 You're all ready for lightning talks again? All right, great. So I know it says on the screen that Aaron will be doing the lightning talks, but Quinn here is kindly enough to do the lightning talks. I see Aaron has just dropped in as well, all right. So just hand it over to Quinn for the lightning talks. Please welcome Quinn Norton. Oh, just yeah. Hello. So welcome to lightning talks. If you're not familiar with the format, these are a series of quick five minute talks about things people are passionate about, things they've started working on, things that don't quite fill a 10 minute talk. Sometimes they're just really funny, and sometimes they're technically quite thick. So you never know what you're going to get. It's a real grab bag. It's a great time. Now one quick word, if you are signed up to give a lightning talk and you have not yet seen that gentleman in the dark shirt over there, please, please get up and go do that right now. The walk of not shame. That's what that is. The walk of pride. So we have two more days of lightning talks. We don't have them all filled up. So if you are either inspired by what you see here today or merely internally inspired to get up where I am now and spend five minutes explaining your passions and your work to an audience here at Shaw, please go to the wiki and sign up for that. I have a question. I'm sorry? It is filmed. You can, I believe, opt out. However, I will kick that over to the angel to confirm. Hello? Look up real quick. I believe you can opt out, but let me double check. Can lightning talks opt out of the recording? In general. We have a small conference, we have a small lightning talk. Yes, yes, if you would like to give a lightning talk and you need to opt out, that is an option for you. All right. My first question to all of you is, is MH in the room? Ah, here comes MH. MH, head over there, I'm gonna finish up. So please, we've got plenty of spots. Come and fill them. Stand where I am now. So we have a really, really interesting selection of people coming up here, and we wanna go ahead and get that started, but I'm gonna fill a little bit more time while MH gets started here. MH is gonna be talking to us about cheap electronic locks, picking electronics locks, and presumably what that process has taught him about making a better electronic lock. Because you should definitely leave your precious data in your computer, in your hotel room behind your key card. All right. And this is MH. Everyone give him a big round of applause. Glory. Hey. Hi. Okay, you can hear me great. Hi, I'm Michael. I'm a lock picker, or you could call it a locked enthusiast. I'm a penetration tester, lock collector, and so on, and locks really are my passion. So if you're also into locks, then you should look at the links and the presentation. I think there's a presentation, right? No? Oh, the one I sent to Nick. Do you have a plan to show slides? Again? Oh, it's not from OM. It's something I sent to, yeah? Yeah, we can swap and maybe I can just copy the presentation in. Okay. Yep. I had to use this one for the moment. Andrea, are you ready to rock? All right. Andrea is a visual artist. She is going to be talking to us about an innovative international art project that's using a lot of different forms of messaging, including miniature painted art, stories and messages, technology to connect different people. Please give Andrea a big round of applause. Thank you very much for coming up in short notice. Thank you. Oh, okay. Thank you. I'm here to talk about Camino Stones, which is my art project. So in 2015, I worked from Espain de France to Santiago de Compostela in Spain, and this route, this trail, is called the Camino. And I carried out my first art project with miniature painted stones. So this is the route I walked. I walked for two and a half months with only the minimum I needed in my backpack. So this was just enough to live, and I carried the stuff for my art project, which was 61 painted miniature stones. So it was really a great art project, and it changed my life, and it also touched some of the lives of the people I met who were involved in this art project. So walking this trail, the idea for Camino Stones was born, and Camino Stones is an art project which combines miniature painted stones, stones, messages or stories and technology to connect people and to inspire people. So basis of this art project are messages and stories that I get from participants, and for each story I paint two identical stones, like these ones. One of these stones becomes part of an art route on one of the existing international trails. You see the stone on the left. The second stone I leave also on this trail, but it will start its journey, so people will take this stone. Each stone has its own QR code and its own web page. So how does it work? The first stone, which becomes part of an art route, I attach below the signs on the existing trails. So people walking this trails are always looking for these signs to get the right direction. As I did myself when I walked to Santiago, they look for