--- latest.xml 2007-12-21 15:56:08.000000000 +0100
+++ fahrplan_v0.17.xml 2007-12-23 22:45:04.000000000 +0100
@@ -8,7 +8,7 @@ <title>24th Chaos Communication Cong
<start>2007-12-27</start>
<end>2007-12-30</end>
<days>4</days>
- <release>0.16</release>
+ <release>0.17</release>
<day_change>10:00</day_change>
<timeslot_duration>00:15</timeslot_duration>
</conference>
@@ -58,10 +58,10 @@ <title>Steam-Powered Telegraphy
While we plan to present this lecture in appropriate dressing (frock coats etc.), we do not plan to give the audience a special dress-code. </description>
<persons>
- <person id="376">Ingo Schwitters</person>
<person id="1782">Sebastian Velke</person>
<person id="1783">SkyTee</person>
<person id="13">Jens Ohlig</person>
+ <person id="376">Ingo Schwitters</person>
</persons>
<links>
</links>
@@ -80,8 +80,8 @@ <title>Der Bundestrojaner</title
</abstract>
<description>Die sich nun Monate hinziehende Debatte um die heimliche Ausspionierung von Festplatten ist gekennzeichnet von technischen Fehlinterpretationen und politischen Forderungen, die wenig mit der tatsächlichen Leistungsfähigkeit von Spionageprogrammen zu tun haben und zudem grundgesetzliche Anforderungen ignorieren. Der CCC hat vor dem Bundesverfassungsgericht Stellung genommen zu den technischen Fragestellungen hinsichtlich des Schutzes des Kernbereichs privater Lebensgestaltung und trägt die Kernpunkte des Gutachtens als Diskussionsgrundlage vor. </description>
<persons>
- <person id="91">Andreas Bogk</person>
<person id="381">Constanze Kurz</person>
+ <person id="91">Andreas Bogk</person>
</persons>
<links>
</links>
@@ -99,8 +99,8 @@ <title>TOR</title>
<abstract>Die Vortragenden berichten über den Betrieb und das Abuse-Handling des Anonymisierers. </abstract>
<description>Weitere Aspekte werden erörtert: Was plant der CCC hinsichtlich Anonymisierungstechniken? Welche Angebote kann der Club Exit-Node-Betreibern machen, wenn sie das Risiko einer Hausdurchsuchung nicht eingehen können?</description>
<persons>
- <person id="243">Erdgeist</person>
<person id="7">Andreas Lehner</person>
+ <person id="243">Erdgeist</person>
<person id="86">Julius Mittenzwei</person>
</persons>
<links>
@@ -222,7 +222,7 @@ <title>A collection of random th
In this part of the talk I'll give a rundown of all the things taken into consideration for TCP fuzzing, and I'll present the preliminary results. This part of my talk is a joint cooperation with Dan Kaminsky.
* snprintf() corner cases
-The safe alternative !!1! or maybe not. snprintf() is kind of an oddball. Certainly it's better than it's older brother, but it does have it's corner cases. The c99 spec is very clear on some of its properties (for example, guaranteeing 0-byte termination), but then also leaves open a lot (in case of errors occurring).
+The safe alternative !!1! or maybe not. snprintf() is kind of an oddball. Certainly it's better than its older brother, but it does have its corner cases. The c99 spec is very clear on some of its properties (for example, guaranteeing 0-byte termination), but then also leaves open a lot (in case of errors occurring).
Here I'll present all the corner cases I've ran into, some of them are very os specific, and show a couple of examples. c99 is assumed, any implementation that doesn't comply to it isn't considered (those are usually far more broken).</description>
<persons>
<person id="50">Ilja</person>
@@ -242,11 +242,15 @@ <title>"I can count every star i
<language>en</language>
<abstract>A talk (with examples) by monochrom, presented by Johannes Grenzfurthner</abstract>
<description>Bourgeois culture was paralyzed and finally overrun by modern technologies which broke through the traditional class barriers. It went into a panic and produced these very stupid technophobic manifestos and images e.g. of “the computer”.
