25th Chaos Communication Congress
Nothing to Hide
Chaos Communication Congress visitors were probably more interested in their digital civil rights, as reflected in the congress motto "Nothing to hide," but first they had to cope with closed ticket counters and overflowing rooms.
According to a hand-written sign, visitors arriving too late or briefly vacating their seats had to wait outside the door (Figure 1). With more than 4000 visitors at the 25th Chaos Communication, the record attendance forced organizers to cancel sales of multiple-day tickets on day two.
Between the Scenes
Some 260 helpers – Chaos Angels – supported the organizers, as did various teams of volunteers, including the Network Operation Center (NOC), the Chaos CERT network police, the POC switchboard, and the video crew. A delegation of 11 helpers arrived from the Forschungsgemeinschaft elektronischer Medien (Research Community Electronic Media – FeM), a society connected with the Technical University of Ilmenau and also responsible for streaming the 100 or so talks on the network and recording about 130 hours of video . Considering the care that volunteers put into this event each year, it stands to reason that the atmosphere on all three floors of the building on Berlin's Alexander Square is friendly (Figure 2).
Typically, anybody who has anything to show just sets up a stall in the hack center at Chaos Communication Congress and explains their work. Mitch Altman, who held a workshop in a separate room to demonstrate his TV-B-Gone TV sabotage device, invited attendees to join in a tinkering session between the lecture theaters, giving guests a decidedly non-rocket science explanation of what all the diodes and wire cutters were for.
Networking Hacker Biotopes
As part of a worldwide movement to help create more local and permanent meeting places for technology enthusiasts and creative souls, panel speakers appealed for more hacker spaces (see Figure 3). The online platform at Hackerspaces.org welcomes contributions. Berlin's C-Base, a mixture of a hacker meeting point and an underground club , and Vienna's Metalab are regarded as archetypal hacker spaces.
A couple of years ago, these spaces inspired Nick Farr to export the idea to other continents. Two CCC talks followed, and it became apparent that the U.S. did not have open meeting points for creative computing fans at the time. Finally, Farr founded Hac DC in Washington. Jacob Applebaum, also a member of the panel, reported on similar activities in San Francisco, in the form of the Noisebridge Initiative.
Monitoring Network Traffic
Other tinkerers again found grateful takers at the congress. Xavier Carcelle, a telecommunications engineer and CTO with French start-up OpenPattern , talked about Powerline Communications (PLC), which is a network technology that uses sockets and power lines for OSI layers 1 and 2. Although PLC hardware already exists (Figure 4), French hackers wanted a free platform. OpenPattern, which is a hybrid somewhere between a project and a corporation, is working on its own design based on an FPGA chip.
Carcelle and his colleagues Florian Fanelli showed their Faifa software  at the congress. The software gives users the ability to debug and monitor modulated control frames, for example, on PLC connections. The French developers have released the tool, along with their hardware design and control software under the GPLv2. They hope to establish a developer community that will create a software stack for the MAC layer. "The feedback has been positive since we published the code at the congress," says Xavier Carcelle.
Buy this article as PDF
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm