 Welcome, and thank you for joining us for the last Lightning Torch today. I'm Zee Fischer. Tsetafil is not here any longer, but she still did most of the organization. The Lightning Torch will also be streamed and recorded. So as a note for all speakers, you'll be live on television. For the audience, if you have questions, please step up to the microphones to ask them if there is any time. We have this nice clock here, which shows the five minutes, which are allotted for each Lightning Torch. The first three minutes, it's green, then it turns yellow, and for the last 30 seconds, it turns red. And so you can see if there's still some time left. The speakers can also see this. Yeah, for the speakers, if it's your turn to speak, please come back behind the stage and just switch quickly with the next speaker. Please tell me to advance your slides. I have your slides here on the computer, and I can advance them for you. And I think then we'll start. And we're going to start with Tom, who's going to be talking about repairing Apple Chargers. Hello, Tom. Thank you. Hi. Yeah, next slide, please, since we have only five minutes. So there is a well-known Apple charger problem that's going on for years, mostly with the older Apple Chargers from the first generation. And there's actually a pretty simple formula for that one. It's just you take the lousy cable quality, which is the worst thing, and plus a wrong tie-up, which is also suggested by Apple themselves. And you take those two, you add them up, and you do that times sometime, and then eventually it will look like you can see on the screen. So that is a well-known problem. So next slide. And then there is also the charger solution problem. So how can you open a charger in a nondescriptive way? As you can see on this picture, this is a picture from iFixit, and they use a screwdriver to pry it open. As you can imagine, afterwards it looks like crap. You should also know that a new charger costs about 70 euros. So it's quite expensive that you always need to buy a new charger. So next slide. You can see another way to open it. And over here, this side suggested just take a pair of pliers, put it in between, and try to force break. But that's not easy, because most humans don't have a third hand to hold the thing while you try to open it in this way. So yeah, there has to be another way. Next slide. So that's why I made up the Apple Cracker, and it looks like this. And it's actually a small jig, and I have someone from our Hackerspace Quinten, and he will walk around so you can see it in detail. So it's actually a small device that you can use to open the device. So next slide, then I'll guide you quickly to the process. First you cut off the wire, yes, next. Then you put it in the cracker. As you can see on the picture, it has some cutouts on the back. And these cutouts, they fit precisely into the edges. So that's enough place for the force. And then the next slide, please. Then you turn the bolts with a wrench, and this way, next, please. You see that it slowly comes open, and then the plastic clips, they come off. And then next, hop, and then it comes more force open, next, next. So then you can open it by hand, next. Then you cut off this piece, and you need to clean it out on the next slide, next. And then you put the cable through, next. And then this is the distance that you need, next. Then you prepare the heat shrink, as you can see on picture one and picture two, next. And then you clean up the circuit board by pulling out the rest of the wires while heating it with a soldering iron, next, please. Then you resolder the wires on the circuit board, next, please. It's almost done, you see. So now you put the little plastic thingy back, and you take a tie wrap, and you put it behind to pull it on the cables as a sort of a force, yeah, just a small protection, next. You put it back together, and you can glue it back up with PVC glue, for example. Next, please. And then you add some clamps for a while so that the plastic can dry. And then in the next step, it will be finished, hopla. So I believe this is the last slide. So thank you. I have about 20 chargers up to now that I repaired the past year. So if you do have an Apple charger with you, with the problem, and you want to repair it for yourself but you want to pry it open in a proper way, then just come by the hardware hacking area, which is also the Belgian Village. I'll be there from after these lightning talks, and I can help you open it, and then you can do the repair yourself. So, any questions? Thank you. Next up is Vera Wild talking about the dark web. Good afternoon. My name is Dr. Vera Katelyn Wild, and it's my privilege to be here with you today at Chaos Communication Camp 2015. Thank you for sharing these words and times with me. I'm here to propose two interventions to resolve the paradox of discretionary power in the age of mass surveillance. The paradox is that we know all sorts of reasons why centralized discretionary power can be dangerous. But we also know that decentralized information systems produce the most efficient aggregate outcomes. This is why markets work, it's why democracies work, and it's also why the internet needs to remain free. The two interventions have to do with rebranding the dark web and distributing art and information security kits around the world. The rebranding of the dark web that I want to propose is that we call it instead the EDIR or other web, which is an acronym for Express, Descent, Teach, Resist. These are the things that people are free to do on the artist formerly known as the dark web. By express, I mean things like people who have nonmajority sexual orientations are able to express themselves there. They're also able to descent, for example, in places like Iran where being homosexual is punishable by death. They're able to teach, for example, Christianity in areas that are perhaps Islamic State controlled where that would be, again, illegal and punishable by death potentially. And they're also able to resist. So a lot of people know that internet activists use the internet, for example, as part of the Arab Spring to fight brutally repressive regimes. What they may not know is that the governments then figured out that they could use the same tools to track down and