Feed Berlin Hack and Tell / @BerlinHacknTell [copy] http://shalnoff.co.uk/rss.php?rss=BerlinHacknTell has loading error: cURL error 22: The requested URL returned error: 403 Forbidden
Feed cleverhans-blog [copy] http://www.cleverhans.io/feed.xml has loading error: cURL error 22: The requested URL returned error: 404
Feed Security (b)log [copy] http://securityblogru.livejournal.com/data/rss has loading error: cURL error 22: The requested URL returned error: 403 Forbidden
Feed [bodyawm] Богдан [copy] https://habr.com/ru/rss/users/bodyawm/articles/?fl=ru has loading error: cURL error 22: The requested URL returned error: 404

CUII: Wie Konzerne heimlich Webseiten in Deutschland sperren (39c3)

Stellt euch vor, eine private Organisation aus milliardenschweren Konzernen entscheidet, welche Webseiten ihr nicht besuchen dürft - ohne Richter, ohne öffentliche Kontrolle oder Transparenz. Genau das macht die CUII in Deutschland seit Jahren. In Deutschland entscheidet eine private Organisation aus Internetanbietern und großen Unterhaltungskonzernen, welche Webseiten für den Großteil der Bevölkerung nicht mehr erreichbar sind. Die selbsternannte "Clearingstelle Urheberrecht im Internet" sperrt ohne richterliche Beschlüsse den Zugriff auf Hunderte von Domains. Wir haben daraufhin cuiiliste.de ins Leben gerufen, um die geheim gehaltene Liste von Domains zu veröffentlichen und so mehr Transparenz in die heimliche Zensur...

ccc: media archive updates
Posted at 2025-12-29 23:00:00 | Tech | read on

Von Groschen und SpurLos - GNU Taler auch auf eurem Event! (39c3)

Willkommen in der Zukunft: Beim LUG Camp in Wipperfürth und bei den Datenspuren in Dresden wurde digital bezahlt - mit GNU Taler als Event-Bezahlsystem. Noch einfacher als Bargeld, billiger als Kartenzahlung und ohne Eingriff in die Privatsphäre der Besucher*innen. Wir zeigen euch, wie auch ihr das bei eurer nächsten (Chaos-)Veranstaltung anbieten könnt! Anonymes Bezahlen ganz ohne Bargeld? Digitales Bezahlen ohne Gebühren auf jede einzelne Transaktion? Keine zentrale Datensammelei bei US-amerikanischen Zahlungsanbietern, und trotzdem keine Blockchain? Geht nicht? Geht doch! Schon auf mehreren Veranstaltungen wurde [GNU Taler](https://www.taler.net/) erfolgreich als lokales Event-Bezahlsystem eingesetzt: Sämtliche Zahlungen beim [LUG Camp...

ccc: media archive updates
Posted at 2025-12-29 23:00:00 | Tech | read on

Fossile Industrie liebt KI! (39c3)

Der Hype um generative KI und die Gasindustrie bilden in Zeiten der Klimakrise eine bedrohliche Allianz für die Zukunft des Planeten. Obwohl die negativen Klimaauswirkungen generativer KI immer deutlicher werden, sollen in ganz Europa Großrechenzentren gebaut werden und Deutschland „KI-Nation“ werden, was ungeahnte „Wirtschaftskräfte freisetzen soll“ – zumindest, wenn es nach der Bundesregierung geht. Der Ausbau der Recheninfrastruktur für generative KI benötigt viel Energie, Wasser und Ressourcen, was global zu Umweltschäden führt. Prognosen für die EU zeigen, dass der Energieverbrauch in Zukunft so groß werden könnte, dass der Ausbau der erneuerbaren Energien nicht mithalten kann –...

ccc: media archive updates
Posted at 2025-12-29 23:00:00 | Tech | read on

Who runs the www? WSIS+20 and the future of Internet governance (39c3)

Abbreviations such as WSIS+20, IGF, IETF, DIEM, ICANN, PDP, ITU or W3C regularly appear in discussions about the Internet, yet often remain vague. This talk provides an update on the current state of Internet governance and explains why decisions made in United Nations processes have direct implications for technical standards, digital infrastructure, and power asymmetries. The starting point is the UN’s WSIS+20 review process, which negotiated the future of the Internet Governance Forum and the roles of stakeholders within it. Against this backdrop, the talk traces the origins of the so-called multistakeholder approach and examines...

ccc: media archive updates
Posted at 2025-12-29 23:00:00 | Tech | read on

I Hated All The Cross-Stitch Software So I Made My Own: My Deranged Outsider Software Suite For Making Deranged Outsider Art (39c3)

