内容由CCC media team提供。所有播客内容(包括剧集、图形和播客描述)均由 CCC media team 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
Player FM -播客应用
使用Player FM应用程序离线!
使用Player FM应用程序离线!
值得一听的播客
赞助
K
Know What You See with Brian Lowery


In this episode, comedian and tea enthusiast Jesse Appell of Jesse's Teahouse takes us on a journey from studying Chinese comedy to building an online tea business. He shares how navigating different cultures shaped his perspective on laughter, authenticity, and community. From mastering traditional Chinese cross-talk comedy to reinventing himself after a life-changing move, Jesse and host Brian Lowery discuss adaptation and the unexpected paths that bring meaning to our lives. For more on Jesse, visit jessesteahouse.com and for more on Brian and the podcast go to brianloweryphd.com.…
How election software can fail (38c3)
Manage episode 458874610 series 1910928
内容由CCC media team提供。所有播客内容(包括剧集、图形和播客描述)均由 CCC media team 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
Experiences from a hacker working at the Election Council of The Netherlands. After critically following the elections for 8 years from the outside, a hacker was employed as one of the functional administrators of the software supporting the elections. Sharing experiences of the use of election software during 7 elections (2020-2023), from local, national to European in The Netherlands. A governmental software project with strict deadlines, and high security expectations. The software project for elections in The Netherlands is build an IT organization [owned by German local governments](https://www.regioit.de/unternehmen/zahlen-daten-fakten). More than 10.000 Java files, what can possible go wrong? During this time multiple emergency patches were needed and incidents occur. Although at first explicitly *not* hired as a coder, within 3 months a Java code contribution was made that was unexpectedly more crucial than anticipated. This talk will show some incidents with the election software in The Netherlands: how the software failed, and when/how it was discovered. Go over how seeing the elections from the outside, and give some history of voting computers and software. Ending with some reflecting on the future. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://events.ccc.de/congress/2024/hub/event/how-election-software-can-fail/
…
continue reading
1552集单集
Manage episode 458874610 series 1910928
内容由CCC media team提供。所有播客内容(包括剧集、图形和播客描述)均由 CCC media team 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
Experiences from a hacker working at the Election Council of The Netherlands. After critically following the elections for 8 years from the outside, a hacker was employed as one of the functional administrators of the software supporting the elections. Sharing experiences of the use of election software during 7 elections (2020-2023), from local, national to European in The Netherlands. A governmental software project with strict deadlines, and high security expectations. The software project for elections in The Netherlands is build an IT organization [owned by German local governments](https://www.regioit.de/unternehmen/zahlen-daten-fakten). More than 10.000 Java files, what can possible go wrong? During this time multiple emergency patches were needed and incidents occur. Although at first explicitly *not* hired as a coder, within 3 months a Java code contribution was made that was unexpectedly more crucial than anticipated. This talk will show some incidents with the election software in The Netherlands: how the software failed, and when/how it was discovered. Go over how seeing the elections from the outside, and give some history of voting computers and software. Ending with some reflecting on the future. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://events.ccc.de/congress/2024/hub/event/how-election-software-can-fail/
…
continue reading
1552集单集
Усі епізоди
×C
Chaos Computer Club - recent events feed (low quality)

Closing talk of Hackerhotel 2025 with NFIR CTF award ceremony. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/YBZVUM/
C
Chaos Computer Club - recent events feed (low quality)

The internet cleanup foundation publishes the baseline security of 150.000 domains of 10.000 important organizations in the Netherlands. This talk shows what we've done in 2024 and highlights some of the nice things to come in 2025 maybe spoiling one or two things :) - It had a ton of impact and large banks, internet providers and all kinds of other institutions cleaned up their baseline security issues. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/MDKVVA/…
C
Chaos Computer Club - recent events feed (low quality)

Operational Technology (OT) is vital for industrial processes, yet strategic understanding of OT’s security complexity is often lacking at the executive level. This presentation emphasizes the need for organizations to approach OT as a strategic priority, highlighting its unique challenges—such as legacy systems and non-negotiable uptime—amid rising cyber threats targeting critical infrastructure. By fostering executive insight into OT management, organizations can improve resilience, enhance security, and gain a competitive edge, ultimately positioning OT as an asset in operational stability and corporate strategy. This presentation, titled "The 'O' in OT," explores the importance of executive-level understanding of Operational Technology (OT) within strategic frameworks. It highlights the distinct challenges OT faces compared to IT, including legacy infrastructure, strict uptime requirements, and rising cyber threats. Participants will gain insight into how a strategic focus on OT security and management enhances organizational resilience and competitive strength. By bridging the gap between OT’s operational demands and executive decision-making, this session outlines steps for integrating OT into a cohesive, secure, and future-ready corporate strategy. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/7BDKGK/…
C
Chaos Computer Club - recent events feed (low quality)

Our workflow, challenges and other fun things From the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yield badges and what it took to deliver these in the hands of the Hacker Hotel people. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/CQRYEL/…
C
Chaos Computer Club - recent events feed (low quality)

This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more. Ever wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're at the right place. This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and what you need to do if you want to participate. You will walk away with practical knowledge on how you can get started. We'll also take a short tour of my own network, how I set it up and what I use it for. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/V7QUX3/…
C
Chaos Computer Club - recent events feed (low quality)

The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy system and do everything we can to prevent it. Various institutions test smart devices, set safety standards, and monitor compliance with these standards. However, parties such as our grid operators only have control over the energy grid equipment up to the front door. They are not allowed to look beyond the electricity meter, where most smart equipment is located. DIVD is allowed to do this and by identifying devices that can form a botnet, DIVD helps to make the smart grid more secure. DIVD has been conducting research into vulnerabilities in equipment of the energy system, such as charging stations, solar panel inverters, home batteries, and (Home) Energy Management Systems. Previous findings have led to several parliamentary questions and follow-up actions by authorities such as RDI, the Dutch Authority on Digital Infrastructure. With the CVD in the Energy Sector project, DIVD will set up a research and education line with the DIVD.academy in collaboration with the energy sector to reduce the digital vulnerability of our energy system. DIVD will also build a hardware lab to test devices and scenarios. You may join too and help to save the grid. In this talk, we will demonstrate how we could have generated outages using zero-days we found in solar converters and electric car chargers. But we also did it with just one user-password combination… The European electricity network has become a ‘smart grid’. Consumers are not only users but also producers of energy. More and more devices are connected, smart and online, so supply and demand can be more easily matched. This offers many opportunities for sustainability and possibilities for new players to enter the market. But also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy system and do everything we can to prevent it. In the Netherlands and Europe, various institutions test smart devices, set safety standards, and monitor compliance with these standards. However, parties such as our grid operators only have control over the energy grid equipment up to the front door. They are not allowed to look beyond the electricity meter, where most smart equipment is located. Being an independent non-profit research institute, DIVD is allowed to do this. By looking for devices that can form a botnet, DIVD helps to make the smart grid more secure. DIVD has been scanning the entire internet for vulnerabilities since 2020 and reporting them to the owners of systems. This may involve known vulnerabilities (Common Vulnerabilities and Exposures), new vulnerabilities (Zero-days), leaked credentials (username-password combinations) and online sources that are unintentionally accessible. DIVD is also a CVE Numbering Authority (CNA) and can publish new vulnerabilities. Our way of working is supported by the parties responsible for digital security in the Netherlands, such as NCTV, NCSC, AIVD, police, and many cyber security companies. In addition to these activities, DIVD also conducts research into vulnerabilities in the equipment of the energy system, such as charging stations, solar panel inverters, home batteries, and (Home) Energy Management Systems. Previous findings have led to several parliamentary questions and follow-up actions by authorities such as RDI, the Dutch Authority on Digital Infrastructure. With the CVD in the Energy Sector project, DIVD will set up a research and education line with the DIVD.academy in collaboration with the energy sector to jointly reduce the digital vulnerability of our energy system. In 2025, we will: - Incorporate all energy-related research by DIVD into a research line under a Research Lead Energy. - Establish structural partnerships with the energy sector to jointly resolve vulnerabilities. - Build our own hardware lab where we will test peripheral equipment for security and collaborate with other hardware labs. - Set up our CNA to receive, process, and publish CVEs of digital solutions used in the energy system. Share research findings with authorities to support their enforcement. DIVD.academy familiarize students with basic knowledge of energy systems and energy equipment and involve them in practice-oriented research. - Develop teaching materials for the installation sector and training courses to increase awareness of vulnerabilities in the energy system. - Share our knowledge via hacker events and security conferences. In this talk, we will demonstrate how we could have generated outages using zero-days we found in solar converters and electric car chargers. But we also did it with just one user-password combination… Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/TFJCBD/…
C
Chaos Computer Club - recent events feed (low quality)

Nuclear fusion is a clean safe energy. Fusing hydrogen nuclei to release an enormous amount of energy. This talk will cover: - A recap of the physics that makes fusion work - How to build a fusion reactor at home - How nuclei collide and what is needed to the coulomb barrier - Challenges in how to scale it up and make it generate more power - How far are we to have fusion energy on the power grid - Current technical challenges in fusion - How we can solve problems using machine learning Nuclear fusion promises a clean, safe, and abundant source of energy by fusing hydrogen isotopes to release more power than is put in. In this talk, we will start by clarifying the fundamental physics of fusion—how overcoming the Coulomb barrier allows two hydrogen nuclei to fuse. We will then explore the path to industrial-scale fusion power, focusing on international prototypes such as ITER, designed to demonstrate an energy output of Q=10 (50 MW in, 500 MW out). Alongside the incredible engineering achievements involved in building such large machines, we will discuss the complexities of controlling high-temperature plasmas, mitigating disruptions, and managing edge-localized modes (ELMs). Throughout the talk, we will highlight novel control and diagnostic strategies, including machine-learning-based models that can aid real-time plasma monitoring and regulation. Ultimately, we will address how these technologies, with deeper physical understanding, can bring us closer to fusion’s full potential as a reliable and low-waste energy source. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/YJZ9KL/…
C
Chaos Computer Club - recent events feed (low quality)

Tijdens Hacker Hotel krijg je de unieke kans om deel te nemen aan Operation Check Mate, een meeslepende interactieve ervaring waarin je zelf in de schoenen van een rechercheur staat. Deze game is ontwikkeld door experts uit het veld en biedt een fascinerende inkijk in de wereld van strafrechtelijk onderzoek. In teams werk je aan een intrigerende zaak, waarbij alle aspecten van recherchewerk aan bod komen: 🔍 Recherchewerk: Analyseer de zaak, stel kritische vragen en bepaal de volgende stappen. 🗣️ Verhoor: Onderzoek hoe je informatie boven tafel krijgt tijdens een verhoor. 🏠 Doorzoeking: Plan en voer een doorzoeking uit. Wat mag wel en wat niet? 📱 Digitaal forensisch: Werk met echte digitale sporen en leer hoe je deze effectief kunt vorderen en analyseren. 📂 Dossieropbouw: Bouw een sterk strafdossier dat standhoudt in de rechtszaal. Deze game is méér dan een simulatie: je werkt met scenario’s die zijn ontwikkeld door experts uit het veld, waaronder forensisch onderzoekers, pentesters en professionals uit de strafrechtketen (denk aan politie, OM en rde Rechtspraak). Bovendien hebben creatieve geesten met een verknipte blik gezorgd voor onverwachte twists en uitdagingen. Maar hier komt de echte uitdaging: hackers zijn vaak kritisch over de politie. Toch, als je nu écht in de schoenen van een rechercheur staat, is het allemaal wel zo simpel als het lijkt? Kun je jouw technische en tactische skills combineren met juridische en ethische overwegingen? En hoe ga je om met druk, complexe gegevens en menselijke factoren? Het hoogtepunt? Op zondag mondt de zaak uit in een rechtszaak waarin jouw werk op de proef wordt gesteld. Durf jij het aan om jouw skills in de praktijk te brengen en een zaak tot een succesvol einde te brengen? Praktisch: 📅 Start: Vrijdag 14 februari 2025 om 13:37 ⚖️ Rechtszaak: Zondag 16 februari om 14:30 📍 Meld je aan via: sollicitatie@cyberom.nl 💡 Let op: Het aantal plaatsen is beperkt. Grijp deze kans, sluit je aan bij een rechercheteam en ontdek of jij het in je hebt om een zaak op te lossen in een wereld vol uitdagingen. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/DMAMKD/…
C
Chaos Computer Club - recent events feed (low quality)

Wat je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 altijd al hebt willen weten: hoe krijg je het voor elkaar dat de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s (= niet hackende mens) ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt. Strijk neer op je handdoek en leun achterover, want deze zondagmiddag (Don't Panic. Time is an illusion.) nemen Roxane Kortland en ik je mee hoe je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 effectief communiceert met de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶𝘴 (de niet hackende mens). Waarom? Communicatie is fantastisch, duh. En doelgerichte communicatie zorgt ervoor dat die 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt. Tip: neem een pen mee Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/Z38YHU/…
C
Chaos Computer Club - recent events feed (low quality)

In this talk I will show you the theory behind parametric arrays what is involved in making your own low-cost directional speaker Parametric speakers are extremely directional speakers that produce audible sound by modulating an audible signal on top of an ultrasonic carrier. Commercial options have existed for a long time but are quite expensive for hobbyists. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/9V7W9G/…
C
Chaos Computer Club - recent events feed (low quality)

1 How do models like ChatGPT (LLM) work, can you hack them and run them offline? (hackerhotel2025) 58:30
What is an LLM? Can you run it yourself? Can you hack it? This session will explain high-level how an LLM works, how you can run this yourself (maybe for privacy reasons), Coding with LLMs and the hacking possibilities of these AI systems. Expect many demos and hopefully useful tips and tricks, so you can directly try all this stuff out yourself. Keyword: Supervised Learning and Reenforced Learning, Hugging Face, Quantization, Ollama, open-webui, Prompt Hacking, Tokens, Context Length I will explain basics of Machine Learning concepts How these ML concepts have created LLMs and how they somewhat work What is needed to run LLMs (Inference) and how you can run it your self how to test various LLMs prompt hacking using LLMs for coding Many live demos Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/GR78YQ/…
C
Chaos Computer Club - recent events feed (low quality)

1 A criminal, and victim view of phishing and phishing panels, live of stage. (hackerhotel2025) 51:23
The Dutch Tax and Customs Administration deals with criminals claiming to be representatives of the organization and contacting the public with phishing emails daily. In this presentation, we will take you into the world of the criminals sending phishing emails and the recipients of the phishing mail. A live phishing demo is included. This presentation will show several examples of daily phishing that the Dutch Tax and Customs Administration deals with. The Dutch Tax and Customs Administration receives over 60,000 reports of phishing every year. The second part of the presentation includes a live demo of a phishing panel. Using a phishing panel ensures the phishing victim pays for purchasing a 75" OLED TV without knowing it. The TV is delivered to the cybercriminal's address. All of this is live on stage. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/KT8ZGY/…
C
Chaos Computer Club - recent events feed (low quality)

It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport. It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport. We are experts in moving people to places that various governments would rather we didn't. The global immigration, customs, and travel system is an absolutely massive technological and human system designed to make sure things happen according to the government's agenda. We have our own agenda, and it all makes for great hacking potential. Insert clever engineering, some interesting math, more than a bit of skullduggery, and you end up with our routing system and what we humbly suggest is an epic hack for a life saving purpose. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/9ZGMCC/…
C
Chaos Computer Club - recent events feed (low quality)

Onaangekondigde Persconferentie by Hackerhotel 2025 - Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: -
C
Chaos Computer Club - recent events feed (low quality)

Sociale constructen gebruikt in software context en alles wat daar entertainment mee maakt :) Een interactieve presentatie over waarom beperkingen op je dataset zetten onhandig is. Wat is data? Hoe lang duurt een dag? Hoe lang duurt een uur? Hoe lang is een maand? Wat is een jaartal? Wat is een geboortedatum? Wat is een naam? Hoe lang is een pincode? Waaruit bestaat een pincode? Hoe veilig is een private key? Wat zijn mooie ronde getallen? Hoe groot is een bit? Hoe groot is een byte? Waarom zou je sorteren op afmeting? Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/UHZ3EJ/…
欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。