-Pop music discovered and explored the computer not only as a musical instrument but also as something to sing and reflect about in a less aversive way. In doing so it influenced the conception people had of computers. The public image of computers was shaped by groups such as Kraftwerk as well as through obscure Schlager songs such as France Gall's “Computer No. 3”. Not only was that image influenced by high culture computer panic but also by naïve technomania, and so it delivered the very dialectics of the computer as a means of cultural technology in capitalist society.</description>
+Pop music discovered and explored the computer not only as a musical instrument but also as something to sing and reflect about in a less aversive way. In doing so it influenced the conception people had of computers. The public image of computers was shaped by groups such as Kraftwerk as well as through obscure Schlager songs such as France Gall's “Computer No. 3”. Not only was that image influenced by high culture computer panic but also by naïve technomania, and so it delivered the very dialectics of the computer as a means of cultural technology in capitalist society.
+
+Speaker: Johannes Grenzfurthner (monochrom)
+Various music examples. </description>
<persons>
<person id="962">Johannes Grenzfurthner</person>
</persons>
<links>
+ <link href="http://www..monochrom.at/english">monochrom</link>
</links>
</event>
</room>
@@ -289,27 +293,6 @@ <title>Paparazzi - The Free Auto
<link href="http://paparazzi.enac.fr/">Paparazzi Project Page</link>
</links>
</event>
- <event id="2319">
- <start>14:00</start>
- <duration>01:00</duration>
- <room>Saal 2</room>
- <tag>youtube_analysis</tag>
- <title>YouTube Analysis</title>
- <subtitle>Anatomy of a Large-Scale Video Community</subtitle>
- <track>Society</track>
- <type>lecture</type>
- <language>de</language>
- <abstract>Die noch jungen Online-Videoportale erfreuen sich großer Beliebtheit und verzeichnen aktuell Wachstumsraten wie kein anderer Online-Service. Schon jetzt verändern diese neuen Dienste unsere Medienlandschaft und haben starken Einfluss auf die Mediennutzung der Internetgeneration. Gerade in jüngeren Zielgruppen haben diese rapide wachsenden Online-Portale den Fernseher in seiner Bedeutung längst abgelöst. </abstract>
- <description>Schon stellen die Community-Portale die Einschaltquoten jedes Mediennetzwerkes mit User Generated Content in den Schatten. Doch im Gegensatz zum klassischen Fernsehmarkt, der eine relativ zuverlässige und transparente Bestimmung von Einschaltquoten, Inhalten und Zielgruppen erlaubt, halten sich die Betreiber der großen Videoportale sehr bedeckt und geben kaum Informationen nach außen.
-
-Die Bedeutung dieser Portale und ihre medientheoretischen Einflüsse werden anhand einer umfassenden, bis jetzt unveröffentlichten statistischen Untersuchung des Marktführers YouTube belegt. Diese Untersuchung beruht auf der Analyse von über 10.000.000 Millionen Video- und 1.000.000 Nutzerprofilen. Dabei werden sowohl inhaltliche, technologische und demographische Aspekte vorgestellt. Im Weiteren werden verschiedene praktische Anwendungsszenarien anhand konkreter Beispiele vorgestellt und evaluiert. Es wird die eigentliche Bedeutung des Mediums verdeutlicht. Dabei werden Aspekte wie Copyright- und Privacyproblematiken ebenso behandelt wie Marketingaspekte.
