocol fa
 milies\, we discovered vulnerabilities in 8 that allowed network eavesdrop
 pers to decrypt underlying data. We also discovered additional vulnerabili
 ties in several other protocols used by apps with hundreds of millions of 
 users.\n\nThrough the vulnerabilities fixed as a result of this work\, thi
 s research has directly improved the network security of up to one billion
  people. However\, there were hundreds more proprietary protocols used by 
 popular applications that we discovered. Verifying all of their security t
 hrough manual reverse-engineering and vulnerability reporting is not feasi
 ble at this scale. What can we do as a community to fix this systemic issu
 e and prevent such failures from occurring in the future?
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/protecting-the-ne
 twork-data-of-one-billion-people-breaking-network-crypto-in-popular-chines
 e-mobile-apps
END:VEVENT
BEGIN:VEVENT
SUMMARY:Skynet Starter Kit: From Embodied AI Jailbreak to Remote Takeover 
 of Humanoid Robots
DTSTART:20251228T111500Z
DTEND:20251228T121500Z
DTSTAMP:20260415T183921Z
UID:e6837a00-672c-532b-9bfa-319453667c03
CATEGORIES:official,Security
DESCRIPTION:Unitree is among the highest-volume makers of commercial robot
 s\, and their newest humanoid platforms ship with multiple control stacks 
 and on-device AI agents. If the widespread\, intrusive presence of these r
 obots in our lives is inevitable\, should we take the initiative to ensure
  they are completely under our control? What paths might attackers use to 
 compromise these robots\, and to what extent could they threaten the physi
 cal world?\n\nIn this talk\, we first map the complete attack surface of 
 Unitree humanoids\, covering hardware interfaces\, near-field radios and
  Internet-accessible channels. We demonstrate how a local attacker can hi
 jack a robot by exploiting vulnerabilities in short-range radio communicat
 ions (Bluetooth\, LoRa) and local Wi-Fi. We also present a fun exploit of 
 the embodied AI in the humanoid: With a single spoken/text sentence\, we j
 ailbreak the on-device LLM Agent and pivot to root-priviledged remote cod
 e execution. Combined with a flaw in the cloud management service\, this f
 orms a full path to gain complete control over any Unitree robot connected
  to the Internet\, obtaining root shell\, camera livestreaming\, and speak
 er control.\n\nTo achieve this\, we combined hardware inspection\, firmwar
 e extraction\, software-defined radio tooling\, and deobfuscation of cust
 omized\, VM-based protected binaries. This reverse engineering breakthroug
 h also allowed us to understand the overall control logic\, patch decision
  points\, and unlock advanced robotic movements that were deliberately di
 sabled on consumer models like G1 AIR. \n\nTakeaways. Modern humanoids ar
 e networked\, AI-powered cyber-physical systems\; weaknesses across radios
 \, cloud services\, and on-device agents could allow attackers to remotely
  hijack robot operations\, extract sensitive data or camera livestreams\, 
 or even weaponize the physical capabilities. As robotics continue their tr
 ansition from controlled environments to everyday applications\, our work 
 highlights the urgent need for security-by-design in this emerging technol
 ogy landscape.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/skynet-starter-ki
 t-from-embodied-ai-jailbreak-to-remote-takeover-of-humanoid-robots
END:VEVENT
BEGIN:VEVENT
SUMMARY:A post-American\, enshittification-resistant internet
DTSTART:20251228T123000Z
DTEND:20251228T133000Z
DTSTAMP:20260415T183921Z
UID:c9f5a6df-6c79-5492-b3e0-110347358445
CATEGORIES:official,Ethics\, Society & Politics
DESCRIPTION:Enshittification wasn't an accident. It also wasn't inevitable
 . This isn't the iron laws of economics at work\, nor is it the great forc
 es of history.\n\nEnshittification was a choice: named individuals\, in li
 ving memory\, enacted policies that created the enshittogenic environment.
  They created a world that encouraged tech companies to merge to monopoly\
 , transforming the internet into "five giant websites\, each filled with s
 creenshots of the other four." They let these monopolists rip us off and s
 py on us. \n\nAnd they banned us from fighting back\, claiming that anyone
  who modified a technology without permission from its maker was a pirate 
 (or worse\, a terrorist). They created a system of "felony contempt of bus
 iness-model\," where it's literally a crime to change how your own devices
  work. They declared war on the general-purpose computer and demanded a co
 mputer that would do what the manufacturer told it to do (even if the owne
 r of the computer didn't want that).\n\nWe are at a turning point in the d
 ecades-long war on general-purpose computing. Geopolitics are up for grabs
 . The future is ours to seize. \n\nIn my 24 years with EFF\, I have seen m
 any strange moments\, but never one quite like this. There's plenty of ter
 rifying things going on right now\, but there's also a massive\, amazing\,
  incredibly opportunity to seize the means of computation. \n\nLet's take 
 it. '
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/a-post-american-e
 nshittification-resistant-internet
END:VEVENT
BEGIN:VEVENT
SUMMARY:Chaospager - How to construct an Open Pager System for c3
DTSTART:20251228T134500Z
DTEND:20251228T142500Z
DTSTAMP:20260415T183921Z
UID:f9204594-d3f2-5c45-ba71-542a99eb9e5d
CATEGORIES:official,Hardware
DESCRIPTION:At 38c3\, we conducted an experiment to test out our self-buil
 t POCSAG Pager infrastructure. Together with DL0TUH and CERT\, we are now 
 working on an open pager solution leveraging well-known components in the 
 maker commmunity (e.g. ESP32\, SX1262) to support the alarming of action f
 orces at c3 events. In this talk\, we will guide you through the process o
 f developing such a project\, problems that are occuring and what our futu
 re plans are.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/chaospager-how-to
 -construct-an-open-pager-system-for-c3
END:VEVENT
BEGIN:VEVENT
SUMMARY:Cracking open what makes Apple's Low-Latency WiFi so fast
DTSTART:20251228T144000Z
DTEND:20251228T152000Z
DTSTAMP:20260415T183921Z
UID:c8fe18e8-6cd5-5354-aad7-1a51e64fd529
CATEGORIES:official,Hardware
DESCRIPTION:Apple's Continuity features make up a big part of their walled
  garden. From AirDrop and Handoff to AirPlay\, they all connect macOS and 
 iOS devices wirelessly. In recent years\, security researchers have opened
  up several of these features showing that the Apple ecosystem is technica
 lly compatible with third-party devices.\n\nIn this talk\, we present the 
 internal workings of Low-Latency WiFi (LLW) – Apple's link-layer protoco
 l for several real-time Continuity features like Continuity Camera and Sid
 ecar Display. We talk about the concepts behind LLW\, how it achieves its 
 low-latency requirement and how we got there in the reverse engineering pr
 ocess.\n\nWe also present the tooling we built to enable more kernel-level
  tracing and logging on iOS through a reimplementation of cctool from macO
 S and the source code of trace that was buried deep inside of Apple’s op
 en-source repository system_cmds. We build a log aggregator that combines 
 various kernel- and user-space traces\, log messages and pcap files from b
 oth iOS and macOS into a single file and finally investigate the network s
 tack on Apple platforms that is implemented in both user- and kernel space
 . There we find interesting configuration values of LLW that make it the g
 o-to link-layer protocol for Apple's proprietary real-time Continuity appl
 ications.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/cracking-open-wha
 t-makes-apple-s-low-latency-wifi-so-fast
END:VEVENT
BEGIN:VEVENT
SUMMARY:CCC-Jahresrückblick
DTSTART:20251228T153500Z
DTEND:20251228T171500Z
DTSTAMP:20260415T183921Z
UID:49b35210-41ea-547d-86da-1ca62612c7b6
CATEGORIES:official,CCC & Community
DESCRIPTION:2025 war ein gutes Jahr für Exploits\, kein gutes Jahr für d
 ie Freiheit und ein herausragendes für schlechte Ideen. Regierungen kämp
 ften weiter für Massenüberwachung\, natürlich mit KI-Unterstützung™.
  Kriege wurden weiter „digitalisiert“\, Chatkontrolle als Kinderschutz
  verkauft\, Waffensysteme haben inzwischen mehr Autonomie als die meisten 
 Bürger*innen und künstliche Intelligenz löst endlich alle Probleme – 
 vor allem die\, die bisher niemand hatte.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/ccc-jahresruckbli
 ck
END:VEVENT
BEGIN:VEVENT
SUMMARY:In-house electronics manufacturing from scratch: How hard can it b
 e?
DTSTART:20251228T181500Z
DTEND:20251228T185500Z
DTSTAMP:20260415T183921Z
UID:151d4fb0-5d25-586b-8063-c7706bbd9094
CATEGORIES:official,Hardware
DESCRIPTION:Our industry needs a reboot as well\, it no longer serves the 
 people.\n\nOur work is based on our belief that high-quality high-mix/low 
 volume manufacturing of electronics in Europe is economically viable and a
 ccessible to small companies with a lower-than-expected up-front investmen
 t.\n\nWe believe that relocation of industry to Europe depends on small in
 novative companies\, and will not come from slow and bloated industry gian
 ts whose products are victims of enshittification and maximum profit extra
 ction.\n\nBy using open-source hardware and software whenever possible\, w
 e are attempting to set up our own production operation in Hamburg and we 
 want to share the solutions and enable others to do the same and collectiv
 ely reclaim ownership of the means of production.\n\nWe will cover:\n- How
  we acquired and set up production machines\, their costs\, and our learni
 ngs\n- Quirks of paste printing and reflow soldering at scale (up to 50 ba
 tches a day)\n- Component inventory\, tracking\, DfM\, etc.\n- How OpenPnP
  is a key enabler of our prcesses\n    - Our proposed changes to OpenPnP\n
     - Our work integrated Siemens Siplace Feeders in OpenPnP\n\nCheck out 
 our ressources on the topic at https://eilbek-research.de/blog/thank-you-f
 or-attending-our-talk-at-39c3/
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/in-house-electron
 ics-manufacturing-from-scratch-how-hard-can-it-be
END:VEVENT
BEGIN:VEVENT
SUMMARY:freiheit.exe - Utopien als Malware
DTSTART:20251228T191000Z
DTEND:20251228T195000Z
DTSTAMP:20260415T183921Z
UID:4c285dd4-58fc-5378-9434-628f7871ee9f
CATEGORIES:official,Art & Beauty
DESCRIPTION:Ich lade das CCC-Publikum ein\, die Betriebssysteme hinter uns
 eren Betriebssystemen zu untersuchen.\nWährend wir uns mit Verschlüsselu
 ng\, Datenschutz und digitaler Selbstbestimmung beschäftigen\, installier
 en Tech-Milliardäre ihre Weltanschauungen als Default-Einstellungen unser
 er digitalen Infrastruktur. Die Recherchen beleuchten die mitgelieferte Ma
 lware.\n\nIch navigiere durch die Ideengeschichte zwischen Marinettis Futu
 ristischem Manifest (1909) und Musks Mars-Kolonien\, von den ersten Progra
 mmiererinnen zur Eroberung des Alls\, von neoliberalen Think Tanks zur Sch
 uldenbremse\, von nationalen Christen zu Pronatalisten.\nInvestigative Rec
 herche trifft auf performative Vermittlung. \nMit O-Tönen von Peter Thiel
 \, Nick Land und anderen zeigt die Lecture ideologische Verbindungslinien 
 zwischen Theoretikern autoritär-technoider Träume und den Visionen der T
 ech-Oligarchen auf:\n\nEs geht um „Freedom Cities“\, Steuerflucht und 
 White Supremacy.\nUm Transhumanismus als Upgrade-Zwang bis hin zu neo-euge
 nischen Gedanken.\nUm Akzeleration als politische Strategie: Geschwindigke
 it statt Reflexion\, Disruption statt Demokratie\, Kolonisierung – jetzt
  auch digital.\n\nAus Theaterperspektive betrachte ich das Revival der Cä
 saren und die Selbstinszenierung von Tech-CEOs als Künstler\, Priester od
 er Genies. \nUnd mit der Investigativ Reporterin Sylke Grunwald habe ich r
 echerchiert\, was all das mit den Debatten rund um Palantir zu tun hat.\n\
 nDie scheinbar alternativlose Logik von "Move Fast and Break Things" ist n
 icht unvermeidlich – sie ist gewollt\, gestaltet\, ideologisch aufgelade
 n.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/freiheit-exe-utop
 ien-als-malware
END:VEVENT
BEGIN:VEVENT
SUMMARY:Verlorene Domains\, offene Türen - Was alte Behördendomains verr
 aten
DTSTART:20251228T200500Z
DTEND:20251228T204500Z
DTSTAMP:20260415T183921Z
UID:6a747cc1-1320-5027-b7f9-050a6f3b2134
CATEGORIES:official,Security
DESCRIPTION:Im Rahmen der Untersuchung zeigten sich nicht nur Fehlkonfigur
 ationen\, sondern auch Phänomene wie Bitsquatting und Typoquatting innerh
 alb der Verwaltungsnetze. Mit dem Betrieb eines DNS-Servers und dem Erwerb
  von bund.ee (naher Typosquatting/Bitquatting zu bund.de) konnten u.a. zah
 lreiche DNS-Anfragen von Servern des Bundesministerium des Innern (BMI) un
 d weiterer Einrichtungen des Bundes empfangen werden.\n\nDer Vortrag beleu
 chtet die technischen und organisatorischen Schwachstellen\, die hinter so
 lchen Vorgängen stehen - und zeigt\, wie DNS-Details Einblicke in die IT-
 Infrastruktur des Staates ermöglichen können. Abgerundet wird das Ganze 
 durch praktische Beispiele\, Datenanalysen und Empfehlungen\, wie sich äh
 nliche Vorfälle künftig vermeiden lassen.\n\nIn anderen Ländern sind go
 v-Domains als TLDs längst üblich (bspw. gov.uk) - in Deutschland ist bun
 d.de oder gov.de allerdings nicht so verbreitet wie man glaubt\, unter and
 erem da Bundesministerien eigene Domains nutzen oder nach Regierungsbildun
 g umbenannt werden.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/verlorene-domains
 -offene-turen-was-alte-behordendomains-verraten
END:VEVENT
BEGIN:VEVENT
SUMMARY:Don’t look up: There are sensitive internal links in the clear o
 n GEO satellites
DTSTART:20251228T210500Z
DTEND:20251228T214500Z
DTSTAMP:20260415T183921Z
UID:832b4de9-1ee3-5905-a4dc-692a71ac87d3
CATEGORIES:official,Security
DESCRIPTION:In this talk\, we will cover our hardware setup\, alignment te
 chniques\, our parsing code\, and survey some of the surprising finds in t
 he data.  This talk will include some previously unannounced results.  Thi
 s data can be passively observed by anyone with a few hundred dollars of c
 onsumer-grade hardware. There are thousands of geostationary satellite tra
 nsponders globally\, and data from a single transponder may be visible fro
 m an area as large as 40% of the surface of the earth.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/don-t-look-up-the
 re-are-sensitive-internal-links-in-the-clear-on-geo-satellites
END:VEVENT
BEGIN:VEVENT
SUMMARY:Xous: A Pure-Rust Rethink of the Embedded Operating System
DTSTART:20251228T220000Z
DTEND:20251228T224000Z
DTSTAMP:20260415T183921Z
UID:d92af8c4-40fb-54e2-9535-bcc683f4a010
CATEGORIES:official,Hardware
DESCRIPTION:The world is full of small\, Internet-of-Things (IoT) gadgets 
 running embedded operating systems. These devices generally fall into two 
 categories: larger devices running a full operating system using an MMU wh
 ich generally means Linux\, or smaller devices running without an MMU usin
 g operating systems like Zephyr\, chibios\, or rt-thread\, or run with no 
 operating system at all. The software that underpins these projects is wri
 tten in C with coarse hardware memory protection at best. As a result\, th
 ese embedded OSes lack the security guarantees and/or ergonomics offered b
 y modern languages and best practices.\n\nThe Xous microkernel borrows con
 cepts from heavier operating systems to modernize the embedded space. The 
 open source OS is written in pure Rust with minimal dependencies and an em
 phasis on modularity and simplicity\, such that a technically-savvy indivi
 dual can audit the code base in a reasonable period of time. This talk cov
 ers three novel aspects of the OS: its incorporation of hardware memory vi
 rtualization\, its pure-Rust standard library\, and its message passing ar
 chitecture.\n\nDesktop OSes such as Linux require a hardware MMU to virtua
 lize memory. We explain how ARM has tricked us into accepting that MMUs ar
 e hardware-intensive features only to be found on more expensive “applic
 ation” CPUs\, thus creating a vicious cycle where cheaper devices are fo
 rced to be less safe. Thanks to the open nature of RISC-V\, we are able to
  break ARM’s yoke and incorporate well-established MMU-based memory prot
 ection into embedded hardware\, giving us security-first features such as 
 process isolation and encrypted swap memory. In order to make Xous on real
  hardware more accessible\, we introduce the Baochip-1x\, an affordable\, 
 mostly-open RTL 22nm SoC configured expressly for the purpose of running X
 ous. The Baochip-1x features a Vexriscv CPU running at 400MHz\, 2MiB of SR
 AM\, 4MiB of nonvolatile RRAM\, and a quad-core RV32E-derivative I/O accel
 erator called the “BIO”\, based on the PicoRV clocked at 800MHz.\n\nMo
 st Rust targets delegate crucial tasks such as memory allocation\, network
 ing\, and threading to the underlying operating system’s C standard libr
 ary. We want strong memory safety guarantees all the way down to the memor
 y allocator and task scheduler\, so for Xous we implemented our standard l
 ibrary in pure Rust. Adhering to pure Rust also makes cross-compilation an
 d cross-platform development a breeze\, since there are no special compile
 r or linker concerns. We will show you how to raise the standard for “Pu
 re Rust” by implementing a custom libstd.\n\nXous combines the power of 
 page-based virtual memory and Rust’s strong borrow-checker semantics to 
 create a safe and efficient method for asynchronous message passing betwee
 n processes. This inter-process communication model allows for easy separa
 tion of different tasks while keeping the core kernel small. This process 
 maps well onto the Rust "Borrow / Mutable Borrow / Move" concept and treat
 s object passing as an IPC primitive. We will demonstrate how this works n
 atively and give examples of how to map common programming algorithms to s
 huttle data safely between processes\, as well as give examples of how we 
 implement features such as scheduling and synchronization primitive entire
 ly in user space.\n\nWe conclude with a short demo of Xous running on the 
 Baochip-1x\, bringing Xous from the realm of emulation and FPGAs into ever
 yday-user accessible physical silicon.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/xous-a-pure-rust-
 rethink-of-the-embedded-operating-system
END:VEVENT
BEGIN:VEVENT
SUMMARY:Code to Craft: Procedural Generation for the Physical World
DTSTART:20251228T225500Z
DTEND:20251228T233500Z
DTSTAMP:20260415T183921Z
UID:6938a1f1-4ee3-5fca-ae37-d59274e529de
CATEGORIES:official,Art & Beauty
DESCRIPTION:In this talk\, I will share practical insights from developing
  procedural generation tools for physical objects: ranging from stickers a
 nd paper lanterns to printed circuit boards and even furniture. I will out
 line key challenges and considerations when generating designs for fabrica
 tion tools such as laser cutters or pen plotters\, as well as how to adapt
  procedural systems so they can be reproduced by a wide audience (not ever
 yone has access to CNC machines or industrial equipment\, sadly!).\n\nBeyo
 nd technical considerations\, I aim to encourage attendees to translate th
 eir own generative ideas into tangible artifacts and to foster a culture o
 f open-sourcing and knowledge sharing within the community.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/code-to-craft-pro
 cedural-generation-for-the-physical-world
END:VEVENT
BEGIN:VEVENT
SUMMARY:GPTDash – Der Reverse-Turing-Test
DTSTART:20251229T000000Z
DTEND:20251229T013000Z
DTSTAMP:20260415T183921Z
UID:9c8bec33-f71a-5090-857d-1648a027c8a9
CATEGORIES:official,Entertainment
DESCRIPTION:In unserem Reverse-Turing-Test schlüpfen die Teilnehmenden in
  die Rolle einer KI und versuchen so robotisch-menschlich wie möglich zu 
 klingen. In einer anschließenden Blindstudie prüfen wir\, wer sich am be
 sten unter KIs mischen und beim nächsten Robot Uprising die Spionin der W
 ahl wäre.\n\nHumor\, Kreativität und ein Hang zu allgemeingültigen\, ni
 chtssagenden Floskeln sind die perfekten Voraussetzungen! Ein digitales En
 dgerät (Smartphone\, Tablet\, Laptop\, …) reicht zum Mitspielen aus.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/gptdash-der-rever
 se-turing-test
END:VEVENT
BEGIN:VEVENT
SUMMARY:Greenhouse Gas Emission Data: Public\, difficult to access\, and n
 ot always correct
DTSTART:20251229T100000Z
DTEND:20251229T104000Z
DTSTAMP:20260415T183921Z
UID:dd990a78-1e11-5c5e-aef4-6eb0214c772a
CATEGORIES:official,Science
DESCRIPTION:Which factory in my city is the largest emitter of CO2? Which 
 industrial sector is\nresponsible for the largest share of a country's con
 tribution to climate change? It\nshould not be difficult to answer these q
 uestions. Public databases and reporting\nrequired by international agreem
 ents usually allow us to access this data.\n\nHowever\, trying to access a
 nd work with these datasets — or\, shall we say\, Excel tables\n— can 
 be frustrating. UN web pages that prevent easy downloads with a "security\
 nfirewall"\, barely usable frontends\, and other issues make it needlessly
  difficult to\ngain transparency about the sources of climate pollution.\n
 \nWhile working with official EU datasets\, the speaker observed data poin
 ts that could not\npossibly be true. Factories suddenly dropped their emis
 sions by orders of magnitude\nwithout any explanation\, different official
  sources report diverging numbers for the\nsame emission source\, and resp
 onsible European and National authorities appear not to\ncare that much.\n
 \nThe talk will show how to work with relevant greenhouse gas emission dat
 a sources and\nhow we can access them more easily by converting them to st
 andard SQL tables. Furthermore\, we will dig into some of the\nstrange iss
 ues one may find while investigating emission datasets.\n\n# Background / 
 Links\n\n* Why is it needlessly difficult to access UNFCCC Emission Data? 