the signs, and then they see the stone attached, and hopefully when they see the QR code and the web link, they will go to the page and then they discover the message or the story behind the painted stone. And it's easy for them to respond to this message or this story, and I hope this will happen. And it's also very easy for them to read about this art project, and if they are interested, also in the stories and messages of the other stones, they can very easily upload a free GPX file or find the map to discover the other stones and the other locations of the stones. So this is one part of the project. The second stone has also a QR code and a web link attached to the back of the stone. And as you see on the label, on the right side, it stimulates people to take the stone. They read again the message or the story behind the painting, and they can then leave the stone on a new location. And they can very easy press a button so I get the new location. I get the GPS coordinates of the new location. And so this stone starts to travel and starts its own journey. And the meaning is that it will spread the story or the message behind the painting and the people will respond to it or even leave their own story. And it touches the lives of the people it meets. So just a week ago, eight days ago, I returned from a walk of 500 kilometers to lay out my third art route, which consists of 20 miniature painted stones. And this stone on the left was one of these stones. So this route is in Holland from Pieterburen to the St. Petersburg. And for the first time this year, I also left 20 traveling stones on the route. So when I started this trail of 500 kilometers, I carried 40 stones in my backpack. And each day I left two identical stones on the trail. For the people following this project or participating, it was a surprise each day which stone I left on the trail, where I left them, and how for the participants their stones looked because people give me their message or story but they don't know how I visualize it. So it remains a surprise until I leave the stone. So this was really great. After a week, I have the first data about this. So 10 out of 20 traveling stones actually started to travel and I got a lot of responses and stories from the people who saw the stones on the trails. So I'm really enthusiastic about this project. I have a lot of ideas about the future. The meaning is that this will become an ongoing project. So next year I plan to walk from Holland again to Santiago de Compostela to lay out part of the project which is a fourth route. So this is just one of the plans. I will very fast skip to the last bit of this pitch because I like to talk about this project. It always takes a long time. So why am I telling you about this? What I found out myself was that by walking and getting out of my comfort zone, I got the best ideas for creativity because I'm an art painter but also the best ideas for this project and the challenges it gives me because the website I built for most part myself. So what I want now from you is if you're interested that you start walking the beautiful trails and if you like it also the art routes on the trails and get inspired by the messages and the stories and the paintings that you find on the trail. And then I have some last information. Okay, so this is a trail I walked of 500 kilometers and this is some contact information. On the bottom you see the art route page where you can find the GPX files if you're interested or the maps to follow the art routes and also my email address. If you have any ideas, I'm really open for this or suggestions. Okay, thank you. Fantastic. First of all, a little bit of housekeeping. I'm sorry I wasn't here on time. I was giving a presentation in another tent and despite practicing all my life I have not yet mastered teleporting or being in two places at once. So thanks to Quinn for starting everything off and getting the lightning talks going. I also wanted to apologize. We've had some trouble with the lightning talks and some technical difficulties. Things have been chopping and changing. We haven't been able to schedule them. So my apologies to everyone who wants to do a lightning talk today but maybe I could see a show of hands of all the people who want to do lightning talks. Yeah, wow, a lot of audience but not so many speakers. That's good, that's good, I like that. So once again thanks to Andrea for the first lightning talk. It's a lot of a challenge to get up here and speak to all of you. You're very intimidating people. You don't say anything in response. But you do giggle, so that's good. All right, so MH is gonna be up next and I believe he's speaking to us about electronic lock fail. Nice round of applause. Thank you. Thank you. Okay, sorry about sending the email with the presentation to the wrong person but here we have it. So as I said I am very enthusiastic about locks and if you're also interested in locks then have a look at these organizations as a step and tool. And tool also has a tent. It's just 20 meters or so way. And so you can