{"schedule":{"version":"v0.6","conference":{"title":"Camp++ 0x7e0","start":"2016-08-18","end":"2016-08-20","daysCount":3,"timeslot_duration":"00:15","days":[{"index":0,"date":"2016-08-18","day_start":"2016-08-18T16:00:00+02:00","day_end":"2016-08-18T21:00:00+02:00","rooms":{"Klapka":[{"id":22,"guid":"dcf66a17-84e0-4e09-bd83-86167821ad01","logo":"/system/logos/22/medium/PenText-logo-code-5-black.jpg?1470094203","date":"2016-08-18T16:00:00+02:00","start":"16:00","duration":"00:45","room":"Klapka","slug":"camppp7e0_-_22_-_en_-_klapka_-_201608181600_-_are_you_a_pentexter_-_peter_mosmans","title":"Are you a PenTexter ?","subtitle":"Open-Sourcing Pentest Reporting and Automation","track":"NETSEC","type":"lecture","language":"en","abstract":"This talk will announce a new OWASP project: PenText, a fully open-sourced XML-based pentest document automation system. The PenText system is a document automation framework that supports the entire pentesting lifecycle: from the initial inquiry, through pentest scoping, quotations, pentesting, and reporting, through the final invoice.","description":"During this talk, the OWASP PenText system will be demo'ed live, in the context of a larger Pentesting ChatOps infrastructure (RocketChat, Hubot, and Gitlab). The basics of how the OWASP PenText system is architected (XML, XSLT, XSL-FO) willl be covered, and shown how the system can be used to manage the entire lifecycle of pentesting data, including the automatic generation of documentation at various points in the process (including quotations, pentest reports, and invoices).\r\n\r\nThe OWASP PenText system was built and tested by the globally-distributed team at Radically Open Security. This system is at the heart of our own pentesting workflow, and we feel passionately that this 100% free and open-sourced framework will also be useful to your organization. ","persons":[{"id":27,"full_public_name":"Peter Mosmans"}],"links":[{"url":"https://pentext.org","title":"OWASP project page"},{"url":"https://youtube.com/watch?v=jVcx6XMy3oE","title":"Recording (YouTube)"},{"url":"https://s3.eu-central-1.amazonaws.com/hsbp/camppp7e0/pentexter.mkv","title":"Recording (MKV download, Amazon S3 Frankfurt)"}]},{"id":14,"guid":"b43af7d5-6244-4841-8ba9-d4c74d2c5092","logo":null,"date":"2016-08-18T16:45:00+02:00","start":"16:45","duration":"00:45","room":"Klapka","slug":"camppp7e0_-_14_-_en_-_klapka_-_201608181645_-_testing_stateful_web_application_workflows_-_dnet","title":"Testing stateful web application workflows","subtitle":"","track":"NETSEC","type":"lecture","language":"en","abstract":"The talk introduces the problem we\u2019ve been facing more and more while testing complex web applications, and shows two working solutions. Burp Suite is known by most and used by many professionals in this field, so its GUI-based features are presented first. But as Burp is far from a one-size-fits-all perfect solution, an alternative is shown combining mitmproxy and commix \u2013 a dynamic duo that can not only detect but also exploit the issues. To make things easier to demonstrate (and possibly replicate and improve by readers), an intentionally vulnerable web application was developed that (unlike the aforementioned complex apps) requires minimal effort to deploy, lowering the bar for developing tools that can be used later in enterprise environment.","description":"","persons":[{"id":8,"full_public_name":"dnet"}],"links":[{"url":"https://www.sans.org/reading-room/whitepapers/testing/testing-stateful-web-application-workflows-36637","title":"Paper"},{"url":"https://youtube.com/watch?v=xiTFKigyncg","title":"Recording (YouTube)"},{"url":"https://s3.eu-central-1.amazonaws.com/hsbp/camppp7e0/stateful.mkv","title":"Recording (MKV download, Amazon S3 Frankfurt)"},{"url":"http://static.end.re/camp++_talks/0x7e0__2016-08-18__vsza__testing-stateful-web-application-frameworks.mkv","title":"Recording (MKV download, endre's