Mp4 publiczne
[search 0]
Więcej
Download the App!
show episodes
 
Artwork

1
HD ({

veronlinehd2020

Unsubscribe
Unsubscribe
Miesięcznie
 
Cuando el superintendente de bomberos Jake Carson (John Cena), junto con su equipo de expertos bomberos formado por Mark (Keegan-Michael Key), Rodrigo (John Leguizamo) y Axe (Tyler Mane)
  continue reading
 
Ray Garrison (Vin Diesel), también conocido como Bloodshot, es resucitado por la compañía Rising Spirit Technologies a través del uso de nanotecnología. Mientras lucha por recuperar la memoria, Ray trata de volver al ser el que era antes de sufrir el accidente que dejaría amnésico. Película basada en el cómic “Valiant”, creado por Kevin VanHook, Don Perlin y Bob Layton. superhero, based on comic, psychotronic, shared universe, valiant comics
  continue reading
 
Loading …
show series
 
The complete story of Project Blinkenlights: achievements, failures, technology and its cultural impactIn 2001, the Chaos Computer Club surprised the world with a simple but impressive interactive light installation on a building in the heart of Berlin: Blinkenlights illuminated 144 windows forming a huge but low-resolution pixel matrix on the faca…
  continue reading
 
Dass wir bald von Superintelligenzen beherrscht werden, die wie ChatGPT Texte generieren, ist unwahrscheinlich. Aber es gibt offene Fragen: zu Wissensgerechtigkeit, Teilhabe und Monopolisierung durch Konzerne.Künstliche Intelligenz ist eine Projektionsfläche. Jetzt wird alles anders! Dabei ist die Beschäftigung damit, wie Maschinen Aufgaben erledig…
  continue reading
 
Exploration of the sensor hardware and programming of the flow3r badge. In particular the pressure sensor BMP581 and acceleration/gyrometer BMI270.I will give a quick introduction into the Bosch MEMS technology and sensors.Next I want to show some very basic steps how to use MicroPython on flow3r to play with LEDs and sensors.about this event: http…
  continue reading
 
In this talk Holger Levsen will give an overview about reproducible builds, the past, the presence and the future. How it started with a small BoF at DebConf13 (and before), how it grew from being a Debian effort to something many projects work on together, until in 2021 it was mentioned in an executive order of the president of the United States. …
  continue reading
 
16 years after the international Hackspace revolution, we are finding ourself in the midst of a global crisis with a search for answers. At Bio-Hack-Spaces we create mycelium based build materials, research new ways of growing (or foraging) our own food, build technological bridges to nudge nature in our desired direction or tinker on devices that …
  continue reading
 
Menschen Fahren aus der Stadt aufs Land. Da fährt (sonntags) kein Bus, deshalb bringen sie ihr Auto mit. Dieser Talk erklärt, wie man vermeidet, dass der Ausflug ins Grüne zum Fiasko wird und wie sich auf dem Land der Strassenverkehr von Staedten unterscheidet.about this event: https://pretalx.c3voc.de/camp2023/talk/VYGPCZ/…
  continue reading
 
Passwords suck, Multi Factor Authentication is hip, everyone wants to use it, but most methods rely on some kind of generated One-Time passcode, which are as vulnerable to phishing as the passwords they should help protect. Other possible factors, like app-based authentication also bring similar design flaws to the tableA good alternative to insecu…
  continue reading
 
The energy consumption of datacenters is increasing exponentially. Local community heating is required to heat houses. The talk will give an overview of the existing problems and examples how data centers can be integrated into green power generation to heating concepts producing data center services en passant.3% of global electricity consumption …
  continue reading
 
Sometimes Windows can't be avoided, usually to run or dissect some weird piece of software. Fortunately, we have virtual machines for that, but installing or maintaining such an image is always a hassle. I built a web-tool based on open-source tools to make the experience of building such images much more enjoyable and discovered some interesting q…
  continue reading
 
Major states/cities in India have metro railway system for easy commute. The technology, _however_, has been exploited for a long period of time. I'll go through what's wrong with current system and how to make profit (free travel, I mean) out of it.The talk is majorly about NFC (majorly, MiFare DESFire EV1 cards & classic cards). Keep in mind that…
  continue reading
 
Microcontrollers are used in numerous applications and even in security-relevant areas, for example in form of hardware security tokens or crypto wallets.Hence, the non-volatile flash memory of microcontrollers contains sensitive assets such as cryptographic secrets or intellectual property, that need to be protected from being read out by adversar…
  continue reading
 
Our environment is full of technologies, connected objects and other gadgets that make our daily life much easier. It is indeed, quite easy to remotely command all kind of devices from our smartphones, with a single click. These technologies are also very efficient to help compensate certain handicaps but they have limits when it regards people who…
  continue reading
 
Climate change is one of our biggest challenges, and therefore the way we get our power has to change: The newest revision of the Netzentwicklungsplan constitutes for a large amount of additional renewables and our power grid will undergo a transformation. A greater interconnection is needed to efficiently use these resources, but what will happen …
  continue reading
 
Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then we were looking into ways to use the robots' "dumb" sensors to spy on the user (e.g. by using the ultrasonic sensor). But all our predictions were exceeded by the reality: today's robots bring multiple cameras and microphones …
  continue reading
 
Nachhaltige Kryptographische Sicherheit stellt insbesondere für stromsparende Hardware eine Reihe von Herausforderungen dar. Für Lösungen mit langer Einsatzzeit müssen heute auch die Sicherheit gegen Quantencomputer Berücksichtigung finden. Hashbasierte Signaturlösungen für den Raspberry Pi Pico ermöglichen beispielsweise Sensorlösungen, welche für…
  continue reading
 
Hardware is hard, right? Wrong. Building electronics prototypes has never been easier, and people who have been afraid to do it have nothing to fear. I'll tell you about how I build fancy high end devices with minimal, extremely cheap equipment, how it all works, and how you can do it too. We'll find out how to trick your body into making your hand…
  continue reading
 
Die Deutsche Post DHL Group erhielt von Digitalcourage den BigBrotherAward 2023 in der Kategorie Verbraucherschutz für praktizierten Digitalzwang. Rena Tangens erzählt etwas zu den Beweggründen, aber vor Allem darüber, welch schräge Sachen sich danach ereignet haben.Die BigBrotherAwards prämieren Datensünder in Wirtschaft und Politik und werden ein…
  continue reading
 
On Track is a demoparty inside the chaos communication camp. In short: a demoparty is a multimedia art festival where the participants usually use any kind of computer or digital device for their creations.On Track is a demoparty inside the chaos communication camp. In short: a demoparty is a multimedia art festival where the participants usually u…
  continue reading
 
Der Politikbetrieb der Europäischen Union läuft allzu oft unter dem Radar politischer Bewegungen, obwohl dort fundamentale Entscheidungen getroffen werden. Wir wollen uns einige aktuelle netzpolitische Themen anschauen und diskutieren, welche Rolle die Digitale Zivilgesellschaft als Teil einer emanzipatorischen Praxis einnehmen kann.Vorratsdatenspe…
  continue reading
 
The climate catastrophe is imminent and global injustice is rising. Now a lot of new digital tech (AI, blockchain, big data, quantum computing) is supposed to help the transition to a sustainable society. Although some of them can actually help with parts of the transition, they are usually discussed not as tools to assist the broader societal chan…
  continue reading
 
Debugging and Profiling ARM Cortex-M microcontrollers with GDB and Python.This talk gives you an overview of debugging ARM Cortex-M microcontrollers with a focus on the *practical* configuration and usage of the relevant tools.In particular, I will present:- Debug interfaces ([SWD](https://developer.arm.com/documentation/ihi0031/a/The-Serial-Wire-D…
  continue reading
 
The Elektronisches Orchester Charlottenburg (EOC) explores the improvisation and interpretation of Electroacoustic Music. This includes the interaction of diverse electronic instruments and their spatialization in real time. The EOC was founded at the Electronic Music Studio at Technical University of Berlin within a seminar of the Audio Communicat…
  continue reading
 
What does it take to build a fully functional (and actually usable) voice assistant that runs on a Raspberry with FOSS? This talk describes the journey from the idea to Version 1.0 (and beyond).It has to be a HAL9000 - the enclosure for my cloud-free digital voice assistant. The personal project is based on FOSS and runs on a Raspberry Pi Zero2 W i…
  continue reading
 
Schon wieder muss Karlsruhe ranVor mehr als zehn Jahren lang ein Staatstrojaner auf dem Seziertisch des CCC. Was die Analyse zeigte, waren neben eklatanten handwerklichen Fehlern auch die mangelnde Prüfbarkeit der Schadsoftware und weitere grundsätzliche Probleme solcher Ausspähmethoden. Leider hat sich nicht viel verbessert – im Gegenteil. Und so …
  continue reading
 
