Camp is over. Unfortunately I did not have enough spare time to write a in depth review, but I can say it was a lot of fun and very interesting. I didn’t enjoy the lectures very much, because the acoustic was lousy and the content of the lectures was not as good as I expected. But the concept of villages with people of same interests was very good. That way it was very easy to meet people with the same interests. One very interesting lecture was about the A5 Cracking Project. The projects goal is to implement a practical attack on the A5 cipher used in GSM networks. The cipher has already been broken in 1998 after the specs leaked into public because someone forgot to sign a NDA. But until now there is no public implementation of the attacks. There is a Wiki where the project is coordinated, check it out. That stuff is at the very top of my agenda. hmm, maybe not at the very top, but at the top ;-).
Anyway, due to the great atmosphere at the camp (especially during the night), I enjoyed it very much. Check out the flickr slideshow. I also made some photos, mostly night shots:
Continue reading Camp 2007 Review
This summer I am going to visit the Chaos Communication Camp in Finowfurt near Berlin, Germany (Old Europe). Two years ago i visited a similar camp: What The Hack. I hope the Camp this year will as much fun as WTH, or even more (actually I am pretty sure.). 😉
Besides the many interesting people you can meet there, there are some pretty interesting lectures, too. Just have a look at the Fahrplan.
There will be some WEP-Hacking by Eric, some Fun with NFC Mobile Phones and some other RFID Stuff 1, 2, some oLd 5cHO0l h@cK1n9 and many other interesting things…
I would love to meet some of the visitors and commenter of this blog. As usual there will be a huge phone-network on the campsite, feel free to contact me via eventphone‘s DECT-Network: 4674
Happy hacking out there, see you soon!
Mobile Phone Bluetooth Security Reference in The Simpsons
In Episode 21 in Season 18 (about 15 minutes into the show) Bart asks Lisa if he is on a secure line (24 reference), Lisa answers you are on a Bluetooth cellphone the most vulnerable device known to man.
This is way cool!
Thanks to Erik for pointing it out!
Thanks to Collin for pointing it out! 😉