 [https://industrydecarbonization.com/news/why-is-it-needlessly-difficult-t
 o-access-unfccc-emission-data.html](https://industrydecarbonization.com/ne
 ws/why-is-it-needlessly-difficult-to-access-unfccc-emission-data.html)\n* 
 UNFCCC Emission Data Downloads: [https://industrydecarbonization.com/docs/
 unfccc/](https://industrydecarbonization.com/docs/unfccc/)\n* Code (Docker
 \, MariaDB/MySQL\, phpMyAdmin) to easily access EU emisison data: [https:/
 /github.com/decarbonizenews/ghgsql](https://github.com/decarbonizenews/ghg
 sql)\n* Errors and Inconsistencies in European Emission Databases: [https:
 //industrydecarbonization.com/news/errors-and-inconsistencies-in-european-
 emission-data.html](https://industrydecarbonization.com/news/errors-and-in
 consistencies-in-european-emission-data.html)\n* Slides: [https://slides.h
 boeck.de/39c3-climatedata/](https://slides.hboeck.de/39c3-climatedata/)
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/greenhouse-gas-em
 ission-data-public-difficult-to-access-and-not-always-correct
END:VEVENT
BEGIN:VEVENT
SUMMARY:Celestial navigation with very little math
DTSTART:20251229T105500Z
DTEND:20251229T113500Z
DTSTAMP:20260415T183921Z
UID:967b7f53-aa2b-578b-9403-e1ba380cda15
CATEGORIES:official,Hardware
DESCRIPTION:Since the dawn of time people have asked themselves: where am 
 I and why am I here?  This talk won't help you answer the why question\, b
 ut it will discuss how determine the where in the pre-GPS age of sextants\
 , slide rules and stopwatches by taking the noon sight\, aka the meridian 
 passage.\n\nThe usual way to find your position using the Sun requires a l
 arge almanac of lookup tables and some challenging math.  The books are fr
 ustrating to consult on every sight and the base 60 degree-minute-second m
 ath is frustrating even with a calculator\, and if you're on a traditional
  ship it seems wrong to do traditional navigation with electronic devices.
 \n\nTo speed up the process I’ve designed a specialized circular slide r
 ule that handles most of the table lookups to correct height of eye\, semi
 -diameter\, temperature\, refraction and index errors\, and also simplifie
 s the degree-minute-second arithmetic required to calculate the exact decl
 ination of the Sun.\n\nIn this talk I’ll demonstrate how to make your ow
 n printable paper slide rule and use it to reduce the meridian passage mea
 surement to a lat/lon with just a few rotations of the wheels and pointer\
 , no electronics or bulky books necessary!
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/celestial-navigat
 ion-with-very-little-math
END:VEVENT
BEGIN:VEVENT
SUMMARY:What Makes Bike-Sharing Work? Insights from 43 Million Kilometers 
 of European Cycling Data
DTSTART:20251229T115000Z
DTEND:20251229T123000Z
DTSTAMP:20260415T183921Z
UID:4914b889-5003-561f-90a8-5371fc09a946
CATEGORIES:official,Science
DESCRIPTION:We are Felix\, Georg\, and Martin - each of us working profess
 ionally in different research and data areas\, ranging from the future of 
 mobility to computational fluid dynamics and machine learning. What unites
  us is our shared interest in **quantitative traffic analyses**. Building 
 on earlier small-scale studies focused on individual cities\, we set out t
 o launch a project that captures shared bike system data across Europe - f
 rom regular bikes to e-bikes.\n\nIn our study\, which led to an **[open-ac
 cess scientific publication](https://doi.org/10.1007/s11116-025-10661-2)**
 \, we scraped shared bike data across Europe at a **minute-by-minute level
 ** over many months\, accumulating **more than 43 million records**. We an
 alyze **behavioural and systemic patterns** to understand what makes a bik
 e-sharing system useful and successful within a city. As such\, this evide
 nce-based research fits very well with the **39C3 Science track** and the 
 theme of "**Power Cycles**" as we dissect the complex energy and usage cyc
 les that define urban mobility and sustainable futures for everyone. We br
 idge the gap between urban planning\, socioeconomics\, and technology by a
 pplying statistical modeling and engineering knowledge to a large-scale mi
 ned dataset. Join us to learn whether right-wing politics stall sustainabl
 e mobility\, or which climate e-bikes feel most comfortable in!\n\nWe love
  going the extra mile and therefore provide a live\, interactive demo that
  everyone can use to explore and understand traffic flows: [bikesharingflo
 wmap.de](https://bikesharingflowmap.de/). Therefore\, attendees will be ab
 le to play with the data in a self-service way. We also provide all code o
 n GitHub and the complete dataset on HuggingFace. And\, of course\, we wil
 l also discuss how both bike-sharing operators and our boss reacted when w
 e told them about the dataset we already had collected (spoiler: lawyers w
 ere involved\, yet it’s still available for downloads…).
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/what-makes-bike-s
 haring-work-insights-from-43-million-kilometers-of-european-cycling-data
END:VEVENT
BEGIN:VEVENT
SUMMARY:Wer hat Angst vor dem Neutralitätsgebot?
