Live Stream | https://streaming.media.ccc.de/rc3/cwtv |
---|---|
Type | Talk |
Language | German |
12/27/21 |
With approaches dating back to the 20th century, the idea of a TPM is simple: An isolated, constrained environment to offload trust establishment in a larger computing environment. That implies cryptography, firmware, hardware, and per application, different requirements. This talk elaborates on how the seemingly simple concept has been expanded over the years, enumerating implementations in hardware, firmware, other layers of software, and even web browsers, explaining why it is in fact far ...
|
12/27/21 |
Feierliche Eröffnung des ChaosZone TV Channels beim rC3 2021.
|
12/27/21 |
In den letzten Wochen der scheidenden Bundesregierung erhielt der Sprecher eine Mail von der Open Knowledge Foundation https://okfn.de/en/ über seine Meinung zur Open Source Sicherheit. Daraufhin erstellte er er eine Studie zum Thema Sicherheit von Open Source Projekten. Vier Projekte dienten als Beispiele und deren Hauptakteur:innen wurden befragt. Darunter "the random programmer from Nebraska" https://www.explainxkcd.com/wiki/index.php/2347:_Dependency Ariadne Connill ...
|
12/27/21 |
kommt noch - wird nachgereicht - Wunschtermin: 27.12.2021 gegen Mittag - einzige Möglichkeit
|
12/27/21 |
Tokens are a powerful way of controlling the access to to Rest APIs. Chasing them should be hard. Unfortunately, there is a widespread habit of leaving tokens lying around allowing very powerful attack vectors. An attack demonstrates how to hack an OpenShift cluster, which is fully securty compliant to the accepted standards of NIST and CIS. Hijacking a container gives full control to the cluster, including host access. If running in the cloud, the cluster can be used for further attacks, ...
|
12/27/21 |
In diesem Talk stellt sich die 2020 gegründete Volksinitiative Hamburg Werbefrei vor, für alle die etwas gegen die zunehmende Vereinnahmung der Stadt durch Außenwerbung unternehmen möchten.
|
12/27/21 |
Social networking needs to be decentralized, but how? Interoperability and federated data spaces have brought us a long way, but these solutions have their limits. We're building "user centered compatibility for non-interoperable systems", so users can stay connected with each other, no matter the tech their using.
|