 Good morning, everyone. Oops, that came suddenly, so Who is here just before the just because they were tired of queuing up for material is incorrect. Oh It's so that's in the order of 10 at least. Yeah, nice Okay, so let's see what we have here today. We have the lightning talk session on day 3 Could you please start my slides? So what we are gonna Do is we'll have 20 talks each five minutes very fast-paced session where everybody can pitch their own projects and What I would like to explain to all the talkers today To make things run smoothly, please sit in one of the front rows once your talk comes up please quickly enter the stage and Yeah Go before the microphone. Please stay close to the microphone because otherwise we can't hear you and don't turn around Because then we can't hear you As well. So you can see your slides down on the monitor. I can see my slides right now. I don't know what's wrong But we'll work it out somehow it's early in the morning, so bear with us here Okay, you can see your slides all you have to do is stay calm deliver your talk You can advance the slides using this clicker which remains here on the lectern. So just pick it up deliver your talk drop it again and then get applause and Well, I used to have a profit joke. Yeah, but that doesn't really work without slides. So What else is to say For all the audience for people in the audience. Ah, there they are finally Now I know what to say. So I had this this yeah, yeah, yeah Profit yeah, so how to listen to lightning talks for all of you in the audience Simply be excellent to each other and watch the timekeeper which is this nifty device here Alex will briefly explain what this is all about Yeah, I think you already know it. You have seen a lot of lightning talks it just means if it's green you are in the first four minutes of your talk and In the last minute of your talk in the last someone mentioned I said 30 Yesterday, but okay in the last 60 seconds It will start to turn yellow like this so now you still can relax you have now about 45 seconds left and If it goes down to 30 seconds it becomes red and Rather and more and more and more red and in the last five seconds. It begins to flash and now it's your part five four three two one Better than yesterday. Thank you Okay, let's try it again. Okay, oh Were you satisfied? Do you want to try it again? I don't think we have time for that, so let's Let's just continue. All right, so It always works better In real life There are translations available. So English talks will be translated into German and French German talks will be translated into English Please see the wiki with the translations topic and Also see streaming dot c3 lingo dot org for information on how to listen to the Translated streams or simply watch the translated stream video All right, let's begin. Let's do that. Let's start with the first talk If someone reads water is behind the curtain. Thanks So let's start with open age. Yes. Hello. We are the development team of open age Which is a free re-implementation of age of empires that probably many of you know We require the original assets and do this mainly because of unlimited possibilities and writing awesome mods for that thing We base that on mainly C++ and Python 3 For the user interface we chose Qt This year we have three main advancements, which is a web interface for our continuous integration system the Neon configuration framework was my master's thesis and we have an event-based game engine Concept for the simulation calculation Okay, so let's start with the continuous integration system Last year we held a whole talk about it this year just a quick update We have now actually included a web interface It looks about like this On the right you can see the output The real-time terminal output and on the left you can see the individual build steps with status and so on Neon is our configuration system for the game behavior, which is a plain text format a bit like YAML or JSON Which contains key value pairs that can update values through inheritance and where Modifications are done through patches and this is optimized for mod creation because patches can also patch patches in so that means you can modify everything in the game with a single system so in this case The generic unit is specialized to be a villager and The super villager is an even more specialized villager so that when you evaluate the health points It's 35 for the super villager The modifications are done through patches in this example when you discover the loom technology The villagers are stronger and then have 35 HP But Neon can do much more because it allows patch transaction and history and has many more data types and allows mod combinations for overlays the new Game engine concept is tickless and event driven it will only recalculate events or the future if necessary, it will store the whole history and future of the game and The rendering is actually only doing a snapshot of the engine and then drawing it to the screen There are different types of interpolations. You can have a continuous line You can have discrete steps for arbitrary types. You have maps and Cues that can be accessed over time Then for example the unit description in C++ is you have a discrete curve of hit points and a continuous curve of a position then you insert a value at a specific time into this Curve and in the end you can access it at any value in between and for example You can predict that the arrow will hit the villager in roughly five seconds Then the hit points will go down to zero so the villager is that and stops building the building he's working on and that's an event that's going to be triggered and Issues a recalculation of this Event like that the building finished event will be predicted into the future in the if the snow villager working on it anymore, it will be dropped and for example an event will be the building construction finished the building is getting damaged or a unit starts together and all the interaction in the game is described using these events and Gets registered on to the buildings and on to the internal structures of the game like the building 42 triggers the event Its construction has finished at a certain time when it's finished So our next steps for the projects are the integration of those two systems to implement actual gameplay features that most of you Have been missing for a few years now And We also need a cool pathfinder based on flow fields And we also need a new renderer because the current one is really crappy, but we have a great guy already starting to work on that So thank you for listening you can meet us at this lucerne assembly And we hope to talk to some of our community contributors that we have a lot of them. Thank you for your attention Thank you Next up is Atari and Commodore fuck ups I've got a problem that I've gone to have a seven minute talks which I have to squeeze into five minutes So I have to take a few shortcuts over there. My motivation is purely just to entertain you Back in the 70s the TV was the only hardware that was Capable of displaying something so if you had something like a game console you needed to have Modulator that modulates the video signal to the antenna signal because there was no video in connector electric then At the time the Atari 2600 was created only five companies built such a device No, lambush knee a set of Atari made an exclusive contract with each one of those So he was the only one who could get such a device back when the Atari was told so to want a communication There was then one guy in bookkeeping and I said what do we need five suppliers for one is enough fail The video game crap of a crash of 1982 these two games are claimed to be responsible for it because they were so bad I say these are responsible as well because they were so good These games were programmed by the first third-party game development company and Activision which was created by built by for guys from Atari who did the best games and Ask for it a different deal for the payment compared to what you use musicians had to gather From their record companies, but they were declined very rudely After that Activision was founded and there was a lawsuit against the party game development Atari lost So new companies spread and like mushrooms and build games that were all awfully bad So you could think of it summarize the the crash like this one You sent your dad out to get a good game and he comes back with two cheap ones fail After the crash there was a Japanese company that approached Atari. They had done Video game system released back in Japan that went very well And they wanted to release it in the United States and the Atari brand But Atari declined saying something like we could do better on our own So that the Japanese decided to sell the console themselves that console big fail Let's switch to Commodore the 264 series was originally developed as a successor to the big 20 and Marketing needed a successor to the C64. So they took the only thing they had and you don't Sell a successor as an amp here set an inferior system as a successor If this is what this fail looks like did they learn from it? No, they repeated the same mistake using the Amiga 600 This was originally developed as a low-end addition to the lineup It's just basically a stripped-down version of the Amiga 500 and what this makes this really bad is that the true successor to the Amiga 500 the Amiga 1200 was released only half a year later So this is what how to await piss off your community And now let's get up to the most fun part Commodore has developed the machine for business case use You can think of it as one of the first laptops For business use because you had a modem built in back in the mid 80s this is what the machine looks like and This is what officially happened and I'm gonna tell you the unofficial story. The unofficial story is that the The CEO responsible for the project Got his the first prototype presented on the golf course Together with the CEO of Tandy and the guy from Tandy just said we did some market research There's no such thing as a market for this kind of a machine. There's no way to sell this one so Half a year later Tandy saw that machine looks pretty much at the same target audience So another fail as well So my conclusion is Atari and Commodore were killed by guys in suits who think that they know business But don't know a shit about deciding this designing hardware and or software Of course, this is much just my opinion and my apologies to the translators for speaking so fast. Thank you Thank you Now you still have some time left over Never mind. We will just continue with the next talk which is attribution generator License notices for pictures from Wikimedia Commons and Wikipedia Hello, so There's actually a treasure trove of Images on the internet that you can use so when you write a blog post or when you want to publish something There's probably some pretty picture that you can freely reuse and it is available on Wikimedia Commons and on Wikipedia but It's actually not that easy to Properly reuse that and I saw that in the talk that was just before that Sometimes you see stuff like source internet or this is a free image. I took it from Wikipedia The Creative Commons license explicitly specify that you have to name the Creator of the image and that you have to name the version and the name of the License and then you are golden then you can take from this in This this great treasure trove of images to picture everything so to make things easier for people who are not Legal persons We built a tool and we want to simplify the reuse of images from from Wikipedia and from Wikimedia Commons and Give correct license and attribution because in this world where you give away Stuff for free There's actually a digital currency and it's not Bitcoin. It is respect and we wanted to make it easy to give the correct amount respect to these Creators who give away stuff for free. We have an English version and a German version that really released that last year and Quite a few people use this very simple web-based tool to create a correct Attribution line for images that they find online It works pretty easy. You have a URL attribution minus generator dot org There's a typo in here or you can use the amazing German word license Hinweis Generator and You just paste in the URL of the Wikipedia page where you found the image or you paste in the URL of the Wikimedia Commons page where you found the image and then you go through a few Questions and it asks you will do you want to use it online or do you want to print it in a book or? Do you want to use it together with other works or do you want to crop and modify the image and then after that? You will get a an attribution line in html for copy and pasting What have you it makes things very easy for those of us who don't speak legalese just use these Just use this tool. It is a lifesaver and It will keep you out of all the nasty things like cease and desist letters Upmanung and it Makes the world a better place because you will give Credit where credit is due We would Like you to get involved We Think it is a very simple tool with a very simple use case But maybe we can improve it if you have ideas how to improve it. Just tell us Best thing would be to write me an email And also if you speak an interesting language that is not German English Spanish or Portuguese Contact us and we would like to Translate the interface into your interesting language. That's it. That's all I have. Thank you Thank you Next up is database data layouts Okay, hi, I'm Stefan and I'm a database researcher and I like to say that Designing databases is as hard or as exciting as constructing rockets But I don't know how to construct rockets except for Lego rockets But let me introduce you to database design and there's there are many design decisions And I want to talk about a small design decision and that is a data layout Which means how you map your data to the memory and especially this talk is about data layouts for relational databases and here's an example of a table which you store on relational databases and It consists of tuples so you have different rows and all these tuples have attributes For example first-time last-time and can't be for persons and as you can see here Table data is two-dimensional. So you have rows and attributes and the issue is that a memory and computers is usually Linear so one-dimensional and then you have to decide how to map two-dimensional data to one-dimensional address space And basically you have two design decisions So this is simplified and what you can do is you can store your data in a row store Which means you store data of a single tuple together Which is shown on the left side and the other possibility is that you choose a Kalemner store where you store all the data of Single attribute together and then you may ask how to reconstruct tuples But this is quite easy for example to get the third last name You have to know the starting point of the vector for last names and then you jump to offset 3 and find winter as a third last name and then you might ask why does it matter and the answer is It's not important how much data you access or it is important But what is also important is the access pattern So if you do a sequential scan in memory, it's way faster than random accesses and To show you this I will present you to micro benchmarks So one is an insert so we want to add data to our database and the other is a filter operation So think about an SQL statements where you do a select filter from our person's table and filter by first name The interesting question is why it's important to do micro benchmarks so I think about design decision and maybe you have a good idea and it turns out to Do experiments and show that idea is good is way harder than the idea itself And then when you have the experiments, it's way harder to productorize it and makes this experiment robust and So how does it look like for insert so for a raw store? We can copy all our data in one place on for the column store We have to append the data to the different attribute vectors So jump to different address locations and as a result so here a simplified measurement and we can see that throughput of memory is way higher for all stores and for column store Especially when you have a large number of columns So the small effect that a column stores better here up in the road store for small number of columns The reason for this is that we use mem copy and mem copy has a small overhead when copying small data chunks, so then it's better to Do in a variable assignment But for large data copies it turns out it's quite good So this was a row operation so on the end Row database is better and now look at the other way around so operation where we have access pattern with Benefits or access Attributes and you can see this here and this time for row store. We have to jump in memory So if you want to access all first names for the row store We have to access the first couple then jump to the next couple and there we have as these memory jumps and for the column store we can basically just do and scan and We did again a benchmark with different selectivities and this time it turns out that really the column store has a higher memory Benfils and You can see again that also the number of columns Has an important role and you can all explain these with how caches and cache hierarchies Work in modern CPUs and basically What I want to show here is and this is just comparing your data and normally in the database you have to store Intermediate results and then you don't or just No, not only do the comparison, but also have to write The position list so the intermediate result and then it turns out to be a bit different Okay, thanks. I hope you're excited and want to develop your database by your own. So have fun with it Thank you next up is Remarkable fine remarkable. Yes, remarkable Hey, hi, I'm Axel and I decoded a binary format So I'm talking today about the remarkable tablet as you see by my beautiful drawing on it That's a tablet with ink display where you can draw on and without advertising it I was actually looking for the parts they're interesting which are just of their parts because that's the part I understand so the thing is the remarkable runs on our arm in Linux We have full root access to it and that makes it very interesting to tamper with it and to explore it Shortest came out blah blah you can see in the screen And what does