DTSTART:20251229T125000Z
DTEND:20251229T133000Z
DTSTAMP:20260415T183921Z
UID:94c5aafc-0742-500b-92bd-ca6f2ceb37a1
CATEGORIES:official,Ethics\, Society & Politics
DESCRIPTION:„Neutralität“ wird zum neuen Kampfbegriff: Weil sie gegen
  die menschenfeindliche Politik von Friedrich Merz protestieren\, wirft di
 e CDU Gruppen wie Omas gegen Rechts\, Greenpeace und Correctiv vor\, nicht
  neutral zu sein. Unter Berufung auf ein angeblich verletztes Neutralität
 sgebot werden staatliche Förderungen gestrichen und NGOs geraten unter Be
 obachtung des Verfassungsschutzes.\nJulia Klöckner verbietet im Namen der
  „Neutralität“ Palestine-Shirts\, Anstecknadeln und Regenbogenflaggen
  im Parlament. Die AfD fordert dazu auf\, Lehrkräfte zu melden\, die sich
  gegen Rechtsextremismus einsetzen oder entsprechende Positionen innerhalb
  der AfD kritisieren.\nDoch was steckt dahinter?\nWas bedeutet das sogenan
 nte Neutralitätsgebot – und für wen gilt es überhaupt?\nUnd für wen 
 gilt es nicht?\nZivilcourage kann nicht neutral sein – und soll es auch 
 nicht sein. Genauso wie AfD-Hetze gegen Migrant*innen nicht „neutral“ 
 ist\, ist die Kritik menschenfeindlicher Äußerungen nicht nur legitim\, 
 sondern Pflicht demokratischer Bürger*innen. Das Beschwören eines „Neu
 tralitätsgebots“ für NGOs ist ein durchschaubarer\, aber gefährlicher
  Versuch\, sie der eigenen Position zu unterwerfen.\nDie Rechtsanwältinne
 n Vivian Kube und Hannah Vos erklären den verfassungsrechtlichen Hintergr
 und\, zeigen die autoritären Strategien hinter dem Ruf nach „Neutralit
 ät“ auf und geben Tipps\, wie man sich dagegen wehren kann.\nSie engagi
 eren sich im Projekt Gegenrechtschutz\, um demokratische Prinzipien und Be
 troffene vor rechtlichen Angriffen zu verteidigen.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/wer-hat-angst-vor
 -dem-neutralitatsgebot
END:VEVENT
BEGIN:VEVENT
SUMMARY:Supplements und Social Media – wenn der Online-Hype zur realen G
 esundheitsgefahr wird
DTSTART:20251229T134500Z
DTEND:20251229T144500Z
DTSTAMP:20260415T183921Z
UID:e5377df9-07f4-5c8c-b510-8f64e58d95e3
CATEGORIES:official,Science
DESCRIPTION:Der Markt für Nahrungsergänzungsmittel boomt seit Jahren. Da
 für sorgen unter anderem verschiedenste Influencer\, die die Präparate i
 n den sozialen Medien bewerben. Statt nur Produkte der großen Player in d
 iesem Bereich anzupreisen\, wie More Nutrition\, ESN oder Holy Energy\, ha
 ben einige Influencer mittlerweile sogar ihre eigenen Nahrungsergänzungsm
 ittelmarken auf den Markt gebracht.\n\nVersprochen wird dabei vieles: Pre-
 Workout-Booster sollen die Leistung beim Krafttraining erhöhen und blitzs
 chnell zum Traumkörper verhelfen\, während Gaming-Booster Wachheit und e
 ine Top-Performance beim Zocken versprechen. Wieder andere Kapseln oder au
 ch Gummibärchen sollen für eine makellose Haut oder einen ruhigen Schlaf
  sorgen. Manche Präparate können angeblich sogar Krankheiten vorbeugen o
 der heilen.\n\nDoch was steckt tatsächlich in diesen Mitteln\, die online
  regelrecht gehypt werden? Rein rechtlich handelt es sich um Lebensmittel\
 , was wiederum bedeutet\, dass sie ohne behördliche Zulassung auf den Mar
 kt gebracht werden dürfen. Es genügt schon\, wenn der Unternehmer für d
 ie Sicherheit garantiert. Die Hürden für einen Marktzutritt sind damit d
 enkbar niedrig\, während gleichzeitig Gewinnmargen locken\, die sogar den
  illegalen Drogenhandel übertreffen.\n\nDas Ergebnis zeigt sich in den Be
 richten der amtlichen Lebensmittelüberwachung: Bei den Proben\, die das N
 iedersächsische Landesamt für Verbraucherschutz und Lebensmittelsicherhe
 it im Jahr 2024 untersucht hat\, entsprachen rund neun von zehn Proben (89
  %) nicht den rechtlichen Vorgaben. Neben Mängeln bei der Kennzeichnung u
 nd Bewerbung\, wodurch Verbraucher viel Geld für wirkungslose Pulver ausg
 eben\, ist die stoffliche Zusammensetzung der Produkte besonders kritisch.
  So kann beispielsweise die Einnahme von überdosierten Vitamin-D-Präpara
 ten zu Störungen des Calciumstoffwechsels führen (sog. Hypercalcämien).
  Vermeintlich harmlose pflanzliche Präparate\, wie Kurkuma oder Ashwagand
 a\, können zu Leberschäden bis hin zum Leberversagen führen. Besonders 
 brisant ist dabei\, dass die Wahrscheinlichkeit für die Erforderlichkeit 
 einer Lebertransplantation oder den Tod des Patienten höher ist als bei L
 eberschäden durch Arzneimittel (83 vs. 66 %). Es kommen also Menschen dur
 ch die Einnahme von Präparaten zu Schaden\, mit deren Hilfe sie ihrer Ges
 undheit eigentlich etwas Gutes tun wollten.\n\nDer Vortrag beleuchtet dahe
 r die aktuelle Marktsituation unter besonderer Berücksichtigung des Influ
 encer-Marketings kritisch\, erklärt den Unterschied zwischen Nahrungserg
 änzungs- und Arzneimitteln und stellt die rechtlichen Rahmenbedingungen f
 ür das Inverkehrbringen und die Bewerbung von Nahrungsergänzungsmitteln 
 dar. Zudem wird aufgezeigt\, warum ein ausreichender Verbraucherschutz dur
 ch die aktuellen Möglichkeiten des Lebensmittelrechts insbesondere im Int
 ernet nicht gewährleistet werden kann\, wo Handlungsbedarf für die Polit
 ik besteht und wie man sich selbst vor fragwürdigen Produkten schützen k
 ann.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/supplements-und-s
 ocial-media-wenn-der-online-hype-zur-realen-gesundheitsgefahr-wird
END:VEVENT
BEGIN:VEVENT
SUMMARY:Gegenmacht - Best of Informationsfreiheit
DTSTART:20251229T150000Z
DTEND:20251229T160000Z
DTSTAMP:20260415T183921Z
UID:755f1d78-c910-56cb-a37e-13870013bff6
CATEGORIES:official,Ethics\, Society & Politics
DESCRIPTION:Transparenz braucht Rechenschaft. Ohne Konsequenzen bleibt Tra
 nsparenz wirkungslos. Wie können wir also eine wirksame Gegenmacht schaff
 en\, die Veränderungen durchsetzt? \n\nPhilipp Amthors Angriff aufs Infor
 mationsfreiheitsgesetz konnten wir erst einmal abwehren - jetzt geht's in 
 die Offensive! Mit den Highlights aus Strafanzeigen gegen Alexandeer Dobri
 ndt\, Spahns geleaktem Maskenbericht\, der Milliardärslobby im Wirtschaft
 sministerium und allen Steueroasen in Deutschland.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/gegenmacht-best-o
 f-informationsfreiheit
END:VEVENT
BEGIN:VEVENT
SUMMARY:Schlechte Karten - IT-Sicherheit im Jahr null der ePA für alle
DTSTART:20251229T161500Z
DTEND:20251229T171500Z
DTSTAMP:20260415T183921Z
UID:2b5a6a8e-327e-594d-8f92-b91201d18a02
CATEGORIES:official,Security
DESCRIPTION:Zum letzten Chaos Communication Congress konnten Martin Tschir
 sich und Bianca Kastl eine Ansammlung größerer und kleiner Sicherheitspr
 obleme in der elektronischen Patientenakte für alle aufzuzeigen – sei e
 s in der Ausgabe von Identifikationsmitteln\, in Systemen in der Telematik
 infrastruktur oder in angebundenen Systemen. All diese Probleme kumulierte
 n in einem veränderten und reduzierten Rollout der ePA für alle in den M
 odellregionen Anfang 2025\, bei dem bereits erste Maßnahmen zur Schadensm
 inimierung unternommen wurden. \nEnde April 2025 wurde die ePA für alle d
 ann auch wirklich für alle deutschlandweit bereitgestellt – allerdings 
 traten am gleichen Tag die scheinbar sicher gelösten Sicherheitslücken i
 m Zugangsmanagement wieder zu Tage und wurden alsbald wieder nur provisori
 sch abgedichtet.\n\nDieser Talk will etwas zurückblicken auf die Geschich
 te und die Ursachen dieser Sicherheitsprobleme der ePA für alle. Als «ei
 nes der größten IT-Projekte der Bundesrepublik» steht die ePA sinnbildl
 ich für den digitalpolitischen Umgang mit Sicherheitsversprechen und inte
 ressensgetriebenen Anforderungen über die Köpfe von Patient*innen oder B
 ürger*innen hinweg. \n\nDabei geht es nicht nur um technische Probleme un
 d deren Behebungsversuche\, sondern auch um die strukturellen Ursachen\, d
 ie große digitale Vorhaben immer wieder in manchen Bereichen scheitern la
 ssen. Diese tiefergehende Betrachtung kann uns dabei helfen\, die Ursachen
  für schlechte IT-Sicherheit auch bei zukünftigen digitalpolitischen Vor
 haben in Deutschland besser zu verstehen. Nicht für die ePA für alle und
  Anwendungen im Bereich der Telematikinfrastruktur\, sondern auch weit dar
 über hinaus.\n\nTiefergehende Analyse und Nachwirkungen zu 38C3 „Konnte
  bisher noch nie gehackt werden“: Die elektronische Patientenakte kommt 
 - jetzt für alle!
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/schlechte-karten-
 it-sicherheit-im-jahr-null-der-epa-fur-alle
END:VEVENT
BEGIN:VEVENT
SUMMARY:AI Agent\, AI Spy
DTSTART:20251229T181500Z
DTEND:20251229T191500Z
DTSTAMP:20260415T183921Z
UID:3e87bab2-575a-53be-8101-5d8144253646
CATEGORIES:official,Ethics\, Society & Politics
DESCRIPTION:The talk will provide a critical technical and political econo
 my analysis of the new privacy crisis emerging from OS and application lev
 el AI agents\, aimed at the 39C3 "Ethics\, Society & Politics" audience.\n
 \n1. Defining the Threat: The OS as a Proactive Participant (5 mins)\nWe w
 ill begin by defining "Agentic AI" in two contexts - imbibed into the oper
 ating system and deployed via critical gateway applications such as web br
 owsers. Traditionally\, the operating systems and browsers are largely neu
 tral enforcers of user agency\, managing resources and providing APIs for 
 applications to run reliably. We will argue that this neutrality is close 
 to being eliminated. The new paradigm shifts these applications into a pro
 active agent that actively observes\, records\, and anticipates user actio
 ns across all applications.The prime example for this analysis will be Mic
 rosoft’s "Recall" feature\, Google’s Magic Cue\, and OpenAI’s Atlas.
  Politically\, we will frame this not as a "feature" but as the implementa
 tion of pervasive\, non-consensual surveillance and remote-control infrast
 ructure. This "photographic memory" of and demand for non-differentiated a
 ccess to everything from private Signal messages to financial data to heal
 th data creates a catastrophic single point of failure\, making a single s
 ecurity breach an existential threat to a user's entire digital life. Ulti
 mately\, we hope to illustrate how putting our brains in a jar (with agent
 ic systems) is effectively a prompt injection attack against our own human
 ity.\n\n2. The Existential Threat to Application-Level Privacy (10 mins)\n
 The core of the talk will focus on what this means for privacy-first appli
 cations like Signal. We will explain the "blood-brain barrier" analogy: se
 cure apps are meticulously engineered to minimize data and protect communi
 cations\, relying on the OS to be a stable\, neutral foundation on which t
 o build. This new OS trend breaks that barrier. We will demonstrate how OS
 -level surveillance renders application-level privacy features\, including
  end-to-end encryption\, effectively useless. If the OS can screenshot a m
 essage before it's encrypted or after it's decrypted\, the promise of priv
 acy is broken\, regardless of the app's design. We will also discuss the u
 nsustainable "clever hacks" (like Signal using a DRM feature) that develop
 ers are forced to implement\, underscoring the need for a structural solut
 ion.\n\n3. An Actionable Framework for Remediation (20 mins)\nThe final\, 
 and most important\, part of the talk will move from critique to action. W
 e will present an actionable four-point framework as a "tourniquet" to add
 ress these immediate dangers:\n\na. Empower Developers: Demand clear\, off
 icially supported APIs for developers to designate individual applications
  as "sensitive" with the default posture being for such applications being
  opted-out of access by agentic systems (either OS or application based) (
 default opt-out)\n\nb. Granular User Control: Move beyond all-or-nothing p
 ermissions. Users must have explicit\, fine-grained control to grant or de
 ny AI access on an app-by-app basis.\n\nc. Mandate Radical Transparency: O
 S vendors and application developers must clearly disclose what data is ac
 cessed\, how it's used\, and how it's protected—in human-readable terms\
 , not buried in legalese. Laws and regulations must play an essential role
  but we cannot just wait for them to be enforced\, or it will be too late.
  \n\nd. Encourage and Protect Adversarial Research: We will conclude by re
 inforcing the need for a pro-privacy\, pro-security architecture by defaul
 t\, looking at the legal frameworks that govern these processes and why th
 ey need to be enforced\, and finally asking the attendees to continue expo
 sing vulnerabilities in such systems. It was only due to technically-groun
 ded collective outrage that Recall was re-architected by Microsoft and we 
 will need that energy if we are to win this war.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/ai-agent-ai-spy
END:VEVENT
BEGIN:VEVENT
SUMMARY:Blackbox Palantir
DTSTART:20251229T193000Z
DTEND:20251229T203000Z
DTSTAMP:20260415T183921Z
UID:bf34e289-afe1-59a8-8c1c-018b755772e3
CATEGORIES:official,Ethics\, Society & Politics
DESCRIPTION:Software von Palantir analysiert für Polizeien und Militär d
 eren Daten – dafür lizenzieren auch deutsche Polizeibehörden seit Jahr
 en die Analysesoftware Gotham des US-Unternehmens. Die Software verarbeite
 t strukturierte und unstrukturierte Informationen aus Polizeidatenbanken. 
