Chaos Communication Congress 2015

Hackers

© © 32C3

© © 32C3

Article from Issue 185/2016
Author(s):

The 32nd Chaos Communication Congress (32C3) attracted a colorful mix of 12,000 hackers to Hamburg, Germany.

Not long after the Christmas turkey leftovers have been polished off, the Chaos Communication Congress (CCC) [1] calls its devotees to Hamburg, Germany. This jaunt at the turn of the year is a mandatory part of the calendar for many a hacker, tinkerer, artist, and activist. The multiple-day educational event from December 27 to 30, 2015, attracted around 12,000 guests – too many, said some, whereas others were delighted to see such a varied cross-section of the community in attendance.

At the Congress

Although made up of a different breed of hackers in the early days, C3 conferences today are a meeting place for people from all walks of life who experiment with technology in various contexts, trying out new techniques and pushing boundaries. The gathering is about experiencing and demanding individual freedom and collaborating with other people. One of these collaborations is the Congress itself, which is a purely community-organized event – much like the Burning Man Festival [2], which has been around for a similar length of time.

The amount of work the organizers commit to the four days of the conference is amazing. The complete work is more than the sum of complex installations on the first floor, such as a working pneumatic dispatch system, or an enormous tree backdrop; it also comprises individual performances, like the one by Darsha Hewitt: In a very entertaining musical performance, she composed music with the help of 20 oscillators in a 20-minute session [3]. Hacking means being creative in your use of technology, which was accomplished both by the numerous works of art that played with the topic of technology and by the 7,000-square meter party arena with its sophisticated design, including a parked RV that recalled the sci-fi parody "Spaceballs."

Security Theater

Of course, classical hackers were also in attendance; however, those who identify technology vulnerabilities are not automatically freedom fighters, as the cliché would suggest. Many hackers earn a living as consultants in security businesses. When they demonstrate at a conference what can happen if an enterprise neglects the security of its products, they are not only showing themselves to advantage, they are doing the general public and the IT industry a favor.

For example, engineer Mathias Dahlheimer pointed out the risks of intelligent power grids. If hackers succeed in manipulating the gateways for smart meters, they could disconnect several consumers from the power grid in one fell swoop. Security expert Vincent Haupert explained why the pushTAN method [4] promoted by some banks is not as secure as they maintain. The problem, he said, is that the customers use the same machine to generate transaction numbers as they use for their online banking business [3].

In some cases, hackers just enjoyed demonstrating their can-do attitude. For example, in a live demonstration of a PlayStation 4 hack [5], Sony's gaming console booted Gentoo Linux, much to the amusement of the attendees. Without the preparatory work by another group of hackers, though, a Sony hack would have been difficult to achieve.

Free and Open

In contrast, most open source and free software hackers do not want to overcome technical obstacles but prefer to develop free software to satisfy genuine requirements, and they too attended CCC in large numbers.

Tools like Netstat and Nmap are not only popular with hackers, but also with network administrators, whether in the context of virtualization, the cloud, or the internet of things. Without free software, the world's data centers would look different. Although large corporations are not represented at CCC, their employees are, because open source has long since become part and parcel of Facebook, Google, and others. The many well-attended hackathons all over the world show that hacking is no longer simply about transcending security barriers.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Chaos Communication Congress

    The 23rd annual Chaos Computer Club Congress offered a fresh perspective on topics such as RFID technology and cyber-crime laws.

  • Chaos Communication Congress

    Chaos Communication Congress visitors were probably more interested in their digital civil rights, as reflected in the congress motto "Nothing to hide," but first they had to cope with closed ticket counters and overflowing rooms.

  • Chaos Communications Congress

    In late December, cable docks, soldering stations, templates, 4,000 participants, and 100 talks were active ingredients in the 24th Chaos Computer Congress.

  • Chaos Computer Club Congress

    Under a banner of “Here be dragons,” an inscription found on old navigational charts, the Chaos Computer Club held its annual conference for the 26th time.

  • 25c3 Nothing To Hide: Chaos Communication Congress in Germany

    The Germany based Chaos Computer Club (CCC) has opened its traditional annual conference in Berlin, Germany, again this year. After a year of breakdowns in data security, the hacker organization is calling for a number of new protective measures.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News