25th Chaos Communication Congress
Nothing to Hide
Chaos Communication Congress visitors were probably more interested in their digital civil rights, as reflected in the congress motto "Nothing to hide," but first they had to cope with closed ticket counters and overflowing rooms.
According to a hand-written sign, visitors arriving too late or briefly vacating their seats had to wait outside the door (Figure 1). With more than 4000 visitors at the 25th Chaos Communication, the record attendance forced organizers to cancel sales of multiple-day tickets on day two.
Between the Scenes
Some 260 helpers – Chaos Angels – supported the organizers, as did various teams of volunteers, including the Network Operation Center (NOC), the Chaos CERT network police, the POC switchboard, and the video crew. A delegation of 11 helpers arrived from the Forschungsgemeinschaft elektronischer Medien (Research Community Electronic Media – FeM), a society connected with the Technical University of Ilmenau and also responsible for streaming the 100 or so talks on the network and recording about 130 hours of video . Considering the care that volunteers put into this event each year, it stands to reason that the atmosphere on all three floors of the building on Berlin's Alexander Square is friendly (Figure 2).
Typically, anybody who has anything to show just sets up a stall in the hack center at Chaos Communication Congress and explains their work. Mitch Altman, who held a workshop in a separate room to demonstrate his TV-B-Gone TV sabotage device, invited attendees to join in a tinkering session between the lecture theaters, giving guests a decidedly non-rocket science explanation of what all the diodes and wire cutters were for.
Networking Hacker Biotopes
As part of a worldwide movement to help create more local and permanent meeting places for technology enthusiasts and creative souls, panel speakers appealed for more hacker spaces (see Figure 3). The online platform at Hackerspaces.org welcomes contributions. Berlin's C-Base, a mixture of a hacker meeting point and an underground club , and Vienna's Metalab are regarded as archetypal hacker spaces.
A couple of years ago, these spaces inspired Nick Farr to export the idea to other continents. Two CCC talks followed, and it became apparent that the U.S. did not have open meeting points for creative computing fans at the time. Finally, Farr founded Hac DC in Washington. Jacob Applebaum, also a member of the panel, reported on similar activities in San Francisco, in the form of the Noisebridge Initiative.
Monitoring Network Traffic
Other tinkerers again found grateful takers at the congress. Xavier Carcelle, a telecommunications engineer and CTO with French start-up OpenPattern , talked about Powerline Communications (PLC), which is a network technology that uses sockets and power lines for OSI layers 1 and 2. Although PLC hardware already exists (Figure 4), French hackers wanted a free platform. OpenPattern, which is a hybrid somewhere between a project and a corporation, is working on its own design based on an FPGA chip.
Carcelle and his colleagues Florian Fanelli showed their Faifa software  at the congress. The software gives users the ability to debug and monitor modulated control frames, for example, on PLC connections. The French developers have released the tool, along with their hardware design and control software under the GPLv2. They hope to establish a developer community that will create a software stack for the MAC layer. "The feedback has been positive since we published the code at the congress," says Xavier Carcelle.
Buy this article as PDF
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.