At Camp 2011 the “Space Program of the Hacker Scene” had been released as one of the main aspects as the outcome of this Camp. It is time for a review after 12 years and reshape it into Solarpunk.**~ For Our Future ~**The [Space Program of the Hacker Scene](https://events.ccc.de/camp/2011/wiki/Call_for_Space_Program) had been released. There were t…
  continue reading
 
You like coding and tinkering with software or hardware? And you are up for a challenge? Then the “Youth Hacking 4 Freedom” is the perfect competition to test your skills. The Free Software FoundationWith the “Youth Hacking 4 Freedom” contest the FSFE has created a fun hacking competition for young people from Europe. The participants have the chan…
  continue reading
 
Was hat sich beim Thema Digitale Gewalt seit dem letzten Camp verändert? Warum plant das BMJ eine Digitale-Gewalt-Gesetz, das diejenigen identifizieren und bestrafen soll, die in Messengern über schlechte Restaurants lästern, und warum ändert sich noch immer nichts an der Pflicht zur Adresse im Impressum? Das und mehr im Update zum Stand der Dinge …
  continue reading
 
The role of the Internet in the Ukrainian war is not been fully considered yet. Currently, primary Internet based attacks are analyzed, but it is greatly neglected that with the help of the Internet measurement verifiable statements can be made about the real world. Through global Internet scans and a passive blackhole sensor network, we can identi…
  continue reading
 
A short session for even shorter talks.Language: English or German-- german --Du willst was sagen? Das Podium gehört dir. 10 Minuten hast du, dann wird gewechselt. Ein kurzer Vortrag über die Aerodynamik von Enten, Werbung für dein neues Open-Source-Projekt, ein kleiner Hack den du neulich entdeckt hast, gesellschaftliche Kommentare ... alles geht.…
  continue reading
 
We'll take a look at how DJI - dominating player for commercial and recreational drones - builds their software, specifically from a security angle. This talk will discuss DJI drones, most specifically the DJI Mini-series; looking at the hardware, discussing attack angles, up to a full compromise of a current drone for custom firmware purposes.Alon…
  continue reading
 
In diesem Vortrag wollen wir euch einen Überblick geben über die digitale Sicherheitssituation von Journalismus weltweit. Spoiler: nicht so gut, und eher schlechte Aussichten. Außerdem erzählen wir ein bisschen was das Digital Security Lab bei Reporter ohne Grenzen anbietet, was wir tun und wie man Betroffene am besten an uns verweisen kann.about t…
  continue reading
 
We‘re c3stoc - the CCC sticker operation center. After helping with the sticker distribution at 36c3 we had to find a solution to ensure new laptops wouldn‘t remain naked during the pandemic. During the last three years we organized remote sticker exchanges. Now it‘s time to share our learnings about exchanges and stickers!The idea was just to make…
  continue reading
 
We will talk about the lately published Denail of Service attack abusing the Service Location Protocol. The research has shown that there are still protocols lurking in the dark to be explored and ab/used.The focus will be on basics of DoS attacks, then focus on SLP, the impact, defense mechanisms as well as the global attack surface.Furthermore, t…
  continue reading
 
Sharing experiences of two technical and educational projects that aimed to provide support for the decentralized grass movement in Sudan.showcase of two technical-sociopolitical projects ## Bid3a:The project aims to make socio-political interventions and creatively express themselves through the courage and symbolism of manipulating and artistical…
  continue reading
 
[Delta Chat](https://delta.chat) is an e-mail based messenger that works on all platforms. Apart from an Whatsapp/Telegram-style user interface it features a security-audited [Rust-core library](https://github.com/deltachat/deltachat-core-rust), server [templates for setting up a state-of-the-art e-mail server](https://delta.chat/en/serverguide), m…
  continue reading
 
Hidden inside basically every physical machine that needs precise control, PID loops are running the show. Quadcopters, self-balancing robots, and even the hot end of your 3D printer all use the same simple routines.Knowing how they work, deep down, and how to set their mystical three parameters is part art and part science, but it's nothing you ca…
  continue reading
 
Do you struggle at Attack/Defense style capture the flag (CTF)? Have you ever wondered how top teams can automatically steal tons and tons of flags and defend against attacks? Have you ever wondered what goes into succeeding at Attack/Defense? If so, this talk is for you.In this talk, we will take you behind the curtain of the top CTF team of 2022,…
  continue reading
 
Loading …

Skrócona instrukcja obsługi

Posłuchaj tego programu podczas zwiedzania
Odtwarzanie