I wanted to design beautiful header diagrams and ASCII tables suitable for stitching on throw pillows, but found existing tools for cross-stitch design to be all wrong. I made my own set of command-line tools for building this chunky, pixelated visual art. If you've never seen a cross-stitch sampler that had bitrot, this talk will fix it. Designing cross-stitch patterns, I got frustrated with all the programs which expected me to click around a canvas setting individual pixels. I wanted a cross-stitch design software suite that I could drive with a Makefile, which could give...

ccc: media archive updates
Posted at 2025-12-29 23:00:00 | Tech | read on

Battling Obsolescence – Keeping an 80s laser tag system alive (39c3)

Keeping old projects working can be an uphill battle. This talk explores how the laser tag system Q-Zar (Quasar in the UK) has been kept alive since the company behind it failed in the 90s. The challenges encountered, the lessons learnt, and how those can be applied to our own future projects to maximise the project lifetime. Looking at the effects of obsolescence in the context of a laser tag system from the 1980s Q-Zar (Quasar in the UK), what needed to happen to keep it going to enable people to continue...

ccc: media archive updates
Posted at 2025-12-29 23:00:00 | Tech | read on

Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building Affordable Light-Based Hardware Security Tooling (39c3)

Stored memory in hardware has had a long history of being influenced by light, by design. For instance, as memory is represented by the series of transistors, and their physical state represents 1's and 0's, original EPROM memory could be erased via the utilization of UV light, in preparation for flashing new memory. Naturally, whilst useful, this has proven to be an avenue of opportunity to be leveraged by attackers, allowing them to selectively influence memory via a host of optical/light-based techniques. As chips became more advanced, the usage of opaque resin was used as...

ccc: media archive updates
Posted at 2025-12-29 23:00:00 | Tech | read on

Atoms in Space (39c3)

*What are atoms doing in space anyways?* This talk will provide a brief overview of applications of quantum technologies in space ranging from precise timing and inertial measurements to fundamental physics. Quantum technologies have seen a wide field of applications in medicine, geosciences, computing and communications, in many cases bridging the gap from laboratory experiments to commercial products in the last decade. For terrestrial applications that is. But what about going to space? Quantum physics based sensors and experiments promise higher accuracy, sensitivity or better long term stability as they rely on immutable properties of atoms....

ccc: media archive updates
Posted at 2025-12-29 23:00:00 | Tech | read on

Asahi Linux - Porting Linux to Apple Silicon (39c3)

In this talk, you will learn how Apple Silicon hardware differs from regular laptops or desktops. We'll cover how we reverse engineered the hardware without staring at disassembly but by using a thin hypervisor that traces all MMIO access and then wrote Linux drivers. We'll also talk about how upstreaming to the Linux kernel works and how we've significantly decreased our downstream patches in the past year. As an example, we will use support for the Type-C ports and go into details why these are so complex and required changes across multi subsystems. In the end, we'll briefly...

ccc: media archive updates
Posted at 2025-12-29 23:00:00 | Tech | read on

Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities (39c3)

Transient execution CPU vulnerabilities, like Spectre, have been making headlines since 2018. However, their most common critique is that these types of vulnerabilities are not really practical. Even though it is cool to leak `/etc/shadow` with a CPU bug, it has limited real-world impact. In this talk, we take Spectre out for a walk and let it see the clouds, by leaking memory across virtual machine boundaries at a public cloud provider, bypassing mitigations against these types of attacks. Our report was awarded with a $151,515 bug bounty, Google Cloud's highest bounty yet. Seven years...

ccc: media archive updates
Posted at 2025-12-29 23:00:00 | Tech | read on
1 2 3 4 5 6 7 8 9 10 11 12 13 14 51

***

Однажды китайский ученый Ли Хунь Янь обнаружил некоторую незначительную, однако, существенно отличающуюся от фона корреляцию между количеством псилоцибина потребляемого корфуцианскими медузами и характером передвижения оных по стенкам четырехсотлитровго шарообразного аквариума, установленного в лаборатории по случаю празднования сто второго полугодичного затмения от начала новой эры Сингулярного Прорыва. Недолго думая, Ли Хунь Янь приделал к щупальцам медуз источники излучения в видимом диапазоне но с разной длинной волны, заснял весь процесс шестью камерами с 48 часовой выдержкой, симметрично расставив последние вокруг сосуда, где резвились подопытные и через неделю собрал прелюбопытнейший материал, который, в свою очередь, лег в основу фундаментального труда, ныне известного, как теория полутретичных n-многообразий простой метрики Ли Хунь Янь, с которой (с некоторыми упрощениями и оговорками) я, по мере сил, постараюсь познакомить любопытного и пытливого читателя.

Recently