BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//BornHack Website iCal Generator//bornhack.dk//
NAME:BornHack 2016
X-WR-CALNAME:BornHack 2016
BEGIN:VEVENT
SUMMARY:The Alternative Welcoming
DTSTART:20160828T090000Z
DTEND:20160828T093000Z
DTSTAMP:20260408T192553Z
UID:14723748-0015-1efe-9ce7-09ac04ba3a50
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/the-alternative
 -welcoming/\n\nSpeaker(s): Jesper Arp\, Rolf Bjerre\n\nRecorded: No\n\nStr
 eamed: No\n\nWhy does The Alternative support BornHack? Why does The Alter
 native think IT is an overlooked topic? A quick runt-hrough of our program
  and workshops. We will bring an IT political debate to both the stage and
  the beer tents.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Incompleteness Phenomena in Mathematics: From Kurt Gödel to Harve
 y Friedman
DTSTART:20160828T100000Z
DTEND:20160828T110000Z
DTSTAMP:20260408T192553Z
UID:14723784-0011-1728-bf92-c586c4148a9a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/incompleteness-
 phenomena-in-mathematics-from-kurt-godel-to-harvey-friedman/\n\nSpeaker(s)
 : Lasse Andersen\n\nRecorded: No\n\nStreamed: No\n\nIn the first half of t
 he 20th century the dreams of a complete and\nconsistent formalization of 
 mathematics was destroyed\, when Kurt Gödel\nproved the existence of true
  but unprovable sentences in every\nreasonable formalization of mathematic
 s.\n\nHowever\, the explicit sentence constructed in the proof was tailore
 d to\ncause trouble and therefore was not of much interest to mathematicia
 ns\nin general. Since then various incompleteness phenomena have been\ndis
 covered and many of these (relative) unprovable sentences are of genuine m
 athematical interest. In recent years Harvey Friedman have taken this ente
 rprise to a new level by constructing sentences about "low level" mathemat
 ics and showed that these sentences are provably equivalent to the consist
 ency of axiomatic systems far stronger than classical set theory (ZFC). In
  this talk I will try to introduce concepts of mathematical logic together
  with some highlights in the history of incompleteness phenomena and discu
 ss the philosophical implications of these. \n\nNote that these (early 20t
 h century) developments also play an important role in developing the theo
 retical computer.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Simulated DDoS Attacks\, Breaking the Firewall Infrastructure
DTSTART:20160828T113000Z
DTEND:20160828T130000Z
DTSTAMP:20260408T192553Z
UID:14723838-0011-3fe7-e9e7-308314e26bfc
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/simulated-ddos-
 attacks-breaking-the-firewall-infrastructure/\n\nSpeaker(s): Henrik Lund K
 ramshøj\n\nRecorded: No\n\nStreamed: No\n\nDDoS Attacks have become a dai
 ly annoyance for many\, and we need to create robust infrastructure. This 
 tutorial will go through a proposed method for testing your own infrastruc
 ture using off-the-shelf tools like packet generators hping3 and t50 on Ka
 li Linux.\n\nThe goal for the tutorial is to explain:\n\n- How to create D
 DoS attack simulations\n- My actual experience with doing this - testing b
 anks\, etc.\n- Evaluate how good is this\, value proposition for you\n\nTh
 e content will include:\n- Running packet generators with example commands
  hping3 and t50\n- Monitoring availability while doing DDoS attacks\n- Com
 paring this with real life attacks\n- Results from doing attacks on real l
 ife customer networks\, mostly banks in or around Denmark\n- My recommenda
 tions for a holistic approach to DDoS protection in your networks\n\nThere
  won’t be any exercises\, but I recommend trying to install Kali Linux o
 n a Virtual Machine to get familiar with this Linux distribution.\n\nI wil
 l be doing demos showing how I run commands and monitor a DDoS simulation.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Privacy\, Data Protection\, Security and Law: Practical Steps Forw
 ard (a Swedish Perspective)
DTSTART:20160828T130000Z
DTEND:20160828T140000Z
DTSTAMP:20260408T192553Z
UID:14723892-0012-0eb9-18df-1545a43f2853
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/privacy-data-pr
 otection-security-and-law-practical-steps-forward-a-swedish-perspective/\n
 \nSpeaker(s): Amelia Andersdotter and Anders Jensen-Urstad\n\nRecorded: No
 \n\nStreamed: No\n\nA new data protection regulation\, increasing pressure
  on legislatures to\ncircumvent or side-step human rights and a faltering 
 technical\ninfrastructure that isn't up to the task of protecting the indi
 vidual\nare some of the challenges for humanity at this ever crucial point
  in\ntime. Dataskydd.net is a Swedish NGO which has been working since spr
 ing\n2015 raising these issues in the Swedish executive. Through advocacy\
 nwork\, we raise important individual and consumer security concerns\, but
 \nwe have also developed a simple web-tool which allows web masters - or\n
 their visitors - to request simple\, cheap and fast implementation of\ntec
 hnical measures to improve data protection qualities of a website. We\nwil
 l present our work in spring 2016 developing the tool\, the criteria\nwith
  which we measure a data protecting web\, and some of our additional\nadvo
 cacy work in the field of data protection in Sweden.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to Modern Video Streaming Technology
DTSTART:20160828T140000Z
DTEND:20160828T150000Z
DTSTAMP:20260408T192553Z
UID:14723928-0012-9af1-54e0-d1996480e8b7
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/introduction-to
 -modern-video-streaming-technology/\n\nSpeaker(s): Loke Dupont\n\nRecorded
 : No\n\nStreamed: No\n\nHow can you stream to users on a wealth of devices
  using a few simple\nformats? How can you make sure that all users can wat
 ch your video with\nchanging network conditions and over unstable network 
 links? We will go\nthrough some fo the technology behind video streaming t
 echnology as used by\nalmost all larger video streaming services today. We
  will also walk through\nhow to use open source tools to achieve comparabl
 e quality to the big guys\,\nand how to setup players across a bunch of pl
 atforms. Tools used will be\nffmpeg\, Bento4\, Shaka Player etc.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Infocalypse Now - and how to Survive It?
DTSTART:20160828T160000Z
DTEND:20160828T170000Z
DTSTAMP:20260408T192553Z
UID:14724000-0011-75c3-2421-3027a4b05b44
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/infocalypse-now
 -and-how-to-survive-it/\n\nSpeaker(s): Anders Kjærulff\n\nRecorded: No\n\
 nStreamed: No\n\nDigitalization is on everybodys mind - and so is control 
 and registration\nof citizens. States and businesses all choose sadly unse
 cure\ndata-silo-systems and piles up sensitive data without securing anyth
 ing.\nCritical Infrastructure is privatized and sold off and secure\, anal
 og\nsystems are being torn down in the name of progress.\nIts an evolving 
 Infocalypse\, where all info can be manipulated\, stolen and\nused\, our m
 oney system\, personal data and administrations are doomed in a\nworld of 
 greedy blackhats\, cyberwarfare-troops\, autonomous drones\,\nherfbombs\, 
 solarstorms and intelligence agencies on steroids\nThe Beast is unleashed\
 , can it be stopped\, or is it anyone for him self?
