Rc3 wikipaka ov смотреть последние обновления за сегодня на .
🤍 None You certainly know about Wikipedia, but do you know that the free knowledge base Wikidata is gathering a lot of information in open data, collected and organized by a community of contributors? Let's discover more about Wikidata, how it works, how the data is structured, and how you can contribute! Stream: 🤍 Léa Lacroix Mohammed Sadat Abdulai 🤍
🤍 None Grosse Teile der globalen Web/Cloud/IoT Infrastruktur basieren auf Free/OpenSource Software. Dies macht es möglich -und notwendig-, sich die für die Bedienung dieser Infrastruktur erforderlichen Kenntnisse selber durch Basteln am Computer anzueignen. Stream: 🤍 Folkert 🤍
🤍 Tech unexeptionalism and the monopolization of every goddamned thing They stole our future. Let's take it back. Here at the end of the world, it's time to take stock. Is technology a force for good? Can it be? Was it ever? How did we end up with a world made up of "five websites, each filled with screenshots of text from the other four" (h/t Tom Eastman)? Should we worry that machine learning will take away our free will through A/B splitting and Big Five Personality Types? Where the fuck did all these Nazis come from? doctorow 🤍
🤍 None Der Wechsel vom Präsenzunterricht auf Ortsungebundener Unterricht war für viele Schüler*innen und Lehrer*innen eine ziemliche Umstellung - besonders für mich. Als eine gehörlose Person möchte ich näher bringen, wieso der Onlineunterricht über Video-Calls und die Integration bzw. Inklusion zurzeit nicht kooperieren (können) und selbst als Träger von beidseitigen Cochlear-Implantate seit der Maskenpflicht auf mehr Frustration und Ärger im Alltag mit Kommunikation stoße. Barrierefreiheit beginnt mit einem Gespräch. Und dieses Gespräch will ich mit euch führen. Stream: 🤍 Oliver 'lavolsky' Suchanek 🤍
🤍 Schwer was los in QualityLand, dem besten aller möglichen Länder. Jeder Monat ist der heißeste seit Beginn der Wetteraufzeichnung, ein Billionär möchte Präsident werden, und dann ist da noch die Sache mit dem Dritten Weltkrieg. Peter Arbeitsloser darf derweil endlich als Maschinentherapeut arbeiten und versucht, die Beziehungsprobleme von Haushaltsgeräten zu lösen. Kiki Unbekannt schnüffelt in ihrer eigenen Vergangenheit herum und bekommt Stress mit einem ferngesteuerten Killer. Außerdem benehmen sich alle Drohnen in letzter Zeit ziemlich sonderbar... Marc-Uwe Kling 🤍
🤍 None Sit back, relax, and enjoy a piano concert with some classical music, ragtime, pop, and other things. Stream: 🤍 The programme: - [Scott Joplin, Gladiolus Rag](🤍 - [Frédéric Chopin, Polonaise in g minor](🤍 - [Tom Lehrer, The Elements](🤍 - [Wolfgang Amadeus Mozart, Der Vogelfänger bin ich ja](🤍 - Lucas Werkmeister, jazz improvisation - [Wolfgang Amadeus Mozart, Fantasia in c minor](🤍 - [Scott Joplin, Cleopha](🤍 - [Franz Liszt, Sposalizio](🤍 - [Tom Lehrer, We Will All Go Together When We Go](🤍 - [Sergei Rachmaninoff, Prelude in c♯ minor](🤍 - [Scott Joplin, Maple Leaf Rag](🤍 - [George Gershwin, Rhapsody in Blue](🤍 Lucas Werkmeister 🤍
🤍 None Data journalists work similarly to scientists: they formulate (research) hypotheses, analyze data and sometimes even collect data themselves. For this, open data ressources are crucial. They can can reveal unfamiliar correlations, lead to new questions and stories. Wikidata is the largest linked open data ressource on the internet. But what exactly is stored in it and how can journalists use it for their work? We will have a look at the way Wikidata works and how it can be used a.k.a. queried for stories and research. Stream: 🤍 Elisabeth Giesemann 🤍
🤍 As Bitcoin surpasses previous price records and re-enters mainstream consciousness following several wilderness years, the twelve-year-old cryptocurrency appears to have “arrived” in the eyes of the market. The value proposition of an ungoverned, uncensorable digital means of value transfer is clear for all to see…but can humanity and Earth afford the thermodynamic price tag? To maintain the integrity of the transaction record, the Bitcoin network creates a hard boundary to the outside through exacting validation requirements. However it does not possess any feedback mechanism or capacity to respond to the consequences of the thermoeconomic challenges it issues. This insensitivity of ‘mined’ cryptocurrencies to the energy sources used to secure them has led to criticism as to their inability to mitigate their ecological externalities. Wassim Alsindi 🤍
🤍 Names of people cannot be invalid. People have names. Most people do. People have first names and last names. Many people do. People have any sorts of names that often don’t fit fixed fields in the forms. These names may contain letters, accented letters, and other characters, that may cause problems to your code depending on the encoding you use. They may look differently in uppercase and lowercase, or may not be case foldable at all. Searching and sorting these names may be tricky too. And if you design an application, web form, and/or database dealing with personal names, you’ll have to take that into account. miro 🤍
"Roberto Carlos was nicknamed El Hombre Bala ("The Bullet Man") throughout his career, due to his powerful bending shots and free kicks, which have been measured at over 105 miles per hour (169 km/h)" - Wikipedia
🤍 None The interaction of tech and eco activists gets more important every year we are heading deeper into the climate desaster. The talk explains the basic topics and shows past and current activities regarding our open movement as well as explaining our concrete demands. See 🤍 Stream: 🤍 Rainer Rehak 🤍
🤍 Your princess is AES encrypted in another castle On November 13., Nintendo launched its newest retro console, the Nintendo Game and Watch - but by then it was already hacked! In contrast to the other Nintendo classic consoles (NES & SNES), Nintendo upped their game this time: A locked processor, AES-CTR encrypted flash & co. made it significantly harder to hack it, but in the end it was still hacked - one day before release. This talk walks through the whole process of opening it up, exploiting the firmware up to bringing homebrew to a new console - in a fun, beginner friendly way. The Nintendo Game & Watch was anticipated by a lot of retro-interested folks, and the clear expectation was: We wan't to get more games onto this device! But Nintendo made the life of hackers harder: The CPU is locked, the external flash AES encrypted, and the USB-C connector does not have its data-lines connected. But not so fast! In this talk we learn how to exploit the firmware, get code-execution via a NOP-slide, dump the ROMs & RAMs of the device and achieve what everyone has been asking for: DOOM running on the Nintendo Game & Watch. If you are interested in the full flow from opening up a device, exploiting it, to writing custom drivers for homebrew, this is your talk! And all you need to follow along are a Game & Watch and about $4 of equipment! Thomas Roth 🤍
🤍 "99 second hand smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route to avoid being stuck in traffic." #googlemapshacks The lecture discusses the development of maps and their function within society. It links the genesis of early maps with the current development of urban apps and the success of Google Maps. Thus it questions the practice of mapping and gives an overview over the critical perspectives of today’s mapping. How the impact of digitalization shapes urban transformation is highly contested. A frequent concern voiced by critics is the reliance of so-called smart cities on ›big data‹, collected, monitored, and geo-localized by a ›cocoon of ubiquitous computing‹ (Halpern). While collectable and marketable data is prioritized, the actual realities of urban populations are being ignored and compromised. Commercialized smart city approaches foster the fragmentation of urban fabrics instead of ›bringing the world closer together‹ (Zuckerberg). ›Spatial software‹ (Keller Easterling) are actively shaping urban transformation processes but also functioning as new gateways for private corporations to dominate cities. The focus of this lecture is on the role of urban actors as producer, consumer, prosumer and hacker in our emerging ›surveillance capitalism‹ (Zuboff). Simon