 Welcome to the lightning talk session on day four. So we have the third session today. Who of you visited the other two sessions? All right, nice. We have quite a fan base now. So let's see. Then you probably know all of this, what I'm going to tell you. I would like to give a short introduction for the speakers how to talk lightning here in this session. So if your talk comes up, make sure that you sit in one of the front rows so you can get on stage quickly. And if you are up here, please talk into the microphone. Also remember to adjust it if you are a little taller or a little smaller than me. And don't move too far away from the microphone and don't turn around because the audio will then not be picked up. So you understand what I mean. Then use the clicker to advance the slides back and forward, right and left. And stay calm and simply deliver your talk. Then, of course, finish on time because we are the lightning talks. We have only five minutes for every speaker. After your talk, receive applause and profit. How to listen to lightning talks for the audience? It's pretty simple. Simply be excellent to each other, but also watch the timekeeper. The timekeeper is this colorful device here which helps us to keep track of the time allotted to the speakers. Alex, would you like to say something about it? Yes, most of you should by now know how it works. During the first four minutes of your talk, you get a green light which just rises up to the top. And when it's like this, you might have still one minute left, and then it begins to turn yellow. These are the last 60 seconds. And when the last 30 seconds start, then it gets red. And if it's nearly on top, then your time might be over. And we absolutely hate to interrupt speakers. That's why five seconds before I need your help. Five, four, three, two, one. Excellent. Thank you. Yeah, OK. I think we don't need to practice again. Yeah, they're all quite well trained. So we have translations available from German to English and English to German. If you would like to listen to the translations, please see the wiki on the translation topic or streaming.c3lingo.org, because we don't have decked phones this year. So there you can get some instructions on how to listen to the translated streams. All right, I think we can start. Let's do that and begin with the talks. One more thing, please leave the clicker on the lectern here. All right, let's go. OK. So I would like to talk about IoT and its problems and my attempt to solve it. So basically, IoT is useful. So let's say you have IoT thermostat, and you want to set the temperature when you are going back to your home. And when you are in your home, the home has the temperature you want. But there are problems with IoT. For example, most IoT solutions use central server, which is a part of the manufacturer of the device. So of course, the users can be spied by manufacturer, which the devices also can be disabled by the manufacturer, which is, I think, worse. And it actually happens. You can see one of the Google Nest devices. They ended support after something like three years. And it's tab-working. And the user had no choice but to buy new. And of course, most devices need internet to function. So when you have internet outage, you can adjust the temperature of your home, which is really bad. And I made a small diagram on how this works. Everything connects to the central server. And then you use your phone or your computer to connect to the server-operated manufacturer and give commands to these devices. So the solution, which I would propose, is overline networks. So basically, everything connects directly. The phone app connects directly to the device. And when the device is not in the same network, it might use some help from the central server, which is operated by manufacturer or other party. But it really doesn't know what the data is sent. And it is not specific to the device which is used. It just helps to establish connections over the internet because it's hard to tunnel over nuts and firewalls without help from a server. Mm. In my overline network, HustlerNet, I've took inspiration from some of other projects like CRDNS or Zero Tier. And every device is identified by a hash of its public key. So that secures the connection. And the hash of the public key is unique. It's long enough. So it's also a global IPv6 address. And only knowing this ID, you can connect to other device. So for example, when you pair the device to your phone, you can just check if it has the same ID as you are using on your app and be sure it's the same device. So you might wonder why I did that, when there's, for example, Zero Tier 1, which is an overline network which has most of these characteristics. It also uses hashes of public keys to establish authenticity of the nodes. Through I wanted to make sure my solution can work on embedded devices. So essentially, Zero Tier uses four megabytes of RAM. And you can get around this due to design limitations. And hopefully, HustlerNet can run on most embedded devices. For example, it's ported to ESP32. And it also has a more permissive license. I think that most companies don't like GPL or whatever you think about that. So they want to use the GPL software. OK, and when I am here, I would also like to recommend you the Open Source Project Roboter Parenting System, which is actually an inspiration for creation of this overline network. I wanted to be able to run parts of robots on different computers, which are even not in the same network. Roboter Parenting System has built in support for running one part of robot on one device, another part on another device. And it actually has a lot of helpful libraries. So you can, in many cases, you can just write 10 lines of code. And everything like mapping and navigation will be there in Roboter Parenting System. So thank you for your attention. Like, you can visit the website if you want to know more details. Thank you. Next up is software citation, closing the gaps in software citation workflow. OK, thanks for coming to the talk about software citations. Very briefly about me, I'm kind of a software librarian, I guess you could say. I work at the German National Library of Science and Technology in a project dealing with software sustainability, research, software development, and fair data principles. But I'm not here on behalf of my employer. So the state of the citation, as you've probably know and heard at this Congress, scientists use citations to credit each other in their work. And mostly this happens by citing journal articles and books. As we've also heard in the last few days, there's quite a bit of improvement potential in the system. The reproducibility crisis has also led to some improvements. For example, data sets and raw data are more and more becoming acceptable, publishable, and citable units of work in their own right. Of course, if you talk about data, software is not far away. So the same is becoming true for software as well. It is increasingly being recognized as a standalone product of scientific work. So the citation infrastructure for that is, of course, quite important to give due credit to the authors of software, to the testers as well, and to everybody who's involved in scientific software. There is some community infrastructure projects that deal with that already. So for example, Debian Science, the R community is quite advanced in this. SW Math is for the mathematics community. SoftwareHeritage.org is archiving just the source code and supporting citations in that way as well. But I want to talk about some solution examples which are quite easy to implement for everybody, regardless of whether you are involved in one of these communities or not. So for example, if you have a GitHub repository and you want your software to be credited in the academic world, you can very easily connect it to a service called Zenodo. And then for each Git release tag that you create in your repository, you will get a DOI digital object identifier minted for you. And this DOI is the backbone of academic citations. So this is very easy to do. And you get a free backup at CERN. So that's cool, right? The next option is simply citation files. So in many repositories, you probably see these uppercase letter files that somehow express the wish of the author of how the license should be applied, for example, what should happen if you copy the package and so on. And citation files are just the same. You make a wish as long as you can express your wish in BipTech format. So in this ggplot2 example, for example, Mr. Wickham, the author of several R packages, he usually wants to have a book cited, not the software package itself, but a book he wrote about this. But don't be shy. There is an ad software citation key in the Latkesh and BipTech world, so you can also try that. The compatibility there is quite good. Not perfect, but it's pretty good. And yeah, you can look at some examples if you're interested. The next, now we move into the realm of automatic generators because you don't really want to type a JSON out by hand, I guess. There is a tool agnostic code meta JSON standard format. And the example you see here is from an R package that generates this JSON file from the community native metadata format about R packages. It's called description. And it has some basic fields about the software package. So these examples were about offering the metadata. And that is necessary, of course. So if you're a researcher and you find an interesting software package, you, of course, just need to know which metadata the authors of the software package want to have cited. So offering these metadata is the first step, but it's not sufficient. If you want to do more, especially next year, looks to be quite interesting. There's a project coming up site as.org, which will maybe like, sigh up a little bit, make it very easy to find out how you can cite a specific academic work. There's also a citation file format being discussed, if you're interested in that. Some upstream work would, of course, be interesting. So code meta R is just one example from the R world that I showed you just now. But other IDEs, other languages usually also have their own metadata formats, and including generators to support this generation of this kind of abstraction layer for the citation meta data in code meta JS would be quite interesting. And also for the users, we, of course, need easy ways to import the citation meta data. For example, reference manager Zinodo uses translators, adjacent files to extract the Biblical Africa data. An example, media.ccc.de has not yet a video extractor. You can cite YouTube, but you can't cite media.ccc. So thank you. That's contact information. Bye-bye. Thank you. So one thing that comes to my mind right now, if you want to look up some information on the talkers, you can always look in the wiki. We have the schedule of the lightning talks there, where all the talks are linked. And most of them have also put their slides online. So if you need further information on the talk, don't hesitate to look that up. All right. Then we will continue with climate change. Hi. So I'm going to talk about the economics of climate change. And I assume you are already familiar with it, with climate change. So I'm going to be real brief. Climate change is not a new phenomenon. We've had a roughly one degree increase over the last 100 years. And we also have a correlation to what that cause might be. And that is the CO2 level in the atmosphere. And we don't only have a correlation, but we also know the principle behind it. And that is the greenhouse effect, which has been studied for roughly almost 200 years. So one degree more or less, or even two or three, I cannot feel it. So why should I care? The reason are the damages that are incurred by global climate change, where damages are extreme weather events, like hurricanes, floods, droughts, glaciers that are vanishing, unbearable living conditions, not so much in Europe or the US maybe. But in places like Bangladesh where peak temperature is already pretty high. And also topics like food security might become a problem. And eventually, even extinction is not off the table. It's really unlikely, but it's not impossible. So this is another example of sea level rise with just one meter. If you're familiar with Germany, then you know that one meter increase would be a devastating damage. So should we now radically stop CO2 emissions? And the answer to that is no, because we actually have a benefit of emitting CO2. Because this conference would not be possible without CO2 emissions. You wouldn't have been able to travel here without CO2 emissions. So the question is, what are the damages here? Because we already know the benefits. You already booked the ticket, but the problem is that you would go all the way down this benefit curve until you hit zero, where you don't get an additional benefit out of an additional emission. So we somehow need to find out what the damages are to find an optimum. And there's a concept here that's called the social cost of carbon, which tries to aggregate all the damages that ever happened due to climate change for an additional ton of CO2 emitted. And this is a really quirky concept, because it has some ethical caveats, because you eventually assign value to a life. For example, this is really what you don't want to do, but it's a really powerful tool to assess damages. There's other problems here, too, like aggregation problems in a highly unequal world, and also interpersonal comparisons. And the entire problem isn't hugely multigenerational, because the damages might incur 100 and 150 years from now. So the discount rate that you use is intensely important. And Trump, for example, uses 7% while you could argue that 1.5 or even 0.1 is more reasonable. So we somehow need to get these damages. Now we know the damages to find this optimum, to get to the optimal amount of emissions. So we need some kind of policymaking to enable this. And the problem is that it's an externality. So there are three major ways to include an externality, so where you don't have to pay for the costs you incur. And one of them is command and control, where you just forbid, for example, you would forbid internal combustion engines or planes. Then there's the fixed tax, the Pugubian tax, where you would just say, hey, there's a $30 tax on a ton of CO2 emissions. And we also have cohesion bargaining. You can look it up. It's interesting, but it doesn't apply to climate change. So either way, there's also the emission trading scheme, where you cap the amount of CO2 and then have the trading on it. And either way, which you choose of those, you end up with a carbon price. And that way, we actually have those damages accounted for. And only then do we find at least somewhere close to an optimum. Because right now, we are far off the edge to the right. So what I want you to take away from this is that climate change is real. I know it doesn't give you a fuzzy feeling in the stomach if you talk about it. But the damages are real. And it's not only an environmental protection thing, but also a human protection thing. But there are also benefits to CO2 emissions. And we should try to find an optimum there that we get the best for society and the best for everyone. And to do this, I would propose to use its global CO2 price for emissions. Thank you. Thank you. Next up is evolution of the Keycutt Library. Did I pronounce that right? Keycutt. Is it called Keycutt? Is it pronounced correctly? It's talk about the Keycutt Library. So I will talk about the development of the Keycutt Library in the last few years for the people who do not know what Keycutt is. Keycutt is an open source electronic design automation tool, which in simple terms means you can design PCBs in it. I joined the Keycutt Library team about two years ago. At that time, the library consisted of eight repositions and more. That means a great hassle to maintain for the maintenance as well as to contribute. The library is now over 10 years old, and it didn't follow our convention. So we started refactoring. Unfortunately, refactoring is not so easy. The fact that Keycutt, how should I say? When you edit the symbol in Keycutt, it's automatically updated in the schematic, which is very problematic for footprints. That problem doesn't exist when you use a footprint and you update it. It's not propagated to the PCB. 3D models have the same problems as schematic symbols. And so we updated our library and the schematics of users broken. So at the current stage, we are refactoring the library to have three distinct repositories, one for schematic symbols, one for footprints, one for 3D models. This should simplify maintaining and also distributing and contribution. We also changed the license of the Keycutt library. It's not copied by the same attribution plus some exception, which means you can include our schematic symbols without being affected by the license, because we say it's adapted work. So you can use our library in commercial projects without a problem. I calculated some numbers about the current set of the library. We have about 9,500 symbols and 8,300 footprints. We have no atomic part library, which means the parts our library describes is much higher. About half of the footprints also have 3D models, and now with step models, which means the upcoming Keycutt 5 release has full step support, which is a highly requested feature by more professional users. In the future, after Keycutt 5, Keycutt 6 will introduce a new schematic file format. We already have this in mind, so the problem on the user side does not happen again. A big amount of the library also is script-generated now, which means in the future, you probably can specify your own naming conventions, your own courtyard distance, and such things, and generate your own standard library from scratch. Thank you for your attention and for questions. Please come and person all to me later. Thank you. Next up is Rundfunk mitbestimmen. OK, hello, everybody. My name is Robert, together with a group of volunteers. We're developing a web application called Rundfunk mitbestimmen. You can see the URL over there, rundfunkminusmitbestimmen.de. We are also on Twitter, on Facebook. You can write us an email, and we develop free and open-source software. So there's also a GitHub repository. Since 2013, every home in Germany has to pay for public broadcasting, and there's no legal app out anymore. And we thought, well, if everybody has to pay, why doesn't everybody get a say? And we thought maybe a software can provide a solution to this. And this is Rundfunk mitbestimmen. It's online. You can try it out. More than 800 users already signed up. I will not give a live demo because of time, but I can show you this picture and explain to you how the system works. Basically, it's just a matching between you, the users, and broadcasts, TV, online, or radio broadcasts. You have a virtual budget of $17.50, and you distribute it on those broadcasts you want to support. And this creates interesting data. Because, for example, you can see trends if you compare it over time. You can see what are the most important categories. You can even do something like collaborative filtering. And even though this idea is very simple, it's actually dead simple, no one ever tried this before. So this is interesting and surprising. One reason to have this prototype is also to test assumptions. And maybe you think, well, certainly, the results will be the same, like the TV rankings or the radio rankings. And you can see the two companies that are responsible for those rankings below. And, well, apparently, it is different what you want to support from what you listen to or what you watch. And you can verify that statement by just visiting the website, support some broadcasts, and check if those are really those that you regularly watch or consume. Yeah, this web application already attracted some media attention. For example, Deutschlandfunk and Netspolitik had an interview with us. So this seems to be something important. And because this seems to be something important, we will register an association next year. If you want to become a member, just come to me afterwards. And one thing that I noticed when talking to journalists, especially those that are working in public broadcasting is, well, if we really let people decide, then we will not be able to deliver our quality anymore. Like, the public value will deteriorate for sure. And by that, they mean this quality. And one has to know that public broadcasting has a political and educational mandate. It is for everyone. It is for free, open access to information. So you can create your political opinion, for example. And that's also the reason why they can actually charge you. I googled that. I googled the question, what is actually public value? And I found this amazing quote. Public value is what the public value is, right? That's what you value. Right now, people in broadcasting and the system themselves, they decide what is public value, because they decide which shows are going to continue or which are going to be canceled. So we try to create a means to measure this public value with one von Mitbestem. Now, if you think that sounds interesting, you can just come to me after the talk. There's more about this topic than I can put into a lightning talk. You can also just contact us. In any case, I want you to visit this website and publish your data. Thank you very much. Thank you. Next up is crowd filter. Morning. So I'm Cookie. I have a research project at the Teodresden right now. It's called Crowd Filter. And the idea is to experiment with client-side filtering instead of using server-side or platform-side filtering. So if you have a platform like Twitter, Facebook, Reddit, all the other ones with user-generated content, all these platforms are in the need to regulate their content. They have to employ people who check reports and delete content. And it's, for example, it's illegal content, clearly marked as illegal against the law of the country, which a platform operates in. And things like copyright claims or personal claims, deleting of personal photos, and so on. And the pressure on these platforms is if the people feel that the platform does not regulate, for example, harassment or hate speech, the users will leave because they don't feel welcome anymore. And on the regulating side, on the law side, states also have methods to put pressure on these companies because they can use fines, like with a new net sticky, or they can get in a lawsuit because they still host illegal content after it was reported, and it's illegal risk for just companies. And the consequence we see, for example, with Facebook, they employ third-party companies to regulate the content that was reported. And in Google, for example, uses a lot of algorithms, which are, well, operating mainly by themselves. And the problem is that who watches the regulators? So we have no regulation control mechanism because, for example, the platform could decide to prematurely delete content just to avoid any law cases. And this would mean that content that would not be illegal would be still deleted. And the questions came up. How do we know that the deletion of content is not censorship? So how do we know that content that is reported and deleted is not, in fact, censorship? And the second question, shouldn't we discuss all content that is available online, that people post online? Because we cannot have a broad discussion about content if the content just doesn't exist. And third is a more technical question. How can small platforms be supported to regulate the content who cannot employ thousands of people who delete illegal images? And this is where our project comes in. It's currently in a prototype testing phase. It's a Firefox web extension add-on. We are currently in phase one. It's the classification phase. And the aim is to collect a lot of web content, like keywords and text content, with some classifications. And phase two would be to use those classifications that were crowdsourced to generate filters and then push them back to the client. And the client can then decide, OK, if I have a text content which has a high probability of being hate speech, for example, I don't want to see it. And it's filtered out by the add-on on the client side. For example, it looks like this. We have a tweet here in this example. If you have the permalink tweet, you see the button crowd filter. And then you can click on any of these classifications. And then the add-on takes the tweet content and the link of the tweet with the classification sends it to the server. And it starts in the back end. Second example is GitHub issues. It's working the same with the button and the classification. And for the back end, it looks like this at the moment. It's just a simple display of the text, the URL, and the classification with a client ID and the timestamp. If you're interested in this project or if you just want to have a look at the web extension, it's parted to the news standards. It's at crowdfilter.bitkicks.eu. And I would be very happy if some more non-technical people would give me feedback, because I have a lot of feedback from linguists and sociologists, which were very unhappy with my choice of classification words without explaining what I mean with them, because it's a very broad term, like hate speech. Yep, thank you. Thank you. So next up is exploding stars. Good morning. Let's talk about astrophysics. A long time ago, in the galaxy not so far away, this star exploded, shining as bright as the whole galaxy. This is a supernova. And explosions like these are where many of the chemical elements around you come from. So whether it's oxygen in your lungs or calcium in your bones or silicon in your favorite computer chip, life on Earth, as we know it, could not exist without supernovae. And yet, we don't really understand how these explosions happen. And even observing them with telescopes doesn't help us figure that out, because telescopes can only view the surface of a star. They can't look at the center of a star, where the explosion actually starts. So that's why, instead of light, I use elementary particles called neutrinos to observe supernovae. And neutrinos are like ghosts. So they can quite literally go through walls or through your body. And in fact, we can do a little experiment right now to try and detect neutrinos. And to help me with this experiment, please give me a thumbs up. Excellent. So there's two things happening right now. First of all, you folks are giving me a massive confidence boost, which is great. But more importantly, somewhere out there, the sun is shining, and it's producing a lot of neutrinos in nuclear fusion. And these neutrinos are flying to Earth through the walls of this building and then through your thumbnail. And right now, as you're listening to me, around 60 billion neutrinos from our sun are flying through your thumbnail every second. 60 billion neutrinos flying through your thumbnail right now every second. And you don't feel any of them, right? So that's how ghosts like, how weakly interacting neutrinos really are. And I'll give you a few seconds to stare at your thumbnail in amazement. So I think this clearly demonstrates that neutrinos can escape, even from the center of a star, and bring information about what's going on there to Earth. But of course, to detect them, because they interact so weakly, we need to build a giant detector. In fact, we're building two of them. This experiment is called hypercamucandum. And even after working on it for three years now, the sheer size of it still blows my mind. I mean, you could literally fit basically the entrance hall here at Congress into one of those tanks. And remember, we have two of them. So second one is still free, and you could drown Lady Liberty in there, which is probably some sort of political metaphor nowadays. And what's more, we're building that inside a mountain, 650 meters underground. So that's a rock on top of the detector acts as a natural shield against cosmic rays, so all sorts of other particles that are raining down on our atmosphere from outer space. Now inside the detector, there's ultra-pure water. And all over the inside walls, we have these basically very sensitive cameras, which can detect even a single photon. So when a neutrino hits one of the auto molecules in the water tank and kicks out an electron, for example, that will create a tiny flash of light. And from the brightness of these flashes, we can determine the temperature and the density inside the supernova, because a hotter and denser supernova will produce higher-energy neutrinos. And by counting the number of neutrinos, by effectively counting how many neutrinos I emitted at every single point in time, we can figure out what reactions are going on inside the star. So that way, we can watch millisecond by millisecond how the star explodes and plants the chemical elements necessary for life in its cosmic neighborhood. Thank you very much. Thank you. Next up is photopia. OK. I brought you a few pictures. And I'm going to tell you what I and other people like about these pictures and what we don't like that much. And I'm not going to expand the whole solution for the problem we're seeing. But first of all, we're looking for support or attention. These pictures, right below, Snowden Soli, 2013, from the Bundeskanzleramt, up left, Hamburg, May 1st, right below, Gorleben Proteste, also Klimakamp, right below, the last end of the year, 2015, it must have been, in the day construction of Wenzlo. And these pictures are visually appealing. These pictures have a high quality. Maybe we agree on that. And these pictures have a topic. We often use the word social-engaged, social-engaged photojournalism. And patetically expressed, I would say, these are pictures that, on the one hand, from the tiredness of building a new world, as well as the fights against the old world. And the problem with these pictures is, they're just the tip of the iceberg. Of course, I took them, which are super licensed, to be found on Flickr. But what you find on Flickr is simply super limited to what actually happens every day, in these separations of which I have told you. The licensing is often unclear there. They are often more journalistically documented, or often poorly documented. But they are needed. And from the left, so you have to say it today, emancipatory, solidarity and not fascist political power for their media products, they are needed. And there are hardly any of them. So here Stuttgart 21, at Flickr, it's a pretty nice result, I would say. You can't start with that, if you somehow, I don't know, in two hours, somehow have a deadline for the layout of, I don't know, of the next industry. Deceit, this is from October. Sometime a mistake happens again. So I have that in my known circle, friend circle. Once a year, every two years, you do something wrong with the licensing, and then you take a nice, canceling this mistake. That's why we thought we'd let ourselves do it. We are unfortunately not so techies. That means we can't program it completely ourselves. But we want, that's our proposal for this solution, that's our solution proposal. We want to establish a platform. There's a campaign website, here's Photopia CC. And it's about securing quality. What I just said, the result is already at Flickr. Right of safety through a clear licensing. So right now we're at Creative Commons, non-commercial, because it's not about taking the established photographers and photographers away from the business. And it's about visibility. So to lift the iceberg, so to speak, a bit. Right down, for example, it's a bit small now, maybe. You can see that it's an underside of a factory. On the underside, on the underside, there are also always super important documentation of work fighting. And that's mostly due to a table, because something like that doesn't even fit in Flickr. And the black and white pictures that are in the middle, you can see that these are more iconographic depictions, and the dead student who doesn't care. We have to buy the picture from the DPA today. Exactly. So, where are we going? Let's keep going. For example, I have a problem right now. We've been spending a month or so on our campaign site online, and we're getting a lot of messages right now. And we're just not sure how we're going to develop this dialogue, with a lot of interest, constructive comments, how we can make it transparent. So if you have any ideas for that, I'm going to hang around an hour in the youth hack space now. I'm looking forward to talking to you, critical comments. And otherwise, my cover numbers, I don't have them here on the photos, which are 4, 5, 5, 8. Exactly. And otherwise, you can also contact us on the site. And otherwise, otherwise, otherwise, otherwise, participate, continue to say. And if you even have coal, donate, and then there will be a solution for this problem. Thank you. Thank you. Next up is Ada Konf. How to create a three-track conference in 31 days. Hi, everyone. I'm Emma. I'm from Malmö, that's in Sweden. This autumn, I was a volunteer at a wonderful conference called FUKAFE, that is having 400 events a year. Now we wanted to make a full-day conference for only women and trans people. Why do we want that? Well, because there's popular demand, we want to do that. We decided upon the date. Whatever. We decided upon the date, 31 days beforehand. Can you go to the next slide for me? Just press the button to the right. Yeah, that's what I did. Anyway, 31 days it took. We made a call for papers and I was reaching out to my very big social graph. And what I realized by doing this is when I restrained myself about who I am supposed to reach out to, I realized how many women and trans people that are so competent, that are out there, that I wouldn't have reached out to if it wasn't for my own, for that I wanted to have only them at this place. It was also super, super fun to do because everyone that I spoke to, they were like, yeah, I totally want to come. Yeah, I'll totally want to come. Yeah, I'll come from San Francisco. Yes, I'll come from Washington. I'll come from London. Oh, I can't make it. Oh, I'll reschedule. It's okay. And so we had this wonderful, general purpose IT conference with topics like UX, we had accessible design, we had security, that was me. We had this wonderful soldering station so I think that soldering has such a revolutionary, beautiful power, because it looks very hard and it totally isn't hard. It's like knitting, but only with heat, basically. We had a, we were able to do this in only 31 days because we were working in an agile fashion. We were focusing very hard on the minimally viable products. And as you see, it's very easy to feed one's ego doing this with this kind of feedback afterwards. We also wanted to do it very fast because I want to harvest superpowers and the enthusiasm of people and also my own enthusiasm. And yes, you can go to the next slide because Adekonf Zero was in Malmö 25th of November. Adekonf One will be in Stockholm, the 17th of March. The keynote is already decided upon. Anne-Marie Lavender Eklund is one of the key bearers to the internet. She's signing the DNS route zone. She's super duper cool. And of course, I need people to do talks. I need people to do workshops. I want more open source contribution content. I want people who know how to solder. I want people who want to do all kinds of techy stuff together with us. So please get in touch. You have our Twitter handles here. It's Adekonf and me, I'm Malstam. Thank you very much. Thank you. Sorry for the clicker trouble. I'll briefly check that. Maybe it is a run out of batteries or something. Okay, seems to work now. So next up is NeoPG, a replacement element for GNU PG. Okay, so hi, my name is Marcus Brinkman. I'm talking about NeoPG. As I said, a replacement for GNU PG. Thank you. GNU PG is approximately half a million lines of code. Three code written over 20 years. Not many people read the source code, I guess. But if you do, you can find some interesting and strange things. For example, 400 command line options. Not one, but actually two open PGP parsers because the first one wasn't reusable. And a custom HTTP client and the DNS resolver. And for the people, for the white heads who like to break stuff, GNU PG is currently working on its own TLS library, already used on Windows. So maybe take a look at that. What GNU PG does not have is a library interface that allows application programmers to control and extend GNU PG beyond what is already there. And the FAQ actually says that there will never be such a library. So can we just write a library and a better implementation? Maybe, but we have to implement the open PGP standard. And that is also 20 years old. And not many people read the standard, I guess. But if you do, you can find some interesting and strange things. For example, it still allows MD5 and IDEA which are not secure anymore and it is missing some important current cryptographic algorithms like explicit graph cryptography. It also requires SHA-1 for fingerprints and SHA-1 is currently, it's basically the next hash algorithm to be broken. And two years ago, the IETF working group reorganized and worked on an update, but last month the effort was terminated without result. The secretary concluded that there's not sufficient interest to successfully complete the work of the working group. This is bad because we are now using 20 year old standard with a small update 10 years ago and there's no perspective for future improvements. So I forked new PGP in October and started to refactor it and strip it down and remove obsolete stuff. And the plan is to replace it with a library and a new command line as rule based on the library. And of course, the next step is to implement new features. The current status is I removed 240,000 lines of code and 120 command line options and I don't think you will miss anything. So far it's looking good, three months in and I'll continue and we will see what happens in three months. New PGP will implement a new command line interface which is based on the popular Git style sub commands it will have the compatibility interface and maybe things like terminal color output. We could work on that. It also will be easier to compile and build because it's based on CMake and comes as a single repository and we target all the popular platforms. The library, which is currently only planned will have an easy to use high level interface but it will also give complete control at the low level because this is what actually makes new applications possible which we don't anticipate. So all policy decisions will be changeable for key management, trust models and data processing like putting in the password. We will delegate a lot of the work because we're a small team and I don't want to write my own HTTP client and stuff. So we will use standard libraries for common tasks. With C++ we can write the code more efficiently and we will use the cryptographic library Botan which is not very well known but it's very designed and it alone can replace about half of the new PGP software stack because it comes with a TLS library too and many cryptographic algorithms and some interesting data processing. So we will focus on code quality too. All the good stuff like continuous integration testing and static code analysis and so will be much easier. To this day, new PG relies mainly on the web of trust and open key servers to distribute keys and verify user identities. There are many proposals how to do it differently and I think we should try to integrate some of them. Maybe we can treat encrypted messages this way. Yeah, if you'd like to, you can check the website, the blog and join the development on GitHub. Thank you. Thank you. Now the last talk before our break is right to internet access. Hello everyone, I'm Christina and I'm going to speak to you about if internet access should be considered a human right. The aim of this presentation is to raise awareness about this concept and also to point out some aspects that need improvements or future answers. I'll start with some facts regarding the rights to internet access. In 2016, the UN United Nations released a non-binding resolution stating that the same rights people have offline must also be protected online. You can see here an x-rays from that text. However, even if the right to internet access was called as being a human right, the UN resolution only recommends actions for nation states and lacks any enforcement mechanisms. Some countries have already taken affirmative action. You can see here some examples including the fact that Finland was the first country where internet access was declared a human right. The model implemented in Finland is assuring broadband connection to all citizens establishing a basic quantity and quality available to anyone. By 2010, the goal of the state was to assure basically one megabits per second and by 2015 to assure 100 megabytes per second connection. Here, you can see a scale of the internet users by geographical zone in 2017. Also, almost 40% of the world population has access to internet today. However, there are some arguments against the right to internet access and I will present to you four main critiques brought against considering it a human right. The first argument is about economical and political challenges, around the right to internet access. In order to make it applicable, practically states should have the necessary funds and infrastructure. This makes assuming responsibility for it at the world scale almost impossible. Also, the political challenges around the access to internet topic are very sensitive. Some states currently ban access to internet, censor it, create firewalls, or even convict currently people for accessing internet. China's firewall is an example of such situation and the fact that within Chinese territory the internet is under the jurisdiction of Chinese sovereignty. Here, you can see the documented shutdowns happening in 2016 and 2017. For some, the states gave no reason at all and for others the reasons are considered false or hide real motives like stopping protests or controlling elections. Considering the political and economical context, it's difficult to envision and persuade states to actively involve themselves in promoting internet access as a human right. The second argument is that internet currently is more a commodity than a human right. Internet is a technology like many others as we well know and access to it mostly is in charge of the private sector. The nature of it implies that in order to actually use internet people need terminals, electricity, necessary infrastructure and maintenance. This creates a potential limitation of a human right. The third argument is that access to internet does not stand on its own as a value. It is often associated with freedom of expression right to assembly or right to development. The right to internet access can be considered a situation of human rights inflation where every separate group considers that its interests have to become basically a human right. Also the online environment is the place for crime sometimes for harmful content and this cannot stand on its own as values to be promoted and show that internet is a tool that doesn't imply a certain value apart from the ones already existing. Now the fourth argument is that we don't have a clear notion about the internet use nor its evolution in the future. The main purposes of internet are to be defined and society currently lacks a clear regulation in the matter. We can find a variety of activities that are happening online and we cannot define internet by one and specific. Also the evolution of it in the future can lead to situations where as a human right needs to be redefined or even not considered any more value. In the end I'm going to leave you with a quote from Karl Popper that speaks about the fact that only critical discussion can give us the maturity to see an idea from more and more sides and to make a correct judgment of it. I hope you enjoyed the presentation and thank you. Thank you. So now we're going to have a break of 15 minutes. See you back at 12.45. Get a drink, get something to eat and come back. See you. Okay, it's 12.45 on my watch, so let's continue with the Lightning Talk session. Up next, Privacy Score. A short announcement to the speakers. Please adjust the microphone before you talk so it points directly at your mouth and captures all the precious sound waves you generate. Let's go. Okay, hi everyone. I'm Max and I'm going to briefly present a project that I did with Dominik Hermann who is by now a professor at the University of Bamberg and Pascal Wichmann and Henning Kredul from the University of Hamburg. And the motivation for the project is basically no one really knows what the hell is going on on the website at any given point when you visit it. So there might be like a bunch of third-party trackers that are tracking your every move. There was just a few days ago a new study was released that showed that some trackers actually embedded invisible login forms to harvest your login ID to use that to track you. So, yeah, great. And we wanted to establish at least a baseline transparency about what the hell was going on on these websites. And to do this, we built Privacy Score. So Privacy Score is basically a web service that checks the privacy friendliness of a website. It checks for trackers, it checks for cookies, it checks if HTTPS is used for the web server, checks if Start TLS is used for the mail server, some general security questions like the use of security headers. And it also checks for some information leaks like exposed Git repositories, SQL dumps, stuff like this. And it's highly entertaining what you can find there. We also make it possible to compare the results from multiple websites. So, in fact, if you go to our website, PrivacyScore.org, you can see a list of all CCC, ARFAS, and KALS trefs, and you can see those websites ranked among each other. And finally, as we just figured out over the last two weeks, it is also great if you want to get threatened with legal... with legal steps by the people you're scanning because we contacted a bunch of insurance companies that we scanned, and some of them basically responded by threatening us that they would sue us if we didn't stop scanning them, so this was also highly entertaining. By the way, we also wrote a paper on if what we're doing is actually legal, and yes, it is legal. So, yeah. The technology is basically a Django web front-end with using the pretty awesome OpenWPM, which is a headless Firefox browser that acts in every way like a regular Firefox browser, so it will execute JavaScript and everything, and this gives you a very good idea of what is actually going to happen if you visit the website in the browser. We're using test.ssl.sh for TLS analysis, salary for distributed task queues. We're using EasyList and EasyPrivacy as filtering lists to check which websites are actually trackers that are embedded, and obviously we use Sentry to catch the inevitable errors. All of this is open-source software, which is really great, and in return we also make our stuff available open-source, obviously. So, what we're looking for is we would like to see more checks. So, if you have any ideas what we could scan on the website, you can write an issue on our GitHub repository, which is listed down here. Preferably, it should be a check that doesn't land us immediately in jail. So, yeah, there have been some proposals where we're like, yes, that sounds really cool, but this also sounds like we would be in jail within like two weeks, so, yeah, no. We would like to see more lists of interesting websites that you would like to see ranked against each other. You can create a new list without any sign-up or anything. We also obviously don't use any analytics on our server, so you're not being tracked while checking who is tracking you. We would like to see an API. We have some stubs for that, but nothing serious yet. And, yeah, if this sounds interesting to you, you can fork the code on GitHub and you can visit the website, privacyscore.org, to see the results of any website you're interested in. For example, the list of CCC-RFAS. And with that, I'm done. Next up is Moon Gen Packet Generator. I'm Paul and I gave a talk earlier this week. I had to speak very, very fast, but this time I have way more time so I can speak slightly, slowly. And it's about package generators this time. And, well, if people think of package generators, they often imagine big black hardware boxes full with FPGAs and so on. But that is boring and stupid. We want to do the same thing in software. Now, what are the problems when doing that in software? Well, there are a few things that hardware package generators are really good at. And these are mainly at being expensive, at being fast, and at being precise allegedly. But if we look at software package generators, they have a few other nice advantages. Like you run on cheap commodity hardware, you can take your Linux system, start the software and send out packets at your network interface. They are, however, usually quite slow and or imprecise, usually both. But the slowness gives them some flexibility because you can write code instead of some obscure configuration for some obscure hardware box thing. Now, what are the main problems that I'm trying to solve with the Moongan package generator? Is, one, performance because they're all slow and I don't want to be slow. And the second thing I wanted to solve is time-stamping position for latency measurements. Meaning you typically, if you want to test a hardware device and you want to, like, get the measured latency, how fast does it forward your packet, then you need something in the range of nanosecond position and this is hard to do in software, obviously. So what we want to do with Moongan is we want to combine the advantages of the software and the hardware package generators and we mainly don't want to rely on hardware. How do we do that? Well, for being fast, it's quite easy. We just use DPDK, which is this nice framework which has drivers for network cards that are fast. Then we build our whole API around multi-core awareness and so on, meaning we have also this nice NUMA aware feature because in the past we had this problem of, like, you had the NUMA system and the PCI Express bus is always attached to one CPU and people pinning their things to the wrong thing or the operating system pinning it wrong. So we automatically detect which thread uses which network card in what manner and we automatically pin the thread to the core and pin the memory to the core so that you don't run into NUMA problems. Then we are flexible. The trick here is that we craft all packets in user-controlled Lua scripts. We use LuaJIT for that, which is this super-fast JIT compiler for Lua, which is also used in other projects. For example, instead of configuring the package generator or instead of writing a complex configuration thing because I've used other package generators in the past and the configuration was never enough. I needed features that were not configurable, that were not available and in the end I always had to change the code to add stuff for weird protocols and so on. So instead we decided no configuration, it's scripting only and your code gets run for every packet that is sent out in real-time and despite that it's quite fast. For example, if you want to randomize something, you can just call a master random function. If you want another distribution of your random stuff, call a different function. If you want a counter, add a counter and so on. And you have support for complex protocol stacks with a code generator that generates code for stacks. For example, if you want Ethernet in IP, in VXLAN, in UDP, in another VXLAN, in an Ethernet that has VLAN tagged in another VXLAN and below that a Q and Q tag, no worries, you can do that. Other package generators often fail at that. For