visit us. So today I brought this lock but I can't put all in my hands so I've got also some pictures of the lock. Okay, usually my talks about locks are a little bit longer but this one fits into five minutes and you'll see why in four minutes. This is an electronic lock cylinder. It goes into a door. This is like the lock that goes into the door and then there is a knob on the outside and a knob on the inside. And basically on the inside of the door you can always turn but on the outside you have to enter a secret code first. Right, so this is a typical electronic lock cylinder and there are many of these locks available on the market. This one is from China and one year ago about I saw a number of these locks on the Chinese website and I said well, it's not too interesting. There are so many but this is like basically like another bag of rice in China that will fall over. But last month a German mail order company decided to put this into their catalog. So it's now being sold for 50 Euro and that's a really cheap price for an electronic lock. Typically you pay about 150, 200 Euro or even more. 50 Euro is really cheap so I think people like cheap locks. People will put this into their doorsets, have a look. And then I said 50 Euro I can invest. It may offer some fun of reverse engineering. So when I also, I wanted to show you a little bit about electronic locks, there is always a mechanical element in there because it actually has to couple something or block something and that could be a electromagnet that pulls in something or it could be motor. The electromagnet is typically not so good because you would be able to hammer on it or put a strong magnet there and people have done that. And the motor is typically a little bit better because it's harder to make a turn from the outside, although if you have seen this presentation, that's a padlock and you can actually turn the motor from the outside. But here, this is the door, the light blue thing and you are kind of unable to turn the motor by magnets. So that's good. On the other hand, what you can do is push here or hammer here and then the spring loaded piece will go in. So if you look at this video on YouTube, you'll find the video where you can see that if you take a hammer drill to this lock, it will actually operate the lock and the lock will open. So that is kind of, that's not good. Then again, if you take a really strong hammer drill to a door, you may have another problem anyway. So, and also I wanted to look at the electronics and that's where the fun starts, right? So if the motor is protected in the door and all the electronics are on the outside and the keypad and everything, there should be some PCB here with a microcontroller and then there should be a secure protocol. Basically, I can reverse engineer that. That was my idea. That's a good investment I thought. It should take some time but then there should be something like a side channel attack or you could actually use this James Bond style thing that tries all the possible codes in microseconds, right? And that's possible because the time penalty that's here when you enter the incorrect code, that is easily stopped when you cut the battery power. So that was all the nice idea, yeah. But yeah, unfortunately that's where my investment seemed to be a failure. There is no crypto challenge. There is a little plastic cap here in front of the outside knob. This one, when you take this off, it looks like this. There are two cables and there is no protocol but these are the motor cables. So yeah, that's it. Sorry about that. Okay, but it doesn't have to be that way. I'm sure one can make, one can make a better and still cheap lock and it's not easily readable but if you go to theopensourcelock.org, we will make a better one. Thank you. Thank you. Fantastic. Microphone check, all right, excellent. I love lightning talks. I've always enjoyed seeing different speakers get up, speak for the first time, speak for the last time, speak many, many times. Hopefully it'll be the last time I ever speak. I'm sure you're sick of me. But our next speaker is gonna speak to us about a topic close to his heart and I guess many peoples. It is about prohibition. It's about a kind of prohibition I guess that exists still in the US of A. Does not necessarily exist here in Holland. So once the presentation is set up, we will be speaking to you, rather I won't be speaking to you. Genesis RE will be speaking to you about the history of legalization of cannabis in the USA. While the slides are working, I can still entertain you a little bit. I gave this talk a few months ago in London and this talk was scheduled for the much longer period of time so I'll be just going boom, boom, boom, one slide after another, no time to waste. Tell me where is the timer? That's me. Okay. Basically, everything I say is based on data, research, science, data, because cannabis is a controversial subject because for 50 years there was a prohibition and the drugs are bad, just say no. Now we have internet and we have research, data, science, common sense, rational thinking. Whenever you are in doubt, just ask yourself a question, does it make sense? Follow the money. So I always appear to logic, research, science and data. This is me and selfie picture on Instagram, introduction to cannabis industry. This is still very new in Europe. In the US it is the fastest growing, yeah, pun intended, the fastest growing industry. This is me and my two kids at the hemp farm in the UK. Hemp is the non-psychoactive, so it is, hemp is not psychoactive and it is legal, you need to have a license. These are some of my content. I am pretty much active in this psychedelic space. I'm editing Wikipedia, I'm going to conferences. I'm pretty much educating people, telling them that drugs are not always bad. This is just a general conception over 50 years of propaganda. Now we have data, research, science and there is a distinction between hemp and cannabis. Hemp is non-psychoactive. The psychoactive component is THC. However, hemp has a very low THC. It has CBD, which is another complementary ingredient and it is legal in the UK. This is a TEDx talk called the Trillion Dollar Crop because the hemp has so many different uses. So this is just one infographic that you can food, oil, fiber, like so many uses. And someone asked a question about biofuels because hemp can be also used for fuel and there are so many uses. It's just when you just Google hemp use, you will see a thousand and thousands of examples. This is a very versatile crop and in the UK, you can just get a license and you can do this. I am sorry, I'm a little bit of a hypocrite. I live in a city, I do not have a field, but I just feel like I need to learn how to properly grow hemp. Otherwise, my experience is not full. So next time on the next Hacker camp, this will be not the lightning talk about history of the cannabis. It will be actual lessons and experiences from growing your own farm, completely legal, completely following all the regulations. So yes, hemp is non-psychoactive, cannabis is psychoactive and as of now 2017, it is still mostly illegal in Europe. While in the US, it is changing. Back in, it was October or November 2016, there was the presidential election, Trump and Clinton. On the very same day, in many states, there was a referendum about, do you want to make cannabis legal for recreational use? Because it was already legal for medical uses. So now we have like nine states where cannabis is completely legal, even for foreigners, but because it is illegal on the federal law, then they need to operate like cash-only business because banks cannot open their bank account. It is just ridiculous. In the Canada, cannabis is also becoming legal. It's like there are some stocks, companies trading on the exchange, 300% return per year. And by the way, give me some time estimate because I can talk and talk and talk. Okay, so that was unexpected. Yeah, sure. So in the UK, there are places where chief police officer, we are not chasing cannabis anymore. In the Christiana, which is the Denmark, in Copenhagen, they have legal cannabis. Of course, in Catalonia, in Barcelona, there is legal cannabis. In Holland, there is legal cannabis. There is a lot of research and data. Na, na, na, na, na, na, na, na, na, na. It was because some guy had a patent for the wood pulp. And because he wanted to use this patent for production of paper from wood, so he made the cannabis illegal. Usually there is a timer and someone gives me the time, but it's okay. Who benefits from illegal drugs? Pharmaceuticals, alcohol, tobacco, private prison system, and of course drug cartels. So please follow the money. LSD became illegal because of a war in Vietnam. They had to undermine peace movements, follow the money, be rational. This, I can talk on and on. I'll leave you to it. The world is over now. Cannabis is becoming legal. It's just the legal system that needs to catch up. More and more countries will say, we will not prosecute some cannabis smokers. I actually decided to do not smoke cannabis because I need to be consistently high on life. Consistent energy and any drug use or misuse can put me outside of my sleep cycle, outside of my regular energy. So be the change you want to see in the world and you can always find me. I'm everywhere. Thank you very much. Thank you. Yes, lightning talks. It's always difficult to get up on stage. I can't say that I have ever consumed any exotic substances, even in countries where it's legal. But I know that when I do, I lose track of time. So it's quite common. We have a joke in English as well, which is what's the shortest word in the English language? Next up, we have the notebook thief. And he's presumably speaking to us about... I'm a good person. You're a good person. OK, so this is Vadim Makarov talking about tracking stolen notebooks, I believe, right? Yeah, I'm not the thief. OK, well, just before you get started, are there any other people who want to give a lightning talk here today, because we need to know? I know that I have Raphael at Luc City. You wanted to give a talk, too, right? So