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Beer Tasting Part 1
DTSTART:20160828T173000Z
DTEND:20160828T200000Z
DTSTAMP:20260408T192553Z
UID:14724054-0033-1719-ee5e-df3cf46b7bb9
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/beer-tasting-pa
 rt-1/\n\nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nThe BornHack Beer
  Tasting is your chance to taste a range of exciting local craft beer. We 
 begin after the opening keynote\, and continue until Hacker Jeopardy begin
 s at 22:00. After Hacker Jeopardy we continue the tasting until we have ta
 sted them all. The tasting will conclude with a vote which will decide wha
 t types of beer will be available on draft in the BornHack bar during the 
 coming week.
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacker Jeopardy Qualifier 1
DTSTART:20160828T200000Z
DTEND:20160828T210000Z
DTSTAMP:20260408T192553Z
UID:14724144-0017-b260-e376-e9b4417d9c95
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/hacker-jeopardy
 -qualifyer-1/\n\nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nHacker Je
 opardy qualifying round 1
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Beer Tasting Part 2
DTSTART:20160828T210000Z
DTEND:20160829T020000Z
DTSTAMP:20260408T192553Z
UID:14724180-0033-2254-8e55-861534646be6
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/beer-tasting-pa
 rt-2/\n\nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nThe BornHack Beer
  Tasting is your chance to taste a range of exciting local craft beer. We 
 begin after the opening keynote\, and continue until Hacker Jeopardy begin
 s at 22:00. After Hacker Jeopardy we continue the tasting until we have ta
 sted them all. The tasting will conclude with a vote which will decide wha
 t types of beer will be available on draft in the BornHack bar during the 
 coming week.
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Liquid Democracy (Introduction and Debate)
DTSTART:20160829T070000Z
DTEND:20160829T093000Z
DTSTAMP:20260408T192553Z
UID:14724540-0015-2409-7fa3-a89bf47d28a8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/liquid-democrac
 y-introduction-and-debate/\n\nSpeaker(s): Rolf Bjerre\n\nRecorded: No\n\nS
 treamed: No\n\nA lot has happened ever since the German pirates developed 
 the first visions about a dynamic representational democracy. Google and o
 ther big players have experimented with the disciplines\, and the idea of 
 a more modern form of democracy has grown steadily.\n\nMonday will primari
 ly be focused around The Alternatives experiment with Liquid Democracy and
  a constructive debate about how liquid democracy can improve The Alternat
 ive. Rolf Bjerre leads the process.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Liquid Democracy (continued)
DTSTART:20160829T100000Z
DTEND:20160829T103000Z
DTSTAMP:20260408T192553Z
UID:14724648-0025-3362-c326-f95d64d77add
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/liquid-democrac
 y-continued/\n\nSpeaker(s): Rolf Bjerre\n\nRecorded: No\n\nStreamed: No\n\
 nThis is a continuing workshop from the talk earlier in the day.\n\nA lot 
 has happened ever since the German pirates developed the first visions abo
 ut a dynamic representational democracy. Google and other big players have
  experimented with the disciplines\, and the idea of a more modern form of
  democracy has grown steadily.\n\nMonday will primarily be focused around 
 The Alternatives experiment with Liquid Democracy and a constructive debat
 e about how liquid democracy can improve The Alternative. Rolf Bjerre lead
 s the process.
LOCATION:Workshop room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Words and Power - are we making the most of online activism?
DTSTART:20160829T100000Z
DTEND:20160829T110000Z
DTSTAMP:20260408T192553Z
UID:14724648-0012-2dc1-02c3-21fb54ebca00
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/words-and-power
 -are-we-making-the-most-of-online-activism/\n\nSpeaker(s): Emma Holten\n\n
 Recorded: Yes\n\nStreamed: Yes\n\nFor years\, big names like Ed Snowden an
 d Chelsea Manning have given up their lives in order to protect regular pe
 ople like you and me from breaches of our privacy. But we are still strugg
 ling with getting people interested in internet privacy. Why is this\, and
  what can we do? Using experience from communicating privacy issues on mul
 tiple levels for a couple of years\, I have encountered some deep seated i
 ssues in the way we talk about what privacy means. Are we good enough at l
 etting people know what's going on?
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Code is Politics
DTSTART:20160829T110000Z
DTEND:20160829T120000Z
DTSTAMP:20260408T192553Z
UID:14724684-0011-96fa-f7f6-1d6e1400f9ae
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/code-is-politic
 s/\n\nSpeaker(s): Karen Melchior\n\nRecorded: Yes\n\nStreamed: Yes\n\n“C
 ode is law” wrote Lawrence Lessig back in 1999. This has evolved and bee
 n demonstrated again and again since then. Code defines an ever increasing
  part of our personal and social lives. How businesses and friends interac
 t with us\, but also how authorities and intelligence services see us. It 
 is already the case for many but soon the lives and rights as citizens of 
 all of us will be defined by code. Code is political. Politics depend on c
 ode. If we want a world that is open and diverse we must code for it. How 
 do we achieve better code\, better politics and a better world together?
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:European politics: What you can do for me^H^H all of us.
DTSTART:20160829T120000Z
DTEND:20160829T130000Z
DTSTAMP:20260408T192553Z
UID:14724720-0013-3517-f64e-05b3e4b4198a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/european-politi
 cs-what-you-can-do-for-mehh-all-of-us/\n\nSpeaker(s): Niels Elgaard Larsen
 \n\nRecorded: Yes\n\nStreamed: Yes\n\nThere is an abundance of proposed la
 ws\, regulations\, initatiatives\, trade agreements\, etc.\, that we all c
 an see will do nothing good for our security and privacy. A lot of the tec
 hnology most people use every day seems to be designed to undermine our ri
 ght to privacy.\n\nSome of this is caused by a fundamental lack of underst
 anding of technology\, some on greed\, some is just evil.\n\nWe can fight 
 this on a political level\, as e.g.\, European Digital Rights and IT-Pol d
 o.\n\nBut we can also oppose it from our home ground. Using techology. We 
 already have\, of course. Imagine where we would be without Free Software\
 , PGP\, TOR\, Blockchains\, etc.\n\nBut where do we stand today? And how d
 o we take advantage of our hacker skills. I will give a brief overviews ba
 sed mostly on current European politics. Then we will have an open discuss
 ion about the way forward.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:r4d1o hacking 101
DTSTART:20160829T120000Z
DTEND:20160829T140000Z
DTSTAMP:20260408T192553Z
UID:14724720-0026-2054-88dc-5e7294bf99ff
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/r4d1o-hacking-1
 01/\n\nSpeaker(s): Christoffer Jerkeby\n\nRecorded: No\n\nStreamed: No\n\n
 Learn how to enable the antenna part of your ccc badge and get started wit
 h\nreceiving narrow band FM. In the workshop you will have the opportunity
  to\nsneak peak on the organizers radio communications using your SDR.\nIf
  there is more time we will look at WiFi radar or your protocol of choice.
 \n\nBring your own SDR device of choice.
LOCATION:Workshop room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Running a very Tor-friendly XMPP server
DTSTART:20160829T130000Z
DTEND:20160829T140000Z
DTSTAMP:20260408T192553Z
UID:14724756-0014-75c6-061f-e4fdc4887812
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/running-a-very-
 tor-friendly-xmpp-server/\n\nSpeaker(s): Jakob Wolffhechel\n\nRecorded: Ye
 s\n\nStreamed: Yes\n\nJakob runs the cloak.dk XMPP server. The server can 
 be\naccessed both from clear-net and as a hidden service on the Tor networ
 k.\n\nHe will talk about how it is setup\, secured and patched.\n\nHe will
  also demonstrate how to create a user on cloak through the Tor\nnetwork s
 o that one does not leak information in regards to physical\nlocation or i
 p-address\, not even on account-creation.\n\nHe also talks about how to fe
 derate with XMPP-servers that are\nTor-enabled and other XMPP-server that 
 are running only as Tor hidden\nservices so that one can use his or her cl
 oak-account for both clearnet\nfriends and friends who are only available 
 on Tor XMPP servers.\n\nAfter this talk you should be able to set up your 
 own Tor-friendly XMPP\nserver.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Running "server-less" applications in the cloud using AWS Lambda
DTSTART:20160829T140000Z
DTEND:20160829T150000Z
DTSTAMP:20260408T192553Z
UID:14724792-0013-70bb-0969-ace544d518ca
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/running-server-
 less-applications-in-the-cloud-using-aws-lambda/\n\nSpeaker(s): Loke Dupon
 t\n\nRecorded: Yes\n\nStreamed: Yes\n\nWhen moving workloads to the "cloud
 "\, why settle for simply running virtual machines\, that might as well be
  running in the datacenter. Why spend time maintaining the operating syste
 m layer at all? Using AWS Lambda it is now possible to run code without ca
 ring about the underlying operating system. AWS Lambda will scale the code
  to run on as many machines is necessary to answer the requests. But how d
 oes it work? What tools can be used to use it effeciently? How can we buil
 d a simple web service using a bit of Python code\, and some AWS magic.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacking the Hacking Team
DTSTART:20160829T150000Z
DTEND:20160829T160000Z
DTSTAMP:20260408T192553Z
UID:14724828-0014-5b6e-66e7-9428744a29e7
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/hacking-the-hac
 king-team/\n\nSpeaker(s): Klaus Agnoletti\, Thomas Hedberg\n\nRecorded: No
 \n\nStreamed: No\n\nWe’ll be talking about the hacking team hack which w
 ent down last year\, based on the recent whitepaper/manifesto released by 
 the alledged hacker. We will be discussing his methods\, lessons learned a
 nd talk about how effective they are and how/if they would work in our res
 pective company/campus network.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Badge Workshop
DTSTART:20160829T180000Z
DTEND:20160829T200000Z
DTSTAMP:20260408T192553Z
UID:14724936-0024-1dcd-30df-daf334d51a9f
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/badge-workshop/
 \n\nSpeaker(s): Thomas Flummer\n\nRecorded: No\n\nStreamed: No\n\nIn this 
 workshop you can learn how to solder and get help assembling your badge. W
 e will have soldering irons and other tools to help things along. You can 
 also discuss your ideas for badge hacks and modifications with the other p
 articipants and the host\, Thomas Flummer.
LOCATION:Workshop room
END:VEVENT
BEGIN:VEVENT
SUMMARY:The Alternative’s IT Policy Program
DTSTART:20160830T070000Z
DTEND:20160830T090000Z
DTSTAMP:20260408T192553Z
UID:14725404-0015-41f2-9f33-d95f74eb89e1
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/the-alternative
 s-it-policy-program/\n\nSpeaker(s): Rolf Bjerre\n\nRecorded: No\n\nStreame
 d: No\n\nThe Alternative’s IT policy program is close to completion and 
 the day will be used to share some of the main points together with the at
 tendants. We will start with a small resume and a debate. Then the partici
 pants will form groups and select which areas they want to upgrade.\n\nWe 
 are in lack of professional expertise in Danish politics\, especially with
 in IT. Today is the day we will change that.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:GraphQL - A Data Language
DTSTART:20160830T090000Z
DTEND:20160830T100000Z
DTSTAMP:20260408T192553Z
UID:14725476-0012-7660-3842-002fd4697b73
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/graphql-a-data-
 language/\n\nSpeaker(s): Jesper Louis Andersen\n\nRecorded: Yes\n\nStreame
 d: Yes\n\nGraphQL is a query-language for data\, intended for the modern i
 nternet\nclients on the web and\ninside mobile phones\, invented inside Fa
 cebook around 2012\, it is currently\nin a draft specification\nphase with
  several open source implementations of the underlying ideas.\n\nThe main 
 feature of GraphQL is a shift away from RESTful services where all\nof the
  query\ndeclaration is on the server side\, to one where the client is in 
 control\nof declaring what it wants.\nThe result is a system which is easy
  to work with for the front-end\ndeveloper. GraphQL also\nsupports backwar
 d compatibility to earlier client versions. All while being\nable to maint
 ain a\nsecurity level at least as good as REST. On the server side\, Graph
 QL\nprovides much the same\nbenefits\, acting as a protocol and contract b
 etween the server and client.\n\nThis talk presents GraphQL itself\, and a
 lso presents how one goes about\nbuilding an implementation\nof the langua
 ge. The running example is a GraphQL compiler written for\nErlang.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:The Alternatives IT Policy Program Continued
DTSTART:20160830T100000Z
DTEND:20160830T103000Z
DTSTAMP:20260408T192553Z
UID:14725512-0025-541e-7402-c9d2e43248f5
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/the-alternative
 s-it-policy-program-continued/\n\nSpeaker(s): Rolf Bjerre\n\nRecorded: No\
 n\nStreamed: No\n\nThe shortest way to influence national IT policy.\n\nRo
 lf Bjerre leads the common room AND there will be room for smaller groups 
 in other rooms. All development projects will be included\, provided they 
 don't diminish the existing IT project.
LOCATION:Workshop room
END:VEVENT
BEGIN:VEVENT
SUMMARY:How present day banking malware works? From Spam emails to money t
 ransfer
DTSTART:20160830T100000Z
DTEND:20160830T110000Z
DTSTAMP:20260408T192553Z
UID:14725512-0013-9a03-7014-12585460ea0d
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/how-present-day
 -banking-malware-works-from-spam-emails-to-money-transfer/\n\nSpeaker(s): 
 Saad Khan\n\nRecorded: Yes\n\nStreamed: Yes\n\nPresent day malware is very
  sophisticated and much different\nthan a decade ago. Malware is no longer
  a single executable file which\nexecutes on the victim's computer and run
 s as a process. There are multiple\nstages involved from a typical malware
  infection to completion of its\nobjectives. Typically\, infection starts 
 with a victim clicking on a link in\na spam email. It then leads to a bina
 ry executable downloaded and executed\non the victim's computer. This is h
 owever\, just the tip of the iceberg\, the\nexecuted binary usually downlo
 ads further binaries from internet and creates\nseveral processes\, regist
 ry keys and injects into legitimate process’s\nmemory. After a series of
  steps\, the money is transferred from victim's bank\naccount to a bank ac
 count controlled by criminals.\n\nThis talk will explain the events from s
 pam email to money transfer step by step to help the\naudience understand 
 malware and protect themselves better.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Keyless Entry Exploration and Exploitation
DTSTART:20160830T110000Z
DTEND:20160830T120000Z
DTSTAMP:20260408T192553Z
UID:14725548-0011-228d-5253-21e104d3b8fb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/keyless-entry-e
 xploration-and-exploitation/\n\nSpeaker(s): Knud Højgaard\n\nRecorded: No
 \n\nStreamed: No\n\nThis presentation will provide a walkthrough of the au
 dit process of an IP-enabled physical access control device.\n\nKnud aims 
 to cover some information about the methodology used during the process\, 
 but will mostly be discussing the (interesting or sad\, depending on the v
 iew) results of said audit. The presentation builds on work done on and of
 f over a few iterations of the product.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Communicating Security to Management
DTSTART:20160830T120000Z
DTEND:20160830T130000Z
DTSTAMP:20260408T192553Z
UID:14725584-0014-6777-38be-130b2420c81c
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/communicating-s
 ecurity-to-management/\n\nSpeaker(s): Klaus Agnoletti\, Thomas Hedberg\n\n
 Recorded: No\n\nStreamed: No\n\nTo have a good level of security in your c
 ompany\, management has to prioritize and endorse it.\nWe will talk about 
 why you as a security minded individual have to address security different
 ly to your management (actually much like you would talk about it to your 
 non-technical spouse or grandmother)\, and also how you address it so they
  understand. \n\nYou need to understand that to management security is not
  important - when there are no incidents\, at least.\n\nAlso you\, as a se
 curity minded individual\, has to understand security governance and ISO27
 00x. We will also talk a bit about that in a relevant and non-boring way (
 at least try :-).
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:(Polit|Techn)icians
DTSTART:20160830T133000Z
DTEND:20160830T153000Z
DTSTAMP:20260408T192553Z
UID:14725638-0014-3de0-9147-f1df04e3da3b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/polittechnician
 s/\n\nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nTuesday at BornHack 
 you will have a unique opportunity to meet and talk to some of the politic
 ians that shape the IT politics of Denmark and the EU.\n\nWe have invited 
 the politicians responsible for\, or involved with the IT politics of each
  party in Denmark. We hope that many of the politicians we invited will sh
 ow up - at the moment René Gade (member of Danish parliament for Alternat
 ivet) and Karen Melchior (alternate MEP for Radikale/ALTE) has accepted ou
 r invitation.\n\nThe purpose of this event is to get technicians and polit
 icians talking about current events in IT politics. The initial topic will
  be the Danish "sessionslogning" (soon-to-be-proposed complete  national I
 nternet session logging at ISP level)\, but during the event we expect the
  debate to branch out to other topics.\n\nWe want the technicians to educa
 te the politicians on technical aspects of IT legislation. We want the pol
 iticians to educate the technicians on why things are not neccesarily as s
 imple and clear-cut as they sometimes seem. We want everyone to walk away 
 with new knowledge\, new contacts\, and a better sense of where we are hea
 ded as an IT dependent society.\n\nThe event is kindly sponsored and hoste
 d by PROSA - the Danish association of IT-professionals\, and it will be m
 oderated by Anders Kjærulff from the Danish radio program "Aflyttet".\n\n
 We hope that a lot of the technicians present at BornHack will take this o
 pportunity to make your voice heard and move things forward. Shouting on T
 witter will only get us so far\, at some point we have to interact with po
 liticians if we want things to change.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:MirageOS - robust operating system design from the grounds up
DTSTART:20160830T160000Z
DTEND:20160830T170000Z
DTSTAMP:20260408T192553Z
UID:14725728-0012-3d1a-c5a3-527624a68a41
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/mirageos-robust
 -operating-system-design-from-the-grounds-up/\n\nSpeaker(s): Hannes Mehner
 t\n\nRecorded: Yes\n\nStreamed: Yes\n\nContemporary operating systems suff
 er from being enormous code bases\,\nriddled with bugs\, still supporting 
 legacy hardware (like floppy\ndrives).  A common attack vector is based on
  unsafe memory operations -\nlack of bounds checks (buffer overflows) and 
 temporal memory safety\nviolations (double free\, use after free).\n\nBut 
 the environment changed: for security reasons\, each service is\nusually i
 solated in its own virtual machine\, and the virtual machines\nare schedul
 ed by the hypervisor onto the physical hardware.  The\nrequirements for op
 erating systems changed\, but most operating systems\nare only extended to
  support more complex environments.\n\nIn this talk I will present a radic
 al approach to operating systems\ndesign: back to ring 0\, starting from s
 cratch.  Programming language\ntechnology has progressed since UNIX was wr
 itten in C\, automated memory\nmanagement is widely used\, strong and stat
 ic types are usable\, and we\nlearned how to build reusable libraries and 
 package those.\n\nMirageOS is a library operating system written mostly in
  OCaml\, a\nfunctional and modular programming language.  It targets hyper
 visors\,\nthus does not contain hardware-specific drivers\, but generic dr
 ivers\n(e.g. a VirtIO network driver).  Each MirageOS application consists
  of\nonly those OCaml libraries required - why should my name server have\
 nuser management and a file system?  The lines of code\, and thus the\natt
 ack vectors\, are drastically reduced.  We already implemented various\nco
 mmon network protocols\, such as HTTP\, TCP/IP\, TLS\, DHCP.\n\nI will exp
 lain the design and implementation of our TLS stack in more\ndetail\, whic
 h separates the effectful bits from the protocol logic very\nclearly\, whi
 le preserving reasonable performance.\n\nLinks:  \n\n- [mirage.io](https:/
 /mirage.io)\n- [nqsb.io](https://nqsb.io)
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:D̶o̶n̶'̶t̶ Ask D̶o̶n̶'̶t̶ Tell
DTSTART:20160830T170000Z
DTEND:20160830T180000Z
DTSTAMP:20260408T192553Z
UID:14725764-0014-4836-523f-a0b5847ec910
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/dont-ask-dont-t
 ell/\n\nSpeaker(s): Peter Kofod\n\nRecorded: Yes\n\nStreamed: Yes\n\nLeaks
 \, Hacks & The Public Right To Know. From Vietnam to Iraq\; The NSA\,\nTax
  Havens and dirty politics. Examples of what decades of unauthorized\ndisc
 losures has taught us about the world we live in. What else would we\nlike
  to know?
