Player FM - Internet Radio Done Right
36 subscribers
Checked 24h ago
Hozzáadva hat éve
A tartalmat a CCC media team biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a CCC media team vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!
Lépjen offline állapotba az Player FM alkalmazással!
Chaos Computer Club - recent events feed (high quality)
Mind megjelölése nem lejátszottként
Manage series 2475293
A tartalmat a CCC media team biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a CCC media team vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
1804 epizódok
Mind megjelölése nem lejátszottként
Manage series 2475293
A tartalmat a CCC media team biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a CCC media team vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
1804 epizódok
All episodes
×Closing talk of Hackerhotel 2025 with NFIR CTF award ceremony. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/YBZVUM/
The internet cleanup foundation publishes the baseline security of 150.000 domains of 10.000 important organizations in the Netherlands. This talk shows what we've done in 2024 and highlights some of the nice things to come in 2025 maybe spoiling one or two things :) - It had a ton of impact and large banks, internet providers and all kinds of other institutions cleaned up their baseline security issues. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/MDKVVA/…
Operational Technology (OT) is vital for industrial processes, yet strategic understanding of OT’s security complexity is often lacking at the executive level. This presentation emphasizes the need for organizations to approach OT as a strategic priority, highlighting its unique challenges—such as legacy systems and non-negotiable uptime—amid rising cyber threats targeting critical infrastructure. By fostering executive insight into OT management, organizations can improve resilience, enhance security, and gain a competitive edge, ultimately positioning OT as an asset in operational stability and corporate strategy. This presentation, titled "The 'O' in OT," explores the importance of executive-level understanding of Operational Technology (OT) within strategic frameworks. It highlights the distinct challenges OT faces compared to IT, including legacy infrastructure, strict uptime requirements, and rising cyber threats. Participants will gain insight into how a strategic focus on OT security and management enhances organizational resilience and competitive strength. By bridging the gap between OT’s operational demands and executive decision-making, this session outlines steps for integrating OT into a cohesive, secure, and future-ready corporate strategy. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/7BDKGK/…
Our workflow, challenges and other fun things From the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yield badges and what it took to deliver these in the hands of the Hacker Hotel people. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/CQRYEL/…
This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more. Ever wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're at the right place. This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and what you need to do if you want to participate. You will walk away with practical knowledge on how you can get started. We'll also take a short tour of my own network, how I set it up and what I use it for. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/V7QUX3/…
The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy system and do everything we can to prevent it. Various institutions test smart devices, set safety standards, and monitor compliance with these standards. However, parties such as our grid operators only have control over the energy grid equipment up to the front door. They are not allowed to look beyond the electricity meter, where most smart equipment is located. DIVD is allowed to do this and by identifying devices that can form a botnet, DIVD helps to make the smart grid more secure. DIVD has been conducting research into vulnerabilities in equipment of the energy system, such as charging stations, solar panel inverters, home batteries, and (Home) Energy Management Systems. Previous findings have led to several parliamentary questions and follow-up actions by authorities such as RDI, the Dutch Authority on Digital Infrastructure. With the CVD in the Energy Sector project, DIVD will set up a research and education line with the DIVD.academy in collaboration with the energy sector to reduce the digital vulnerability of our energy system. DIVD will also build a hardware lab to test devices and scenarios. You may join too and help to save the grid. In this talk, we will demonstrate how we could have generated outages using zero-days we found in solar converters and electric car chargers. But we also did it with just one user-password combination… The European electricity network has become a ‘smart grid’. Consumers are not only users but also producers of energy. More and more devices are connected, smart and online, so supply and demand can be more easily matched. This offers many opportunities for sustainability and possibilities for new players to enter the market. But also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy system and do everything we can to prevent it. In the Netherlands and Europe, various institutions test smart devices, set safety standards, and monitor compliance with these standards. However, parties such as our grid operators only have control over the energy grid equipment up to the front door. They are not allowed to look beyond the electricity meter, where most smart equipment is located. Being an independent non-profit research institute, DIVD is allowed to do this. By looking for devices that can form a botnet, DIVD helps to make the smart grid more secure. DIVD has been scanning the entire internet for vulnerabilities since 2020 and reporting them to the owners of systems. This may involve known vulnerabilities (Common Vulnerabilities and Exposures), new vulnerabilities (Zero-days), leaked credentials (username-password combinations) and online sources that are unintentionally accessible. DIVD is also a CVE Numbering Authority (CNA) and can publish new vulnerabilities. Our way of working is supported by the parties responsible for digital security in the Netherlands, such as NCTV, NCSC, AIVD, police, and many cyber security companies. In addition to these activities, DIVD also conducts research into vulnerabilities in the equipment of the energy system, such as charging stations, solar panel inverters, home batteries, and (Home) Energy Management Systems. Previous findings have led to several parliamentary questions and follow-up actions by authorities such as RDI, the Dutch Authority on Digital Infrastructure. With the CVD in the Energy Sector project, DIVD will set up a research and education line with the DIVD.academy in collaboration with the energy sector to jointly reduce the digital vulnerability of our energy system. In 2025, we will: - Incorporate all energy-related research by DIVD into a research line under a Research Lead Energy. - Establish structural partnerships with the energy sector to jointly resolve vulnerabilities. - Build our own hardware lab where we will test peripheral equipment for security and collaborate with other hardware labs. - Set up our CNA to receive, process, and publish CVEs of digital solutions used in the energy system. Share research findings with authorities to support their enforcement. DIVD.academy familiarize students with basic knowledge of energy systems and energy equipment and involve them in practice-oriented research. - Develop teaching materials for the installation sector and training courses to increase awareness of vulnerabilities in the energy system. - Share our knowledge via hacker events and security conferences. In this talk, we will demonstrate how we could have generated outages using zero-days we found in solar converters and electric car chargers. But we also did it with just one user-password combination… Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/TFJCBD/…
![Artwork](/static/images/128pixel.png)
1 Operation Check Mate: De Rechtszaak (hackerhotel2025) 1:11:49
1:11:49
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt1:11:49![icon](https://imagehost.player.fm/icons/general/red-pin.svg)
Tijdens Hacker Hotel krijg je de unieke kans om deel te nemen aan Operation Check Mate, een meeslepende interactieve ervaring waarin je zelf in de schoenen van een rechercheur staat. Deze game is ontwikkeld door experts uit het veld en biedt een fascinerende inkijk in de wereld van strafrechtelijk onderzoek. In teams werk je aan een intrigerende zaak, waarbij alle aspecten van recherchewerk aan bod komen: 🔍 Recherchewerk: Analyseer de zaak, stel kritische vragen en bepaal de volgende stappen. 🗣️ Verhoor: Onderzoek hoe je informatie boven tafel krijgt tijdens een verhoor. 🏠 Doorzoeking: Plan en voer een doorzoeking uit. Wat mag wel en wat niet? 📱 Digitaal forensisch: Werk met echte digitale sporen en leer hoe je deze effectief kunt vorderen en analyseren. 📂 Dossieropbouw: Bouw een sterk strafdossier dat standhoudt in de rechtszaal. Deze game is méér dan een simulatie: je werkt met scenario’s die zijn ontwikkeld door experts uit het veld, waaronder forensisch onderzoekers, pentesters en professionals uit de strafrechtketen (denk aan politie, OM en rde Rechtspraak). Bovendien hebben creatieve geesten met een verknipte blik gezorgd voor onverwachte twists en uitdagingen. Maar hier komt de echte uitdaging: hackers zijn vaak kritisch over de politie. Toch, als je nu écht in de schoenen van een rechercheur staat, is het allemaal wel zo simpel als het lijkt? Kun je jouw technische en tactische skills combineren met juridische en ethische overwegingen? En hoe ga je om met druk, complexe gegevens en menselijke factoren? Het hoogtepunt? Op zondag mondt de zaak uit in een rechtszaak waarin jouw werk op de proef wordt gesteld. Durf jij het aan om jouw skills in de praktijk te brengen en een zaak tot een succesvol einde te brengen? Praktisch: 📅 Start: Vrijdag 14 februari 2025 om 13:37 ⚖️ Rechtszaak: Zondag 16 februari om 14:30 📍 Meld je aan via: sollicitatie@cyberom.nl 💡 Let op: Het aantal plaatsen is beperkt. Grijp deze kans, sluit je aan bij een rechercheteam en ontdek of jij het in je hebt om een zaak op te lossen in een wereld vol uitdagingen. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/DMAMKD/…