mirror, Hungary)"}]},{"id":21,"guid":"06fdd071-ccdf-4d28-9dce-94772a5241f9","logo":null,"date":"2016-08-18T17:30:00+02:00","start":"17:30","duration":"01:00","room":"Klapka","slug":"camppp7e0_-_21_-_en_-_klapka_-_201608181730_-_joining_dn42_-_rotty_jomat","title":"Joining dn42","subtitle":"","track":"NETSEC","type":"lecture","language":"en","abstract":"We'd like to present dn42 (https://dn42.net), a big, dynamic VPN, the technologies used in it, and how to connect your Hackerspace or your home to it.","description":"Besides providing a way to connect hackerspaces by means of a federated VPN, dn42 also provides ample opportunity to play with the internet protocol suite.\r\n\r\nWe intend to to introduce dn42 and how it is structured and give an idea of the steps needed to join. We'd like to touch on the following technical subjects:\r\n\r\n- BGP (border gateway protocol)\r\n- How DNS in dn42 is set up\r\n- The \"whois\" registry of dn42 and how it is used in routing, address allocation and providing a CA for SSL certificates.\r\n\r\nHopefully there will be time for some live demonstration as well.\r\n","persons":[{"id":23,"full_public_name":"rotty+jomat"}],"links":[{"url":"https://www.youtube.com/watch?v=_X1K4j-GEu0","title":"Recording (YouTube)"},{"url":"https://s3.eu-central-1.amazonaws.com/hsbp/camppp7e0/dn42.mkv","title":"Recording (MKV download, Amazon S3 Frankfurt)"},{"url":"https://static.end.re/camp++_talks/0x7e0__2016-08-18__rotty--jomat__joining-dn42.mkv","title":"Recording (MKV download, endre's mirror, Hungary)"},{"url":"https://sbg.chaostreff.at/projects/letsnetz/2016-08/ln_0023-joining-dn42.html","title":"Recording (audio only, Chaostreff Salzburg's mirror, Austria)"}]},{"id":17,"guid":"1ad154ae-e5af-46aa-915c-54f7db8cd636","logo":"/system/logos/17/medium/NeXTcube.jpg?1469989795","date":"2016-08-18T18:45:00+02:00","start":"18:45","duration":"01:00","room":"Klapka","slug":"camppp7e0_-_17_-_en_-_klapka_-_201608181845_-_contemporary_webserver_configuration_-_a_serving_suggestion_-_leyrer_-_maclemon","title":"Contemporary Webserver Configuration - A Serving Suggestion","subtitle":"apt-get install apache2 is not enough anymore","track":"CONFIG.SYS","type":"lecture","language":"en","abstract":"Fast and secure web applications demand a sensible, modular and contemporary configuration of the webserver. We will show you how to configure Apache and nginx in a way so that they conform to current security and speed requirements.","description":"Dropping the binaries with their standard configuration is not the way you want to deploy a web server to the Internet these days. Once, at the latest, hipster \"web developer\" drop their git repository directly into the webroot, you do want to deploy an improved configuration.\r\nAnd given the security requirements of current and upcoming web-browser generations, a proper TLS configuration of the web server is not an option but mandatory.\r\nCaching for faster access and futuristic (at least for Austria) topics like IPv6 and Http/2 will also be covered.","persons":[{"id":24,"full_public_name":"leyrer"},{"id":25,"full_public_name":"MacLemon"}],"links":[]},{"id":25,"guid":"107eb69f-fa76-4f6e-b8b6-876505f97360","logo":null,"date":"2016-08-18T19:45:00+02:00","start":"19:45","duration":"01:00","room":"Klapka","slug":"camppp7e0_-_25_-_en_-_klapka_-_201608181945_-_the_problem_with_the_decentralized_web_-_captaink","title":"the problem with the decentralized web","subtitle":"what people really need from the 'next internet'","track":"MINDHACK","type":"meeting","language":"en","abstract":"The Decentralized Web has been hailed as a new way to create websites that will fix all of our problems related to corporations and governments controlling and monitoring everything we do. But who is writing these programs? Who is designing them? Will the decentralized web just be another version of the current one, or will it truly be liberating? This will be a short introduction followed by a round table discussion on this topic.","description":"Note: this event was not recorded.