kill those activists. And that's something that, for example, the Assad regime did in Syria. And it was very important for the same activists to then have alternate networks to go to, to have an other or other web space to work on, to continue working for freedom. So intervention one is that we just stop doing other people's PR for them by calling it the dark web and instead call it the other or other web. And intervention two is that we create what the fuck butterfly kits or art and information security kits. What the fuck butterfly is a term referring to the way that the butterfly or the symbol of chaos, which is modeled in formal game theoretical terms as a butterfly, a Lorenz system, is able to shape global security in the way that narrative shapes material conditions. So the same conditions with a different story can, in a sense, narrative can turn a mistrust spiral into a trust spiral. So examples of what the fuck butterfly is throughout history are people like Gandhi or Martin Luther King Jr. or Rosa Parks, who through nonviolent resistance have used the power of story to change material realities in powerful ways. And we want to support proper information security by distributing tools like the CIJ handbook, handbook for information security for journalists, which is on the CIJ website, distributing that and other information security tools like Tor and PGP encrypting on a USB drive along with free books. For example, a library of Liberty, Shakespeare, the Bible, the Quran, just truth and beauty on a USB drive along with some tools for making art to support what the fuck butterflies around the world doing their work, helping make the world feel safe to flourish through art and information. If you want to get in touch and talk about these ideas, please contact me after the talk. My email address is wild as an Oscar and thanks for thinking at gmail.com. Thanks. Thanks. Next up is Nikto talking about decentralized package signing. So I would like to share a few thoughts about how the package signing works nowadays in Linux distributions or some other distributions, what's wrong and what can be improved. Slide, please. OK. So nowadays, you have typically some distribution, I don't know, Debian, Centos, or something like that, or even Redhead, or things like that. And you have some central server that's signing the packages. As a client, you have imported the key of the server, the public key, and you can verify each package if the signature is valid. And you download the packages from some mirror, and for each package, you verify the signature. This is OK. Let's go next. The problem is that if you have a really strong attacker, like some intelligent agency or something like that, some I don't know, NSA, or Chinese, or Russians, or whatever you like, you can choose, then they may be able to somehow compromise the server signing the packages. Or it can be a technical way. You just hack it, or have some special exploit that no one knows about, or things like that. Or you can use a human factor. It's rare to have a people that have funds and time to do things voluntarily, so you can just insert your own people there. Or you can have a physical access somewhere. Or you can use some legislation, like some countries have very bad legislation. You just came somewhere, tell them, hey, give us your keys, or you will go to jail. And you cannot tell anyone about this. So let's assume that there is an attacker strong enough to do these things. They typically also have access to certificate authorities, which are not really authorities. So they can do the middle attacks on SSL, or men on the side. Slide, please. So how would the attack look like? Maybe slide, it's like that. So you have a client. You want to update your system. You click on Update. You download the packages from some mirror or somewhere else. The attacker, as we know from the Snowden leaks, at least, have some server near the backbone. So he can respond faster than the original server. They can break SSL in some ways. They have keys or so. Or even the SSL is not used. And if they have a key for signing the packages, they just send you fake package faster. Next slide, please. So what can we do to prevent this? One solution would be not to have a single server that's signing the packages, but to have a multiple server and use some multi-sign scheme, like, for example, in Bitcoins used quite commonly. So you would need, I don't know, five from seven servers or two from three, or just pick your constants. And you can put these servers all around the world. So you at least can prevent legislation attacks. Like, you can force someone in US to give you the keys. But the same attacker won't be able to do that in, I don't know, Russia or China. And vice versa, the Chinese can force their server to give them a keys, but not the US guys. So the idea behind this is that we are not strong enough to fight the very motivated agency or something like that, but we can let them fight each other. So, yeah, and they are built for exactly this, so they know how to prevent others from getting the things. And so, next slide, please. So, yeah, instead of having one single server, you just go all around for signing each package. Next slide, please. Yeah, it would be slightly slower, but just minimally. Like, when you compare it to shell things that are happening when you are updating system, it's completely nothing. It's a little bit complicated to implement, but once you do it, it should just work. And, yeah, that's pretty much it. So if you have some questions or nothing. OK, no questions. Thank you. Next up is Victor Nomad talking about Coder Coder. Whoa. Yeah, prepare for this. So hello, everybody. I'm going to present a bit of a project I've been working for two years already. It's an open source framework for Android, but it's a bit different than the normal things. Next slide, please. So I guess many of you try to do things with Android. Basically, if you haven't done anything, basically, the way of starting to do things with Android is like this. It's like, let's start with a normal tutorial. Next slide. So the first thing is you have to download Android Studio. Next slide. Then you have to download Java. Next slide. Then you have to download the SDK. Next slide. Oh, yeah, yeah, yeah. Then