Geert Lovink on Mon, 4 Aug 1997 15:51:46 +0200 (MET DST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> Program of Hacking In Progress (HIP) |
The Program of Hacking In Progress August 8 - 10, 1997 See also: http://www.hip97.nl Friday, August 8th 1997 Time The Circus The Workshop UTC+2 1000 seat auditorium tent 100 seat workshop tent 10:00 Opening words by Emmanuel Goldstein 11:00 Local opening ceremony Build your own DES cracker 12:00 The Chaos Computer Club invites everyone to participate in their DES cracking project. SPAM An overview of the world of SPAM 13:00 and counterspam, with lots of room to share personal experiences concerning the fight against SPAM. World Wide Conferencing Network The IRC II protocol has reached Build your own it's practical limits, every DEScracker time more people use IRC, the The Workshop IRC network has to split into 14:00 more small networks. In the past three years, a replacement protocol has been developed, especially targetted at being deployed at a very large scale. Gerrit Hiddink will introduce this protocol. Virtual Communities In 1993, during the HEU, Alfred Heitink was one of the people 't Klaphek discussing the concept of a Bastiaan Bakker a virtual community. People were Jeroen van Eesteren 15:00 exchanging idea's about of 't Klaphek will metaphors, communication talk about the concepts and were full of good history and future of idea's. Now, 4 years later, he this dutch hackers thinks it is time to discuss magazine. what the last 4 years have shown us. The net and political campaigning The net is a powerful political medium and as such a subject of political struggle. The internet is a very good medium for campaigning, actions and protest voices. Contrast.org was created to stimulate these voices. It's an organisation and workspace for contra-information, and Smartcards contra-expertise, on the Lots of smartcard Internet - from a enthousiasts meet at radical-critical perspective. The Worshop to discuss new * History of Contrast.org developments and hook 16:00 (Eveline Lubbers) up with others. There Scientology, Van Traa on will be a separate line smartcard lab * Internetworking at somewhere at HIP, and alternative gatherings work as well as (Rolf Kleef) educational sessions Greenhouse Gathering, may continue there. Kolumna, Eurostop-technisch ---------------------- * Alternative media during events (Gerbrand PIC chip programming Oudenaarden) Adam Page is bringing Eurostop-site during the a PIC programmer and Eurotop: news and the use some circuit boards of real-audio and and would like to real-video hook up with others * Active use of databases on to do some line, (Gert van Velzen) programming and to have fun. Particularly: Tactical Media Forum chipcard enthousiasts Discussion on net activism and may not know the PIC the formation of an chip and may discover International Independent Media new depths of love. Federation and the He's at The Workshop importance of the extension of at this time, but this Canadian/American will gladly go initiative into Europe. This somewhere else with a initiative may be a real bunch of interested possibility to connect radical folks to do some media and enhance the actual work. 17:00 cooperation between them. We have invited several people to discuss this idea. We would welcome the foundation of a European Chapter of the International Independent Media Federation, and we hope that the exchange will be inspiring.. A video link with the Media Collective in Toronto, Canada will be established. 18:00 19:00 Van Eck demonstration Monitors radiate the video signal they are displaying. This radiation can be picked up using 20:00 an antenna and then displayed at another monitor. Prof. Erhard Moeller of the Fachhochschule Aachen in Germany will demonstrate this. Practical PGP attacks Virtual Communities Joel McNamara, the author of The Workshop Private Idaho, a freeware, Windows PGP and anonymous remailer shell, will talk about Practical PGP Attacks. This 21:00 presentation discusses practical attacks an opponent may use to compromise PGP. These methods are typically much more efficient and cost effective than CPU-intensive cracking attempts. Vulnerabilities such as swap file access, trojan horse versions of PGP and shells, keyboard monitoring, brute forcing, and key theft viruses are explored. Countermeasures are suggested for enhancing security. 22:00 Afterwards, Gary Howland will discuss some known PGP security weaknesses involving KeyID, fingerprint and talk about dictionary attacks on the passphrase. 23:00 Saturday, August 9th 1997 Time UTC+2 The Circus 1000 seat auditorium tent The Workshop 100 seat workshop tent 10:00 Cryptography overview PGP is a very popular tool for encryption and signing with number- theoretical methods like RSA or ElGamal. But there are more powerful applications of these and other algorithms, developed since the revival of cryptology in 1976: * blind signatures, electronic coins * authentification, the Kerberos system * anonymous communication through MIXes * electronic votes * calls for tenders via net * playing poker via net without getting cheated * authentification without transferring any information: zero-knowledge * exchanging information simultaniously * sharing secrets * quantum cryptology This talk by Nils Toedtmann will introduce these applications, the used protocols and algorithms, including a discussion of their (in)security. 