\r\n\r\nThe idea of a completely decentralized web has been popularized by the advent of Bitcoin/blockchains. We find new projects including ZeroNet, ipfs/dat, secure scuttlebutt, storj, inteledger, and maidsafe (and others) who claim to bring the dreams of a new private decentralized internet to fruition with website creation and distributed data storage systems. However, the people building these tools are overwhelmingly similar in their background, race, class, sex/gender, country of origin, etc. In the decentralized web summit in 2016 in San Francisco, the attendees were overwhelmingly technologists and not users. Without representation and comraderie with folks from diverse situations, we must ask ourselves if the use case for which they are designing will be as universal as it is claimed to be. \r\n\r\nWhat is it that people need from the \u2018next\u2019 web? What is missing or wrong about the current one? It is true that the current zeitgeist on decentralization did not come from nowhere \u2014 the web is clearly broken and needs to be fixed. But in what way, and by whom? How can we foster a culture and community that truly supports the people who are most in need of decentralized technology? Let\u2019s spend a few minutes to have a critical eye to make sure we aren\u2019t \u201cheading 1,000 miles in the wrong direction.\u201d\r\n\r\n K is a former academic and currently an open source software developer who works on a new p2p 'decentralized web' tool for sharing versioned data. She will facilitate a critical discussion on this topic, with the aim of bringing in new perspectives on how and what is needed in the \u2018next\u2019 web.","persons":[{"id":31,"full_public_name":"captaink"}],"links":[]}],"Guyon":[]}},{"index":1,"date":"2016-08-19","day_start":"2016-08-19T16:00:00+02:00","day_end":"2016-08-19T22:00:00+02:00","rooms":{"Klapka":[{"id":10,"guid":"41a14e8c-3ef3-4e2f-b916-8a698dee00ff","logo":"/system/logos/10/medium/RASPiTwo.JPG?1458140840","date":"2016-08-19T16:00:00+02:00","start":"16:00","duration":"00:15","room":"Klapka","slug":"camppp7e0_-_10_-_en_-_klapka_-_201608191600_-_qrpi_-_ha7dcd","title":"QRPi","subtitle":"Whispering Raspberries","track":"HWPORN","type":"lecture","language":"en","abstract":"Using only a fraction (0.1 W) of your mobile phones RF transmission power (~2W) it is possible to make successful long distance data transfer on the HF ham band. Nobel laureate scientist and HAM operator Joe Taylor, K1JT developed WSPR digital transmission mode based on his radio astronomy experiences. WSPR so shocking that most of the users simply cannot believe it's works until they try it! That was the main reason behind my development to give an inexpensive and simple tool to ham users, electronic enthusiasts and students on their basic SDR transmission experimenting. As this depends on SDR bases meanwhile the software \"upgraded\" under the hardware so now it's possible to generate SSB, AM and FM modulation as well in the 20 meter band.","description":"Note: this event was cancelled.","persons":[{"id":17,"full_public_name":"HA7DCD"}],"links":[]},{"id":19,"guid":"17c8c149-17e9-4363-8eae-a82ba5cfeda4","logo":null,"date":"2016-08-19T16:15:00+02:00","start":"16:15","duration":"00:45","room":"Klapka","slug":"camppp7e0_-_19_-_en_-_klapka_-_201608191615_-_gsm_signal_sniffing_for_everyone_-_piotr_krysik","title":"GSM signal sniffing for everyone","subtitle":"with gr-gsm and Multi-RTL","track":"HWPORN","type":"lecture","language":"en","abstract":"Gr-gsm is a set of tools for receiving GSM transmissions, which works with any software radio hardware capable of receiving GSM signal. Together with widely available RTL2832 based TV dongles, that are popularly used as low cost software radio receivers (known as RTL-SDR), it enables everyone to receive and study protocols used in GSM's mobile radio interface. \r\nAbility to receive signals spread over wide frequency range