position, if you need nanosecond level position or QLC then you really have to use hardware. But if you read the datasheet of a few commodity nicks carefully you will see that there are time stamping features in there that are meant for PTP time synchronization. You can kind of set the right registers in the right way and then you can time stamp almost arbitrary packets and you get nanosecond level accuracy. So, is it fast because I'm always about fast? Well, yes. If you send minimum size packets then you can easily get above 10 gigabits per second per CPU core for comparison like your Trevgen or whatever legacy package generator gets around 300,000 packets per second maybe and we get 15 million packets per second per CPU core and with easy scaling we can scale to multiple nicks, multiple Qs on one nick. We have tested this with packet rates above 100G with several 40 gigabit nicks, easy. The latency measurements at nanosecond level and all of this while running custom user defined code for every single packet that is sent out in real time. Okay, to conclude, check it out on GitHub. It's open source, MIT license. I think no one ever scanned that QR code. I hope it works. Thank you. Thank you. Please give a big hand for the translation team. So next up is Omnomnom. Yeah, welcome everybody. I'm Max from Berlin. I'm a computer science student and system engineer and I want to talk about a little open source project of mine. Oh, I forgot the thing here. Yes, Omnomnom is an open source telegram chat bot. It's available under the nick on bot and it's aware of a lot of canteen menus. Telegram is a messenger like Signal or WhatsApp and in 2015 they introduced in bot APIs so it's very easy to develop software for the framework for the application. One day later I released the first version of the bot. It was very raw, only 200 lines of Python code that crashed all the time but it worked for four canteens in Berlin and it looked like that. You'll see me asking for the menu of the Marc canteen in Berlin and you get results, some dishes and prizes. Yeah, a lot of people liked it at 2B. So three years later and several code iterations later it looks now like this. Again, on the left side you'll see me asking for the same menu but you'll have a lot more information like if the food vegan or the meat, you have the business hours and additional information from the canteens. Also it supports 55 canteens today and it's very fast. In the beginning it took 5 to 10 seconds for an answer and now it's another second and on the right side you see a long list of canteens and you can scroll and select the one you want to know more about. At university people keep to ask me how it works and so I decided to give this talk about the internals of the bot. From 200 lines of Python it went up to five ducker containers. You have the Telegram API and every time a user sends a message to the bot I receive the message from the API. In the front-end application it's quite a simple Python script that parses the message, decides which canteen is requested and which dates. You can also ask for menus or tomorrow for example. Then it checks the Redis database for the menu and response but the harder part is to get the information into the Redis database. That works in a salary application. Salary is a Python task queue and a task queue is made of two parts. You have some software that puts tasks into the queue and other software that takes tasks out of the queue and does the work. So we have the beat container. Beat is also part of salary. It just schedules regular tasks like cron and my tasks are parsed websites or parsed PDF files. So this is not a complicated container but it needs to be there to scan all websites every few hours. So the hard part happens in the worker container. It's the part that takes the task and executes them so for different canteens I have to write different parses to extract all information and then put the results into the Redis database. I decided to go with salary because it works pretty well for long-running tasks so as soon as resources are available I will scan the next website without overloading my server. That's basically all you need to run the bot. I have an additional container. I call it housekeeping. It's stuff like sending error messages to me independent from the normal website processing in case something happens with the bot and it also writes some statistics about the user, not so much about the users but more about which canteens are requested and how often. So that's all you need for the bot but to make my own life easier I built a few more containers around it so it starts to look a little bit complicated and I say myself I over-engineered it a little bit but yeah, I learned a lot so I have a deployment chain to reduce my own SSH usage to the server every time I take a GitHub commit for a new release I run, yeah, that triggers tests in Drone Drone.io is an awesome CI CD framework which runs on Docker and then automatically it builds the new Docker images if the test succeed pushes the images to Docker Hub which is a lot faster than letting Docker Hub building the images as soon as Docker Hub is received the images they trigger webhook again at a container at my server the webhooks container and that then starts a new deployment of the bot so it replaces all containers in the gray box above if necessary so my time is up so I will forward but there are a few more containers about the website and code documentation and yeah, currently I have like 50 messages a day thank you if you have any questions, talk to me okay, it's the last day we're all a bit slow I forgot to countdown okay, next up is something that's maybe a bit difficult for the English speaking people but yeah, let's try it anyway I don't even know if that counts as German but I think technically it does so let's go I said I said they're doing a report of Schwebisch when I do 100 retweets and I wrote down I'm doing more than 100 likes on Bayerisch I have more than 100 likes but I don't know Bayerisch what the hell was that Now I'm going to make a report so yeah, the extension would have been before you can see why I've done that And I always do it like this when someone asks for a delivery. I can't just say, I don't do it. So, now I'm going to make a contract with Schwabisch. And I can't really make a technical contract with Schwabisch, because I say to people, hey, this is not very inclusive, if you only make Schwabisch, then you can only understand 20,000 people or something. Then I said, I'm going to make a contract with Schwabisch, like Mospetzle does. Because I don't want to tell you where it all comes from. There were things like this a few thousand years ago, there were different kinds of noodles in China. And that's a worldwide phenomenon with noodles. So, they're somehow discovered in 20 species all over the world. And the Schwabisch version of it is the Spetzle. So, if you take a look, Pasta Flowchart, there's a picture, there's a summary, there are all sorts of Italian noodles and all sorts of noodles described, and that's the Spetzle. So, pasta and Spetzle are a bit different, because, exactly. Yes, now, how do you make Spetzle? The first important thing is that you take a lot of eggs. Now people always come and say, how much should I take? Yes, and then I say to them, yes, is there a KSA for eggs or something? Yes, the same for males. Okay, I'm going to feed a kilo of males now, because I have a few people to supply. And a little salt also has to do with it, because otherwise it tastes a little sour. Some people also taste a little pepper, because the males are a little sharper. Yes, you can also make Spetzle with chili or something like that. Maybe you can do a challenge, how sharp you can do it and how you can eat it. And then you feel the whole thing with water and I start to stir around so that there is a dip, yes. With my grandma, as you can imagine, my grandma has just my range of chain, but she was just so big. And then she took the hope with the dike and then she stirred it and always looked at it a little aggressively. And then she did it for half an hour. And then it went to the bowl, yes. So, now I switched it on my phone, but not there. That's a shame. It's always starting to make some water, it's also a little salty, yes. Salt is not much, yes. And then there are different possibilities how you can do it. The really nice way is the bowl. You need a spatula board, yes. You take the spatula board, I can only show you, because I was about to make a photo. I don't know how to take photos anymore. You take the spatula board, you hold the bowl over it, you step on it and then the bowl is, well, really tight, yes, not slowly, but really fast. And then you wait until the bowl is over it. Do you know what the hot bowl is over it? That's when you cook the foam on top of it, yes. And then you can shake it out with a foam spoon or something like that. Then you make the next portion. Of course you can also do it nicely, but with the spatula board. And that was with my grandma in the past, so with us at home, we always did it with the spatula board. And then she always said, oh my God, come on, I have to press the spatula board now. Yes, and then I got out of the computer and of course I didn't want to stand around for half an hour because I wanted to shake it back and forth again, yes. And then I got out, I made the bowl full of the spatula board, yes, up to the top, without pressing it with a vacuum cleaner. My grandma says that every time she doesn't like it because there are no spezzles, but somehow it's like rain, yes. But it tastes good, right? So, now I have a tip for you, so I thought, oh well, that's not too bad now. It's a e-dialect, yes. And what you do the best thing you can do with spezzles is of course sauerkraut, but I can also eat spezzles like this, because when my grandma, who always made it like this, stood over night in the kitchen. That means she quickly grew up, they missed the next day. She just eats them out like this, yes. And then you clean it up with a rolling pin and of course that's very difficult, yes. So, I think we're done. Thank you, ciao. Thank you. OK, so next up is free software and free knowledge. Tristan, fork us in real life. Yes, hello, I hope you can hear me. My voice is a bit slidier from the concrete. And I'll start. We are the high school group for free software and free knowledge from Tristan. And it's about, yes, a