BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//BornHack Website iCal Generator//bornhack.dk//
NAME:BornHack 2020
X-WR-CALNAME:BornHack 2020
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20200811T100000Z
DTEND:20200811T110000Z
DTSTAMP:20260409T010856Z
UID:15971400-0029-366c-6ce0-91321334b369
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/lunch-break/\n\
 nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break
 . Remember to drink water and keep some distance in the lines.
LOCATION:Food Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hello World!
DTSTART:20200811T190000Z
DTEND:20200811T200000Z
DTSTAMP:20260409T010856Z
UID:15971724-0025-3316-1c67-dd584fc430d8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/hello-world/\n\
 nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nThe BornHack 2020
  team would like to welcome you to this years BornHack event at our new ve
 nue. We will walk over changes to the venue\, schedule\, and other informa
 tion about the event itself.\n\nThis is also an excellent opportunity to m
 eet the teams behind BornHack.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20200812T100000Z
DTEND:20200812T110000Z
DTSTAMP:20260409T010856Z
UID:15972264-0029-366c-6ce0-91321334b369
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/lunch-break/\n\
 nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break
 . Remember to drink water and keep some distance in the lines.
LOCATION:Food Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Roadtrip to UCL fablab
DTSTART:20200812T100000Z
DTEND:20200812T140000Z
DTSTAMP:20260409T010856Z
UID:15972264-0030-3741-1c50-1d21bcb47248
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/roadtrip-to-ucl
 -fablab/\n\nSpeaker(s): Morten\n\nRecorded: No\n\nStreamed: No\n\nLike las
 t year\, we have arranged for the Bornhack participants to go to the fabla
 b at UCL.\n\nAt fablab they have lasercutters\, 3D printers\, sticker mach
 ine and so on. \nDue to IT issues\, they don't have an official info page 
 at the moment - but they do have a facebooke page: https://www.facebook.co
 m/FabLabUCL\n\n\nWe will meet up at the info booth at 12.00 and go by car 
 to the location i Odense.
LOCATION:Info Desk
END:VEVENT
BEGIN:VEVENT
SUMMARY:Electronic conference badges
DTSTART:20200812T110000Z
DTEND:20200812T120000Z
DTSTAMP:20260409T010856Z
UID:15972300-0025-3251-5994-2bd83214856a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/electronic-conf
 erence-badges/\n\nSpeaker(s): Thomas Flummer\n\nRecorded: Yes\n\nStreamed:
  Yes\n\nIn this presentation\, we will take a look at this years badge and
  a bit about the decisions and troubles leading up to this point.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:`niseq`: rethinking how live visual art is made
DTSTART:20200812T120000Z
DTEND:20200812T130000Z
DTSTAMP:20260409T010856Z
UID:15972336-0025-3347-e602-7e874d3451d9
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/niseq-rethinkin
 g-how-live-visual-art-is-made/\n\nSpeaker(s): rand\n\nRecorded: Yes\n\nStr
 eamed: Yes\n\nThe talk will be about the live art instrument `niseq`\, whi
 ch stands for 'the n-dimensional image-sequencer'. It will revolve around 
 the foundational ideas of why `niseq` is relevant as a tool for making art
 \, the design of the instrument from an artists perspective - and around t
 he technical aspects of the construction of the software in the functional
  language OCaml.\n\nMost of film-art made today is centered around a narra
 tive structure - where the relevance of the film-medium has gone into the 
 background\, and has more become a fast-food alternative to books. Early f
 ilm-experiments done by the dadaists and surrealists see so much more pote
 ntial in the medium than what it has become today. `niseq` can be seen as 
 'going back to the roots' of early 1920's cinema\, but at the same time br
 inging live art to the film-medium\, as e.g. seen in modern electronic art
  made with modular synthesizers. \n\nThe software relies on modern graphic
 s-cards and SSD's\, and enables 60fps random-access to any video-frame of 
 precompiled video-footage. This design enables a lot of creative construct
 s to be built on top. The reactive semantics of the instrument is entirely
  programmed using 'functional reactive programming'\, which both enables e
 fficiency\, safety and declaration of time-semantics in a simple way. This
  structuring methodology is combined with OCamls 'first class modules' to 
 enable a declarative functional variant of 'stateful objects'.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Cyberpunk Notebook
DTSTART:20200812T120000Z
DTEND:20200812T150000Z
DTSTAMP:20260409T010856Z
UID:15972336-0026-339d-01e8-94bdd844c368
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/cyberpunk-noteb
 ook/\n\nSpeaker(s): Moem\n\nRecorded: No\n\nStreamed: No\n\nIn this worksh
 op we will be making a cheap and pretty ugly notebook (the kind with paper
 \, not a laptop) into a desirable object with a techy look. We will replac
 e the cover with one made from circuit board.\n\nThere is cutting and glue
 ing involved. It's a job for someone who can be careful and precise. To jo
 in\, you have to be old enough to be trusted with sharp knives and spray g
 lue\; in case of doubt\, please bring a parent.\n\nPlease note:\nWe will b
 e using pieces of circuitboard that have been cut to the size of 15.5 x 8 
 cm and from which all components have been removed. If you can do that bef
 orehand\, and bring it\, that would be SUPER GREAT.\n\nThere is a fee of 
 €5 (or 37 DKK) that covers all materials. Up to 8 people can join.
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Emergency Manufacturing Coordination As A Legacy of COVID-19
DTSTART:20200812T130000Z
DTEND:20200812T140000Z
DTSTAMP:20260409T010856Z
UID:15972372-0025-3262-5c63-1a5900e4a828
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/emergency-manuf
 acturing-coordination-as-a-legacy-of-covid-19/\n\nSpeaker(s): Jenny List\n
 \nRecorded: Yes\n\nStreamed: Yes\n\nOver the period of the COVID-19 pandem
 ic the disparate corners of the maker and hacker communities worldwide hav
 e come together to form a cottage industry that has successfully supplied 
 PPE to hospitals and essential workers\, helping to fill a significant sho
 rtfall in stock. In doing this we have gained valuable experience in setti
 ng up a successful distributed emergency manufacturing operation\, and onc
 e the pandemic is over this collective knowledge should not be lost.\n\nTh
 is talk aims to outline how in the time after the pandemic we should come 
 together in some form of hacker's emergency manufacturing organisation\, l
 earn from how we responded to COVID-19\, take all the things that went wel
 l and revisit those that didn't\, and come up with a coordinated plan to r
 etain the capability to spring into action again as a well-oiled machine i
 n future similar emergencies.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Utreexo: A dynamic hash-based accumulator data structure
DTSTART:20200812T140000Z
DTEND:20200812T150000Z
DTSTAMP:20260409T010856Z
UID:15972408-0025-352a-5fec-3f19c764db1b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/utreexo-a-dynam
 ic-hash-based-accumulator-data-structure/\n\nSpeaker(s): Janus Troelsen\n\
 nRecorded: Yes\n\nStreamed: Yes\n\nUtreexo is a forest of perfect Merkle t
 rees (binary trees) that functions as an accumulator. The accumulator impl
 ementation ideally has the following signature (Python syntax):\n\nProof =
  List[Hash]   # type synonym to improve readability\n\nverify_existence(p:
  Proof) -> bool   # was the hash associated with the proof previously adde
 d to the forest and not deleted?\n\nadd(to_add: Hash) -> Proof   # mutably
  add given hash to the forest\, returns a proof of its existence (a path d
 own the forest)\n\nremove(proof: Proof) -> None   # mutably remove the has
 h associated with the proof\, such that 'verify_existence' will return fal
 se in the future until re-added.\n\nYou can see that a set would also serv
 e as an accumulator. The advantage of Utreexo however\, is\, that it only 
 needs logarithmic storage.\n\nThe first half of the talk will explain the 
 algorithms\, and the second half will talk about porting the Go implementa
 tion to Haskell\, in search of 'elegance'.\n\nUtreexo was invented for use
  in Bitcoin\, I may talk about its application there.\n\nThe paper is at h
 ttps://eprint.iacr.org/2019/611.pdf
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Living a life with a service dog.
