Version Tomorrow is the first day of the rest of your life
Schedule for day 3 – 2017-08-06
Rooms:
- No, Pa, Re, Explody, Pi, Tau, Music Lounge
- Hardware Hacking Area, Family Village, Italian Embassy, Harbour, Tardis room, LaTeX-Village, Pancake Village
| No | Pa | Re | Explody | Pi | Tau | Music Lounge | |
|---|---|---|---|---|---|---|---|
|
08:00 |
|||||||
|
08:20 |
|||||||
|
08:40 |
|||||||
|
09:00 |
Plugins, Tips and Tricks
|
||||||
|
09:20 |
|||||||
|
09:40 |
|||||||
|
10:00 |
|||||||
|
experimental, educational and commercial fermentation everywhere
|
Bypassing Secure Boot using Fault Injection
|
Do you know what you can do with Firefox for frontend development?
|
Working with ethical impact assessments
|
||||
|
10:20 |
|||||||
|
10:40 |
|||||||
|
11:00 |
|||||||
|
FLOSS, NGOs, Activists, Journalists, and the Pareto Principle
|
“Code Our Glance” and beta “CodeKlavier”
|
Modern Day American Hobo-ism
|
|||||
|
11:20 |
|||||||
|
11:40 |
|||||||
|
12:00 |
|||||||
|
how your digital doppelganger has been exploiting you all along
|
How to re-enact a 1982 network art performance
|
act up on decentralization
|
Privacy-friendly authentication through attributes
|
||||
|
12:20 |
|||||||
|
12:40 |
|||||||
|
13:00 |
|||||||
|
13:20 |
Advanced Rowhammer exploitation on cloud, desktop, and mobile
|
A cryptographically secure social network platform
|
|||||
|
13:40 |
|||||||
|
14:00 |
|||||||
|
14:20 |
|||||||
|
Keeping Secrets On Remote Machines
|
In what ways can laws influence the security of society.
|
Misogyny in Progressive Groups
|
|||||
|
14:40 |
|||||||
|
15:00 |
|||||||
|
15:20 |
|||||||
|
15:40 |
empower kids and provide tools for them to be more secure and to take charge of their own data
|
Implementation, hazards and updates on use of RNGs in programming languages and the Linux Kernel (among others)
|
The government is here to help
|
Creative Writing
|
FPGA's are the new hardware
|
||
|
16:00 |
|||||||
|
16:20 |
|||||||
|
16:40 |
|||||||
|
standard or substandard?
|
|||||||
|
17:00 |
Recognize, manage and stop cyberbullying attacks
|
||||||
|
17:20 |
|||||||
|
17:40 |
|||||||
|
18:00 |
THE ALGORITHMIC PUBLIC SPHERE AND YOU
|
Hacking your brain, and other body parts. Debunking myths on the way.
|
Additional coolness on the greatest digital language ever!
|
||||
|
18:20 |
|||||||
|
18:40 |
|||||||
|
19:00 |
|||||||
|
are you not curious now? ;)
|
What it means to profit from privacy-friendly, open-source technology and mutual respect for our fellow humans
|
Using a Raspberry Pi and some ESP8266 devices for your IoT cloud
|
|||||
|
19:20 |
|||||||
|
19:40 |
|||||||
|
internet is as big as your language
|
|||||||
|
20:00 |
|||||||
|
20:20 |
New paradigm in handling personal (health) data
|
||||||
|
20:40 |
|||||||
|
21:00 |
|||||||
|
21:20 |
|||||||
|
ensuring civil rights in the digital era
|
Easy to use automatic encryption for the masses
|
||||||
|
21:40 |
|||||||
|
22:00 |
Performing with self-made custom musical instruments
|
||||||
|
22:20 |
|||||||
|
22:40 |
How Universities in the US collaborate with the United States Government to make America stronger, and the rest weaker.
|
Eventpad: the Sublime editor for network traffic
|
How to build alternative controllers
|
||||
|
23:00 |
|||||||
|
23:20 |
|||||||
|
23:40 |
|||||||
|
An authentication protocol that offers security, privacy and ease of use.
|
|||||||
|
00:00 |
|||||||
|
00:20 |
|||||||
|
00:40 |
|||||||
|
01:00 |
|||||||
|
01:20 |
|||||||
|
01:40 |
|||||||
| Hardware Hacking Area | Family Village | Italian Embassy | Harbour | Tardis room | LaTeX-Village | Pancake Village | |
|---|---|---|---|---|---|---|---|
|
08:00 |
|||||||
|
08:20 |
|||||||
|
08:40 |
|||||||
|
09:00 |
|||||||
|
09:20 |
|||||||
|
09:40 |
|||||||
|
How to go off with a (loud) bang
|
|||||||
|
10:00 |
Learn basic coding with the Micro:bit
|
||||||
|
10:20 |
|||||||
|
10:40 |
|||||||
|
11:00 |
|||||||
|
11:20 |
|||||||
|
11:40 |
|||||||
|
12:00 |
|||||||
|
12:20 |
|||||||
|
12:40 |
|||||||
|
13:00 |
Subtitle: Arduino for kids, how to start playing with electronics
|
||||||
|
13:20 |
|||||||
|
13:40 |
|||||||
|
14:00 |
|||||||
|
14:20 |
|||||||
|
14:40 |
|||||||
|
15:00 |
Subtitle: How to play allowed hacking games
|
||||||
|
15:20 |
|||||||
|
15:40 |
|||||||
|
16:00 |
Let the robot find his way through the Parcour
|
An Introduction into the LaTeX Universe
|
|||||
|
16:20 |
|||||||
|
16:40 |
|||||||
|
17:00 |
|||||||
|
17:20 |
|||||||
|
Learn hardware hacking with JavaScript
|
|||||||
|
17:40 |
|||||||
|
18:00 |
|||||||
|
18:20 |
|||||||
|
18:40 |
Learn how to deploy docker application on a Kubernetes cluster
|
||||||
|
19:00 |
|||||||
|
19:20 |
|||||||
|
19:40 |
|||||||
|
20:00 |
|||||||
|
20:20 |
|||||||
|
20:40 |
|||||||
|
21:00 |
|||||||
|
21:20 |
|||||||
|
21:40 |
|||||||
|
22:00 |
|||||||
|
22:20 |
|||||||
|
22:40 |
|||||||
|
23:00 |
|||||||
|
23:20 |
|||||||
|
23:40 |
|||||||
|
00:00 |
|||||||
|
00:20 |
|||||||
|
00:40 |
|||||||
|
01:00 |
|||||||
|
01:20 |
|||||||
|
01:40 |
|||||||