high school group is a association of people in a university who do projects together and somehow try to intervene in the high school policy or offer services for the students. For everyone who doesn't know that. And we understand each other as a kind of lobby group for free software and free knowledge. And with us, the high schools are the goals of our work and the high school is also our field of work, because the high school just makes us spaces and structures accessible. You can see our previous projects on the screen now. That's a few, especially the advancements. Should we maybe do the university project where we now, in the second year, have shared sticks with Debian live systems on our first days? And we also do a monthly talk and some late-hacks, sometimes workshops, crypto parties, dealings, insta parties and so on. And yes, why at the high school? Of course, you have a direct reference to free knowledge distribution at the high school. The problematic monopoly of the scientific situation is in the meantime clear to everyone, also the old sacks that think, but still, it's actually good. And partly, that was also one of the important aspects for us, find product training instead of, for example, MATLAB is written in. And of course that leads to dependency of manufacturers, and we can't do that as hackers. So we thought we'd try to make a bit of a propaganda against it. And of course, at the high school, the leadership of the future is formed. That means, if we manage to bring the people close to the free software, then it may also be carried into the company. So our vision is to increase the spread of free software among students, then this sensitization for free software with the absolvent and absolvent in the economy, and through our projects, our content projects in the high school to collect reputation that we can use as political capital in the discussion with the high school about high school political issues with software. And finally, we wish us broad influence through FORX at all German high schools. And that's why we want to give you the instructions now. FORX us in real life and also the bitter in you. So what you have to do is actually not so difficult. Somehow find three people, plan, apply and hold a meeting, and then regularly organize meetings. Of course, you start with 100 people at the meeting, and then at some point it's just 10, but you can just work. And finally, you need a bit of infrastructure, mailing lists, home page, social media to do advertising, to plan your event, to do the internal coordination. And then you can just give first projects, talk hours, offers for latex, for example. That's of course very important in the university. Crypto parties or also a position paper to be able to prove if you somehow try to spread your position. And when you've done that, what's next? Question mark, question mark, question mark, profit. So, we are the FSFB, FORX us in real life. Contact us if you're interested. We like to help you. We can tell you something about our technology that we need. We can collect something from your experience. If it's really good, if it's in other high schools, also groups like ours. Thank you very much. Thank you. So next up is All Creatures' welcome. Hello, people. This talk is not going to be very easy to listen to. It's not very easy to give. But I believe that at this moment, we as a community are going to need to be strong. However, not everybody needs to be strong all the time. And if this is a moment when you don't think that you can address this content, I'm going to ask you just to step out the door for a few minutes. And I apologize for the inconvenience. So let me tell you where I'm coming from here. It's my hobby is to try to make the world a little bit better than it was before. And I find there are two types of problems that we face in the world. One is the type that we don't really know how to fix. Stuff like war, neoliberalism, they're terrible. But when we try to solve them, we end up in a game theoretical quagmire and we don't really have an answer for it. Then there are the other issues. The ones which we could probably fix if we could all just have the courage to sit down and talk about it. I am not really qualified to give this talk. It's not my area of expertise, but I believe that the silence on this topic has only served to perpetuate patterns which are unacceptable. So let's talk about something hard. Rape has touched the lives of almost exactly 10% of the American population, including 3% of men. I'm using American statistics here because they're more accessible, but I'm not aware of any culture where this is not a problem. If we are to believe that a number of fairly prominent community members, something really awful has been happening here over and over again. I don't want to talk about the accusations or the people involved during the center of them. What I want to talk about are the reactions. I've heard everything from, oh, it was just one person saying this, that was recanted, even complex conspiracy theories to explain how the whole thing had been fabricated. I've heard just about everything other than acceptance of the possibility that what happens in America every 98 seconds might be taking place here as well. So I decided to begin compiling reports that I could show people that the accusations were in fact coming from a large group of very credible sources and what I made still exists. I don't intend to shame the person in this story. It's not productive, and really I don't know for a fact that he did anything at all, but I do know that this happens all of the time. I intend to speak about the culture of disbelief, apologism, and cover-up, which allows these types of atrocities to flourish. This is an issue which the justice system is famously bad at dealing with. It's estimated that 54% of rapes are never reported to the police, and of those which are reported, only 2.2% lead to felony convictions. I often hear innocent until proven guilty as an argument, which makes sense in a world where the guilty get put in a cage and cut off from the world for years of their lives. But when innocent until proven guilty is used as an objection to community efforts to ensure people's safety, what I hear is, not my problem, I don't care. Now there's been some really important efforts made in the past years, and I don't want to belittle what the participants have managed to do. I want to thank the security team and the awareness team for their role in making this a safer conference to attend. But this was disheartening to hear that someone ripped this poster off the wall, and it sickens me to imagine that the person who did it could have been involved in the de-escalating, mediating and effectively covering up atrocities committed by patterned repeat offenders. This is the creator of the Mastodon protocol, who I sadly, sorry, project, who I sadly did not have the privilege of meeting here, because his view is that a community with such a cavalier attitude toward this topic is not a safe place to be. And this is not the only person I'm aware of who has decided to stay home because of this culture. For me, the CCC is an extremely important institution. Not only is it a place for meeting of many different communities, but it critically creates a cultural answer to Silicon Valley's toxic culture. But if this culture does not insist that the weak be protected from the strong, what claim do we have that we are any better than Silicon Valley in the first place? So what can we do? Again, I want to applaud the great efforts that have been made by the awareness team and others. You're on the side of angels. Keep fighting. One thing that we can all do right now is stop describing sexual assault as drama. Rape happens to one in 10 people. I don't think I need anything more than statistics to say not only can it happen here, it does happen here. I don't need to believe in the stories. Finally, I invite you to join me in demanding that the Organizing Committee submit to independent observation of their safety process. I want a well-known and well-regarded specialist in sexual violence prevention to have full access to all the meetings, interviews, and deliberation. Obviously, these matters are very sensitive and proceedings must be kept strictly private, but we can insist that an outside observer to certify that these matters are being taken seriously and handled appropriately. This issue is not specific to the CCC. It is present everywhere. We are not the worst, but we can be better. Let's do that. Thank you. Thank you. Then next up is civil clauses, a sound approach for banning military use from civil institutions. Yes, hello. I'm Bestow. I'm Kron, thanks. And it's about civil clauses at, especially, universities. So the problem is, well, please stay in front of the mic. We all know that some people really love to work for the military, and there are also others that also strongly object to killing people. Now, if you're working as you can choose your own employer, that's not a problem, but if you're in your education and you work for a university or something similar, then you might run through the problem that you cannot choose actually the project you're working on. And sometimes you don't even know what the project is in the end about. So that might cause some conflict for you, and that's why people came up with the idea of civil clauses. So to solve this conflict, some universities in Germany, even some states in Germany came up with the idea of so-called civil clauses. These prohibit the military projects with these universities or the states. And the state of Berman wrote 2005, a 15 in its Higher Education Act, that schools of higher education pursue in research education and studies exclusively peaceful means. The resources provided by the state to these schools are exclusively for aims that follow these proposals. And since the 1950s, there are several institutions, civil institutions, and also states which gave such a civil clause and there are more coming up. Yeah. Now, there's, of course, since all of this war is peace-saying, so what are peaceful purposes? I mean, this is a nice act, but what is it? So the interpretation of the University of Applied Sciences in Bremen had their own interpretation and the first thing they did was signed a collaboration agreement with the German Bundeswehr, which is like the German Army. So they're offering a course for female