 Who of you, this year, had a security nightmare? Lights please, we won't see you otherwise. The question was who had one, not who was one. Again, with lights on. Who of you had a security nightmare this year? So few people, I won't believe that. And with whom of you was it the parents-in-law? And who was his or her their own security nightmare? A few people are admitting it. All those using Facebook know that it would have to be you. You would have had to show up. Okay, Ronald Frank's security nightmare is just like every year. Let's go. Hello, Hamburg. Hello, Hamburg. Moin, moin. We are still here. 16. event at the 32nd congress. Now, I would like to say that had been the plan all along, but we don't think so far ahead into the future. The remarkable thing though, is that we have a 30% Market chair. Who belongs to the church of market share? Da war einer. Da war einer. Okay. Kann jemand ausrechnen? Kann jemand kaltest, wie lange es für uns zu kommen wird, bis zu 90%, oder wenn wir das erreichen werden? Was? 160 Jahre. Wir haben ein paar Plätze für das Zeit. Aber bis dann können wir uns die Kontraste übernehmen. Und wenn niemand die Krypto-Key vergessen kann, oder wenn niemand den Kanton rumpatscht. Wenn niemand die Quantum-Computers patcht? Gut. Gut. So, willkommen zu der Kongress. Ich hoffe, du hattest eine gute Zeit für die Weihnachten. Oder das, was die anderen Leute nennen, die Jungs-Support-Marathon. Du warst, um zu relaxieren. Und wer von euch war, um zu ein Windows XP zu lösen, um die Familie zu kommen, um einen zu kommen? Das sind die realen Heroes. Wer durfte es nicht wecken? Wer war nicht allowed, um einen zu kommen? Oh, der, der, der, der, der, der, der, der, der. Oh. Ancient operating system 300, some windows 90, something. I found two boxes, clearing up this, month. One of them was MS-DOS 3.3, I think. And the other was OS 2. Ich könnte sein, aber ich habe nur einen Punkt durchgekommen. Nein, das ist nicht möglich. Wer von euch war auf dem Camp? Wer von euch war auf dem Camp? Die beiden Translator. Es hat ja jemand ... Man war von dem ersten Camp in den ersten Jahren in der Old Talk. Ich habe über Suchmaschinen gesprochen. Es ist sehr, sehr komisch. Ich frage mich, wer von euch kennt Alta Vista? Wer weiß Northern Lights? Und jetzt frage ich euch, wer von euch kennt Northern Lights? Ein ganzes Dutzend. Ein ganzes Dutzend? Und dann stelle ich da und sage, es gibt diese neuen Konzepte. Einmal von einem Unternehmen, Google, und jeder, der das ist. Also, Zeit. Wir sind wieder hier. Wir sind wieder hier. Wir haben die Agenda, wie immer. Wir haben die Sicherheitsmeister, die wir gerne haben. Sie können etwas ändern. Und die, die wir nicht wollen ... Und natürlich nicht alles ernsthaft. Das ist man es heute schon dazu sagen muss. Und das zu sagen, dass wir das haben müssen. Ja, manchmal haben wir das auch. Manchmal sind wir ziemlich früh. Die BBC hat die BBC nach dem G-Pack berichtet. Es gab eine Firma, die ein Konzept für die Lab hat. Es gab nichts zu sehen. Das via DAB, das Radio-Konzept, könnte man in das KAN-Bus und das Entertainment-System gehen. Und das, ich glaube, war auf dieser Stelle, nicht auf dieser Stelle, aber in diesem Event. Ich habe es schon 13 Jahre ago demonstriert. Aber mit RDS, nicht DAB. Dann war es dieses Jahr mit der Fridge. Es gibt niemanden, der in der Fridge die Google-Kalender benutzt. Das war, ich glaube, der Nummer 1, die die Internet-Konnectung hatte, weil Google die APIs verändert hat. Wer hat eine Fridge mit Ethernet oder Wireless-Land? Wow. Es gab mehr von diesen letzten Jahren. Was ist mit diesen Leuten passiert? Ich glaube, das Keyword hier ist Soylent-Green. Ja, sie konnten den Kalender-Entrieb nicht für dieses Event reden. Sie haben sich vergessen, für ein Ticket zu klicken. Wer hat ein Problem mit Radio-Kontrollen? Wer hat ein Problem mit ZigBee? Wer weiß noch, was ZigBee ist? Das ist viel. Es gibt es aber. Wer hat zu Hause zu Hause zu Hause zu? Papa, ich wollte ein Drehbuch für Christmars. Wer hat dann zu Hause zu Hause zu Hause zu Hause zu? Wer hat zu Hause zu Hause zu Hause zu? Und die Frage ist nun klar, wie es so aussieht. Vielleicht wird es für das nächste Weihnachtsjahr sein, für den kleinen Bruder. Picken Drones in den Park oder so. Ja, Picken Drones in den Park. Es war ein Song, Poisoning Pigeons in den Park. Tom Leera, in German Magdiel Kreisler, von Vienna. Das könnte für Drones Reden sein. Und dann eine Review zu 10 Jahren ago. 10 Jahre ago. Das Thema war die 2006 World Cup, Fußball World Cup in Deutschland. Men's Football, ich sollte sagen. Und dann waren wir über die Sicherheitshassel, die Sicherheitsschirat, die mit Sicherheitskameras gespielt wurde. Dieses Jahr in Hamburg, die Olympischen Games Propaganda, sie wollten, dass sie viele Olympische und Bicycale fahren. Sie waren so angri, so angri. Aber das meinten sie doch gar nicht. Warum haben die die Fahrer? Warum haben die die Bicycale? Weil die Drones von den Skiern fallen? Ja. Oder anderen kleinen. Oder andere kleinen Parts. In London hatten sie das Airspace-Defense. In London dachten sie, wenn sie ganz ehrlich waren. Und said, die Olympische Auch auf Wohnhäuser, auf residential houses to rocket