basically, you have to grab the source code that they provide you in the tutorial. Next slide. And then you have to grab the XML for the layout. Next slide. And then, basically, you have to press Play or Compile. Next slide. And then you have to wait. Next slide. And then you have to wait more. And at the end, you get software. But next slide. I think you went one further. Yeah, the previous? Yeah. So I think it's a bit old-fashioned, this way of working. And I think we can do things a bit better. Like, we are in 2015, so we can do things in a different way. Next slide. So I created Protocoder. Next slide. Which basically is just an app that you install in your phone. And the app has absolutely everything you need. And then, basically, it has a kind of micro cloud. It has a bunch of servers that you can access through your web browser. And then you get a full web IDE that it doesn't go through internet or anything. It's like, basically, you store it in your phone. You can write any code. Next slide. And I give you an example here, please. An example of how you write code in Android with Protocoder. So it's basically JavaScript. It's really simplified everything. You don't have to write this really verbose code that usually you have in Java. And just to let you know how it works, I just added two more lines to that thing. And you can do it like this. So it's basically, for me, this is the hello world of Android using Protocoder. It's like four lines of code, and you have something like this. Next slide. This is how it looks. Or it used to look, because now it's a bit different. But you have an app where you have all your projects, examples. In the other side, you have the web editor. Next slide. It comes with a lot of libraries already. So you can do network operations. You have web sockets, HTTP requests. You have OSC, open sound control, if you don't know it. MIDI support. You can plug an Arduino to your Android phone. And with two lines of code, you are starting to communicate with it, which is really awesome. You have Bluetooth, Bluetooth 4 support. You have pure data. I don't know if you know pure data, but it's a really awesome sound engine. You have processing. It's a fork version of processing, which is this visual language. Next slide, please. Just to let you know, Protocoder is open source. It works with JavaScript, but it doesn't work in a web view. Basically, it runs with Java, but it has a interpreter, which is a Mozilla Rhino. It doesn't use cloud. I don't like clouds, because basically you give your data to another people, and then I prefer to have this kind of micro cloud. Here with you, you can code with USB, with Wi-Fi. You can code from a computer or from the device itself. Yeah, next. And if you want to check it out, you have the website, you have the repository with all the source code. I'm looking for people who want to go with me in this adventure. And if you want to have a chat, you can contact me or have a chat after this. Thank you. We still might have time for a question, if there is one. Any questions? No? Great. Dan, thank you very much. Next up is Becher talking about his wild village adventure. Hi. My name is Vesna. This is my ninth large hackers' camping conference. Since 97 in Holland, I only missed one of the German CCC camps. And one of the things that I like the most is the lakes or the forests that were around the camp. So then I thought, well, why don't I organize my next hackers' conference myself? Next slide, please. So I'm here to invite you to my village in Croatia and to come and have an adventure there. Next slide, please. So it's going to happen next year. It's kind of strategically positioned between the CCC camp and Dutch camp, which is going to be in 2017. And it's part of the larger story. My long-term goal is to create the intentional community of hackers and the people who like nature that would like to move away from the cities, but still keep the spirit of urban exploration and finding alternative solutions. And so this is going to be one of the small first steps to get there. So the village is in the mountains. It's in the middle of nowhere. And I want to spend two or three weeks there, so the plans are not really solidified yet. And what's going to happen there? Well, everything from just being there to the unconference to building a sauna to any project that you introduce or having the wireless mesh network. Next slide, please. This is how it looks like. So we've been there last year to see basically what is there, and it's really wonderful, although it actually needs quite some work. Next slide, please. So if you join, you can camp there for free. And there is actually an old farmhouse and the other one from the neighbor. And there are stables and kind of old workshops, like actually very much like here on this place. So with the heavy wooden table, with wrenches, and like old fashioned tools, and so on. And in one of the houses there is actually a kitchen and a bathroom, and there's electricity and all kinds of facilities. But not everybody can actually stay in that house, so we will have to camp. Next slide, please. So this is how it looked like when we were there. It was already a small family reunion gathering with like 15 toothbrushes together in the bathroom. Next slide, please. And so what can we do? Well, we can have an unconference where people teach each other things. We can collect wild food and the herbs, the healing herbs. I'm a bit of an amateur expert in that, and I can teach people about it. And then there are all kinds of self-sufficiency things that we can practice while we are there. And also enjoying nature by itself. So walking around, meditating, doing yoga, it all depends on what kind of group of people goes there. Next slide, please. So this is an image of what can you expect. There is wonderful water there, mushrooms, strawberries. Next slide, please. And this is where it's located. So it is in Europe, but just barely. And these are other activities. So they're kind of close to the birthplace of Nikola Tesla, but the electrical installations there are a little bit old fashioned by now. Next slide, please. And these are the contact details. And I will leave you with the last slide if you just move on to the picture of Cuddley squirrels, because that's the most motivational thing that there is on the internet. And if you have any questions, there is still some time. Already are. Slides are already out. Thank you very much. There's one more question, I think. How big of an audience do you anticipate for this conference? 