computer scientists for programming at the German Army. Now, this, of course, is a conflict. Like, for example, the student council, they did this banner and hang it out of the building which said we educate to kill. They had to remove the banner because the German Army claimed in this case copyright. So, yeah. Nevertheless, the conflict is still on. And, of course, the civil clause is a disputed thing. Nevertheless, we say it's good to have these clauses. Yeah, we believe that it's good to have such a clause because you actually have the freedom to say no, to say no to military usage of your work, and we think that's a very important point because if you're bound to your university during your studies, you really don't have such a freedom. And civil clauses at least give people the chance to fight for the rights to reject. And it's not always possible or it's a hard fight. However, there is no guarantee that you're safe in this account and you really don't have a guarantee that after you publish your work that it's not misused. Yeah, nevertheless, I think it's, we at least think it's still ongoing struggle. And it's also, of course, the question of, you know, what are we working for directly or indirectly? And so we think it's brought on and we will be after the lightning talks here at the emergency exit doors for further discussions if you have questions for us or you can at this email. Thank you. Thank you. So then next up is the circle of hope. I think they're taking over the stage there in the majority right now. We're only two. All right, let's go. Oh my God, there's a lot of people here. Hello, how are you doing? We're from Hackers on Planet Earth. We're an American hacker conference. Before we talk about why you should care about an American hacker conference, I'd like to say a few words about why you should care about an American civil liberties organization, which is one of the most important battles for all of us. I saw an excellent talk here yesterday about enforcing net neutrality. In the states, we're trying to destroy net neutrality. And I guarantee, if the powers that be succeed in destroying that neutrality there, they will come here next and destroy it in Europe as well. So EFF's victories are victories. And please, before they leave today we're going to come over at CCL opposite the tea house and donate whatever you can to keep them alive, keep them going, keep them flourishing, get t-shirts. We have our hacker calendar over there as well. A donation for every sale of that. We were just looking at the dates actually and we noticed that today we have virtually every day of the year if something happened in hacker history. But today, December 30th, nothing happened. It's an empty day. Next year, we can fill that space. It would be nice if maybe we could say on December 30th of 2017 someone gave a Bitcoin to EFF at the CCC. Wouldn't that be amazing? Anyway, I'd like to turn it over to my fellow Hope organizers here who are going to talk about the Circle of Hope next year. Mitch, aesthetics and Kyle. Yeah, so this is going to be our 12 Hackers on Planet Earth conference. It's very much influenced by this conference and very much influenced by all that all of us have learned here and brought to our fair country that so poorly needs this kind of energy with a fantastic mix of organization, German organization and anarchy, German anarchy. And we have this kind of thing going on at Hope, July 22nd in New York City. Yeah, so this is a great excuse to visit the United States if you've been really eager to do so especially in last year or so. Yeah, it's a lot of fun. We've had a lot of really interesting speakers over the years, a lot of cool projects. We have lockpicking villages. We've tried to model a lot of things that we've been inspired by, especially at Congress and trying to recreate it. So if you want to help to spread the gospel of Congress, no pun intended and so on, everyone happy. Yeah, I'd also reiterate the sentiment that the spirit of sharing and at times collaboration has inspired us to do quite a bit of things in America and at Hope. One of those things has been infrastructure. We've been inspired and really are thankful to some of the great ideas and things that come from events like 34C3 that have enabled us to increase our bandwidth and do really exciting things with infrastructure. Right now, as far as we know, we can say we're an event that has the fastest uplink for a conference in the US and right now at the last two events we've had 10 gigabit which is pretty fast for us and we're planning and looking forward to increasing that to 100 this year. That's one of many things. We've got projects, workshops, please submit some stuff, share or just come and experience it, meet some new people. We need people from other parts of the world to share with Americans that might not be traveling, that might not be exposed to other ideas and that's definitely where people like you come in I could go on but that's really what I wanted to express to you. A lot of people are afraid to come to the United States we understand that but the way you fight injustice is to confront it just as a previous speaker said here if you are unhappy with something you don't turn your back you go right straight forward and you confront the issue and you make it better and that's the case in the United States and I think that's the case in the agriculture in general when we see a problem we tackle it we don't run away from it for our conference and for future conferences please visit us Hope.net we should be opening up speaker submissions in the next couple of weeks and take a registration as well thanks thank you so then next up is Noisebridge I think there's some personal overlap there yeah alright so let me just get up the slides alright let's go okay so we're all part of Noisebridge part of really the beginning of Noisebridge I'm one of the co-founders and this is aesthetics and Scotty and Noisebridge is one of the early hacker spaces in the United States super influenced by CCC Seabase next slide hacker space with only one rule which is be excellent to each other highly influenced by Seabase and this event that had a talk about how to start your own hacker space the hacker space design patterns so at Noisebridge there's all kinds there's a wide variety of things that go on Noisebridge has had a lot of things similar to Hope there's been a crapton going on there's been hardware hacking circuit hacking and so on and it's actually really difficult for me to say there's so many cool things that are going on there yeah so this is actually one of our first events in the space five minutes of fame which is similar to a lightning talk style event and it's something we've done throughout the history of the space actually this is one of the five minutes of fame we did that we thought it would be really cool to play a 3D video and we got 3D glasses for everyone and our friend Rubin who's also a Noisebridge member took this really cool black and white photo and also want to point out this was the current space 2169 mission this was the inaugural event and I hosted that and I'm really privileged to have been able to do so so thank you to the Noisebridge community and this event actually was in 3D yeah we've got lots of classes and workshops and all sorts of diverse things these are just a few of the things I threw together just to give some representation but as an early hacker space in the United States we've been an example for many many people all over the world inspiration to start hacker spaces and we want to continue to do that we just had our 10 year anniversary where we showed off some collaborative projects that are really big like this one which was way influenced copied by the sea base crates of Mata bottles with RGB LEDs and we call it Flosh and Toshin and this is supposed to be a video unfortunately it's not but this is showing Star Wars in very very high low res so we had a Star Wars night we want to keep a Noisebridge going for decades to come but we just experienced our 10 year anniversary and we had a big party with 4 days exhibition and ball we called it a lot of people showed off cool things and we had some surprising guests like that person in the lower right yeah but the community is the strongest it's been in many years both in terms of participants but also financially we have 8 months of operating expenses in the bank and it's been going up month over month which is really exciting but we are facing an existential crisis we our landlord has chosen not to renew our lease and that we think they haven't said this directly but we think that is because they are spooked by increased pressure from city inspectors that are caused by one vindictive person who has been using the city machinery to come after Noisebridge in terms of code enforcement and zoning enforcement and so we are we are facing 2018 with the knowledge that we need to significantly up our game and it's going to be a very transformative time for our community indeed we have to come up with ways that keep the spirit of Noisebridge live and increase our budget by 3 times so that's the challenge we are facing but we face lots of big challenges before some super big challenges and we have overcome them every time it just brings people together and we get stronger as a result somewhat similar perhaps to having to move to Hamburg from Berlin and increase from 3000 people to 12000 to 15000 here in Leipzig it brings our community together and makes us stronger I'd say that we've faced existential crises in the past as a space and it's been nothing but a benefit to us in bringing our community together and in causing our community to invest more time and energy but also this time in money so this is something that a lot of places are going to have to face as cities are getting more and more expensive with gentrification and often overpricing us out of the neighborhoods we often help to create so if you feel good about helping Noisebridge and helping us help other people come talk to us and we look forward to playing with you all in the future and if anyone wants any Noisebridge stickers alright thank you so that concludes our lightning talk session for this day and also for this congress I hope you had a great congress and had as much fun as we did with this session so please give a big hand for all the talkers and also of course all the angels involved around this event