DTSTART:20200812T150000Z
DTEND:20200812T160000Z
DTSTAMP:20260409T010856Z
UID:15972444-0025-3641-3dac-542f3a44e698
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/living-a-life-w
 ith-a-service-dog/\n\nSpeaker(s): oosjeu\n\nRecorded: No\n\nStreamed: No\n
 \nWhat is a service dog? What kinds are there? What do they do? What are t
 hey for? And a bit of the story of my service dog and me.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacker Jeopardy (Round #1)
DTSTART:20200812T180000Z
DTEND:20200812T200000Z
DTSTAMP:20260409T010856Z
UID:15972552-0025-3682-a2da-6c5660641d19
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/hacker-jeopardy
 -round-1/\n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nFour 
 teams of up to 3 persons compete in a game of classical jeopardy.\n\nSubmi
 t your teams to info@bornhack.dk with your team name.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Niseq: 'Cinéma pur' revived
DTSTART:20200812T220000Z
DTEND:20200812T230000Z
DTSTAMP:20260409T010856Z
UID:15972696-0025-3488-edfd-a769d7448b59
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/niseq-cinema-pu
 r-revived/\n\nSpeaker(s): rand\n\nRecorded: No\n\nStreamed: No\n\nA "silen
 t cinema" live visual art performance. Niseq is an instrument made for mak
 ing abstract art based on video or image source material. Instrument\, in 
 the sense of a no-delay feedback-loop between the artists input\, and the 
 influence of the output. The expression attainable has more in common with
  experimental electronic music than with the cinema of today - especially 
 there is a relation to granular synthesis.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20200813T100000Z
DTEND:20200813T110000Z
DTSTAMP:20260409T010856Z
UID:15973128-0029-366c-6ce0-91321334b369
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/lunch-break/\n\
 nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break
 . Remember to drink water and keep some distance in the lines.
LOCATION:Food Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:COVID-19 and the (digital) Future of Work in Job Placement?
DTSTART:20200813T110000Z
DTEND:20200813T120000Z
DTSTAMP:20260409T010856Z
UID:15973164-0025-388d-71e3-43aec354c9bb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/covid-19-and-th
 e-digital-future-of-work-in-job-placement/\n\nSpeaker(s): Asbjørn William
  Ammitzbøll Flügge\n\nRecorded: Yes\n\nStreamed: Yes\n\nCOVID-19 has inc
 reased unemployment and the rising unemployment is a challenge for societi
 es across the world.  It increases the need for effective job placement ef
 forts\, but during the lockdown in Denmark\, physical presence was prohibi
 ted and the job centers became digital. Right now\, there is speculation t
 hat responses to COVID-19 will hasten the emergence of the future of work 
 throughout the pandemic. Increased digitization is seen as part of this fu
 ture by the municipalities\, responsible for job placement in Denmark. But
  what are the learnings from work in the digital job center? What can we g
 ain and loose? And what are the consequences of digital public services fo
 r potential marginalized groups as job seekers? \n\nThese are some of the 
 questions I will address in the talk. Based on weekly interviews with 6 jo
 b consultants across 3 Danish job centers from April-June\, I will present
  some of the experiences from work in the digital jobcenter. Please join m
 e for a discussion on digital welfare.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:BornHack CTF 2020
DTSTART:20200813T110000Z
DTEND:20200813T220000Z
DTSTAMP:20260409T010856Z
UID:15973164-0032-336b-8ddc-ef85f454178a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/bornhack-ctf-20
 20/\n\nSpeaker(s): Emil "Dota" Bak\n\nRecorded: No\n\nStreamed: No\n\nBorn
 Hack CTF is BACK\, so prepare your Linux\, python 2.7 and pwntools\, it's 
 time to hack  ̶t̶h̶e̶ ̶p̶l̶a̶n̶e̶t̶  Fyn*\n\nLINK TO THE CTF: h
 ttp://161.35.67.9/\n\n\nThis CTF is of the Jeopardy style\, and consists o
 f multiple categories\, including Web\, Reverse-engineering\, Pwn\, Misc\,
  and Crypto.\nAre you new or experienced\, this CTF is sure to have challe
 nges for you. The start and end date for this on-site CTF is not yet publi
 c.\n\nIf you get stuck with challenges\, need some beginner help\, or just
  need a good place to sit while hacking\, then stop by the PWNIES VILLAGE.
LOCATION:Online
END:VEVENT
BEGIN:VEVENT
SUMMARY:Made in Denmark
DTSTART:20200813T120000Z
DTEND:20200813T130000Z
DTSTAMP:20260409T010856Z
UID:15973200-0025-328a-229a-44bfe2f4b2ba
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/made-in-denmark
 /\n\nSpeaker(s): Mike Mikjær\n\nRecorded: Yes\n\nStreamed: Yes\n\nA talk 
 about computers made in Denmark\, we start back in the 60's and keep on go
 ing up until the lates 90's\, which means that we will talk about Regnecen
 tralen\, ICL / HH Electronics\, DDE and Christian Rovsing - but also lesse
 r known brands such as the Vega\, the Butler and the James computers.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Home and Hackspace automation with mqtt and mosquitto - an introdu
 ction
DTSTART:20200813T120000Z
DTEND:20200813T150000Z
DTSTAMP:20260409T010856Z
UID:15973200-0026-3636-3a97-902f45f465d8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/home-and-hacksp
 ace-automation-with-mqtt-and-mosquitto-an-introduction/\n\nSpeaker(s): smt
 w\n\nRecorded: No\n\nStreamed: No\n\nThere will be a general introduction 
 into the MQTT Protocol\, after we'll setup a local mqtt broker (mosquitto)
  for a "hello world". After that we'll learn how to control tasmota device
 s via cli. If that is up and running we will have a look into Eclipse paho
  JS library* for mqtt to get a very basic website running to display and c
 ontrol mqtt devices by a webinterface served by mosquitto. In the end we'l
 l have a look on the actual (extensive...) usage of that system in the ger
 man hackerspace in Freiburg (CCCFr).\nPlease bring a device where you can 
 install mosquitto (https://mosquitto.org/download/).\n\n*no other librarie
 s or any packagemanager nor node.js or similar will be involved\, just som
 e plain vanilla js. I swear :)
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lightning Talks
DTSTART:20200813T130000Z
DTEND:20200813T131000Z
DTSTAMP:20260409T010856Z
UID:15973236-0025-332b-8084-7dfd4bc4adaa
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/lightning-talks
 /\n\nSpeaker(s): BornHack\n\nRecorded: Yes\n\nStreamed: Yes\n\nPlaceholder
  event for Lightning Talks.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:DMARC
DTSTART:20200813T131000Z
DTEND:20200813T132000Z
DTSTAMP:20260409T010856Z
UID:15973242-0025-3595-b3e6-dda043a4b86a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/dmarc/\n\nSpeak
 er(s): Dennis Kjær Jensen\n\nRecorded: Yes\n\nStreamed: Yes\n\nQuick walk
 through of how to do better email security.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Let's try out GitHub Classroom!
DTSTART:20200813T132000Z
DTEND:20200813T133000Z
DTSTAMP:20260409T010856Z
UID:15973248-0025-343f-ae17-874c00644b59
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/lets-try-out-gi
 thub-classroom/\n\nSpeaker(s): Simon Shine\n\nRecorded: Yes\n\nStreamed: Y
 es\n\nDisclaimer: Yes\, I drank the GitHub Koolaid. After spending 18 mont
 hs as an active mentor/maintainer on several of Exercism.io's tracks\, I s
 topped participating as part of a job switch. With me is an experience rep
 ort of what worked for me with this platform\, a claim that a platform wit
 h better git (or other vcs) integration would prepare people better for re
 al-world programming\, and a call-to-action to try out GitHub's Classroom.
  A goal could be the formation of a learning collective\, or simply a stat
 us report.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:DefCon CTF 2020 finals
DTSTART:20200813T133000Z
DTEND:20200813T134000Z
DTSTAMP:20260409T010856Z
UID:15973254-0025-390f-e03b-ff4ab2542729
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/defcon-ctf-2020
 -finals/\n\nSpeaker(s): Alexander Krog and Jens Hegner Stærmose\n\nRecord
 ed: Yes\n\nStreamed: Yes\n\nJust before Bornhack the DefCon CTF 2020 final
 s were held. Here Norsecode\, a combined Scandinavian team\, participated.
