Community Media Center of Marin

Community Media Center of Marin

Community Media Center of Marin

The Ultimate Galaksija Talk

Everything about a Yugoslavian microcomputer halfway between a TRS-80 and a ZX 80. Galaksija was to be in Yugoslavia what Commodore and Sinclair were in the west. Whether it succeeded […]

Further Hacks on the Calypso Platform

OR How to Turn a Phone into a BTS The calypso baseband and its companion chips are used on the Motorola C123 among other and are now well known for […]

Securing the Campaign

Security and the 2012 US Presidential Election This talk will go into some of challenges, solutions, and stories from securing a campaign for the 2012 US presidential election. Persons: Ben […]

Hacking Cisco Phones

Just because you are paranoid doesn’t mean your phone isn’t listening to everything you say We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco Native Unix), the operating […]

Setting Mobile Phones Free

An overview of a mobile telephony market and how a community-driven operator is born In The Netherlands, this year the community-driven mobile telco Limesco has started operations. We’re providing voice, […]

Hanussen’s Mindreading

Experiments of the Historical Psychic This is fun stuff for the late night program, not a serious talk: Is it possible to read sb. others mind? In the late 1920ies/early […]

Smartmeter

A Technological Overview of the German Roll-Out This talk will give an overview on the technology, the laws and the technical guidelines of the smartMeter roll-out in Germany. Persons: Derpeter

Hash-Flooding DOS Reloaded

At 28C3, Klink and Waelde showed that a number of technologies (PHP, ASP.NET, Ruby, Java, Python, etc.) were vulnerable to the decade-old hash-flooding DoS attacks. The vulnerability was then often […]

Ethics of Activist DDOS Actions

A Historical Analysis In the world of digital activism, distributed denial of service attacks present relatively low barriers to popular participation, have a high potential for attracting large numbers of […]

How I Met Your Pointer

Hijacking Client Software for Fuzz and Profit An approach to the problem of fuzzing proprietary protocols will be shown, focusing on network protocols and native software. In the course of […]