it do if you draw on a tablet? It basically records your complete thoughts and that's something that you might want to control So the thing is you can export the data that you have on it And you can import data there for example by PDF and PNG But internally it's stored in a binary format and we really want to understand that because that's what we control So unfortunately, that's not well implemented yet and will maybe update it But anyway, we want to know what's going on there Also, you want to have more features when you're drawing something So for example, you want to have text recognition, you want to see the animations while you draw it You want to have more brushes whatever So that's a short motivation for that to understand how something stores it So white dog X for example is crap But actually it's just fun to see what a binary format looks like and I never did this before So the idea was just decoded so in the remarkable there's some file for each notebook So this is a page to write on it and it's called lines file And when you just open an empty file it looks like this So there's not much in there. It's just a header and then some zeros That's cool, but now we want to understand how drawings get added into these files So what I did is I took a pen and took this more into the smallest dot that I can do on the device It really looks like one pixel and when I did this the fight changed to this So we see already there's a block of data something in the hex editor that comes in there And there seems to be a number one which could be the number of times I hit the surface So what can you do next make it a little bit more complex? So just try to add one more dot to a page If we do that again, we see there's an other block coming in there and the one changed to two So what did we find out already? There's a fixed header cool There seems to be a counter often I touch the surface cool and and that's very important if you want to continue decoding it there seems to be no compression involved because otherwise the first part would have changed if I put in the second thought So now let's do this a little bit more systematic, but I did wrote I wrote a couple of lines of C++ code and build up a little metrics For what I did is I seek to a certain position in the file and when I open this I did this this tables here and every column is a different interpretation of the next byte or the next bytes And I added offsets to the line So just in case I don't know what something is I just seeked on and on and on How does this look in reality? So let's go to after the header and have a look in the file So we can see interpretations of what could be the next data type for seems reasonable, right? The flow doesn't make sense that means the next three bytes are crap makes sense because there's only crap in there Next one could be a one. Okay, the other ones are zeros make sense and go on and on and on The last one could be interesting. So even the ins are not reasonable here But the float looks interesting could be a pixel position Because it's inside the resolution of the device if you continue like that What you will get or something like this? So I learned in in in in in in float in Cool So if you do this for for one point then we can start from the inner to the outer and try to understand what we got there so Just group this a little bit. I know that the device has pages inside this pages It has layers because it's visible in the GUI inside the layers You can have lines and lines are grouped to dots because I can draw lines, right? So when I just start then to to modify the dots that I put on device You can just systematically explore and what you find out then is that actually these three floats are coordinates the pressure changes if I put more or less the pressure on that we have a Rotation of the pen and all of that is then grouped again into a line a line only has one brush and Putting this on and on and then adding new pages You just see what changes in the file and with that you can meeting get meaning from the pure data types to what's actually in there Of course the next point has to be to Document all the magic numbers and the number radars in there So I did that and this interesting aspect that's also in there is actually the ranges of the data You can get in there. So for example the device records the Angle that you have to the normal of the surface and in both directions, which is interesting because it doesn't support brushes Which are not symmetric actually a point symmetry, but it could so that's interesting. That's what we learn So obviously last step is implementing your renderer gets the original and I just played with colors And all of this is now open source and you can find it on lines are beautiful and get up. Thanks Thank you Next up is weapons patents. Hello. My name is Felix. I'm working in intellectual property department and Privately I came across a subject of weapons patents I found out that there's very few poor awareness of the risks of weapons patents and so I want to To show to highlight some risks associated with weapons patents. I I will relate weapons patents to crime. This is what constitutes one risk associated with weapon patents And so let's go I found some correlations First I want to correlate the time when weapons patents Got even more dangerous in the end of the last century Then they went online beforehand they were paperwork difficult to access or behind paywalls but in October 1998 the European Patent Office decided to Publish them online without any restriction the American Patent Office followed six months later in April 1999 if you correlate this with a German terrorist organization organization red army faction which caused much Trouble and who killed many people in the last century you found that this organization could not Take profit from weapons patents because it was too late But if you talk about Okada, you will find that this organization Came to public awareness in 1993 with the first attack on the war trade center at that time there was no possible means to access knowledge about weapons patents by the means of the internet but More than two years after all these patents range online They did a second attempt which was Successful as we know this is only correlation no Proof of whatsoever Here I show one example of weapons patents Particularly of this patent first of all it's published by the US Army It is told That this is it's recombined Recommanded for our unconventional warfare activities with means which means guerrilla fight and terrorism and If you have a look on this document, it's a quite descriptive It gives a clear indication of how to build such a weapon which material which quantities and all this I would have liked I Hope would have liked to find any Evidence that the crimes of The destruction of the World Trade Center is related to weapons patents. I didn't find anything like this There's no evidence But what I find what I found when I studied the official paperwork is That The NIS the National Institute for Standard and Technology which Investigated in these crimes They did not even Think about the possibility That terrorists that suicide attackers didn't attack from the inside This is what I Marked in the red is that they assumed the professional people went into the buildings may have gone into the buildings planted some explosives left the building and Went away before the final attacks took place The possibility of suicide attack us inside the building the walls and not taken into account My conclusion I think it's a good idea to Change the official story telling which tells Terrorism is a very very big comfort to mankind and we should sacrifice our Sacrifice our yes, thanks a lot. Thank you Thank you Next up the proposal heating method for coffee Hi, and welcome to a not so serious talk about novel coffee heating method Which is an application for Incy incy to use of resources office with Yeah, responsible use of modern manufacturing technologies. So why do we want to eat coffee? Well, I'm I work in science. I code a lot and I tend to forget about my coffee coffee usually tends to get cold with time and Yeah, as probably everyone knows cold coffee isn't very good coffee so we need a solution which utilizes the resources we have at the office and And yeah, that's first for that. We need some sources of thermal energy Well first I looked into Humans because well, there are a lot of humans at the office They produce as you can see in the chart around 100 watts at room temperature when seated, but that's yeah That's energy that is at 36 degrees Celsius. It's Really hard to harvest because you don't want to put on a bodysuit or whatever to harvest the energy. So Another one would be Electricity but a come on that's that's cheating because electricity is everywhere and I would need another an additional device so That the night before I saw Star Wars and then I remembered one quote I think it was like this the target area is only said seven centimeters wide It's small thermal exhaust port right below the keyboard The chef leads directly to the main processor Hey, my computer has the two Okay, now we found a source for thermal energy and how do we harvest that? Yeah, as you can see in the picture That's an double-shelled mark, which is hot which is hollow on the inside and hot air gets blown from below around the coffee and went it on the on the other side and Now we need to get need to build this. So as I said, I work in research We work with metal 3d printing. So I got it printed in aluminum Yeah Yeah, it's yeah, you need to do some reworks on that. So mark on the mill is also was a first for me And now the very important part. We need to verify this solution. Okay I set up an Arduino with three temperature sensors which measures the temperature of my mark of of Reference mark and the ambient temperature this data is sent to a computer in in terms of one seconds because thermal processes are really slow and That should be sufficient a script visualizes that in Real-time and also stores the data in an HDF 5 container because yeah scientific data and I can process it further afterwards Yeah, as I said, I need I needed a similar shaped conventional mark for that for reference And then filled both mark both marks with the exact same amount of coffee using highly scientific methods and For because we need this to be realistic. We also added milk 24 million milliliters of this to be precise highly scientific methods look like that and The milk was added. Yeah, just with a syringe and Then I wired it up set it up at the computer and started the testing so to generate sufficient thermal energy I ramp up some some simulations and Got some results before I show you the charts I know now that coffee with 60 degrees Celsius is too hot for me. Definitely you you burn your tongue Between 50 and 60 degrees Celsius is super nice warm coffee. I like that one Down to 40 is still acceptable because yeah, it's still drinkable, but 30 feet three degrees Celsius. Definitely too cold Yeah, and also drinking coffee with a wire stuck in the mug is really really weird because it's everywhere and in your way And you don't want to that and it's special especially weird if that mug is made from warm aluminum Yeah, so that is the chart you can see the right red line is my heated mark with which performed Yeah, as expected it only sank turn Higher temperature than room temperature, but that wasn't enough because you can see the regular mug which is in green that That after 40 minutes The coffee in the regular mug started to get colder than in my heated mark That's not really good. So my conclusion to that the proposed device did perform Did not really show the expected performance Because aluminum outer shell access and heatsink transferring the heat from the coffee to the outside So I need a new device with less thermal conductivity and while maintaining in a shell Thank you Next up is interledger Hello, my name is Evan Schwartz, and I'm going to be talking to you about an open payment protocol called interledger So today payments are broken This is roughly what the payment space looks like it's super fragmented and there's tons of small Regional networks that are all separate from one another each of these works well within themselves like so for it in Germany I deal in the Netherlands Venmo in the US Each one of them works well, but it's impossible to pay from one to the other as a result You have just a few really major global brands that basically dominate global payments If you look at visa slogan everywhere you want to be they're not saying we're the best or the cheapest We're the fastest they're saying we're the biggest today payments is all about network effects and reach as a result No one can really compete If I started a new payment network today and said oh come use my network your first question would be who can I pay with it? It's all about network effects The real fundamental problem is that all of the payment networks are disconnected Whether they're banks blockchains mobile money networks, etc. All of them are disconnected and In many ways this resembles what information networks looked like before the internet So what we need is internet working for payment networks We need a system that makes it so you can pay from any network to any other network So then it wouldn't matter if you and I are on the same payment network This is what interledger is interledger is a protocol for relaying packets of money across many different payment networks Just like the internet protocol does Into interledger provides three main things which I'm just going to go through very briefly here If you're interested in more details come to the session later. So first there's a ledger agnostic address So this is a way to say where you would like to be paid no matter what payment network you're on The second is an IP inspired packet format That's super super simple and just communicates to the intermediaries how basically the details of the payment The third thing is multi-hop Security because dropped packets when you're talking about money are a little bit more serious than dropped packets when you're talking about IP packets As I said more details if you come to the session later some key facts about the interledger project It's an open open project We work on it mostly under the ages of a w3c community group and there's 275 members that have a lot of different backgrounds ranging from banks central banks payment companies blockchain companies etc because Interledger is meant to be a super generic payment method that can be used for lots of different applications So to talk a little bit about implications of this This is a graph of what internet working did for data basically costs plummet and volume explodes Because as you add internet working you add interoperability It makes it possible. It makes it not matter which network you're on increases competition and the costs come down as The costs come down they get so low that you can suddenly start sending information For much for many more use cases than were possible before imagine doing some of the things we do over the internet over Traditional mail just impossible So this is basically what we expect to happen with payments with interoperability So to leave you with three kind of pieces of food for thought I'll pose three questions to you first What could you build with free and instant global payments? Imagine that you could pay or get paid by anyone in the world in any currency in any amount small or big That's question number one Number two a lot of people have talked about the problem with the internet's business model today Today, it's all based on advertising There's only a few companies like Spotify and such that can actually convince people to take out their credit card enter Those details for security reasons user experience, etc Imagine if your browser could just pay for the services that you use in tiny little amounts And you could just control it with kind of a dashboard with sliders. That's the kind of thing that this could enable Third as I mentioned briefly Intelligent is high is heavily inspired by the internet itself And there's an interesting interesting issues that come up around what what lessons should we draw from the internet? What should we copy and what mistakes should we avoid very interested to hear people's perspectives on that? so Session today at 6 30 p.m. In seminar room 14 15 if you're interested You can also find us online interledger.org and on Twitter. Thanks Thank you Next up both con Hi all good morning So I want to present it our small conference that we are organizing in Serbia in Novi side and by the way, I'm LNM So what is Balkan? Balkan is meant to be a small hacker conference in southeast of Europe To build we try to build their community because a lot of people and students from that part of the region Doesn't have so much money to travel there on such a conference as a CCC or some other places So we started to organize first Balkan 2014 and next year will be our six conference So I want you all to invite to join us for the next Balkan the dates dates for the next Balkan is 14 15 16 September. It's in Novi side in Serbia. So it's let's say one hour drive from Belgrade and You hear you have here all the important deadlines, but why no is that and why Serbia? Because we are from no is that We decided to make a conference there, but we are not living in Serbia anymore, but we wanted to Give community there some feeling of the com hacker conferences from the Europe So you can see the pictures from no is that What can we promise to you? We can promise to you very good food cheap very good drinks a lot of parties and Lot of fun We also have a great speakers that are coming every year I don't want to tell now the names but on our website You can see all the lists of the speakers that are was last five years with us and they are coming back because it's It's not a big conference last year. We have around 450 people. It's familiar feeling there. You have a Opportunity to speak with everybody. So I think that's important and I want to all invite you to help us to build the community in Serbia Because there is not so much hacker community. We have two hacker spaces One in Novi side small one. It's two years old Let's say now and one in Belgrade more than five or six years. I'm not so sure So we are trying to build the community there But we need people from abroad to show the people from in Serbia how it's