 Die genauen Funktionsweisen sind für die Öffentlichkeit\, Gesetzgeber un
 d Kontrollbehörden jedoch nicht einsehbar. \n\nDas US-Unternehmen ist hoc
 humstritten und auch in Deutschland seit einigen Gesetzesinitiativen wiede
 r umkämpft – wegen seiner intransparenten Analysemethoden\, seiner Zusa
 mmenarbeit mit autoritären Staaten und seiner Nähe zur US-Regierung.\n\n
 Rechtlich ist der Einsatz von Analysetools wie von Palantir in Deutschland
  ohnehin komplex\, denn das Bundesverfassungsgericht hat 2023 deutliche Gr
 enzen für polizeiliche Datenanalysen gezogen. Dennoch haben mehrere Bunde
 sländer für ihre Polizeien Verträge oder streben sie an. Auch auf Bunde
 sebene wird der Einsatz für das Bundeskriminalamt und die Bundespolizei h
 itzig diskutiert.\n\nWie funktioniert Gotham und welche Gefahren gehen dam
 it einher?\nWelche Entwicklungen sind  im Bund und in den Ländern zu beob
 achten? Wie geht es weiter?\n\nWir wollen über den Stand der Dinge in Bun
 d und Ländern informieren und auch zeigen\, wie wir versuchen\, rechtlich
 e Vorgaben durchzusetzen. Denn die GFF und der CCC sind an Verfassungsbesc
 hwerden beteiligt\, unter anderem in Hessen\, Hamburg und zuletzt in Bayer
 n.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/blackbox-palantir
END:VEVENT
BEGIN:VEVENT
SUMMARY:10 years of Dieselgate
DTSTART:20251229T204500Z
DTEND:20251229T214500Z
DTSTAMP:20260415T183921Z
UID:a877c904-f887-588e-9637-9b1df2f019dd
CATEGORIES:official,Security
DESCRIPTION:10 years ago\, Felix spent a lot of sleepless nights on revers
 e-engineering the Diesel software that implemented the (by now) well-known
  "Acoustic Function" defeat device\; he presented my findings at the 32c3 
 and 33c3 in 2015 and 2016\, expecting this to be the last time we needed t
 o hear about this.\n\nLittle did he know about the extent of the Diesel em
 issions cheating. Since then he has analyzed many more vehicles\, learned 
 a bit or two about mechanical engineering problems of cars.\n\nKarsten\, w
 orking as a court-appraised expert\, will add his unique view on the chall
 enges in documenting software that was never meant to be understood by the
  public.\n\nThis talk will discuss methodologies of independent analysis o
 f highly dynamic systems that many people see as black boxes (but that\, o
 f course\, are not: they are just machines running software).
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/10-years-of-diese
 lgate
END:VEVENT
BEGIN:VEVENT
SUMMARY:Rowhammer in the Wild: Large-Scale Insights from FlippyR.AM
DTSTART:20251229T220000Z
DTEND:20251229T224000Z
DTSTAMP:20260415T183921Z
UID:1627c5c1-db61-5117-aa41-991850cc20a8
CATEGORIES:official,Security
DESCRIPTION:This will be a followup talk after our talk "Ten Years of Rowh
 ammer: A Retrospect (and Path to the Future)" at 38C3.\nIn the talk last y
 ear we gave an overview of the current state of Rowhammer and highlighted 
 that there are no large-scale prevalence studies.\nWe wanted to change tha
 t and asked the audience to participate in our large-scale study on Rowham
 mer prevalence.\n\nWe performed the large-scale study on Rowhammer prevale
 nce thanks to many volunteers supporting our study by measuring their syst
 ems.\nIn total\, we collected 1006 datasets on 822 different systems (some
  systems were measured multiple times).\nWe show that 126 of them (12.5%) 
 are affected by Rowhammer with our fully-automated setup.\nThis should be 
 seen as a lower bound\, since the preconditions required for effective too
 ls failed on ~50% of the systems.\nAmong many other insights\, we learned 
 that the fully-automated reverse-engineering of DRAM addressing functions 
 is still an open problem and we assume the actual number of affected syste
 ms to be higher as the 12.5% we measured in our study.\n\nNow\, one year a
 fter our talk at the 38C3\, we want to give an update on the current state
  of Rowhammer\, since multiple new insights were published in the last yea
 r:\nThe first reliable Rowhammer exploit on DDR5\, a JavaScript implementa
 tion of Rowhammer that works on current DDR4 systems\, and an ECC bypass o
 n DDR4\, just to name a few.\nAdditionally\, we want to present the result
 s of our large-scale study on Rowhammer prevalence which was supported by 
 the audience from last year's talk.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/rowhammer-in-the-
 wild-large-scale-insights-from-flippyr-am
END:VEVENT
BEGIN:VEVENT
SUMMARY:PRÜF
DTSTART:20251229T231500Z
DTEND:20251229T235500Z
DTSTAMP:20260415T183921Z
UID:35e68e53-852a-56a2-8b3c-1bc27ce7fbb0
CATEGORIES:official,Ethics\, Society & Politics
DESCRIPTION:Wir haben eine Forderung: „Alle Parteien\, die vom Verfassun
 gsschutz als rechtsextremer Verdachtsfall oder gesichert rechtsextrem eing
 estuft werden\, sollen durch das Bundesverfassungsgericht überprüft werd
 en.“ Wir demonstrieren so lange\, bis der Bundesrat die Prüfung formal 
 beantragt hat. PRÜF-Demos. Bald in allen Landeshauptstädten. Am 2. Samst
 ag. Jeden Monat.\n\nWarum beim Schutz der Demokratie nicht mal einen Ansat
 z wählen\, der so noch nicht probiert wurde? Nicht auf die anderen gucken
 \, sondern auf uns? Auf das gemeinsame? Auf Spaß? Das nutzen\, was wir ha
 ben und was wir können? Wir haben das Grundgesetz\, dessen Stärken einge
 setzt werden müssen. Wir haben uns\, Millionen Menschen\, die wir uns org
 anisieren können. Wir haben Ideen\, wir haben Geld\, wir haben Macht\, wi
 r haben Wissen. Bisher haben wir nicht einmal ansatzweise unsere Möglichk
 eiten ausgeschöpft und es wäre absurd\, wenn wir das nicht schaffen wür
 den\, die Freiheitliche Demokratische Grundordnung zu schützen.\n\nVortra
 g kann Spuren von Prüfen enthalten.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/pruf
END:VEVENT
BEGIN:VEVENT
SUMMARY:Die große Datenschutz-\, Datenpannen- und DS-GVO-Show
DTSTART:20251230T000000Z
DTEND:20251230T013000Z
DTSTAMP:20260415T183921Z
UID:6396165e-0c44-58d3-a345-a63966473508
CATEGORIES:official,Entertainment
DESCRIPTION:Datenschutz wird oftmals als lästige Pflicht wahrgenommen –
  aber was will und macht Datenschutz\, für was ist er sinnvoll und was is
 t zu beachten? In welche Stolperfallen können auch Nerds hineinfallen? **
 Die Datenschutz- und DSGVO-Show vermittelt spielerisch Datenschutzgrundlag
 en\,** bietet einen Einblick in die Praxis der Datenschutz-Aufsichtsbehör
 den und zeigt typische technische wie rechtliche Fehler im Umgang mit pers
 onenbezogenen Daten. Aber auch für Datenschutz-Profis und Superhirne sind
  einige harte Nüsse dabei.\n\nDer Moderator arbeitet beim Landesbeauftrag
 ten für den Datenschutz und die Informationsfreiheit Baden-Württemberg u
 nd berichtet aus der praktischen Arbeit einer Aufsichtsbehörde\, nennt re
 chtliche Grundlagen\, gibt Hinweise zu notwendigen technischen Maßnahmen 
 nach Artikel 32 DS-GVO und die oftmals schwierige Risikoabschätzung nach 
 „wir wurden gecybert“-Sicherheitsvorfällen.\n\nIm Quiz selbst müssen
  die Kandidat:innen in ihren Antworten praktische Lösungsvorschläge für
  häufige technische und rechtliche Probleme vorschlagen\, zum Beispiel we
 lche technischen Maßnahmen bei bestimmten Datenpannen nach dem „Stand d
 er Technik“ angebracht sind\, ob man als Website-Betreiber denn nun Goog
 le Analytics nutzen darf oder wie man sich gegen (rechtswidrige) Datensamm
 ler wehrt. Dadurch können Teilnehmer wie Zuschauer die praktische Anwendu
 ng der DS-GVO spielerisch lernen.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/die-groe-datensch
 utz-datenpannen-und-ds-gvo-show
END:VEVENT
BEGIN:VEVENT
SUMMARY:Asahi Linux - Porting Linux to Apple Silicon
DTSTART:20251230T100000Z
DTEND:20251230T104000Z
DTSTAMP:20260415T183921Z
UID:e0739bd6-f804-5fde-8cf6-fc940567bf45
CATEGORIES:official,Hardware
DESCRIPTION:In this talk\, you will learn how Apple Silicon hardware diffe
 rs from regular laptops or desktops.\nWe'll cover how we reverse engineere
 d the hardware without staring at disassembly but by using a thin hypervis
 or that traces all MMIO access and then wrote Linux drivers.\nWe'll also t
 alk about how upstreaming to the Linux kernel works and how we've signific
 antly decreased our downstream patches in the past year.\n\nAs an example\
 , we will use support for the Type-C ports and go into details why these a
 re so complex and required changes across multi subsystems.\n\nIn the end\
 , we'll briefly talk about M3/M4/M5 and what challenges we will have to ov
 ercome to get these supported.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/asahi-linux-porti
 ng-linux-to-apple-silicon
END:VEVENT
BEGIN:VEVENT
SUMMARY:CCC&T - Cosmic ray\, the Climate Catastrophe and Trains.
