 So we have a few lightning talks for you. We have one very exciting ending, hopefully very vociferous. They'll come along in a little bit. I'm pretty excited about lightning talks because I love seeing things that are dazzling and brilliant and over in a flash. I can't usually do the first, so I can try and do the last two and be brief. And I'll do that now and introduce our first speaker, who also is helping coordinate the lightning talks. So if Hackman wants to come on up and give us a talk about identifying phishing domains, please give him a warm round of applause as our first speaker. OK. So I'm chief system architect of SiteGround, and we host a lot of shit. So millions of hosts, and sometimes some of those hosts get compromised not because of us, but the users have malware on their computers. They don't update their websites and stuff like this. So on local machines, we cannot help, but where are the slides? So on local machines, we cannot help, but on our servers, we can actually check what's going on. And since we have a lot of sites that we are hosting, we get a lot of complaints for hosting phishing, which I don't like at all. Usually this is handled by our abuse department, but it's manual work every time. So I decided to use a little bit of AI to help these guys and actually stop them doing any phishing. So usually, we have also complaints for spam, for botnets, but those we have fixed in the past, so we don't have issues with that. Check. Wait, wait, wait, wait. When you turn it off, it disconnects here. You didn't miss anything from the slides, don't worry. The important stuff is now. So phishing is a bit problematic because you actually don't know that you are hosting this, and actually you don't know when it happened. And usually, it's not directly from the user, but from someone that is impersonating the user or upholding the application that we don't know that can uphold something. Usually, the attackers uphold the phishing page and leave it there, or create a separate host only for this page, or even sometimes order a specific domain name only for this phishing site. So for the last two, we have already deployed something on our infrastructure that we can automate this. When they're creating a host name that should enter the web server configuration, we actually put it through our AI, and it checks if this host actually looks like a phishing. Can Thao explain how? So we decided to use a little bit of AI, only a little bit. But first, before we start with AI, what we found is that a lot of domains and hosts that have Amazon, Hotmail, eBay, and stuff like this, words that are obviously not hosted on our infrastructure shouldn't be there. Unfortunately, there is a problem if you start with the words approach, because there are things like the fruit bank, eBay checkout, Amazon checkout, and stuff like this that are normal for web developers to create sub-domains and use those for their shopping carts. So these are valid things. Wow. Amazon.co.uk.something.something. Obviously, it's something that is a phishing. So we decided to start with Word2Vec. Word2Vec is representing like a sentence, creating a number from each word, and creating a vector from these words. So we can actually check if this domain is similar to something that we consider bad. Unfortunately, we are not very successful with that. It was only 60% to 76% accuracy. So we decided to switch to something else. And to improve that, we decided to look a little bit more on the phishing hosts that are created, usually stuff like Amazon, where they're always represented by zero, some misspellings here, a lot of dashes or underscores used, and verification that this host actually has web-facing interface, because a lot of the underscores are used in DNS legally. But in the web, usually you don't see something with underscores. So we switched from Word2Vec to a support vector machines. And there, we actually achieved 95% to 97% accuracy of detecting a phishing host. So what we did was we started with n-grams, two to four characters, depending on what your data set is. We actually had to tune this like a week in order to make it work. Dictionaries with bad and good words that we really want to know that they're in the domain, the host name. And other checks like how many dashes, how many underscores, how many numbers, and how long is the host name actually helped a lot to achieve this 95%, 97% accuracy. So once we had this, we actually filtered all of the hosts that we are hosting right now and found around 4,000 phishing pages on our infrastructure, and called donors of the hosting accounts to remove those things. I'm planning to use the same infrastructure for directories and files that are used for phishing. So thank you. Fantastic. Thank you very much. So we have another speaker coming up. While he's getting set up, I'm always curious to see how far people have come. Obviously, there are some people here from Holland. Yeah, raise your hands. Good. Anyone from Eastern Europe? Excellent. Fantastic. Central Europe? Africa? South America? OK. Interesting. Of course. So who reckons they've come the farthest? Yeah, where have you come from? All right. Anyone from further away than San Francisco? Pacific Islands, maybe? Yeah? What do we got? China. Fantastic. Yeah. All right, well, our next talk is about open hardware. And just go ahead, take it away. Thank you. My name is Alexander Poltrac, and I would like to briefly talk to you about open hardware reconfigurable network cameras built by hackers for hackers. So I will not read the specs, but you can see that it's a quite powerful Zinc CPU running Linux open-embedded Yocto build. And it have a lot of extensions, such as SATA, USB, sync ports, et cetera. So you can really run on port a lot of application to the camera, like OpenCV was really easily portable to the camera. And you can adapt any hardware supported by Linux and connect it to the camera directly. This is the PCB design. And since it's open hardware, on our wiki, you will find all the information about the PCB layouts, bomb, et cetera. You can also virtually disassemble our assemblies, our camera assemblies. You can see any model in these kind of 3D X3 DOM models. And virtually disassemble them. If you click on the right on the parts, it will show the part on the wiki with all the documentation. So the wiki address, the blog, you can subscribe to our blog to receive some information time to time. And on the licensing, we exclusively use free software licenses and CERN Open hardware for the hardware part. A few years ago, we started with a calibrated camera. So we do sub-pixel resolution calibration for individual sensors, but also for camera rigs containing multiple sensors, such as this one, for example. So you will find more information about the cameras on these two links. Thanks. And recently, we also started with 3D printed cases so that you can experiment different sensor arrangement and do panoramic cameras or stereo photogramming cameras or different multi-sensor camera arrangements. So why multi-sensors? The easy answer would be just because we can. We have enough power on the FPGA, on the camera to process up to even 12 sensors per motherboard. You can connect up to four sensors directly to the camera or 12 with a multiplexer board. And we can have many fancy applications of multi-sensor with calibrated cameras. So this is an example of panoramic cameras. Alpha built the Street View cameras that was used for Google Street View. And then we have built this new camera for stereo photogramming panoramas. So this camera is capable of 3D reconstruction. This is another example of 3D reconstruction with a four-lens camera doing a single shot of 3D reconstruction. And the software is currently available already in EMEG. And now we are starting to port it to the FPGA so it will run real time inside the camera itself. And this is another example of multi-sensor camera application. It's a three-lens camera, but you can also do this with the 21 lens I showed before. And it provides you a dynamic depth of field in post-processing. So you can choose the depth of field of your camera and make all the rest blurry. So we also provide cameras for developers. You can apply for sponsored cameras. You can contact me for this. During shot, I'm present at the Open Digital Radio and Z-Wave village. You can find me there and test the camera if you are interested to do so. Thank you very much. Perfect. Fantastic. Off to a great start. Outdoor living, a bit of fishing, some camera work, outdoor cameras in particular. And our next speaker is continuing with the theme of outdoor living. PC Wiz here is going to talk to us about the pirate life, which I think epitomizes outdoor living. So once you're set up, I'll stop making up this rubbish, trying to tie together this disparate muppet show of themes. Instead, we'll just enjoy the presentations. Yeah. Good? Looking good. We've got a mouse. That's outdoor living too, right? OK, cool. Pirates in practice. So here's a talk from PC Wiz about pirate life. Yeah, this isn't going to be a technical talk. I've got transitions and everything. Oh, well. I copied that from a presentation I made clearly. So that's my details. And it's changing automatically. Stop. Stop. Oh, well. It's going through the slides. So here's basically the I'm going to talk about I ran in the general election in the UK that just happened, which was fun. And I learned some things. So I'm going to share some of those. The first thing I'm going to kind of go through is the story of why I ran in the general election. And that was basically because I made a kind of joke at a pub a couple of years earlier with my friends, sitting around the table, feeling a bit sad about the Tiffany of the current government and going, you know what? If it's another general election, I'll run for the pirate party. And, lo and behold, after weeks of saying there will not be a general election, there was a general election. So I ran. So basically, the process is because the UK pirate party is quite small. It was basically to send an email to a nomination's officer a couple of days later, you're a candidate. OK. Having not really been involved with the pirate party that much before, I'd been a member for a while, but not really participating in anything. I had no idea where to go. So the first thing I did was go on to the discord server because I had been avoiding discord because I don't like it, but apparently we use it. And there was lots of friendly people there to help me do election things. So yay. And there's plenty of election paperwork to do, which is also fun and has to be done on time, but it's really not that hard. So kind of the thing I want to really pass on to people is that it's all about confidence and about just being able to force yourself to go and do something. Talking to a press is about nagging the press. They don't come to you, they're not interested, they're lazy. They don't even spell check the things you send them. So the most important thing to do is use all of the spell checking and grammar checking people you can when you're dealing with the press. That's the top tip. And the second tip is to put yourselves in situations where you can't really do anything and go for the continuum of the situation, because that way you're not going to whoosh out and go, oh, I'm not doing this, I'm just going to hide away in the corner and not cause a fuss. You just have to get on and do it. And that's basically how my campaign worked. And I guess the last thing, well, one of the things to touch on with the whole election thing is that obviously I wasn't going to win a seat in the UK Parliament. That just simply wasn't going to happen. I wasn't even going to get a large number of votes in the UK Parliament. So when you're running for a small party in the UK, you've got to measure success differently. So the way I was measuring success was by engagement and causing conversation in the local area wherever I was running. And that happened. So that's what I call success. I've got about two minutes left, so I shall import some more knowledge on you. So one other thing I learned is that pirate policies can be applied to areas that aren't just about copyright and software patents and the digital world. You have to try and find a way of applying those to everyday issues like school funding or health care provision. And the way to do that is to go and actually talk to people. So you have to turn up at school halls and things which the lead candidate didn't actually do, but oh well, so you have to turn up and talk to people. And that's basically the point and getting the exposure. And I think I've run out of stuff, so I'll hand it back over. Fantastic. Thank you. I have to admit that largely describes my life as well, turn up and talk to people. Sometimes it's good, sometimes it's bad, sometimes it's endless. This is Genesis R.E. He was here yesterday. He came to speak to us about the history of legal cannabis and running cannabis farms. Today he's going to speak to us about something else. I have no idea what it'll be. Mushrooms, you think? Oh, it could be. I don't think so. I've seen him speak about a lot of other outdoor things. He was going to speak to us about hacker yoga. I don't know how hacker yoga works. I guess that's some sort of stretching exercise where you reach out and grab shells in the morning, praying to the shell gods. But that was the previous talk. What's the new talk? Thank you very much for having me. Oh, it's coming. There you go. Two years ago, I had three lightning talks back to back. Right now, I just have five minutes. I would like to have some assistance with the slides. Can you move it to the correct screen? I'm not... OK. OK. Take your time. We won't start yet. Let's get the slides up. And today I didn't get any sleep. I was presenting at an online summit community and I was presenting for an hour. And then I had another hour, very powerful conversation. So my energy was just so high and I was so motivated. I couldn't fall asleep. Right now, I had a two-hour snap and my body is fully recharged. I treat my body as the technology. I treat my brain as technology. And I've purchased this domain, hackeryoga.com, two years ago at the Chaos Communication Camp. So these are my different yoga postures. It helps. It helps me with different backpaints and other occupational hazards. But today, the main subject of the talk is actually another project I'm making, which is called Astral Ship Genesis. And previously, it took me an hour to go through this slide. So right now, I'll just give you a very, very quick overview. This is my bio. Don't read it. I will send you the link to slides. This is me, my evolution throughout the years. I called myself a shape shifter, alchemist, wizard, magician. I'm yet to explore my true calling on this planet. I am originally from Poland. That's where my accent is coming from. In Poland, communism times, lines to get any food, nothing in the shops. Communism was not cool. I was to Burning Man. I was to Rainbow Gathering. I was to Boom Festival. I was to many intentional communities. This is my profile on Stack Overflow. I was working for a bank for a very good money. Now I am no longer employed by a bank, which is a very relief. These are my two kids. I love them so much. They are very cosmic. They know everything. This is my little yoga website that helps me with the back pain. And when you are a good-looking man and you go to a yoga class full of girls, it's just incredible. It is completely out of the world how many girls I meet through yoga. This is ridiculous. Yoga needs more men. And hacker festivals need more women. The gender is rather imbalanced. So we actually have this chapel. We have this large building. The amount of work that is put here is completely ridiculous. It is out of this planet. But we have a building in north Wales. It is when you fly, fly to Liverpool or Manchester. Because it's much, much easier. Liverpool and Manchester fly to Manchester or Liverpool. This is the Google Earth. This is the Street View. This is our building. This is our Instagram profile. We actually have the building. And we have a video, links, links, resources, blah, blah, everything. Go visit our wiki. And you know what? Now we are flying to Mars. Elon Musk is flying to Mars. In the popular culture, it is normal. We are flying to Mars. It is done. It is happening. We are also traveling through time, through gravity waves, the concept of virtual reality, consciousness. It is happening. Like, we are already approaching singularity. And Elon Musk, what is the chance we live in the base reality? Of course, we live in a simulation, one in a billion chance. So in the 10 years, Facebook, iPhone, blockchain, all these technologies are so revolutionizing the world. We have everything to live prosperous life. We do not have to work. Majority of the work is bullshit, middle management, passing papers. We do not have to work. Universal basic income is getting introduced on a global scale. And I'm just jumping, jumping, jumping. Yesterday it was an hour. I just want to go to this, you know, clue, essence. These guys are buying city for 50,000 pounds. These guys are doing a hack based on the desert. These guys are opening a new country. This country has been in a route for like 50 years. We are opening a new country. We will send an official invitation to every single country on the planet. Hey, we are recognizing you as a country. Please allow us to open official embassy at your land. And we will also send the invitation to countries like Google. Google is already more powerful than many islands on Pacific. We will recognize Google, Apple, Facebook, Microsoft as the actual countries because they have a much bigger influence than all these three islands on the Pacific. So this is happening. And I am inviting you to our project. We are building $1,000 life support capsule, food, water, oxygen, waste treatment energy, because you can look at the human body consists of cells. And planet Earth consists of humans. We treat one human as a cell of humanity. And as we will travel throughout outer space, as humanity will expand to other planets, which is already happening. The Mars, the Elon Musk, the SpaceX, it is already happening. And we believe that by solving this problem, how to sustain life, we will solve many other interesting problems. And I invite you to the party. Once you see you can't unsee, I thank you so much for staying with me. I love you so much. Thank you. Thank you. Thank you. Thank you. Too many hyperlinks. That's fantastic. Don't forget your laptop. Don't forget your laptop. This is yours? OK. All right, very well. So that's like compressing ideas and audio on the fly. I feel like I just went through 3,000 hyperlinks and too many ideas to compress into a single five minute space time continuum. But our next talk is going to be about open digital radio. Matthias has just signed up to do a lightning talk. Are there anybody else? Is there anyone else in here who would like to do lightning talks? We have a lot of space tomorrow. We probably have 18 slots for lightning talks. So sign up for a lightning talk. Bring your friends. I see some of my friends in the back of the room. They don't want to be associated with me, which is why they sit all the way at the back with my agent. And I know that they promised to come and speak tomorrow too. So you better be signing up. All right. Anybody do the public speaking technology, public speaking workshop the other day? Yes. And have you done a lightning talk? What is your excuse for that? Please join us. We need more lightning talks tomorrow. So I'm going to leave Matthias with the stage to do open digital radio. Thank you very much. After this presentation talking about all these things we'll have in the far future, I'm going to talk to you about a radio broadcasting standard from the early 90s. And more concretely, more concrete, the Open Digital Radio Association maintains and develops a piece of software that can be used to set up a fully open source digital audio broadcasting transmission chain. So in a few words, digital audio broadcasting is a European standard, as said from the early 90s. That is to radio what DVBT is to television. So it's the step from analog modulation, analog transmission of radio broadcasts to a digital transmission of this content. This has benefits in terms of audio quality, in terms of a number of programs you can transmit in a given region and has all sorts of advantages because it's a digital medium. So our tools that allow everybody to generate these signals are comprised of an audio encoder so that you can prepare the content, you can encode the content properly. There's a multiplexer that can gather many different sources together. And there is a piece called the modulator that can create the signal that you really have to transmit then over an antenna to reach your audience. And we're using generic devices, these devices from a company called Etus, but it also works with your badge from the last CCC camp or equivalently with the Hacker F and other software-defined radio devices like these. So the tools themselves, they're not a full solution. It's not just something you can buy. It's not a box you buy and then you set up somewhere on your transmission site and it works. But it's a set of tools you can assemble. It's flexible. It's interconnected using IP so you can create your own system. And all of this is on our website, omdigitalradio.org, and also all the sources are on GitHub and it's GPL licensed. In addition to these tools necessary for the broadcast themselves, we also have additional things around. There's a lot of effort also active in the reception part because, of course, you need to be able to receive this DAB signal. And you can use the RTL-SDR sticks, these very cheap SDR dongles, or other SDR devices to receive your signal and listen to radio. This thing is in use in several countries in 24-7 broadcasts in Europe, among them Switzerland, the United Kingdom. There's somebody in Denmark who operates a transmitter using these tools. And there's also somebody in Germany that I've learned this very recently, the first test transmission that has started. What are we doing more or less currently? So I mean, what are we doing at the camp? We have a small village. We have an ongoing project. The goal is to make power amplifiers more energy efficient, or the goal is to use more of the potential of a given power amplifier and make it more efficient in terms of electricity usage. So here you see a small setup. The most important thing in the picture is, of course, the Mate bottle. We are looking for codec experts who could help us improve the audio quality of the encoder. So if anybody is or wants to become an expert in audio coding, you're welcome to get in touch with us. And there's also activity regarding monitoring tools and all the things you need if you operate these tools in a production broadcast. So to conclude, we have a village. I hope you can see the arrow. So we're in the northwest of the Lamar field. It's just over there near the large tower. We're sharing our tent with the Z-Wave crowd, the Z-Wave crowd. And to conclude, many thanks to everybody who's involved in this camp, organizing it and helping out. Many thanks. Microphone. There we go. All right. Thank you very much. So Peter is our next speaker. He just rocked up earlier. I'm getting the impression that he may or may not have slides or diagrams, but he looks like a professional. Thank you so much. There you go. Enjoy. So my name is Peter Van Eyck, and I would like to talk to you about the cloud security. So who has never heard about the cloud? You're a cheat, right? So I assume that you are not a stalker. This presentation is for people who are in some way shape or form involved into deploying online services. So who's deploying online services? Here, Ferramanth, who is using online services. That's the rest of you, right? And there's still a few people in the black box. And if you are really involved in securing online services, Ferramanth. So I'm going to give you a couple of resources to help you out on that. To start with, I think that it's my personal opinion that cloud is not so much a technology, although it's technology-driven. It's basically a new way of delivering IT. It's a supply chain of IT thinking. And I have a larger YouTube movie on that that explains it in a bit more detail. All those links will be on the Wiki that comes with the lightning talk. So I'll write that up after I've finished. So that's the first thing to understand. And it is unavoidable, in a way. And if you want to talk about how unavoidable it is, meet me at the bar later. Right now, I want to give you some resources that are, let's say, really helpful in your work potentially. Who's ever heard of the Cloud Security Alliance? A few people in the back. Great. So I'm pretty much involved in the Cloud Security Alliance. I'm actually a board member of the Dutch chapter. And the Cloud Security Alliance is doing a lot of great work. So this is like a nonprofit organization supported by basically all large, relevant companies, 100,000 individual members doing so much in events across the