|
| Adams 12 | Borg 10 | Clarke 10 | Dijkstra 9 | Eliza 10 |
11:00 |  | Opening Event rixx, rufus | | | | | | | | |
11:10 | | | | | | | | | | |
11:20 | | | | | | | | | | |
11:30 |  | The Precariat: A Disruptive Class for Disruptive Times. Guy Standing |  | The Rocky Road to TLS 1.3 and better Internet Encryption hanno |  | Locked up science Claudia Frick - @FuzzyLeapfrog |  | Artistic PCB Design and Fabrication hammes hacks |  | Going Deep Underground to Watch the Stars Jost Migenda |
11:40 | | | | | | | | | | |
11:50 | | | | | | | | | | |
12:00 | | | | | | | | | | |
12:10 | | | | | | | | | | |
12:20 | | | | | | | | | | |
12:30 | | | | |  | Mind the Trap: Die Netzpolitik der AfD im Bundestag Noujoum | | | | |
12:40 | | | | | | | | | | |
12:50 |  | Election Cybersecurity Progress Report J. Alex Halderman |  | "The" Social Credit System Toni | | | | |  | LibreSilicon Andreas Westerwick, hsank, leviathan |
13:00 | | | | | | | | | | |
13:10 | | | | | | | | | | |
13:20 | | | | | | | | | | |
13:30 | | | | |  | First Sednit UEFI Rootkit Unveiled Frédéric Vachon |  | Frontex: Der europäische Grenzgeheimdienst Matthias Monroy | | |
13:40 | | | | | | | | | | |
13:50 | | | | | | | | | | |
14:00 | | | | | | | | | | |
14:10 |  | Taming the Chaos: Can we build systems that actually work? Peter Sewell |  | Censored Planet: a Global Censorship Observatory Roya Ensafi | | | | |  | SiliVaccine: North Korea's Weapon of Mass Detection Mark Lechtik |
14:20 | | | | | | | | | | |
14:30 | | | | |  | Datenschutz für Neulandbürger Beata Hubrig |  | Updates von der europäischen Außengrenze Nico, Nina Gassmann | | |
14:40 | | | | | | | | | | |
14:50 | | | | | | | | | | |
15:00 | | | | | | | | | | |
15:10 | | | | | | | | | | |
15:20 | | | | | | | | | | |
15:30 | | | | | | | | | | |
15:40 | | | | | | | | | | |
15:50 | | | | | | | | | | |
16:00 | | | | | | | | | | |
16:10 |  | Hunting the Sigfox: Wireless IoT Network Security Florian Euchner (Jeija) |  | How does the Internet work? Peter Stuge |  | Space Ops 101 sven |  | (Cyber-)Stalking: Wenn Grenzen verschwimmen Jan Kalbitzer, Korina Winter |  | Scuttlebutt Zenna / zelf |
16:20 | | | | | | | | | | |
16:30 | | | | | | | | | | |
16:40 | | | | | | | | | | |
16:50 | | | | | | | | | | |
17:00 | | | | | | | | | | |
17:10 |  | Introduction to Deep Learning teubi | | | | |  | Stalking, Spy Apps, Doxing: Digitale Gewalt gegen Frauen Anne Roth |  | Information Biology - Investigating the information flow in living systems Jürgen Pahle |
17:20 | | | | | | | | | | |
17:30 | | |  | wallet.fail Dmitry Nedospasov, Josh Datko, Thomas Roth |  | Digital Airwaves Friederike | | | | |
17:40 | | | | | | | | | | |
17:50 | | | | | | | | | | |
18:00 | | | | | | | | | | |
18:10 |  | Hackerethik - eine Einführung frank | | | | |  | Compromising online accounts by cracking voicemail systems Martin Vigo |  | Afroroutes: Africa Elsewhere Sélim Harbi |
18:20 | | | | | | | | | | |
18:30 | | | | | | | | | | |
18:40 | | | | | | | | | | |
18:50 | | |  | "Das ist mir nicht erinnerlich." − Der NSU-Komplex heute Caro Keller (NSU-Watch) |  | Citzens or subjects? The battle to control our bodies, speech and communications Andreea Belu (EDRi), Diego Naranjo (EDRi) | | | | |
19:00 | | | | | | | | | | |
19:10 |  | Venenerkennung hacken Julian, starbug | | | | |  | Transmission Control Protocol Hannes Mehnert |  | A Routing Interregnum: Internet infrastructure transition in Crimea after Russian annexation Xenia |
19:20 | | | | | | | | | | |
19:30 | | | | | | | | | | |
19:40 | | | | | | | | | | |
19:50 | | | | | | | | | | |
20:00 | | | | | | | | | | |
20:10 | | | | | | | | | | |
20:20 | | | | | | | | | | |
20:30 | | | | | | | | | | |
20:40 | | | | | | | | | | |
20:50 |  | G10, BND-Gesetz und der effektive Schutz vor Grundrechten Klaus Landefeld |  | What The Fax?! Eyal Itkin, Yaniv Balmas |  | Chaos im Fernsehrat Leonhard Dobusch | | |  | A la recherche de l'information perdue Coco Sollfrank |
21:00 | | | | | | | | | | |
21:10 | | | | | | | | | | |
21:20 | | | | | | | | | | |
21:30 | | | | | | | | | | |
21:40 | | | | | | | | | | |
21:50 | | |  | Genom-Editierung mit CRISPR/Cas _Adora_Belle_, André Lampe, KaLeiMai | | | | | | |
22:00 | | | | | | | | | | |
22:10 |  | All Your Gesundheitsakten Are Belong To Us Martin Tschirsich | | |  | Quantum Mechanics sri |  | Open Source Firmware zaolin |  | Tactical Embodiment Angela Washko |
22:20 | | | | | | | | | | |
22:30 | | | | | | | | | | |
22:40 | | | | | | | | | | |
22:50 | | |  | Modchips of the State Trammell Hudson | | | | | | |
23:00 | | | | | | | | | | |
23:10 | | | | | | | | | | |
23:20 | | | | | | | | | | |
23:30 |  | Polizeigesetze Constanze Kurz, Marie Bröckling | | |  | It Always Feels Like the Five Eyes Are Watching You Kurt Opsahl |  | Hacking Ecology Theodor Sperlea |  | SD-WAN a New Hop Sergey Gordeychik |
23:40 | | | | | | | | | | |
23:50 | | |  | Inside the AMD Microcode ROM Benjamin Kollenda, Philipp Koppe | | | | | | |
00:00 | | | | | | | | | | |
00:10 | | | | | | | | | | |
00:20 | | | | | | | | | | |
00:30 | | | | | | | | | | |
00:40 |  | Freude ist nur ein Mangel an Information Nico Semsrott | | | | | | | | |
00:50 | | | | | | | | | | |
01:00 | | | | | | | | | | |
01:10 | | | | | | | | | | |
01:20 | | | | | | | | | | |
01:30 | | | | | | | | | | |