launchers, on residential house roofs. There were a few nice cartoons about this too. But then the whole thing, the Olympics bid, was voted down in a referendum. Also auch 2005. Oder was ist das halbe Kilo of beef doing in here? It's not good, is it? So, Tupperware, that shields RFID. That was in the business ideas, business models category for what was then the next year. And I think the Tupperware company did not pick this up, which disappoints us hugely. But it's of course not a problem at all to get RFID bags and purses or for your passports, your ID card and all these things. You don't have to fry them in the microwave anymore. Which we liked and we then thought, what about tinfoil hats? An uncharted business area? Nothing happened there. Okay, meanwhile there were treatises on the internet that said, it's wrong to buy your tinfoil hat, you had to make it yourself because you wouldn't otherwise know what's in them. I think at the camp there was a workshop. But the problem is the scientists have determined that tinfoil hats are problematic because they make those dangerous phrase focus on the brain. Those that then went ahead just didn't get that message. Those that ran a Kickstarter campaign. This is what a tinfoil hat looks like once it's finished. The campaign is still going on Kickstarter. So now seriously, it's quite chic, isn't it? Well, maybe it will lower your average head temperature by 0.01 degrees. Is that a good thing? I don't know. Well, it's a fact. Warflying, Wifi, long distance Wifi in airplanes. It was another topic in aeroplanes. And then this year the whole thing went through the press again about planes that could be made to fly sideways. It wasn't even with Wifi in the plane. That guy I think just grabbed the cable on the floor and put it into his laptop. And Frank said, you shouldn't touch flight control devices. Peer-to-peer and firewall worms. The respectable ones. Did anyone see any? You asked it the wrong way. Do you know anyone that has seen? Okay, we won't ask for a friend, but after, or for a friend, we're asking a difficult translate. So, I'm passing over. Question from the audience. Okay, also die Kurzfassung, es gab einen Wurm für... Shot, there was a Wurm for ubiquity, Ruraltis, and we're sessions. And they played with flash. Okay, ist doch zu lange. So, go to the microphones if you have something to say. Well, it's open. There's peer-to-peer worms. It still has to happen. Then proper malware routines. And that's quite interesting. What has happened was got through there. Malware routines have worked to crypto lock our troll trends. They are often in the news. You catch them. Then they encrypt your data. And after being finished, they tell you, if you want to give your data back, send bitcoins in that address. Encryption as a service. Das ist halt das neue... The dog has eaten my homework. But actually it's the same with Microsoft. Key back up. Somewhere else. I'm not sure if you think... I'm not... I'm not sure they like that. You explain why Windows 10 is for free. It's got a scene from marketing view. Captive marketing. Everybody encrypts their hardest keys of Microsoft. Next year, 12 months. Well, Microsoft says, well, we thought about it at $99 a year. And for that you can have your hard drive key back. Captive markets. We can hope that Microsoft is well and alive for a very long time. Because who knows, maybe they will ever do it. But the bankruptcy handling, you know, they have to generate profits. So they encrypt... Siehlef Prover from the FBI. And the FBI say, well, if you have one, they'll just pay. Average customer happiness is high. And you can really get the key back. And if you have a look at it, what happens from Malware Alinesses company, they say if you lose your key, well, there's a lot... You get a lot of fuss with the other players in the market. Because it's a market that regulates itself. Capitalism works there. Because you get... It's technically really interesting how they work. The private key, you would need to unlock the data. On the hard drive, they do public key cryptography. And this is the symmetrical keys on the computer. And the question I asked myself is like, is it transaction safe? Have they thought about the fact that the scatter-matter satisfaction is the highest good? If the customers aren't happy, then other people come and kick your door down. But the other people are interested in the quality of the market. It's important that you first encrypted things with a symmetrical key after already having sent the key to the command and control server. So things can be decrypted. So that's quite interesting. It's pretty interesting. So we have fun with e-government, online forms, we predicted that. I'm not quite sure how many of you have been... Is that the broadcasting fee collecting service? Yeah, I registered there. So in Berlin you don't get the appointments at the local offices. There's a company that scrapes the Berlin e-government website and takes all the dates and appointments and then sells them. If you want to go there and want to have a new passport, you don't get an appointment. It's not there. It's not available. You can