get your slides done. Anybody else? No? OK, the stage is yours. A little story. So I had a little experience two years ago while I was attending a conference in Geneva. So I am a scientist, but this is about classical information technology. I'm a quantum scientist. So I went to the single... OK, a scientific workshop where we discussed very advanced topics like quantum memories and single-photon detectors and all so on and so forth, and talked with scientists. And the workshop was a success. Everything went smoothly until the last lab tour of Nikolai Gizhen's labs at the University of Geneva. So this is the mansion where a famous scientist works. And he has labs there. So we went there, went around the labs. And then somebody walked in the meeting room and stole a bag containing a notebook of one American postdoc with his Japanese and American passports, OK, Japanese passports with US visa. So the guy was literally stranded in Switzerland for a month until he could get a new passport and a new US visa. And also the chief took a notebook from my bag, this notebook, this one. I went to the police. And the police said, well, I was going to take fingerprints. We have everything, like left the scene of crime. They said, no, OK, has anybody killed? No. Go to your insurance company. They are not going to do anything. Little did the thief now that I had a piece of tracking software on the notebook called Prey. This is free to use. It's not open source, but you can sign up for the basic account for free. Six hours later, the notebook went online. So here you see the time. And this is the windows running and whatever. And if you have a piece of map, and we see the notebook is being set up to connect to a network. And we have a new user of the notebook. So this is from the notebook camera. Besides, we also have, OK, we see what processor it is running and who is the vendor of the notebook and the serial number and whatever and what network it is connected to. And interestingly, we have the reports. So the website gives you reports. And you see that the notebook is connected to seeing a lot of wireless networks with all the names and signal strands. So the interesting information is, of course, the map. The website gives you a tracking map and says the notebook is somewhere around the circle. How many people now? So can you raise your hand if you now? If you now, how the notebook nows its own location? So it is found on the map. The notebook does not have a GPS. Raise your hand if you now how it nows its location. OK, about how the people now. This is information security technology, a conference, of course, I expect you to know about how the people have no clue. And I had no clue either. So this is a good time to call the police. Of course, I go to the hotel reception, call the police, say hi. This is not an emergency, but here's a notebook which reports itself. Let's go and catch the chief. The police, the Swiss police arrives, two cars, two uniformed officers, two plainclothes officers come in, looks at my report in half an hour and 30 minutes. So very good police in Switzerland. And I say, you now, hi, here's a problem. This is Switzerland. And this is France. So we have, we can't go there, but we have to drive you on the board to the border and connect you to the French police. I say, yes, they put me in a car, drive, and everything is in motion. Yep, so what I was really concerned is how do I protect my data? I mean, the notebook is stolen. I have to cancel three credit cards, reset 20 passwords. So let's see what the chief is doing. So he's connecting to the network, and he's a happy guy because he just got a lot of valuable data. He can sell my private data, maybe look at my documents, publish my unfinished papers, and he went somewhere away. You get a picture every five minutes on a screenshot. And he is calling on phone, saying, hi, I have a lot of valuable data. How much is it? $3,000, $5,000, I want to sell. But then you look what he is searching for, and he is searching for TV program. Easy. Turns out he is interested in player transfers between football teams. And he is a really big fan of Champion League. He spends the next 15 minutes. Yeah, you should be thankful. The French Thief Affair, the weird trousers when they stand in front of camera. Yeah, and he spends next 10 minutes pondering of the Champion League tournament table. Very puzzling. And then another player transfer, and another player transfer. And one more player transfer. He went away, and now there's another player transfer. Very, very, very good. And he looks at this picture. And this is about when the police is knocking on his door. And the police asks me to switch on the sound alarm on the notebook, because there is a function in the software pray, which allows you to get the sound. And by the way, the location reported now is incorrect, because when every time I press this button, it locks on somebody's network. And now it's in Norway. It was in Germany seven minutes ago. So at this place, you will never find your notebook. OK, now it's in Netherlands, but not where we are. But the police asks me to say the alarm just to make sure that this is my notebook. Oh, yeah, OK, scheduled. OK, fine. The police faces a problem. So how did they find this location? You remember the circle. The circle is five buildings like this. So more than 100 apartments. And there is nothing in your information technology that you should help police to find exactly in which apartment the thief is. They have their own methods. Dogs, tracking, database, they say that this is somebody we might know from the picture, and so on. So the notebook is recovered. And happily, oh, yeah. And when they come to the apartment, that thief confesses instantly. They ask, hi, did you steal those notebooks from the University of Geneva today? He says, OK, yes, yes, I did. Easy case. He admitted guilt on the spot. Then they ask, where are the passports? The passports are valuable. This is a big cost and a lot of expense for the person who lost the passports. And he says, sorry, I threw it away. No passports, I just took the notebooks. So the police goes into this building. The thief is there on the third floor and goes to the garbage chute of the building, like communal garbage chute. They have the key, go in the room where the chute ends, open the chute, out comes a big pile of kitchen refuse. And in the pile of kitchen refuse, there are passports and other papers, all wet and smelly. So everything recovered, except. So I need to reach this post dog, the poor post dog who thinks he's spending next mountains with the land. I don't have his contact. I email his professor, a big American professor with a lot of grants, group of 20 people strong. Because it's all wonderful. My guy will be back to work next Monday, problem solved. By the way, did the police recover the printouts of the research papers I have marked up? I looked through more papers, I asked the police, did you take everything from the garbage chute? They say, well, maybe not. Are those papers important? I say, yes, if the professor is emailing, yes. And they go back to the building and pick the papers. And the post dog confirms everything smells really, really bad. OK, chief is scout. This is his name. This is his court papers. He is a repeat offender. This is the second time he got scouted for the same crime. And the justice is restored. In conclusion, I mean, I had the most wonderful evening. I work in information security. But my research is never as fun as in real time chasing and catching a criminal with a police team, which is maybe 12 people strong, with dogs, cars, everybody, going around after the criminal. And the second conclusion, how the people in this room don't know how the information technology works. We rely on it. But you have no idea what the tracking is. On the street, almost nobody will know. 1%, less than 1%. Thanks. Wrap it up. Cool. Thank you. So lightning talk should be a party. I don't know about you. I think it's a party. We started off with artwork. And then we went to cannabis. And then we went to hemp. And then we went to laptop thievery. So when I think of a party, that's what I think of, right? Is that what you think of? You sure? Not like ponies, and rainbows, and balloons, and cake. That's what you think of? All right, cool. Well, we'll try and keep in that theme. This is a friend of mine, Rafael Vino. I've watched his work for many years. I have no idea what he's going to speak to you about. But I always listen whenever he speaks. So no doubt it would be some cool software that he's working on. He's always making new tools and impressing me with various things. And then we have one other speaker. And we'll wrap up for the day and start again tomorrow. So are you guys enjoying the lightning talks so far? Yeah? Fantastic. Once again, apologies that Nick Farr is in here. I don't know the reasons behind all of that. So you can ask him or ask the organizers. But we're very glad that we're still having the lightning talks. And maybe he'll be joining us tomorrow. My name is Aaron Leverett. I'm known as BSB when I'm known at all. Has anyone heard of me? See? See? Thank you. Yeah. So I like doing lightning talks because I used to be in the circus. And so we used to do variety shows, burlesque, cabaret, that sort of stuff. And my favorite thing about variety is the variety. Oh god, it's endless. It doesn't mean burlesque dance. Shh, don't tell anyone. I'm saving the fan dance for the last day, right? Boylesque. It's a thing. No, I can't do the splits. I'm too old. Look at me. I'm gray. It's because of all the splits. All right. Oh, there's visualization. There's graphics. There's a web browser. Wow. OK. It's off the hook. Stand back. All right. Give Raphael a round of applause. Hey. So when you open your web browser and you load the web page, you end up having all the stuff showing up in your browser. And it loads a bunch of JavaScript and a bunch of documents from all kinds of websites. So one of the plug-in you can use to find out what's going on is going to be LightBeam. LightBeam is a Firefox plug-in. And when you load a page, it's going to show you, OK, so github.com loaded all those web pages. But most of you probably already use a bunch of plugins to block ads or to block JavaScript. So it will not really be useful for you. But you want to help some other people using that are not particularly technically competent or not really interested into that to find out what's going on when they load a web page. And to do that, I decided to look a bit at what exists around which kind of tools you can play with to investigate in that. So the first one I found is Scrappy. Scrappy will help you to crawl a web page. And you can go, so you can grab a bunch of this. You can get a bunch of regixes. And you can extract a bunch of documents from the web page and use it to load other URLs. It's really cool, but it doesn't do any JavaScript interpretation. So it will not load all the ads, for example. So the next one I looked at is Splash. Splash is a JavaScript rendering service, which means it's basically a web kit browser that is instrumented so you can send a web page until it's going to load it, run all the JavaScript, and give you an output, an nice output of what's going on on that web page. So I'm going to show you here how that looks like. So let's say I'm going to run it on Google.com. And so it will get Google web page and show you what is loaded, all the external links, and all the JavaScript, and so on. So all that stuff is relatively nice, but it's really complicated to automate that thing and to run it multiple times and to play with the output of that data. So I looked a bit further and find a library that is going to connect Splash on Scrappy together, meaning you can get a domain, load it in Splash, run all the JavaScript, get in your Python code, all the interesting data, especially something called Internet Archive. So HIR files, I don't know if you know that. It's basically just a plain JSON document that contains all the cookies and all the URLs loaded from one web page. So it's really cool. But you still need to put some glue to have all that stuff together and run it from third-party services. So if you want to create a web page, you can use to run a bunch of crawling and multiple domains. You need to put some more glue together. And also, that thing is nice, but it will not really show you what's going on, because what I'm mostly interested in finding out which domains are loaded when I load a website. So I decided to look at another visualization library that's going to be called ET Toolkit. And it's mostly used to display phylogenetic trees. So it's a really cool library that will help you to do all you want to do with trees. So you can merge them together, you can search through it, you can connect stuff together. So it's a really, really nice library that will help you to do all the stuff you or everything you want to do with a tree. But again, all that thing, it's another library that you want to connect with your crawler. So what I decided to do from there is to create a library that's going to get HIR files. So all the URLs loaded from one web page and connect them together in a tree and give you a nice PDF document containing all the domains loaded from one single website. And I wanted to also have a small wrapper to make it easy to crawl a website from a script. So all that stuff is open source on GitHub. If you want to have a look, feel free to do so. And I'm going to show you now on all those libraries connected together, all the glue. Like I put a lot of glue on connect all those scripts in one single project. It's called Lukilu. Lukilu, which means like connecting, like digging, looking into like finding out what other people are doing with your data. So you just want to find out who is going to look at your data when you browse the website. It's going to look like that at the end. So this one is running on my own machine. So don't look it up on the internet. It will not work. But what you get from that is a document like that. So I loaded Le Monde.fr, which is a French news website. And when you load just one page on LeMonde.com, so only the home page, that's what happens. All those domains are also loaded. So it goes extremely far. And you don't have to do anything. You just LeMonde.fr in your browser, and that's what happens. So that's quite impressive. I didn't really investigate much more into that. But that's what you will have by just opening that in Chrome. And I have a few other examples. So for example, if I go for Le Libre, so a Belgian website, it will also look like that. So that's what happens when you load Le Libre. That goes quite far. All those domains are loaded, one after the other, mostly using JavaScript. So this one is like Dailymotion loading a bunch of random stuff. Not so random. But yeah, that's what happens. And if I go then on another website, for example, on Wired, that's what happens. So it's like it's not as insane, but it's still relatively deep. And what is nice with that project is that you can also run it. You can continue the depth of the crawling. So