35C3
The Chaos Communication Congress is an annual Computer security conference, hacker conference organized by the Chaos Computer Club. The congress features a variety of lectures and workshops on technical and political issues related to security, cryptography, privacy and online freedom of speech. It has taken place regularly at the end of the year since 1984, with the current date and duration (27–30 December) established in 2005. It is considered one of the largest events of its kind, alongside DEF CON in Las Vegas. History The congress is held in Germany. It started in 1984 in Hamburg, moved to Berlin in 1998, and back to Hamburg in 2012, having exceeded the capacity of the Berlin venue with more than attendees. Since then, it attracts an increasing number of people: around attendees in 2012, over in 2015, and more than in 2017. From 2017 to 2019 it has taken place at the Leipzig Trade Fair, Trade Fair Grounds in Leipzig, since the Hamburg venue (CCH) was closed for r ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Hacker Con
A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts. Common activities at hacker conventions may include: * Presentations from keynote speakers or panels. Common topics include social engineering, lockpicking, penetration testing, and hacking tools. * Hands-on activities and competitions such as capture the flag (CTF). * "Boot camps" offering training and certification in Information Technology. List of general computer security conferences General security conferences might be held by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies. * 0SecCon Zero Security Conference held in Kerala * 44Con, an Infosec conference and training event that occurs annually in London, UK. * ACM-CCS (Conferences on Computer and Commun ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Lockpicking
Lock picking is the practice of unlocking a Lock (security device), lock by manipulating the components of the lock device without the original key. Although lock-picking can be associated with Intention (criminal law), criminal intent, it is an essential skill for the legitimate profession of locksmithing, and is also pursued by law-abiding citizens as a useful skill to learn, or simply as a hobby (locksport). In some countries, such as Japan, lock-picking tools are illegal for most people to possess, but in many others, they are available and legal to own as long as there is no intent to use them for criminal purposes. History Lock (security device), Locks by definition secure or fasten something with the intention that access is possible only with the matching key. Despite this, criminal lock picking likely started with the first locks. Famed locksmith Alfred Charles Hobbs said in the mid-1800s: Professional and recreational lock picking also has a long history. Ki ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Free-software Events
Free software, libre software, libreware sometimes known as freedom-respecting software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, distribute it and any adapted versions. Free software is a matter of liberty, not price; all users are legally free to do what they want with their copies of a free software (including profiting from them) regardless of how much is paid to obtain the program.Selling Free Software (GNU) Computer programs are deemed "free" if they give end-users (not just the developer) ultimate control over the software and, subsequently, over their devices. The right to study and modify a computer program entails that the [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Freedom Of Speech
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been recognised as a Human rights, human right in the Universal Declaration of Human Rights and international human rights law. Many countries have constitutional law that protects free speech. Terms like ''free speech'', ''freedom of speech,'' and ''freedom of expression'' are used interchangeably in political discourse. However, in a legal sense, the freedom of expression includes any activity of seeking, receiving, and imparting information or ideas, regardless of the medium used. Article 19 of the UDHR states that "everyone shall have the right to hold opinions without interference" and "everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive, and impart information and ideas of all kinds, re ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), adversarial behavior. More generally, cryptography is about constructing and analyzing Communication protocol, protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security (confidentiality, data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, Smart card#EMV, chip-based payment cards, digital currencies, password, computer passwords, and military communications. ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
SIGINT (conference)