Nuclear fusion is a clean safe energy. Fusing hydrogen nuclei to release an enormous amount of energy. This talk will cover: - A recap of the physics that makes fusion work - How to build a fusion reactor at home - How nuclei collide and what is needed to the coulomb barrier - Challenges in how to scale it up and make it generate more power - How far are we to have fusion energy on the power grid - Current technical challenges in fusion - How we can solve problems using machine learning Nuclear fusion promises a clean, safe, and abundant source of energy by fusing hydrogen isotopes to release more power than is put in. In this talk, we will start by clarifying the fundamental physics of fusion—how overcoming the Coulomb barrier allows two hydrogen nuclei to fuse. We will then explore the path to industrial-scale fusion power, focusing on international prototypes such as ITER, designed to demonstrate an energy output of Q=10 (50 MW in, 500 MW out). Alongside the incredible engineering achievements involved in building such large machines, we will discuss the complexities of controlling high-temperature plasmas, mitigating disruptions, and managing edge-localized modes (ELMs). Throughout the talk, we will highlight novel control and diagnostic strategies, including machine-learning-based models that can aid real-time plasma monitoring and regulation. Ultimately, we will address how these technologies, with deeper physical understanding, can bring us closer to fusion’s full potential as a reliable and low-waste energy source. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/YJZ9KL/…
Wat je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 altijd al hebt willen weten: hoe krijg je het voor elkaar dat de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s (= niet hackende mens) ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt. Strijk neer op je handdoek en leun achterover, want deze zondagmiddag (Don't Panic. Time is an illusion.) nemen Roxane Kortland en ik je mee hoe je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 effectief communiceert met de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶𝘴 (de niet hackende mens). Waarom? Communicatie is fantastisch, duh. En doelgerichte communicatie zorgt ervoor dat die 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt. Tip: neem een pen mee Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/Z38YHU/…
In this talk I will show you the theory behind parametric arrays what is involved in making your own low-cost directional speaker Parametric speakers are extremely directional speakers that produce audible sound by modulating an audible signal on top of an ultrasonic carrier. Commercial options have existed for a long time but are quite expensive for hobbyists. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/9V7W9G/…
![Artwork](/static/images/128pixel.png)
1 How do models like ChatGPT (LLM) work, can you hack them and run them offline? (hackerhotel2025) 58:30
What is an LLM? Can you run it yourself? Can you hack it? This session will explain high-level how an LLM works, how you can run this yourself (maybe for privacy reasons), Coding with LLMs and the hacking possibilities of these AI systems. Expect many demos and hopefully useful tips and tricks, so you can directly try all this stuff out yourself. Keyword: Supervised Learning and Reenforced Learning, Hugging Face, Quantization, Ollama, open-webui, Prompt Hacking, Tokens, Context Length I will explain basics of Machine Learning concepts How these ML concepts have created LLMs and how they somewhat work What is needed to run LLMs (Inference) and how you can run it your self how to test various LLMs prompt hacking using LLMs for coding Many live demos Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/GR78YQ/…
It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport. It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport. We are experts in moving people to places that various governments would rather we didn't. The global immigration, customs, and travel system is an absolutely massive technological and human system designed to make sure things happen according to the government's agenda. We have our own agenda, and it all makes for great hacking potential. Insert clever engineering, some interesting math, more than a bit of skullduggery, and you end up with our routing system and what we humbly suggest is an epic hack for a life saving purpose. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/9ZGMCC/…
![Artwork](/static/images/128pixel.png)
1 A criminal, and victim view of phishing and phishing panels, live of stage. (hackerhotel2025) 51:23
The Dutch Tax and Customs Administration deals with criminals claiming to be representatives of the organization and contacting the public with phishing emails daily. In this presentation, we will take you into the world of the criminals sending phishing emails and the recipients of the phishing mail. A live phishing demo is included. This presentation will show several examples of daily phishing that the Dutch Tax and Customs Administration deals with. The Dutch Tax and Customs Administration receives over 60,000 reports of phishing every year. The second part of the presentation includes a live demo of a phishing panel. Using a phishing panel ensures the phishing victim pays for purchasing a 75" OLED TV without knowing it. The TV is delivered to the cybercriminal's address. All of this is live on stage. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/KT8ZGY/…
Onaangekondigde Persconferentie by Hackerhotel 2025 - Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: -
Sociale constructen gebruikt in software context en alles wat daar entertainment mee maakt :) Een interactieve presentatie over waarom beperkingen op je dataset zetten onhandig is. Wat is data? Hoe lang duurt een dag? Hoe lang duurt een uur? Hoe lang is een maand? Wat is een jaartal? Wat is een geboortedatum? Wat is een naam? Hoe lang is een pincode? Waaruit bestaat een pincode? Hoe veilig is een private key? Wat zijn mooie ronde getallen? Hoe groot is een bit? Hoe groot is een byte? Waarom zou je sorteren op afmeting? Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/UHZ3EJ/…
Üdvözlünk a Player FM-nél!
A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.