Weckert & Moritz Ahlert want to reflect the means, the significance, and the potentials of ›civic hackers‹ (Townsend) operating today’s and tomorrow’s smart cities dominated by the logic of ›platform urbanism‹ (Barns). The starting point of this endeavor is Simon Weckert’s performance "Google Maps Hacks" In February 2020 Weckert, a Berlin-based artist, got global news coverage for the video of his performance in Berlin, it went viral (over 3 Mio. clicks on Youtube). To contextualize his performance, he referenced an essay written by Moritz Ahlert, who recently finished his PhD about ›Google Maps-Urbanism‹. For this lecture the speakers would like to investigate the role of hacking the digital urban infrastructure from their complementary artistic and scientific perspectives, using their work as a basis and including contemporary works of other artists, researcher and activists. Simon Weckert Moritz Ahlert 🤍
🤍 None For the fourth time, we'll present a colorful potpourri of nerdsniping topics: some of our favorite facts about computers, art, and the world! We draw a lot of inspiration from new and absurd ideas, and we'd like to share that enthusiasm with you! You can find recordings of the previous iterations here: [Vol. 1](🤍 [Vol. 2](🤍 [Vol. 3](🤍 (all in German – this talk will be in English!) Stream: 🤍 blinry bleeptrack 🤍
🤍 Pentagame ist ein Brettspiel ohne Zufall, das auf dem letzten Kongress viel gespielt wurde - und es ist ungelöst. Wir sprechen über die mathematischen Herausforderungen und darüber, wie weit wir mit einer Online-Implementation sind - um es vielleicht einmal per KI zu lösen. Interessant für alle... Nerds. Aus der c-base Einfache Regeln erzeugen immer wieder andere und spannende Spielverläufe. Obwohl es so einfach aussieht und auch schnell erlernt ist, ist es bislang noch nicht gelöst. Wir werden zwar immer besser, aber niemand kennt eine perfekte Strategie. Auch ist es gar nicht so einfach, es digital zu implementieren. Das liegt zum einen an der pentagonalen Struktur des Spielbretts, das es nicht ganz einfach macht, Züge zu beschreiben. Inzwischen wissen wir, wie wir die Felder (und Züge) bennenen und auch, wie eine Feldbezeichnung sich in Koordinaten übersetzt. Aktuell arbeiten wir daran, den Pentagame-Spielern endlich zu ermöglichen, online gegeneinander zu spielen, und Spiele aufzuzeichnen. Dann kann es gelingen, eine KI zu entwickeln und weitere Erkenntnisse über dieses Spiel zu erhalten. Vielleicht ist Pentagame ein antikes Brettspiel, durch re-engineering wieder entdeckt. Jedenfalls aber ist Pentagame ein interessantes mathematisches Objekt - und sowieso ein herrlicher Zeitvertreib. Wir erzählen etwas über die mathematischen Eigenschaften und stellen vor, wie weit wir mit der Entwicklung sind. Live aus der c-base. Penta 🤍
🤍 Was ist eigentlich der Reiz sich mit alten Computern oder Technik im allgemeinen zu befassen? Es gibt viele Gründe sich mit alter Technologie zu befassen. Sehr begrenzte Resourcen führten dazu, dass Probleme mit cleveren Lösungen angegangen wurden. Viele Ideen sind vergessen, Technologien waren am Ende Sackgassen, andere haben sich durchgesetzt, nicht immer das Beste. Es gibt aber auch nostalgische Gründe, zum Beispiel um die Spiele seiner Jugend zu spielen, aber auch im auf alte Daten zuzugreifen. Das führt dazu, dass es auch jede Menge neue Entwicklungen gibt um diese alten Geräte weiterbetreiben zu können oder im Zusammenspiel mit moderner Technik funktionieren. LittleAlex 🤍
🤍 Resists for Electron Beam Lithography (EBL) Photoresists are one of the essential ingredients for chip manufacturing and micro/nano engineering. We will show how we’re using them in a DIY Electron Beam Lithography set-up and how you’re able to cook your own cheap resists and mix your own developers. Resists? What's that? What are their applications How does it work (types (positive/negative), chemistry, proximity effect, dosage etc) EBL? What's that? How does it work Pros & cons: comparison between EBL (slow) photolithography (fast) Which resist can I use for EBL DIY cooking of PMMA based resists Comparison of different solvents Composition of different developers Comparison of different developers Applications Usage as a mask Usage as a structural dielectric material ...(?) The EBL exposure process simple SEM retrofitted with an EBL controller The common file formats (GDSII & OASIS) Scan-Gen: how to generate the proper curves for the exposure Hardware: off-the-shelf embedded modules like the RedPitaya Generation of different filling curve styles, calibration, compensation of the proximity effect, correction of the SEMs intrinsic parameters, dosage! Fiducial detection and alignment for multi-pass/multi-layer processes Stuff comes together walk through the complete process along a simple example More Examples Thanks & Credits Q & A N00DL3 🤍
🤍 None FragDenStaat steckt voller wertvoller Daten, doch sie werden momentan noch kaum von Hacker:innen in spannenden Projekten verwendet. Welche Daten gibt es und was könnte man mit ihnen machen? Dieser Talk soll einen Überblick darüber geben. Max 🤍
🤍 None *Pssst.* Wer sagt's ihnen? Wer sagt den Menschen in der Verwaltung, in der Politik und überall, wie offene und vernetzte Daten unserer Gesellschaft helfen können? Wir! In der ersten Late-Night-Show für offene Daten und freie Software – "THE OPEN SHOW"! Wir (also viele Menschen aus der Open-Knowledge- und Chaos-Bubble) haben die ersten Videos in deutsch und englisch produziert und möchten sie euch jetzt zeigen. Im Anschluss beantworten wir eure Fragen, plaudern aus dem Nähkästchen und freuen uns über Tipps. Denn wir wollen weitermachen und freuen uns über Ideen und Mitmacher*innen. Stream: 🤍 jakob pajowu joliyea jnnk 🤍
🤍 None After the introduction info Flutter, we will have a closer look on some advanced features of the cross-platform software development kit Flutter. In this talk, we will focus on animations, state management as well as localization, native platform interfaces and the underlying Flutter engine. Note: You should have basic knowledge of Flutter. Please refer to media.ccc.de for an introduction into Flutter. Stream: 🤍 The one with the braid | Dфҿ mit dem Zopf 🤍
🤍 What kind of cyber-physical infrastructure can insure that producing for human need can stay within planetary boundaries? This is based on the recent P2P Foundation report, 'P2P Accounting for Planetary Survival', which you can find here: 🤍 Kate Raworth's Doughnut Economy proposes an economy that can navigate below an ecological roof, that preserves planetary boundaries, and a social basement, which insures the basic needs of humanity. In our study we looked at three inter-related emergences of shared accounting and distributed ledgers (contributory, flow, and thermodynamic), and the possibility of a 3-layered cyber-physical infrastructure that combines the best of the commons (open stigmergic collaboration), of generative markets (that integrate externalities) and orchestrated planning limits to protect resource constraints. Michel Bauwens 🤍
🤍 Sonar – Safer nightlife Berlin steht für safer use und safer spaces im nightlife. Was muss ich wissen, wenn ich im nightlife Drogen nehme - wie mach ich's so richtig? Ein kurzer Input verschafft euch einen Überblick - welche Nightlife Projekte gibt es und um welche Inhalte geht es dabei? Wo können sich User*innen und Clubbetreibende/ Kulturschaffende informieren? Was sind die wichtigsten Basics. Im Anschluss wird es auch Zeit für Fragen geben. Andrea Piest 🤍
🤍 How to Identify Police Surveillance at Protests and Large Gatherings The Electronic Frontier Foundation’s Kurt Opsahl with show you how to identify surveillance technologies that law enforcement may use at protests and other public gathering to spying on people exercising their fundamental rights. Learn how to spot the surveillance so you can advocate effectively for the policies necessary to protect your rights and bring transparency to the police surveillance. If you attend a protest, demonstration or any mass gathering in a public space, the police are probably surveilling you. Whether it’s sophisticated facial recognition, ubiquitous video recording, or the instant analysis of our biometric data, law enforcement agencies are following closely behind their counterparts in the military and intelligence services in acquiring privacy-invasive technologies, from automated license plate readers to body-worn cameras to drones and more. In this talk, Kurt Opsahl with show you how to identify surveillance technologies in use: • Where to look for these devices • How these technologies look • How these technologies function • How they are used by police • What kind of data they collect • Where to learn more about them Knowledge is power. Knowing what technologies are in use can help you understand the threats to your privacy and security, as well as tools to advocate for limits on police use of surveillance that may chill people’s rights to express themselves on public issues. Just as analog surveillance historically has been used as a tool for oppression, policymakers and the public must understand the threat posed by emerging technologies to successfully defend human rights in the digital age. Kurt Opsahl 🤍
🤍 Surprise from The one and only Yes Men Yes Men 🤍
🤍 This conference is run by teams of volunteers. In this event, they will provide some insight into the challenges they faced while building the infrastructure, networks, running video streams, or organizing the world map. ysf 🤍
🤍 None Jugend hackt 2020 war ganz anders als gedacht, wie überraschend. Doch so sehr die netzaffinen Bubbles die weniger digital-Affinen zur Digitialisierung gedrängt haben, wurde dieses Jahr deutlich, dass auch bei uns noch vieles möglich war, das wir bislang nicht ausgeschöpft haben. So gab es dieses Jahr die ersten remote-Hackathons, durch die vielen Videokonferenzen viel stärkere Einbindung von Jugendlichen in unsere Orga, regelmässige Twitch-Livestreaming-Angebote uvm. Nina und Daniel plaudern aus dem Nähkästchen und stehen danach für ein Q&A bereit. Stream: 🤍 Nina Daniel 🤍
🤍 This talk provides a practical guide for how to solve interpersonal conflict in communities with a loose structure such as do-ocracy or anarchy. We explain how Hackerspace.Gent uses the "private talk" pattern to solve conflict between members. We share our experience in the hope that this can help you fix issues in your community so it can go back to doing awesome stuff! Interpersonal conflict is a common but dangerous issue in communities. It's not always easy to deal with it, especially when a community is loosely structured without formal authority. Communities built on do-ocracy or anarchy can be awesome breeding grounds for creative work and powerful ideas, but they are very vulnerable to drama. Seven years ago, we experienced this first-hand at Hackerspace.Gent when our community fell apart because of conflict. At our lowest point, we decided to "hack the hackerspace" to find systems and techniques to build a better community. Over the years, one of the most useful tools for keeping our community healthy turned out to be the "private talk pattern", a method for solving conflict between two people. This tool doesn't require clear authority or policing, which makes it perfect for less-structured organizations such as do-ocracies and cooperatives. With this talk, we share our experience with the hope of giving you more tools to make your community great. Merlijn Sebrechts 🤍
🤍 A safe platform to study and research automotive systems Studying automotive systems is often expensive and inconvenient, which prevents many people from getting started. To make research and education in automotive systems more accessible, we developed RAMN, an inexpensive open-source testbed that simulates a CAN/CAN-FD network of four Electronic Control Units. In our presentation, we introduce the testbed and demonstrate its use by experimenting with a simple Cruise Control algorithm in C, starting from establishing differential equations all the way to testing it in a driving simulator - all that using only open-source tools. We then use the result as a reference to explain what, concretely, would have been different on actual ECU hardware and software, and why that matters for security. 1) Introduction and motivations (~10 minutes) We briefly introduce the basics of automotive systems (ECU networks, CAN/CAN-FD), the importance of education and research in automotive security, and our motivations for designing a new testbed. 