go there at six in the morning with all the others who don't get an appointment. All the e-government has been privatized, has been turned into a market. If you want a market with timely dependency, if you want one in the next three days it costs more than one in the next two weeks. So people don't get... So people even get threatened with fines because they don't have a personal document and they don't get an appointment and they refuse to pay the tax. But that's the only way they have the chance to have. So the privatization for our e-government, we haven't really seen that. We saw that this website is sort of semi offline. So, what? Also, dann gibt's das schon als Tool? Is there a tool? There was two snipers of ebay. Das brauchen wir jetzt. Now we need this for public registration offices. The switch monitoring. So there were sensors that were basically put in the sewers and put in an environment and keep for a long time. And I... especially in the switch. Auch Air-Sensoren sind sehr komplex in dem Sinne, dass man nicht einfach etwas für 250 Euro kaufen kann und auf die Wall putzen. Und es wird nur für ein Jahr dauern und es ist verabschiedet und es ist gebrochen. Und ich warte jetzt für ein Jahr, dass die Menschen, die Safecast machen, die dieses Open-Data-Plattform für Geiger Accounts bauen und für die Geiger Accounts und Software und so weiter, für Fukushima. Sie kommen mit Sensoren für Air und es wird vielleicht in den nächsten paar Jahren etwas sein. Und dann bin ich ziemlich froh, hier zu hören, was passiert. Es geht um die Umwelt und es geht um etwas, was da, wo es nicht mit der Transparenzlose funktioniert. Und du hast, zum Beispiel, ein Anmesser in deinem Hallway und dann hast du eine E-Mail, die sagt, du solltest es anders essen. Okay, das war in Lutwigshafen in Mannheim, wo sie bestimmte Sicherheitsflugtuations haben. Und war es dieses Jahr, dass in Hamburg large Parts der Bevölkerung gezwungen waren, um die Wiener zu locken, weil es so ein funny Cloud war, um über die Stadt zu hängen? Ja, das ist das, was man in realer Zeit mitführen möchte. Und die Weise, in der man mit den Sicherheitsflugtuungen verabschiedet ist, hat sich nicht viel verändert. Es gibt drei Verhandlungen von Firmen, die von ihnen verabschiedet sind. Die, die jetzt professionell reagieren und tun, was muss zu tun sein, und dann die Hälfte füllen und kommunikieren, mit den Leuten, die sie finden. Und dann sind es die Verhandlungen, die in einem Origen-Style leben, und die Legal-Departementen nennen, und die die Verhandlungen in Vollkombat-Gear gehen. Und dann sind wir angenehm über die Bade-News. Nicht viel verändert. Vielleicht hat das Risiko von Firmen, die sich verabschiedet haben, ein bisschen erhöht, aber nicht viel hat passiert. Data wealth, wasn't called that in 2005. We just said, databases will go missing to the left, right and center, and that of course is not as nice to a term as data wealth, which is the same thing if data will go away, will be, will be, goes stray. But we have to be grateful for the word. Who do we have to thank? The company that infected the government or the people. They don't have a copyright on that, do they? They should have created one, great word, data wealth. Okay. Now the Internet Normality Update 2015. Yes, let's just quickly go through that. Not much time. A few numbers, 81 billion dollars by cyber bank robbery. What's the problem? Bank robberies, they're quoting a popular tune now. 17 million was the highest published phishing transaction. And you'd think, how the hell is that possible? The thing is that there are enough companies where the guy that does the payments is not the guy who does that directly in online banking. He writes a note to his secretary saying, go ahead and make that transfer and she then does that, right. And there's more than 14 million that someone got out from a lottery using a root kit. 3 million ransom for a botnet admin. The botnet itself was a Zeus variant. That was supposed to have caused 100 million dollars of damage. So we're talking about a 3 million bounty, not ransom, a bounty. And a reward, that's the word, a reward, I'm so sorry. And then there was a headline that another 3 million reward was there for the developer of that botnet. That would bring it up to 6% altogether. I'm not sure if it was the right one. So then the plastic router massacre continued. Unabated, right? Weren't they all in the press again? Who updated the plastic router at home over Christmas? Not enough people, hardly enough, not enough by far. So the current exploits know about 50 models and most of these are not very well patched. I have this note at my wall asking which, or listing which family member has which kind of router. And there are some where there is no update available. So you have to update the hardware, but we'll come to that. Now, the impacts are drawing closer. For example with OSX, it's now up to 15% in the US. And you can see that this and that security hole was found relevant malware platforms. OSX is now a relevant malware platform. I was asking why not earlier? Because Apple users tend to have more money. So they will have to have an over proportionate