Player FM - Internet Radio Done Right
127 subscribers
Checked 1h ago
Adăugat eight ani în urmă
Content provided by CCC media team. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CCC media team or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !
Treceți offline cu aplicația Player FM !
Podcasturi care merită ascultate
SPONSORIZAT
T
TechSurge: Deep Tech VC Podcast


1 Understanding the Elegant Math Behind Modern Machine Learning 1:14:43
1:14:43
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut1:14:43
Artificial intelligence is evolving at an unprecedented pace—what does that mean for the future of technology, venture capital, business, and even our understanding of ourselves? Award-winning journalist and writer Anil Ananthaswamy joins us for our latest episode to discuss his latest book Why Machines Learn: The Elegant Math Behind Modern AI . Anil helps us explore the journey and many breakthroughs that have propelled machine learning from simple perceptrons to the sophisticated algorithms shaping today’s AI revolution, powering GPT and other models. The discussion aims to demystify some of the underlying math that powers modern machine learning to help everyone grasp this technology impacting our lives, even if your last math class was in high school. Anil walks us through the power of scaling laws, the shift from training to inference optimization, and the debate among AI’s pioneers about the road to AGI—should we be concerned, or are we still missing key pieces of the puzzle? The conversation also delves into AI’s philosophical implications—could understanding how machines learn help us better understand ourselves? And what challenges remain before AI systems can truly operate with agency? If you enjoy this episode, please subscribe and leave us a review on your favorite podcast platform. Sign up for our newsletter at techsurgepodcast.com for exclusive insights and updates on upcoming TechSurge Live Summits. Links: Read Why Machines Learn, Anil’s latest book on the math behind AI https://www.amazon.com/Why-Machines-Learn-Elegant-Behind/dp/0593185749 Learn more about Anil Ananthaswamy’s work and writing https://anilananthaswamy.com/ Watch Anil Ananthaswamy’s TED Talk on AI and intelligence https://www.ted.com/speakers/anil_ananthaswamy Discover the MIT Knight Science Journalism Fellowship that shaped Anil’s AI research https://ksj.mit.edu/ Understand the Perceptron, the foundation of neural networks https://en.wikipedia.org/wiki/Perceptron Read about the Perceptron Convergence Theorem and its significance https://www.nature.com/articles/323533a0…
Chaos Computer Club - recent audio-only feed
Marcați toate (ne)redate ...
Manage series 1330870
Content provided by CCC media team. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CCC media team or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
2165 episoade
Marcați toate (ne)redate ...
Manage series 1330870
Content provided by CCC media team. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CCC media team or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
2165 episoade
Toate episoadele
×C
Chaos Computer Club - recent audio-only feed


1 Closing & Infrastructure Review (wicmp10) 19:16
19:16
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut19:16
Daten, Fakten, Tschüss sagen. Wichtig: die Veranstaltung endet nicht direkt nach dem Closing; bleibt gerne noch ein paar Stunden. Der Zeitpunkt ist so, dass auch Leute mit weiterer Anreise nichts verpassen. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.zam.haus/wicmp-2025/talk/SUAARY/…
C
Chaos Computer Club - recent audio-only feed


1 TI Nspire Taschenrechner Hacken (wicmp10) 32:12
32:12
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut32:12
Wofür braucht ein Taschenrechner 64MiB Arbeitsspeicher? Natürlich damit man ihn hacken und Linux drauf laufen lassen kann! Texas Instruments brachte 2007 die Nspire Taschenrechner Serie auf den Markt, die bis heute verbreitet in Schulen eingesetzt wird. Nachdem es geschafft wurde, nativen Code auszuführen, entwickelte sich eine Community, die Anwendungen, Spiele und auch Linux auf diese etwas andere HW Plattform portiert hat. In diesem Talk erfahrt ihr unter anderem: - Was gibt es für Taschenrechner? Was können die? - Geschichte von TI Nspire Jailbreaking (Ndless + andere Tools) - Was hat die Community entwickelt? Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.zam.haus/wicmp-2025/talk/GTETRL/…
C
Chaos Computer Club - recent audio-only feed


1 We Could Be Green IT Heroes (wicmp10) 30:59
30:59
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut30:59
Leidenschaftlich gern Software entwickeln und dabei den Planeten retten? Das klingt nach einem Abenteuer! Mit Green IT können Softwareschaffende einen Beitrag dazu leisten, IT-Systeme nachhaltiger zu machen. Dadurch können Ressourcenverschwendung und die weitere Zerstörung der Umwelt verhindert werden. In diesem Vortrag möchte ich euch mit auf die Reise nehmen und Green IT zeigen. In "We Could Be Green IT Heroes" beschreibe ich meinen eigenen Weg zu nachhaltiger Softwareentwicklung. Wie bin ich dazu gekommen, mich mit Green IT auseinanderzusetzen? Welche Herausforderungen kamen dazwischen? Wie können wir gemeinsam für eine grünere IT sorgen? Das sind die Fragen, die in diesem Vortrag beantwortet werden sollen - mit vielen Videospiel-Referenzen! Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.zam.haus/wicmp-2025/talk/NDSUZV/…
C
Chaos Computer Club - recent audio-only feed


1 SELinux für Newbies (wicmp10) 37:06
37:06
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut37:06
Security-hardening von Linuxsystemen mithilfe von SELinux für Anfänger:innen Was soll dieses SELinux sein? Und jetzt soll ich ein System damit administrieren?! Kann ich es nicht einfach ausschalten? Ist es überhaupt an? Was tut es? Dieser Talk zeigt euch anhand der Linuxdistribution openSUSE Tumbleweed die Basics was SELinux ist und wie ihr SELinux benutzt - Was ist Mandatory Access Control? - Was ist SELinux? Was kann es und was nicht? - Wie krieg ich SELinux auf mein System? - Wie administriere ich ein System mit SELinux? Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.zam.haus/wicmp-2025/talk/XG9RF9/…
C
Chaos Computer Club - recent audio-only feed


Ein kleiner Überblick, warum gerade für Software-Tester die Informationssicherheit so interessant sein sollte und welche Testfälle Beispielhaft in welchen Teststufen daraus abgeleitet werden können. In der heutigen Zeit, in der immer mehr Augenmerkt bei der Software-Entwicklung auf den Aspekt der Sicherheit gelegt werden muss, kommt meist das Testen gerade in diesem Bereich zu kurz. Dabei wäre es mit relativ geringen Aufwänden möglich die Sicherheit einer Anwendungen die Getestet wird (AUT) zu erhöhen, indem man Testfälle definiert und durchführt, welche gezielt auf die gängigsten Fehlerarten abzielen. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.zam.haus/wicmp-2025/talk/KVNYFR/…
C
Chaos Computer Club - recent audio-only feed


1 GBA: Tales of Camelot (wicmp10) 37:59
37:59
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut37:59
Camelot Software Planning ist ein japanischer Spieleentwickler, der zu seiner Zeit beeindruckende Spiele für den Nintendo Game Boy Advance (GBA) entwickelt hat. Die Spielereihe Golden Sun, Mario Golf und Mario Tennis überzeugen dabei nicht nur mit ihrem Gameplay, sondern auch mit für ihre Zeit beeindruckender Grafik und Sound. Was ich euch in diesem Vortrag erzählen möchte ist, was diese Spiele technisch so unglaublich interessant macht. Wühlt man in Konfigurationsdateien von alten GBA Emulatoren wie gpSP, findet man zu Golden Sun Kommentare wie "Probably the most horrifically coded GBA game in existence". Setzt man sich selbst als Ziel, einen GBA Emulator zu schreiben, wird man zwangsweise über die Spiele von Camelot stoßen. Entweder, weil die Spiele überhaupt nicht laufen, oder weil man über den ein oder anderen Grafikfehler stößt. Ich selbst hab nie einen Emulator entwickelt. Deshalb möchte nehme ich euch mit auf eine Reise, wie ich ursprünglich auf die Spiele von Camelot aufmerksam geworden bin. Anfangen tue ich ein bisschen mit Sound und was die Audioqualität in Camelotspielen besser macht als in anderen. Danach steigen wir ein bisschen in die Architektur vom GBA ein. Schonmal ein bisschen Assembler gesehen zu haben, ist hier sicher hilfreich. Der GBA verwendet eine 32 Bit ARM7TDMI CPU, welche es vergleichen mit dem Vorgängermodell Game Boy durchaus in sich hat. Danach gehts dann weiter über in die Tricksereien, die sich die Entwickler erlaubt haben. Ohne zu viel vorweg zu nehmen: Es wird um selbstmodifizierenden Code gehen, nur halb definierte CPU Instruktionen und Coding Patterns, bei dem Securityleute Schnappatmung bekommen. Ach auch egal, der GBA hat ja eh kein Betriebsystem, aus dem man ausbrechen könnte :-) Ich werde leider nicht über alle spannenden Dinge dieser Spiele sprechen können, da es davon wirklich einfach zu viele gibt. Was ich jedoch hoffe ist, dass ihr dort einige spannende Dinge lernen könnt. Gut, es werden wahrscheinlich nicht die praktisch Nütztlichsten sein, aber definitiv Lustige! Die Zusammenfassung sollte größtenteils für den Vortrag selbst sprechen. Es wird stilistisch eher ein "fun facts" Talk. Bahnbrechende Entdeckungen gibt es bei einer 25 Jahre alten Konsole dann doch eher selten. Jedoch sind die Spiele von Camelot einzigartig interessant, da sie doch immer wieder zum Gesprächsthema in der GBA Community werden. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.zam.haus/wicmp-2025/talk/UF9T7E/…
C
Chaos Computer Club - recent audio-only feed


1 Cracking Passwords for Fun and Profit (wicmp10) 47:34
47:34
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut47:34
Warum ist es so wichtig gute Passwörter zu haben und was macht diese "Gut" oder "Schlecht"? Wie sehen "Gute" Passwörter aus und was ist zu beachten, wenn man Passwörter generiert? Was passiert eigentlich mit Passwörtern, wenn Sie mal abhanden kommen? Wie kann man seine Passwörter besser machen? Diese und weitere Fragen werden beantwortet und noch ein wenig darüber hinaus... Passwörter einen essentiellen Teil unserer Datensicherheit heut zu Tage da. Von der Festplattenverschlüßelung, bis zum E-Mail Konto, alles benötigt heute ein Passwort. Aber wieso sind einige Passwörter "schlechter" als andere und wie schaffe ich es "bessere" Passwörter zu haben, als Andere? Was passiert mit unseren Passwörtern, nachdem Sie abhanden gekommen sind? Welche Massnahmen kann ich ergreifen, um Menschen das Leben zu erschweren, die meine Passwörter gerne hätten um damit für mich negative Dinge zu tun? Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.zam.haus/wicmp-2025/talk/7BHAEM/…
C
Chaos Computer Club - recent audio-only feed


1 Your Museumsbahn needs you! (wicmp10) 35:44
35:44
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut35:44
Du hast mit herumgespielt und suchst jetzt ein Problem um das mal in Echt auszuprobieren? Du willst nicht immer nur Prototypen basteln sondern auch mal was Produktiv einsetzen? Eventuell hat eine Museumsbahn (oder ein beliebiger anderer Verein) ja ein Problem, das zu deiner Lösung passt... Museumsbahnen (und andere Vereine auch) brauchen Hilfe bei der Digitalisierung, sei es Webseiten, sei es in der Werkstatt, oder im Betrieb. Von Administration bis zum Aufbau eines Funknetzes durch ein ganzes Tal wird Unterstützung gebraucht. Und nebenbei könnt ihr noch mit Zügen spielen. Im Vortrag stelle ich euch kurz die Dampfbahn Fränkische Schweiz in Ebermannstadt vor und gebe einige Beispiele wo wir Digitalisierung brauchen und teilweise schon haben. Offene Themen sind derzeit: Funkverbindung zu unseren Zügen, Fahrgastinformation, Streckenvermessung, Kommunikation im Verein... Kulturelle Unterschiede zwischen Chaos und Museumsbahn gibt es, aber es gibt auch viele Gemeinsamkeiten. Museumsbahnen bieten eine Möglichkeit, Dinge in der Realität auszuprobieren. Und für viele der Museumsbahnen haben die Chaos-Vereine schon Lösungen. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.zam.haus/wicmp-2025/talk/WQLLYD/…
C
Chaos Computer Club - recent audio-only feed


Ein paar wichtige Überlebenshinweise zur WICMP10. Bedienungsanleitung zum Event. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.zam.haus/wicmp-2025/talk/PJU93E/
C
Chaos Computer Club - recent audio-only feed


1 Closing Hackerhotel 2025 (hackerhotel2025) 31:39
31:39
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut31:39
Closing talk of Hackerhotel 2025 with NFIR CTF award ceremony. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/YBZVUM/
C
Chaos Computer Club - recent audio-only feed


1 Basisbeveiliging / Internet Cleanup Foundation - State of the map 2024 (hackerhotel2025) 31:39
31:39
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut31:39
The internet cleanup foundation publishes the baseline security of 150.000 domains of 10.000 important organizations in the Netherlands. This talk shows what we've done in 2024 and highlights some of the nice things to come in 2025 maybe spoiling one or two things :) - It had a ton of impact and large banks, internet providers and all kinds of other institutions cleaned up their baseline security issues. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/MDKVVA/…
C
Chaos Computer Club - recent audio-only feed


1 The "O" in OT (hackerhotel2025) 37:32
37:32
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut37:32
Operational Technology (OT) is vital for industrial processes, yet strategic understanding of OT’s security complexity is often lacking at the executive level. This presentation emphasizes the need for organizations to approach OT as a strategic priority, highlighting its unique challenges—such as legacy systems and non-negotiable uptime—amid rising cyber threats targeting critical infrastructure. By fostering executive insight into OT management, organizations can improve resilience, enhance security, and gain a competitive edge, ultimately positioning OT as an asset in operational stability and corporate strategy. This presentation, titled "The 'O' in OT," explores the importance of executive-level understanding of Operational Technology (OT) within strategic frameworks. It highlights the distinct challenges OT faces compared to IT, including legacy infrastructure, strict uptime requirements, and rising cyber threats. Participants will gain insight into how a strategic focus on OT security and management enhances organizational resilience and competitive strength. By bridging the gap between OT’s operational demands and executive decision-making, this session outlines steps for integrating OT into a cohesive, secure, and future-ready corporate strategy. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/7BDKGK/…
C
Chaos Computer Club - recent audio-only feed


1 Hackerhotel Badge talk (hackerhotel2025) 25:49
25:49
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut25:49
Our workflow, challenges and other fun things From the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yield badges and what it took to deliver these in the hands of the Hacker Hotel people. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/CQRYEL/…
C
Chaos Computer Club - recent audio-only feed


1 How to become your own ISP (hackerhotel2025) 47:51
47:51
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut47:51
This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more. Ever wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're at the right place. This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and what you need to do if you want to participate. You will walk away with practical knowledge on how you can get started. We'll also take a short tour of my own network, how I set it up and what I use it for. Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/V7QUX3/…
C
Chaos Computer Club - recent audio-only feed


1 Helpful hackers preventing evil hackers from crashing the grid (hackerhotel2025) 50:11
50:11
Redare mai Târziu
Redare mai Târziu
Liste
Like
Plăcut50:11
The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy system and do everything we can to prevent it. Various institutions test smart devices, set safety standards, and monitor compliance with these standards. However, parties such as our grid operators only have control over the energy grid equipment up to the front door. They are not allowed to look beyond the electricity meter, where most smart equipment is located. DIVD is allowed to do this and by identifying devices that can form a botnet, DIVD helps to make the smart grid more secure. DIVD has been conducting research into vulnerabilities in equipment of the energy system, such as charging stations, solar panel inverters, home batteries, and (Home) Energy Management Systems. Previous findings have led to several parliamentary questions and follow-up actions by authorities such as RDI, the Dutch Authority on Digital Infrastructure. With the CVD in the Energy Sector project, DIVD will set up a research and education line with the DIVD.academy in collaboration with the energy sector to reduce the digital vulnerability of our energy system. DIVD will also build a hardware lab to test devices and scenarios. You may join too and help to save the grid. In this talk, we will demonstrate how we could have generated outages using zero-days we found in solar converters and electric car chargers. But we also did it with just one user-password combination… The European electricity network has become a ‘smart grid’. Consumers are not only users but also producers of energy. More and more devices are connected, smart and online, so supply and demand can be more easily matched. This offers many opportunities for sustainability and possibilities for new players to enter the market. But also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy system and do everything we can to prevent it. In the Netherlands and Europe, various institutions test smart devices, set safety standards, and monitor compliance with these standards. However, parties such as our grid operators only have control over the energy grid equipment up to the front door. They are not allowed to look beyond the electricity meter, where most smart equipment is located. Being an independent non-profit research institute, DIVD is allowed to do this. By looking for devices that can form a botnet, DIVD helps to make the smart grid more secure. DIVD has been scanning the entire internet for vulnerabilities since 2020 and reporting them to the owners of systems. This may involve known vulnerabilities (Common Vulnerabilities and Exposures), new vulnerabilities (Zero-days), leaked credentials (username-password combinations) and online sources that are unintentionally accessible. DIVD is also a CVE Numbering Authority (CNA) and can publish new vulnerabilities. Our way of working is supported by the parties responsible for digital security in the Netherlands, such as NCTV, NCSC, AIVD, police, and many cyber security companies. In addition to these activities, DIVD also conducts research into vulnerabilities in the equipment of the energy system, such as charging stations, solar panel inverters, home batteries, and (Home) Energy Management Systems. Previous findings have led to several parliamentary questions and follow-up actions by authorities such as RDI, the Dutch Authority on Digital Infrastructure. With the CVD in the Energy Sector project, DIVD will set up a research and education line with the DIVD.academy in collaboration with the energy sector to jointly reduce the digital vulnerability of our energy system. In 2025, we will: - Incorporate all energy-related research by DIVD into a research line under a Research Lead Energy. - Establish structural partnerships with the energy sector to jointly resolve vulnerabilities. - Build our own hardware lab where we will test peripheral equipment for security and collaborate with other hardware labs. - Set up our CNA to receive, process, and publish CVEs of digital solutions used in the energy system. Share research findings with authorities to support their enforcement. DIVD.academy familiarize students with basic knowledge of energy systems and energy equipment and involve them in practice-oriented research. - Develop teaching materials for the installation sector and training courses to increase awareness of vulnerabilities in the energy system. - Share our knowledge via hacker events and security conferences. In this talk, we will demonstrate how we could have generated outages using zero-days we found in solar converters and electric car chargers. But we also did it with just one user-password combination… Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.hackerhotel.nl/2025/talk/TFJCBD/…
Bun venit la Player FM!
Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.