2) RAMN Introduction (~20 minutes) In this section, we introduce our new platform. RAMN is an inexpensive CAN/CAN-FD network of four Electronic Control Units (ECU) that can be programmed to simulate an active automotive network in closed-loop with the open-source autonomous driving simulator CARLA. It has the size of a credit card, is powered over USB, and can be recognized as a standard USB-to-CAN adapter. It is contained within one PCB, using only two layers and hand-solderable components. We show several demonstrations, then give details about the hardware (made with KiCAD) and the software (based on STM32 HAL and freeRTOS). 3) Experiments (~10 minutes) We use Cruise Control as an example algorithm to experiment with, using RAMN and other open-source tools. We analyze the problem, evaluate differential equations using Scilab, establish different control strategies, implement them in C in one of the ECUs and verify the results by connecting RAMN to the driving simulator CARLA, while making measurements on the CAN bus using BUSMASTER. 4) Automotive Grade (~10 minutes) We use the results of the previous section as a reference to explain what, concretely, would have been different with real ECU hardware and software. We discuss what drives the design of automotive systems, introducing important standards such as ISO26262 and MISRA-C. We explain what alternatives are available to researchers when technologies are hidden behind NDAs or prohibitive costs - and how RAMN makes use of them. 5) Automotive Security (~10 minutes) We use the content of the sections above to discuss automotive security, using RAMN to show demonstrations of potential activities. Camille Gay 🤍
Recording of a workshop / presentation I held at rC3 (🤍 The chat I’m occasionally referring to was live with the conference participants. Apologies for the dodgy framerate, my laptop tried its best. The “public domain in the US” query towards the end of the session turned out to be hilariously misguided, seeing as in the US the public domain date is (currently) generally determined by the publication date of a work, not by the date of death of its author, apparently. Ah well.
🤍 Eine kurze Geschichte von Q als Mindfuck-Spiel Dieser Vortrag beschreibt die Entwicklung von QAnon als Spiel mit Realität und überlegt, weshalb dieser Verschwörungsmythos sich derart schnell verbreiten konnte. "Alternate Reality Games" sind eine relativ junge interaktive Erzählform, die einige interessante Eigenschaften hat. ARGs sind medienübergreifend, fesseln ihre Spielenden durch gemeinsames Recherchieren und Austauschen und benutzen dabei die je individuellen Leben der Spieler:innen als eigentliche Spielplattform. So können sie in kurzer Zeit sehr aktive und mitunter erstaunlich dauerhafte Gemeinschaften organisieren. Seit der Verbreitung von QAnon-Mythos und -Marke haben wiederholt Beobachter:innen darauf hingewiesen, dass es sich hierbei um eine Weiterentwicklung des Spielprinzips "Larping" zu einer Form handelt, die Parallelen zu Alternate Reality Games aufweist. Wenn auch natürlich nicht in Gänze erklären, so kann diese Perspektive doch dabei helfen, die spezielle Attraktivität von QAnon besser zu verstehen. Im Vortrag versuche ich Qeschichte, Hinterqründe und einige Sqielaspekte zusammenzufassen und mit eindeutig zu vielen Screenshots zu illustrieren. Dabei wird es vor allem um die Entwicklung im Kontext der US-Politik gehen. Arne Vogelgesang 🤍
🤍 “Gute Polizeiarbeit braucht gute IT.” Mit diesem Tweet warb der Twitter-Account der Polizei Thüringen kürzlich um Mitarbeiter:innen für deren interne IT. Daraufhin bot Andreas Ufert “schonungslos ehrliche, aber auch faire Informationen aus erster Hand” an. Dies weckte natürlich unser Interesse und so luden wir Andreas in unsere Sendung ein. 🤍 “Gute Polizeiarbeit braucht gute IT.” Mit diesem Tweet warb der Twitter-Account der Polizei Thüringen kürzlich um Mitarbeiter:innen für deren interne IT. Daraufhin bot Andreas Ufert “schonungslos ehrliche, aber auch faire Informationen aus erster Hand” an. Dies weckte natürlich unser Interesse und so luden wir Andreas in unsere Sendung ein. Andreas arbeitete zwischen 2002 und 2013 beim Thüringer Landeskriminalamt (TLKA). Dort betreute er HP-UX- und Linux-basierte Systeme sowie Oracle-Datenbanken. Auf den Systemen lief das polizeiliche Informationssystem INPOL-neu bzw. INPOL-Land. Damals betreute das TLKA aus Sicht der IT den gesamten Freistaat Thüringen. INPOL-neu speichert Daten über Straftaten und Personen. Das System kann dann gefragt werden, wer gesucht wird, ob Haftbefehle bestehen usw. Andreas erzählt uns etwas über den technischen Aufbau der Systeme, über die Strukturen und den Aufbau des INPOL-Systems. Daneben erfahrt ihr auch, was ihm bei der Arbeit gefiel und warum er jetzt etwas anderes macht. Sendezone 🤍
🤍 None Seit 2019 gibt es neben den Jugend hackt Events in zahlreichen Städten auch 2 Jugend hackt Labs - hier können junge Menschen regelmäßig tüfteln und coden. In diesem anstrengenden Jahr 2020 haben wir keine Mühen gescheut und dennoch einige weitere Labs eröffnet. Wir sprechen mit Jasper aus Heidelberg und Lisa aus Heilbronn, warum sie unbedingt ein Jugend hackt Lab gründen wollten und wie es mit den Labs 2021 weitergeht. Im Anschluss gehen wir noch in eine Fragerunde und Ihr könnt uns noch mit Fragen zu den Jugend hackt Labs löchern. Stream: 🤍 Mechthild Jasper Lisa 🤍
🤍 None With the german broadcasters, it's been hard to push the first one to trying out creative commons licencing. Bc the others didn't. German public broadcasters don't like to take a risk. Once ZDF showed it's possible, others followed. This made me think. Why shouldn't public broadcasters from all over the world follow that example? As a movement that supports free knowledge, we urge educational content being provided by public broadcasters should be 1. freely licensed, wherever possible, 2. paid fairly, 3. accessible everywhere (and not subject to geoblocking), 4. accessible anytime (without an expiry date for informational and educational content) more on this: 🤍 Stream: 🤍 Bernd Fiedler (WMDE) 🤍
this is probably the best free kick goal ever! - if you want to see more of these videos, subscribe! -
🤍 Post-quantum crypto is being rolled out to secure you from quantum computers! Unfortunately, few people know how post-quantum works. Let's change that! In this zero-to-hero talk we'll dive into the inner workings of Kyber, a prominent member of the post-quantum family. Post-Quantum Crypto is the art of inventing asymmetric cryptography that can withstand large quantum computers. This relatively young subject becomes more and more relevant as [Shor’s algorithm](🤍 would break all of today’s asymmetric cryptography once a large enough quantum computer can be build. Therefore RSA, Elliptic Curve Crypto, Diffie-Hellman, DSA and friends could soon be obsolete. Kyber (formerly known as New Hope) is among the first post-quantum schemes to be standardized and already found its way into products. As a lattice-based system, Kyber is fast and its security guarantees are linked to an NP-hard problem. Also, it has all the nice mathematical ingredients to confuse the hell out of you: vectors of odd-looking polynomials, algebraic rings, error terms and a security reduction to “module lattices”. This talk will introduce you to the world of post-quantum cryptography by giving a hands-on tutorial on how its most prominent member - Kyber - works. We'll start with high school level mathematics and work our way up to constructing Kyber. By constructing such a toy-sized Kyber, we can learn how the system works, comprehend its design decisions and see how it is related to an NP-hard problem. After that we’ll take a brief look into how PQC will change real world cryptography in the near future. Ruben Gonzalez Krijn Reijnders 🤍 #rc3-2021-import #AufindieZukunft! Title track: "Drone" by "A Ninja Blob Drew Me" (CC BY-NC 3.0)
Republic RC-3 SeaBee 🤍 Full Playlist: 🤍 IAF Israeli Air Force Museum 🤍 Used in the movie of James Bond 007 - Roger Moore .The Man with the Golden Gun (1974) In the movie the left wing Floating unit is missing. 🤍 🤍 Close look at a restored 1947 Republic RC-3 Seabee Winner of " 2011 Oshkosh Grand Champion " TilTul 🤍 LinksYouWantToRemember CIMG2911 Republic RC-3 SeaBee.MOV
🤍 Do you see us? 2020 was and still is an eventful year - pandemic, protests, orange men, you name it. This talk is a comprehensive overview about yet another tumult: the protests that occured in Bulgaria in 2020, months of demonstrations against an European Union member state government that were largely unacknowledged in the rest of the EU - from the perspective of an expat and an involved small scale activist on the fringe. The goal is to convey to some extent my experience and acquired updated knowledge I made while trying to figure out what exactly was going on as the protests erupted in my home country, who were the actors, what do they want, what interests do they represent and what is the current state. This will include a brief historical background, introduction to the main political and criminal actors, societal factors, the story of how a national flag on a beach in Rossenez started it all, how the protests developed, how the national & international press reacted and finally the EU's position or the lack of such. To top it off we will see/hear some first hand impressions of a protester on the ground. In slightly more detail, the talk will consist of: 1. A brief introduction: - a brief historical perspective and context up to 2020, - the ups & downs that formed the poorest country in the EU, - its evergoing struggle with corruption and crime deeply interwined in the state itself. 2. An outline of the current landscape as shown with - some statistics backed up by official data, - current state of education, health, economics sectors - the current ruling party GERB and Bulgarian sun king Boyko Borrissov - other present and past key political players. 3. A summary and a timeline of the protests, - why and how they began - an overview of the highlights, such as police brutality, press (non)freedom, state suppression etc., - why are the people protesting, - what protesting fractions were there, (by no means the full picture) and what they seek 4. Appearances of and reactions to the protests, - digital means of these protests (Facebook, Twitter) - some problems with the protests (racism, sexism), - a brief live impression from an on-the-ground protester. 5. Role of the EU, its institutions and MEPs, its silence/involvement, - EPP, its chairman & MEPs shielding the corruption - EU politicians showing solidarity and drawing attention to the problem, - the current outcome. m 🤍
🤍 A DIY particle physics detector in a tin box. This talk gives a brief introduction to natural radioactivity and shows how a detector can be built from simple photodiodes. The electronics are easy to solder for beginners and provide a hands-on opportunity for entering the exciting world of modern particle physics with a practical DIY and citizen science approach. Natural radioactivity surrounds us everywhere and is composed of different kinds of ionising radiation or subatomic particles. This talk presents a DIY particle detector based on low-cost silicon photodiodes and its relations to modern detectors like the ones developed at CERN. The project is open hardware, easy to solder for beginners, and intended for citizen science & educational purposes. In contrast to simpler Geiger-Müller counters, this detector measures the energy of impinging particles and can distinguish in particular between alpha particles and electrons from beta decays. A cheap USB sound card or smartphone headset connection can be employed for recording the signals. Corresponding data analysis scripts written in python and related tools from particle physics research will be briefly discussed. An introduction about terrestrial and cosmic sources of radioactivity will be given together with details on the interaction of ionising radiation in silicon. I will conclude with a discussion of interesting every-day objects that are worthwhile targets for investigation and show example measurements of characteristic alpha particle energy spectra - without using expensive vacuum equipment. Oliver Keller 🤍