-</description>
- <persons>
- <person id="1765">Frédéric Philipp Thiele</person>
- </persons>
- <links>
- </links>
- </event>
<event id="2379">
<start>16:00</start>
<duration>01:00</duration>
@@ -362,9 +345,9 @@ <title>Tracker fahrn</title>
<abstract>Bittorrent aus der Sicht von Bittorrent-Tracker Betreibern.</abstract>
<description>Eine Einführung in die Protokolle und eine lustige Reise durch die Unwägbarkeiten, die sich einem freien und offenen Projekt für die Community so in den Weg stellen.</description>
<persons>
- <person id="291">Cristian Yxen</person>
- <person id="243">Erdgeist</person>
<person id="231">Denis</person>
+ <person id="243">Erdgeist</person>
+ <person id="291">Cristian Yxen</person>
</persons>
<links>
<link href="http://erdgeist.org/arts/software/opentracker">Opentracker Projektseite</link>
@@ -535,8 +518,8 @@ <title>Building a Hacker Space</
Attend this talk when you are about to start your local Chaos Computer Club or Hacker Space somewhere else on earth and learn from our experience!</description>
<persons>
- <person id="13">Jens Ohlig</person>
<person id="18">Lars Weiler</person>
+ <person id="13">Jens Ohlig</person>
</persons>
<links>
</links>
@@ -792,9 +775,9 @@ <title>Quantum Cryptography and
[5] A. Lamas-Linares and C. Kurtsiefer, Optics Express 15, 9388 (2007), URL http://arxiv.org/abs/0704.3297.</description>
<persons>
<person id="1774">Antia Lamas</person>
- <person id="1849">Alexander Ling</person>
<person id="1741">Ilja Gerhardt</person>
<person id="264">Christian Kurtsiefer</person>
+ <person id="1849">Alexander Ling</person>
</persons>
<links>
<link href="http://arXiv.org/abs/0702152">A. Acin, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, Physical Review Letters 98, 230501 (2007)</link>
@@ -818,8 +801,8 @@ <title>Why Silicon-Based Securit
In the second, very technical part, we will discuss the design and implementation details of the Xbox 360 system and security architecture and describe in detail how and why it was hacked, as well as how Linux was ported to this new platform.</description>
<persons>
- <person id="373">Felix Domke</person>
<person id="283">Michael Steil</person>
+ <person id="373">Felix Domke</person>
</persons>
<links>
<link href="http://www.free60.org/">Free60 Project</link>
@@ -838,29 +821,28 @@ <title>Chaos Jahresrückblic
<abstract>Wir stellen die Aktivitäten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen sowohl die Kampagnen des CCC, die Lobbyarbeit sowie Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vorträge und Konferenzen, an denen CCC-Vertreter teilgenommen haben.</abstract>
<description>Ein zweistündiger Überblick, was den Club bewegt hat.</description>
<persons>
+ <person id="7">Andreas Lehner</person>
<person id="9">Frank Rieger</person>
<person id="216">Frank Rosengart</person>
<person id="381">Constanze Kurz</person>
- <person id="7">Andreas Lehner</person>
</persons>
<links>
</links>
</event>
- <event id="2360">
+ <event id="2273">
<start>20:30</start>
<duration>01:00</duration>
<room>Saal 1</room>
- <tag>all_tomorrows</tag>
- <title>All Tomorrow's Condensation</title>
- <subtitle>A steampunk extravaganza by monochrom and friends</subtitle>
- <track>Culture</track>
- <type>other</type>
+ <tag>toying_with_barcodes</tag>
+ <title>Toying with barcodes</title>
+ <subtitle>Jemandem einen Strich auf die Rechnung machen</subtitle>
+ <track>Community</track>
+ <type>lecture</type>
<language>en</language>
- <abstract>A long time ago in a post-apocalyptic region far, far away. Sympathetic outlaws battle against hyper-villains. Some people die, some people get famous. Societal business as usual. But wait! Something is _happening_!
-</abstract>
- <description>monochrom (featuring Bre Pettis, Sean Bonner and others) try to reinterpret the steampunk genre in form of a steamy puppet extravaganza. A journey into the backwaters of imagination!</description>
+ <abstract>The talk focuses on 1D and 2D barcode applications with interference possibilities for the ordinary citizen. Ever wondered what is in these blocks of squares on postal packages, letters and tickets? Playing with them might have interesting effects, reaching from good old fun to theft and severe impact.</abstract>
+ <description>Barcodes have been around for ages, but most of the time were used as simple tags with a number. The rise of 2D barcodes started to put them into customer hands as authentication, authorization, payment method and other arbitrary data transport. The implicit trust in them is enormous. The talk gives a very quick intro into barcodes and then proceeds to review the contents of selected samples, including their usage in the real world. This is going to be fun, tool release included.</description>
<persons>
- <person id="962">Johannes Grenzfurthner</person>
+ <person id="134">FX of Phenoelit</person>
</persons>
<links>
</links>
@@ -894,8 +876,8 @@ <title>Port Scanning improved</t
community and why such considerations may be interesting to other
researchers.</description>
<persons>
- <person id="134">FX of Phenoelit</person>
<person id="1727">fabs</person>
+ <person id="134">FX of Phenoelit</person>
</persons>
<links>
<link href="http://www.recurity-labs.com">Who we are</link>
@@ -933,10 +915,10 @@ <title>Rule 34 Contest</title>
<abstract>Rule 34 says: There is porn of it.</abstract>
<description>This contest will challenge the best and brightest to prove the rule under adverse circumstances in a race against the clock.</description>
<persons>
- <person id="832">nibbler</person>
- <person id="91">Andreas Bogk</person>
<person id="1039">tina</person>
<person id="243">Erdgeist</person>
+ <person id="832">nibbler</person>
+ <person id="91">Andreas Bogk</person>
</persons>
<links>
</links>
@@ -1089,8 +1071,8 @@ <title>Spiel, Freude, Eierkuchen
<description>Nachdem das ZDF einen Magazinbeitrag über die Auswirkungen von Computerspielen mit überwiegend gewalttätigen Handlungen ausgestrahlt hatte, ging eine Welle der Empörung durch die Gamerszene. Man fühlte sich falsch dargestellt, und die herangezogenen Studien seien einseitig ausgewählt. Wütende Beiträge in den einschlägigen Foren waren die Folge, es gab jedoch auch konkrete Gewaltdrohungen gegen den Autor des Beitrages und seine Familie.
Wie friedlich ist der Gamerszene wirklich und gibt es Grenzen bei Spielen, die vielleicht besser nicht überschritten werden sollten - eine kontroverse Diskussion jenseits der üblichen Verbotsdiskussion.</description>
<persons>
- <person id="1776">Rainer Fromm</person>
<person id="216">Frank Rosengart</person>
+ <person id="1776">Rainer Fromm</person>
</persons>
<links>
<link href="http://www.zdf.de/ZDFde/inhalt/26/0,1872,2285338,00.html">ZDF Frontal21: Gewalt ohne Grenzen</link>
@@ -1162,6 +1144,7 @@ <title>Hacking ICANN</title>
</description>
<persons>
<person id="1831">Annette Muehlberg</person>
+ <person id="1832">Wendy Seltzer</person>
</persons>
<links>
</links>
@@ -1204,8 +1187,8 @@ <title>Wireless Kernel Tweaking<
These and other things we will cover in our presentation and also give an outlook into the future of mesh-routing, which will bring it even closer to the source of wifi - the wireless stack and its drivers and thereby improving the overall performance even more. </description>
<persons>
- <person id="1821">Simon Wunderlich</person>
<person id="1265">Marek</person>
+ <person id="1821">Simon Wunderlich</person>
</persons>
<links>
<link href="http://www.open-mesh.net">www.open-mesh.net</link>
@@ -1247,8 +1230,8 @@ <title>Just in Time compilers -
<description>A short introduction into just-in-time compiler techniques is given: Why JIT, about compiler invocation, runtime code modification using signals, codegeneration. Then theoretical attack vectors are elaborated: language bugs, intermediate representation quirks and assembler instruction inadequacies.
With these considerations in mind the results of a CACAO code review are presented. For each vulnerability possible exploits are discussed and two realized exploits are demonstrated.</description>
<persons>
- <person id="1713">Roland Lezuo</person>
<person id="1845">Peter Molnar</person>
+ <person id="1713">Roland Lezuo</person>
</persons>
<links>
<link href="http://cacaojvm.org">http://cacaojvm.org</link>
@@ -1461,9 +1444,9 @@ <title>Hacking ideologies, part
on the purely technical aspect of "just getting things done".</description>
<persons>
<person id="1739">Toni Prug</person>
- <person id="1094">Marcell Mars</person>
- <person id="1830">Tomislav Medak</person>
<person id="1847">Dmytri Kleiner</person>
+ <person id="1830">Tomislav Medak</person>
+ <person id="1094">Marcell Mars</person>
</persons>
<links>
<link href="http://publication.nodel.org/The-Mirrors-Gonna-Steal-Your-Soul">The Mirror's Gonna Steal Your Soul</link>
@@ -1503,8 +1486,8 @@ <title>Die Wahrheit und was wirk
<abstract>Jede Geschichte hat vier Seiten. Deine Seite, Ihre Seite, die Wahrheit und das, was wirklich passiert ist.</abstract>
<description>Die Wahrheit ist am Ende das, was Bruce Sterling als "major consensus narrative" beschrieben hat, die Version, die sich im Bewußtsein der Mehrheit festfrißt. Wir werden anhand von Beispielen aus der jüngeren Vergangenheit betrachten, welche Faktoren und Ereignisse beeinflußen, wie diese Mehrheitserinnerung zustande kommt, wie sie beeinflußt werden kann und was wir daraus für unsere Arbeit lernen können. </description>
<persons>
- <person id="129">Ron</person>
<person id="9">Frank Rieger</person>
+ <person id="129">Ron</person>
</persons>
<links>
</links>
@@ -1554,22 +1537,33 @@ <title>Relay attacks on card pay
<link href="http://www.cl.cam.ac.uk/research/security/projects/banking/relay/">Summary website</link>
</links>
</event>
- <event id="2273">
+ <event id="2360">