11:00 Legal Hacking Paul Samwel and Willem Scheeres of Moret Ernst & Young EDP Audit will explain the pros and cons of Legal Hacking or Penetration testing. * Explanation on why companies want these kind of tests * Benefits from legal hacking * Relationships and differences between legal- and illegal hacking * Releationships and differences between legal hacking and auditing * How these kind of tests are performed * Experiences from previous tests. Java Security Kickin' Java in the Beans Bastiaan Bakker talks about JAVA security 12:00 Active X Andy Mueller-Maguhn and Lutz Donnerhacke of the Chaos Computer Club show the vulnerabilities of Microsoft's Active X technology. 13:00 The Net Strikes Back Karin Spaink describes the history of the battle of the Church of Scientology vs. civilisation and updates us on the latest developments in Scientology's campaign to discredit her and others. WWCN - The ins and outs of the protocol The World Wide Conferencing Protocol makes use of a proprietary multicasting service on top of TCP/IP. This may look as a rather peculiar (say: weird) choice. In this presentation, a rationale for this decision is given, as well as an overview of the way the multicasting protocol works. Also, attention is paid to two distributed auxiliary services: the Channel Directory Service and the User Directory Service. Due to these distributed services, the protocol is truly capable of scaling up to millions of users and tens of thousands of servers without using excess bandwidth or server memory. 14:00 Sociology of the spammer Marie-Jose Klaver tries to understand the spammer mind. The Nijntje Gang Peter van Dijk discusses the technical backgrounds of a famous hack that made the media in Holland. 15:00 Semafun Rop Gonggrijp and The Key helped develop Hack-Tic's Semafun, a pager signal (POCSAG) decoder that helped show the media how insecure paging data really is. Several years later, Semafun showed up again in the press, as The Key gets arrested and held in jail for month. The dutch police even claim that The Key is part of an organised crime ring. What's going on here? Closed Networks Klaus Theiss will discuss the problems networks such as CL and APC have to maintain their closed structure. Are closed networks useful when there is UseNet? What about SPAM and censorship? 16:00 Smartcard security Piet Maclaine Pont works for IBM Nederland and will speak a titre personel on the security of modern smartcards in Internet applications. IT's future: transforming governing, economy and education At the end of the 20th century we transform human culture and activity on a global scale. The development of IT is often seen as the cause of these large developments. It makes discussion move between IT as the harbinger of bad news and IT as the basic force for the utopia. But the changes are far wider and deeper than that and cannot be attributed to technology alone. But technology catalyzes the changes: how will IT change government, education and economy? Are the new models of development such as the Internet and the powerful contribution of hackers a view on the new way of organizing human activity? Are we hacking the future and who makes the rules? Bert Mulder has a background in psychology, was head of the information department of Hollands largest broadcasting organization Veronica, independant consultant for strategic use of media and information systems in business, government, education and culture. He is currently the information advisor of the dutch parliament. 17:00 RADIKAL The german government has banned a political magazine called Radikal and labelled it a "terrorist publikation". It's availability on the Internet and the subsequent government pressure on providers to block access to the radikal web page and all other pages on the XS4ALL server has sparked heated debate in and outside of german borders. Sabine Helmers is a german Internet researcher and together with Andy Mueller-Maguhn she'll update you on what happened, why it happened, and what's likely to happen next. Searching for the digital truth The Forensic Science Laboratory (FSL) in the Netherlands is part of the Ministry of Justice and investigates evidence for Justice and Police. At this moment the FSL has 16 specialist departments of which the department of Forensic Computerscience is the newest and the largest. The department has a total of 21 computer experts who are investigating hardware, software and (data)communications in seven different labs. Dr. Hans Henseler, head of the department will give an overview. 18:00 19:00 20:00 Anonymous Mailbox Servers Lucky Green will present a new technology that provides a reliable way of receiving untraceable email under a persistent pseudonym. A combination of mail processing servers and multi- jurisdictionally deployed mailbox servers protects the privacy of the users from both corrupted operators and malicious third parties. No subpoenable database matching pseudonyms to "true names" exists. Security does not depend on secrecy. 21:00 The l0pht Brian Oblivion, Weld Pond, Kingpin, Mudge, Space Rogue, Tan, and Stefan. This, incidentally, is the ENTIRE L0pht lineup all in one place at one time! They will be talking about recent projects and accomplishments, not the least of which will be their adventures with Windows NT and why Microsoft would like to see them shot. Look for some new projects to be introduced and for a discussion of emerging trends and shortcomings in the technologies that are backing them. This will be followed by a Q/A session. Perl as a hacker tool A short demonstration by Gary Howland to promote the use of the PERL language for developing security related applications. ------------------------------ Proxy for Privacy Gary Howland will discuss a modular proxy written in JAVA to run on your own PC that will protect your privacy by blocking cookies, maintaining username-password combinations for remote sites and mess up the referrer and other unnecessary fields on outgoing WWW requests. 22:00 Cryptography: opportunities, threats and implementations Bruce Schneier From encryption to digital signatures to electronic commerce to secure voting - cryptography has become the enabling technology that allows us to take existing business and social constructs and move them to computer networks. But a lot of cryptography is bad, and the problem with bad cryptography is that it looks just like good cryptography; most people cannot tell the difference. Security is a chain: only as strong as the weakest link. In this talk Bruce will take a look at the future of cryptography: the needs, the threats, the limits of technology, and the promise of the future. Cypherpunks meeting 23:00 Sunday, August 10th 1997 Time The Circus The Workshop UTC+2 1000 seat auditorium tent 100 seat workshop tent Reading headers SPAM is just one of the situations where you need to know where mail or UseNet 10:00 posts are coming from. Jan-Pieter Cornet will tell you everything you always wanted to know about mail & news headers. Blowing Smoke and Mirrors Rich Graves discusses the experience and implications 11:00 of mirroring neo-Nazi propaganda web sites, and of later experiences attempting to counter them in fun and freedom-affirming ways. TCP security Niels Provos explains how IP spoofing works, what possible Yoyo workshop attacks can be mounted and padeluun does a yoyo what known solutions exist workshop. against spoofing. There will Server up - and server also be a practical down again. Like playing 12:00 presentation of a yoyo. But good recreation man-in-the-middle attack and and good vibration you overview of IP Security and get by playing real yoyo. associated key management. And after that you go Last but not least some back to work: Server down theoretical ways to hide - make some funny things information in TCP/IP packets - and server up again. will be presented. IPv6 After years of excellent service, the current Internet Protocol is showing some limitations which will call the growth of the Internet to a halt. The most serious limitation is the number Ransom Payments in the space: there are not Information Age enough numbers to satisfy Collecting money for the the needs. This was perfect crime realized in 1994, and 13:00 Gary Howland will show in since then work has been detail how the upcoming done to specify and introduction of digital money implement a new Internet may lead to some very Protocol: IPv6 (the Next interesting situations. Generation Internet Protocol, IPng). Erik Verbruggen will do two talks about this new protocol. The first is a general one: Why, Where and How are the main questions. This talk assumes you've heard of the Internet. Crypto-politics Cryptography has proven hard to outlaw. Trusted Thrid parties and Key Recovery Systems are the new strategy IPv6 for experts of government to get access This second talk will be to all our secrets. a deeper investigation of 14:00 Bert-Jaap Koops is working at IPv6. It assumes you know Tilburg University and does of addressing, routing Phd reseach on legal and and a little security private concerns regarding (all with respect to encryption. He will discuss IPv4). the dutch and european situation regarding crypto-politics. WWCN - The sociological impact The World Wide Conferencing Network and Key Recovery its associated protocol After the outrage over the also try to solve social Clipper Chip the US plagues that torture government is moving to a current IRC based more clever strategy to get networks, like channel 15:00 access to crypto keys. Key wars, bot wars, clone Recovery is a new technology flooding, harassment, that is the next step in the nick collisions and crypto debate. Sameer Parekh related anomalies, will update us with news from etcetera. However, only the front. time will tell how such a large crowd of people will react to eachother and to the environment in which they communicate. Electronic Data Systems Frank Rieger and padeluun talk about Electronic Data Systems, the largest company in 'outsourcing' computing facilities. You may not know them, but they sure know you: All flights are booked by the 'Amadeus booking system', they make the deals with Master-, Amex and Visa cards. 16:00 Their income is 34 Billion US$. They are operating world wide and they are great in getting contracts concerning very sensitive data. They are working for governments in many countries and for large corporations. They have the power of knowing everything. Their founder was the very conservative us presidential candidate Ross Perot. Information Warfare panel A panel of hackers will 17:00 discuss the current trends in the military establishment regarding 'Information see also: http://www.xs4all.nl/~rop/prog.html --- # distributed via nettime-l : no commercial use without permission # <nettime> is a closed moderated mailinglist for net criticism, # collaborative text filtering and cultural politics of the nets # more info: majordomo@icf.de and "info nettime" in the msg body # URL: http://www.desk.nl/~nettime/ contact: nettime-owner@icf.de