market share. They are more silly, some other people say, Apple users. So again, they should have an over proportionate market share. And I think that in general and with Trojan developers, the cliché that's spread with malware developers, these are all poor artists. There's nothing to get there. The symbolic headline for this 500 million Android device is not erasable. I have been sold, I used by people, they soak themselves up with data. And the delete function does not work. You cannot wipe them, not properly at least. With a hammer, yes. Well, I have to say, it's a bit difficult with telephones if you use termite. But hard disk platters, great. Very recommendable. A symbolic headline, those are the 500 million devices that are then sold on eBay from which you can get the data before you reinstall them and then auction the data or whatever happens. They are cheaper on eBay. The problem is that they are sold on. They don't appear in the drawer somewhere or are not put into the waste bin. So what is the real problem here? Why are they sold on? Well, because you can swap the battery in those old phones. Was? Right? What? And that obviously is a huge problem. And you've noticed that Samsung has done something against that. The new model is not available with a replaceable battery. Is that a hygiene factor? The audience doesn't care. They're not iPhone victims, I think. Okay. You're not finding that funny, are you? Well, I think this is the operating system where the telecom goes ahead and says, I think we'll switch off MMS as a bug there. So they put all the whole network into the daisy mode because of some bug. Well, switching off all the whole MMS thing if I had to say something with Telco to switch off WAP and MMS would be my second act in office just after getting me coffee. Ja, das stimmt. That's true, yeah. Einbrüche bleiben im Schnitt 200 Tage unbedrückt. Break-ins not discovered for 200 days. Now, mind, we are talking about cyber break-ins, of course. A cyber break-in is a cyber thing in the narrow sense, I think. Yes, yes, that counts as in the narrow sense. The time between someone publishing a patch for something, something more or less relevant, and then there is an exploit public in metaploit of rover is not days now but hours. I think we have come, we have got to be low 24 hours for relevant systems. Great. Ja, this has interesting implications. The first one being that if you are in a large company, you haven't really got time to test a patch anymore. It's more a case of patch and prey now, as all you can say. The company software, whether that still works, well, just have a brief test test. And if the patch comes at a bad time such as Friday evening, that's sad. You have to just reduce test time even more. If you look at the patch cycles for something like Adobe Flash and enter it into the same graph, you would find that the patch cycle by Adobe Flash is getting shorter and shorter and the time from patch to exploit gets shorter and shorter. So, there has to be some kind of overlap in the curves. And the one exploit that has not yet been patched or couldn't be patched because you still have to test whether the app still works. So, cancel, right. Spam has decreased a bit. It's only 49% of all emails now. And to balance that, malware spam now is up to 4%. It used to be 1 in 2013 or something. And now it's about 4% of all spam. 2% of all emails have malware. And what I saw for the first time now are multi exploits of malware. Four exploits in a single piece of malware, just like that. You saw it for yourself in your own. Well, they were hurrying there, weren't they? I think they just didn't want to send so many emails. Let's not clock up his inbox. And then the environment. It all costs, spam has to be stored somewhere. Okay. Now, let's speed things up a bit. Now, looking back to 2015, e-government. The U.S. Office of Personal Management. Lost 22 million files. And I think these were all staff files. There was a certain uncertainty if it was citizens or personnel or people that applied to be employed. And then it turned out there were fingerprints in there. 5 to 6 million. So, from 5 to 6 million individuals, not 5 to 6 million fingerprints. And, well, if you then go, well, staff files, what can possibly be in there. This contains the applications for those that wanted to have security clearance. Those working at the secret services. With all the things that they had to fill in there to get their security clearance. So, anything. Everything. Yeah. That is data wealth. And what do these employers get? They get one year of credit card monitoring. If someone has abused their credit card. Well, forget it. Yes, what China then does with these data. Abused their credit card data, surely. Completely helpless, right? Completely helpless. Yeah, the crypto wars this year. Just mind, we're not saying crypto wars 3-0. We resolved to use year numbers now. We were thinking, if we talk about the crypto wars 2015, should we write crypto wars 3000? Or my crypto wars? No, or crypto wars El Capitan. I do think code names are quite beautiful. Crypto wars Tiger or something. Yeah, so crypto wars. We did talk about at