<start>20:30</start>
<duration>01:00</duration>
<room>Saal 1</room>
- <tag>toying_with_barcodes</tag>
- <title>Toying with barcodes</title>
- <subtitle>Jemandem einen Strich auf die Rechnung machen</subtitle>
- <track>Community</track>
- <type>lecture</type>
+ <tag>all_tomorrows</tag>
+ <title>All Tomorrow's Condensation</title>
+ <subtitle>A steampunk puppet extravaganza by monochrom and friends</subtitle>
+ <track>Culture</track>
+ <type></type>
<language>en</language>
- <abstract>The talk focuses on 1D and 2D barcode applications with interference possibilities for the ordinary citizen. Ever wondered what is in these blocks of squares on postal packages, letters and tickets? Playing with them might have interesting effects, reaching from good old fun to theft and severe impact.</abstract>
- <description>Barcodes have been around for ages, but most of the time were used as simple tags with a number. The rise of 2D barcodes started to put them into customer hands as authentication, authorization, payment method and other arbitrary data transport. The implicit trust in them is enormous. The talk gives a very quick intro into barcodes and then proceeds to review the contents of selected samples, including their usage in the real world. This is going to be fun, tool release included.</description>
+ <abstract>A steampunk theatre play extravaganza. With puppets!</abstract>
+ <description>In 1887 the Indian Empire of the British Nation was formed. How did that happen you ask? A good question, deserving of a good answer and, although the Britons don’t like to talk about it, the incident uprooted some entrenched colonial mindsets. Indeed, Samosas proved to be more tasteful than Fish and Chips, and the importance of the nation states was in decline, anyways.
+
+The true masters of the times were the powerful steam barons, men who controlled the planet by controlling the energy. Their boots were placed firmly on the necks of the people they ruled. People who gladly payed for the privilege. Woe be to those foolish enough to tamper with their patents… the results were… well… let us just say that those foolhardy wretches would most certainly NOT be enjoying their final rest under a standard tombstone.
+
+Energy was what mankind needed, hungered for, lusted after... energy. For airboats and cellular calculation machines, for geostationary weather factories and the energy to fuel the Infodampfbahn, the transcontinental data-steam network.
+
+Societal business as usual. But can there be a better tomorrow?
+
+monochrom try to reinterpret the steampunk genre in form of a steamy puppet extravaganza. A journey into the backwaters of imagination!
+
+With Roland Gratzer, Johannes Grenzfurthner, Evelyn Fuerlinger, David Dempsey, Sean Bonner and Bre Pettis.</description>
<persons>
- <person id="134">FX of Phenoelit</person>
+ <person id="962">Johannes Grenzfurthner</person>
</persons>
<links>
+ <link href="http://www.monochrom.at/english">monochrom</link>
</links>
</event>
<event id="2287">
@@ -1805,8 +1799,8 @@ <title>Meine Finger gehören
<description>Wir wollen in dem Vortrag auf die Probleme eingehen, die es seit der Einführung des ePasses gab. Fingerabdrücke werden nun für Kinderreisepässe bereits ab dem 6. Lebensjahr aufgenommen, obwohl bekanntermaßen die biometrischen Merkmale Heranwachsender für die Erkennungssysteme ungeeignet sind. Auch die Schwierigkeiten älterer Menschen mit den Systemen haben sich im realen Einsatz als noch größer als erwartet erwiesen.