The SIGINT conference was a three-day conference held yearly on the social and technical aspects of digital society between 2009 and 2013. It was organized by the Chaos Computer Club and held in Cologne, Germany. The conference featured both lectures and workshops on various different topics. It specifically wanted to focus on the social and political aspect of technology and hacker culture. The conference was officially discontinued in January 2014. See also * Chaos Communication Congress * Chaos Communication Camp The Chaos Communication Camp (also known as CCCamp) is an international meeting of Hacker (term), hackers that takes place every four years, organized by the Chaos Computer Club (CCC). So far all CCCamps have been held near Berlin, Germany. ... References External links * Archived version of thconference website* Video recordings are available from the majority of talksSIGINT13 [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Chaos Communication Camp
The Chaos Communication Camp (also known as CCCamp) is an international meeting of Hacker (term), hackers that takes place every four years, organized by the Chaos Computer Club (CCC). So far all CCCamps have been held near Berlin, Germany. The camp is an event for providing information about technical and societal issues, such as privacy, freedom of information and data security. Hosted speeches are held in big tents and conducted in English as well as German. Each participant may pitch a tent and connect to a fast internet connection and power. List of Camps See also * Chaos Communication Congress, an annual indoor event, held in December in Germany * Hack-Tic#Hack-Tic hacker events, Hack-Tic hacker events, a quadrennial outdoor event, held in August in the Netherlands * Electromagnetic Field (festival), Electromagnetic Field, a biennial outdoor event, held in England References External links Camp 2023 [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Julian Assange
Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. He came to international attention in 2010 after WikiLeaks published a series of News leak, leaks from Chelsea Manning, a United States Army intelligence analyst: July 12, 2007, Baghdad airstrike, footage of a U.S. airstrike in Baghdad, U.S. military logs from the Afghan War documents leak, Afghanistan and Iraq War documents leak, Iraq wars, and United States diplomatic cables leak, U.S. diplomatic cables. Assange has won over two dozen awards for publishing and human rights activism. Assange was raised in various places around Australia until his family settled in Melbourne in his middle teens. He became involved in the Hacker culture, hacker community and was convicted for Security hacker, hacking in 1996. Following the establishment of WikiLeaks, Assange was its editor when it published the Bank Julius Baer v. WikiLeaks, Bank Julius Baer docu ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Sarah Harrison (journalist)
Sarah Harrison is a British former WikiLeaks section editor. She worked with the WikiLeaks' legal defence and has been described as Julian Assange's closest adviser. Harrison accompanied National Security Agency whistleblower Edward Snowden on a high-profile flight from Hong Kong to Moscow while he was sought by the United States government. Early life Sarah Harrison grew up with two younger sisters and attended a private school in Kent. Her father, Ian Harrison, was an executive in the retail industry and her mother was a specialist in treating reading disabilities. Harrison studied English at Queen Mary, University of London. In 2008, she took an internship at the nonprofit Centre for Investigative Journalism. In late 2009, she met Gavin MacFadyen while applying for an unpaid internship, who recommended her to WikiLeaks the next year. In 2010, she received a junior research position at the Bureau of Investigative Journalism in 2010. WikiLeaks As an intern at the UK- ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Glenn Greenwald
Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author, and former lawyer. In 1996, Greenwald founded a law firm concentrating on First Amendment to the United States Constitution, First Amendment litigation. He began blogging on national security issues in October 2005, when he was becoming increasingly concerned with what he viewed as attacks on civil liberties by the Presidency of George W. Bush, George W. Bush administration in the aftermath of the September 11 attacks. He became a vocal critic of the Iraq War and has maintained a critical position of American foreign policy. Greenwald started contributing to ''Salon.com, Salon'' in 2007, and to ''The Guardian'' in 2012. In June 2013, while at ''The Guardian'', he began publishing a series of reports detailing previously unknown information about American and British global surveillance programs based on classified documents provided by Edward Snowden. His work contributed to ''The Guardian''s 2014 Pul ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth City, North Carolina, he attended a community college and later enrolled at a masters programme of the University of Liverpool without finishing it. In 2005 he worked for the University of Maryland, in 2006 he started working for the Central Intelligence Agency (CIA) and then switched to Dell in 2009 where he was managing computer systems of the NSA. In 2013, he worked two months at Booz Allen Hamilton with the purpose of gathering more NSA documents. In May 2013, Snowden flew to Hong Kong and in early June he revealed thousands of classified NSA documents to journalists Glenn Greenwald, Laura Poitras, Barton Gellman, and Ewen MacAskill. Global surveillance disclosures (2013–present), His disclosures revealed numerous global surveillance ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |