hello datenspuren 2016
parent
e710faaf4c
commit
41c55b2c53
20
Makefile
20
Makefile
|
@ -35,7 +35,7 @@ DESTDIR?=www-export
|
|||
# XSLT-Stylesheets:
|
||||
STYLE=xsl/xhtml5.xsl
|
||||
DS_STYLE=xsl/datenspuren/xhtml5.xsl
|
||||
DS_YEAR=2015
|
||||
DS_YEAR=2016
|
||||
# Document-Type-Definition:
|
||||
DTD:=dtd/c3d2web.dtd
|
||||
# XML-Katalog (Pfad zu den DTDs) - wird benötigt vom Validator
|
||||
|
@ -272,16 +272,16 @@ build/news/%.html: content/news/%.xml $(STYLE) $(NAVIGATION) $(DATESTAMP)
|
|||
|
||||
# Datenspuren
|
||||
|
||||
DS_FEEDS=datenspuren-2015-mp4.xml datenspuren-2015-webm.xml datenspuren-2015-opus.xml datenspuren-2015-mp3.xml
|
||||
DS_FEEDS=datenspuren-$(DS_YEAR)-mp4.xml datenspuren-$(DS_YEAR)-webm.xml datenspuren-$(DS_YEAR)-opus.xml datenspuren-$(DS_YEAR)-mp3.xml
|
||||
|
||||
datenspuren-2015-mp4.xml:
|
||||
$(WGET) -O $@ https://media.ccc.de/podcast/conferences%2Fdatenspuren%2F2015/mp4
|
||||
datenspuren-2015-webm.xml:
|
||||
$(WGET) -O $@ https://media.ccc.de/podcast/conferences%2Fdatenspuren%2F2015/webm
|
||||
datenspuren-2015-opus.xml:
|
||||
$(WGET) -O $@ https://media.ccc.de/podcast/conferences%2Fdatenspuren%2F2015/opus
|
||||
datenspuren-2015-mp3.xml:
|
||||
$(WGET) -O $@ https://media.ccc.de/podcast/conferences%2Fdatenspuren%2F2015/mp3
|
||||
datenspuren-$(DS_YEAR)-mp4.xml:
|
||||
$(WGET) -O $@ https://media.ccc.de/podcast/conferences%2Fdatenspuren%2F$(DS_YEAR)/mp4
|
||||
datenspuren-$(DS_YEAR)-webm.xml:
|
||||
$(WGET) -O $@ https://media.ccc.de/podcast/conferences%2Fdatenspuren%2F$(DS_YEAR)/webm
|
||||
datenspuren-$(DS_YEAR)-opus.xml:
|
||||
$(WGET) -O $@ https://media.ccc.de/podcast/conferences%2Fdatenspuren%2F$(DS_YEAR)/opus
|
||||
datenspuren-$(DS_YEAR)-mp3.xml:
|
||||
$(WGET) -O $@ https://media.ccc.de/podcast/conferences%2Fdatenspuren%2F$(DS_YEAR)/mp3
|
||||
|
||||
build/datenspuren/$(DS_YEAR)/schedule-%.raw.xml: content/static/datenspuren/$(DS_YEAR)/fahrplan/schedule/%.html scripts/hyphenate.sed $(DATESTAMP)
|
||||
scripts/hyphenate.sed < $< > $@
|
||||
|
|
|
@ -1,33 +1,8 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE page SYSTEM "http://www.c3d2.de/dtd/c3d2web.dtd">
|
||||
|
||||
<page pagetitle="Datenspuren 2015" title="Datenspuren" xmlns:x="http://www.w3.org/1999/xhtml">
|
||||
<p title="Freitag, 23. Oktober, abends">
|
||||
Ab 20:00 Uhr: Social Event für alle Mitwirkenden im <link
|
||||
href="http://www.countdown-dresden.de/directions/index">Count
|
||||
Down</link>
|
||||
<page pagetitle="Datenspuren 2016" title="Datenspuren" xmlns:x="http://www.w3.org/1999/xhtml">
|
||||
<p>
|
||||
Wird vor der Veranstaltung hier erscheinen.
|
||||
</p>
|
||||
|
||||
<include-frab-schedule src="../../build/datenspuren/2015/schedule-0.xml"
|
||||
title="Sonnabend, 24. Oktober"/>
|
||||
<p title="Workshops für Kinder und Jugendliche">
|
||||
</p>
|
||||
<ul>
|
||||
<li>12:00 - 16:00 Lötpunkt (Foyer)</li>
|
||||
<li>13:00 - 16:00 Enigma-Workshop (Erlebnisland Mathematik)</li>
|
||||
<li>13:00 - 17:00 Sniffer-Installation (Erlebnisland Mathematik)</li>
|
||||
</ul>
|
||||
<p title="Sonnabend, 24. Oktober, abends">
|
||||
Am Samstag im TSD-Café im Turm: <strong>Lounge</strong> ab 17:00
|
||||
Uhr, <strong>Party</strong> ab 19:00 Uhr
|
||||
</p>
|
||||
|
||||
<include-frab-schedule src="../../build/datenspuren/2015/schedule-1.xml"
|
||||
title="Sonntag, 25. Oktober"/>
|
||||
<p title="Workshops für Kinder und Jugendliche">
|
||||
</p>
|
||||
<ul>
|
||||
<li>13:00 - 16:00 Enigma-Workshop (Erlebnisland Mathematik)</li>
|
||||
<li>13:00 - 17:00 Sniffer-Installation (Erlebnisland Mathematik)</li>
|
||||
</ul>
|
||||
</page>
|
||||
|
|
|
@ -1,41 +1,19 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE page SYSTEM "http://www.c3d2.de/dtd/c3d2web.dtd">
|
||||
|
||||
<page pagetitle="Datenspuren 2015" title="Datenspuren">
|
||||
<page pagetitle="Datenspuren 2016" title="Datenspuren">
|
||||
<p class="center">
|
||||
Mitschnitte schon jetzt
|
||||
Mitschnitte des Vorjahres
|
||||
<link href="https://media.ccc.de/c/ds2015">auf media.ccc.de</link>
|
||||
</p>
|
||||
<p class="center">
|
||||
Vortrag gesehen?