20, 30, 50 people. OK, thank you. Next up is a talk about the faces of hackers. Oh, it gets cut a little bit. Hi, my name is Matteo. Since 2005, I've been taking pictures of hackers all around the European events. You may have seen me in the last camps, because I had this huge light with all the bulbs in it. Maybe I've taken a picture, so a picture review. I'm presenting a project that will be a Roman exposition. The name is Lombrosi. Next slide, please. Cesare Lombrosi was a criminologist of the 18th century. It theorized that that could be something like a born hacker, sorry, a born criminal, pun intended. And you could spot out different type of criminals by imperfections and by biometrical traits. So you could have the eyes of the murderer, the ear of the thief, the nose of the swindler. I know that sounds crazy. It has been used in 18th century over and over to find out criminal and supposed criminals. Next slide, please. So in 1889, he published a book. The name was The Man of Genius, in which he theorized something that is even more weird. Genius was a type of insanity. And it could be passed to your children. And he did this very extended research on type of faces of geniuses from his time. So next slide, please. I'm a turn. I've been shooting hackers with a camera, only with a camera, since 2005 to find out if there is some sort of common trait in the faces of hackers from all around the world. Fun fact is, aside from being generally awesome and aside from a general diversity and beautiful diversity, there seems to be obviously no common trait. So every single time you depict a hacker in a certain way with a certain hair, with a certain type of physiognomy, you're doing something like stereotypes and that's all. Aside from being a little bit more male than female in the year. But that has changed, fortunately, since 2005. Even the portraits that I've got in the different events are more female-friendly than the first ones. And that is good. You have no common traits. Next slide, please. That's me. Another one, please. So how extensive is the collection? Almost 8,000 pictures of 13 events. More than 8,000 kilometers traveled to take them. And I've got, well, right now the figure is close to 600 different faces. I think I've got the second largest collection in the world of portraits of hackers. The first one is supposedly in the NSA, but I can trust it. Next slide, please. You see, there is some common trait in the faces of hackers. Look at the eyes. You're very bad persons, you know? No, the eyes. I'm not kidding. As long as you will look at the photos, there is a website. Go in the website and look at them. You will find out incredibly curious eyes. The fact that characterized all the hackers that I've met into these 10 years is the extreme curiosity. And it reflects even on a portrait. I'm not a good photographer, but they are awesome people. Look at their eyes. Take another pic. Look at this guy. He didn't have sex with a smurf. It's only a color-ed bird. His name is Dante. He's one of the fellow in Hermes Center. I'm one of the founders myself. Go talk to him. He's a quite amazing guy. Next one. Some of us hackers are beautiful. Here is one example. My one is not so beautiful, so I use that one instead of me, because it's far better than I can be. OK, next one. All photos are released in Creative Commons. Next one. I'm all the people. Next one again. There will be a roaming exposition. I'm starting in Rome at the Maker Faire. And there will be another one in Expo 2015. Ask me to host it. I can send you a picture. You can choose the picture and present them at your location. I can even do pictures of you. Next one. The last one is come to get your portraits if you want. I will be at the Italian Embassy with this huge ring light. And go to the websites. Look at the fellow hackers. And just be as you are. I like every kind of faces. And we are collectively awesome. And I think so. Thank you. Thank you very much. Next up is a talk about OWRL. Hi. Can you hear me? No. Can I hide? No, it's OK. OK. OK. OK. OK. So my name is Olivier. I live in San Francisco. And I'm mainly hardware. So that's my first time at the camp. And first I want to say that I'm amazed by the camp and the people I have been meeting. I think it's a lot of energy. And it's really great to be here. So today I'm here to show you a project. So we are doing hardware. We are doing hardware for customers. And every year we are trying to do a project that we think is very important. And as a hardware person, we wanted to participate to the privacy issue. So we wanted to do a computer which could bring more safety for people to develop software on top of it. OK. So if you go to the next slide. So we designed this computer, which has two keys. And basically you cannot use a computer unless you have a key with you. So this is the prototype of the computer. And I can show you that after. So to use the device, you are using a key. If you are next to it, so it will not start until the key is presented. If you are next to it in 10 meters, you can work with it. If you are 10 meters away, you log out. You have a lock screen. You cannot access it. If when you are log out, somebody moves the device or walk away. We wipe all the, sorry, we shut down. If somebody tries to open it, make a hole, or disassemble, or do side channel selection, or whatever, we will erase all the keys, including the SSD keys and all the credential keys. So next slide. So this is a real computer. There is inside x86 platform, Skylake. There is an access point, 802.11. And there is also a secure microcontroller. We have USB output for keyboard and accessories. And we also have an HDMI out to put a screen. Next slide. This is what is inside. So this is really an x86 platform. And I can show you that after, which is fully secure under a shell with a dynamic mesh. And I can also explain the details later. So the device will erase all the SSD keys and any credential keys if it's tampered or frozen or trying to be opened. Next slide. This is how it's made inside. And I can show that to you. So it's really an x86 platform with 248 gig. And there is on the back an SSD slot where you can put up to 512 gig of SSD slot. The key is encrypted with NFC on Bluetooth. And I can also explain how this is done. Next slide. That's the basic architecture. So I just want to highlight this is three components. There is an access point. There is a secure controller. And there is a full computer. And the goal is really to be able to make sure that you can trust the computer. We designed that mainly for ONG journalists. We want to bring any kind of hardware security to people to put any kind of software they want on top of it. So our goal is to do that open source on open hardware and let people do whatever they want. And I've been talking with a lot of people with different ideas. And I'm looking forward to hear more from everyone. So we are trying to find some key project to support. We will open all the different technical documentation to enable people to do development on this. So if you have any good idea or something that you want to develop, please come see me. And I can give you more details. Next slide. That's where you can contact me. And we've put some basic specification on the website. We are currently in prototype phase. So we don't have that many units. And we are trying to go to the next stage to try to focus our activity on this and try to participate to any privacy improvement. We think we can help in the hardware. I cannot do much in software at all. But in hardware, I think we've done an interesting job here. So that's it. So I will be here. And I'm also at the French Embassy if you have any questions. Yeah, that's a question. Hi. Thank you for your presentation. Did you get in contact with another project that is working on open design hardware called Crypt Tech? No, I'm interested to know. It's crypttech.is. We can talk later. Thank you. I'm very new to the community. So I've tried to meet a lot of people and tried to understand. But please, I would love to learn more on another project. Thank you. Thank you very much. Next up is someone who we've already seen yesterday. That is Steve 899 talking about peak level performance. Thank you very, very much. My name is Michael. And yesterday, I was on this stage, actually. And after this talk, I have another slot. So bear with me a few more moments. This is my nature. I love to be in the spotlight. And the CCC is for me a great learning experience. I learn a lot. And I just realized that mind is a very plastic matter. And just as we sent space shuttles to outer space, we are able to observe galaxies million light years behind. However, we haven't built a microscope into our brain. We know relatively little about how our brain works on the intermolecular level. We know about, say, dopamine, some neurotransmitters. But there has been a very, well, not to my knowledge, there is no microscope into the brain. And I know that certain, can we go to the next slide, please? Basically, human brain is very plastic. We have enormous capability to improve our performance. And as I was experiencing this camp, I realized that I should improve the quality of my breathing, that my lungs should absorb more oxygen. I should improve the quality of my running. If I run quickly, I can able to do more stuff. And also learning, absorbing the knowledge and communication protocols, because we are from different cultures, from different backgrounds. We come from different places. And this is the place. If we learn how to communicate between each other, this can be a major shift. For instance, next slide. For instance, we don't talk about sex, drugs, and money at school. I wish my children were taught how to talk about sex, drugs, and money. This is nothing evil. This is part of everyone's lifestyle. Well, basically, we need to improve our communication. And the project I was talking yesterday, the Genesis RE, it is a long term mission. And I would like to look after my body and achieve 150 years of lifespan. I am pretty sure it is possible. Just looking at the technology progression in the past decade, the first iPhone was released 10 years ago. And we put man to the moon in 60. So basically, with the medical progress, I am pretty sure that 150 is a very conservative estimate. By the time I'm 60, it will probably expand to 200. But this is just a wild guess. And just like another mission of Genesis, this is a very, very long term vision, is the survival of the human species. Because we, as a planet Earth, we are a little bit in danger because of the global warming, because of what happens if the meteorite hits us. Basically, if we, as a humanity, want to survive longer term, and I mean longer terms on a cosmic scale, such as billion of years, not like last 200,000, we need to spread out. And one of the reasons of the Genesis is actually to put systems in place that will allow us to live after we spread out. I know this sounds completely crazy. I know that I look like nuts to you. I'm very well aware of that. However, I am able to connect the energy from the cosmos, and at the same time stay grounded. And if this is not a place, there is no other place on Earth I could freely speak what I really think. Next slide. I'm actually not asking for anything. I have all the resources I have. I am actually speaking with my mother who is supporting me. And basically, it's about the journey. Once upon a time, I achieved a goal. And after achieving this goal, I became depressed because there was nothing else to go. This time, my mission is the survival of the human species. And even if I'm, say, 80% completed, it is still a fairly good goal. And there will be perpetuating. Visit the website genesis.re. Genesis as in source, origin, beginning.re as in restart, renewal. Press the reset button and start something new. Thanks. Thank you very much. Next up is a yoga presentation also being held by Michael. Was it right? Michael. OK. Please get your microphone as close as possible. OK. Take your jump. Take your jump up this way. That's the right distance. All right. I do some yoga. And within the next five minutes, I would like to show you and teach you a very basic sequence. It's called the sun salutation. And whenever you