Player FM - Internet Radio Done Right
26 subscribers
Checked 1h ago
اضافه شده در seven سال پیش
محتوای ارائه شده توسط CCC media team. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط CCC media team یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !
با برنامه Player FM !
Open Source is no longer just for software: (osc25)
Manage episode 491318772 series 2475293
محتوای ارائه شده توسط CCC media team. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط CCC media team یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Open-source software has transformed the software industry, resulting in lower costs, greater security, and much greater flexibility for software developers and end users alike. The transparency provided by open-source software has improved security dramatically. Companies cannot hide back-doors in open-source software. Open solutions allow widespread review and testing, resulting in improved software quality and security. While there are a few open-source hardware projects, most notably RISC-V, most hardware remains proprietary and closed-source. Engineers developing new products often use chips that are black-boxes. This is particularly problematic when developing solutions using hardware secure elements, small security chips used in IoT devices, crypto hardware wallets, mobile devices, industrial control systems, and other small devices. Developers have no visibility into the implementation of these devices, and cannot validate their security. In this presentation we will cover: Challenges with closed source hardware secure elements: Our experience with closed source secure elements (and the problems we found) Benefits of open source/open architecture hardware secure elements: Transparency, trust, and auditability Rapid response to vulnerabilities Community collaboration and innovation Compliance & certification Get your devkit at the workshop or order here and start playing! :) https://145324096.hs-sites-eu1.com/samples-order-form Documentation and tools: https://github.com/tropicsquare Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://c3voc.de
…
continue reading
2014 قسمت
Manage episode 491318772 series 2475293
محتوای ارائه شده توسط CCC media team. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط CCC media team یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Open-source software has transformed the software industry, resulting in lower costs, greater security, and much greater flexibility for software developers and end users alike. The transparency provided by open-source software has improved security dramatically. Companies cannot hide back-doors in open-source software. Open solutions allow widespread review and testing, resulting in improved software quality and security. While there are a few open-source hardware projects, most notably RISC-V, most hardware remains proprietary and closed-source. Engineers developing new products often use chips that are black-boxes. This is particularly problematic when developing solutions using hardware secure elements, small security chips used in IoT devices, crypto hardware wallets, mobile devices, industrial control systems, and other small devices. Developers have no visibility into the implementation of these devices, and cannot validate their security. In this presentation we will cover: Challenges with closed source hardware secure elements: Our experience with closed source secure elements (and the problems we found) Benefits of open source/open architecture hardware secure elements: Transparency, trust, and auditability Rapid response to vulnerabilities Community collaboration and innovation Compliance & certification Get your devkit at the workshop or order here and start playing! :) https://145324096.hs-sites-eu1.com/samples-order-form Documentation and tools: https://github.com/tropicsquare Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://c3voc.de
…
continue reading
2014 قسمت
All episodes
×C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
sudo systemctl stop dhcpd@hhn.service Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/3JZZDG/
C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
1 Abschlusspräsentation (jh25) 1:23:22
1:23:22
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد1:23:22
Projekte: FAIREDU, Bit-Flip, Simple Study, Flappy Rocket, News Map, Space Tree, Schüli Cloud, Lama Script, Daily Guide, Lautstärke messen (im Klassenzimmer), Partypaka Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
How does a (Go) linter work? We'll find out and write our own! A linter is an automated way of performing a code review. It automatically checks your code way faster than any human could do, and with way less environmental impact and more deterministically than an AI would use. Sure, it does not replace code review, but it allows the reviewer to focus on other things, that you don't have to mechanically check every time. If you are not using a linter in your CI pipeline, then you're wasting valuable engineering time. This talk will first dive into the details on how compiler parse the language and how the abstract syntax tree works. Then we'll take a look at Go owns analysis package and how we can use it to write our own linter, including a small example that you can use to get started writing linters. Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/QDX9T3/…
C
Chaos Computer Club - recent events feed (high quality)