world, but most importantly, producing a lot of free content, freely accessible content. And the flagship piece of content just got updated. And that's the security guidance for cloud computing. That is just in its fourth edition. It was released one or two weeks ago. That's a body of knowledge that explains how to secure cloud computing. It has a lot of technical stuff, but it also has a lot of governance stuff. Now, you may or may not like that, but that's just a new reality. And this is one way of catching up on that. That body of knowledge is actually testable with an individual certification. Pull this closure. I do a course on that. But you can study for that yourself. Based on that same body of knowledge, there is also something that's called the Cloud Controls Metrics. So if you're involved in securing cloud services, that's a really helpful tool. Beyond that, if you're actually delivering an online service, you may want to look into the STAR certification scheme. That is for a Security Trust Assurance Registry, which is also a product of the Cloud Security Alliance. And it's also freely available, no big bucks involved. Then what else was there in terms of important resources that I wanted to give you? So beyond that, there are like another 160 research products ranging from big data security, IoT security, crypto, quantum safe crypto, and a ton more that I want to go into right now. My call to action to you is, have a look at that material. It's really worthwhile doing that. You may want to consider going to an event. Or we do some events in the Netherlands. I think in the UK's event. Germany, not so sure. The US a lot. I also run a cloud and container security meetup in the Netherlands. So you may want to be visiting that as well. And basically, that's my message. There's this stuff that you can use. Come to the events. And if you want to talk there, that's even more fun. Come over. I'll actually coach you into giving a good presentation if you want to. So with that said, I have one minute left. But I'll hand it back to you to think it is over. Thank you so much. Thank you. Did you see that? He stood right at the front of the stage. Very professional. Very projecting. That was pretty awesome. We have another speaker who hopefully will come up to the stage. She's just turned up. So it might be a bit of a surprise that she was coming up right at this moment. She's going to speak to us about fashion technology. And I think that's pretty cool. I bought a jacket a few years ago from a company called Beta Brand. And it basically is called a flash bomber hoodie. And if someone takes a picture of you at nighttime and the hood is up, it reflects the flash camera with tiny beads of glass. And therefore, your face is blacked out. So people can't take pictures of you. I think fashion technology is super cool. And I'm glad that you're going to speak to us about it. Hi, everyone. So my name is Anina. And I have a startup company called 360 Fashion Network. And I've been doing fashion technology for the last 10 years. And as technology has evolved, I have always taken it and applied it to the fashion industry. Fashion is often separated from the technology side because they are more hands on and also because of the technical nature. They often don't understand what's actually possible. On the engineering side, most engineers could care less really about elegance and style when they're coding and soldering and putting together a prototype. But I think we really need to merge these two worlds together. And I'll tell you why. Yesterday, a gentleman gave a speech where I asked him as far as tracking cameras if there were any technologies available that would enable me to scramble the cameras that I could embed in my clothing, for example. And he said, yeah, there's some high powered infrared lights that I've seen that confuse the camera. But that's not a long term solution, he said, because only a few people would actually be able to wear those. And he said, legislation is really the long term solution. And I said, yeah, but by the time legislation goes around, we're all tracked because the cameras are everywhere. But fashion, on the other hand, is actually a very fast way to react to technology. And I'll tell you why. Because when something is in fashion, it's in everything. When polka dots are in, they're in your curtains, they're in your shoes, they're in your clothes, they're in your laptop case, they're in your bag, they're in your car, they're in everything. The way the fashion industry works down is that as a trend emerges, it goes throughout the entire lifestyle of the human being. So in effect, I do believe that if there was a cap with high powered infrared LEDs on it and it was communicated properly to people, then all of a sudden, boom, very quickly, you could roll out clothing with those LEDs inside and people would understand them and they would purchase them. And in a matter of a week or two, everyone could have this clothing, which would confuse the cameras. And another thing is that in the engineering environment, when I'm working together with large-scale companies, they come to me and they're like, we need to do something for women or we need to do something with fashion and we don't know what to do. And a lot of times that's because, I don't know, engineers think we're all naked, but I don't see nobody with all their parts hanging out in this room. So they often forget that clothing, textiles, and accessories that what we are wearing are actually part of the IoT environment. I built 162 gloves that were all controlled using the gestures of the dancers, which controlled the entire lighting of the performance and it was on CCTV. And the director, Jiang Gang, he absolutely refused to let me use any high-tech solutions. He wanted a button. So I put a button on there. But you know what happens? The humans, they go, ooh, a button, I wanna touch it. And then backstage, two minutes before your performance, you've got 50 girls running up to you going, my glove doesn't work, right? So disaster scenario, and you're like, did you push the button? And they're like, oh yeah, I did, you know? So instead, what I did is I soldered off all the fucking buttons and I was like, fuck that, that didn't work. And I used gesture recognition. Because in the performance, I watched that every time they wanted the lighting to go off, synchronized, they all made this one gesture. So that's a situation where a high-tech solution actually could solve, elegantly, a solution for the performance. And so I think that we really need to start thinking more of the lifestyle. So me and my company, I'm like, often trying to bridge this divide between the two sides, excuse me, two sides, because they don't even speak the same language. So you have to work with the clothing people on the garment construction side and be like, I need channels coming out here, I need a zipper here, I need to remove an inner layer here, because if that's all not working, I need access to it for the engineers to fix it. On the engineering side, you have to think about the size and the flexibility. So all in all, I'd like to say that I think these two worlds need to come together, and I'm seeing that over at our tent at the hacking space, if you wanna come at 11, I've got engineers showing up and pimping up their style, and also lots of women. Thank you. Fantastic. Excellent. I like that idea. I have to admit, I think hackers could be the cutting edge of fashion, the bleeding edge of fashion, right? Geek, chic, baby. I'd like to see more of that. So I was told earlier that I shouldn't stand in between the camera and the pole, otherwise it sort of looks like I'm pole dancing, and nobody wants to see that, right? Wow, saucy crowd, saucy crowd. But I don't wanna get in the way of the next presentation, which is deeply, deeply exciting. We try and save some really amazing things for the end. So we've got a bunch of people that I think are ready to come up here and maybe do a sound check before they do our final talk for the day. Come on up. Yeah, so you thought you'd seen it all, but now it really begins. And while they get set up, I'll keep things going a little bit. Can we have a round of applause for all the angels who've been helping out with the sound, helping out with the event? Yeah, cool. Does anybody here know what this is gonna be? Are you ready? Do you know what's coming? Do you know what this is? Can you guess? It's a choir. Yeah, I'm excited about this. Should I say something? It's up to you, yeah, are you all set? All right. Just a moment, microphone's coming on. All right, we just thanked them. They were busy bowing, so they didn't notice for a minute. Hello, okay, so this all started with that at the last KERS Communication Congress, I noticed that people always met at the table of the Free Software Foundation Europe to sing the Free Software Song, and I thought I'll make a choir arrangement, and so now you can hear the choir. Are you getting it? Let's now and share what others can get. Fantastic. It's always worth staying till the end. I'm really pleased that... Benjamin. Benjamin. Yes. Yes, okay. Thanks. Thanks again to the choir for coming up to sing that song. It was filled with a little bit of mild peril there at the end, reaching down into the toes. I think that was a reference to something. Anyways, I'm gonna wrap it up now. I'm gonna repeat a few things. Once again, thanks to the angels and the sound people. Give them another round of applause for the entire conference. And I'm certainly pleased as well that when the lightning talks started, there were less of you in the room and more came in. I'd like to pretend that's just me. I know it's not. I think it's all the fantastic speakers that we just had. So thanks for listening to all of them, and make sure you go and get your t-shirts from the online website or go and visit the shop because we're running out of them, but they will ship to Benelux in Germany and enjoy the rest of the conference. We need more lightning talk speakers tomorrow, so sign up and come back and see us tomorrow. Thank you.