go to a yoga studio, this is the opening sequence because this is just a warmup. And regardless your physical level, you can do this. And I actually encourage you to find some spot and practice with me. If you feel adventurous, if you want to try something new, there is plenty of space in the hallway, plenty of space in the corridor. I encourage you to follow me. Right now, I'll just put the microphone aside just for a few brief moments. And I will demonstrate it to you. And you will see that there is nothing really exceptional. Anyone can do this. As you see, it wasn't anything that special. This is a very basic sequence. And regardless the place where you go, whether it is because there are so many different types of yoga and one may just contemplate which one is the right for me. In reality, it doesn't really matter. It is about the journey. It is about the progress. I started doing yoga because I had some back problems. And as I see people at the camp, it's like most of us sit in front of a computer for an extended amount of hours. And in my personal situation, it just is helping me. I become more efficient. I can work more efficiently. And basically, I highly recommend you to try out. And probably you've already seen me enough. Can I actually finish earlier? Is there anyone next in line? Maybe any questions from the audience about any of the two talks? It doesn't look like. Thank you very much. Then thank you very much. And next up is Algruldor, if he's here today. He wasn't here yesterday, unfortunately. Algruldor, are you here to talk about the food taken base? That would be great. Looks like we also don't get to see this presentation today. Maybe I could play PowerPoint karaoke with the slides, but I'm going to spare you. Then maybe Manuel Klaman is here. Yes, great. He's going to talk about something with climate change. Yeah, better. OK. So hi. My name is Manuel Klaman. So did you know that 30% of our greenhouse gas emissions originate from our food consumption? This is really massive. Everyone, thank you. Everyone can cook, but do you really know how much CO2 is actually in single ingredients? I got intrigued by the question, how can we break down these complex matters of climate change into simple little steps that everyone can follow? Please put your microphone close together. I'm just going to put it in. No, you can hold it in your hand. That's OK. Or I give you? It's fine. OK. Thank you. How we can break such a complex problems into little steps that everyone can follow. That's probably also why I fall in love with computers when I was really of small age. I fell in love with the idea of creating actually artificial intelligence. And there was actually a vote in my school who is going to be the person who will not get along with reality. And I got first place. I scored 70% of all votes. And get a guess, they were right. I not to get along with reality. When I was a small child, I had really the pleasure of a great childhood. We had nothing to worry about. I had enough food. I had enough safety. I could experience and learn everything from the world as it came along. I don't know how many people in the world have the chance. So sometimes when I think back at my childhood, I get struck by the belief that we're actually one huge big family and responsible for each other. And right now, bound by the constraints of nature, here we strive to actually make the decisions for the future generations to come. So there's this thing. When you look at CO2 emissions and food, there's actually the potential to reduce those emissions by 50%. And it's not just about CO2 emissions. It's also equally important about resources like water, oil, land, and so on. And they equally scale down if we reduce CO2 emissions. Just to begin, there's a method. It's called lifecycle assessment, where we can look at the specifics, what goes into the processes of food production, what goes out. And from there on, we can see what actually matters in terms of CO2 balance. So I brought an example. So there's a tomato. When we have it local and it's seasonal, then it's really cool. When we bring it from abroad, I don't know if it's Spain or something. It's a little bit more. But when we grow it in a greenhouse, it's much more this tomato, which becomes more interesting when we look at asparagus, which is also fine if we have local and seasonal or if we actually bring it in with a ship, which is really low on emissions. But it makes a huge difference if we print it in by airplane. There you see a huge peak, what actually that difference makes because of the airplane. But most importantly, when you look at animal proteins, you see there are a lot of emissions. This is basically from the methane emissions the cow emits. And we use also to produce milk. In the middle, there's the cheese. And of course, we grow a lot of feed to actually feed these cows. And that sums up that the really big decisions that we should make is actually start loving to eat more plants in order to do something. So this is also the easy takeout message. That first, start eating more plants, second and third, more seasonal and local to avoid greenhouses and airplanes. But what we thought is that we need to go a step further. So we thought about bringing all this data and making climate friendly meals, really having the convenience that you can go into a restaurant. Oh, I'm fucking out of time. That you can go into a restaurant and actually have a climate friendly meet at your convenience. So we started the movement. We called ourselves Eternity. We wanted to start a movement to establish climate friendly meals in society. And so there's the scientific method. This is a carrot. It has 33 grams of CO2. The specialty about it is that we actually collected, we started collecting a few years ago, every scientific publication that actually measures the footprint of different ingredients. We went to the university with this and showed it everything, got proof. Actually, right now, we're working together with scientists. So we have the ability to do these calculations really precise for every meal that basically gets served. There was still, this is our database. So there was still a challenge that we needed to convince our university to do actually something about it. So we got a team