exceeding single RTL-SDR receiver's bandwidth (~2.4MHz) was available exclusively for the owners of more capable and more expensive SDR devices. With introduction of Multi-RTL project by the author of the talk, this limit was overcome through synchronization of multiple RTL-SDR receivers in time domain, that doesn't require complicated hardware modifications. With Muli-RTL it is possible to receive for example uplink and downlink of GSM900 transmissions, that are separated by 45MHz. \r\nSpeaker will present origins of both of the projects, together with description of their inner workings, examples of applications and plans for the future.","description":"","persons":[{"id":26,"full_public_name":"Piotr Krysik"}],"links":[{"url":"https://www.youtube.com/watch?v=xnXMKRIqkZ4","title":"Recording (YouTube)"},{"url":"https://s3.eu-central-1.amazonaws.com/hsbp/camppp7e0/multirtl.mkv","title":"Recording (MKV download, Amazon S3 Frankfurt)"},{"url":"http://static.end.re/camp++_talks/0x7e0__2016-08-19__piotr-krysik__gsm-signal-sniffing-for-everyone.mkv","title":"Recording (MKV download, endre's mirror, Hungary)"}]},{"id":23,"guid":"40f5d6c5-982d-49e0-87cb-5fd985cb6dab","logo":null,"date":"2016-08-19T17:00:00+02:00","start":"17:00","duration":"00:30","room":"Klapka","slug":"camppp7e0_-_23_-_en_-_klapka_-_201608191700_-_fos_lte_imsi_catcher_-_domi","title":"FOS LTE IMSI catcher","subtitle":"","track":"HWPORN","type":"lecture","language":"en","abstract":"Building a FOS LTE IMSI catcher","description":"","persons":[{"id":28,"full_public_name":"Domi"}],"links":[{"url":"https://www.youtube.com/watch?v=WXBk0XZqGf8","title":"Recording (YouTube)"},{"url":"https://s3.eu-central-1.amazonaws.com/hsbp/camppp7e0/lte-imsi.mkv","title":"Recording (MKV download, Amazon S3 Frankfurt)"}]},{"id":20,"guid":"46c38116-ecad-4d7d-ad19-e739246e92a7","logo":"/system/logos/20/medium/logo.png?1470002172","date":"2016-08-19T17:45:00+02:00","start":"17:45","duration":"01:00","room":"Klapka","slug":"camppp7e0_-_20_-_en_-_klapka_-_201608191745_-_what_is_critical_technology_appropriation_-_maxigas","title":"What is critical technology appropriation?","subtitle":"The case of IRC","track":"MINDHACK","type":"lecture","language":"en","abstract":"New technologies sometimes express a critique of the existing social conditions. However, their subsequent iterations often increasingly conform to the requirements of capitalism: capital accumulation (exploitation) and social peace (repression). The history of chat devices is no exception. Critical appropriation of IRC by contemporary peer production groups show how it is possible to resist such historical logic.","description":"The talk is comprised of three parts.\r\n\r\nFirst, I go over the history of technologically mediated chat, and propose a rough periodisation: chat programs, instant messaging applications, and social networking. I argue that the history of chat devices is a textbook example of recuperation.\r\n\r\nSecond, I talk about the contemporary use of IRC as a backstage infrastructure by peer production communities: free software developers, hackerspace members, (Anonymous) hacktivists and Wikipedia editors. I highlight the functional role that IRC in general plays in the contemporary media ecology, a technological landscape where social networking takes up most of the space. At the same time I also list some particular ways in which these different user groups appropriated the medium for their own ends.\r\n\r\nThird, I draw the theoretical conclusion from these empirical details, answering the following question: what is critical technology appropriation, why is it important, and which conditions make it possible? I close the presentation with some reflections on the political meaning of the rejection of new technologies and the continued use of old technologies, in light of current proposals for decentralised and distributed communication tools.\r\n\r\n\r\n\r\n","persons":[{"id":21,"full_public_name":"Maxigas"}],"links":[{"url":"https://youtube.com/watch?v=gOGhP08ayqw","title":"Recording (YouTube)"},{"url":"https://s3.eu-central-1.amazonaws.com/hsbp/camppp7e0/irc.mkv","title":"Recording (MKV download, Amazon S3 Frankfurt)"},{"url":"http://static.end.re/camp++_talks/0x7e0__2016-08-19__maxigas__irc.mkv","title":"Recording (MKV download, endre's mirror, Hungary)"}]},{"id":11,"guid":"0d1a5268-7cc6-4160-8fe0-65ddf7a051c5","logo":null,"date":"2016-08-19T18:45:00+02:00","start":"18:45","duration":"01:00","room":"Klapka","slug":"camppp7e0_-_11_-_en_-_klapka_-_201608191845_-_pitchfork_5_-_stf","title":"pitchfork!!5!","subtitle":"postquantum cyber pitchforks for everyone","track":"HWPORN","type":"lecture","language":"en","abstract":"PITCHFORK (TOP SECRET UMBRA//COMSEC//EYES ONLY//20380119)\r\no (U//FOUO) PITCHFORK is a device for compartmentalizing key material\r\nand cryptographic operations in a small and durable USB device. ","description":"follow-up to last years talk, this time with working hardware.","persons":[{"id":16,"full_public_name":"stf"}],"links":[{"url":"https://www.youtube.com/watch?v=nCnnX8Z_4pY","title":"Recording (YouTube)"},{"url":"https://s3.eu-central-1.amazonaws.com/hsbp/camppp7e0/pitchfork.mkv","title":"Recording (MKV download, Amazon S3 Frankfurt)"},{"url":"http://static.end.re/camp++_talks/0x7e0__2016-08-19__stf__pitchfork.mkv","title":"Recording (MKV download, endre's mirror, Hungary)"}]},{"id":26,"guid":"d0fcaa98-48d5-443c-97c7-8d125333c591","logo":"/system/logos/26/medium/000014_flyer.jpg?1471280800","date":"2016-08-19T20:00:00+02:00","start":"20:00","duration":"01:00","room":"Klapka","slug":"camppp7e0_-_26_-_en_-_klapka_-_201608192000_-_art_tech_activism_privacy_and_cool_robots_-_viola","title":"Art Tech Activism Privacy and Cool Robots","subtitle":"Not only hackers do Security, Privacy and Hacking. Want to see some hacked Industy Robots playing records, Exoskeletons, Power-of-Google-out-of-control, Grindcore Karaoke-bar, Robots and Activism reaching a broad audience? Meet Real Art!","track":"MINDHACK","type":"lecture","language":"en","abstract":"Not only hackers do Security, Privacy and Hacking. Want to see some hacked Industy Robots playing records, Exoskeletons, Power-of-Google-out-of-control, Grindcore Karaoke-bar, Robots and Activism reaching a broad audience? Meet Real Art!","description":"Viola van Alphen is activist, writer and event producer of multimedia event GOGBOT, which won the national Innovation Award- the Netherlands. In Oct she organizes Manifestations @ Dutch Design Week, reach: 260.000 visitors. Theme: Will the Future Design Us?\r\n\r\nWith themes like the Googlization of Everything, Japanoiiid, Singularity is Near..Resistance is Futile, Mediapolis, Meme\u2019s, Atompunk, the festival always seems to address one or more issues that create controversy and encourage the visitors to be more actively engaged in technology and the role they want technology to have and definitely to not have in the future. Themes around Privacy, Security and Hacking.\r\n\r\nThe festival is free of entrance, taking art out of the museums and presenting it in the public space. With international artists, young talent and collaborations with i.e. VU University and University Twente, European Space Agency, NASA, Nanolab Twente, Mddr_ Lab, WORM, Lebowski StreetArt publishers, Anonymous, FEMEN, Hackerspaces, etc.\r\n\r\nWith projects like Google Birth, Baghdad Car Bomb Wrecks of Jonas Staal, Tinkebels underwear-vending-machines, Workspace for \u201cTerrorists\u201d from Atelier van Lieshout, Autonomous Spaceships, etc etc.\r\n\r\nTogether with a group of artists, Viola hacked herself into the Museum of Modern Art NYC using A.R. app LAYAR, which afterwards officially got added to the MoMA\u2019s program.\r\n\r\nDuring the presentation she will show several examples of (tech) art, robots and activism.