  Since the CTF was online this year\, Norsecode created a state-sponsored 
 venue in Stockholm where the team could meet and hack together to create t
 he DefCon-feel.\nIt was the first time Norsecode participated and we learn
 ed a lot about how A&D CTFs against the best in the world work. You will l
 earn about our experience at the venue and the lessons we learned.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Crash Course China
DTSTART:20200813T134000Z
DTEND:20200813T135000Z
DTSTAMP:20260409T010856Z
UID:15973260-0025-382d-17c0-195ee0f4a258
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/crash-course-ch
 ina/\n\nSpeaker(s): Fuzzing\n\nRecorded: No\n\nStreamed: No\n\nAn in-depth
  talk about the Great Firewall of China and how it works on a technical le
 vel.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to DBI ... or how to tamper with any app (including S
 mitteStop)
DTSTART:20200813T140000Z
DTEND:20200813T150000Z
DTSTAMP:20260409T010856Z
UID:15973272-0025-3659-b003-57164cd4a24a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/introduction-to
 -dbi-or-how-to-tamper-with-any-app-including-smittestop/\n\nSpeaker(s): Ni
 colai Søborg\n\nRecorded: Yes\n\nStreamed: Yes\n\nIntroduction to DBI ...
  or how to tamper with any app (including SmitteStop [0])\n\nDynamic Binar
 y Instrumentation (DBI) is a powerful method to change the behavior of app
 s (or rather: any binary code) at runtime.\n\nI will go through using the 
 toolkit "frida" [1] to inject custom logic into Java bytecode easily\, but
  also show that we can hook into native apps\, like "SmitteStop"\, to unlo
 ck the secret menus\, easter eggs\, etc.\n\nAfter this talk the following 
 sentence will make sense: "I just used a Python tool to inject JavaScript 
 into my Android/Java app\, to change the behavior of the mono runtime".\n\
 n[0] https://play.google.com/store/apps/details?id=com.netcompany.smittest
 op_exposure_notification\n[1] https://frida.re/
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:How lockdown crushed the online barrier
DTSTART:20200813T150000Z
DTEND:20200813T160000Z
DTSTAMP:20260409T010856Z
UID:15973308-0025-3359-24a0-c3cb5974ca4b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/how-lockdown-cr
 ushed-the-online-barrier/\n\nSpeaker(s): Merete Stenner\n\nRecorded: Yes\n
 \nStreamed: Yes\n\nWhen Denmark locked down\, a lot of small entrepreneurs
  got stuck with courses and workshops being cancelled. Thankfully many of 
 these entrepreneurs decided to look for alternatives to their cancelled ph
 ysical events. \n\nGoing online was the obvious choice!\n\nIn this talk I'
 m going to present how I watched (and helped) both obvious online prospect
 s like coaches and instructors on leadership courses and other usual "offi
 ce events" take their business online. But also how less likely prospects 
 like acupuncturists\, dog physiotherapists\, riding and yoga instructors s
 uccessfully moved physical classes online.\n\nDue to lockdown BOTH the ent
 repreneurs AND their customers was highly motivated to give online teachin
 g a go\, and I believe we have thus fast forwarded the general willingness
  to try an online course by several years if not decades.\n\nI'm going to 
 present my thoughts on how this will effect the online market going forwar
 d\, and what you should consider\, when taking your business or part of it
  online.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Privacy 2020: What's happening and what can we do?
DTSTART:20200813T160000Z
DTEND:20200813T170000Z
DTSTAMP:20260409T010856Z
UID:15973344-0025-3819-7c23-53836284785b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/privacy-2020-wh
 ats-happening-and-what-can-we-do/\n\nSpeaker(s): Rasmus Malver\n\nRecorded
 : Yes\n\nStreamed: Yes\n\nSpokesperson for the Organisation against Illega
 l Data Retention (Foreningen imod Ulovlig Logning) Rasmus Malver gives an 
 update on the lawsuit\, new legislation\, facial recognition and the tempe
 rature of the Danish parliament and the EU legislators.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:What the modem?! How to haunt millions of internet connections
DTSTART:20200813T170000Z
DTEND:20200813T180000Z
DTSTAMP:20260409T010856Z
UID:15973380-0025-362f-184a-494f687426b8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/what-the-modem-
 how-to-haunt-millions-of-internet-connections/\n\nSpeaker(s): Alexander Kr
 og and Jens Hegner Stærmose\n\nRecorded: Yes\n\nStreamed: Yes\n\nThis is 
 the story of Cable Haunt and how we discovered vulnerabilities in 100 of m
 illion of modems world wide.\nThe exploit we will present\, allows a remot
 e attacker to gain kernel level control of Broadcom based cable modems\, e
 ffectively taking full control of big parts of the western world internet 
 connections. Once control has been achieved by an attacker\, it can be abu
 sed in many ways. Some examples are:\n - Conduct remote man-in-the-middle 
 attacks\n - Hot-swap code or even the entire firmware silently and persist
 ent\n - Disable ISP firmware upgrade\n - Change default DNS server for phi
 sing\n - Change serial numbers\n - Be exploited in botnet\nThis will a tal
 k about the technical aspects of Cable Haunt\, how it was discovered and h
 ow to exploit it using techniques such as buffer overflows and return orie
 nted programming.\nThere will of cause also be a live demo and if you want
  you can also visit us and hack a modem yourself.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Matrix User Meetup
DTSTART:20200813T200000Z
DTEND:20200813T220000Z
DTSTAMP:20260409T010856Z
UID:15973488-0027-3832-3529-d0b7863469db
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/matrix-user-mee
 tup/\n\nSpeaker(s): Carl Bordum Hansen\n\nRecorded: No\n\nStreamed: No\n\n
 For anyone interested in https://matrix.org/: An open network for secure\,
  decentralized communication.\n\nWe are a few people who moved to matrix a
 s a primary communications platform. This is an informal meetup where ever
 yone is welcome to come hang out and we mostly talk about matrix :-)\n\nLo
 t's of things are happening e.g. the rebranding\, new e2ee ux and wider ad
 option
LOCATION:Bar Meetup Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Night Disco
DTSTART:20200813T220000Z
DTEND:20200813T230000Z
DTSTAMP:20260409T010856Z
UID:15973560-0028-344b-6a41-4efe9904793a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/night-disco/\n\
 nSpeaker(s): Kramse\n\nRecorded: No\n\nStreamed: No\n\nWe all love music\,
  but the love must be shared!\n\nA few hours of funky stuff by Kramse mixe
 d with some reggae.\n\nFrom pop to funk!
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Solving jq Problems
DTSTART:20200814T090000Z
DTEND:20200814T120000Z
DTSTAMP:20260409T010856Z
UID:15973956-0026-3571-e782-6a277f14abf9
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/solving-jq-prob
 lems/\n\nSpeaker(s): Simon Shine\n\nRecorded: No\n\nStreamed: No\n\nYou ma
 y know jq\, the swiss army knife of all your command-line JSON processing 
 needs.\n\nYou may not know that jq is a Turing-complete combinator languag
 e that lets you define custom filters using either imperative or functiona
 l control structures.\n\nMaybe that time when you piped a bunch of command
 s together and jq was one of them\, you could have spared a few of the oth
 ers?\n\nThe format of this workshop:\n - We decide together upon some usef
 ul or fun JSON processing problems where jq might save us.\n - Being an id
 iot when it comes to writing jq\, I will be the code monkey accepting righ
 t and wrong input.\n - Workshop participants may experiment freely on thei
 r own computers and submit solutions by yelling or posting.\n\nFor inspira
 tion\, see the Exercism jq Cookbook: https://github.com/exercism/exercism/
 issues/5055\n\nTo play with jq without having to install it\, go to: https
 ://jqplay.org/
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20200814T100000Z
DTEND:20200814T110000Z
DTSTAMP:20260409T010856Z
UID:15973992-0029-366c-6ce0-91321334b369
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/lunch-break/\n\
 nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break
 . Remember to drink water and keep some distance in the lines.
LOCATION:Food Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Roadtrip to UCL fablab
DTSTART:20200814T100000Z
DTEND:20200814T140000Z
DTSTAMP:20260409T010856Z
UID:15973992-0030-3741-1c50-1d21bcb47248
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/roadtrip-to-ucl
 -fablab/\n\nSpeaker(s): Morten\n\nRecorded: No\n\nStreamed: No\n\nLike las
 t year\, we have arranged for the Bornhack participants to go to the fabla
 b at UCL.\n\nAt fablab they have lasercutters\, 3D printers\, sticker mach
 ine and so on. \nDue to IT issues\, they don't have an official info page 
 at the moment - but they do have a facebooke page: https://www.facebook.co
 m/FabLabUCL\n\n\nWe will meet up at the info booth at 12.00 and go by car 
 to the location i Odense.
LOCATION:Info Desk
END:VEVENT
BEGIN:VEVENT
SUMMARY:Massage Friday
DTSTART:20200814T100000Z
DTEND:20200814T180000Z
DTSTAMP:20260409T010856Z
UID:15973992-0031-3861-96df-fc8a98548719
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/massage-friday/
 \n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nA local masseu
 se will stop by a couple of times during BornHack to massage our aching bo
 dies and make sure we’re in tip-top shape for hacking.\n\nThe massage is
  a so-called sports massage that is meant to stimulate your muscles and he
 lps to increase blood flow and release tension.\n\nYou can book your massa
 ge slot at the info desk\, and you will need to purchase a massage ticket 
 from the shop and ensure that it’s paid for beforehand. If you pay by ot
 her means than cash or credit card\, please bring some form of proof of pa
 yment to your massage.\n\nThe massage will take place in the main building
  (where the workshop rooms are). Please wait outside until you are called 
 in.\n\nYou need to bring your own towel to lay on\, and please have a quic
 k shower before turning up.
LOCATION:Massage Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Networking at Roskilde Festival
DTSTART:20200814T110000Z
DTEND:20200814T120000Z
DTSTAMP:20260409T010856Z
UID:15974028-0025-354b-3f2b-f4d4d314ffd8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/networking-at-r
 oskilde-festival/\n\nSpeaker(s): Lasse Leegaard\n\nRecorded: Yes\n\nStream
 ed: Yes\n\nIn this talk I will be going over the networking infrastructure
  that runs Roskilde Festival. There will be pictures\, diagrams\, stories 
 from the trenches and things to consider if you plan on doing something si
 milar.\n\nI will be touching on these topics:\n-Who are we and what do we 
 do?\n-Infrastructure and hardware overview.\n-Servers and services.\n-Conf
 iguration and unit rollout.\n-Outdoor versus indoor unit placement.\n-Perm
 anent versus temporary cabling.\n-Cables versus radio connections.\n-Unlik
 ely and likely events\, how to plan for them and how how to handle them.\n
 -Critical paths in rollout and how to mitigate them.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:BornHack CTF 2020
DTSTART:20200814T110000Z
DTEND:20200814T220000Z
DTSTAMP:20260409T010856Z
UID:15974028-0032-336b-8ddc-ef85f454178a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/bornhack-ctf-20
 20/\n\nSpeaker(s): Emil "Dota" Bak\n\nRecorded: No\n\nStreamed: No\n\nBorn
 Hack CTF is BACK\, so prepare your Linux\, python 2.7 and pwntools\, it's 
 time to hack  ̶t̶h̶e̶ ̶p̶l̶a̶n̶e̶t̶  Fyn*\n\nLINK TO THE CTF: h
 ttp://161.35.67.9/\n\n\nThis CTF is of the Jeopardy style\, and consists o
 f multiple categories\, including Web\, Reverse-engineering\, Pwn\, Misc\,
  and Crypto.\nAre you new or experienced\, this CTF is sure to have challe
 nges for you. The start and end date for this on-site CTF is not yet publi
 c.\n\nIf you get stuck with challenges\, need some beginner help\, or just
  need a good place to sit while hacking\, then stop by the PWNIES VILLAGE.
LOCATION:Online
END:VEVENT
BEGIN:VEVENT
SUMMARY:ALPR in Denmark
DTSTART:20200814T120000Z
DTEND:20200814T130000Z
DTSTAMP:20260409T010856Z
UID:15974064-0025-3795-0d7f-79cd63946519
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/alpr-in-denmark
 /\n\nSpeaker(s): Christian Panton\n\nRecorded: Yes\n\nStreamed: Yes\n\nDee
 p-dive into the ALPR technology being deployed in Denmark\, it's operators
  and a closer look at a community eBay purchase of a Genetec Sharp camera.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:DIY Magic Gemstone
DTSTART:20200814T120000Z
DTEND:20200814T150000Z
DTSTAMP:20260409T010856Z
UID:15974064-0026-3408-4312-a559d204960a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/diy-magic-gemst
 one/\n\nSpeaker(s): Moem\n\nRecorded: No\n\nStreamed: No\n\nIn this worksh
 op we'll be making a necklace with a magic gemstone as a pendant. It has a
 n LED and a hidden battery. Light up your life and be the sparkling center
  of any party!\n\nWe'll be working with epoxy resin to cast the gemstone\,
  and the LED can be static\, flickering or even RGB (rainbow). If you have
  an interesting LED you want to use\, please bring it! \n\nNo soldering ex
 perience is required. Anyone 14+ of age can join. If you're a little young
 er than that\, you are welcome too but please bring a parent to help you. 
 \nThere is a maximum of 12 participants and there is a €5 (37DKK) fee fo
 r materials.
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:How blockchain programming looks like today
DTSTART:20200814T130000Z
DTEND:20200814T140000Z
DTSTAMP:20260409T010856Z
UID:15974100-0025-3418-368b-713bb8344b3a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/how-blockchain-
 programming-looks-like-today/\n\nSpeaker(s): Simon Shine\n\nRecorded: Yes\
 n\nStreamed: Yes\n\nThis talk provides an overview of how open-source bloc
 kchain contract programming looks like today. I show examples of several t
 ypes of blockchain languages that each represent a part of the design spac
 e. I also go through some of the historical blockchain disasters that were
  caused by bad programming and discuss a) how to prevent them with stronge
 r primitives\, b) how to improve the ergonomics\, and c) what is implied b
 y “general-purpose” in the context of blockchain. You may like this ta
 lk if you’re into compilers and programming language design.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:"Open" Banking – how open?
DTSTART:20200814T140000Z
DTEND:20200814T150000Z
DTSTAMP:20260409T010856Z
UID:15974136-0025-3783-9b55-e731eea4f698
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/open-banking-ho
 w-open/\n\nSpeaker(s): Christian Panton\n\nRecorded: Yes\n\nStreamed: Yes\
 n\nOne of the last industries to be come "open" is banking. Tremendiously 
 regulated\, inheriantly risk adverse and seeking control of the customers.
  I will dive into how we contributed to making banking “open”. From un
 regulated\, reverse-engineering of mobile banking apps – to the state of
  APIs that EU made the banks put into place\, and what mess resulted from 
 that.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Datamuseum.dk: Lokaler søges
DTSTART:20200814T150000Z
DTEND:20200814T160000Z
DTSTAMP:20260409T010856Z
UID:15974172-0025-375a-1a84-0f080b342a0b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/datamuseumdk-lo
 kaler-sges/\n\nSpeaker(s): Poul-Henning Kamp\n\nRecorded: Yes\n\nStreamed:
  Yes\n\nDatamuseum.dk flytte\, en orientering om museet\, samlingen og pro
 jektet.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacker Jeopardy (Round #2)
DTSTART:20200814T180000Z
DTEND:20200814T200000Z
DTSTAMP:20260409T010856Z
UID:15974280-0025-3697-0603-3d9549e4a44a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/hacker-jeopardy
 -round-2/\n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nFour 
 teams of up to 3 persons compete in a game of classical jeopardy.\n\nSubmi
 t your teams to info@bornhack.dk with your team name.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tor Relay Operators Meetup
DTSTART:20200814T200000Z
DTEND:20200814T220000Z
DTSTAMP:20260409T010856Z
UID:15974352-0027-3296-f0c2-534b13545ae9
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/tor-relay-opera
 tors-meetup/\n\nSpeaker(s): Alexander Færøy\n\nRecorded: No\n\nStreamed:
  No\n\nFor people who are currently running or are considering to run Tor 
 relay nodes. Let's meet and share experiences\, say hi to each other\, and
  have an open discussion about topics related to Tor relay operations.\n\n
 Will most likely take place in some corner of the bar.
LOCATION:Bar Meetup Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Expect nothing\, expect everything
DTSTART:20200814T220000Z
DTEND:20200814T230000Z
DTSTAMP:20260409T010856Z
UID:15974424-0028-3490-76cb-f293a7e42dc8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/expect-nothing-
 expect-everything/\n\nSpeaker(s): =PsychiC=\n\nRecorded: No\n\nStreamed: N
 o\n\nThey insisted I signed up for a spot.\nAs a musical whore we'll go fr
 om 80's \, 90's\, 2k\, metal \, house\, jungle\, dubstep and back.\nOne th
 ing is for certain\, a party it will be.
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Simulating DDoS packets
DTSTART:20200815T090000Z
DTEND:20200815T120000Z
DTSTAMP:20260409T010856Z
UID:15974820-0026-3460-d90d-ebc1ce847bc8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/simulating-ddos
 -packets/\n\nSpeaker(s): Kramse\n\nRecorded: No\n\nStreamed: No\n\nRepeate
 d from last years network fun\, but will install Kubernetes on the server 
 we attack.\n\nA small workshop teaching people how to produce DDoS simulat
 ion traffic - usefull for testing their own infrastructures. \n\nWe will h
 ave a server connected on 10Gbit on a switch with multiple 1Gbit port for 
 attackers. Attackers will be connected through 1Gbit ports using USB Ether
 net - we have loaners.\n\nWork together to produce enough to take down thi
 s server!\n\nWHILE attack is ongoing there will be both the possibility to
  monitor traffic\, monitor port\, and decide on changes to prevent the att
 acks from working.\n\nWe will work through common attack types\, like:\n\n
 * TCP SYN flooding\n* TCP other flooding\n* UDP flooding NTP\, etc.\n* ICM
 P flooding\nMisc - stranger attacks and illegal combinations of flags etc.
 \nthen we will implement the changes suggested and retry attacks.\n\nYou w
 ill go away from this with tools for producing packets\, hping3 and some c
 onfigurations for protecting - PF rules\, switch rules\, server firewall r
 ules.
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20200815T100000Z
DTEND:20200815T110000Z
DTSTAMP:20260409T010856Z
UID:15974856-0029-366c-6ce0-91321334b369
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/lunch-break/\n\
 nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break
 . Remember to drink water and keep some distance in the lines.
LOCATION:Food Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:18th Sustainable Development Goal
DTSTART:20200815T110000Z
DTEND:20200815T120000Z
DTSTAMP:20260409T010856Z
UID:15974892-0025-3777-35a0-22fcb8d48e39
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/introduction-to
 -art-workshop-placeholder/\n\nSpeaker(s): BornHack\, Cecilie Waagner Falke
 nstrøm\n\nRecorded: No\n\nStreamed: No\n\nThis talk is about how tech-art
  and developers play a crucial role in\ncreating societal debate about the
  ethical and human dilemmas related to\nAI/ML. Cecilie will touch upon her
  GPT-2 based artwork “Covid-19 AI battle”\nand the new 18th Sustainabl
 e Development Goal “Life with Artificials”.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Mind Future Workshop
DTSTART:20200815T120000Z
DTEND:20200815T150000Z
DTSTAMP:20260409T010856Z
UID:15974928-0026-3763-7caf-deba8e64730b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/art-workshop-pl
 aceholder/\n\nSpeaker(s): BornHack\, Cecilie Waagner Falkenstrøm\n\nRecor
 ded: No\n\nStreamed: No\n\nCollaborative Artworks From Packet Captures. Mo
 st of us\nat BornHack have solid internal representations of abstract and\
 ndifficult-to-understand concepts that are not shared with the general\npu
 blic\, like network protocols and their behavior in computer networks. Thi
 s\nworkshop will explore how we can express these complex ideas\, by codin
 g\ndynamic visualizations together.As a participant\, you will be assigned
  a\nbranch in a git repo\, which will be your canvas. Each repo will be eq
 uipped\nwith p5.js\, and a neatly parsed (and deeply interesting) packet c
 apture\nthat you can use as input for your display.For a fixed time-span\,
  you will\nhave free reign to code whichever dynamic visualizations you wa
 nt\, based on\nyour given packet capture. However\, at various points thro
 ughout the\nworkshop\, you will be forced to hand off your branch to anoth
 er\nparticipant\, and continue work on someone else’s branch\, establish
 ing a\nring of collaboration within the group. Rather than making a series
  of\ntextbook-style diagrams and explanations\, the workshop will end with
  the\ncreation of chaotic artistic expressions that explore the collective
 ’s\nunderstanding of these deeply technical and otherwise invisible conc
 epts.
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Avoid STARTTLS
DTSTART:20200815T140000Z
DTEND:20200815T150000Z
DTSTAMP:20260409T010856Z
UID:15975000-0025-3581-c350-88133994ebba
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/avoid-starttls/
 \n\nSpeaker(s): Hanno Böck\n\nRecorded: Yes\n\nStreamed: Yes\n\nMany prot
 ocols\, including the email protocols SMTP\, POP3 and IMAP\, allow two way
 s to use TLS: An implicit mode on a dedicated port and a mechanism called 
 STARTTLS that upgrades plain text connections to TLS.\n\nThe STARTTLS mech
 anism is incredibly fragile and almost by default leads to vulnerable impl
 ementations. In 2011 Wietse Venema discovered a flaw in Postfix that allow
 ed a man in the middle attacker to inject commands into an encrypted conne
 ction [1].\n\nWe discovered that the flaw is still widely present in E-Mai
 l servers and also\, previously unknown\, the same flaw exists in many mai
 l clients. In some cases these flaws allow stealing E-Mail credentials. Fu
 rthermore the STARTTLS mechanism is weakly specified and in part contradic
 tory\, which allows other attacks.\n\nThe talk will give an overview on wh
 y STARTTLS is dangerous and should be avoided.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Activism for beginners
DTSTART:20200815T150000Z
DTEND:20200815T180000Z
DTSTAMP:20260409T010856Z
UID:15975036-0026-3800-bf98-0e6867a48dcb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/activism-for-be
 ginners/\n\nSpeaker(s): Rasmus Malver\n\nRecorded: No\n\nStreamed: No\n\nT
 he only way to change the world is to do it. Stop making excuses and begin
  your life as an activist. This workshop introduces the participants to th
 e fundamental tools of a modern activist. In 60 minutes we choose a topic\
 , brainstorm and build an entire campaign.
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacking on PKF files
DTSTART:20200815T160000Z
DTEND:20200815T170000Z
DTSTAMP:20260409T010856Z
UID:15975072-0025-327f-1904-beb5d744b66b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/hacking-on-pkf-
 files/\n\nSpeaker(s): Ramón Soto Mathiesen\n\nRecorded: Yes\n\nStreamed: 
 Yes\n\nMost of you probably have never heard of PFK files right and I thin
 k it's only fair to say that most of the people who have played the old-sc
 hool PC games that use them\, have neither.\n\nPFK files are data containe
 rs for the PCx (PC Fútbol and PC Basket) games developed by Dynamics Mult
 imedia\, a company that emerged from the extinct Dynamic Software\, which 
 was known for their 8/16 bits games developed on: Sinclair ZX81\, ZX Spect
 rum\, Amstrad CPC\, MSX\, Commodore 64 and later on: Arcade machines and P
 Cs\, such as: "Game over"\, "Hammer Boy"\, "Mega Phoenix" and "Risky Woods
 " among others.\n\nDynamic Software was mainly driven by the three develop
 ers\, the Ruiz Tejedor brothers: Pablo\, Víctor and Nacho. When they crea
 ted Dynamics Multimedia\, their fourth brother Gaby joined. Gaby was a foo
 tball enthusiast and the four\, together with Carlos Abril and Pedro Sudó
 n\, were able to create the most successful PC gaming series of all time i
 n Spain's history: PC Fútbol\, with more than 1.560.000 magazines (*) sol
 d. This success was not only limited to Spain\, as the game was exported t
 o Italy (PC Calcio)\, Argentina (PC Apertura/Clausura) and UK (PC Premier/
 Premier Manager 97 and 99).\n\nTwo years ago\, it was the 25th anniversary
  of the first edition of the PC Fútbol game and thanks to Wine I was able
  to install it on my *nix box. I learned that there existed a Community th
 at tried to keep the game up-to-date with the newest players and teams +25
  years later. I also noticed that it takes a lot of effort from the Commun
 ity to do this\, as it's mostly a manual process when editing data in (enc
 oded) binary format. Users have stated on PCFutbolMania.com that it takes 
 about a day to update a team. Since the games have around +480 teams\, thi
 s can be a tedious and time consuming process.\n\nIn this talk I will show
 case how i have been able to create some tools that will ease data updates
  of these awesome games in an almost no time and letting the computer do a
 ll the work.\n\n(*) - Come by and learn why I state magazines and not unit
 s or copies of the game.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Money Talks  - why cash is the last free straw to cling to or the 
 story about why politicians\, banks and bankers wants to take them away fr
 om you
DTSTART:20200815T180000Z
DTEND:20200815T190000Z
DTSTAMP:20260409T010856Z
UID:15975144-0025-3602-09a1-80f1b504626b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/money-talks-why
 -cash-is-the-last-free-straw-to-cling-to-or-the-story-about-why-politician
 s-banks-and-bankers-wants-to-take-them-away-from-you/\n\nSpeaker(s): Ander
 s Kjærulff\n\nRecorded: Yes\n\nStreamed: Yes\n\nOnce cash was king - now 
 everybody seems to try to make concrete money history\, claiming(wrongfull
 y) that cash i 'dirty' and spread covid19\, forgetting that virus actually
  trives on surfaces of mobile phones\, credit cards and metal - but not on
  paper. Cash is also seen as old fashioned and troublesome\, but we all se
 em to forget what kind of trouble we might be in\, should we totally aband
 on physichal money. \nThe talk is about freedom\, surveallance and control
  in a time of profiling and virtuallity.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Bornhack CTF Winner announcement
DTSTART:20200815T190000Z
DTEND:20200815T191000Z
DTSTAMP:20260409T010856Z
UID:15975180-0025-3891-0e45-70eba874c3ca
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/bornhack-ctf-wi
 nner-announcement/\n\nSpeaker(s): Emil "Dota" Bak\n\nRecorded: Yes\n\nStre
 amed: Yes\n\nPwnies will announce the Bornhack CTF <link coming soon> winn
 er\, and hand over the exclusive Bornhack CTF 2020 award.\n\nLINK TO THE C
 TF: http://161.35.67.9/\n\n\n(Remember\, this CTF is NOT a team-based CTF\
 , but and INDIVIDUAL CTF challenge\, and as such\, there can only be 1 win
 ner.)
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:UncensoredDNS Users Meetup
DTSTART:20200815T200000Z
DTEND:20200815T220000Z
DTSTAMP:20260409T010856Z
UID:15975216-0027-3371-8f79-f109ccc40e7a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/uncensoreddns-u
 sers-meetup/\n\nSpeaker(s): Thomas Steen Rasmussen\n\nRecorded: No\n\nStre
 amed: No\n\nThe traditional yearly UncensoredDNS users meetup! Let's get t
 ogether in a casual setting (the bar) and share a drink and a story from t
 he trenches of the DNS.\n\nThe host will share stories about the journey t
 owards DNS-over-HTTPs support and OCSP woes\, monitoring with prometheus a
 nd much more. Please share your own stories and experiences too!\n\nThe du
 ration is set to two hours but feel free to stick around longer if you fee
 l like it :)
LOCATION:Bar Meetup Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Daydreaming with Akrobika
DTSTART:20200815T210000Z
DTEND:20200815T220000Z
DTSTAMP:20260409T010856Z
UID:15975252-0028-3701-602a-3657c0a42619
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/daydreaming-wit
 h-akrobika/\n\nSpeaker(s): Akrobika\n\nRecorded: No\n\nStreamed: No\n\nAmb
 ient experiments with field recordings\, lucid dreams and stolen pieces of
  priceless art - layered in loops\, humming drones and volatile beats.
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Massage Sunday
DTSTART:20200816T080000Z
DTEND:20200816T180000Z
DTSTAMP:20260409T010856Z
UID:15975648-0031-387b-2e75-f13fede4827b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/massage-sunday/
 \n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nA local masseu
 se will stop by a couple of times during BornHack to massage our aching bo
 dies and make sure we’re in tip-top shape for hacking.\n\nThe massage is
  a so-called sports massage that is meant to stimulate your muscles and he
 lps to increase blood flow and release tension.\n\nYou can book your massa
 ge slot at the info desk\, and you will need to purchase a massage ticket 
 from the shop and ensure that it’s paid for beforehand. If you pay by ot
 her means than cash or credit card\, please bring some form of proof of pa
 yment to your massage.\n\nThe massage will take place in the main building
  (where the workshop rooms are). Please wait outside until you are called 
 in.\n\nYou need to bring your own towel to lay on\, and please have a quic
 k shower before turning up.
LOCATION:Massage Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pentest introduction - greatest hits
DTSTART:20200816T090000Z
DTEND:20200816T120000Z
DTSTAMP:20260409T010856Z
UID:15975684-0026-3475-79be-9c0c76a45a09
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/pentest-introdu
 ction-greatest-hits/\n\nSpeaker(s): Kramse\n\nRecorded: No\n\nStreamed: No
 \n\nWe will go through the greatest hits from https://github.com/kramse/se
 curity-courses/tree/master/presentations/pentest\n\nSo expect to learn \n*
  What is penetration testing\n* Nmap how to get started\, and a small test
  plan\, how to scan a network using Nmap\n* Get started blasting packets\,
  from single packets with Nping and Scapy \n* Trying wi-fi scan\, I have s
 ome loaner USB cards\n* Doing SNMP scanning\, trying small brute-force usi
 ng THC Hydra \n* Get started with VXLAN hacking\, THC IPv6 attacks etc.\n*
  Get started with Metasploit using Metasploit Unleashed\n\nGoal is to poin
 t you towards resources\, so you can get started with the fun of scanning 
 networks\, finding vulnerabilities - so you can remove them\, reconfigure 
 networks etc.\n\nYou should install a Kali Linux as virtual machine\, perh
 aps use this as inspiration: \nhttps://github.com/kramse/kramse-labs - the
  part about installing a Kali Linux\n\nYou can leave early\, but it will b
 e hard to join late\, so be there from the start and leave when you like\,
  please :-D\n\nWe will also use materials from https://zencurity.gitbook.i
 o/kea-it-sikkerhed/netvaerkspenetrationstest/lektionsplan which is a 10ECT
 S course\, about 300 hours of work\, so only a few things.
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20200816T100000Z
DTEND:20200816T110000Z
DTSTAMP:20260409T010856Z
UID:15975720-0029-366c-6ce0-91321334b369
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/lunch-break/\n\
 nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break
 . Remember to drink water and keep some distance in the lines.
LOCATION:Food Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Galieo signals potential impact on 23 cm radio amateur signal usag
 e
DTSTART:20200816T120000Z
DTEND:20200816T130000Z
DTSTAMP:20260409T010856Z
UID:15975792-0025-3537-bd17-1af4e6f41cfb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/galieo-signals-
 potential-impact-on-23-cm-radio-amateur-signal-usage/\n\nSpeaker(s): Mark-
 Jan Bastian\n\nRecorded: Yes\n\nStreamed: Yes\n\nThe EU-paid Galieo satell
 ite naviation constellation provides anyone around the world with E1 signa
 ls to amend GPS signals on the same frequency.\nJust like GPS\, Galieo has
  the potential for anyone to determine their own position\, time and veloc
 ity\, without having to reveal their own location or even identity.\nNext 
 to 99% of the E1/L1 GPS/GNSS users\, there are also E5a\, E5b and E6 signa
 ls available\, that can be used for argicultural precision farming and con
 struction.\n\nDenmark played an important role in it's development. \nAs a
  dutch citizen\, and fellow 'European' I would like to highlight some tech
 nical aspects of the technology that complements GPS\, and also talk about
  some perhaps negative impacts it can have on the usage of the 23 cm band 
 used by Ham Radio operators in the european region.\nAspects of signal pro
 cessing that comes with all GNSS technologies that are used by GPS\, Beido
 u\, Glonass and Galieo will be explained.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Make your own Tinfoil Fedora
DTSTART:20200816T120000Z
DTEND:20200816T150000Z
DTSTAMP:20260409T010856Z
UID:15975792-0026-351f-33da-1f84f34476db
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/make-your-own-t
 infoil-fedora/\n\nSpeaker(s): Moem\n\nRecorded: No\n\nStreamed: No\n\nThis
  is a fun\, easy-peasy\, lighthearted workshop for pretty much all ages! W
 e'll be making the ultimate in stylish\, tech paranoia-inspired headwear: 
 a tinfoil fedora. Well\, strictly speaking it's a trilby\, but fedora is s
 uch a nice word\, don't you agree?\n\nThere is place for 11 participants b
 ecause of the materials in stock. There is no fee for those who want to jo
 in us. It's on the house. *tips fedora*
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:"Failed" Projects: Just Move On
DTSTART:20200816T130000Z
DTEND:20200816T140000Z
DTSTAMP:20260409T010856Z
UID:15975828-0025-321c-5afb-62e8b8543f18
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/failed-projects
 -just-move-on/\n\nSpeaker(s): Niels G. W. Serup\n\nRecorded: Yes\n\nStream
 ed: Yes\n\nJoin me in this inspirational talk covering a wide array of uns
 pectacular personal failures in the general area of hacking.\n\nThe conclu
 sion of the talk is that you should just start on new projects even if you
  rarely finish current projects.  The contents of the talk is a barely con
 nected list of projects I have initiated and not quite finished\, along wi
 th arguments for why that's just fine.  Hopefully this is uncontroversial\
 ; indeed\, I expect my general experiences to be shared by many attendees.
 \n\nWithout going into concrete spoilers\, the failed projects include\, b
 ut are not limited to:\n\n- A potentially revolutionary compression algori
 thm turned into a fun and otherwise useless graphics toy\n- A 20 minute sh
 ort satirical film about the 2014 EU Unified Patent Court membership refer
 endum that was never fully edited or even shown\, but took a long time to 
 film\n- A budding video game franchise whose first game was not received w
 ith the grandeur it deserved\; and a sequel that never got past pre-produc
 tion\n- A state-of-the-art Prolog compiler that demonstrated how art is no
 t always efficient\n- Spending several years running Debian on a miniature
  laptop without ever finding _any_ use for it\, mostly just demonstrating 
 to friends and family that it could fit in my pocket\n- Never quite provin
 g the conjectured Turing completeness of my car-themed programming languag
 e\n- A magical picture-to-sound synthesis approach that never *really* mad
 e sense\n- A stack-based natural language whose vocabulary is still non-ex
 istent\, but whose grammatical rules are very nice and totally usable\, th
 ough untested\n\nI won't cover projects that never went beyond the idea st
 age\, as they are too numerous.  I will briefly mention that I am capable 
 of somewhat finalizing projects\, and argue that the learnings from the un
 finished projects probably aid me in that.\n\n**Note**: This presentation 
 is just an excuse for me to talk about random things I spent time on in th
 e past 10 years\, so don't expect any huge insights (small insights might 
 occur)!
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Bash tricks
DTSTART:20200816T140000Z
DTEND:20200816T150000Z
DTSTAMP:20260409T010856Z
UID:15975864-0025-3222-cf4f-1c4d6ca4ef99
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/bash-tricks/\n\
 nSpeaker(s): Joe\n\nRecorded: No\n\nStreamed: No\n\n"Just 45 minutes of on
 e trick after another\, with examples of situations where they can be usef
 ul."\n\nSome of us who have to interact with computers regularly find ours
 elves deep in hostile territory: the Bash shell.\n\nThe Bash manual is lon
 g and intimidating\, and functionality is often overlooked by its users wh
 o get by with their respective bags of tricks accumulated haphazardly over
  the years.\n\nWe will go over various `Bash` and `readline` features\, co
 mmon and obscure\, with a story-driven narrative trying to tackle scenario
 s that might be relevant to system administrators\, programmers\, and othe
 r command-line-curious individuals.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Open Source\, Open Projects
DTSTART:20200816T150000Z
DTEND:20200816T160000Z
DTSTAMP:20260409T010856Z
UID:15975900-0025-3615-db8c-7d81eb949f78
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/open-source-ope
 n-projects/\n\nSpeaker(s): Johan Thelin\n\nRecorded: Yes\n\nStreamed: Yes\
 n\nWhat is free and open source? How do I pick a license? And when I've pi
 cked a license\, how do I get contributions? Does it even make sense to go
  open?\n\nIn this talk we will discuss various licenses\, license dependen
 cies\, as well as why being an open project goes beyond the source. We als
 o discuss areas where openess hurts even an open project.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Take control of your email deliverability - What SPF\, DKIM and DM
 ARC means for your mailing list
DTSTART:20200816T160000Z
DTEND:20200816T170000Z
DTSTAMP:20260409T010856Z
UID:15975936-0025-373d-12f4-f07a34540cfa
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/take-control-of
 -your-email-deliverability-what-spf-dkim-and-dmarc-means-for-your-mailing-
 list/\n\nSpeaker(s): Merete Stenner\n\nRecorded: Yes\n\nStreamed: Yes\n\nW
 hen sending bulk email like newsletters\, webshop receipts or follow up em
 ails\, not only do you need to first get peoples permission to contact the
 m then treat their data in compliance with GDPR and use a proper mass mail
  provider. \nYou also need to get your sender domain properly verified and
  make sure the mails you’re sending from various providers are actually 
 aligned with your domain.\nThis last step is something a lot of mail provi
 ders are oddly quiet about\, usually because it takes a bit of tech skill 
 to setup the required DNS records - in other cases because the systems the
 mselves aren’t built with proper alignment in mind..\nBut taking control
  of your settings is vital for your deliverability. If you don’t have SP
 F and DKIM setup\, mailsystems like gmail or hotmail will simply just not 
 deliver a seemingly random amount of your emails\, while at the same time 
 return a delivered message… Maybe even worse\, if you don’t setup your
  own DMARC record\, you run the risk of someone else doing it for you\, li
 ke UnoEuro/Simply did around easter\, where a large amount of their custom
 ers suddenly got a DMARC record applied\, with the quarantine policy enabl
 ed\, ending huge masses of emails up in spam instead of in the recipients 
 inboxes.\n\nIn this talk I’m going to show you\, what you need to set up
  and how it’s done\, using a couple of different systems as examples. I
 ’ll show you a simple way to monitor your domain and your various mail p
 roviders. And finally I’m going to give you a couple of real world cases
  of what happens when you don’t have control over your settings.\n\nHavi
 ng worked with lots of customers solving deliverability issues over the la
 st 4 years\, I’ve witnessed first hand how the demand for verification o
 f bulk email senders have increased and how parts of the industry still se
 ems to be lacking in the understanding of these mechanisms.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacker Jeopardy (Finals)
DTSTART:20200816T180000Z
DTEND:20200816T203000Z
DTSTAMP:20260409T010856Z
UID:15976008-0025-367a-da26-5ab8b50427db
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/hacker-jeopardy
 -finals/\n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nThe wi
 nner teams from the first round competes in one final battle of jeopardy.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Nix meetup
DTSTART:20200816T210000Z
DTEND:20200816T230000Z
DTSTAMP:20260409T010856Z
UID:15976116-0027-3916-89b4-293eee9409e8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/nix-meetup/\n\n
 Speaker(s): Louis\n\nRecorded: No\n\nStreamed: No\n\nWe'll meetup and talk
  about Nix: www.nixos.org\n\nWhatever you're a NixOS user\, use the packag
 e manager Nix on another distribution or just feeling curious you're welco
 me to join.