you can say, OK, I want to crawl the home page, and also all the URLs of the same domain on that home page. And that's what happens. I just run it on Buzzfeed.com. And it's what happens with the depth equals 2. So basically, home page, and then all the links to Buzzfeed.com on the home page. So again, it's quite impressive. And yeah, it's going to be public. I'm going to put a public website at some point soon. So that's what is the home page. Yeah, so that's roughly what I wanted to talk about. If you have any further questions, I will be around on floating around the camp for the next few days. Thank you very much. Fantastic. So quite a party, right? We've had art. We've had drugs. We've had crime. And now we have crazy visuals as well, which just leaves us with one thing after the end of a great party. You want to have some nice memories. I have some very nice memories of a hacker space in Oslo called Hackeria, which is where I met this guy. I still consider myself sort of to be a member, even though I don't pay dues, because that's what I'm like. I try and do nice stuff for them at various points and pay my dues. But he's going to talk to you about archiving so that we can all have nice memories of the events here today. This is my friend at Lucity to give us the final talk of the Lightning Talks today. And then you could give us a few more comments, and we'll wrap up, and we'll begin again tomorrow with more Lightning Talks. So at Lucity, there you go. Thank you. Hey, guys. Thanks. I literally made this talk while I was sitting here, and I'm not a very experienced speaker, so I'm sorry if my timing is off and stuff. Who here knows about Archive Team? You're awesome. Cool. That's also great, because if people knew about it, it wouldn't be too fun. We are here to rescue your shit. Who are we? Created by Jason Scott. He's a colorful American. In 2009, we were a bunch of rogue archivists, and programmers, and writers, and general loudmouths. We tried to save digital heritage before it's lost forever, and we tried to do it with a bit of an attitude. We're not really afraid of stepping on anyone's toes, and we're not affiliated with the Internet Archive. We just like them. We have some examples of winnings from the past. We saved GeoCities. Do you remember GeoCities? It's awesome. It's still under construction. It's a topical page on the Internet Archive about all the under construction GeoCities sites. They were bought by Yahoo in 1999. Yahoo severely pissed on them, and then sold them notes, and then shut them down. So we downloaded them. We saved Yahoo videos, and we saved friends there. That's some examples of what we do. Why do we do it? Because history is our future. And so far, we've been trashing it. And we try to make up for that a bit. It's not really our job to figure out what is valuable today, to figure out what is meaningful. We save it, and then someone will probably do something with it in the future. It's hard to do something with it if we didn't save it. We try to work with the three virtues. Rage, paranoia, and kleptomania. We feel like they go pretty well together. Rage, because some private institution is deciding that our history is no longer to be online. That sucks. We accomplish this by distributing the download tasks to lots of people. We have something called a warrior. That's a virtual machine that is set up so that you can just press Play, browse to the IP, then you see stuff downloading, and it's generating traffic. And you're helping us. It's fetching what to download, and you're uploading, and you're being friendly. I've heard it's a great way if anyone is setting up the infrastructure for a cloud solution. It's a great way to better test the CPUs and stuff like that. And I recommend that. It generates a lot of sessions in the TCPs and the networks and all that. It doesn't have to be this way. You are able to help us. You can stop using Yahoo products, because Yahoo sucks. They consistently find ways to delete massive amounts of history in very short time. So please stop using Yahoo. You can help by downloading an archive team warrior and running that when your computer is idling. It's not always going to have some tasks, but when it do, it's really helpful. And you can find out more information on archiveteam.org or IRC on AFNet on the archive team channel. That was basically my talk. OK. So today's lightning talks were very much like my last trip to Amsterdam. I went there with a bunch of money in my pocket. I had some wild parties that I vaguely remember. I have these fractured archives of, and I left with a stupid hat and some bruises from bicycles. And this set of lightning talks feels pretty much the same way. I've had fun. I hope that you've had fun. I hope you'll come back and see some more lightning talks. I want to applaud all the speakers again, except for myself, of course, for getting up and speaking in front of everybody. It's difficult to get up and give a talk. And I was pretty impressed with all of the talks that we saw today. So thanks again to the speakers.