\r\n\r\nOne of the goals to show worldwide professional artists active in the field of Security, Privacy and Hacking, but also build bridges between artists and hackers, and to (hopefully) take away previous expierences in seeing bad art and amateur art.\r\n","persons":[{"id":32,"full_public_name":"Viola"}],"links":[{"url":"https://www.youtube.com/user/GOGBOTfestival","title":"GOGBOT video"},{"url":"http://www.manifestations.nl","title":"Manifestations 2016 art, activist, hacker @ Dutch Design Week "},{"url":"http://www.sandwoman.com","title":"Sandwoman"},{"url":"http://www.violavirus.nl","title":"ViolaVirus"},{"url":"http://www.changeisgood.nl","title":"About Viola"},{"url":"https://www.youtube.com/watch?v=9HGoBvfbtSQ","title":"Recording (YouTube)"},{"url":"https://s3.eu-central-1.amazonaws.com/hsbp/camppp7e0/robots.mkv","title":"Recording (MKV download, Amazon S3 Frankfurt)"},{"url":"https://static.end.re/camp++_talks/0x7e0__2016-08-19__viola__art-tech-activism-privacy-and-cool-robots.mkv","title":"Recording (MKV download, endre's mirror, Hungary)"}]}],"Guyon":[{"id":12,"guid":"0291d493-50f4-49d2-81c9-ed616d9798a9","logo":null,"date":"2016-08-19T20:00:00+02:00","start":"20:00","duration":"02:00","room":"Guyon","slug":"camppp7e0_-_12_-_en_-_guyon_-_201608192000_-_pitchfor_5_workshop_-_stf","title":"pitchfor!!5! workshop","subtitle":"how to mess with your own pitchfork","track":"CONFIG.SYS","type":"workshop","language":"en","abstract":"we'll have pitchforks for you, you can play with them, don't hurt yourself.","description":"","persons":[{"id":16,"full_public_name":"stf"}],"links":[]}]}},{"index":2,"date":"2016-08-20","day_start":"2016-08-20T15:00:00+02:00","day_end":"2016-08-20T22:00:00+02:00","rooms":{"Klapka":[{"id":13,"guid":"6e4bf1ae-b805-434e-bb88-493918f4c499","logo":null,"date":"2016-08-20T15:00:00+02:00","start":"15:00","duration":"00:45","room":"Klapka","slug":"camppp7e0_-_13_-_en_-_klapka_-_201608201500_-_the_real_risks_of_the_iot_security-nightmare_-_z","title":"The real risks of the IoT security-nightmare","subtitle":"Hacking IP cameras through the cloud","track":"NETSEC","type":"lecture","language":"en","abstract":"Hardly a day goes by without an article about a new IoT (Internet of Things) device being hacked. IP cameras, routers, baby monitors, smart homes, NAS devices, light bulbs, cars, rifles, you name it. We have seen in the past 5-10 years how horrible the security of these devices is. Some people play VNC roulette, others hijack cars driven by a journalist. Junk hacking has become part of the ITSEC industry. Journalists are happy because of improved click-through rates through scary headlines, security researchers feel they are the celebrities of the day. But this is just part of the full story.\r\n\r\nDuring my research, I have created a methodology about the different risks IoT devices can introduce into a network. Most of the IoT security research focuses on the IoT device itself and its vulnerabilities, but don\u2019t consider the environment. Is the device openly available to the whole IPv4 Internet? Is UPnP allowed on your router? Is the IoT device on IPv6? Can the device be hacked through a regular browser? Can the attacker use WebRTC to get information about the user\u2019s home IP network? Is it possible to port scan and fingerprint home devices through a browser? What are the limitations of these scans considering that a proper Same-Origin Policy is implemented in the browser? How can DNS rebind attacks bypass the Same-Origin Policy? Why are the XSS and CSRF attacks so risky when it comes to IoT security? \r\nIn my presentation I will answer all these questions (and more), aided by live hacking of a NAS device on the home network through the victim\u2019s browser, from the Internet. \r\n\r\nI will also demonstrate that IoT devices (IP camera in my case) with cloud connections are also susceptible to hacks due to basic security weaknesses in the cloud servers, like lack of brute-force protections or weak default passwords. This hack is a real one using real devices, which means thousands of IP cameras are at risk.