looked like So that's the reason why we are organizing the conference and we also have on the balcony a small hacking area So we also have assemblies and we also want to invite all the assemblies to come To join us to have fun these three days So if you have any questions how to reach In the Serbia because it's maybe for someone. It's not so easy. There is a cheap flights to Belgrade It's one hour drive with a bus from the Belgrade airport to novice ad or if you have any other question related to accommodation organizing conference feel free to Contact us write us email. We'll want to see you all in Serbia in novice ad next year Thank you. Thank you Next up is Capricorn So earlier this year ransomware spread out pretty much all over the globe according to the news Luckily myself. I wasn't infected But I made a program which tries to detect what changes are made in your file system and today I'll tell you something about that and I'll end with a call for activity So first off Short table of contents of what I'm going to present first a bit about myself. Who am I? Then what is Capricorn? How does it work and how can you join in which is the initial goal of my presentation? So who am I? My name is Max Kerstin I go under the nickname of Libra, and I'm in the third year IT security bachelor in the Netherlands I'm interested in reverse engineering and analyzing malware. I did Android banking malware for my internship And I plan on writing my final thesis about desktop malware because I'm also fairly interested in that Which brings me to my program Capricorn, it's an anti ransomware command line interface application I didn't feel the need to build a graphical user interface Though it's it's still possible It's built modular so it can be expanded rather easily open source you can find the at the end of the presentation a link to the github repository and It's written in Java supports both Linux distributions and Microsoft Windows It uses local honeypots a bit more about that later on and one other rule I used is to not require administrative or root privileges So how does it work? I Deploy a honeypot folders with files in it on the system in multiple locations So all of the user home folders are used So that would be your desktop folder your documents your videos Any of these and the root of your file system itself is also used so if you're using Windows It's probably the C drive and if you're using Linux. That's just a slash on your on your device So then I feel the honeypots with files with a random extension I Used my own hard drive and drive as a super reliable source of what extensions are used most And I got roughly 700 extensions there and then I feel the Files with words based on the English language. I I used some sites and I found out what the Allegedly most used words in the English language are to avoid detection since other programs which use similar techniques as I do They often have words in them like this is a test file or do not remove anti ransomware So ransomware could be able theoretically to check that and then not encrypt these files Since I want them to be encrypted first That is my my goal so what do I do if there's a change in these files, I simply shut down the machine. I usually Crypto software doesn't have a persistence mechanism because files are encrypted anyway, so they want you to pay So the current state of ransomware So it's first executed obviously scans the file system. It targets a set of file extensions so PDF doc acts. I don't know whatever they want and Then it starts encrypting Downloads from the from the location. It started usually But it could be user folder the root of the hard drive and then eventually you've got the message Well, please pay us or you're never going to see your files again and So far this this works At least for the criminals sadly, but the program also prevents it. I tested it with the quite some versions Also the world famous WannaCry Would have been stopped at least in my test machines So what I might foresee in possible changes in ransomware is that they also include The header of the file so that's been something I've been working on lately to have the correct header for the correct file extension because otherwise it could be that the plain ASCII text in the file is Seen as a honeypot and is skipped and if all the honeypot files are skipped the program doesn't work anymore So that brings me to my last slide and is how do I participate? After the lighting over for you can contact me outside in the hallway. You can email me or on get up. Thank you Okay, then let's continue with the next talk and the last talk before the break riot The friendly operating system for the IOT. Hello, my name is Martin Landers. I am a researcher at Freie Universität Berlin and Also a main contributor to the riot operating system So most of you one might want to know why do we need an operating system for the Internet of Things at all and why riot? So if you look at the Internet of Things today, we see that most manufacturers just use their own solutions Mostly proprietary sometimes standardized, but almost always over some central cloud architecture and also using some proprietary software and basically no one knows what they're doing and Our vision for the IOT is that basically everything is built around free software and free And well standardized protocols. I put some riot logos in this lightsaber You can also can use other open source operating systems, of course So that we basically if we want to connect our heater with our light switch But why do we need a dedicated IOT or SS anyway, why not just use Linux? Well, if you look at the devices linux usually supports We see that there is a big difference between our the devices riot supports and the devices for example, Linux supports and so our motto is basically If your device cannot run Linux use riots, right? But what does riot bring to me well, we personally we are LGPL license software So we are basically free software. We also support a variety of well known and well tested tools for our development process, so we don't require you to install some eclipse environment or use some Self-written a IDE to develop for riot And we also support a variety of platforms like the makers favorites Arduino nuclear as the nuclear or the other food feather but also educational platforms like the Kali of the mini and it's British counterpart BBC micro bit and We also you might have Seen it on heck a day that some of one of our contributors Hacked the IKEA light bulb triad free for riots so you can run riot on that now and Here for the ones who are a little bit more technically interested Right basically has a real-time capable kernel architecture Highly configurable modular design from the ground up. It has a partly politics compliant API Fully featured IPv6 network stack and also JavaScript support via the Samsung jerry script interpreter and also some other third-party software, which you can also include via a BSD port like package meant management So if I could spark your interest you can Look at our website right or s.org look a little bit through our API documentation at API dot right minus or s.org and Look at our github tutorials if you want to test yourself out in the environment Also, we have several mailing list our most active one is the devil mailing lists Where we discuss most of our topics, but we also answer questions at the users mailing list And if you find any vulnerabilities in riot You can confide with us at the security mailing list security at riot or s.org Thank you Thank you Okay, so now we're gonna have a short break of 15 minutes. We'll see you all back at 12 45 Please give a big hand for all the talkers Okay, the break is about to be over so please switch to the slides again and Then we can start with open source do it yourself laptop Lucas Hartmann and this is a quick intro to reform my open source do-it-yourself laptop Why a computer should be a simple tool The users should have all the power over it You should understand it should be able to completely understand and repair it and there shouldn't be any corporates or government insurance that you don't want There are some similar projects like the Novina that's also based around I am xx. There's the pyra the new 900 phone So this is my contribution to the overall open source hardware movement The status there's there are two prototypes one is based around a development board and Is quite a bulky box. This is done and works The second prototype is currently in the works. I have it here in this suitcase so I can show it later after the talk It's based around a custom board and it's much thinner Here are some first sketches how it all started by industry designer Anna dentus we iterated on a lot of different styles and ideas how it could look like and For the first version settled on a very simple blocky design This is the very very first version made from laser-cut acrylic 3d printed keycaps just to get a feeling Of the proportions and so on We then started to print our own keycaps in the form labs form to resin printer This is how they look freshly baked This is the completed first prototype Insights you can see there's a lot of cables and components floating. So that's why it's so big and me using Debbie