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to Sustainable Growth in a Digital World
DTSTART:20160831T070000Z
DTEND:20160831T093000Z
DTSTAMP:20260408T192553Z
UID:14726268-0015-6372-f833-5599949b192b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/introduction-to
 -sustainable-growth-in-a-digital-world/\n\nSpeaker(s): Stephan Engberg\n\n
 Recorded: No\n\nStreamed: No\n\nFree Choice is the underestimated key to s
 ecure value creation in a complex economy\, where GDP-models only measure 
 commercial profit and ignore the environment. We reconstruct the model thi
 nking about Utility\, Production\, Security and Environment around the 5 C
 riteria for Sustainability.\n\nLocal Identities is the critical enabler of
  security in a digital world where everything is integrated. We look at th
 e 5 Levels of Privacy/Security by Design and the demands on technology wit
 h special focus on Personal Data Control and Contextual Security Validatio
 n including conditional security.\n\nNeeds-driven Innovation is about desi
 gning for continuous needs-driven change. We use Healthcare and especially
  Health Research to exemplify how a new humanitarian economy based on Indi
 vidual Data Control can eliminate the apparent trade-offs and balance requ
 irements on a higher level starting in the present situation.\n\nAfter the
  Introduction there will be possibility to go deeper in Workshops.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to Sustainable Growth in a Digital World Continued
DTSTART:20160831T100000Z
DTEND:20160831T103000Z
DTSTAMP:20260408T192553Z
UID:14726376-0025-7a34-5bf3-79f4548dabb7
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/introduction-to
 -sustainable-growth-in-a-digital-world-continued/\n\nSpeaker(s): Stephan E
 ngberg\n\nRecorded: No\n\nStreamed: No\n\nFree Choice is the underestimate
 d key to secure value creation in a complex economy\, where GDP-models onl
 y measure commercial profit and ignore the environment. We reconstruct the
  model thinking about Utility\, Production\, Security and Environment arou
 nd the 5 Criteria for Sustainability.\n\nLocal Identities is the critical 
 enabler of security in a digital world where everything is integrated. We 
 look at the 5 Levels of Privacy/Security by Design and the demands on tech
 nology with special focus on Personal Data Control and Contextual Security
  Validation including conditional security.\n\nNeeds-driven Innovation is 
 about designing for continuous needs-driven change. We use Healthcare and 
 especially Health Research to exemplify how a new humanitarian economy bas
 ed on Individual Data Control can eliminate the apparent trade-offs and ba
 lance requirements on a higher level starting in the present situation.
LOCATION:Workshop room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Django Crash Course and hands-on Workshop
DTSTART:20160831T103000Z
DTEND:20160831T130000Z
DTSTAMP:20260408T192553Z
UID:14726394-0021-610f-1bc2-e747541f187e
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/django-crash-co
 urse-and-hands-on-workshop/\n\nSpeaker(s): Benjamin Bach and Víðir Valbe
 rg Guðmundsson\n\nRecorded: No\n\nStreamed: No\n\n**Duration:** 3 hours  
 \n**Seats:** 20  \n**Need to know:** Programming experience (preferably Py
 thon [0])\,  \n**Nice to know:** HTTP knowledge [1]\, Git [2]  \n\nDjango 
 [3] is "the web framework for perfectionists with deadlines". The\nframewo
 rk has existed for over 10 years and is thus full of highly\nrefined desig
 n principles\, yet it continues to innovate and streamline\nits practices.
  The developer scene of Django is continuing to grow\, and\npeople use for
  anything from prototyping to production sites with\nmillions on users. Dj
 ango is written in the Python programming language.\n\nAs open source deve
 lopers and community people\, we think Django is the\nmost awesome framewo
 rk for building web applications and you should\nlearn it. Bring your lapt
 op and we'll install and introduce Django and\nits concept. After that\, w
 e'll create a Django project together and dive\ninto it head-first.\n\n###
 # First half\n\nDuring the first part of the workshop\, we'll install Djan
 go and a\nvirtual python environment.\n\nThen we'll introduce Django's lay
 ers and components such as the\nrequest-response loop\, how URLs are handl
 ed\, static files etc.\n\n#### Second half\n\nOnce we're done with the bas
 ics\, we'll try to introduce some hands-on\nhigher level work and let you 
 hack on your own project.\n\nIf you don't have your own project\, don't wo
 rry! We'll bring our\nfavourite ecological food coop project Eggplant [4]\
 , which we regard as not\njust another open source project\, but a best pr
 actice arena for the\nDanish Django community. We'll have beginner-friendl
 y issues ready on\nGithub\, and if you do a PR\, we'll make sure to review
  it in the\nstrictest manner possible!\n\nReferences:\n\n[0] https://pytho
 n.org  \n[1] https://en.wikipedia.org/wiki/Web_server  \n[2] https://git-s
 cm.com/book/en/v2  \n[3] https://djangoproject.com/  \n[4] http://eggplant
 .dk/
LOCATION:Workshop room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Designing Composable Security
DTSTART:20160831T130000Z
DTEND:20160831T140000Z
DTSTAMP:20260408T192553Z
UID:14726484-0013-0e64-58d4-8927f4fd1a22
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/designing-compo
 sable-security/\n\nSpeaker(s): Ximin Luo\n\nRecorded: No\n\nStreamed: No\n
 \n"Lots of things are wrong with the internet\, everything sucks" is a rec
 urring\ntheme at many tech events like this. But there is not enough focus
  on concrete\nlong-term fixes. Discussions of security topics are not syst
 ematic enough\, and\npeople and companies pushing selfish agendas makes th
 ese problems worse.\n\nIn this talk we suggest better "ground-up" approach
 es to secure system design.\nComposability is the key idea here\; we'll di
 scuss both abstract principles for\nachieving this\, as well as concrete c
 omponents that "someone should make" that\nwould compose with other future
  components. Thus\, different teams can work\ntogether towards a common go
 al instead of competing for each others' users and\nvolunteers. Any backwa
 rds-compatibility hacks may be decomposed away when no\nlonger needed\, in
 stead of permanently polluting other parts of the ecosystem.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:American Fuzzy Lop and Address Sanitizer
DTSTART:20160831T150000Z
DTEND:20160831T160000Z
DTSTAMP:20260408T192553Z
UID:14726556-0013-84fd-47ba-245c342e5a8e
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/american-fuzzy-
 lop-and-address-sanitizer/\n\nSpeaker(s): Hanno Böck\n\nRecorded: Yes\n\n
 Streamed: Yes\n\nWe have powerful and easy to use tools that can vastly im
 prove the quality and security of the code we use everyday.\n\nCode writte
 n in C and C++ is often riddled with bugs in the memory management. Out of
  bounds accesses\, use after free errors and other issues can hamper the s
 ecurity and stability of applications. Unfortunately many free software de
 velopers don't use freely available tools that easily allow finding and el
 iminating many of these bugs. The talk will encourage developers to change
  that and integrate these tools into their development process.\n\nSlides:
  [https://www.int21.de/slides/bornhack2016-fuzzing/](https://www.int21.de/
 slides/bornhack2016-fuzzing/)
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Cooking Onions At Bornhack Village
DTSTART:20160831T160000Z
DTEND:20160831T170000Z
DTSTAMP:20260408T192553Z
UID:14726592-0016-3359-de88-dead14d7c879
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/cooking-onions-
 at-bornhack-village/\n\nSpeaker(s): asn\n\nRecorded: No\n\nStreamed: No\n\
 nHere are some recipes for onion services and tips on how to cook them rig
 ht.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:PGP Keysigning Party
DTSTART:20160831T190000Z
DTEND:20160831T200000Z
DTSTAMP:20260408T192553Z
UID:14726700-0025-0d84-3a4a-2aba849c7b0b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/pgp-keysigning-
 party/\n\nSpeaker(s): Ximin Luo\n\nRecorded: No\n\nStreamed: No\n\nLet's v
 erify each other's digital PGP keys at BornHack so that we can authenticat
 e each other when we are not together at the island.\n\nFor people who hav
 en't attended a PGP keysigning party before\, we will guide you through it
 \n\n### What do I need to bring?\n\n1. Bring the output of `gpg --fingerpr
 int $YOUR_KEY_ID` on some pieces of paper to hand out.\n2. (Optional) Brin
 g some government-issued identification paper (passport\, drivers license\
 , etc.). The ID should contain a picture of yourself. You can leave this o
 ut\, but then it will be a bit harder for others to verify your key proper
 ly.
LOCATION:Workshop room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacker Jeopardy Qualifier 2
DTSTART:20160831T200000Z
DTEND:20160831T210000Z
DTSTAMP:20260408T192553Z
UID:14726736-0018-f1e0-21e0-2ac5487283e5
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/hacker-jeopardy
 -qualifier-2/\n\nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nHacker Je
 opardy qualifying round 2
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:The Future Public sector
DTSTART:20160901T090000Z
DTEND:20160901T094500Z
DTSTAMP:20260408T192553Z
UID:14727204-0015-8180-69a6-667a441e6825
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/the-future-publ
 ic-sector/\n\nSpeaker(s): Jesper Arp\, Johan Bender\n\nRecorded: No\n\nStr
 eamed: No\n\nHow can (and will) technology shape the future public sector?
  Challenged by large legacy systems\, the public sector is falling behind 
 in terms user experience when compared to the private sector. At this work
 shop\, we invite participants to imagine and co-ideate the future solution
 s. We will begin with different idea-generation frameworks and an overview
  of the different technologies that might be worth considering. Since some
  of the participants will be from the government\, our hope is that some o
 f the ideas will be promising enough for the government to consider.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Visualisation of Public Datasets
DTSTART:20160901T094500Z
DTEND:20160901T103000Z
DTSTAMP:20260408T192553Z
UID:14727231-0025-99cc-4d48-d292f47a3aaa
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/visualisation-o
 f-public-datasets/\n\nSpeaker(s): Jesper Arp\, Johan Bender\n\nRecorded: N
 o\n\nStreamed: No\n\nAt the same time as society is getting more complex\,
  the amount of data is growing exponentially. How are everyday citizens to
  relate to National budgets used in the media? I am going to talk about on
 e of the ways I think will make it easier to understand the datasets used 
 in the media.\n\nI will present some portals where it is possible to get p
 ublic datasets. Afterwards we will reflect about the use of these datasets
 .\n\nTowards the end we will open up to debate about how to use these reso
 urces or if there are other solutions.
LOCATION:Workshop room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Future Perspectives
DTSTART:20160901T103000Z
DTEND:20160901T110000Z
DTSTAMP:20260408T192553Z
UID:14727258-0016-0d3a-0739-92bb841af933
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/future-perspect
 ives/\n\nSpeaker(s): Jesper Arp\, Johan Bender\n\nRecorded: No\n\nStreamed
 : No\n\nWe will sum up on the development of the day and are possibly read
 y for ballot on the last day of BornHack.\nIt will also be possible to bec
 ome a part of the support team of The Parliaments IT forums.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:TLS attacks and the burden of faulty TLS implementations
DTSTART:20160901T120000Z
DTEND:20160901T130000Z
DTSTAMP:20260408T192553Z
UID:14727312-0012-48ea-5475-80371489493c
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/tls-attacks-and
 -the-burden-of-faulty-tls-implementations/\n\nSpeaker(s): Hanno Böck\n\nR
 ecorded: Yes\n\nStreamed: Yes\n\nTLS is by far the most important cryptogr
 aphic protocol in use today.\nIn recent years TLS received much more atten
 tion from security\nresearchers. Implementation errors like Heartbleed and
  protocol bugs\nlike BEAST\, Lucky Thirteen\, DROWN and many more have mad
 e headlines.\n\nFaulty implementations can enable attacks. In some cases t
 hey can even\nbe a security risk for uninvolved third parties and endanger
  the whole\nTLS ecosystem. Especially so-called Enterprise devices that ha
 ve their\nown TLS stack are often a reason for concern.\n\nThe speaker wil
 l give an overview of implementation errors that\nhappened in various TLS 
 stacks and will shed light on this\nunderappreciated problem.\n\nSlides: [
 https://www.int21.de/slides/bornhack2016-tls/](https://www.int21.de/slides
 /bornhack2016-tls/)
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Bluetooth Low Energy
DTSTART:20160901T130000Z
DTEND:20160901T140000Z
DTSTAMP:20260408T192553Z
UID:14727348-0011-5af2-857f-4b3fe44d982d
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/bluetooth-low-e
 nergy/\n\nSpeaker(s): Michael Knudsen\n\nRecorded: Yes\n\nStreamed: Yes\n\
 nBLE provides versatile wireless communication at a very low\npower consum
 ption\, especially compared to classic Bluetooth\nand WiFi.\n\nIt has a wi
 de range of uses where proximity detection is used\nfor a lot of applicati
 ons such as alerting when a keychain\ngoes out of range or requesting aler
 ts from lost objects.  Among\nconsumer products\, Apple iBeacons is a nota
 ble application of\nthe technology.  However\, it is also used for human i
 nput devices\nsuch as mice and keyboards as well as various forms of senso
 rs\,\ne.g. temperature\, heart rate\, etc.\n\nBLE enables devices to run o
 ff coincell batteries for years\nwhile retaining connections or doing peri
 odic broadcasting.\nThis makes the technology appealing for the maker comm
 unity\nfor applications that are power-constrained\, e.g. due to having\na
  limited power-budget (say\, running off a small PV-cell) or\nrunning off 
 a battery.\n\nThis talk explains how the low power consumption is achieved
 \,\nwhat the possible topologies are\, and how this affects the types\nof 
 applications you can build on top.  Finally\, a low-level\ndemonstration o
 f interfacing with a BLE controller is performed.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:OE-lite - Hack on Your Own Devices
DTSTART:20160901T140000Z
DTEND:20160901T150000Z
DTSTAMP:20260408T192553Z
UID:14727384-0012-67d9-3089-540114ff29d7
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/oe-lite-hack-on
 -your-own-devices/\n\nSpeaker(s): Kim Højgaard-Hansen\n\nRecorded: Yes\n\
 nStreamed: Yes\n\nHave you ever wanted to do something cool with one of yo
 ur electronic devices\, but been stopped from doing it because the vendor 
 did not think of that use-case?\nHave you ever found a problem with the co
 de on one of your devices but being unable to fix it because the vendor no
  longer cared about the software or did not allow modifications?\n\nHave y
 ou ever had to throw out perfectly good hardware since the software was no
  longer updated/working?\n\nI have :) And it makes me annoyed every time!\
 n\nInstead of being in the hands of the vendor of your NAS\, router\, medi
 a-center etc. how about actually controlling it yourself?\n\nIn this talk 
 I will present a framework (OE-lite) to build custom embedded Linux from s
 cratch. I will talk about why it is simply not good enough to “just inst
 all Ubuntu on the damn thing!” and walk through my own use-case of build
 ing a router from a BananaPI-R1 board.\n\n\nOE-lite is a mature framework 
 for creating robust\, maintainable custom Linux platforms. Originally fork
 ed from OpenEmbedded to showcase how to improve on major technical defects
 \, today OE-lite is a serious alternative to frameworks like Yocto\, build
 root or OpenWRT. With a strong focus on avoiding surprises when developing
  custom Linux systems\, working with very different hardware platforms fro
 m the same codebase and maintaining the systems for 10 - 15 years OE-lite 
 offers another perspective on embedded Linux systems. The project have not
  been very public\, but we have been working hard to change that and we ar