Besonderes Augenmerk legen wir auf die praktische Handhabung der Abgabe der Fingerabdrücke sowie Studien und Berichte von Meldeämtern und Grenzübergängen.</description>
<persons>
- <person id="63">starbug</person>
<person id="381">Constanze Kurz</person>
+ <person id="63">starbug</person>
</persons>
<links>
</links>
@@ -1816,15 +1810,15 @@ <title>Meine Finger gehören
<duration>01:00</duration>
<room>Saal 2</room>
<tag>open_source_lobbying</tag>
- <title>Opensource lobbying, tips from the trenches</title>
- <subtitle>From one angry e-mail to writing national policy on opensource</subtitle>
+ <title>Open source lobbying, tips from the trenches</title>
+ <subtitle>From one angry e-mail to writing national policy on open source</subtitle>
<track>Society</track>
<type>lecture</type>
<language>en</language>
- <abstract>From one angry e-mail to writing national policy on opensource
+ <abstract>On January 1st, 2002 I tried to use the website of the Dutch national railway (www.ns.nl) using Linux. The site refused me access, it was IE-only. This sparked a conversation with members of parliament about the need for open standards. Over a five year period I progressed from talking to opposition-MP's to meeting the economics minister directly and was able to significantly influence national policy despite total lack of funding or any specific mandate. On December 12th we achieved a stunning victory, the Dutch public sector will move to standardize on Open Documents Format and use opensource where comparable functionality is available in all new procurements as of 2008. Use of ODF as a public sector document standard will be mandatory in 2009.</abstract>
+ <description>My talk will tell the tale of why we did it but mostly how we did it and how others can do it too in other countries around the world.
-On January 1st 2002 I tried to use the website of the Dutch national railway (www.ns.nl) using Linux. The site refused me access, it was IE-only. This sparked a conversation with members of parliament about the need for open standards. Over a five year period I progressed from talking to opposition-MP's to meeting the economics minister directly and was able to significantly influence national policy despite total lack of funding or any specific mandate. On December 12th we achieved a stunning victory, the Dutch public sector will move to standardize on Open Documents Format and use opensource where comparable functionality is available in all new procurements as of 2008. Use of ODF as a public sector document standard will be mandatory in 2009. My talk will tell the tale of why we did it but mostly how we did it and how others can do it too.</abstract>
- <description>I'd like to share my experiences in creating and altering national government policy on opensource and open standards. How to get access to the power-the-be, how to get non-technical people interested in the subject. How to align your policy proposals with existing policies. While I'll do a short lead-in with some of the political reasons for wanting open standards and opensource in government IT I'll focus mainly on how to get results. From having no policy at all in 2002 the Dutch government has recently decided to mandate the use of open standards for all government institutions, health care, education, libraries and any other tax-funded organizations. Opensource software will receive preferential treatment.
+I'd like to share my experiences in creating and altering national government policy on opensource and open standards. How to get access to the power-the-be, how to get non-technical people interested in the subject. How to align your policy proposals with existing policies. While I'll do a short lead-in with some of the political reasons for wanting open standards and opensource in government IT I'll focus mainly on how to get results. From having no policy at all in 2002 the Dutch government has recently decided to mandate the use of open standards for all government institutions, health care, education, libraries and any other tax-funded organizations. Opensource software will receive preferential treatment.
Details:
@@ -1866,6 +1860,7 @@ <title>Opensource lobbying, tips
<link href="http://www.msnbc.msn.com/id/22245923/">Even MSNBC reports it!</link>
<link href="http://opensourcelearning.info/blog/?p=704">Nice english summary of the parlaiments desicions</link>
<link href="http://appz.ez.nl/publicaties/pdfs/07ET15.pdf">English translation of the policy document</link>
+ <link href="http://virtuelvis.com/archives/2007/12/norway-mandates-html-pdf-odf">Norway doing the same thing</link>
</links>
</event>
<event id="2276">
@@ -2138,31 +2133,6 @@ <title>The Arctic Cold War</titl
<links>
</links>
</event>
- <event id="2365">
- <start>14:00</start>
- <duration>01:00</duration>
- <room>Saal 1</room>
- <tag>wearables_and_female_cyborg</tag>
- <title>Wearables of the electronic and digital ages and the female cyborg</title>
- <subtitle></subtitle>
- <track>Society</track>
- <type>lecture</type>
- <language>en</language>
- <abstract>In a colorful painted picture of the early 1930ies, which accompanied one of the many new consumer goods as a common advertising supplement, two fashionable women were envisioned video-phoning their husband and son respectively. The two were sitting in an outdoor café, were smoking and drinking, and obviously had just arrived by their plane. Their vehicle was placed in the background, and the two still wore their pilot`s headgear in addition to their wearable visual telephones. All in all, they clearly represented the “new women” of the Twenties by embracing modernity with all its amenities and technologies. </abstract>
- <description>At the end of the 20th century, again, we encounter many popular images of such “female Cyborgs”, Lara Croft being the most popular among them. Likewise, the women pictured today make sophisticated use of information and communication technologies which, by now, every consumer can buy. In between however, lie manifold projections of women and everyday technology, many of which conflict with the depicted female technofreaks and rather mirror the cliché of female technical illiteracy and naivité.
-
-My talk will span these different visual representations by referring to Donna Haraway`s “Cyborg Manifesto” of 1985, which in itself is a - provocative and ironic - visionary text invoking feminists to embrace the new information technologies. Main visual examples (from advertising, popular journals, films, manuals) will be drawn from the mass consumption of portable technologies. These can be interpreted as the most obvious “Cyborg technologies”, as by using them, consumers can construct new spaces (e.g. by listening to a radio in public) and identities (e.g. by using a cell phone as a statement of lifestyle). Besides, portables easily cross the borders between the spheres of leisure / work and public / private, which are in themselves gendered. However, I also will give some reference to other consumption technologies, in particular to household technology as the domain of female use of machinery.
-
-Historians of technology usually argue that in the mediation of technology, female icons served two purposes: firstly, attracting the male buyer as erotic signals; secondly, representing the simplicity of a technology`s handling. This scheme is obviously too simple and in itself stereotyped. It neglects the nuances of how women are envisioned in relation to what technologies and what this means for both the semiotics of a technology and the identities of women. For the case of the portable electronics, I will demonstrate such nuances. E.g. the radio was connected to female users as long as it served leisurable entertainment in public spaces. However, when marketed as an information tool back home or on business tours, it was put in male hands.
-Furthermore, the popular ascriptions which condensed in the visions of media, advertising and manuals, also materialized in the artifacts themselves. Thus, radios or cell phones which were targeted explicitly at women had feminized designs, colours and features which should relate to their life experiences. In my talk, I will also include this dimension of the artifacts, analyzing them as frozen envisions of social and cultural values.
-
-As a résumé, I will tackle the question to what degree Haraway´s enthusiastic vision of the Cyborg who overcomes the boundaries of gender, space and identity by technology, is on its way to become true. Latest advertising for consumption technologies show postmodern female identities which merge with technology, and female technophobia seems to have disappeared. However, we still live amidst stereotyped technological user practices, even though – as Haraway had predicted – new media and portable technologies have mixed up the once separate domains of the domestic and the public. The two visionary images of the post-/modern female Cyborg mentioned in the beginning in any case account for the turbulent periods of the 1920ies and 90ies, when female identity was re-negotiated. Technology was both a cause of this re-negotiation and a main part of the resulting new identity. </description>
- <persons>
- <person id="1799">Heike Weber</person>
- </persons>
- <links>
- </links>
- </event>
<event id="2235">
<start>16:00</start>
<duration>01:00</duration>
@@ -2317,8 +2287,8 @@ <title>Smartcard protocol sniffi
<abstract>This talk will introduce you to the theoretical and practical issues involved in cloning/simulating existing smartcards. It is based on the lessons learned from cloning the Postcard (swiss debit card) issued by PostFinance.</abstract>
<description>After a brief introduction into the syntax of smartcard protocols (basically ISO 7816-4), the talk will demonstrate techniques to capture the communication between a smartcard and a terminal with the help of a Javacard-based logger cardlet. The gathered information (the semantics of the protocol) can then be used for cloning the smartcard under investigation.</description>
<persons>
- <person id="614">Bernd R. Fix</person>
<person id="1798">Marc-André Beck</person>
+ <person id="614">Bernd R. Fix</person>
</persons>
<links>
<link href="http://postcard-sicherheit.ch">postcard-sicherheit.ch</link>
@@ -2411,8 +2381,8 @@ <title>Abschlussbericht FeM-Stre
<abstract>Das Streaming-Team der FeM e.V. möchte zum Abschluss des 24C3 einen Überblick über die Streaming-Aktivitäten geben, ein paar Statistiken jonglieren und sonstige (Un-)Auffälligkeiten und Stories berichten.</abstract>
<description>Außerdem gibt es einen Bericht des Encoding-Teams über die eingesetzten Techniken zur Bereitstellung der 24C3-Videos.</description>
<persons>
- <person id="1844">Sway</person>
<person id="1046">Felix von Leitner</person>
+ <person id="1844">Sway</person>
</persons>
<links>
</links>