this event for quite a while. So, we'll have to deal with those next year too. We'll come to that. Yeah. Things are clear, I think. We always think we are in a repeat of some bad American serial when you were about 14 and sick in bed and there were just three programs on TV. And one of those was running those serial repeats and that's I think what those crypto wars feels like. This is the symbolic image for that. The background, I'm sure all of you know the TSA, which is part of the government, does have backdoors to every suitcase out there. The Transport Security Agency, that's responsible for airport security, that they do have backdoors with those keys. And these keys in this quality, they held up to a camera. It took about less than a day until the corresponding 3D models for printing itself or filing into some metalware published. But the TSA then said, well, we do not regard this as a security problem because these keys were not really there to secure anything. They're just there to give you a good feeling. We'll skip this. You know what we mean. Cryptocalypse, it's always open SSL, SSH, Blackberry. Yeah, after Nokia, the next case of corporate suicide in the IT industry. After they, well, the company is not doing so well, is it? And after for a long time they positioned themselves those that do mobile security fantastically, everything super encrypted also. This year, the C-Level officer, the member of the board, gave an interview saying Blackberry is very advanced because they do privacy, they have balanced privacy. They balance privacy of the users with the security requirements of the state. So, there's no clear a way to say we have a back door and we will reveal it to the government. Pity, the old telephone with the keyboard, but I think that was it. Yeah, and then the story, that's private keys left, left, right in the center, up, down, are getting lost. Some manufacturers leave them in the camera firmware, some in the router. Others load them up to GitHub. Right. In pasted example code on Stack Exchange, great. Just simply no understanding what these things are and that's why this won't stop. Okay, Data Crime was renamed Data Wealth this year because it's such a nice word, but it sounds so much more positive. It doesn't have all those connotations, progress, optimism, peace, happiness. Strahlenblumen. Clear blue skies. Right. Hello, Barbie. Yeah, they received the German Big Brother Award. I believe Barbie or Mattel, was it last year or this year, was Barbie Dall so-called a camera? Ah, I'm saying it already, a camera that looked like a Barbie doll. A doll with a camera in the chest. What? 2010. And that quite quickly led to quite an uproar and it disappeared quite quickly and now. And then they first had a number of reviews Ein paar Reviews, die gesagt haben, vielleicht ist es ein bisschen kreter, wenn die Barbie hört und dann mit dem Cloud sprechen kann sie das Kind antworten. Vielleicht etwas kreter. Und dann hat jemand den Privacy-Aggreiment gefunden, den du klickst und sagt, dass alles gestorben ist und die Transkripten können werden. Und ich glaube, das war eigentlich ein Feature. Ich glaube, die Eltern bekommen dann E-Mails und sagen, was das Kind mit dem Dorf mit dem Dorf spricht. Ich habe das gemischt. War das ein Feature? Ja. Und das Translator certet, dass er die Big Brother-Words-Speech hat. Und das ist wo die Dinge starten. Das ist ziemlich lustig zu reden, wenn das Kind mit dem Dorf mit dem Dorf spricht. Und wie war es bei der Schule? Ja. Und wenn es dann startet und das Kind mit dem Dorf mit dem Dorf spricht, dann sagt er, Well, look, Barbie, tell me the harmless things. Why can't we afford a big car, okay? Why is Mama always in such a bad mood, okay? And why, if we are very nice this year, maybe we won't get hit before going to bed. And that's where things start. What do you do with that data wealth? This is what you see in the underground in England. If you see something, reports suspicious activity to the police. So the question now is, at which point the Mattel company will be sued in 12 years by the children that have then grown up to be adults and said you knew. You knew and you didn't say anything. So if I were their legal department, I could not sleep. I think I would not keep the data at least. That's what data retention does for you. Or at least put it into a crypto locker. We couldn't evaluate the data, it was encrypted. Right. Now this is what Apple says now. We cannot evaluate the data because it's encrypted. But I think they noticed that they are sitting on a certain amount of data wealth there and we'll probably have to do something. I don't know, there was an interview with the Apple CEO, which is the Chief Operating Officer, the COO, Tim Cook, whatever. He was it, he used to be it, and he was talking about the Apple Watch because he is responsible for that and the health kit. And the health kit is this platform for processing and storing health relevant information in IOS. And this has been open source by now. And they had this cooperation with large hospitals and they developed different apps and then said, well, we have, I don't know what the example was, but it was some kind of illness Parkinson's where it's better to know beforehand because you can then stop the disease before it's getting really bad. And the nicest scenario then is, this is the beautiful scenario and they have data by people from which they know that they have a diagnosis. They know that the people know that there is a diagnosis and they have data from people that do not know whether they have a diagnosis. But they can say, these people probably have Parkinson's. So what do you then do with that? If you see something, say something? Or do you then not do it because you're then getting sued because they're all getting heart attacks? Or something? Whatever. What do they do in Iceland? In Iceland they have a similar problem because the databases there contain a large part of the DNA sequence of the population. So they can have information about relationships, family relationships, those that perhaps said we do not want to be registered. And they said certain markers about those and I think the change was that they said, well we try to involve the people's doctors in this and let them say, did doctor with this patient it would perhaps be appropriate to carry out tests at least in that task. Difficult topic. So, interesting ethical questions and I think we're very much scratching the surface up to now. So, notable things. Well, so, not clear why they're laughing. I don't know this. So, see, film images. With companies you see a company of images, C9 Blocker. And a question. If you do know a company that has ad blocker in company images. Build. Build. Build. Fight ad blockers. Do you know a company that has ad blocker in companies that has more than 10,000 employees? No, half a dozen. No one knows a company that has more employees with ad blockers in the image. And large, medium-sized companies. There's no brainer. It turns on the internet graphic. People don't click on websites ad blocker, and there's something for the mental hygiene. And you're about to get rid of 80% about browser malware and you save internet costs. And people pay less money. People don't spend that much money. So, therefore they don't need that much money than the total brainer. The reuse. We have had backdoors in model systems. Juniper was backdoor recycling. There was a backdoor in it and changed a few parameters and just recycled a backdoor. Very environmental friendly resources. You don't have to put that much developers to it. The NSA thought there was their backdoor and then suddenly turned out there was someone else's backdoor. It writes it for someone else, for myself. So the reality delivers examples. So you say you can't really lose the crypto wars because if something, that what happens in reality, has some relevance. And then you have a look at the current presidential campaign in the U.S. and then, well, you know. Das hatten wir erst als Geschäftsmodelle für 2016. So, first thought that we had this business model for 2016, Crypto Trojans as a service, but it's already there, already exists. It's already 10 and ready, so yeah, there's not much to do. One of the positive trends is that the large companies, except for Apple, that also search for bugs and other companies. So if people click less web, they click less. Sorry. So Google and Kau, can you please just fill this up? Okay. I heard the rumor in between that Microsoft was only now daring to get involved because they want to have a market share, too. Right. A gold mine, the hacking team leak. Those that would like to see what is in the arsenal these days, look at that. Have a look at this. Rohamma, do you remember what Rohamma was? You do. Rohamma, you can influence memory cells by using neighboring memory cells, and that was interesting. We always knew that there are nice things lurking in Hardware, but the way that could be used, that was kind of funky, and surely there's more to come there. And this is how we exit from this, right? This is just the amazing thing. That was this. We give you $50 every month if you have this box and put it into your network at home. That looks very serious, very respectable. What could possibly go wrong? And you then think $50, they want to come up with plus a box, plus shipping, helpdesk, helpdesk probably, that just won't calculate. I mean, they steal your credit card, $30, they steal the logins to Minecraft in those games. What's that worth, another $30? And that just pays for the box, not even the first monthly rate. So, it doesn't calculate. I think they just won't give you those $50. You think so? You think they won't give me those $50? No. Well, perhaps they say, well, it didn't quite work, but plug it in again at your company office. Yeah, very clear. Did you receive the box? Could you put it in your network? Okay, we'll have to wait a week to see it work, and that's when we'll send a check. Two weeks later. Well, the check hasn't arrived yet. Well, okay, leave it in there. The check's in the post. Then, sorry, we know just, we could be, we were able to speak with the box for a short time, but your internet is so bad, you should call your internet service provider and then perhaps plug it in the company, la la la. And