BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//BornHack Website iCal Generator//bornhack.dk//
NAME:BornHack 2019
X-WR-CALNAME:BornHack 2019
BEGIN:VEVENT
SUMMARY:Hello World!
DTSTART:20190808T190000Z
DTEND:20190808T200000Z
DTSTAMP:20260407T083857Z
UID:15652908-0019-232e-288f-333d8c642ada
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/hello-world/\n\
 nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nThe BornHack 2019
  team would like to welcome you to this years BornHack event at our new ve
 nue. We will walk over changes to the venue\, schedule\, and other informa
 tion about the event itself.\n\nThis is also an excellent opportunity to m
 eet the teams behind BornHack.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:This year's electronic badge
DTSTART:20190809T090000Z
DTEND:20190809T100000Z
DTSTAMP:20260407T083857Z
UID:15653412-0019-2562-4a1c-746076341158
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/this-years-elec
 tronic-badge/\n\nSpeaker(s): Thomas Flummer\n\nRecorded: Yes\n\nStreamed: 
 Yes\n\nOn this talk\, we will take a look at this years electronic badge\,
  look into the features on it and a bit about how to start hacking and mak
 ing the badge your own.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Massage
DTSTART:20190809T090000Z
DTEND:20190809T143000Z
DTSTAMP:20260407T083857Z
UID:15653412-0024-3071-5f21-dbbf07b48348
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/massage/\n\nSpe
 aker(s): Graffen\n\nRecorded: No\n\nStreamed: No\n\nA local masseuse will 
 stop by Friday and Monday during BornHack to massage our aching bodies and
  make sure we're in tip top shape for hacking. The massage is a so-called 
 sports massage that is meant to stimulate your muscles and helps to increa
 se blood flow and release tension.\n\nA massage session lasts 30 minutes. 
 You can reserve a spot by adding your name to one of the pads below.\n\nSi
 gnup for Friday: https://pad.graffen.io/KRR_5OAyR_OjQQxVvbN6Yg?edit  \nSig
 nup for Monday: https://pad.graffen.io/wxUdk2pgTRmb2hGcV_2lMw?edit\n\nThe 
 massage will take place in the main building (where the workshop rooms are
 ). Please wait outside until you are called in.\n\n** Note! ** There is a 
 cover charge of 150kr/150Hax that must be paid to Graffen when you sign up
 ! If you cannot find him please find one of the other organisers and get t
 hem to locate him
LOCATION:Workshop room 3
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20190809T100000Z
DTEND:20190809T110000Z
DTSTAMP:20260407T083857Z
UID:15653448-0019-233c-172e-850d7dc48e7a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/lunch-break/\n\
 nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break. Rememb
 er to drink water.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:UCL fablab roadtrip!
DTSTART:20190809T100000Z
DTEND:20190809T130000Z
DTSTAMP:20260407T083857Z
UID:15653448-0023-2720-22f4-1ba3e94483a8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/ucl-fablab-road
 trip/\n\nSpeaker(s): Morten Nielsen\n\nRecorded: No\n\nStreamed: No\n\nAt 
 UCL in Odense we have a fablab with lasercutters\, 3D printers\, sticker m
 achine and so on.\n\nWe will go there\, get introduced to it\, and use it 
 for cool hacker stuff :-)\n\nI have arranged for the Fablab people to be t
 here to help us if needed. \n\nThe will be a limit of 10 places on this wo
 rkshop - and we will need means of transportation to get to Odense. Go [he
 re](https://pad.tyk.nu/p/bh19-fablab) to sign up.\n\nSee [their home page]
 (https://www.eal.dk/projekter/fablab) for more deatils.
LOCATION:Outside
END:VEVENT
BEGIN:VEVENT
SUMMARY:Testing for website accessibility issues
DTSTART:20190809T110000Z
DTEND:20190809T120000Z
DTSTAMP:20260407T083857Z
UID:15653484-0019-298d-843b-e17b1ff4df08
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/testing-for-web
 site-accessibility-issues/\n\nSpeaker(s): Kasper Kronborg Isager\, Victor 
 Alexandru Truica\n\nRecorded: Yes\n\nStreamed: Yes\n\nThe community of web
 site users with disabilities or impairments is as wide-ranging and diverse
  as any other.  In an ideal world\, every site would adapt to the needs of
  every potential user. Unfortunately\, website accessibility doesn’t alw
 ays come cheaply. Services like Siteimprove Accessibility run automated sc
 ans that pinpoint accessibility issues across a website. We also developed
  an open source  accessibility conformance testing engine  https://github.
 com/Siteimprove/alfa to do better scans. \nThis talk will focus on what is
  technically relevant to make a website accessible and how does Siteimprov
 e checks for accessibility issues. \n\nYou can read more about Website Acc
 essibility on https://siteimprove.com/en/accessibility/website-accessibili
 ty/
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Machine Learning Crash Course
DTSTART:20190809T120000Z
DTEND:20190809T130000Z
DTSTAMP:20260407T083857Z
UID:15653520-0019-244e-b20c-5ba68fb4cfcb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/machine-learnin
 g-crash-course/\n\nSpeaker(s): Mateusz Jurewicz\n\nRecorded: Yes\n\nStream
 ed: Yes\n\nGoal of this presentation:\n1. To introduce people without a ma
 chine learning (ML) background to the basic concepts of modern ML. \n2. To
  give you an overview of what's currently happening in the field (bird's e
 ye overview).\n3. To provide specific resources for each branch of ML\, wh
 ich you will be able to further investigate if interested. (entry-points)\
 n4. To demonstrate a real-life example of applied ML.\n5. Possibly to disc
 uss long-term perspectives on ML and Artificial Intelligence.\n\nNo specif
 ic prior experience is required\, some familiarity with linear algebra mig
 ht be helpful\, but the intention is for this talk to not exclude non-tech
 nical audience members.\nThe content of the talk is subject to changes clo
 ser to the delivery date.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Differential Privacy - An Introduction and an Application
DTSTART:20190809T130000Z
DTEND:20190809T140000Z
DTSTAMP:20260407T083857Z
UID:15653556-0019-2478-1aff-c75c5e948abb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/differential-pr
 ivacy-an-introduction-and-an-application/\n\nSpeaker(s): Teresa Steiner\n\
 nRecorded: Yes\n\nStreamed: Yes\n\nDifferential privacy aims at solving th
 e problem of data anonymization in data analysis\, specifically for applic
 ations where the background information of an adversary is difficult to es
 timate. This is often done by adding randomness to the algorithms\, which 
 obscures part of the information. The goal is to guarantee that anyone hav
 ing access to the output cannot with certainty recover individual pieces o
 f information\, even if they have additional knowledge about the data set.
  This usually leads to a trade-off between accuracy and privacy. \n\nThe a
 im of this talk is to: \n\n- Give a motivation and introduction to differe
 ntial privacy\;\n- Give a few examples of statistical and machine learning
  applications that work well with differential privacy\;\n- Explain the di
 fficulties of applying differentially private methods to queries based on 
 graph structures (like social networks)\;\n- Introduce my research on maki
 ng online dating recommendation systems differentially private.\n\nThe tal
 k is aimed at a broad audience. However\, some math is unavoidable.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:SIA Open? - Workshop #1: Client OS
DTSTART:20190809T140000Z
DTEND:20190809T160000Z
DTSTAMP:20260407T083857Z
UID:15653592-0018-2790-3797-a94452e44108
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/sia-open-worksh
 op-1-client-os/\n\nSpeaker(s): Michael Ørnø\, Tobias Fonsmark\n\nRecorde
 d: No\n\nStreamed: No\n\nThe Agency for Governmental IT-Services - Statens
  It are together with other government bodies exploring the feasibility of
  building an open-source PC workplace platform.\n\nThe platform will be ca
 lled SIA 1 Open\, and are intended for non-office workers in Government in
 stitutions such as museums or environmental agencies. SIA Open targets use
 rs whose primary work do not include using it-systems. The cost of commerc
 ial software prohibits in many cases delivery of our basic it-service to t
 his type of employees.\n\nThe platform should provide the user with a brow
 ser\, mail\, calendar\, word processing\, spreadsheet\, vpn and a file-ser
 vice.\n\nA back-end environment\, which manages software updates and users
 \, should manage the endpoints. The back-end should as well host a mail an
 d file service.\n\nThe back-end should utilize the Agency’s OpenStack cl
 oud service.\n\nAt Bornhack we host four workshops\, where all interested 
 are invited to participate in a discussion on how to design the SIA Open p
 latform. Which software products should\nwe choose? How should we implemen
 t? Administration and automation on the platform? What are the issues to c
 onsider? Etc.\n\nWorkshop #1: Client OS\n\nClient OS? GUI? Delivery model\
 , maintenance and management? HW requirements? Network and security setup?
  Vpn?
LOCATION:Workshop Room 1
END:VEVENT
BEGIN:VEVENT
SUMMARY:A Journey to GraphQL
DTSTART:20190809T150000Z
DTEND:20190809T160000Z
DTSTAMP:20260407T083857Z
UID:15653628-0019-2842-eb88-4a8ed874613a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/a-journey-to-gr
 aphql/\n\nSpeaker(s): Jimmi Kristensen\n\nRecorded: Yes\n\nStreamed: Yes\n
 \nTV 2 is a commercial broadcasting station based in Denmark. Beside tradi
 tional broadcasting TV we also run a video streaming service called TV 2 P
 LAY which serves both video on-demand and TV 2s own live channels.\n\nBase
 d on TV 2 PLAY I will be talking about our journey from REST based APIs to
  a GraphQL API\, our motivation for doing so\, and what we have learned.\n
 \nIn the talk I will:\n\n- briefly talk about the history of TV 2 PLAY for
 m monolith to microservices and our motivation for making that decision.\n
 - describe the issues we were facing with a REST API and why it wasn’t a
  good fit for us. introduce some context by showing how the current archit
 ecture of TV 2 PLAY looks today.\n- talk about why we chose to change to a
  GraphQL API\, what problems it solves for us and some of the problems we 
 have run into.\n- briefly touch on the anatomy of GraphQL vs. REST.\n- dem
 o a simple GraphQL application with downstream services and how to query t
 he API.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Network scanning
DTSTART:20190809T150000Z
DTEND:20190809T170000Z
DTSTAMP:20260407T083857Z
UID:15653628-0022-2710-5d2d-6d530364d6c8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/network-scannin
 g/\n\nSpeaker(s): Morten Nielsen\n\nRecorded: No\n\nStreamed: No\n\nIn thi
 s workshop we will o though the basics of looking at domains\, ip adresses
  and services.\n\nWe will be looking at whois databases\, shodanhq and scr
 atch the surface of the tools in Kali linux.\n\nslides are available [here
 ](https://hackmd.io/@moozer/Ska79BS04#/). Note that slides are reused from
  a previous event\, so some of the info is off compared to workshop.
LOCATION:Workshop Room 2
END:VEVENT
BEGIN:VEVENT
SUMMARY:We're in it for the long-haul – reflections on European internet
  policies in 2019
DTSTART:20190809T180000Z
DTEND:20190809T190000Z
DTSTAMP:20260407T083857Z
UID:15653736-0019-296f-0bd5-cae97224d59b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/were-in-it-for-
 the-long-haul-reflections-on-european-internet-policies-in-2019/\n\nSpeake
 r(s): Amelia Andersdotter\n\nRecorded: Yes\n\nStreamed: Yes\n\nTBD
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Qubes User Meetup\, meet\, greet\, workshop\, tips and tricks
DTSTART:20190809T190000Z
DTEND:20190809T200000Z
DTSTAMP:20260407T083857Z
UID:15653772-0020-283c-1863-64ff4244069b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/qubes-user-meet
 up-meet-greet-workshop-tips-and-tricks/\n\nSpeaker(s): Kramse\n\nRecorded:
  No\n\nStreamed: No\n\nWe will meetup\, talk about Qubes OS https://www.qu
 bes-os.org/\n\nWe are a group which have moved to using Qubes OS as our pr
 imary or private laptops\, and we have some experiences to share. Maybe we
  will even have a presentation. If you would like to present contact hlk@k
 ramse.org\n\nThis is not an installfest\, but what comes after\, like: How
  to change Disposable VM settings\, how to add another template for Kali L
 inux etc.\n\nWe will do an informal meetup\, may break out into groups\, o
 r just hang around and talk about Qubes.
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Demoscene music mix
DTSTART:20190809T200000Z
DTEND:20190809T210000Z
DTSTAMP:20260407T083857Z
UID:15653808-0020-2390-7a82-ae190e24320b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/demoscene-music
 -mix/\n\nSpeaker(s): Klondike\n\nRecorded: No\n\nStreamed: No\n\nDemoscene
  music has some interesting properties\, it's made using machines\, it's b
 arely danceable and tends to be very creative. During this act we will mix
  some demoscene music for your enjoyment.
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20190810T100000Z
DTEND:20190810T110000Z
DTSTAMP:20260407T083857Z
UID:15654312-0019-233c-172e-850d7dc48e7a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/lunch-break/\n\
 nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break. Rememb
 er to drink water.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Anarchitecture
DTSTART:20190810T110000Z
DTEND:20190810T120000Z
DTSTAMP:20260407T083857Z
UID:15654348-0019-2362-3a4d-c2fd9734d4e8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/anarchitecture/
 \n\nSpeaker(s): Anders Rune Jensen\n\nRecorded: Yes\n\nStreamed: Yes\n\nTo
 day computer systems are often built with an implicit hierarchy. It can be
  seen as a way to enforce existing power structures. The very act of makin
 g software entails describing exactly how the system can be used and for w
 hat. Furthermore\, ever more data about the usage of systems is gathered. 
 This combined with machine learning has given rise to a whole new class of
  systems that can be very hard to reason about. Especially given that the 
 data or the algorithms can be controlled or bought by external parties. \n
 \nWhat if that doesn't need to be the case\, what if we could make softwar
 e that is both subjective and in control of the user. I will be presenting
  one such system - Scuttlebutt\, detail how it is different from the syste
 ms described above\, and also different from federated systems.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Digital aktivisme / Digital activism
DTSTART:20190810T120000Z
DTEND:20190810T130000Z
DTSTAMP:20260407T083857Z
UID:15654384-0022-2887-374f-1ef61e745a39
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/digital-aktivis
 me-digital-activism/\n\nSpeaker(s): Rasmus Malver\n\nRecorded: No\n\nStrea
 med: No\n\nDA: Revolutionen kræver mere end et like og et retweet. Worksh
 oppen starter med en introduktion til menneskeret\, digitale rettigheder o
 g kampagneteknikker fra Rasmus Malver. Derefter er der brainstorm\, sparri
 ng og udvikling af kampagner.\n\nEN: The revolution isn't brought on by a 
 like and a retweet. Rasmus Malver gives an introduction to human rights\, 
 digital rights and examples of digital campaigning that bridges the gap fr
 om nerd to the rest of the world. Afterwards we brainstorm and begin devel
 oping our own campaigns.
LOCATION:Workshop Room 2
END:VEVENT
BEGIN:VEVENT
SUMMARY:post-its\, post-its\, post-its everywhere (and how they relate to 
 physical keys)
DTSTART:20190810T120000Z
DTEND:20190810T130000Z
DTSTAMP:20260407T083857Z
UID:15654384-0019-2671-8208-d69ee6f467d8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/post-its-post-i
 ts-post-its-everywhere-and-how-they-relate-to-physical-keys/\n\nSpeaker(s)
 : jos weyers\n\nRecorded: Yes\n\nStreamed: Yes\n\nA password shouldn’t b
 e on a post-it note.\n\nIn plain view.\n\nOn the console.\n\nThe password 
 to a locked door is called a key.\n\nSo if a reporter wants to get the poi
 nt across that certain people shouldn't have access to a particular key\, 
 would it be wise for said reporter to show that key to the world?\n\nThis 
 talk will show how not to run this story\, why we should care and maybe ma
 ke you rethink your physical security a bit.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Be Cynical
DTSTART:20190810T130000Z
DTEND:20190810T140000Z
DTSTAMP:20260407T083857Z
UID:15654420-0019-2950-877b-02e14054f55a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/be-cynical/\n\n
 Speaker(s): Jimmi Kristensen\n\nRecorded: Yes\n\nStreamed: Yes\n\nTesting 
 distributed applications\, such as microservices\, can be difficult. In pr
 oduction\, when network is involved\, and you have multiple integration po
 ints\, all sorts of bad things can happen to your newly shipped microservi
 ce.\n\nIn this talk I will take you through and show:\n\n- a demo REST-bas
 ed microservice built with Micronaut\, Testcontainers\, Mountebank and Cir
 cuit Breakers.\n- different scenarios that shows why it is difficult to te
 st microservices and why it’s important that we think destructive as eng
 ineers.\n- why it’s important that your application is cynical to protec
 t itself from failures. demonstrate how to test different scenarios that c
 an happen to your microservice in production\, such as slow response\, net
 work errors\, timeouts\, invalid response\, unexpected response\, etc.\n- 
 how all this can be automated through continuous integration.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:SIA Open? - Workshop #2: Backend and network
DTSTART:20190810T130000Z
DTEND:20190810T150000Z
DTSTAMP:20260407T083857Z
UID:15654420-0018-2807-a82a-800f8c9494ca
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/sia-open-worksh
 op-2-backend-and-network/\n\nSpeaker(s): Michael Ørnø\, Tobias Fonsmark\
 n\nRecorded: No\n\nStreamed: No\n\nThe Agency for Governmental IT-Services
  - Statens It are together with other government bodies exploring the feas
 ibility of building an open-source PC workplace platform.\n\nThe platform 
 will be called SIA 1 Open\, and are intended for non-office workers in Gov
 ernment institutions such as museums or environmental agencies. SIA Open t
 argets users whose primary work do not include using it-systems. The cost 
 of commercial software prohibits in many cases delivery of our basic it-se
 rvice to this type of employees.\n\nThe platform should provide the user w
 ith a browser\, mail\, calendar\, word processing\, spreadsheet\, vpn and 
 a file-service.\n\nA back-end environment\, which manages software updates
  and users\, should manage the endpoints. The back-end should as well host
  a mail and file service.\n\nThe back-end should utilize the Agency’s Op
 enStack cloud service.\n\nAt Bornhack we host four workshops\, where all i
 nterested are invited to participate in a discussion on how to design the 
 SIA Open platform. Which software products should\nwe choose? How should w
 e implement? Administration and automation on the platform? What are the i
 ssues to consider? Etc.\n\nWorkshop #2: Backend and network\n\nMail and fi
 le-service? Domains? Software distribution? Network services and administr
 ation\, automation and self-service? Accounting and chargeback?
LOCATION:Workshop Room 1
END:VEVENT
BEGIN:VEVENT
SUMMARY:NixOS\, a functional GNU/Linux distro
DTSTART:20190810T140000Z
DTEND:20190810T150000Z
DTSTAMP:20260407T083857Z
UID:15654456-0019-2735-70e8-655d97d410b8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/nixos-a-functio
 nal-gnulinux-distro/\n\nSpeaker(s): Robert Helgesson\n\nRecorded: Yes\n\nS
 treamed: Yes\n\nNixOS is a GNU/Linux distribution built on the Nix package
  manager and the Nix domain specific lazy functional programming language.
  Its unique design enables a number of interesting and powerful features s
 uch as reproducible system configurations\, atomic system upgrades\, rollb
 acks to known working configurations\, per-user package management\, easy 
 sharing of configurations between multiple systems\, and so on.\n\nTogethe
 r these features make NixOS an excellent system for server deployments\, s
 oftware development\, and for the GNU/Linux enthusiast.\n\nThis talk will 
 give an introduction to the Nix package manager and the NixOS GNU/Linux di
 stribution and present an overview of the listed features. Familiarity wit
 h GNU/Linux is recommended but no prior experience of Nix or NixOS will be
  necessary.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Adventures in hardware standardisation
DTSTART:20190810T150000Z
DTEND:20190810T160000Z
DTSTAMP:20260407T083857Z
UID:15654492-0019-2935-8fdf-d91677649f19
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/adventures-in-h
 ardware-standardisation/\n\nSpeaker(s): Amelia Andersdotter\n\nRecorded: Y
 es\n\nStreamed: Yes\n\nAmelia has spent two years attending hardware stand
 ardisation bodies such as IEEE\, the 3GPP and the IETF together with UK-ba
 sed human rights organisation ARTICLE19. This talk summarizes salient deve
 lopment in these bodies over this time\, and the representation of digital
  rights and consumer interests.\n\nThe hope is that participants will walk
  out of the talk hopeful about the efforts made towards privacy and securi
 ty in tech standards bodies\, while being aware of the remaining policy ch
 allenges in spite of these advances and efforts.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hate to say we told you so: Some cracked insights of a professiona
 l ex-tinfoilhat
DTSTART:20190810T180000Z
DTEND:20190810T190000Z
DTSTAMP:20260407T083857Z
UID:15654600-0019-268c-54e6-d62e4e041d0b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/hate-to-say-we-
 told-you-so-some-cracked-insights-of-a-professionel-ex-tinfoilhat/\n\nSpea
 ker(s): anders kjærulff\n\nRecorded: Yes\n\nStreamed: Yes\n\nFor the past
  8 years ive been working on the fringes of privacy and surveallance\, try
 ing to start debates\, changing political agendas and generally raising aw
 areness about our blatant and brutal loss of freedom in the name of digita
 l progress. Looking back\, all ive left behind is an increasing feeling of
  paranoia and a broken personal economy\, while my opponents are driving T
 eslas and getting elected to important boards while cashing in on selling 
 out on privacy and our individual freedome. \nThis is the strange tale of 
 being on the wrong side of info-tech-history for 8 years\, a slideshow of 
 pictures from this fatal journey - and maybe a beacon of hope for future i
 dealist who want to take a simular path.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Cristian Vogel
DTSTART:20190810T200000Z
DTEND:20190810T210000Z
DTSTAMP:20260407T083857Z
UID:15654672-0020-2877-9941-c7314764e43b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/cristian-vogel/
 \n\nSpeaker(s): Cristian Vogel\n\nRecorded: No\n\nStreamed: No\n\nCristian
  Vogel is an auditory design thinker\, composer and electronic music creat
 or. He writes his own realtime sound creation tools for the legendary soun
 d design environment Symbolic Sound Kyma. This hour long performance will 
 be a trip through the most cutting edge audio material he is currently wor
 king with\; from custom designed high end spectral processing to ad-hoc an
 alog performance patch networks.
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Web Security Map - Monitor your government!
DTSTART:20190811T090000Z
DTEND:20190811T100000Z
DTSTAMP:20260407T083857Z
UID:15655140-0019-2500-0f90-e63f07e4525b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/web-security-ma
 p-monitor-your-government/\n\nSpeaker(s): Elger "Stitch" Jonker\n\nRecorde
 d: Yes\n\nStreamed: Yes\n\nWeb Security Map can create a map of your count
 ry\, showing basic security issues. It can help motivate governments and r
 elated organizations to improve security and privacy for it’s citizens.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20190811T100000Z
DTEND:20190811T110000Z
DTSTAMP:20260407T083857Z
UID:15655176-0019-233c-172e-850d7dc48e7a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/lunch-break/\n\
 nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break. Rememb
 er to drink water.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Bufferbloat and Beyond: How we reduced delays in the Linux network
 ing stack by orders of magnitude
DTSTART:20190811T110000Z
DTEND:20190811T120000Z
DTSTAMP:20260407T083857Z
UID:15655212-0019-275b-86a4-c679ca6432cb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/bufferbloat-and
 -beyond-how-we-reduced-delays-in-the-linux-networking-stack-by-orders-of-m
 agnitude/\n\nSpeaker(s): Toke Høiland-Jørgensen\n\nRecorded: Yes\n\nStre
 amed: Yes\n\nBufferbloat is when a bottleneck router in the network reacts
  to congestion by queueing up too many packets. The result is long delays 
 that are felt as interruptions by the end user: suddenly\, the video skips
 \, the game lags\, or the web site stops responding. This talk explains wh
 at we have done to fix this in Linux\, an ongoing effort over the last sev
 eral years.\n\nWhile bufferbloat can happen everywhere\, the main culprit 
 is often home routers and WiFi access points inside the local network. Sin
 ce these devices often run Linux\, it is possible to upgrade their firmwar
 e to achieve better behaviour. Thus\, the Linux networking stack has been 
 at the forefront of the efforts to combat bufferbloat over the last severa
 l years\, with fixes to all layers.\n\nIn this talk I will present an over
 view of the efforts\, show some pretty graphs of the benefits\, and provid
 e some hints for how to reap the benefits  on your own network.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Fun with Bleach
DTSTART:20190811T110000Z
DTEND:20190811T140000Z
DTSTAMP:20260407T083857Z
UID:15655212-0023-2650-df22-a7262864fcda
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/fun-with-bleach
 /\n\nSpeaker(s): Moem\n\nRecorded: No\n\nStreamed: No\n\nWe had a lot of f
 un with this last year\, so let's do it again! In this workshop\, we will 
 be making boring T-shirts into interesting\, unique and cool T-shirts\, us
 ing bleach and various techniques. Please bring your own boring T-shirts i
 n darker colours\; prints are OK and will remain in place. The higher the 
 cotton content of the shirt\, the better your results will be. If you want
  to use existing (simple) designs and (simple) logos\, print them on thick
  paper or thin cardboard and\, you guessed it\, bring them.\n\nThe locatio
 n of the workshop will be announced here.
LOCATION:Outside
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hardware and Protocols
DTSTART:20190811T120000Z
DTEND:20190811T130000Z
DTSTAMP:20260407T083857Z
UID:15655248-0019-2743-0f17-97b01e8452b8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/hardware-and-pr
 otocols/\n\nSpeaker(s): Lord Herr BugBlue\n\nRecorded: Yes\n\nStreamed: Ye
 s\n\nIn my daily life I encounter a lot of hardware from different ages an
 d they all speak different non-invented-here protocols. This talk is about
  what I encounter\, how to find out what something talks\, how to debug it
  and how to make it do what you want.\nIf you have ever encountered a piec
 e of hardware you did want to use for the intended purpose or another one 
 and the manufacturer does not share all the in and outs with you this migh
 t be a helpful. This talk is tried and somewhat errored at hack42\, the co
 olest hackerspace (arnhem\, Netherlands) and I learned from it :-)
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Cryptohagen - what next?
DTSTART:20190811T120000Z
DTEND:20190811T130000Z
DTSTAMP:20260407T083857Z
UID:15655248-0020-2867-18c1-f30be7a4f619
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/cryptohagen-wha
 t-next/\n\nSpeaker(s): Graffen\n\nRecorded: No\n\nStreamed: No\n\nCryptoha
 gen has been going on steadily for the last several years. Every last Sund
 ay of the month\, anywhere from 3-30 privacy and crypto activists have met
  up at a café in Copenhagen to mingle and to help others to get better at
  protecting their digital selves.\n\nOver the last couple of years we've s
 een a steady decline\, both in the number of steady attendees (down to pra
 ctically 2-3) and in the number of curious outsiders who have showed up to
  either have a chat and meet like-minded tinfoil hats or to get help with 
 something more or less concrete.\n\nSince many of the original Cryptohagen
 ers will be at Bornhack\, let's meet up and have a semi-formal discussion 
 about what to do about Cryptohagen going forward. Is it still relevant? Do
 es the format work? Who do we expect to show up at the meetings? What do w
 e expect to get out of the meetings ourselves? ... and probably a ton of o
 ther questions.\n\nThe outcome of this meetup should be some form of "mani
 festo" or mission statement for the future of Cryptohagen. Feel free to br
 ing your laptop to take notes :)
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:SIA Open? - Workshop #3: User and access administration
DTSTART:20190811T120000Z
DTEND:20190811T140000Z
DTSTAMP:20260407T083857Z
UID:15655248-0018-281b-85fc-1caf3894b819
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/sia-open-worksh
 op-3-user-and-access-administration/\n\nSpeaker(s): Michael Ørnø\, Tobia
 s Fonsmark\n\nRecorded: No\n\nStreamed: No\n\nThe Agency for Governmental 
 IT-Services - Statens It are together with other government bodies explori
 ng the feasibility of building an open-source PC workplace platform.\n\nTh
 e platform will be called SIA 1 Open\, and are intended for non-office wor
 kers in Government institutions such as museums or environmental agencies.
  SIA Open targets users whose primary work do not include using it-systems
 . The cost of commercial software prohibits in many cases delivery of our 
 basic it-service to this type of employees.\n\nThe platform should provide
  the user with a browser\, mail\, calendar\, word processing\, spreadsheet
 \, vpn and a file-service.\n\nA back-end environment\, which manages softw
 are updates and users\, should manage the endpoints. The back-end should a
 s well host a mail and file service.\n\nThe back-end should utilize the Ag
 ency’s OpenStack cloud service.\n\nAt Bornhack we host four workshops\, 
 where all interested are invited to participate in a discussion on how to 
 design the SIA Open platform. Which software products should\nwe choose? H
 ow should we implement? Administration and automation on the platform? Wha
 t are the issues to consider? Etc.\n\nWorkshop #3: User and access adminis
 tration\n\nSetup and administration/self-service?
LOCATION:Workshop Room 1
END:VEVENT
BEGIN:VEVENT
SUMMARY:Can you trust your encrypted cloud? An assessment of SpiderOakONE'
 s security
DTSTART:20190811T130000Z
DTEND:20190811T140000Z
DTSTAMP:20260407T083857Z
UID:15655284-0019-301b-d3ce-2fb6b9943b09
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/can-you-trust-y
 our-encrypted-cloud-an-assessment-of-spideroakones-security/\n\nSpeaker(s)
 : Anders Dalskov\n\nRecorded: Yes\n\nStreamed: Yes\n\nThis talk presents t
 he results of a security review performed back in late 2017 of the encrypt
 ed cloud storage application SpiderOak ONE.\n\nThe main motivation for thi
 s work was to examine to what extent the security claimed by the company\,
  matched the security provided by the application. To that end\, we develo
 ped two threat models and examined the security of SpiderOakONE in each of
  them. One model assumes the server does what it's supposed to\, yet it wi
 ll try to learn information by looking at the data its users are storing. 
 The other model assumes the server may act inconsistently\, by for sending
  wrong responses to the application during operation.\n\nWe found that in 
 both cases\, issues exist that partially or totally reveal the content of 
 user's files to the server.\n\nAll issues that were found have been report
 ed in a responsible manner and subsequently fixed.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Ekometic: The Future Is Listening
DTSTART:20190811T140000Z
DTEND:20190811T150000Z
DTSTAMP:20260407T083857Z
UID:15655320-0019-2898-3026-bfd0c644f98b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/ekometic-the-fu
 ture-is-listening/\n\nSpeaker(s): Cristian Vogel\n\nRecorded: Yes\n\nStrea
 med: Yes\n\nEkometic is a fledgling Sonic Design Agency based in Copenhage
 n\, founded in Summer 2019. \nWe believe that new attitudes to Auditory De
 sign Thinking can and will have a crucial role to play in emerging design 
 paradigms.  \nThe idea is do extend Sound\, Music and Listening beyond the
  fields of Entertainment and the Arts. \nAuditory Design Thinking aligns w
 ell with the UN Sustainable Development Goals too and life centered design
 .\nBut first we must overcome widespread visual design bias and get better
  at reading sound  - Listening.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Gentoo Install Party
DTSTART:20190811T140000Z
DTEND:20190811T160000Z
DTSTAMP:20260407T083857Z
UID:15655320-0022-240e-110c-6d60e6b4e75b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/gentoo-install-
 party/\n\nSpeaker(s): Klondike\n\nRecorded: No\n\nStreamed: No\n\nWant to 
 install or learn more about Gentoo or Gentoo Hardened? Come to this worksh
 op were users and developers will assist you into performing an installati
 on and assist you with the issues you find.
LOCATION:Workshop Room 2
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to the Tor Ecosystem
DTSTART:20190811T150000Z
DTEND:20190811T160000Z
DTSTAMP:20260407T083857Z
UID:15655356-0019-2576-21a3-b55ada44392a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/introduction-to
 -the-tor-ecosystem/\n\nSpeaker(s): Alexander Færøy\n\nRecorded: Yes\n\nS
 treamed: Yes\n\nIn this presentation we will be walking over the design an
 d implementation of the Tor system and its use cases. We will also be walk
 ing over some recent projects that we have been working on in the area of 
 anti-censorship. No prior knowledge of Tor is required.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:PaF || STFU
DTSTART:20190811T170000Z
DTEND:20190811T180000Z
DTSTAMP:20260407T083857Z
UID:15655428-0019-242c-0ffd-fd4e2924af6a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/paf-stfu/\n\nSp
 eaker(s): Klondike\n\nRecorded: Yes\n\nStreamed: Yes\n\nPaF (Patch and Fix
 ) is a methodology\nfocused on getting hands on towards a solution as opos
 ed to RaD (Report\nand Discuss). I developed this approach when I was the 
 CISO of a\ncryptocurrency exchange called Lescovex. This approach is commo
 n in\ncertain free software projects and hacking communities. In this talk
  we\nwill see how adopting such approach correctly can help us improve the
 \nsecurity of our organizations by enabling those who can help us address\
 nthe problem. Some of the side effects of PaF  include: CISOs being seen\n
 as helpful contributors by people involved in development and system\nadmi
 nistration\, auditors being seen as a valuable source of insight and\ndeve
 lopment teams becoming better at handling security proactively and\nless i
 nhibed at raising questions.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Confessions of a nerd - featuring drones\, self driving\, Ai\, sur
 veilence and the doomsday machine
DTSTART:20190811T180000Z
DTEND:20190811T190000Z
DTSTAMP:20260407T083857Z
UID:15655464-0019-3081-c145-cc6483145e89
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/confessions-of-
 a-nerd-featuring-drones-self-driving-ai-surveilence-and-the-doomsday-machi
 ne/\n\nSpeaker(s): Nikolaj Sonne\n\nRecorded: No\n\nStreamed: No\n\nUsing 
 a cooler from a Ford Escort\, a waterfountain pump\, a peltier and home so
 ldered plumbing\, Nikolaj was among the first to literally freeze his CPU 
 and "break" the 1GHz clock barrier\, back in the previous millennium.  Bef
 ore that he optimized for low wind resistance on a home made recumbent bik
 e. And recently he found the perfect* mixture of paints (black\, grey and 
 silver) to optimize the projection screen performance in his home theater.
 \n\nIn this talk - Nikolaj has been diving deep in his extensive back cata
 logue and has surfaced with stories ranging from a visit in the first Amaz
 on Go supermarket\, to phones automagically taking pictures while lying on
  the table at a hacker-conference to the finest facial recognition China h
 as on offer. There will also be contemplations regarding Ai-driven machine
 s\, self driving cars\, drones - and how the (Danish) police uses them. \n
 \nThings will also take a turn for the more philosophical in an attempt to
  give short and concise answers as to why pervasive surveillance is a prob
 lem for democracy and not least try to come up with a good answer for when
  someone thinks that they have nothing to hide.\n\nOhh - and if there is t
 ime\, we will take the doomsday machine for a spin!\n\nFeel free to join -
  and join the discussion.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:UncensoredDNS 10 Years Anniversary
DTSTART:20190811T190000Z
DTEND:20190811T200000Z
DTSTAMP:20260407T083857Z
UID:15655500-0020-2781-d26f-fdc993c48b3b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/uncensoreddns-1
 0-years-anniversary/\n\nSpeaker(s): Thomas Steen Rasmussen / Tykling\n\nRe
 corded: No\n\nStreamed: No\n\nBack in 2009 the DNS landscape looked a lot 
 different than it does now. Everyone used their ISPs DNS servers. All of t
 his *gestures at everything* was fields as far as the eye could see.\n\nDe
 nmark had been forcing ISPs to do DNS censorship since 2006\, at the time 
 primarily blocking The Pirate Bay and other copyright/IP related domains. 
 The only serious non-ISP DNS provider in 2009 was OpenDNS\, but they did d
 ouchy moves like NXDOMAIN redirection at the time\, and they had no DNSSEC
  support\, so nobody with half a brain wanted to use them.\n\nFriends were
  asking which DNS provider to use to get a secure and uncensored DNS servi
 ce\, and I realised didn't have a good response at the time. So I started 
 UncensoredDNS in November 2009. The first public announcement was a month 
 later on December 30th 2009 on the mailing list for the IT Political Assoc
 iation of Denmark.\n\n10 years later everybody is running recursive DNS se
 rvices on catchy IP addresses. OpenDNS now belongs to Cisco\, who are curr
 ently busy at conferences telling everyone about all the problems they can
  solve through DNS blocking. Google DNS on 8.8.8.8 has been around for a w
 hile and is used by many people. Cloudflare started their 1.1.1.1 service 
 recently\, and IBM is also running DNS servers on 9.9.9.9.\n\nMeanwhile Un
 censoredDNS has been chugging along on less catchy IP addresses\, servicin
 g billions upon billions of DNS lookups from all over the world. Clear his
 toric geographic trends can be seen\, like during the arab spring or other
  major internet blackouts.\n\nIt is humbling that so many people choose to
  place their trust in me. I am lucky and very proud to be in a position wh
 ere I get to help people over such an extended period of time. Let's meet 
 up in the bar to celebrate 10 years of running free\, decentralised secure
  Internet infrastructure over a vodka or two.
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacker Jeopardy (Round #1)
DTSTART:20190811T200000Z
DTEND:20190811T213000Z
DTSTAMP:20260407T083857Z
UID:15655536-0019-311f-d85d-89025f3422bb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/hacker-jeopardy
 -round-1/\n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nFour 
 teams of up to 3 persons compete in a game of classical jeopardy.\n\nSubmi
 t your teams to info@bornhack.dk with your team name.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tesla Coil Demo + Information
DTSTART:20190811T215900Z
DTEND:20190811T230000Z
DTSTAMP:20260407T083857Z
UID:15655607-4019-3061-0dd1-5b6e6b0469f8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/tesla-coil-demo
 -information/\n\nSpeaker(s): Bruce Helsen\n\nRecorded: No\n\nStreamed: No\
 n\nThere will be a small presentation of the workings of a Tesla Coil.\nAf
 ter that there will be an interactive demo of a Spark Gap Tesla Coil.\n\nB
 ring your tin foil hats!
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Sustainability challange and the role of hackers
DTSTART:20190812T090000Z
DTEND:20190812T100000Z
DTSTAMP:20260407T083857Z
UID:15656004-0019-3024-7474-49e37ec4a3db
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/sustainability-
 challange-and-the-role-of-hackers/\n\nSpeaker(s): Igor Nikolic\n\nRecorded
 : Yes\n\nStreamed: Yes\n\nIn this talk we will explore the current global 
 sustainability situation\, the possible ways forward and the role hackers 
 have in this development. From the environmental\, social\, economic and t
 echnical\nperspectives we will identify the aspects where we as a global c
 ivilization are doing great\, and where we are failing hard. While there i
 s no single solution for the circular economy\, energy transition\,\ngloba
 l equity\, democracy and peace\, we will identify robust design patterns t
 hat the hacker communities can engage in\, and improve. Where possible\, t
 he talk will be backed with most current scientific theories and data. \nE
 xpect a broad and philosophical exploration rather than a deep technical d
 ive.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Massage
DTSTART:20190812T090000Z
DTEND:20190812T143000Z
DTSTAMP:20260407T083857Z
UID:15656004-0024-3071-5f21-dbbf07b48348
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/massage/\n\nSpe
 aker(s): Graffen\n\nRecorded: No\n\nStreamed: No\n\nA local masseuse will 
 stop by Friday and Monday during BornHack to massage our aching bodies and
  make sure we're in tip top shape for hacking. The massage is a so-called 
 sports massage that is meant to stimulate your muscles and helps to increa
 se blood flow and release tension.\n\nA massage session lasts 30 minutes. 
 You can reserve a spot by adding your name to one of the pads below.\n\nSi
 gnup for Friday: https://pad.graffen.io/KRR_5OAyR_OjQQxVvbN6Yg?edit  \nSig
 nup for Monday: https://pad.graffen.io/wxUdk2pgTRmb2hGcV_2lMw?edit\n\nThe 
 massage will take place in the main building (where the workshop rooms are
 ). Please wait outside until you are called in.\n\n** Note! ** There is a 
 cover charge of 150kr/150Hax that must be paid to Graffen when you sign up
 ! If you cannot find him please find one of the other organisers and get t
 hem to locate him
LOCATION:Workshop room 3
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20190812T100000Z
DTEND:20190812T110000Z
DTSTAMP:20260407T083857Z
UID:15656040-0019-233c-172e-850d7dc48e7a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/lunch-break/\n\
 nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break. Rememb
 er to drink water.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:UCL fablab roadtrip!
DTSTART:20190812T100000Z
DTEND:20190812T130000Z
DTSTAMP:20260407T083857Z
UID:15656040-0023-2720-22f4-1ba3e94483a8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/ucl-fablab-road
 trip/\n\nSpeaker(s): Morten Nielsen\n\nRecorded: No\n\nStreamed: No\n\nAt 
 UCL in Odense we have a fablab with lasercutters\, 3D printers\, sticker m
 achine and so on.\n\nWe will go there\, get introduced to it\, and use it 
 for cool hacker stuff :-)\n\nI have arranged for the Fablab people to be t
 here to help us if needed. \n\nThe will be a limit of 10 places on this wo
 rkshop - and we will need means of transportation to get to Odense. Go [he
 re](https://pad.tyk.nu/p/bh19-fablab) to sign up.\n\nSee [their home page]
 (https://www.eal.dk/projekter/fablab) for more deatils.
LOCATION:Outside
END:VEVENT
BEGIN:VEVENT
SUMMARY:Simulating DDoS packets
DTSTART:20190812T110000Z
DTEND:20190812T130000Z
DTSTAMP:20260407T083857Z
UID:15656076-0018-261c-c0f9-949cb974f979
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/simulating-ddos
 -packets/\n\nSpeaker(s): NWWC Network Village\n\nRecorded: No\n\nStreamed:
  No\n\nA small workshop teaching people how to produce DDoS simulation tra
 ffic - usefull for testing their own infrastructures.\n\nWe will have a se
 rver connected on 10Gbit on a switch with multiple 1Gbit port for attacker
 s. \nAttackers will be connected through 1Gbit ports using USB Ethernet - 
 we have loaners. \n\nWork together to produce enough to take down this ser
 ver!\n\nWHILE attack is ongoing there will be both the possibility to moni
 tor traffic\, monitor port\,  and decide on changes to prevent the attacks
  from working.\n\nWe will work through common attack types\, like:\n* TCP 
 SYN flooding\n* TCP other flooding\n* UDP flooding NTP\, etc.\n* ICMP floo
 ding\n* Misc - stranger attacks and illegal combinations of flags etc.\n\n
 then we will implement the changes suggested and retry attacks.\n\nYou wil
 l go away from this with tools for producing packets\, hping3 and some con
 figurations for protecting - PF rules\, switch rules\, server firewall rul
 es.
LOCATION:Workshop Room 1
END:VEVENT
BEGIN:VEVENT
SUMMARY:Limiting side-effects of applications at compile-time
DTSTART:20190812T120000Z
DTEND:20190812T130000Z
DTSTAMP:20260407T083857Z
UID:15656112-0019-234a-4da0-9163c434bde8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/limiting-side-e
 ffects-of-applications-at-compile-time/\n\nSpeaker(s): Ramón Soto Mathies
 en\n\nRecorded: Yes\n\nStreamed: Yes\n\nBy using tools where you have a cl
 ear separation between code branches that makes effects and the ones that 
 doesn't\, as for example Haskell\, it's very easy to argue that this can b
 e done in a fairly easy manner. But it's not always the case that if a spe
 cific code branch is allowed to have side-effects\, these should be all po
 ssible side-effects. In this short talk\, we will be showcasing how you wi
 ll be able to further restrict effects\, granularly and even recursively\,
  in order to limit these side-effects. An example could be an application 
 that only needs to access data from a specific website\, limited to a rela
 tive URL\, and then print it to the console. These effects restrictions wi
 ll be designed into the application\, which will allow you to outsource de
 velopment to anyone with the right skill-set\, even if they have bad inten
 tions\, knowing that they will 100% live up to the design or the applicati
 on will not build. A demonstration will be provided by showcasing this app
 roach on a very simple application (live coding).
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Alt om ulovlig logning / Illegal data retention in Denmark
DTSTART:20190812T130000Z
DTEND:20190812T140000Z
DTSTAMP:20260407T083857Z
UID:15656148-0019-2948-9ce2-497722946b59
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/alt-om-ulovlig-
 logning-illegal-data-retention-in-denmark/\n\nSpeaker(s): Rasmus Malver\n\
 nRecorded: Yes\n\nStreamed: Yes\n\nDA: Nyt år\, ny minister\, nye indrøm
 melser. Talsperson fra Foreningen imod Ulovlig Logning\, Rasmus Malver\, f
 ortæller om året der gik og året der kommer.\n\nEN: Many things have ha
 ppened. New minister and police admittance of wrongdoing. Spokesperson for
  the lawsuit against the Danish government\, Rasmus Malver\, gives a statu
 s and details what will happen next.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:SIA Open? - Workshop #4: Application portfolio
DTSTART:20190812T130000Z
DTEND:20190812T150000Z
DTSTAMP:20260407T083857Z
UID:15656148-0018-2826-dfc8-cb7027e42849
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/sia-open-worksh
 op-4-application-portfolio/\n\nSpeaker(s): Michael Ørnø\, Tobias Fonsmar
 k\n\nRecorded: No\n\nStreamed: No\n\nThe Agency for Governmental IT-Servic
 es - Statens It are together with other government bodies exploring the fe
 asibility of building an open-source PC workplace platform.\n\nThe platfor
 m will be called SIA 1 Open\, and are intended for non-office workers in G
 overnment institutions such as museums or environmental agencies. SIA Open
  targets users whose primary work do not include using it-systems. The cos
 t of commercial software prohibits in many cases delivery of our basic it-
 service to this type of employees.\n\nThe platform should provide the user
  with a browser\, mail\, calendar\, word processing\, spreadsheet\, vpn an
 d a file-service.\n\nA back-end environment\, which manages software updat
 es and users\, should manage the endpoints. The back-end should as well ho
 st a mail and file service.\n\nThe back-end should utilize the Agency’s 
 OpenStack cloud service.\n\nAt Bornhack we host four workshops\, where all
  interested are invited to participate in a discussion on how to design th
 e SIA Open platform. Which software products should\nwe choose? How should
  we implement? Administration and automation on the platform? What are the
  issues to consider? Etc.\n\nWorkshop #4: Application portfolio\n\nMail cl
 ient? Office suite? Calendar? Browser(s)?
LOCATION:Workshop Room 1
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to Mix Networks and Katzenpost: a new anonymity movem
 ent
DTSTART:20190812T140000Z
DTEND:20190812T150000Z
DTSTAMP:20260407T083857Z
UID:15656184-0019-2543-6399-49ce39d48ef8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/introduction-to
 -mix-networks-and-katzenpost-a-new-anonymity-movement/\n\nSpeaker(s): Davi
 d Stainton\n\nRecorded: Yes\n\nStreamed: Yes\n\nThis talk will introduce t
 he fundamental concepts of mix networks as\nwell as the Katzenpost mix net
 work free software project. We are not\njust implementing a new mix networ
 k but starting a new anonymity\nmovement and we welcome others to join us!
  Like Tor\, mix networks\nprotect metadata by using layered encryption and
  routing packets\nbetween a series of independent nodes. Mix networks resi
 st vastly more\npowerful adversary models than Tor though\, including part
 ial defense\nagainst global passive adversaries. In so doing\, mix network
 s add both\nlatency and cover traffic. I shall outline the basic component
 s of a\nmix network\, touch on their roles in resisting active and passive
 \nattacks. In particular I'll mention how mix networks can be used with\ne
 ncrypted messaging applications and crypto currency to resist global\nnetw
 ork surveillance and traffic analysis.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Secure Scuttlebutt - An off-grid peer-to-peer social network
DTSTART:20190812T150000Z
DTEND:20190812T160000Z
DTSTAMP:20260407T083857Z
UID:15656220-0019-291f-c41d-b9ab05c4508a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/secure-scuttleb
 utt-an-off-grid-peer-to-peer-social-network/\n\nSpeaker(s): Jacob Karlsson
 \n\nRecorded: Yes\n\nStreamed: Yes\n\nA networking protocol\, database\, a
 nd a group of clients\, all designed from the bottom up to be social\, non
 -hierarchical\, and offline-first. This talk will introduce Secure Scuttle
 butt (SSB)\, the technology and philosophy behind it\, as well as some his
 tory and potential futures.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacking a random fiber router and acting all cool about how you br
 oke some crappy coding and a system running software from 10 years ago!
DTSTART:20190812T160000Z
DTEND:20190812T170000Z
DTSTAMP:20260407T083857Z
UID:15656256-0019-290c-85eb-e00d9ed44e1b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/hacking-a-rando
 m-fiber-router-and-acting-all-cool-about-how-you-broke-some-crappy-coding-
 and-a-system-running-software-from-10-years-ago/\n\nSpeaker(s): Stef\n\nRe
 corded: Yes\n\nStreamed: Yes\n\nI will describe hacking some router\, i in
 tend to go through the process of hardware hacking\, things that didnt wor
 k (loads) and some that did.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:LO! An LLVM Obfuscator
DTSTART:20190812T170000Z
DTEND:20190812T180000Z
DTSTAMP:20260407T083857Z
UID:15656292-0019-2410-0ccf-4a181c548f78
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/lo-an-llvm-obfu
 scator/\n\nSpeaker(s): Klondike\n\nRecorded: Yes\n\nStreamed: Yes\n\nIn th
 is talk we will present how intermediate code transformations can\nbe used
  to obfuscate code and the advantadges and limitations they\nintroduce. We
  will also brielfy discuss some techniques that could help\ndetect and rev
 erse code obfuscated in such ways.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Next digital frontier of European Policy: Values and Hope
DTSTART:20190812T180000Z
DTEND:20190812T190000Z
DTSTAMP:20260407T083857Z
UID:15656328-0019-309e-8706-cdfd37e49328
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/next-digital-fr
 ontier-of-european-policy-values-and-hope/\n\nSpeaker(s): Karen Melchior\n
 \nRecorded: Yes\n\nStreamed: Yes\n\nNewly elected MEP Karen Melchior will 
 try to charter a way for the next 5 years across the next digital frontier
  for Europe. Our values need to show the way\, not just what is technologi
 cally possible. Hope for what we can bring the future not fear for what it
  might bring us\, should push us into action.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tor Relay Operators Meetup
DTSTART:20190812T190000Z
DTEND:20190812T200000Z
DTSTAMP:20260407T083857Z
UID:15656364-0020-2581-354f-4371ad44af1a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/tor-relay-opera
 tors-meetup/\n\nSpeaker(s): Alexander Færøy\, Jurre van Bergen\n\nRecord
 ed: No\n\nStreamed: No\n\nFor people who are currently running or are cons
 idering to run Tor relay nodes. Let's meet and share experiences\, say hi 
 to each other and have an open discussion about topics related to Tor rela
 y operations.\n\nWill most likely take place in some corner of the bar.
LOCATION:Bar Area
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacker Jeopardy (Round #2)
DTSTART:20190812T200000Z
DTEND:20190812T213000Z
DTSTAMP:20260407T083857Z
UID:15656400-0019-312a-9619-1a12c8f4031b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/hacker-jeopardy
 -round-2/\n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nFour 
 teams of up to 3 persons compete in a game of classical jeopardy.\n\nSubmi
 t your teams to info@bornhack.dk with your team name.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:The Perseids Meteor Shower and Other Things in the Summer Night Sk
 y
DTSTART:20190812T230000Z
DTEND:20190813T003000Z
DTSTAMP:20260407T083857Z
UID:15656508-0023-3056-c4d6-b57510a4128b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/the-perseids-me
 teor-shower-and-other-things-in-the-summer-night-sky/\n\nSpeaker(s): zelto
 phil\n\nRecorded: No\n\nStreamed: No\n\nThe perseids are a meteor shower v
 isible from July 17 to August 24 each year. They are expected to peak duri
 ng the night of August 12 to August 13. If the weather is good\, let's wal
 k to a field with good view and little light pollution near BornHack. zelt
 ophil will bring a star chart and try to remember what she once knew about
  the summer night sky. We'll meet at the bar at 01:00. Remember to bring w
 arm clothes\, something to sit on and maybe a hot drink. Anyone bringing a
  telescope?
LOCATION:Outside
END:VEVENT
BEGIN:VEVENT
SUMMARY:concieggs: An extensible IRC bot architecture with an attitude
DTSTART:20190813T090000Z
DTEND:20190813T100000Z
DTSTAMP:20260407T083857Z
UID:15656868-0019-2469-bf43-5c101f849d1b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/concieggs-an-ex
 tensible-irc-bot-architecture-with-an-attitude/\n\nSpeaker(s): Niels G. W.
  Serup\n\nRecorded: Yes\n\nStreamed: Yes\n\nInternet Relay Chat (IRC) is a
  very basic protocol for text chatting on the internet.  In its simplest f
 orm\, humans use IRC to chat with other humans\, but it is also easy to wr
 ite programs and let humans interact with them over IRC.  These programs a
 re called IRC bots and can have many uses: administrative tasks\, informat
 ion gathering\, games\, and more.\n\nFor this talk I want to describe the 
 architecture of an IRC bot called *concieggs* and why we believe its desig
 n is good.  See https://github.com/athas/EggsML for the code (among other 
 things).  I did not invent concieggs\, but have contributed to it since 20
 13\; this is joint work with Troels Henriksen\, postdoc at the Department 
 of Computer Science at the University of Copenhagen (DIKU)\, and many othe
 rs (please see the contributors tab on the GitHub project page).\n\nThis t
 alk will focus on the major aspects of concieggs:\n\n  - The broad strokes
 : What even is this?\n\n  - An architecture for the masses: How do you des
 ign an extensible IRC bot with a low bar for entry and a high degree of st
 ability?  Many computer science students at DIKU have added new features t
 o concieggs without having to learn much or even be good at programming.\n
 \n  - A polyglot solution: If using one programming language is good\, the
 n using more programming languages is better.  The core parts of concieggs
  consist only of shell\, awk\, and C\, but concieggs as a whole also uses 
 Python\, Haskell\, Go\, Perl\, TCL\, PHP\, Java\, Brainfuck\, Javascript\,
  Ruby\, Pascal\, Emacs Lisp\, F#\, Standard ML\, and more.  We believe thi
 s variety has a calming effect on new contributors\, since they can use wh
 atever programming language they know well.  We also make a point out of n
 ot having any continuous integration or other kind of testing -- this way\
 , the general code quality is middling at best\, which lowers any hesitanc
 e new contributors might have when pushing their likely-not-perfect code.\
 n\n  - A good rash: We have developed our own shell-like domain-specific l
 anguage for keeping state within an IRC context\, rash.  This language all
 ows for a longer chain of interactivity and is also fun to use.  I will sh
 owcase this little corner of concieggs and some of the features that depen
 d on it.  If you hear someone say that rash is not a beautiful programming
  language\, then they are lying to you.\n\n  - Fun features: What can conc
 ieggs actually be used for on a boring weekday evening?  Lots!  We have a 
 large catalogue of social quizzes\, joke generators\, role-playing systems
 \, weather forecasts\, and much more.  I will go through some of them.\n\n
 I will also briefly address the question of whether we still need IRC bots
 \, or even IRC\, though I will be very biased and likely also complain abo
 ut whatever proprietary chat protocol is currently riding the hype train.\
 n\nThis talk is introductory in nature and is suited for all audiences\, i
 ncluding:\n\n  - ordinary people interested in the future of chat technolo
 gy\;\n  - corporate spies interested in the future of chat technology\; an
 d\n  - IRC connoisseurs interested in new perspectives.\n\nThe contents of
  the talk will occasionally require a good understanding of computer scien
 ce\, but I will make sure to always give the big picture as well.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20190813T100000Z
DTEND:20190813T110000Z
DTSTAMP:20260407T083857Z
UID:15656904-0019-233c-172e-850d7dc48e7a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/lunch-break/\n\
 nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break. Rememb
 er to drink water.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Dataetisk Råd - Kan vi overhovedet bruge det til noget?
DTSTART:20190813T110000Z
DTEND:20190813T123000Z
DTSTAMP:20260407T083857Z
UID:15656940-0019-303e-3242-b3e2a3245099
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/dataetisk-rad-k
 an-vi-overhovedet-bruge-det-til-noget/\n\nSpeaker(s): Panel 1\n\nRecorded:
  Yes\n\nStreamed: Yes\n\nIt-folk begynder i højere og højere grad at sig
 e fra. Især når teknologien bruges til at krydse nogle grænser for hvad
  der er passende for et demokratisk og åbent samfund.\n\nI Danmark har de
 t især været kampen for privacy og imod overvågning der har fyldt debat
 ten.\n\nI USA er der dog begyndt at komme nye vinde. 20. juni 2018 skrev 3
 00 medarbejdere hos Microsoft i et åbent brev til firmaets administrerend
 e direktør under på\, at firmaet burde sætte familier og børn før ind
 tjening. De ønskede nemlig ikke\, at deres ansigtsgenkendelsesteknologi s
 kulle hjælpe præsident Trump med at adskille mødre og fædre fra deres 
 børn ved den mexicanske grænse.\n\nSamme måned valgte over 3.100 af Goo
 gles softwareudviklere\, programmører og it-konsulenter at underskrive et
  åbent brev til ledelsen\, hvori de krævede\, at en aftale med Pentagon 
 blev skrottet. Deres arbejde med kunstig intelligens skulle bruges til vå
 ben og droner\, og det ville de ikke gå med til. Se evt. https://www.magi
 sterbladet.dk/magasinet/2019/magisterbladet-nr-4-2019/it-ansatte-kraever-b
 edre-etik\n\nI Danmark har vi ikke set tilsvarende aktioner blandt ansatte
 . Til gengæld har regeringen sidste år nedsat et dataetisk råd med eksp
 erter der skal rådgive folketinget. Bemærkelsesværdigt nok er der ikke 
 nogle udøvende it-professionelle i rådet.\n\nDet rejser nogle spørgsmå
 l:\n\n* Kan vi bruge sådan et dataetisk råd til noget når der ikke er f
 olk med fagkundskab i det?\n* Skal vi selv i større grad sige fra når de
 r laves software der ikke stemmer overens med vores personlige etik?\n* Ka
 n vi skabe en større forståelse om f.eks. privacy blandt rådets medlemm
 er?\n\nThis event will be moderated by Anders Kjærulff from the Danish ra
 dio program "Aflyttet".
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Implementing the LZO decompression algorithm
DTSTART:20190813T110000Z
DTEND:20190813T140000Z
DTSTAMP:20260407T083857Z
UID:15656940-0018-292e-8ba5-c00c0cd4f458
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/implementing-th
 e-lzo-decompression-algorithm/\n\nSpeaker(s): Joe\n\nRecorded: No\n\nStrea
 med: No\n\n#### Bring your beer\, leave with a working implementation of t
 he LZO decompression algorithm.\n\nPerhaps you want to use it on your Born
 Hack badge to cram more stuff into its tiny flash\, showcase the superiori
 ty of your ( favoritest || fastest || dependently-typed-est) programming l
 anguage\, or merely go to Mars [on your own terms](https://thehackernews.c
 om/2014/06/20-years-old-vulnerability-in-lzo.html).\n\nIn any case it's a 
 fun little exercise with a somewhat usable end result.\n\nI recently had t
 o implement it in order to read packets sent to [Robur](https://robur.io/)
 's OpenVPN reimplementation from servers that insist on using it.\n\n\n###
 # What is LZO\n\n[LZO](https://en.wikipedia.org/wiki/Lempel%E2%80%93Ziv%E2
 %80%93Oberhumer) is a sliding-window compression algorithm based on - well
 \, Markus Oberhumer's take on [Lempel-Ziv '77](https://en.wikipedia.org/wi
 ki/LZ77_and_LZ78).\n\nIf that sounds a tad academical to you\, have no fea
 r - the algorithm is simple\; it consists of two instructions:\n- copy X b
 ytes from the input string\, on the right of this instruction\n- copy X by
 tes from offset Y in the output buffer\, looping each time we reach the en
 d\n\nThere are eight ways to encode these single-byte instructions\, some 
 of them requiring additional operands to be read from the input string.\nE
 verything can be implemented with addition\, subtraction\, multiplication\
 , bit shifts\, and bit masks. No fancy math required.\n\nUnfortunately it 
 is pretty hard to find a description of how that works in practice\, and m
 ost people end up using either the [official C implementation](http://www.
 oberhumer.com/opensource/lzo/) or a directly translated\, unreadable port\
 , leading to gems like this [(source)](https://github.com/shevek/lzo-java/
 ):\n```\nThere is no version of LZO in pure Java. The obvious solution is 
 to take the C source code\, \nand feed it to the Java compiler\, modifying
  the Java compiler as necessary to make it compile.\n```\n\nWe can do bett
 er\, and we can do so in an afternoon.\n\n\n#### What should you bring:\n\
 n- A working tool chain for whatever programming language you want to use\
 n- A skeleton project directory that contains the following:\n  - decompre
 ss(compressed_string) function that returns the decompressed string\n  - d
 ecompress_hex(compressed_string_in_hexadecimal) function that decodes the 
 input before calling decompress() and returns the result in hexadecimal as
  well\n  - read_file(filename) function that calls decompress() on the fil
 e contents and outputs it either on the terminal or to a file\n- (not requ
 ired) Bonus points awarded for basic familiarity with the [Test Anything P
 rotocol (TAP)](http://testanything.org/) tooling for your language and a T
 AP producer for use with decompress_hex() so that we can do interoperabili
 ty testing between our implementations\n\n\n#### What will be provided:\n\
 n- A presentation about / walkthrough of how LZO decompression works\n  - 
 Slides for the presentation provided in A4-shaped compact dead trees.\n- M
 agic constants in pseudo-code\, and my OCaml implementation for reference\
 n- Test vectors for your unit tests\, both in binary files and as hex-enco
 ded TAP documents\n- Q&A and encouraging words of comfort throughout the w
 orkshop\n\n\n#### Will we be implementing a compression algorithm too?\n\n
 If we have time!\nIt is very easy to write a compressor that can compress 
 repeated strings of a single character\, so that we can definitely do\; mo
 re advanced strategies will be left to the imagination of the participants
 .\nWhile the decompression algorithm is set in stone\, compression depends
  on a strategy for achieving compression using chains of the aforementione
 d instructions and operands\, so there are many ways to go about it.
LOCATION:Workshop Room 1
END:VEVENT
BEGIN:VEVENT
SUMMARY:Det kontantløse samfund
DTSTART:20190813T123000Z
DTEND:20190813T140000Z
DTSTAMP:20260407T083857Z
UID:15656994-0019-304d-3d4a-2adea7849f1b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/det-kontantlse-
 samfund/\n\nSpeaker(s): Panel 2\, Tobias Fonsmark\n\nRecorded: Yes\n\nStre
 amed: Yes\n\nThis event is a Panel Discussion in Danish. The topic of the 
 Discussion is the growing demand from many Danish politicians\, to allow m
 ore and more shops not to accept cash but only accept credit cards and oth
 er digital based methods of paying.\n\nMost fixed and variable expenses fr
 om Danish households passes through one single payment infrastructure\, wh
 ich makes it possible to know lots of details concerning peoples habits\, 
 viewpoints and membership of political parties etc.\n\nNow this knowledge 
 might grow broader\, since many Danish politicians wants to constrain - an
 d perhaps along the way avoid - the use of cash.\n\nCash seems to be consi
 dered more and more as potentially dirty\, perhaps because they could have
  been earned without taxation.\n\nOn the other hand cash is still the only
  feasible way to pay for goods and services in a secure and anonymous way.
 \n\nShould the Danes give up their own privacy when paying\, to make sure 
 that their neighbors can't get away with cheating?\n\nThat dilemma is what
  this debate is about.\n\nThis event will be moderated by Anders Kjærulff
  from the Danish radio program "Aflyttet".
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Making use of Futhark\, a purely functional GPU programming langua
 ge
DTSTART:20190813T140000Z
DTEND:20190813T150000Z
DTSTAMP:20260407T083857Z
UID:15657048-0019-2513-1044-9112403463d9
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/making-use-of-f
 uthark-a-purely-functional-gpu-programming-language/\n\nSpeaker(s): Troels
  Henriksen\n\nRecorded: Yes\n\nStreamed: Yes\n\nFuthark is a data-parallel
  programming language that has been invented\nto ease the programming of m
 assively parallel computers\, mostly\nnotably GPUs.  Futhark is a purely f
 unctional language\, and so cannot\nin principle interact with the outside
  world at all.  Since people\nlike being able to write programs that actua
 lly do things\, this\npresents a challenge.  I will talk about how Futhark
  is actually\nusable in practice\, and show what the programming experienc
 e is\nactually like with some live hacking.\n\nFurther\, Futhark is develo
 ped by a very small team\, which is primarily\ninterested in doing compile
 r development.  Yet for a language to be\npractically useful\, it still ne
 eds supporting infrastructure such as\npackage repositories\, documentatio
 n generators\, and robust testing.\nEstablished language often have teams 
 for handling such tasks.  I will\ntalk about how we have organised develop
 ment of the Futhark project\nitself to obtain robust and reliable infrastr
 ucture and tools\, but\nrequiring a minimum of maintenance.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Geeky Jewelry
DTSTART:20190813T140000Z
DTEND:20190813T160000Z
DTSTAMP:20260407T083857Z
UID:15657048-0018-2665-cfd3-d5c20f744a5b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/geeky-jewelry/\
 n\nSpeaker(s): Moem\n\nRecorded: No\n\nStreamed: No\n\nIn this workshop\, 
 we'll be using computer parts and electronic components to make jewelry. I
 'll be bringing lots of materials but you can also bring your own. It can 
 be as simple as making pretty earrings from colourful resistors\, but we c
 an also venture into more complicated things... let's see what happens. Th
 is workshop is suitable for pretty much everyone\, including children of 7
  years old and up\; it's probably a great parent-and-child activity. Let's
  make some pretty shinies to take home... le geek\, c'est chique!
LOCATION:Workshop Room 1
END:VEVENT
BEGIN:VEVENT
SUMMARY:Public collaboration and open source in OS2-Offentligt Digitaliser
 ingsfællesskab
DTSTART:20190813T150000Z
DTEND:20190813T160000Z
DTSTAMP:20260407T083857Z
UID:15657084-0019-3008-d42b-e49aa3e4fa5a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/public-collabor
 ation-and-open-source-in-os2-offentligt-digitaliseringsfllesskab/\n\nSpeak
 er(s): Jens Kjellerup\n\nRecorded: Yes\n\nStreamed: Yes\n\nHow do municipl
 alities in Denmark coorporate\, develop and govern software in the OS2-off
 enligt digitaliseringsfællesskab and why are the software released under 
 a open source license.\nWhat is OS2-Offentligt Digitaliseringsfællesskab 
 and what does it do.\nWhat kind of digital products does OS2 develop.\nHow
  do OS2 govern the development process\, the software and how do the commu
 nity coorporate with commercial vendors\nWhat describes the maturity of th
 e individual projects and what impact does the maturity level on the deman
 ds to the projects
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Security challenges faced by journalists
DTSTART:20190813T160000Z
DTEND:20190813T170000Z
DTSTAMP:20260407T083857Z
UID:15657120-0019-2596-8a69-7725e704ec1b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/security-challe
 nges-faced-by-journalists/\n\nSpeaker(s): Jurre van Bergen\n\nRecorded: Ye
 s\n\nStreamed: Yes\n\nHow do you secure a large group of international jou
 rnalists? Where do you start? What are the challenges? What might be some 
 solutions? How do you figure out if they are infected with malware? This t
 alk will provide a deep dive into the challenges that journalists face in 
 2019\, how we are working on countering these threats and how you can help
 !
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:A brief look at the root cause of most Spanish security issues
DTSTART:20190813T180000Z
DTEND:20190813T190000Z
DTSTAMP:20260407T083857Z
UID:15657192-0019-2387-2af9-6813b9a41b4a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/a-brief-look-at
 -the-root-cause-of-most-spanish-security-issues/\n\nSpeaker(s): Klondike\n
 \nRecorded: No\n\nStreamed: No\n\nIn this talk we will talk about how the 
 different particularities of the spanish ecosystem converge into a system 
 were insecurity is rampant. We will also discuss how many of these particu
 larities affect other countires\, what are the root causes behind these is
 sues and what can be done to minimize their future impact.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hacker Jeopardy (Finals)
DTSTART:20190813T200000Z
DTEND:20190813T213000Z
DTSTAMP:20260407T083857Z
UID:15657264-0019-3108-75bc-eea868947599
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/hacker-jeopardy
 -finals/\n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nThe wi
 nner teams from the first round competes in one final battle of jeopardy.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tesla Coil Demo + Information
DTSTART:20190813T213000Z
DTEND:20190813T223100Z
DTSTAMP:20260407T083857Z
UID:15657318-0019-3061-0dd1-5b6e6b0469f8
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/tesla-coil-demo
 -information/\n\nSpeaker(s): Bruce Helsen\n\nRecorded: No\n\nStreamed: No\
 n\nThere will be a small presentation of the workings of a Tesla Coil.\nAf
 ter that there will be an interactive demo of a Spark Gap Tesla Coil.\n\nB
 ring your tin foil hats!