and Linux on it and It can show its own photo Here are some more renders showing how it could also look like There's general specs it is based around the nxp. I am x6 so see it has four arm cortex a 9 cores at 1 gigahertz 4 gigabyte of DDR3 RAM, which is unusual for this for an arm system it has a vivante GPU and safe lithium iron phosphate battery And it's completely open. There are no binary blobs in the system The GPU is completely open source has completely open source drivers It's currently based on the tiny Rex SOM, but we'll move to the open Rex SOM so it can also be replicated Yeah, it has a bunch of IO for USB PCI Express SATA Gigabyte Ethernet, LVDS and HDMI at the same time and the SGT L5000 sound chip and there's a few GPIOs and SPI I2C for your own experiments All the files are are Open as step files and you can print your own Enclosures and parts the board was designed by me and key cat, which is also open source all the components are easy to source And the input devices the keyboard and trackball are just USB devices And this is how it looks like in key cat is my first fall air ball Here's a render and this is how it looks like in real life. I was able to with a lot of Patches to bring this board up And runs some emulators on it. Yeah, you see it almost fully populated USB. Hope didn't really work And I was able to test a lot of software in the last weeks Debbie and Linux runs fine with the mainline kernel Firefox Blender, Emacs, IOquake 3 Emplayer, LibreOffice all of these work quite well and I'm now working on the board revision number two which fixes a bunch of problems that the current board has and the case revision number two And we'll start taking pre-order soon for a complete DIY kit. Here is just a preview of the thinner Enclosure, thank you You can contact me here Mntmend.com slash reform or talk to me here later. I have all the parts with me. So thanks Thank you Next up is shit might hit the fan Driven code Good morning. Good morning everyone. I want to talk about shit might hit the fan driven code Because this year I had the feeling and I think I'm not the only one that shit is very close to the fan Or as another talk here framed it very very nicely We might not go the direct route to utopia. There might be Some detour and so I was writing some code mainly Android apps to deal with my fears and to basically make some digital umbrella Because main thing is I don't trust Elected leaders we have currently and I just want to have a backup So we will go up the pyramid of needs and I think it's not Wi-Fi at the bottom It's actually food and shelter So I was checking all this like How to make fire and stuff and there were some apps already on the Android app store But none of an on an asteroid which is really a problem for me And I didn't like all these apps. So I was writing one. It's Based on the US Army field manual, but completely demilitarized. So if they speak about soldiers It's humans and everything else It's based on a wiki This is basically the content and I added some for example power because often people ask Yeah, there's no power when shit was hitting the fan But there are solutions to that you find that in that section basically So there are ways around it how to generate your power that's added content So please that's one reason why I'm speaking here also add your content It's a github wiki and that's gets compiled into the app and it's also not It's called offline like Sorry manual to help overcome situations without internet offline. That doesn't mean like offline. It works offline So the content is compiled into the app The next thing I want to speak about is IPFS droid Because I think like that's one step ahead of the pyramid now. Now we survive. We have shelter. We have food We have everything now. We really want digital content and one really nice way to get digital content is IPFS content address and that's basically the Android app to access that it can resolve via the go IPFS node that's compiled into the app or also via Via the gateway to not have such a big binary blob in there So please look up IPFS and IPFS droid another option might be swarm from yeah Next thing I want to talk about is Wallace That's like this cryptocurrency thing is not really well received here, but it's not all about money There are other things you can do with that and also like banks might explode after shit hit the fan and you still want may want some means to exchange stuff and don't go back to a raw barter and Also, none of the apps for for ethereum Was suitable for me before so I was starting the walls project. I started as an organization It's also a lot of coddling code if you don't like JavaScript and you like static typing languages In the ethereum and IPFS space often is JavaScript is dominant, but most of that stuff is written in codlin So now we are the top of the pyramid basically we have some time all needs are solved One game what you can nicely play is go like the game of go was also really interesting Alpha go now with the AI You can also find that at the hive an installation which plays the alpha go games with That app basically as a continuous playing all the apps you find them on Google Play for your convenience But you can also compile them yourself and in the middle from the convenience also always all the apps available on after it your choice The next thing I want to talk about is not Android app that's I saw that the canary watch Stopped basically because it's too much work currently to monitor canaries and I really like Like if you're not for the money like stuff, but you can do like that as a smart contract Please look up you see 801 That's an ESC to make canaries so it should solve all these problems that are outlined in this blog post Yeah, so follow up you find all that stuff on my contact PGP key and stuff on ligi.de Contact me also like at this conference here. Just speak to me. I might look scary, but usually I'm quite friendly Have a nice day and a great conference. Thanks for listening Thank you Five lightning talks in one very nice So let's continue with Technological sovereignty volume two Hello So I am maxigas and I will actually talk about a book not software and of course it has digital versions as well, but We printed out a bunch of them and they are available in the anarchist assembly in what to next to come on and Well, this is a book written Actually, I should show you this written by people who live in the Echo Echo industrial post capitalist colony in Catalonia that is called colorful. It's a kind of housing cooperative and productive cooperative complex that we are buying from the owner over 10 years and Technological sovereignty itself started with this idea from Margarita Padilla And he was saying that there are consumption cooperatives that buy the Their food from local farmers together and why not people do the same with the technology So We found Via Campesina peasant movement that is an international political movement of peasants and They had this nice definition of food sovereignty and what we did was to adopt this idea To technology so I will read this quotation from via Campesina and try to imagine What happens if you replace food with sovereignty? So food sovereignty is the right of people to healthy and culturally appropriate food Produced through ecologically sound and sustainable methods and the right to define their own food and agriculture systems It puts those who produce distribute and consume food At the heart of food systems and policies rather than the demands of the market and corporations so for us to adopt this idea to technology was a way to go beyond the Limitations of free software because free software was a very inspiring and powerful movement At least in the 1990s and by now it has been become part and parcel of capitalism So we were looking for a more holistic approach To alternative technological trajectories And The first with three years ago we published the first volume and this is the second one that came out now And it was supported by the Ritmo Foundation from France And it was translated to Italian by people from Hacla boy in Bologna And we collaborated with a lot of other groups for example with the quality who are a translation collective So the first volume three years ago we put out in French, Spanish, Catalan and now in the anarchist Assembly you can actually find the new Italian translation of it and The second volume that we published now And we'll come out in it's already out in English and Spanish and available in the village there is already a digital version in French and Catalan and Italian will come up So one of the reasons we came here is not just to distribute the book But also to ask people if they want to help with German translations or translations to any other Random language that you would desire and speak We published the book also there is an original version so if you want you can get the digital Book and you can have the original French articles in French And if somebody wrote in Spanish you can have the Spanish version So all together we are releasing in six different formats in print in HTML in PDF in Markdown in Moby and Something else EPUB So it's basically six times six books that we Made from the same material and they are