At our Saarländisches Chaos-Event Mega-Knowledgecamp, we created an Innovative Digital Platform™ to have digital payments at the bar, without involving American payment acquirers and networks. This talk will present the many NFC crimes we committed to enable this. Let's admit it, dealing with cash at a bar, particularly notes with wet hands, is a bit of a faff. In September we held the first edition of the Saarland's first chaos event, Mega-Knowledgecamp. Obviously, we needed a bar, but we didn't want to be dealing with cash at the bar; neither did we want to be using the primarily American payment networks and acquirers for payments. As a solution to this dilemma, we decided to create our own payment system for the bar. Attendees could pre-book bar credit and pay via bank transfer, or hand over cash at the help desk. Payment could then be made at the bar using the ticket barcode, or using the digital wallet feature of Google phones over NFC - just like a bank card! This talk will cover how we built this system, how the NFC protocols of Google and Apple Wallet work, the insane level of NDAs required to implement this, and how you can use this yourself. Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/KUTQB3/…
C
Chaos Computer Club - recent events feed (high quality)
Normal Advent calendars are boring: so let’s make our own! We’ll combine all our favorite technologies: Gridfinity (for the grid system), 3D printing (for the grid), vacuum molding (for the chocolate), laser cutting (for the frame), and automated paper cutting to create advent calendars that are both beautiful and functional. Along the way, we’ll cover practical food safety considerations and show how these techniques come together to produce something tasty, nerdy, and gift-worthy. Join me in the creation of an advent calendar for the hackers and makers in your life. Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/8MZRMA/…
C
Chaos Computer Club - recent events feed (high quality)
The many consequences of running your regional rail network like an S-Bahn A transgender catgirl who knows too many things about the MDSB network infodumps to a (not) captive audience about the many issues said network has caused for the transit of the region around Leipzig and Halle Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/HCTRKV/…
C
Chaos Computer Club - recent events feed (high quality)
This talk by strifel will contain a short introduction to the "Robot Operating System" (2!) and what it supports. about this event: https://c3voc.de
a small talk about getting started with the hobby of model kits! about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
2025 might be the year of Linux on the desktop at Chaosdorf: ytvwld is trying to reinstall the public Windows laptops with NixOS, Plasma and lightdm. He explains why UX design is hard and why systemd is important. about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
I tried reverse engineering a plugin for davinci resolve because I am not rich, can't buy it as a tax write-off and wanted a challenge. I do not endorse bypassing DRM illegally … heh about this event: https://c3voc.de
C
Chaos Computer Club - recent events feed (high quality)
Wir verschaffen uns einen Überblick über die physikalischen Effekte in Aero- und Hydrodynamik, die dafür sorgen, dass Segelschiffe schwimmen, vorwärts fahren und nicht umkippen. Danach wagen wir noch einen Blick darauf, was zusätzlich im Wasser passiert, wenn große Schiffe in engen Kanälen, Hafenbecken und rückwärts unter Motor manövrieren. grober Inhaltsplan statischer und dynamischer Auftrieb, Verdrängung und Lateralplan Kräfte- und Momentengleichgewichte Segel- und Lateraldruckpunkte, Luv- und Leegierigkeit Aufrichtende Momente, Stabilitätskurven, Kenterwinkel Tragflächenströmungen, Reynoldszahl und Wirbel, Kurse zum Wind Bugwellen und Wulstbug, Rumpfgeschwindigkeiten Bank- und Squat-Effekte, Bernoulli-Theorem Radeffekt bei Rückwärtsfahrt unter Motor Zusätzliche Leinenkräfte im Hafen, Anlegen und Ablegen Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/B7LJ7G/…
C
Chaos Computer Club - recent events feed (high quality)
Eine kurze Einführung in die Kunst des Speed Puzzlen und die Community. Auch Puzzlen kann spannend sein! Ich erzähle euch etwas über das Konzept des Speed Puzzlen, die möglichen Strategien und die Community dahinter. Ausserdem werde ich einige Puzzles mitbringen, falls danach gepuzzelt werden will. Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/NAQPAZ/…
C
Chaos Computer Club - recent events feed (high quality)
sudo systemctl start dhcpd@hhn.service Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/K97WMF/
C
Chaos Computer Club - recent events feed (high quality)
1 Palantir, Dark Enlightenment und die deutsche Polizei (oc) 1:26:51
1:26:51
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد1:26:51
Das Pentagon findet es gut, die Migrationsbehörde ICE findet es gut, Banken und Wirtschaft finden es gut, Sauron findet es sehr gut und da überrascht es nicht, dass die deutschen Sicherheitsbehörden es auch gut finden: Die Überwachungssoftware Palantir Momentan ist die amerikanische Überwachungssoftware Palantir in aller Munde. Nicht nur, weil die deutsche Polizei es in den Bundesländern Bayern, Hessen und Nordrhein-Westfalen bereits verwendet und der deutsche Innenminister die Nutzung gerne bundesweit ausweiten würde; nicht nur, weil die Behörden sich damit in sicherheitsrelevanten Vorgängen im Inneren von einem ausländischen Softwarekonzern abhängig machen, dessen Kunden einer Blackbox sie damit sind; sondern auch, weil die Gründer der Firma Palantir in den USA eine reaktionäre rechte Politik verfolgen, deren Ziele durch die Anwendung der Software Palantir, etwa bei der Verfolgung von Migranten durch die Migrationsbehörde ICE, konkret mit umgesetzt werden. Seit dem Beginn der zweiten Amtszeit des US Präsidenten Donald Trump findet eine Umwälzung der politischen und institutionellen Landschaft in den USA statt. Was mit Elon Musks Department of Government Efficiency (DOGE) und dem Rauswurf vieler Staatsbeamter begann, wurde mit der öffentlichen Verfolgung von Menschen und dem Einsatz von Militär im Inland fortgesetzt. Diese Entwicklungen passen auffällig gut zu den Vorstellungen des Dark Enlightenment, dessen Vordenker Curtis Yarvin den Palantir Gründer Peter Thiel persönlich gecoached hat. Zu den weiteren Anhängern