\r\n\r\nAt the end of the session we will cover the most important security tips people can use at home or at the company to protect their network against these vulnerable IoT devices. For example how Adblock can be configured to defeat Intranet hacking or which DNS server to use to prevent DNS rebind attacks.\r\n\r\nIf you have already bought or are planning to buy smart devices for home or enterprise use (or you are interested in a fun presentation), this presentation is for you.\r\n","description":"See white-paper","persons":[{"id":19,"full_public_name":"Z"}],"links":[{"url":"http://www.slideshare.net/bz98/iot-security-is-a-nightmare-but-what-is-the-real-risk","title":"Slides + demos"}]},{"id":24,"guid":"a1dc947d-3e3e-45c5-90de-0631537da096","logo":null,"date":"2016-08-20T15:45:00+02:00","start":"15:45","duration":"01:00","room":"Klapka","slug":"camppp7e0_-_24_-_en_-_klapka_-_201608201545_-_swapping_apps_with_nearby_devices_using_f-droid_-_hans-christoph_steiner","title":"Swapping apps with nearby devices using F-Droid","subtitle":"all the devices have radios, they can talk to each other!","track":"CONFIG.SYS","type":"workshop","language":"en","abstract":"","description":"F-Droid is the most private app store, it is built to respect freedom and privacy as much as possible. One way we are working on to do that is to allow users to directly exchange apps and media without internet or intermediary services. This event will introduce F-Droid \"swapping\" with nearby devices, then follow with a hands-on session where we all use F-Droid to swap apps, and provide feedback to the ongoing development of the nearby features of F-Droid.","persons":[{"id":29,"full_public_name":"Hans-Christoph Steiner"}],"links":[{"url":"https://f-droid.org","title":"F-Droid"},{"url":"https://archive.fosdem.org/2016/schedule/event/fdroidappstore/","title":"related talk at FOSDEM"}]},{"id":16,"guid":"e665536c-b222-489f-b9f2-0e20c842000c","logo":"/system/logos/16/medium/Tmux.png?1469989675","date":"2016-08-20T17:00:00+02:00","start":"17:00","duration":"01:00","room":"Klapka","slug":"camppp7e0_-_16_-_en_-_klapka_-_201608201700_-_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_in_windows_-_leyrer_-_maclemon","title":"Windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows in windows ...","subtitle":"A beginners guide to tmux(1)","track":"CONFIG.SYS","type":"lecture","language":"en","abstract":"A beginners guide to the Terminal Multiplexer \"tmux\". We will show you, why you can't work productivly wihout it and how you can customize it to your preferences and needs. There will be \"Eye Candy\" as well and possibly even some candy for questions asked.","description":"Often, you will need multiple ssh sessions/windows open to one particular server or applications like installers should continue to even when the connection to the servers breaks. Or you want several people to work in the same console window.\r\nAll of these requirements can be solved by a \"Terminal Multiplexer\".\r\nWe will show you \"tmux\", the de-facto standard for Terminal Multiplexers in the Linux and BSD world, will give tips on configuring and beautifying the user interface and will demo serveral interesting usecases.","persons":[{"id":24,"full_public_name":"leyrer"},{"id":25,"full_public_name":"MacLemon"}],"links":[{"url":"https://tmux.github.io/","title":"Tmux"},{"url":"https://www.youtube.com/watch?v=GB9yIGb8t5Y","title":"Recording (YouTube)"},{"url":"https://s3.eu-central-1.amazonaws.com/hsbp/camppp7e0/tmux.mkv","title":"Recording (MKV download, Amazon S3 Frankfurt)"},{"url":"http://static.end.re/camp++_talks/0x7e0__2016-08-20__leyrer--maclemon__windows-in-windows-in-windows-in-windows-in-windows-in-windows-in-windows-in-windows-in-windows-in-windows-in-windows-in-windows-in-windows-in-windows-in-windows-in-windows.mkv","title":"Recording (MKV download, endre's