|
||||
<link href="fahrplan.html">Feedback im Fahrplan abgeben!</link>
|
||||
</p>
|
||||
|
||||
<p class="center">
|
||||
<link title="PDF" href="images/ds15-flyer.pdf">
|
||||
<image title="Flyer Datenspuren 2015">images/ds15-flyer.png</image>
|
||||
</link>
|
||||
</p>
|
||||
|
||||
<p>
|
||||
Die Datenspuren 2015 wollen sich mit der Bedeutung und
|
||||
Definition der (digitalen) Privatsphäre im Zeitalter von
|
||||
Internet of Things und Snowden beschäftigen. Denn unsere
|
||||
Privatsphäre wird einerseits von uns selbst durch neue
|
||||
Smart-Geräte und andererseits durch staatliche Stellen
|
||||
(siehe Snowden) eingeschränkt. Hier ist ein neues
|
||||
Bewusstsein gefragt und die Grenzen müssen für Firmen und
|
||||
Staat neu definiert werden.
|
||||
<link href="about.html">Mehr...</link>
|
||||
</p>
|
||||
|
||||
<dl>
|
||||
<dt>Info-Wiki:</dt>
|
||||
<dd><link>https://wiki.c3d2.de/Datenspuren_2015</link></dd>
|
||||
<dd><link>https://wiki.c3d2.de/Datenspuren_2016</link></dd>
|
||||
<dt>Etherpad:</dt>
|
||||
<dd><link>https://pentapad.c3d2.de/p/Datenspuren_2015_allgemein</link></dd>
|
||||
<dd><link>https://pentapad.c3d2.de/p/Datenspuren_2016_allgemein</link></dd>
|
||||
<dt>Orga-Wiki:</dt>
|
||||
<dd><link>https://wiki.c3d2.de/Datenspuren_2015/Organisation</link></dd>
|
||||
<dd><link>https://wiki.c3d2.de/Datenspuren_2016/Organisation</link></dd>
|
||||
<dt>Chat:</dt>
|
||||
<dd>IRC-Channel <link
|
||||
href="irc://irc.freenode.net/datenspuren">#datenspuren</link>
|
||||
|
@ -44,17 +22,15 @@
|
|||
<dd><link href="https://twitter.com/datenspuren">@datenspuren</link> und Hashtag <link href="https://twitter.com/search?q=%23datenspuren">#datenspuren</link></dd-->
|
||||
<dt>E-Mail:</dt>
|
||||
<dd><link href="mailto:datenspuren@c3d2.de">datenspuren@c3d2.de</link> und <link href="https://lists.c3d2.de/cgi-bin/mailman/listinfo/datenspuren">Mailing-Liste datenspuren@lists.c3d2.de</link></dd>
|
||||
<dt>App:</dt>
|
||||
<dd><link href="https://play.google.com/store/apps/details?id=info.metadude.android.datenspuren.schedule">Fahrplan-App für Android</link> von Tobias Preuss (<link href="https://github.com/johnjohndoe/CampFahrplan/tree/datenspuren-2015">Source</link>)</dd>
|
||||
</dl>
|
||||
|
||||
<div title="Termin" itemscope="itemscope" itemtype="http://schema.org/EducationEvent" class="event-page h-event vevent">
|
||||
<a itemprop="url" href="http://datenspuren.de/2015/"><span itemprop="name" class="name n"><strong>Datenspuren</strong></span></a>
|
||||
<div itemprop="description">12. Symposium Datenspuren 2015</div>
|
||||
<a itemprop="url" href="http://datenspuren.de/2016/"><span itemprop="name" class="name n"><strong>Datenspuren</strong></span></a>
|
||||
<div itemprop="description">13. Symposium Datenspuren 2016</div>
|
||||
<span>
|
||||
<div>
|
||||
<span itemprop="startDate" content="2015-10-23T12:00" class="dt-start dtstart">24.10.</span> -
|
||||
<span itemprop="endDate" content="2015-10-24T17:45" class="dt-end dtend">25.10.2015</span>
|
||||
<span itemprop="startDate" content="2016-10-22T12:00" class="dt-start dtstart">22.10.</span> -
|
||||
<span itemprop="endDate" content="2016-10-23T17:45" class="dt-end dtend">23.10.2016</span>
|
||||
</div>
|
||||
<div itemscope="itemscope" itemtype="http://schema.org/Performer" class="">
|
||||
<div itemscope="itemscope" itemtype="http://schema.org/Organization">
|
||||
|
|
|
@ -0,0 +1,149 @@
|
|||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE html>
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="de" xml:lang="de" dir="ltr">
|
||||
<head>
|
||||
<meta charset="utf-8"/>
|
||||
<meta http-equiv="content-type" content="text/html; charset=UTF-8"/>
|
||||
<meta name="description" content="Symposium Datenspuren - Crypto Is Not A Crime, 2015, Technische Sammlungen Dresden, veranstaltet vom Chaos Computer Club Dresden"/>
|
||||
<meta name="keywords" content="Symposium Datenspuren,c3d2,Chaos Computer Club,CCC,Dresden,Datenschutz,Privatsphäre,IPv6,Cloud,ePostbrief,de-Mail,Anonymität,informationelle Selbstbestimmung,Überwachung,Data Mining,ETSI,RFID,Mautsystem,Remailer,TCPA,TCG,Bundestrojaner,Vorratsdatenspeicherung,Biometrie"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no"/>
|
||||
<meta name="robots" content="index,follow"/>
|
||||
<meta name="language" content="German"/>
|
||||
<link rel="stylesheet" type="text/css" href="style/style.css"/>
|
||||
<link rel="shortcut icon" href="images/favicon.ico" type="image/x-icon"/>
|
||||
<link rel="alternate" type="application/rss+xml" title="RSS 2.0" href="news-rss.xml"/>
|
||||
<link rel="alternate" type="application/atom+xml" title="Atom 1.0" href="news-atom.xml"/>
|
||||
<title>Datenspuren 2015 — Über die Datenspuren</title>
|
||||
</head>
|
||||
<body>
|
||||
<nav data-stellar-ratio="0">
|
||||
<ul>
|
||||
<li>
|
||||
<a href="index.html">Start</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="about.html">Über</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="location.html">Ort</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="help.html">Helfen</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="fahrplan.html">Fahrplan</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="mitschnitte.html">Mitschnitte</a>
|
||||
</li>
|
||||
</ul>
|
||||
</nav>
|
||||
<div id="head1" data-stellar-ratio="0.125"> </div>
|
||||
<div id="head2" data-stellar-ratio="0.20"> </div>
|
||||
<div id="head3" data-stellar-ratio="0.75"> </div>
|
||||
<article>
|
||||
|
||||
<h3 id="über-die-datenspuren">Über die Datenspuren</h3><p>
|
||||
Menschen hinterlassen Spuren - absichtlich und unwillkürlich. In Computersystemen hinterlassen sie ihre Daten als "Datenspuren". Diese Daten beziehen sich auf uns, folgen uns und holen uns ein. Sie sind oftmals belanglos, manchmal aber auch wichtig. Sie sind sowohl hilfreich als auch lästig. Sie erinnern sich an uns, auch wenn wir sie vergessen. Und.vielleicht bleiben sie länger erhalten, als mancher sich das vorstellen mag.
|
||||
</p>
|
||||
<p>
|
||||
Seit 2004 gibt es die Veranstaltung <strong>"Datenspuren"</strong> in
|
||||
Dresden. Ein Chaot erinnert sich:
|
||||
</p>
|
||||
<blockquote>
|
||||
<p>
|
||||
"Die Idee zu den Datenspuren kam, wenn ich mich recht erinnere, von Fukami. Er vertrat die Meinung, wir müssten unser öffentliches Engagement, das bis dahin nur aus Themenabenden mit Einzelvorträgen bestand, auf ein Event fokussieren. Wir waren nur wenige Aktive und wie einige andere bezweifelte ich die Machbarkeit. FSM-sei-dank war ich jung und unerfahren und ließ mich überzeugen; einige andere Chaoten auch. Wir organisierten also die ersten Datenspuren, damals noch im Pentacon - und es war ein voller Erfolg. Der Schritt, die Location zu wechseln (hin zur Scheune in der Neustadt) und dann ein Jahr später ein zweitägiges Event daraus zu machen, waren weniger schwer als der erste: Überhaupt irgendwas zu machen."
|
||||
</p>
|
||||
</blockquote>
|
||||
<h3 id="ziel">Ziel</h3><p>
|
||||
Nicht alles ist gut. Darum reden wir darüber. Wir diskutieren und analysieren neue Trends in der IT - und wir wollen mit unseren kritischen Beiträgen sowohl den Gedankenaustausch zwischen Politik, Gesellschaft und Hackerschaft fördern, als auch zum Mitmachen und Mitgestalten anregen. Wir sind inhaltlich unabhängig von Sponsoren und rein ehrenamtlich organisiert.
|
||||
</p>
|
||||
|
||||
<h3>Geschichte</h3>
|
||||
<h4>2004</h4>
|
||||
<p>
|
||||
Im Mai 2004 veranstaltete der Chaos Computer Club Dresden die ersten
|
||||
DatenSpuren [sic!] unter dem Motto "Privatsphäre war gestern", mit
|
||||
einer Keynote von Prof. Andreas Pfitzmann (ehemaliger Professor für
|
||||
Datenschutz & -sicherheit an der TUD). Damals noch eine <a href="https://datenspuren.de/2004">eintägige Veranstaltung</a> in den Räumen des Pentacon, starteten die DatenSpuren mit gut 20 Vorträgen zu E-Mail Verschlüsselung (mit Keysigning Party), Vorratsdatenspeicherung, dem Mautsystem und Datenschutz in Sachsen und Europa.
|
||||
</p>
|
||||
<h4>2005</h4>
|
||||
<p>
|
||||
2005 zogen die Datenspuren vom Pentacon in die Scheune in der
|
||||
Neustadt, in deren Räumlichkeiten die Veranstaltung über die nächsten
|
||||
9 Jahre immer weiter wuchs. Damals hofften wir noch, dass man mit
|
||||
Identitätsmanagement Datenschutzprobleme in den Griff bekommen
|
||||
könnte. Heute diskutieren Politiker über <a href="http://www.netzwelt.de/news/88318-google-cdu-politiker-befuerworten-klarnamenzwang.html">Klarnamenzwang
|
||||
und Identifizierung mit dem Personalausweis beim Surfen</a>. Auch
|
||||
viele andere der früheren Vorträge und Themen sind heute noch ebenso
|
||||
aktuell wie ehedem: Videoüberwachung wird immer noch diskutiert - wie
|
||||
auch Biometrie in Ausweisdokumenten oder das Auswerten von
|
||||
Mobilfunkdaten. Die Erfassung und Lokalisierung von Teilnehmern in
|
||||
Mobilfunknetzen war damals nur ein Vortrag. Ein paar Jahre später
|
||||
wurde es in Dresden Realität: <em>"Handygate"</em> beschäftigt in Dresden nicht
|
||||
nur die Hackergemeinde, seit 2010 und 2011, als im Rahmen von
|
||||
Protesten gegen den jährlich stattfindenden Neonazi-Aufmarsch zum
|
||||
13. Februar massenhaft Handydaten von Bürgerinnen und Bürgern ganzer
|
||||
Stadtteile gesammelt und ausgewertet wurden - illegal, <a href="https://netzpolitik.org/2013/landgericht-dresden-groste-funkzellenabfrage-von-handygate-2011-war-illegal/">wie später ein Gericht befand</a>.
|
||||
</p>
|
||||
<h4>2006 - 2014</h4>
|
||||
<p>
|
||||
Im Jahr 2006 reichte uns ein Tag nicht mehr aus - die Voträge und Workshops wurden immer vielfältiger und wir erweiterten die Veranstaltung um einern weiteren Tag. Neue Themen und Diskussionen wie über den Wert von Aufenthaltsinformationen von Nutzern, Biometrie, Videoüberwachung, TOR, I2P, Verschlüsselung, IT-Security, Zensur, Open-Data, Informations-Freiheits und andere -Gesetze, sowie weiteres bereicherten die nunmehr DatenSpuren. Um die zukünftigen Generationen an unsere Themen heranzuführen, wurde das Programm der Datenspuren ab 2011 um einen Junghackertrack erweitert, der seitdem auch ein fester Bestandteil des Chaos Communication Congress ist. Bausätze für kleine und große Hacker und Haecksen wurden entwickelt, so z. B. der Pentabug.
|
||||
</p>
|
||||
<h4>2015</h4>
|
||||
<p>
|
||||
Nach 10 Jahren ziehen die Datenspuren wieder zurück nach Striesen - um
|
||||
etwas neues auszuprobieren. In den <a href="http://www.tsd.de/">Technischen Sammlungen Dresden</a> haben wir thematisch eine passende Umgebung und viel mehr Raum für neue Ideen. Zu den Technischen Sammlungen passt auch unser diesjähriges Motto: <em>"Hackers in the house"</em>. Auch wenn es vielmehr um die Bedeutung der (digitalen) Privatsphäre gehen soll, die wir einerseits durch neue Smart <Irgendwas> Geräte und andererseits durch staatliche Stellen (siehe Snowden) gefährdet sehen. Hier sind neue Grenzen zu ziehen - worüber wir diskutieren wollen. Ein wichtiges Themengebiet soll daher auch die Kryptographie werden - und die politische Meinung dazu (<em>"Crypto is not a crime"</em>).
|
||||
</p>
|
||||
|
||||
</article>
|
||||
<footer>
|
||||
<ul id="oldds">
|
||||
<li>
|
||||
<a href="../2014/">2014</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2013/">2013</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2012/">2012</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2011/">2011</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2010/">2010</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2009/">2009</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2008/">2008</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2007/">2007</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2006/">2006</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2005/">2005</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2004/">2004</a>
|
||||
</li>
|
||||
</ul>
|
||||
<div><a href="http://www.c3d2.de/">Chaos Computer Club Dresden</a> |
|
||||
<a href="mailto:mail@c3d2.de" title="eMail webmaster">mail@c3d2.de</a></div>
|
||||
</footer>
|
||||
<script type="application/javascript" src="script/jquery-2.1.4.min.js"> </script>
|
||||
<script type="application/javascript" src="script/jquery.stellar.min.js"> </script>
|
||||
<script type="application/javascript">
|
||||
$.stellar({
|
||||
positionProperty: 'transform',
|
||||
hideDistantElements: false,
|
||||
responsive: true
|
||||
});
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,172 @@
|
|||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE html>
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="de" xml:lang="de" dir="ltr">
|
||||
<head>
|
||||
<meta charset="utf-8"/>
|
||||
<meta http-equiv="content-type" content="text/html; charset=UTF-8"/>
|
||||
<meta name="description" content="Symposium Datenspuren - Crypto Is Not A Crime, 2015, Technische Sammlungen Dresden, veranstaltet vom Chaos Computer Club Dresden"/>
|
||||
<meta name="keywords" content="Symposium Datenspuren,c3d2,Chaos Computer Club,CCC,Dresden,Datenschutz,Privatsphäre,IPv6,Cloud,ePostbrief,de-Mail,Anonymität,informationelle Selbstbestimmung,Überwachung,Data Mining,ETSI,RFID,Mautsystem,Remailer,TCPA,TCG,Bundestrojaner,Vorratsdatenspeicherung,Biometrie"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no"/>
|
||||
<meta name="robots" content="index,follow"/>
|
||||
<meta name="language" content="German"/>
|
||||
<link rel="stylesheet" type="text/css" href="style/style.css"/>
|
||||
<link rel="shortcut icon" href="images/favicon.ico" type="image/x-icon"/>
|
||||
<link rel="alternate" type="application/rss+xml" title="RSS 2.0" href="news-rss.xml"/>
|
||||
<link rel="alternate" type="application/atom+xml" title="Atom 1.0" href="news-atom.xml"/>
|
||||
<title>Datenspuren 2015 — Call for Participation</title>
|
||||
</head>
|
||||
<body>
|
||||
<nav data-stellar-ratio="0">
|
||||
<ul>
|
||||
<li>
|
||||
<a href="index.html">Start</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="about.html">Über</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="location.html">Ort</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="help.html">Helfen</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="fahrplan.html">Fahrplan</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="mitschnitte.html">Mitschnitte</a>
|
||||
</li>
|
||||
</ul>
|
||||
</nav>
|
||||
<div id="head1" data-stellar-ratio="0.125"> </div>
|
||||
<div id="head2" data-stellar-ratio="0.20"> </div>
|
||||
<div id="head3" data-stellar-ratio="0.75"> </div>
|
||||
<article>
|
||||
<p class="center">(Also available in <a href="cfp.html">German</a>)</p>
|
||||
<h3 id="datenspuren-2015:-call-for-participation">Datenspuren 2015: Call for Participation</h3><p>
|
||||
Technische Sammlungen Dresden, Sat+Sun October 24+25, 2015
|
||||
</p>
|
||||
<p class="block"><em>
|
||||
Girls and boys,
|
||||
get up on your feet and make some noise,
|
||||
because hackers are in the house!
|
||||
</em></p>
|
||||
<p>
|
||||
In June 2013, Edward Snowden came public with an intelligence affair, so
|
||||
extensive and intricate, that it went straight into the history books. Since
|
||||
that day, no day has passed without continuing intelligence scandals
|
||||
continuously filling print and online news.These affairs create a new
|
||||
awareness for our digital rights, which we once took
|
||||
for granted but now find fading away to mere symbols in an erosive
|
||||
atmosphere
|
||||
of clever policing in our shiny new digital world.
|
||||
</p>
|
||||
<p><strong>Where</strong> "everyone is suspicious" is a mantra, which leaks out from
|
||||
behind the
|
||||
closed doors of the security agencies. This violates the fundamental trust
|
||||
between citizens and the executive authorities, which is a key
|
||||
ingredient for
|
||||
democracies.