von Curtis Yarvins Denken gehört der US Vizepräsident JD Vance, ein ehemaliger Angestellter von Peter Thiel und dessen Protegé. Zudem war es Thiel, der bereits 2016 die CEOs von Amazon, Microsoft, Facebook, Google und Apple und Elon Musk im Trump Tower zusammengebracht hat. Könnten die Entwicklungen in den USA auf Thiels beharrliches Wirken – konservative (rechtsextreme) Ideen mit bestimmten Personen in Machtstellungen zusammenzubringen – zurückzuführen sein? Anhand des Werdegangs von Peter Thiel wird der Vortrag entdecken, um was für Figuren es sich bei Peter Thiel und seinem Netzwerk handelt und welchen Einfluss es mittlerweile entwickelt hat und von welcher Ideologie es angetrieben wird. Es wird sich zeigen, dass es Thiel im Eigentlichen nicht um die deutsche Polizei oder um das Abschieben von Migranten geht, sondern darum dass der Menschheit eine große Prüfung bevorsteht: die Wahl zwischen dem Armageddon, dem Antichrist oder Thiel und seiner PayPal Mafia, die uns mit Palantir vor dem Untergang bewahren. Am Ende werden wir uns entscheiden müssen. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://c3voc.de…
C
Chaos Computer Club - recent events feed (high quality)
Variational Autoencoders (VAEs) were first introduced as early concept learners in the vision domain. Since then, they have become a staple tool in generative modeling, representation learning, and unsupervised learning more broadly. Their use as analogues of human cognition is one of the first steps towards the understanding of more complex cognitive models leading up to models of human brain function and behavior. As part of a series of talks on cognitive science and deep learning at the realraum in Graz, this presentation will focus on the role of VAEs in cognitive science research. Topics: - Supervised vs. unsupervised learning - Deep Learning basics: classifiers and backpropagation - Autoencoders: architecture, training, embedding, and generative modeling - Variational Autoencoders: statistical latent space, and the reparametrization trick - Training VAEs: loss functions, optimization, and the KL divergence - Concept learning: VAEs in cognitive science https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.realraum.at/realraum-october/talk/LHH3M9/…
See you next year! Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/KAB39N/
C
Chaos Computer Club - recent events feed (high quality)
Take a trip back through time with me as we learn about how bridges happened. Why did we do it at all? Whose idea was it to hook up the then fledgling matrix.org network to the biggest IRC network? How many databases were shredded in the line of duty? This talk features a journey back through time as we look at bridges and integrations that have been built on Matrix over the years, and what we can hope to learn from it. There will be laughter, there will be eyebrows raised, there will be content involving the infamous IRC bridges and there may be a tear or two. There is plenty to dig into here as we go behind the scenes on what it takes to maintain a bridge for the global Matrix community, as well as how the standards of appservices have evolved over the years Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/D83FKE/…
C
Chaos Computer Club - recent events feed (high quality)
1 Leading the way into CRA compliance: Element’s approach to the incoming regulation (matrix-conf-2025) 30:13
The Cyber Resilience Act is a new European regulation that has the main goal to increase European cyber security and resilience, through accountability. A lot has been said about the impacts of the CRA on open source, in particular towards non-profit foundations, but what about organisations - such as Element - that operate complex licensing models with a mix of monetised and non-monetised products? In this talk we endeavour to shine a light on our thinking regarding CRA compliance for our products, as well as implications for the wider ecosystem of vendors and communities building on Matrix. We also introduce our roadmap of communications around the CRA, aimed at those using and building on top of our products. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/AS8JHQ/…
C
Chaos Computer Club - recent events feed (high quality)
Messaging platforms offer to protect user privacy via a variety of features, such as disappearing messages, password-protected chats, and end-to-end encryption (E2EE), which primarily protect message contents. Beyond such features, "untraceable communication" tools for instant messaging protect users from network attackers observing transport layer metadata, which can reveal who communicates with whom, when, and how often. However, unlike E2EE, the effectiveness of these tools depends on large anonymity sets, making widespread user adoption critical. This talk presents a research study with 189 users of messaging apps about their perceptions of "untraceability" as a concept, as well as their opinions on the widespread availability of tools for untraceability. The study explores their perceptions of "untraceability'' from a broad conceptual standpoint; rather than focusing on a particular tool or implementation, we analyze how users reason about what features should be incorporated by two fictitious messaging platforms, Texty and Chatty, to prevent third parties from "knowing who communicates with whom". The results point to a critical gap between how users and privacy experts understand untraceability, as well as tensions between users that see untraceability as a protection to individual privacy and users that see it as a threat to online safety and criminal accountability. Beyond untraceability, I discuss how this research is relevant to the design of messaging platforms that promote privacy as a central value. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/DDKP3V/…
به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.



