 e now inviting embedded Linux developers to\ncome join us!\n\nLink: [oe-li
 te.org](http://www.oe-lite.org/)
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Checking a Distributed Hash Table for Correctness
DTSTART:20160901T150000Z
DTEND:20160901T160000Z
DTSTAMP:20260408T192553Z
UID:14727420-0012-1a8f-2171-b383142c1803
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/checking-a-dist
 ributed-hash-table-for-correctness/\n\nSpeaker(s): Jesper Louis Andersen\n
 \nRecorded: Yes\n\nStreamed: Yes\n\nDistributed Hash Tables are used as na
 me-lookups in large decentralized\ndistributed systems\nsuch as peer-to-pe
 er networks and loosely connected machine clusters.\nCorrectness is\ncompl
 icated by their distributed nature. This talk presents an\nimplementation 
 of one such DHT\,\nwritten in Erlang\, based on the Kademlia data structur
 e. Its unique feature\nis that it comes equipped with\na full QuickCheck s
 pecification\, which semi-formally verifies its correct\nbehaviour through
  random\ntest generation.\n\nThe talk focuses on the test aspect of the sy
 stem\, and how one builds\nfairly large QuickCheck\nspecifications for rea
 l-world systems\, in particular by slicing a large\nspecification into iso
 lated\nparts and then reassembling those parts into a full model. It is in
 tended\nto give people an overview\nof how to attack larger code bases wit
 h (semi-) formal methods.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:How to (not) Store Your Password
DTSTART:20160901T160000Z
DTEND:20160901T170000Z
DTSTAMP:20260408T192553Z
UID:14727456-0011-8927-a170-7ad2448ac9b8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/how-to-not-stor
 e-your-password/\n\nSpeaker(s): Ronni Elken Lindsgaard\n\nRecorded: Yes\n\
 nStreamed: Yes\n\nThere is much dispute on how to securely store passwords
 . Traditionally\nthere are two schools: Online and Offline password manage
 ment.\nBoth have strengths and weaknesses when it comes to security as\nwe
 ll as accessibility and portability. Both methods have one weakness\nin co
 mmon though: they store your password. In this talk I will\ndiscuss the va
 rious strengths and weaknesses of traditional password\nmanagers and prese
 nt a method that has the main strengths of both\nonline and offline passwo
 rd managers\, but allows you to generate secure\npasswords on-the-fly\, ne
 ver to store them again.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hushfile.it v2
DTSTART:20160901T170000Z
DTEND:20160901T190000Z
DTSTAMP:20260408T192553Z
UID:14727492-0024-2584-5ddf-74eb44b649e7
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/hushfileit-v2/\
 n\nSpeaker(s): Janus Troelsen\, Ronni Elken Lindsgaard\, Thomas Steen Rasm
 ussen\n\nRecorded: No\n\nStreamed: No\n\nHushfile is a zero-knowledge (cli
 entside encrypted) filesharing service.\nThe code is on https://github.com
 /hushfile (spread around different\nrepositories)\, and the service is run
 ning on https://hushfile.it/\n\nThe first part of this workshop will expla
 in the idea behind hushfile.\nThe initial (and current) implementation wil
 l be covered\, including the\nrationale for some of the choices I made. Th
 e various attempts at adding\nlarge file support will be covered\, includi
 ng why they failed.\n\nThe second part of the workshop will be an open dis
 cussion about the\nfuture of hushfile. All ideas and input are welcome\, a
 lthough ideas that\nare possible to implement today are preferrable to ide
 as that might be\npossible to implement a few years down the line. Hopeful
 ly we can arrive\nat a set of goals and principles that can guide the futu
 re development\nof hushfile.\n\nThe third and final part of the workshop w
 ill be hacking on PoC\nimplementations of what we discussed in part two. H
 opefully we can get\nas far as mocking up some working prototypes for serv
 er and clients.\n\nThe workshop will also feature the two other main devel
 opers on\nhushfile\, Janus Troelsen and Ronni Elken Lindsgaard (time permi
 tting).\n\nNOTE: The workshop will be taking place in the speaker tent.
LOCATION:Workshop room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Summary of the week for The Alternatives presence at BornHack
DTSTART:20160902T070000Z
DTEND:20160902T090000Z
DTSTAMP:20260408T192553Z
UID:14727996-0016-16c4-eb06-dbde94b8196c
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/summation-on-th
 e-week-for-the-alternative/\n\nSpeaker(s): Jesper Arp\, Rolf Bjerre\n\nRec
 orded: No\n\nStreamed: No\n\nWe will summarize the week and discuss and pr
 esent progress and fun had during the week. There will be pictures.\n\nIf 
 anyone wants to contribute with pics or stories\, please talk to Jesper Ar
 p or Rolf Bjerre.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lightning Talks
DTSTART:20160902T090000Z
DTEND:20160902T120000Z
DTSTAMP:20260408T192553Z
UID:14728068-0014-0518-d6b2-e93514163908
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/lightning-talks
 /\n\nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\n#### Quality Assuranc
 e gone wrong\n\nThinkpads have been the choice of the community. [Techinc]
 (http://techinc.nl/) once\nbought a bunch of x201 and we looked into the b
 ios and found out\, that\nthe quality assurance engineer had a pretty funk
 y computer setup.\n\nThis talks goes into what we found out and why Lenovo
  rolled out a new\nx201 bios release.\n\n##### Jurre van Bergen\n\nJurre i
 s all over the place\, by day he works at Greenhost\, a\nsustainable webho
 sting company and in addition contributes to some open\nsource projects li
 ke Tails. Previously\, he started\, Technologia\nIncognita\, an Amsterdam 
 hackerspace\, was the Hack in the Box Amsterdam\nCTF overlord and a drop-o
 ut.\n\n<hr />\n\n#### Help me out bro\n\nBropages are a beginner-friendly\
 , example-based supplement to the manpages.\nOther than searching the web 
 for commands\, ie. the usage of commands\, bropages ease the transition to
 wards using the  manpages\, which can be very daunting to beginners.\n\nA 
 quick overview of the tool and why and how you should contribute\, even an
 d especially as someone comfortable in the \nUNIX commandline.\n\n##### Sa
 rah Braun\n\nSarah is a journeyman carpenter turned backend developer.\n\n
 <hr />\n\n#### SHA2017\n\nSHA2017 is the next major Dutch outdoor hacker c
 onferences which are held every four years. This talk shows how this event
  is organized\, what can be expected and\nof course tries to get people on
  board in organizing. SHA\, EMF and CCC alternate every year to bring a bi
 g outdoor event for hackers.\n\nThe next Dutch event aims for about 5500 v
 isitors.\n\n##### Eightdot\n\n<hr />\n\n#### Meteor\, the Distributed Data
  Protocol and You!\n\nMeteor is a web and mobile application development p
 latform built on\nNode.js that brings with it some really cool tools out o
 f the box. It\nenables developers to very quickly set up an MVP applicatio
 n by providing\nthings like build tools\, full-stack reactivity\, auth/use
 r system and first\nparty support for two major view systems(React and Ang
 ular)\, leaving the\ndeveloper time to build the actual features.\n\nThe b
 ody of the talk will be demoing some cool features of Meteor's\ndistribute
 d data protocol(DDP) and a brief summary about some strengths and\nweaknes
 ses of Meteor in general.\n\n##### Jonas Klastrup\n\nJonas is a frontend d
 eveloper from Kalundborg with a passion for real-time\ndata and an unhealt