of people together to inform the public. So we finally could make climate friendly meals in our restaurant. And it was a lot of work, but it was also a great success day. The university at first forbid us to actually communicate anything to the public at that moment. But when we served the meals, the media came in from themself because they were interested in what we're doing. And out of 4,000 meals that were served, 2,000 of those were even climate friendly and chosen by the students climate friendly. There was a tipping point, because as we did this, Kofi Annan came to visit our university to talk about climate change and how scientists can do something about this and put it into application. And we got the pleasure to actually meet him and tell him about our project. And he basically gave us a pat on our back and said, hey, this is not something for our university. It is something really for humanity. And we should go out and tell everybody about it. So we took our guts together and we programmed the software that makes it possible that everyone can go on the software and put in recipes and actually see how much CO2 they have. And the third thing that we did is that we started going towards restaurant and convincing them to use our software to serve climate friendly meals. And right now in Switzerland, we have about 100 restaurants that actually do serve climate friendly meals. So I'm a little bit over time, sorry. Just to go a step back, it's really easy to cook climate friendly meals. My grandmother can do it. You can do it. It really connects us to the people that we love. And so my message to you, if we are able to eat climate friendly three times a week, we could save 1 billion tons of CO2 a year on this world. And there's nothing alike that affected. There's no technical miracle. There's nothing that we can do to actually challenge climate change so effective. Thank you very much. Thank you. Next up is Remy. Is he there? Yes, he is there. Great. Hello. I'm Remy from The Faced. I'm going to tell you something about our organization on our non-democratic organization. And then we're spread around a lot of countries. So I can speak Swedish and German and Dutch and English at the same time. So I choose to do it in Dutch. And maybe I throw a little Dutch and Dutch in it. The Faced organization is actually a pretty dictatorship. We don't talk about anything. And I think that's why the organization works so well. People say what, someone can be a member of the organization. You can't be a member. You can't ask. You're made a member and you listen to it. Then you're a member and a crew member. A crew member can decide things. It's just that you don't see that it's being felt out. Because you need cooperation from other people. Sorry. Subtitle. Oh, I don't know if it's possible here. Can somebody subtitle it? I'm not sure whether we have anyone who speaks in the translation chamber. No, we don't. I'm very sorry. The people in the train. When I choose someone from the public, you in the fourth lane, second spot, you may subtitle it. That's how the organization works. Er, we... Er, it's Dutch. We have a number of policies within the organization. One of the things is we have a website, we have a zip, we have an IRC. All those things are partially self-made, partially open source. All that is self-made, the power cannot be programmed. No rule code is written without you being drunk. It's only cooked when it's washed off. And I wasn't washed off. Well, that's how the organization works. I think the club is very well-known under the event. We're always chosen as you do that, you do that. That's our way of doing it. So we're happy with that. I think that's the most important thing about our organization. English word. Please do it in English again. Our questions? There's a question. What? What? What? I told something about our organization. Ah, okay. Other questions? There's another question over there. It may be the same. What's your organization doing? We agree with that. And I think we have time for another question over there. Can you make my lid? What? Or you can make my lid. It sounds cute, Billy. It's pretty fun, Billy. Maybe we can come with you. Well, yes. Sinterkerst. Sinterkerst. Where do you live? We often organize parties at other people's houses. I have a public service announcement from the translation booth. They need help. Oh. Yes, I can help, no problem. Yes, can you come to my office with you? With you at the party? You can go to the show. Yes, that's possible. Great, do it. Okay, there is a rule to the lightning talks. You normally have five minutes, but you can ask for two extension minutes. Yeah, well, the translator just came in, so you can listen to the two translated minutes under... No, okay. It's not the translator. I must have confused him. Well, when you're finished... Okay, then thanks very much. That was very informational. Okay, the last lightning talk for today will need a little technical setup, which I hope we can get done as fast as possible. Yeah, I'm going to do the video and you maybe do the network stuff with this switch over there. No need for networks, okay, but need for this computer. Okay, I'll just... Yeah, that's one basic problem of the lightning. Please continue, please continue. That's one basic problem of the lightning talks. You can't normally cannot switch devices and gadgets. That's why we keep it to the end of the talk, so this is the last talk. And so it might be possible, so please be patient for a minute. We are trying to mess up things as fast as we can. I don't use the effort here. So now there might be video... Oh, there's a graphical interface to each render. I never knew. Then a message from the video operation team. If you do such stuff, they really like it if you know your X render. Sorry about the wait. So, I'm going to talk about my hat. Actually, I want to talk about this, which is a... It is called InternetCube, and it is like a great thing. My... Can I... Yes, that's better. My first concern was... I didn't trust... I didn't really trust my... If you use a handheld microphone, please put your thumb up, put your thumb up like this, and put it right here. Now you have to write this, and you can move everywhere. Okay, so... My first concern was... I don't trust