|
||||
</p>
|
||||
<p><strong>Where</strong> digitalisation makes every person transparent and privacy shall
|
||||
remain a
|
||||
state-owned privilege, we ask: how much secrecy does a democracy need
|
||||
and how
|
||||
much of it can we bear?
|
||||
</p>
|
||||
<p><strong>Where</strong> Big Data determines more and more of our everyday life and the vague
|
||||
promised advantages provided by of smart applications suffices to vilify
|
||||
perseverance on privacy rights as obsolete and reactionary, we need to
|
||||
discuss
|
||||
how much privacy to concede and who grants it.
|
||||
</p>
|
||||
<p>
|
||||
Thus, Big Data requires a wholesome realignment of the relationship between
|
||||
people, state and economy. It also requires the digital vanguards that
|
||||
significantly further these developments in big corps' IT departments, at
|
||||
universities, in hackerspaces, or in the data centres of the services to
|
||||
rethink their responsibilities.
|
||||
</p>
|
||||
<p>
|
||||
Therefore, the Chaos Computer Club Dresden (c3d2) invites you to submit
|
||||
proposals for technical, scientific, and artistic contributions to our event
|
||||
"Datenspuren 2015". Topics are, not exclusively:
|
||||
</p>
|
||||
<ul><li>Cryptowars back then and today</li><li>Usability of cryptography</li><li>Forms of digital self-defence</li><li>Computer safety and security</li><li>Opportunities and perils of smart devices</li><li>Making you own devices (Maker + Breaker Scene)</li><li>Free Software & Open Hardware</li><li>Hacking as sub- and anticulture</li><li>Information ethics and privacy</li><li>Arts and electronics</li></ul>
|
||||
<dl class="">
|
||||
<dt>Deadline for submissions</dt>
|
||||
<dd>30th of August 2015 (prolongued due to Camp)</dd>
|
||||
<dt>Format</dt>
|
||||
<dd>Abstract (max. 300 words) for a lecture, workshop,
|
||||
installation/performance, young hackers track</dd>
|
||||
<dt>Submission of lectures and workshops</dt>
|
||||
<dd>with the conference system frab:
|
||||
<a href="https://frab.cccv.de/en/DS2015/cfp/session/new#new_user">https://frab.cccv.de/en/DS2015/cfp/session/new#new_user</a></dd>
|
||||
<dt>Contact and questions</dt>
|
||||
<dd>Organizing team: datenspuren@c3d2.de</dd>
|
||||
<dd>Mailing list: datenspuren@lists.c3d2.de</dd>
|
||||
</dl>
|
||||
<p>
|
||||
Notice on acceptance/rejection of submissions will be given until
|
||||
15th of
|
||||
September 2015.
|
||||
</p>
|
||||
<p>
|
||||
The event Datenspuren is a non-commercial community event. As we neither ask
|
||||
for entrance nor participation fees, we cannot pay any royalties. However,
|
||||
subsidizing travel and overnight stay might be granted for limited
|
||||
exceptions
|
||||
if reasonably founded. Applications can be directed to the <a href="mailto:datenspuren@c3d2.de">organization
|
||||
team.</a></p>
|
||||
<p class="block"><em>See you in da house!</em></p>
|
||||
</article>
|
||||
<footer>
|
||||
<ul id="oldds">
|
||||
<li>
|
||||
<a href="../2014/">2014</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2013/">2013</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2012/">2012</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2011/">2011</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2010/">2010</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2009/">2009</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2008/">2008</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2007/">2007</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2006/">2006</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2005/">2005</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2004/">2004</a>
|
||||
</li>
|
||||
</ul>
|
||||
<div><a href="http://www.c3d2.de/">Chaos Computer Club Dresden</a> |
|
||||
<a href="mailto:mail@c3d2.de" title="eMail webmaster">mail@c3d2.de</a></div>
|
||||
</footer>
|
||||
<script type="application/javascript" src="script/jquery-2.1.4.min.js"> </script>
|
||||
<script type="application/javascript" src="script/jquery.stellar.min.js"> </script>
|
||||
<script type="application/javascript">
|
||||
$.stellar({
|
||||
positionProperty: 'transform',
|
||||
hideDistantElements: false,
|
||||
responsive: true
|
||||
});
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,145 @@
|
|||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE html>
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="de" xml:lang="de" dir="ltr">
|
||||
<head>
|
||||
<meta charset="utf-8"/>
|
||||
<meta http-equiv="content-type" content="text/html; charset=UTF-8"/>
|
||||
<meta name="description" content="Symposium Datenspuren - Crypto Is Not A Crime, 2015, Technische Sammlungen Dresden, veranstaltet vom Chaos Computer Club Dresden"/>
|
||||
<meta name="keywords" content="Symposium Datenspuren,c3d2,Chaos Computer Club,CCC,Dresden,Datenschutz,Privatsphäre,IPv6,Cloud,ePostbrief,de-Mail,Anonymität,informationelle Selbstbestimmung,Überwachung,Data Mining,ETSI,RFID,Mautsystem,Remailer,TCPA,TCG,Bundestrojaner,Vorratsdatenspeicherung,Biometrie"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no"/>
|
||||
<meta name="robots" content="index,follow"/>
|
||||
<meta name="language" content="German"/>
|
||||
<link rel="stylesheet" type="text/css" href="style/style.css"/>
|
||||
<link rel="shortcut icon" href="images/favicon.ico" type="image/x-icon"/>
|
||||
<link rel="alternate" type="application/rss+xml" title="RSS 2.0" href="news-rss.xml"/>
|
||||
<link rel="alternate" type="application/atom+xml" title="Atom 1.0" href="news-atom.xml"/>
|
||||
<title>Datenspuren 2015 — Call for Participation</title>
|
||||
</head>
|
||||
<body>
|
||||
<nav data-stellar-ratio="0">
|
||||
<ul>
|
||||
<li>
|
||||
<a href="index.html">Start</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="about.html">Über</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="location.html">Ort</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="help.html">Helfen</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="fahrplan.html">Fahrplan</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="mitschnitte.html">Mitschnitte</a>
|
||||
</li>
|
||||
</ul>
|
||||
</nav>
|
||||
<div id="head1" data-stellar-ratio="0.125"> </div>
|
||||
<div id="head2" data-stellar-ratio="0.20"> </div>
|
||||
<div id="head3" data-stellar-ratio="0.75"> </div>
|
||||
<article>
|
||||
<p class="center">(Also available in <a href="cfp-en.html">English</a>)</p>
|
||||
<h3 id="datenspuren-2015:-call-for-participation">Datenspuren 2015: Call for Participation</h3><p>
|
||||
Technische Sammlungen Dresden, 24. + 25. Oktober 2015
|
||||
</p>
|
||||
<p class="block"><em>
|
||||
Girls and boys,
|
||||
get up on your feet and make some noise,
|
||||
because hackers are in the house!
|
||||
</em></p>
|
||||
<p>
|
||||
Seit den Enthüllungen von Edward Snowden vergeht kaum ein Tag, an dem nicht Abhör- und Spionageskandale die Newsseiten der Print- und Online-Medien füllen. Diese Skandale schaffen ein neues Bewusstsein dafür, dass als selbstverständlich erachtete Rechte in der schönen neuen digitalen Welt gefährdet sind.
|
||||
</p>
|
||||
<p><strong>Wo</strong> "Jeder ist verdächtig" das Mantra ist, das aus den vor neugierigen Blicken geschützten Fluren der Sicherheitsapparate bedrohlich nach außen dringt, dort scheint das für Demokratien so notwendige Grundvertrauen zwischen Bürgern und Staat gestört.
|
||||
</p>
|
||||
<p><strong>Wo</strong> die Digitalisierung den gläsernen Menschen schafft und Geheimhaltung ein Privileg des Staates bleiben soll, dort stellt sich die Frage, wie viel Geheimnis eine Demokratie braucht und wie viel sie verträgt.
|
||||
</p>
|
||||
<p><strong>Wo</strong> in immer mehr Lebensbereichen vernetzbare Daten entstehen und das vage Versprechen auf smarte Anwendungen schon genügt, das Beharren auf Datenschutz als obsolet und fortschrittsfeindlich zu diffamieren, dort muss die Frage diskutiert werden, wie viel Datenautonomie wir uns zugestehen wollen und wer diese garantiert.
|
||||
</p>
|
||||
<p>
|
||||
Die Digitalisierung macht also eine umfassende Neubestimmung des Verhältnisses von Menschen, Staat und Ökonomie erforderlich. Und sie macht es erforderlich, dass die digitalen Avantgarden, die diese Entwicklung in den IT-Abteilungen großer Konzerne, an den Universitäten, in den Hackspaces oder in den Rechenzentren der Nachrichtendienste maßgeblich prägen und mitgestalten, ihre Rolle verstärkt reflektieren.
|
||||
</p>
|
||||
<p>
|
||||
Der Chaos Computer Club Dresden lädt daher dazu ein, Vorschläge für technische, wissenschaftliche oder künstlerische Beiträge zu den Datenspuren 2015 u. a. für folgenden Themenfelder einzureichen:
|
||||
</p>
|
||||
<ul><li>Cryptowars damals und heute</li><li>Crypto-Usability</li><li>Formen Digitaler Selbstverteidigung</li><li>Computer Safety + Security</li><li>Chancen und Risiken von Smart Devices</li><li>Making you own devices (Maker + Breaker Scene)</li><li>Freie Software + Hardware</li><li>Hacking als Sub- und Gegenkultur</li><li>Informationsethik und Datenschutz</li><li>Datenkunst, Kunst und Elektronik</li></ul>
|
||||
<dl class="">
|
||||
<dt id="einreichungsfrist">Einreichungsfrist</dt>
|
||||
<dd>30. August 2015 (verlängert wg. Camp)</dd>
|
||||
<dt>Format</dt>
|
||||
<dd>Kurzfassung (max. 300 Wörter) für Vortrag, Workshop, Installation/Performance, Junghackertrack</dd>
|
||||
<dt id="einreichung">Einreichung</dt>
|
||||
<dd>
|
||||
Vorträge und Workshops über das Konferenzsystem "frab":
|
||||
<a href="https://frab.cccv.de/en/DS2015/cfp/session/new#new_user">https://frab.cccv.de/en/DS2015/cfp/session/new</a>
|
||||
</dd>
|
||||
<dd>
|
||||
Installationen, Junghackertrack usw. über die Mailingliste:
|
||||
<a href="mailto:datenspuren@lists.c3d2.de">datenspuren@lists.c3d2.de</a>
|
||||
</dd>
|
||||
<dt>Kontakt und Rückfragen</dt>
|
||||
<dd>Organisationsteam: <a href="mailto:datenspuren@c3d2.de">datenspuren@c3d2.de</a></dd>
|
||||
<dd>Mailingliste: <a href="mailto:datenspuren@lists.c3d2.de">datenspuren@lists.c3d2.de</a></dd>
|
||||
</dl>
|
||||
<p>
|
||||
Eine Benachrichtigung über die Annahme der Beiträge erfolgt bis zum 15. September 2015.
|
||||
</p>
|
||||
<p>
|
||||
Die Datenspuren sind ein nichtkommerzieller Community-Event. Da wir weder Eintritt noch Teilnahmegebühren erheben ist es uns leider nicht möglich, Honorare zu zahlen. Auch die Bezuschussung von Reise- und Übernachtungskosten ist nur in Ausnahmefällen möglich. Anträge können gerne ans <a href="mailto:datenspuren@c3d2.de">Orga-Team</a> gestellt werden.