mirror, Hungary)"}]},{"id":18,"guid":"da98535f-9a62-4da7-a5d4-e9215e02d58c","logo":"/system/logos/18/medium/images.duckduckgo.com.png?1469989986","date":"2016-08-20T18:15:00+02:00","start":"18:15","duration":"02:00","room":"Klapka","slug":"camppp7e0_-_18_-_en_-_klapka_-_201608201815_-_advanced_ssh_-_leyrer_-_maclemon","title":"Advanced SSH","subtitle":"Productivity and Security Tips for SSH","track":"CONFIG.SYS","type":"workshop","language":"en","abstract":"Tips and tricks for a more efficient and more secure usage of ssh(d). We will touch on config file options, security settings, 2fa, ProxyCommands, Pre-/Post-Connections commands and much more.","description":"SSH (Secure Shell) is a must have tool to remotely connect to servers for adminstrative purposes or file copying. Most users only use a tiny subset of the features modern OpenSSH versions offer. So will try to demonstrate some of the more \"obscure\" but in certain situations very handy options.\r\n\r\nAnd if you have nifty trick or config lying around, please bring it and show us :D","persons":[{"id":24,"full_public_name":"leyrer"},{"id":25,"full_public_name":"MacLemon"}],"links":[{"url":"http://www.openssh.com/","title":"OpenSSH"},{"url":"https://www.youtube.com/watch?v=ErT3DEw22X4","title":"Recording (YouTube)"},{"url":"https://s3.eu-central-1.amazonaws.com/hsbp/camppp7e0/advssh.mkv","title":"Recording (MKV download, Amazon S3 Frankfurt)"},{"url":"http://static.end.re/camp++_talks/0x7e0__2016-08-20__leyrer--maclemon__advanced-ssh.mkv","title":"Recording (MKV download, endre's mirror, Hungary)"}]},{"id":15,"guid":"59ac6576-2e18-4d43-ba53-7775708905f5","logo":"/system/logos/15/medium/Sticker_HwC_Circle_chocolate_1.png?1468346004","date":"2016-08-20T20:30:00+02:00","start":"20:30","duration":"01:30","room":"Klapka","slug":"camppp7e0_-_15_-_en_-_klapka_-_201608202030_-_hacking_with_care_-_jz","title":"Hacking with Care","subtitle":"care for hackers/activists/whistleblowers, hacker ethics and tools for caregivers","track":"MINDHACK","type":"meeting","language":"en","abstract":"Hacking with Care is born from the magical encounter of Emily King, a massage artist, J\u00e9r\u00e9mie Zimmermann, an internet activist, and friends with common good at heart. The collective explores well-being and care as components of hacking and activism, while also seeking to liberate care, and to inspire alliances between \"caregivers\" of different competences.","description":"Hackers and activists know working for positive social change is a continuing, draining, selfless battle. However fulfilling and often invigorating, this dedication nonetheless takes a great physical and emotional toll on many friends. Some burnout, some are imprisoned or experience limitations or abuse of their rights, in retaliation for their deeds. Some die. Meanwhile, the various attacks and restrictions on life and freedoms keep intensifying everywhere, motivated by unchecked power and greed. They affect all, in all areas of life, including access to healthcare. \r\n\r\nFrom our different perspectives, we decided to put our experience in common and join forces to:\r\n\r\n* Care for ourselves and others, become aware of vulnerabilities and organize so that our capacities to care and be cared for will not be compromised.\r\n\r\n* Reach out to health-care practitioners, to share and care with them. They too are increasingly confronted to situations requiring skills in relation to privacy/data protection, technological independence and operational security (OpSec) in order to protect themselves as well as their patients.\r\n\r\nThis will be a presentation of Hacking with Care, introducing past/ongoing works, a vision for the future and a call for participation. \r\n\r\nVisual and fun examples will be shown, which may nclude movement, live massage and singing, to infuse courage and celebrate \"joie de vivre\" as a tactic! <3\r\n","persons":[{"id":22,"full_public_name":"jz"}],"links":[{"url":"https://hackingwithcare.in","title":"Hacking with Care"}]}],"Guyon":[]}}]}}}