my ISP, and he knows everything I'm doing on the Internet when I'm connecting to it, so this cube solves a bit of that problem, because by plugging it to my ISP router, I was able to encrypt actually all the connections that were made, so it hides what I'm doing on my Internet connection from my commercial ISP. That's the first part, which is already quite awesome. The second one is what I really wanted to show, and there is on my hat the same thing, there is a server running on that thing, and you can plug it anywhere, and it gives you access to your data, to your websites, and to... Well, pretty much what you want. On the domain name you choose. So I'm going to connect to it on a very exciting domain name, I guess. That's me, because I'm very expert. Well, I hope it will work. I'm not receiving well, because the server is actually on my hat, so very expert is my hat, and obviously it doesn't work. That ruins everything. I'll be right back. You have two and a half minutes left. It's enough time to fix it. Okay, the thing is, I did not have Internet connection here. You told me before, but... I forgot. So my hat is broadcasting a Wi-Fi network, which is called BXcellent to this hotspot, and by connecting to it with a really strong password, I guess. Yeah, very expert in network, right? We are not Fry-Funk. What the fuck? Fry-Funk, gather. Okay. Ah, Fry-Funk. Well, they are friends, but, you know, there was broadcasting everywhere. Yes, it works. Now. So I'm connected to my hat, but I'm just connected to a random... a random access point here, at this point. Is it plugged? Yes, the network is active. Very active. So it's a 404 head not found? It looks like it, but it looks like a hard time-out so far. It's not good. I wanted to amaze you, but obviously, it doesn't work. Let's ping Google, which is always a good thing, right? Okay. And it's gone. Okay, so let's connect to a true network. Nice. Well, I'm sorry, obviously. I'm the last... Oh, yeah, great. You can ask for an extension. Yeah, I will. It's a live demo. I know it's hard, but it's because it's easy. No, it should be. We're at the last lightning tour, so we can bear with you a few minutes longer. Yeah. Oh, my hardware friend is coming. Oh. So I will talk to you about the second part, even though I cannot access you. My hat is containing all my data, which in a way is a good thing because it doesn't open to the Internet, right? And... So I have my emails on it. I have a very cool very.expert website, which is... it should be accessible at some point. And I can, yeah, receive emails in whatever at very.expert. And so, yeah, that was the second part. Now, you may wonder how we did... what we did in... how we did, like, a true plug-and-play server that you can bring home and just plug and you have your data on it. And when my friend is fixing the network, I can talk to you about that a bit more. So the InternetCube is a... how to say it... is a bundle of three things. A hardware part, which is like a small Raspberry Pi on a box with a Wi-Fi antenna. A software part, which is basically Debian with three softwares installed in it to handle Internet services like your emails and your emails and your... and your files and serving all that to the Internet. And a network part, a network part, sorry, is handled by local non-profit ISPs which I'm part of and which the Federation FDN is about. Thank you. Although you probably don't know what FDN is, but we have a stand over there we can explain. The thing is we are non-profit ISPs and we are... and we are providing network Internet accesses and the thing about local is that you can probably trust more your local ISP with whom you can drink beers and hang out than your commercial one. Yeah, that's about it. You wanted to say something maybe. You're five minutes out. Yeah, I'm five minutes out. Well, I tried the demo because very expert was a great side that I may admit. But you will have a chance at the Congress, definitely. We will reserve a slot for you. That's kind, thank you. You will want to try it. Oh, it works. Oh, yeah, it works. Do you want to see it? Come on, Internet, come on. This is the longest lightning talk of this time. Very expert. Should have prepared a GIF at some point to dance for me. Maybe you can try very expert on your... Okay. Yeah, 10 seconds. All right. Okay, I actually give you two more minutes. Oh, that's so great. Okay. Didn't work. I'm sorry. I do, on the other hand, have your slides in case you want to show them. Oh, yeah. Yeah, we can definitely show the slides in the meantime. Do you have them on there or shall I connect them? There's basically contact information, but not much about how it works. But, yeah, please do. Oh, you want to? And it's gone. So you have 55 seconds left. There are your slides. I didn't watch it. So, the slides. Yeah, you can go right to the end, I guess, because... Oh, yeah. This is the website where you can consult information about what the box is. And obviously, you can just ask questions at the end of the talk or at the FFDM stand, which is just a street over there. And I guess there's one more, no? Oh, no, that's the last one. And there is a mailing list, I would say. No, an IRC channel in which you can connect. What's about the network? We have, like, 10 seconds. So, thank you very much. Just try to go to very.expert at some point. It should work when we go back to the camp. So, thank you anyway. Thank you very much. And with this, we conclude today's lightning talks and also the lightning talks for this camp. Thank you very much for attending. And if you want to give a lightning talk at the Congress, please do so. Please tell us about your project or what you're doing in politics or any other thing that you want to have your five minutes of fame about at the Chaos Communication Congress in Hamburg. Thank you. Those were the lightning talks for this camp. So, I hope we all will see again at the Congress. And it was a pleasure to work with those guys who prepared the lightning talks, who did all the organizing, who did all the announcing, and also all the people behind the scenes on the video, on the microphone angels, the people in the translation box. So, I think it is more than appropriate to give them a big round of applause for this marvelous event. Thank you.