|
||||
</p>
|
||||
<p class="block"><em>See you in da house!</em></p>
|
||||
</article>
|
||||
<footer>
|
||||
<ul id="oldds">
|
||||
<li>
|
||||
<a href="../2014/">2014</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2013/">2013</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2012/">2012</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2011/">2011</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2010/">2010</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2009/">2009</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2008/">2008</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2007/">2007</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2006/">2006</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2005/">2005</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2004/">2004</a>
|
||||
</li>
|
||||
</ul>
|
||||
<div><a href="http://www.c3d2.de/">Chaos Computer Club Dresden</a> |
|
||||
<a href="mailto:mail@c3d2.de" title="eMail webmaster">mail@c3d2.de</a></div>
|
||||
</footer>
|
||||
<script type="application/javascript" src="script/jquery-2.1.4.min.js"> </script>
|
||||
<script type="application/javascript" src="script/jquery.stellar.min.js"> </script>
|
||||
<script type="application/javascript">
|
||||
$.stellar({
|
||||
positionProperty: 'transform',
|
||||
hideDistantElements: false,
|
||||
responsive: true
|
||||
});
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,731 @@
|
|||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE html>
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="de" xml:lang="de" dir="ltr">
|
||||
<head>
|
||||
<meta charset="utf-8"/>
|
||||
<meta http-equiv="content-type" content="text/html; charset=UTF-8"/>
|
||||
<meta name="description" content="Symposium Datenspuren - Crypto Is Not A Crime, 2015, Technische Sammlungen Dresden, veranstaltet vom Chaos Computer Club Dresden"/>
|
||||
<meta name="keywords" content="Symposium Datenspuren,c3d2,Chaos Computer Club,CCC,Dresden,Datenschutz,Privatsphäre,IPv6,Cloud,ePostbrief,de-Mail,Anonymität,informationelle Selbstbestimmung,Überwachung,Data Mining,ETSI,RFID,Mautsystem,Remailer,TCPA,TCG,Bundestrojaner,Vorratsdatenspeicherung,Biometrie"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no"/>
|
||||
<meta name="robots" content="index,follow"/>
|
||||
<meta name="language" content="German"/>
|
||||
<link rel="stylesheet" type="text/css" href="style/style.css"/>
|
||||
<link rel="shortcut icon" href="images/favicon.ico" type="image/x-icon"/>
|
||||
<link rel="alternate" type="application/rss+xml" title="RSS 2.0" href="news-rss.xml"/>
|
||||
<link rel="alternate" type="application/atom+xml" title="Atom 1.0" href="news-atom.xml"/>
|
||||
<title>Datenspuren 2015 — Datenspuren 2015</title>
|
||||
</head>
|
||||
<body>
|
||||
<nav data-stellar-ratio="0">
|
||||
<ul>
|
||||
<li>
|
||||
<a href="index.html">Start</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="about.html">Über</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="location.html">Ort</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="help.html">Helfen</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="fahrplan.html">Fahrplan</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="mitschnitte.html">Mitschnitte</a>
|
||||
</li>
|
||||
</ul>
|
||||
</nav>
|
||||
<div id="head1" data-stellar-ratio="0.125"> </div>
|
||||
<div id="head2" data-stellar-ratio="0.20"> </div>
|
||||
<div id="head3" data-stellar-ratio="0.75"> </div>
|
||||
<article>
|
||||
<h3 id="freitag,-23.-oktober,-abends">Freitag, 23. Oktober, abends</h3><p>
|
||||
Ab 20:00 Uhr: Social Event für alle Mitwirkenden im <a href="http://www.countdown-dresden.de/directions/index">Count
|
||||
Down</a></p>
|
||||
|
||||
<h3 class="scheduletitle">Sonnabend, 24. Oktober</h3><table class="schedule"><thead xmlns="">
|
||||
<tr>
|
||||
<th class="cell-time"/>
|
||||
<th>Erlebniswerkstatt</th>
|
||||
<th>Kino</th>
|
||||
<th>Technisches Theater</th>
|
||||
</tr>
|
||||
</thead><tbody xmlns="">
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>10:00</p></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height1" rowspan="1"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7125.html">Eröffnung</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/4616.html">Martin Christian</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height3" rowspan="3"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7124.html">Keynote</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/3549.html">linusneumannDS</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>11:00</p></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7068.html">Märchenstunde IT-Security</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/3963.html">dvalar</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7010.html">WebRTC Security</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Was ist WebRTC und (wieso) ist es sicher?
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5698.html">Stephan Thamm</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td class="cell-height8" rowspan="8"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7097.html">Das Internet der Dinge im Bildungskontext</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Wie lernen und arbeiten wir in Zukunft?
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5822.html">Sirkka Freigang</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>12:00</p></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>13:00</p></td>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/6988.html">eCall - Lebensretter oder Datenwanze im Auto?</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Chancen und Risiken des neuen automatischen PKW-Notrufs
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5709.html">Frank Brennecke</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7067.html">Smartcards</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Crypto für die Hosentasche?
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5782.html">reinhard</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>14:00</p></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td class="cell-height3" rowspan="3"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7047.html">Fenster einschlagen für Dummys</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Spaß in Windows-basierten Netzwerken - und was man dagegen tun kann
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5759.html">Rabbit@Net</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height3" rowspan="3"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7084.html">Die verängstigte Macht</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Aufklärung für politische Sicherheitsesoteriker
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5812.html">ajuvo</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td class="cell-height2" rowspan="2"><div class="event track-hardware-making">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7087.html">Mikrocontrollerbasiertes, mobiles Device zur sicheren Verschlüsselung von Textnachrichten</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5814.html">Robert Bonča</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>15:00</p></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td class="cell-height8" rowspan="8"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7100.html">Zukunftsstadt</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Wir schreiben das Jahr 2030. Dresden hat sich verändert. Es leben viele neue Menschen hier, der Klimawandel ist spürbar, aber die Stadt ist für alle lebenswert und angenehm. Dresden ist eine nachhaltige Metropole.
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"/>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7029.html">1,5 Jahre NSA-Untersuchungsausschuss: Rück- und Ausblick</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5735.html">anna</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td class="cell-height2" rowspan="2"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7094.html">HoneySens</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Automatisierte. Angriffserkennung auf Netzwerke
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5818.html">Pascal Brückner</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>16:00</p></td>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7522.html">Suprise Talk</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Poelzis Gedanken
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"/>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height2" rowspan="2"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7085.html">Rise of the Machines: Sie beginnen zu lernen.</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Woher Amazon weiß, für was du dich als nächstes interessierst
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/4771.html">Paul</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
</tbody></table>
|
||||
<h3 id="workshops-für-kinder-und-jugendliche">Workshops für Kinder und Jugendliche</h3><p/>
|
||||
<ul><li>12:00 - 16:00 Lötpunkt (Foyer)</li><li>13:00 - 16:00 Enigma-Workshop (Erlebnisland Mathematik)</li><li>13:00 - 17:00 Sniffer-Installation (Erlebnisland Mathematik)</li></ul>
|
||||
<h3 id="sonnabend,-24.-oktober,-abends">Sonnabend, 24. Oktober, abends</h3><p>
|
||||
Am Samstag im TSD-Café im Turm: <strong>Lounge</strong> ab 17:00
|
||||
Uhr, <strong>Party</strong> ab 19:00 Uhr
|
||||
</p>
|
||||
|
||||
<h3 class="scheduletitle">Sonntag, 25. Oktober</h3><table class="schedule"><thead xmlns="">
|
||||
<tr>
|
||||
<th class="cell-time"/>
|
||||
<th>Erlebniswerkstatt</th>
|
||||
<th>Kino</th>
|
||||
<th>Technisches Theater</th>
|
||||
</tr>
|
||||
</thead><tbody xmlns="">
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>10:00</p></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height6" rowspan="6"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7083.html">Die Grenzen des Geheimen</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Transparenz und Geheimhaltung im digitalen Zeitalter
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/4168.html">josch</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>11:00</p></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>12:00</p></td>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
<td class="cell-height6" rowspan="6"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7078.html">Webscraping Workshop</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5807.html">Mic92</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7060.html">Predictive Policing</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
das Hoverboard der Polizei
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5777.html">pilpul</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7000.html">Wir kochen Hagebuttenmarmelade</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Woran scheitert der Datenschutz?
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/3806.html">kusanowsky</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>13:00</p></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7132.html">Lightning Talks</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
5 Minuten Ruhm für jeden
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5711.html">eri!</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7069.html">EDN - Echt Dezentrales Netzwerk</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
GNUnet meets OpenWrt
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5792.html">t3sserakt</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height6" rowspan="6"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7072.html">Gnupg in der Praxis</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Vielseitige Nutzungsmöglichkeiten der Gnupg-Card
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/4765.html">datenkollektiv.net</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>14:00</p></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7123.html">Hacken der Freiheitssimulation</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Hacken der Demokratiesimulation
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"/>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7081.html">Einführung in SDR</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
was offene Hard und Software in Deiner Garage anrichten können
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers">
|
||||
<a href="/2015/fahrplan/speakers/3013.html">_john</a>, <a href="/2015/fahrplan/speakers/4689.html">polygon</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>15:00</p></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td class="cell-height6" rowspan="6"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7071.html">Nach der E-Mail</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Sichere Kommunikation mit oder ohne SMTP
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/4765.html">datenkollektiv.net</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
<td> </td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"><p>16:00</p></td>
|
||||
<td class="cell-height4" rowspan="4"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7066.html">Buchstaben-n-Gramme in der Autorenattribution</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
Quantitative und Qualitative Analysen
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/5783.html">Christopher Georgi</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
<td class="cell-height3" rowspan="3"><div class="event track-default">
|
||||
<div class="event-wrapper">
|
||||
<div class="event-header">
|
||||
<h2><a href="/2015/fahrplan/events/7082.html">Sicherer Kontaktdatenaustausch mit Sm@rtRNS</a></h2>
|
||||
</div>
|
||||
<div class="event-details">
|
||||
<div class="subtitle">
|
||||
|
||||
(de)
|
||||
</div>
|
||||
<div class="speakers"><a href="/2015/fahrplan/speakers/4652.html">Tesla42</a></div>
|
||||
</div>
|
||||
</div>
|
||||
</div></td>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
</tr>
|
||||
<tr class="cell-height1">
|
||||
<td class="cell-time"/>
|
||||
<td> </td>
|
||||
</tr>
|
||||
</tbody></table>
|
||||
<h3 id="workshops-für-kinder-und-jugendliche">Workshops für Kinder und Jugendliche</h3><p/>
|
||||
<ul><li>13:00 - 16:00 Enigma-Workshop (Erlebnisland Mathematik)</li><li>13:00 - 17:00 Sniffer-Installation (Erlebnisland Mathematik)</li></ul>
|
||||
</article>
|
||||
<footer>
|
||||
<ul id="oldds">
|
||||
<li>
|
||||
<a href="../2014/">2014</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2013/">2013</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2012/">2012</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2011/">2011</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2010/">2010</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2009/">2009</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2008/">2008</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2007/">2007</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2006/">2006</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2005/">2005</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="../2004/">2004</a>
|
||||
</li>
|
||||
</ul>
|
||||
<div><a href="http://www.c3d2.de/">Chaos Computer Club Dresden</a> |
|
||||
<a href="mailto:mail@c3d2.de" title="eMail webmaster">mail@c3d2.de</a></div>
|
||||
</footer>
|
||||
<script type="application/javascript" src="script/jquery-2.1.4.min.js"> </script>
|
||||
<script type="application/javascript" src="script/jquery.stellar.min.js"> </script>
|
||||
<script type="application/javascript">
|
||||
$.stellar({
|
||||
positionProperty: 'transform',
|
||||
hideDistantElements: false,
|
||||
responsive: true
|
||||
});
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,104 @@
|
|||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE html>
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="de" xml:lang="de" dir="ltr">
|
||||
<head>
|
||||
<meta charset="utf-8"/>
|
||||
<meta http-equiv="content-type" content="text/html; charset=UTF-8"/>
|
||||
<meta name="description" content="Symposium Datenspuren - Crypto Is Not A Crime, 2015, Technische Sammlungen Dresden, veranstaltet vom Chaos Computer Club Dresden"/>
|
||||
<meta name="keywords" content="Symposium Datenspuren,c3d2,Chaos Computer Club,CCC,Dresden,Datenschutz,Privatsphäre,IPv6,Cloud,ePostbrief,de-Mail,Anonymität,informationelle Selbstbestimmung,Überwachung,Data Mining,ETSI,RFID,Mautsystem,Remailer,TCPA,TCG,Bundestrojaner,Vorratsdatenspeicherung,Biometrie"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no"/>
|
||||
<meta name="robots" content="index,follow"/>
|
||||
<meta name="language" content="German"/>
|
||||