 hy obsession with server-side rendering in this age of\nsingle page javasc
 ript apps. When he's on the clock he's the CJSO at Rebel\nPenguin\, dealin
 g with live sports and betting data.\n\n<hr />\n\n#### Measurements and th
 e Broken Internet\n\nThe internet is broken\, always something wrong somew
 here. I will go through some of the sites that can help discover and debug
  internet network problems.\n\n##### Henrik Lund Kramshøj\n\nHenrik is an
  internet samurai working in internet and security around the world.\n\n<h
 r />\n\n#### Fingerprint Cloning\n\nA quick walkthrough of the process and
  gear involved when wishing to spoof/clone fingerprints for unlocking smar
 tphones.\n\n##### Knud Højgaard\n\n<hr />\n\n#### IRC over SMS at BornHac
 k\n\nAlex will walk over a small tool that was written in the evenings of 
 the planning week right before BornHack.\n\n##### Alexander Færøy\n\nHac
 ker\, crypto hobbyist\, BornHack organizer.\n\n<hr />\n\n\n#### More to be
  announced.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Running Exit Nodes in the North
DTSTART:20160902T120000Z
DTEND:20160902T130000Z
DTSTAMP:20260408T192553Z
UID:14728176-0011-4975-c52f-7db5a4177a27
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/running-exit-no
 des-in-the-north/\n\nSpeaker(s): Juha Nurmi\n\nRecorded: No\n\nStreamed: N
 o\n\nTor is free software and an open network that helps you defend agains
 t\ntraffic analysis\, a form of network surveillance that threatens person
 al\nfreedom and privacy\, confidential business activities and relationshi
 ps\,\nand state security.\n\nPeople can donate their bandwidth to the Tor 
 network and support human\nrights. Many people in Finland have done this.\
 n\nEspecially Tor network needs fast exit nodes which are final nodes befo
 re\ntraffic reaches its destination. Because Tor traffic exits through the
 se\nrelays\, the IP address of the exit relay is interpreted as the source
  of\nthe traffic.\n\nIf a malicious user employs the Tor network to do som
 ething that might be\nobjectionable or illegal\, the exit relay may take t
 he blame. People who run\nexit relays should be prepared to deal with comp
 laints\, copyright takedown\nnotices\, and the possibility that their serv
 ers may attract the attention\nof law enforcement agencies.\n\nIn Finland\
 , Juha Nurmi has been establishing good relationships with ISPs\nand law e
 nforcement agencies to keep Finnish exit nodes online.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Technical and Political Aspects of Running Uncensored DNS servers
DTSTART:20160902T130000Z
DTEND:20160902T140000Z
DTSTAMP:20260408T192553Z
UID:14728212-0012-8a96-c181-2c63e42b787e
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/technical-and-p
 olitical-aspects-of-running-uncensored-dns-servers/\n\nSpeaker(s): Thomas 
 Steen Rasmussen\n\nRecorded: Yes\n\nStreamed: Yes\n\nThe UncensoredDNS pro
 ject was started almost 7 years ago\, back in November 2009. People were a
 sking for recommendations for alternatives to their ISP's censored DNS ser
 vers.\n\nBack then OpenDNS did NXDOMAIN redirection\, an advertising trick
  where misspelled nonexistant domains are redirected to a search page with
  ads instead of returning an NXDOMAIN error. They also didn't have ipv6 or
  DNSSEC\, both of which are mandatory on a modern DNS server\, even back i
 n 2009.\n\nEven if Google DNS had existed back then I wouldn't have felt c
 omfortable recommending them either. While they do run a stable\, fast and
  largely uncensored service\, I am not convinced that it is a good idea to
  hand over all your DNS lookups to Google.\n\nAll this prompted me to do s
 omething about the situation so I started UncensoredDNS with help from fri
 ends. I also give talks to explain why I am doing this\, since people natu
 rally have an easier time trusting a service if they know who is behind it
 .\n\nThe talk be a state-of-the-dns type thing\, with some political but m
 ostly technical content. The  technical content will include statistics\, 
 background and status on the anycast project\, dnscrypt\, the openvpn proj
 ect\, the move to ansible\,  the new dns-over-http proposal\, and more.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:State of the Network
DTSTART:20160902T140000Z
DTEND:20160902T150000Z
DTSTAMP:20260408T192553Z
UID:14728248-0013-66db-fd08-adff64323ba0
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/state-of-the-ne
 twork/\n\nSpeaker(s): BornHack Network Team\n\nRecorded: Yes\n\nStreamed: 
 Yes\n\nCome and meet the network team who will talk about the design and o
 peration of the network at BornHack.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:How to contribute to Tails
DTSTART:20160902T150000Z
DTEND:20160902T160000Z
DTSTAMP:20260408T192553Z
UID:14728284-0014-8937-f07e-33a6c4bbdbfb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/how-to-contribu
 te-to-tails/\n\nSpeaker(s): Jurre van Bergen\n\nRecorded: Yes\n\nStreamed:
  Yes\n\nIn this session\, we guide you from being interested in Tails\nto 
 how to contribute to free and open source software that can benefit\nTails
 .\n\nYou don't have to be technical in order to contribute\, we'll have a\
 nspecial section on how to contribute to Tails without having to be techni
 cal.\n\n[tails.boum.org](https://tails.boum.org)
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Building a Tor implementation in Erlang
DTSTART:20160902T160000Z
DTEND:20160902T170000Z
DTSTAMP:20260408T192553Z
UID:14728320-0014-9fa9-28be-c0238423484a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/building-a-tor-
 implementation-in-erlang/\n\nSpeaker(s): Alexander Færøy\n\nRecorded: No
 \n\nStreamed: No\n\nOver the past year I've been hacking\, on and off\, on
  a third-party\nimplementation of Tor in the Erlang programming language. 
 While the\nimplementation is far from prime time ready I believe it's time
  to be a\nbit more public about the project.\n\nDuring the talk I will go 
 over some of the design decisions\, how things\nare implemented\, and the 
 overall architecture of Talla. I will walk over\nthe first milestones that
  I hope the project will reach within the\nnearest future.\n\nNo prior kno
 wledge of the Erlang programming language or Tor will be\nneeded to attend
  this talk.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Goodbye World
DTSTART:20160902T170000Z
DTEND:20160902T180000Z
DTSTAMP:20260408T192553Z
UID:14728356-0013-547b-a10e-277ff46898c0
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/goodbye-world/\
 n\nSpeaker(s): BornHack Team\n\nRecorded: No\n\nStreamed: No\n\nBornHack i
 s almost over at this point. We would like to say farewell for now and see
  you again at the next event.\n\nSince it is first time BornHack is taking
  place\, we will walk over what we believe has worked and what we believe 
 should change the next event. This is an excellent opportunity to submit i
 deas for BornHack 2017 while the memories are still fresh.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacker Jeopardy Finals
DTSTART:20160902T180000Z
DTEND:20160902T190000Z
DTSTAMP:20260408T192553Z
UID:14728392-0011-0f4a-fb22-ae0994963901
DESCRIPTION:URL: https://bornhack.dk/bornhack-2016/program/hacker-jeopardy
 -finals/\n\nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nHacker Jeopard
 y Finals between the winners of the three qualifying games
LOCATION:Speakers Tent
END:VEVENT
END:VCALENDAR
