Milliways

Chat-Control: now is the time to take action!

For more than a year now, the European Union's plans for chat-control have been underway. In this talk we take a look at what's happening in Brussels and Berlin right now, why it's getting tight for fundamental rights and what needs to happen to stop this huge surveillance package.
The EU's plans for chat-control, which in the European Commission's draft remain limited to finding material of sexual exploitation of children and young people as well as sexual advances by adults, include among other things that communication and hosting services can be obliged to scan all content of all users. Not only will machine learning be used to find and report previously unknown images and videos, but text messages will also be analysed and searched for suspicious behaviour. Encrypted communication is not exempt, so that implementation of the plans would be a massive attack on end-to-end encryption and lead to the widespread use of client-side scanning. It is obvious that the use of these dystopian surveillance tools would not be limited to abusive depictions of children and young people in the medium term. Spain which will hold the EU-presidency for the next half year, already declared it would prefer a complete ban on E2EE. In addition to various other measures, e.g. network blocking, the plans provide for mandatory age verification for app stores, which would not only affect Google and Apple's app stores. If the EU's plans go through, free Linux distributions would not only have to carry out age verification, but would also have to check all applications themselves. The EU legislative process is long, tough and confusing. This talk will not only be about where we are with chat-control, but also about which EU institutions are at which levers, when, how and where. And above all, we want to discuss with you what we can still do to stop this dystopian surveillance machine.

Additional information

Live Stream https://streaming.media.ccc.de/camp2023/milliways
Type Talk
Language English

More sessions

8/15/23
Milliways
Hardware Hacking Village
In this 2h workshop, I will teach you to work with the tiny components that modern electronic devices are made of. We will assemble an electronic kitten, that purrs when touched correctly, and hisses when touched wrong. It will work, and is guaranteed to remove your fear of hand-assembling surface mount designs.
8/15/23
Milliways
Milliways
The session proposes a quick overview of Frida, a dynamic instrumentation framework, and how it can be used to enhance our work during the runtime analysis of a mobile application. It will be a walkthrough on how hooking and rewriting functions in runtime may be helpful against anti-reverse engineering measures and SSL pinning mechanisms.
8/15/23
Milliways
Milliways
Hardware FIDO U2F tokens are security devices which are meant to defend user second factor keys from physical and remote attacks. In this presentation different security features and implemented by FIDO U2F tokens and how they are meant to protect a user from various attack scenarios. We will focus on the open source implementation of FIDO U2F token developed and Common Criteria certified by Federal Office for Information Security (BSI). Having access not only to the source code of the token ...
8/15/23
Milliways
Milliways Workshop Dome
Come learn how to hack networks without needing to piss off your housemates, local coffee shop, or the Feds! Bring your laptop and by the end of this workshop, everyone can walk away having intercepted some packets and popped some reverse shells.
8/15/23
Milliways
Milliways
MITRE ATT&CK (Attack Framework among friends) is intimidating sight at first, but is a great tool for risk identification, threat analysis, red teaming, DFIR and security management. Brief introduction to the topic with various examples.
8/15/23
Milliways
Hardware Hacking Village
Solder your own pathlighter badge to illuminate your surroundings at night.
8/15/23
Milliways
Milliways
This talk will show you how many interfaces have to communicate in order to fly experiments on a sounding rocket. We will give you insights into the procedures and the complexity of a research campaign and the actual flight of the rocket itself. In particular, we look at the hardware and software used in the Ground Support Equipment (GSE) and the Service Module (SM) within the rocket.