finally, then you have those millions of phishing transfers. But you have a nice little box. But some people are trying. I'm really astonished, wow. Okay, we have seven minutes left for the whole of next year. So we'll have to overwrite, overrun a bit. So the evil hardware category, which of course is the same thing as software, we did talk about last year, we did talk about the fact that devices are so, that are clearly too cheap, for which there has to be a second monetization scheme. So, these things phone home and then give the user's data back. That's just a start, though. Because by now, with these huge devices, of course, you can involve several parties. Let's think of a notebook. You have the people that buy, they build the hardware, the ones that build the interface, the firmware, the operating system, build the graphics card, and all of these build in their own phone home service. And just think of smartphones, if you have standard phones such as Android and put in a few apps and leave a client running around for a while, then the data plan is empty quite quickly. And that's the way it will go with our beautiful Internet of Things. Now, this development, which is inevitable, of course, because somehow you have to win the price wall, coupled with other things such as this, probably devices from Java. There are people that printed this, printed the sign out in A3 und hung it outside for Halloween. What's the thing circled in the graph there? Credit card. So, this is all taking place on several levels. This is not patched. There is no update function. So, there's only one thing that can result from this. The Internet of Dust Catchers. Those are those old boxes that really catch dust and put on a layer of ancient dust and you then find some things in the bit where the DSL arrives. The good news here is the power of Ethernet is not something that people in the Internet of Dust Catchers can do. And these adapters are so bad. They all died too quickly or they cause a fire. I was talking to a fireman the other day and asked what are common causes of fires at home. Well, the typical thing is kitchen, Christmas tree, children playing with fire. And then in fourth or fifth place catch fire and I have a suggestion for the Internet of Dust Catchers. Evil networks, net neutrality. We don't have that anymore, not really. So that was that. And it will get worse before it gets better. If software defined evil in your Computing Center, I think you are having taking too much of a negative view there. Can you do dynamic segmentation here or whatever, everyone can. Also, you have more things to patch, right? Right. Genau. Well, this is reality. In Germany now with this refugee ID card these people have become the better testers for what the government is going to become. One card for using all kinds of government services has positive upsides and downsides. The interesting question is where the upsides, the potential upsides are the necessity to have a million or more people go through the education system because this is the only chance that may lead to positive things happening there. I am very much interested in what's going to happen there. Was bringt es zu den Employee-Citizen-Life-Cycle-Management-Topic? Life-Cycle? Auf einem bestimmten Level, ja. Wenn das Lifestyle nicht korrekt ist, dann wird das Lificycle zu short. Ist das Soilengreen am Ende der Chain? Ja, wir sind vegetarierend, sonst machen wir uns kein Soilengreen. Was macht sie aus, ist, dass sie sich als Zitizen wählen wollen. Die Frage ist, was kann das Kopie des Staates für die Employee-Life-Cycle-Management tun? Das ist nicht nur ein negativer Punkt. Es gibt auch sehr interessante Papers von Leuten, die sagen, dass ein Employee in eine Komponente enthält und ein Staates aufhört. Er soll sich selbst oder sie selbst nicht befreien und fühlen, auch wenn sie gehen. Da muss man mal sehen, was in Firmen, was möglich ist, in amerikanischen oder englischen Strukturen, was unterschiedlich ist, was man sich für Zitizen benutzen kann. Da ist ein bestimmtes Wastetag. War es ein Artikel, dass du in Weihart über Web-Services oder Facebook-Stream oder Twitter handelst, und sie profilieren für die Domestikspfähigkeit, für die Leute, die dich von e-Mail schifft, die dir dann eine Suggestion geben, wie man das antwortet. Das ist, dass man mit zwei kurzen Ständen, zwei Ausgleichen, für das Zuhause, für die Zuhause, neue Geschäftsmodelle, Automatöne, Ethik-Experts, die für die nächsten few Jahre philosophische Inklination, für die überleichtete Verstärkung. Man kann sich von einem bestimmten Bullshit-Talent verraten. Das ist ein Fritz, erlaubt zu vertrauen. Diese sind große Fragen. Diese Leute haben dieses Autonomous Vehicle. Also diese lustigen Konzerte? Und dann die andere Frage, diese sind einfach Drama und die Frage, ob du jemanden auf der linken oder auf der rechten killst. Given das, dass du einen höheren Antwortstang hast als die Menschen, die die Frage haben, wie viele Menschen in Deutschland trafisch sind. Alle zwei Stunden, ne? Alle zwei Stunden, ne? Ich glaube, 3.000 in einem Monat? Ne, ne. Alle zwei Stunden. Ich glaube, es sind etwa alle zwei Stunden. Okay, so. Es