DTSTART:20251230T105500Z
DTEND:20251230T113500Z
DTSTAMP:20260415T183921Z
UID:471f65aa-7729-5e51-b849-4603cfac762f
CATEGORIES:official,Science
DESCRIPTION:The Dürremonitor is a programme that is often mentioned in th
 e German news when some regions experience drought. Alongside the Dürremo
 nitor and the underlying Mesoscale Hydrological Model (MHM)\, there is ong
 oing research at the UFZ concerning soil moisture. Some of these studies i
 nvolve measuring soil moisture using a technique called cosmic ray neutron
  sensing (CRNS). Rather than taking measurements\, the MHM uses a physics-
 based model incorporating precipitation forecasts to predict drought or fl
 ood. These two strategies for quantifying soil moisture are therefore in o
 pposition: the measurement-based approach (CRNS) and the modelling-based a
 pproach (MHM/Dürremonitor). CRNS is a relatively new method of measuring 
 soil moisture based on the proportion of neutrons reflected by the soil (t
 he principles were discovered in the 1980s\, but it has only recently beco
 me commercially applicable). This method has several advantages over previ
 ous soil moisture measurement methods: it is non-invasive\, easy to set up
 \, portable and can therefore be used on trains.\n\nIn the talk I will giv
 e an overview of the Dürremonitor and MHM and then focus on CRNS. I will 
 explain the physical principles behind the method\, how it is implemented 
 in practice by making serveys using trains.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/ccc-t-cosmic-ray-
 the-climate-catastrophe-and-trains
END:VEVENT
BEGIN:VEVENT
SUMMARY:Security of Cardiac Implantable Electronic Devices
DTSTART:20251230T115000Z
DTEND:20251230T123000Z
DTSTAMP:20260415T183921Z
UID:0cd9234b-1abb-5fa2-85a9-af1ec76569bb
CATEGORIES:not recorded,official,Security
DESCRIPTION:CIEDs may adversely affect patients implanted with such device
 s should their security be compromised. Although some efforts to secure th
 ese devices can be noted\, it has quite often been lacking and may thus en
 able patient harm or data confidentiality compromise by malicious actors. 
 Given the vast consequences of security vulnerabilities within this indust
 ry\, the author aims to provide insight into the challenges associated wit
 h designing security architectures for such platforms\, as well as possibl
 e methodology of researching these devices safely even when lacking manufa
 cturer cooperation and access to device programmers. \n\nData collected by
  CIEDs and transmitted through remote monitoring is an additional concern 
 for patients. Whilst research has shown that most manufacturers do respond
  in a timely and comprehensive fashion to GDPR requests\, immediate data a
 ccess is not yet possible and requires the patient to reach out to their d
 octors to obtain the requisite (event) data. A proposed solution is presen
 ted on how a patient communicator may be designed to allow patients intere
 sted in their autonomy to perform limited device interrogation in a safe a
 nd secure manner.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/security-of-cardi
 ac-implantable-electronic-devices
END:VEVENT
BEGIN:VEVENT
SUMMARY:Breaking BOTS: Cheating at Blue Team CTFs with AI Speed-Runs
DTSTART:20251230T125000Z
DTEND:20251230T133000Z
DTSTAMP:20260415T183921Z
UID:3d82c56b-fb2f-545f-b8f1-264c220c8f09
CATEGORIES:official,Security
DESCRIPTION:THE PLAN\n\nLive demonstrations of AI agents speed-running blu
 e team challenges\, including the failure modes that break investigations.
  We'll show both what happens when we try the trivial approaches like “j
 ust have claude do it”\, “AI workflows”\, and what ultimately worked
 \, like managed self-planning\, semantic SIEM layers\, and log agents. Mos
 t can be done with free and open tools and techniques on the cheap\, so we
  will walk through that as well.\n\nTHE DEEP DIVE\n\n* Why normal prompts 
 and static AI workflows fail\n* Self-planning investigation agents that ev
 olve task lists dynamically\n* What we mean by semantic layers for calling
  databases and APIs\n* How to handle millions of log events without bankru
 pting yourself\n* Why "no AI" rules are misguided technically and conceptu
 ally\n\nGOING BEYOND CTFS\n\nThe same patterns that trivialize training ex
 ercises work on real SOC investigations. We're watching blue team work fun
 damentally transform - from humans investigating to humans managing AI inv
 estigators. Training programs teaching skills AI already automates. Hiring
  practices that can't verify who's doing the work. Certifications losing m
 eaning. More fundamentally\, when we talk about who watches the watchers\,
  a lot is about to shift again.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/breaking-bots-che
 ating-at-blue-team-ctfs-with-ai-speed-runs
END:VEVENT
BEGIN:VEVENT
SUMMARY:Security Nightmares
DTSTART:20251230T134500Z
DTEND:20251230T144500Z
DTSTAMP:20260415T183921Z
UID:a481eb2e-8b78-5f97-bfee-a47d1a271010
CATEGORIES:official,CCC & Community
DESCRIPTION:Wir wagen auch den IT-Security-Ausblick auf das Jahr 2026. Der
  ist wie immer mit Vorsicht zu genießen.
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/security-nightmar
 es
END:VEVENT
BEGIN:VEVENT
SUMMARY:Closing Ceremony
DTSTART:20251230T150000Z
DTEND:20251230T160000Z
DTSTAMP:20260415T183921Z
UID:319c31a2-af90-5db9-89f0-fe9ac582726e
CATEGORIES:official,CCC & Community
DESCRIPTION:&nbsp\;
LOCATION:One
URL:https://events.ccc.de/congress/2025/hub/event/detail/closing-ceremony
END:VEVENT
END:VCALENDAR