all available in a jit repository So we use Actually, I will show you this one. So we have this toolchain based on the jit book library mainly That we use to translate markdown that makes it very easy easy for translators and collaborators to work on the book and Just to give you a taste of what is in the book The first volume looked like this And how is it? Yeah Sorry So okay in the In the second book you find five Find out of different topics Thank you. Thank you. All right next up is formal verification for the win Hello, I'm wild hacks and my talk is the phone verification for the win So it's well known that the number of bugs generally increases these lines of code and we have a whole slew of code around us So embedded devices are what we have in our smartphones or cars or elevators or railways Wherever and they have code in them and there's a lot of them and even in 2004 cars had 70 computers in them in the different networks and By now you can be sure that you drive a car that does not work mechanically as in when you press When you present the gas there is a command center computer which operates the engine It's not mechanical and there is code in between They actually boast about it So There is Stuff from the mundane like HDD's to the internet backbone, which is critical And there are actually standards around it the common on the right is how Often a bug is supposed to happen at maximum And it's really hard to test that a bug happens only once every 12,000 years When you're a manufacturer, but when you release something in the wild with millions of devices Consumers find bugs another issue with the testing processes you test for known issues and You generally don't know issues which are interesting So there are cases like Toyota one where the car did not stop when you Press the pedal just did not because they messed up concurrency and people did die Almost confirmed death and a lot of injuries and they tried their best to keep it out of the court So they settled a whole lot of cases Also, look it up with Michael Bond Philip Koopman. There is so interesting slides of inexperienced witnesses and they audited the code Another legendary case is Sirak 25. Basically, it's an X-ray machine which sometimes worked in Killcans mode when it should have worked in scan mode and also killed people and also because they messed up concurrency, basically Also little cases like Sometimes Boeing Dreamliners AC system stops working because Implementation issue Sometimes petrol missiles used to meet their targets because implementation issues And also Christlin messed up. They did not put a firewall between the internet connected YouTube player and the car engine because they used a can Can bus which is not indicated by default So phone verification is about formalizing this relationship and it's recommended to use and And there are two kinds of it basically system verification limitation verification system verification is about your concept your architecture your protocol and Implementation is about your code adhering to the protocol and it's basically an extension of types you are used to and I'm going to skip that you can track stuff with your types and There is also that the concept that in really high assurance In really high assurance stuff like space rockets You realize that your hardware and compiler are also Potentially not adhering to the spec so you check them to not going to talk about that form verification has been used to great effect in a lot of cases for instance Amazon has used it to fix some bugs in their web services and also verify that some optimizations could be made and It's static analysis is used in planes in the space station in basically every phone every smartphone out there And also in your CPU caches. It's verified that they behave correctly Also some interesting minute minute applications what I want to say is things are getting harder and Basically if you don't want to people to die you have to have really Bad assurance process which make iterations slow to a crawl and if you want to get to the space faster We have to use form verification space X is hiring for information is in your engineers right now Check out these materials. They're cool. Thank you Thank you Next up is small modifications. I would like to share with you some things that I have found Mostly while walking around cities near the Pacific Ocean I'm kind of curious how you might relate to these from your perspective So here is a the entrance of a driveway in Seoul, Korea and There's a small slope on this ramp and so it looks like someone had to cut up tires and Fixed it to the concrete with screws so it doesn't slip and About 50 years ago a guy called Bernard Rudofsky said something like this What we need now are not new technologies, but new ways of living and I guess that's a question that I often wonder when I look at these Things made by non-specialists using very primitive materials somehow they Do something they change something in our experience of being alive So here is a photo taken by my friend Chris Berthelsen while he was living in Tokyo, Japan and Someone had added this Tire to the entrance of the driveway Which makes a difference I will just read out another quote By a guy called George Cal Goonheim He said that life is improvisation meaning acting as circumstances permit at one point a Blade of stone is sufficient as a surgery to and And stainless stainless steel was not sufficient yet We live like castaways So even though here are twos in two different cities when The picture on the left is from Mexico City The one on the right is from Seoul Korea again People working in relationship to cars they Make these modifications to Offer some kind of protection in the first example and this was found near the same car park where old Posters has been reappropriated for storage and I feel like the same kind of Caring could also be extended to other creatures. So here's a bird feeder found in Tokyo and Often also when we think about boundaries like fences and borders It could be a site of separation but also a site of exchange between people and Offering something to your neighbors and here is a soccer field made on a permanent in Penangpan, Cambodia and the blue tubes are very Ubiquitous in that city for water and Here the same tiled ground has been Kind of appropriated for anchoring this tent and this is something that I did with a group of my friends in New Zealand before I came to living humble last year where we modified the existing furniture in the middle of the city So it could become more of an open home for strangers to meet and here we discovered fruits on the edges of a car park I just read another quote By an anthropologist whose name I have forgotten He said to craft not beautiful and convincing artifacts But evocative and open-ended materials for further experimentation To creatively set the scene for distorted here and now And if you have any idea what this could be you're welcome to come and find me in the tea house Thank you now a party for quality of life is needed Okay so welcome for This talk you might suspect it Because there's a the word party in the title. It's something like Insta party or crypto party as especially as we are on a hacker conference But I have to disappoint you it's about a political party, but I tried to make this a little bit entertaining so I want to explain my point Using references to popular popular culture namely the famous serious game of thrones who of you Does know this serious game of thrones Okay, so I can Keep the summary of the plot very short from my point of view. It's kind of a mixture between a soap opera and the fantasy Story and the soap opera elements are that there are a lot of couples having discussions and making much love to each other then of course, there's the iron throne, which is the symbol of the power for the whole continent and then the Just this game who is to occupy this throne and this game is played of course via discussions and why discussions including swords and riding nights and even fire spitting dragons and From my point of view the the important thing of this series is that this whole game who will finally occupy this throne is more or less pointless because In the north there is the horrible knight's king and he has an army of hundreds of thousands zombie warriors trying to to Yeah, kill all people and extinct all life on earth So the whole series is about setting the wrong priorities and this is the relation to the reality which I see because the priorities of actual politics are Keywords like economic growth jobs competitiveness and Recent time also national identity, but the real challenges from my point of view the collapse of the global ecosystem, which is a crucial condition for the existence of humanity and Also the looming collapse of Democracy or even civilization I just want to give some buzzwords like climate change bio diversity multi-truck resistant bacteria or in the second part the resilience against autocracy the ability For a rational discourse is declining and war prevention if we ever had something like this is also getting weaker so One solution approach would be to change the optimization criterion but there's the problem that the attention for inconvenient truth outside of Communities like this one here is nearly zero and we have prevailing mental infrastructures which favor consume and cheap is cool and everything like this so The changing the optimization criterion isn't easy, but nevertheless Our approach is to establish quality of life as a political political concept and therefore we think They intend to found a new party which has or which is centered about this Concept might be a way to go because currently our society tries to optimize Economic growth and the number of jobs, but these can Only be the means for reaching quality of life, but not be the goal itself So quality of life and our understanding is just a mass-compatible interpretation of sustainability or more precisely Establishing a lifestyle which will work on a global scale and on a long-time scale and obviously our current lifestyle does not fulfill any of these two conditions and One very important key aspect is to deconstruct the dogmatic growth orientation so Yeah, if you want to have more information you can ask me or just visit our website, which is Party of life quality dot de so plq dot de. Thank you very much Thank you Next up is pork backup. I will quickly I Have to set this up in the browser Bad opposite everybody sees my bookmarks so now Let's go It should work with the clicker. I tried it. Yeah, okay Okay Okay, welcome. I want to tell some words about work back up It came into existence because we made a fork of the attic backup software and back then attic was Not very well known, but some people already Discovered it and we're quite happy with it. There come this there comes this citation Some Greek guy said I found the holy grail of backups so it looks like he was quite happy with it and How boy came to life is Attic was a five-year-old project It had a quite nice design and nice code But a problem was a bit of development was going on the rather slowly And still some bugs left and the problem was you could make a lot of pull requests, but they Did not get reviewed and not accepted So it was basically going slower or even be stalled And after some months, I think of waiting we forked it and That was two and a half years ago and now it's quite Fast-going and it's more or less a community project and Pull requests get merged and it's quite a lot of activity The feature set it's easy and fast to use is a command line tool It does content defined chunking more about this later And it does de-douplication and not only based on a whole file, but on chunks of files It does compression In January, I think I will release the next version and it it will even include a Z standard It does encryption. It authenticates the encryption and it has a file system key value store And you can access it locally or by SSH It's BSD license documentation is quite nice good platform support Linux BSD Solaris kind of stuff Cygwin even it's Python a Little bit of siphon and see to speed up the critical parts and we have continuous integration system in quite a nice test coverage You can mount backup repository. So you can just look inside and copy files with your files manager Somewhere it's about a de-duplication because compression and encryption you maybe can imagine how that is done the de-duplication is interesting because it does this junk based de-duplication and For example, if you have a virtual machine image and you just use our sync with this heartlink trick for de-duplication It will often copy the whole virtual machine image to your backup disk because the whole file has changed But bark de-duplicates the chunks And so you will notice that most of the chunks of the file did not change and it will only Copy the changed ones You can also work on logical volume snapshots you can De-duplicate a directory even if it was renamed because it does not care for the name It only cares for the pieces of content that you have You will have maybe some inner de-duplication because you have some duplicates in your file system But it's not a main point in any case You will have a historical duplication because every backup you make will be Mostly similar to the backup you made the day before So there's a huge de-duplication there And you can also have de-duplication between different machines if they happen to run the same operating system Or you if you have the same data on them How is it made? It reads the file and then it applies a rolling hash algorithm over a small window and it cuts the file into pieces and The nice thing that the piece cutting is not at fixed offsets It's happened it happens by content So if the content is moving the cutting place is also moving and then it stores the stuff into key value store and That's basically it Currently we have the 1.0 release out since a while one 1.1. I mean 1.0 is the old one and Yeah, 1.2 are some crypto and parallelization enhancements This is the home page. You can also grab me here. Thank you true Thanks So next up is Unstillable for Langen, but I think it's an English talk. It just has a German title Hi, I'm here to talk about Insatiable desire Now this isn't a technical talk. So they won't be any dirty pictures. Sorry. This is the dirtiest that will get I think many of us are actually a little uncomfortable talking about desire including myself so it doesn't come up a lot and What I love about our Congress is talking about the future and creating Solutions to our problems using technology and I would like to contribute to an element that I feel is a little underrepresented in that So if we look at ourselves, we have this Narrator in the front of our head that comes up with very reasonable explanations for our decisions But our decisions in many cases are influenced by our desires not only Sexual desire but other things food money power love Friendship so good things all I'm saying is that our lizard brain is in the driver's seat a lot of the time And that has implications for our society So a large part of our society is built around catering to our desires and selling our stuff and Technology is coming up with better ways of serving our desires every day And you might say so that sounds pretty good. What could possibly go wrong? Well, if you take any statement You need food to live and take that statement to its logical extreme then it becomes absurd So if you need food to live, why don't you eat yourself to death? and We are eating ourselves to death because food has become so good that it's addictive. We can't stop eating even if it kills us and More is usually better. It's just that our lizard brain doesn't know when to stop And the same is true for other things. So if I have one billion dollars, I won't be happy until I have two billion dollars or Take drugs ever since legalization of cannabis started industry has taken over for obvious reasons and There's been an explosion in the variety and potency of THC products, which sounds good But we have no idea what that is doing to our brains And I think it's easy to blame capitalism and consumerism for our problems But what if we have that the wrong way around? What if they are actually symptoms of human desire and they are bound to it just like we are because we are Engineered that way and societies both around death. Well, the implication is if you take anything to its logical extreme It becomes absurd and our world is built around fulfilling human desire Which is impossible because human desire is infinite so there might be some bad outcomes from that say climate change and Thinking about the future depending on who you ask in the future Everything will be free. We will live in the collaborative commons or in the future We will try to become gods or super intelligent machines will take over and murder everybody But I feel like we're missing something I think that human desire will actually play a large role in shaping that progress and determining our future and I see this going one of three ways potentially So one way is we can just continue as is and enjoy the ride and it will be fun for us Not so much for our children, but anyways Or we can find a way to limit or change human desire which Could be good, but could also be very scary or we can put our faith in Technology to find a way to satisfy human desire without the external consequences For instance build a virtual world that's just as limitless as our desire and then we can live there and Be happy without destroying our actual planet in the process. I Don't know if they're if those are good solutions. I think that maybe there are some better ideas What I'm asking you is next time you discuss some technical solutions. Think about insatiable desire Thank you Thank you Next up is DHCP anonymity Profiles and implementations Are you there? Does anyone want to give this talk? We've got the slides Huh Yeah, I just okay, it's apparently talking about the HCP servers and lots of Computers that are connected to them and even the printer also You really do want to give the talk Yeah, we're windows, okay Yeah, I'm sorry it didn't work out. Maybe he I didn't get an email or anything. He didn't he just didn't show up Yeah, I think that's it so the usual suspects and what I was Yeah, well, that's all that You know a tragic end to our session I would say So please give a big hand for all the talkers who showed up