LOCATION:Bar Meetup Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Getting started with RISC-V
DTSTART:20200817T090000Z
DTEND:20200817T120000Z
DTSTAMP:20260409T010856Z
UID:15976548-0026-3506-54dd-1a6e0e34e18b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/getting-started
 -with-risc-v/\n\nSpeaker(s): Emil Renner Berthing\n\nRecorded: No\n\nStrea
 med: No\n\nRISC-V is an instruction set. That is a specification of the ba
 sic instructions a CPU can perform\, eg. what your C-compiler emits. But u
 nlike the ARM instruction set\,used by your phone or tablet\, or the x86 i
 nstruction set\, used by your computer and server RISC-V is free and open.
  That is you're free to download the specification from riscv.org\, build 
 your own CPU and even share your work like many have already done. There i
 s already upstream support many of the tools we take for granted: GCC\, LL
 VM\, Rust\, Go\, glibc\, u-boot\, coreboot\, Linux\, FreeBSD etc. but ther
 e is unfortunately not much real hardware available yet\, so trying it out
  can feel like a challenge.\n\nAfter a basic introduction I plan to get ev
 eryone set up so we can program the GD32VF108 RISC-V microcontroller on th
 e [Longan Nano][1] board. One of the first pieces of hardware you can actu
 ally buy on a hobby budget. Hopefully we can find enough boards for everyb
 ody during the workshop and maybe even have a few to sell afterwards.\n\nN
 ext I'll show how to run Fedora Rawhide or Debian Sid in Qemu on your comp
 uter\, so you can follow or join the porting effort and even try out your 
 own favourite piece of code on RISC-V. This requires a non-ancient Qemu\, 
 so please bring a recent Linux distro or do your own experiments on MacOS 
 or maybe even Windows' WSL. If time permits we'll also build our own "BIOS
 " and Linux kernel for it. I'll also bring the HiFive Unleashed that I won
 .\n\n[1]: https://www.seeedstudio.com/Sipeed-Longan-Nano-RISC-V-GD32VF103C
 BT6-Development-Board-p-4205.html
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20200817T100000Z
DTEND:20200817T110000Z
DTSTAMP:20260409T010856Z
UID:15976584-0029-366c-6ce0-91321334b369
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/lunch-break/\n\
 nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break
 . Remember to drink water and keep some distance in the lines.
LOCATION:Food Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:fine words butter no parsnips\; a hacker's approach to company pol
 itics using game theory
DTSTART:20200817T110000Z
DTEND:20200817T120000Z
DTSTAMP:20260409T010856Z
UID:15976620-0025-355d-8e57-3aef7d14a579
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/fine-words-butt
 er-no-parsnips-a-hackers-approach-to-company-politics-using-game-theory/\n
 \nSpeaker(s): DaniQuietNow\n\nRecorded: No\n\nStreamed: No\n\nHi\, my name
  is Dani and I do maths (data scientist). I understand the world with equa
 tions and I can’t tell when people lie to me. Being able to “read peop
 le” and “tell them what they want to hear” is an essential skill if 
 you want to go up on the corporate ladder - lack this skill.\n\nHaving bee
 n told many times that I am too technical to get promoted\, I used my tech
 nical skills to delve into corporate politics. Large corporations comprise
  different teams working on the same goals: project delivery and reaching 
 the financial target. Each team comprises members that work towards this g
 oal\, but also have a selfish motivation: to get promoted and achieve a hi
 gher position on the hierarchy. If a team in a corporation is equated to a
  system and the members of staff are assumed to be agents then game theory
  can be applied to investigate the rate at which the performance of the te
 am -and therefore the quality of project delivery- will degrade due to the
 \nselfish behaviour of the team members. This can be measured using the Pr
 ice of Anarchy.\n\nI will talk about the application of game theory in eth
 ics and the challenges arising from this approach\, followed by a descript
 ion of the Prisoner’s dilemma and its application in behavioural metrics
 . The Price of Anarchy (PoA) will then be defined followed by the presenta
 tion of the selfish routing and of different types of the PoA depending on
  the equilibria and the information achieved. I will also talk about predi
 ction models and outcomes based on this approach. Finally\, the potential 
 application of the PoA approach in corporate environments will be discusse
 d.\n\nI aim to explain game theory while addressing the frustration that s
 ome corporate behaviours are causing to creative people and/or people that
  think out of the box in a fun and approachable way. I hope that at the en
 d of this talk people will feel more confident with game theory and will u
 nderstand that they are not alone when facing workplace politics.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:You are Always Near a Shop
DTSTART:20200817T120000Z
DTEND:20200817T130000Z
DTSTAMP:20260409T010856Z
UID:15976656-0025-3840-6794-c69713148f0a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/placeholder-for
 -hans-gregers-hedegaard-petersen/\n\nSpeaker(s): Hans Gregers Hedegaard Pe
 tersen\n\nRecorded: Yes\n\nStreamed: Yes\n\nFor more than a decade I have 
 been working with what has become the (free and open) basic data of Denmar
 k. This talk will fly over the scenery of The Danish Basic Data and my wor
 k with FOSS for geographics. I will also walk through the little mapping s
 olution I made for illustrating the Danish governments wish to allow priva
 te cc tv coverage up to 30 meters from companies. This since we often hear
  vague geographical descriptions in suggestions to new laws etc.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:#badgelife meetup
DTSTART:20200817T130000Z
DTEND:20200817T150000Z
DTSTAMP:20260409T010856Z
UID:15976692-0026-3926-2e9d-d68d7394eaf8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/badgelife-meetu
 p/\n\nSpeaker(s): Thomas Flummer\n\nRecorded: No\n\nStreamed: No\n\nJoin u
 s in the workshop room and show off your badge hacks\, and chat about badg
 es. This will be an informal meeting - all badges welcome\, where we will 
 hang out for about an hour and show each other what we have done or intere
 sting badges that we have collected.
LOCATION:Workshop Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Kameraer og ansigtsgenkendelse i det offentlige rum og hjælp til 
 politikere
DTSTART:20200817T130000Z
DTEND:20200817T150000Z
DTSTAMP:20260409T010856Z
UID:15976692-0025-3856-c774-757140444d28
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/kameraer-og-ans
 igtsgenkendelse-i-det-offentlige-rum/\n\nSpeaker(s): Hans Gregers Hedegaar
 d Petersen\, Rosa Lund\n\nRecorded: Yes\n\nStreamed: Yes\n\nThis event is 
 a Panel Discussion in Danish.\n\nThe topic is CCTV and facial recognition 
 in the public space. After a short break we will also discuss how we can m
 ake politicians take better decisions in relation to surveillance.\n\nThis
  event will be moderated by the Danish journalist Anders Kjærulff.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:State of the Network
DTSTART:20200817T150000Z
DTEND:20200817T160000Z
DTSTAMP:20260409T010856Z
UID:15976764-0025-3335-f6aa-5e7d5d14afcb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/state-of-the-ne
 twork/\n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nCome and
  meet the network team who will talk about the design and operation of the
  network at BornHack.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Goodbye World
DTSTART:20200817T160000Z
DTEND:20200817T170000Z
DTSTAMP:20260409T010856Z
UID:15976800-0025-3303-5545-4f10ddb432ba
DESCRIPTION:URL: https://bornhack.dk/bornhack-2020/program/goodbye-world/\
 n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nBornHack 2020 i
 s almost over at this point. We would like to say farewell for now and see
  you again at the next event in 2021.\n\nWe will walk over what we believe
  has worked and what we believe should change the next event. This is an e
 xcellent opportunity to submit ideas for BornHack 2021 while the memories 
 are still fresh.
LOCATION:Speakers Tent
END:VEVENT
END:VCALENDAR
