Back to Basics

Math for hackers

Chaos-West TV
Michael Sperber
Math and hacking - two separate worlds at odds or secret lovers? Lovers, of course! How so, you might ask - math is boring and useless! (And hacking is great fun, of course.) We'll try to change your mind!
Be honest: When you're hacking, aren't you really building a world inside a system that operates according to fixed, pedantic, boring rules? (And when the system does not operate according to those rules, do you not get annoyed?) That's secretly a form of applied mathematics! Now, math has been around for hundreds of years and has helped humanity build worlds of the mind, some of them to help understand reality around us. This is just like software, and thus math can help use build better worlds inside the computer. Forget the boring math you learned in school: Enter the world of monoids and abstract nonsense! Understand how you can use it to build better worlds and more useful software, and to enjoy hacking even more!

Additional information

Live Stream https://streaming.media.ccc.de/rc3/cwtv
Type Talk
Language English

More sessions

12/27/21
r3s - RemoteRheinRuhr Talk
Daniel Maslowski
r3s - Monheim/Rhein
With approaches dating back to the 20th century, the idea of a TPM is simple: An isolated, constrained environment to offload trust establishment in a larger computing environment. That implies cryptography, firmware, hardware, and per application, different requirements. This talk elaborates on how the seemingly simple concept has been expanded over the years, enumerating implementations in hardware, firmware, other layers of software, and even web browsers, explaining why it is in fact far ...
12/27/21
chaoszone crew
ChaosZone TV
Feierliche Eröffnung des ChaosZone TV Channels beim rC3 2021.
12/27/21
Thomas Fricke
c-base
In den letzten Wochen der scheidenden Bundesregierung erhielt der Sprecher eine Mail von der Open Knowledge Foundation https://okfn.de/en/ über seine Meinung zur Open Source Sicherheit. Daraufhin erstellte er er eine Studie zum Thema Sicherheit von Open Source Projekten. Vier Projekte dienten als Beispiele und deren Hauptakteur:innen wurden befragt. Darunter "the random programmer from Nebraska" https://www.explainxkcd.com/wiki/index.php/2347:_Dependency Ariadne Connill ...
12/27/21
r3s - RemoteRheinRuhr Talk
Siebo M. H. Janssen
r3s - Monheim/Rhein
kommt noch - wird nachgereicht - Wunschtermin: 27.12.2021 gegen Mittag - einzige Möglichkeit
12/27/21
Thomas Fricke
c-base
Tokens are a powerful way of controlling the access to to Rest APIs. Chasing them should be hard. Unfortunately, there is a widespread habit of leaving tokens lying around allowing very powerful attack vectors. An attack demonstrates how to hack an OpenShift cluster, which is fully securty compliant to the accepted standards of NIST and CIS. Hijacking a container gives full control to the cluster, including host access. If running in the cloud, the cluster can be used for further attacks, ...
12/27/21
Back to Basics
avocadoom
Chaos-West TV
Ein Einsteiger-Talk über statische Webseiten, wie man sie erstellt oder auf diese umstellt und dabei seinen bisherigen Workflow beibehält und welche Vor- und Nachteile diese mit sich bringen.
12/27/21
Chaosstudio Hamburg
Chaosstudio Hamburg
In diesem Talk stellt sich die 2020 gegründete Volksinitiative Hamburg Werbefrei vor, für alle die etwas gegen die zunehmende Vereinnahmung der Stadt durch Außenwerbung unternehmen möchten.