ist ein Li-Wei da, aber nicht so viel. Und dann gab es Honepots, Honeenetz, Honeetrain. Da gab es Honeetrain. Einen, der simulierte Honeetrain auf der Internet. Und dann sah man, wie das attackte. Und dann gibt es diese lustigen Konkurrenz. Und dann gibt es diese lustigen Konkurrenz, die du zum Internet linken kannst. Oh, no, they are all real. These are all the real power stations, nuclear power stations. Don't ever believe that these are simulations. And steelworks simulators. I'm sure that's the excuse of those that broke one of those last year, right? And then there is the simulated company. We had secretive researchers that complained that the companies that were attacked didn't publish enough about this, the way the attacks took place. And the response was there was very busy and that won't help them. Just simulate your company and look how that is attacked. Okay. Right. So, ToxFox for hardware. ToxFox has an app from the faculty of Germany. You can have a kind of barcode and then the app tells you what if you should eat it or not. Oder war es nicht mehr so schmiert ihr das nicht ins Gesicht? Put it in your face or something like that. And it's crowd sourced. So, you can upload the table of contents. It's great features and stuff. And you can write an e-mail to the manufacturer and take this out of your stuff. And we need that hardware. If I wanted to buy a pacifier six years ago and I stood there in the shop. I didn't understand why one company was sold out and the other one was for that. It came out and there was BPA in every other one except for one. And you don't need one at your electronics store. Oh, the router doesn't have a firmware update anymore. I'm not taking this one. Das ist keine Selbstverteidigung. How do we want to survive the next Christmas? Ich geh's dann durchs Heim. Okay, lassen wir das weiter machen. Trendsport, reversing firmware, that's a new unboxing. You know the videos where I bought this, my new gadget. I have to celebrate this by unpacking it. The hacker asks, why is he stopping now? Where's the screwdriver? Das ist das. Das ist, was we want to see, YouTube-Videos, where they continue, where the unboxers stop. Unboxing. You take this screwdriver, pentalobe, and the JTEC is here at this point. And then you put this on there. And then you take these per script and put them to that. And they exist, but not enough of them. And get that one. Coupling dating bots. Ah. I thought about this before. Like this. Take a dating portal, portal B, and dating portal B. And then you put there, I talk a lot of people dating books and then couple them. And it scales. Also meine Vermutung ist, meine Vermutung ist, dass es wahrscheinlich auf die Art und Weise am ehesten Schwarmintelligence entstehen kann. I think that there could be swarm intelligence coming out of that. This is my assumption. I'm not sure if you agree on that. But yeah. Silicon Valley versus UK and China. And the tech companies deal with the British and the Chinese and the Americans. The China has this law. The UK has this. We have been, this is going to be interesting. But I want to tell the activists in these countries, go to your representatives, tell them, listen, if you're, if you. Der nette Mann vom Geheimnis stehen und dir dein iPhone wegnehmen. Damit leben kannst, kannst du dem Set zustimmen. So tell representatives, like if you agree to this law, the guy from the Secret Service on the way out of this parliament, they're going to take your iPhone away. And if you can live with that, then it's okay. Then have a look at the next year or the next, the following. A company like Apony, that positions itself very, very strongly. The question is how they act when the British say all the crypto in Britain has to have a backdoor. If they go and say, well, oh, we can't sell you iPhones anymore, that's bad. Don't close down their companies, because they can sell Max and stuff, and a couple of TVs. And we have to, had to get rid of a thousand appareas, you know, make a number of languages. And that's the left variant. They can, we think about different levels. If you turn on the iPhone, you know, it asks where you live. And if you say you live in the UK, it says I'm going to have to turn off all crypto. Are you sure you're living in the UK? That's another variant. And if you want to click on Ireland, if you click on Ireland, it's going to be English too. And the Manhattan-like project that Hillary Clinton wants to build backdoors, the assumption was that Trump also said something like that. We called Bill Gates and all the important people and talked to them. And then we defined a Manhattan-like project, not in order to shut down the internet. Lock the doors of the old one. Maybe they want to put a lock in front with keys. It will be interesting in the next year. We wish you have a lot of fun with the machines and have a happy new year in 1984. Thanks for listening. This was Julian and Sebastian. If you have any kind of feedback, please use Twitter and write us at C3lingo, use the hashtag C3T. Let us know if you listen to the talk in English. Just write something. Thanks for your feedback. We love to hear from you. Goodbye.