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Libreboot flashing + GNU flags giveaway
DTSTART:20190814T080000Z
DTEND:20190814T100000Z
DTSTAMP:20260407T083857Z
UID:15657696-0018-2485-8cd5-3f597584b6fb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/libreboot-flash
 ing/\n\nSpeaker(s): Florentin\, marco\n\nRecorded: No\n\nStreamed: No\n\n%
 %%%%%%%%%%%%%%%%%%%\n// Pay-Attention-Please: //\n%%%%%%%%%%%%%%%%%%%%\n\n
 /////////////////\n\nDue to unforeseen events\, me\, Marco\, I can not be 
 at BornhHack nor @ ccc\, I got an health problem\, but Florentin\, one of 
 the core member of Technoethical will be present\, with GNU flags to give 
 away and adapters at a discounted price\, he is the one that was helping m
 e remotely last year\, so you are in very good hands!!! Have fun @ bornhac
 k also for me and take care.\n\nMarco.\n\n/////////////////\n\nLast year t
 he Libreboot workshop was a real hit!!!!\n\nOne (1) X200 tablet successful
 ly flashed. He did all the work too. I wasn't even fully awake yet.\n\nI r
 emember one hacker mentioning he had an X200 at home\, so there is a fat c
 hance that last year number could be replicated even this year. :)  {~O~|~
 _\\o/_~|~O~} \n\nTo be honest I don't really love flashing stuff\, but I e
 njoy sharing the small knowledge I have\, and I also like to share the not
 es I have on libreboot. I do flash from time to time\, but I am not as kno
 wledgeable as the typical flasher probably.\n\nSo if anyone has a Libreboo
 t compatible chip\, why not flash it? If someone better then me want to hi
 jack the workshop\, I wont oppose it\, I actually encourage this\, but the
 n I will probably try to learn something new from the hijacking hacker. \n
 \nOf course all thanks to Coreboot\, without that project\, probably there
  would be no Libreboot. I never forget that the main thank goes to Richard
  Matthew Stallman. What an hacker he is.\n\nLast year I gave a small talk\
 , I am ignorant\, I only talk about things that I pretty much get\, like t
 he importance of freedom and sharing and the gratefulness I have towards h
 ackers.\n\nThe RepRap part of that talk\,\nhttps://www.youtube.com/watch?v
 =fFGMDT6IKHc\nfor example\, was made for just one (1) hacker that told me\
 , the day before the talk\, that he never heard about the project\, nothin
 g to be ashamed of\, 10 years ago some hackers where 10 years old... some 
 even younger.\n\nDo I really feel old yet? Not even a bit.\n\nIt is part o
 f the openhardware movement history the RepRap project. Do I love that pro
 ject? I do. Totally\, 3D printers is what I have dreamed of since I was a 
 child\, even if they were known as rapid prototyping machines. I managed t
 o build mine in 2011\, it took me just 6 months.\n\nIt is important to nev
 er take for granted knowledge\, at any level.\n\nAll minds are equally bea
 utiful and different at the same time.\n\nFlashing Libreboot is of course 
 free of charge. \n\nIt has to be sustainable\n\nI'll try to bring equipmen
 t to flash two (2) chips at the same time doubling the potential of this w
 orkshop compared to last year event. \n\n[*]https://www.youtube.com/watch?
 v=b3uX5XwdN_8&t=151 [rms hacker definition]
LOCATION:Workshop Room 1
END:VEVENT
BEGIN:VEVENT
SUMMARY:Wolf in Sheep’s Clothing - updated
DTSTART:20190814T090000Z
DTEND:20190814T100000Z
DTSTAMP:20260407T083857Z
UID:15657732-0019-297c-6346-2623eff412cb
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/wolf-in-sheeps-
 clothing-updated/\n\nSpeaker(s): Benoit Ancel\n\nRecorded: No\n\nStreamed:
  No\n\nDespite the breach of both Hacking Team and FinFisher\, the governm
 ent malware industry remains a shady market. Due to the amount of secrecy 
 involved\, it becomes increasingly more complicated to follow the technolo
 gies utilized by these companies and their modus operandi. The lack of tra
 nsparency can be beneficial when one works with government-related operati
 ons. However\, it can also be of benefit to any profit-driven actor\, who 
 will notice the potential for easy income in such conditions of the market
 . During our daily monitoring\, we have managed to find a fake 'Google Chr
 ome Update' landing page\, which we believe is used by a company in its sp
 yware campaigns. The page was designed for infection of Windows\, iOS and 
 Android devices. Soon\, we were surprised to find a publicly open control 
 panel server. This open C&C has given us the opportunity to collect a vari
 ety of precious data: details about the malware\, photos and audio recordi
 ngs from the testing phones\, victims' data\, and a storage of database ba
 ckups of the control server. After analysis of the findings\, we have figu
 red out that this company appears to be reselling commercial spyware as go
 vernment espionage spyware. Despite the surprisingly poor quality of the p
 roducts\, we have seen the company do business with serious companies of t
 he legal malware market and even with a government-related institution. Wh
 ile oblivious to the state of its operational security\, the company relie
 s simply on making a good impression on potential customers. We propose to
  present to you some of the work and the achievements of a peculiar German
  company that 'develops advanced big data systems\, cybersecurity & AI\, a
 nd data extraction solutions for the government and homeland security sect
 ors'.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch Break
DTSTART:20190814T100000Z
DTEND:20190814T110000Z
DTSTAMP:20260407T083857Z
UID:15657768-0019-233c-172e-850d7dc48e7a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/lunch-break/\n\
 nSpeaker(s): \n\nRecorded: No\n\nStreamed: No\n\nDaily lunch break. Rememb
 er to drink water.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lightning talks
DTSTART:20190814T110000Z
DTEND:20190814T120000Z
DTSTAMP:20260407T083857Z
UID:15657804-0019-255d-d001-a81eb47460a9
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/lightning-talks
 /\n\nSpeaker(s): BornHack\n\nRecorded: Yes\n\nStreamed: Yes\n\nDo a 5 min.
  presentation about a topic you find interesting.\n\nSign up talks via the
  website's normal talk submission system. Please add a link to your slides
  to your talk proposal. We will assign a 5 minute time slot after we have 
 received your slides. If you don't use slides for your talk a title slide 
 is enough. Please make sure your slides are in PDF or HTML (a URL is fine)
  format. You can update your slides until half an hour before the lightnin
 g talk event when we will download the final versions. We will schedule ta
 lks where we have to switch the laptop in the end to avoid delays.\n\nWedn
 esday:\n\n13:00: [markdown+latex+gitlab -> automatically updated PDFs](htt
 ps://bornhack.dk/bornhack-2019/program/markdownlatexgitlab-automatically-u
 pdated-pdfs/) (Morten Nielsen)\n\n13:07: [Creating slides using LaTeX](htt
 ps://bornhack.dk/bornhack-2019/program/creating-slides-using-latex/) (Kram
 se)\n\n13:14: [IT security education at UCL](https://bornhack.dk/bornhack-
 2019/program/it-security-education-at-ucl/) (Morten Nielsen)\n\n13:21: [St
 atus of data.coop 2019](https://bornhack.dk/bornhack-2019/program/status-o
 f-datacoop-2019/) (Benjamin Balder Bach)\n\n13:28: [Not Invented Here: My 
 email stack](https://bornhack.dk/bornhack-2019/program/not-invented-here-m
 y-email-stack/) (Niels G. W. Serup)\n\n13:35: [PSA: Final call for IPv4](h
 ttps://bornhack.dk/bornhack-2019/program/psa-final-call-for-ipv4/) (Asbjø
 rn Sloth Tønnesen)\n\n13:42:\n\n13:49: [Genode](https://bornhack.dk/bornh
 ack-2019/program/genode/) (Emery)
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:State of the network
DTSTART:20190814T120000Z
DTEND:20190814T130000Z
DTSTAMP:20260407T083857Z
UID:15657840-0019-262d-4b1f-c4a3ee446f78
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/state-of-the-ne
 twork/\n\nSpeaker(s): BornHack\n\nRecorded: Yes\n\nStreamed: Yes\n\nCome a
 nd meet the network team who will talk about the design and operation of t
 he network at BornHack.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:A walk down memory lane - Home computing in the 70's and 80's
DTSTART:20190814T130000Z
DTEND:20190814T140000Z
DTSTAMP:20260407T083857Z
UID:15657876-0019-2850-db66-8b5f8cf43b9b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/a-walk-down-mem
 ory-lane-25-years-of-home-computing/\n\nSpeaker(s): Mike from "RetroComput
 ing With Mike"\n\nRecorded: Yes\n\nStreamed: Yes\n\nHi! My name is Mike\, 
 i have a passion for old preserving computers\, i have prepared a talk abo
 ut the most significant 25 years of home computing\, which incidentally ha
 ppens to be the last 25 years of the last century\, at least of you ask me
 .\n\nThere will be pictures\, stories and time for questions. Bring popcor
 n.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Bornhack DECT network 2019 edition
DTSTART:20190814T140000Z
DTEND:20190814T150000Z
DTSTAMP:20260407T083857Z
UID:15657912-0019-2370-2d74-b6211ed4aa5b
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/bornhack-dect-n
 etwork-2019-edition/\n\nSpeaker(s): Klondike\n\nRecorded: Yes\n\nStreamed:
  Yes\n\nIn this talk we will share our experiences creating the DECT and t
 elephony network for this year's bornhack.
LOCATION:Speakers Tent
END:VEVENT
BEGIN:VEVENT
SUMMARY:Goodbye World
DTSTART:20190814T150000Z
DTEND:20190814T160000Z
DTSTAMP:20260407T083857Z
UID:15657948-0019-231d-125e-4f2c5d54573a
DESCRIPTION:URL: https://bornhack.dk/bornhack-2019/program/goodbye-world/\
 n\nSpeaker(s): BornHack\n\nRecorded: No\n\nStreamed: No\n\nBornHack 2019 i
 s almost over at this point. We would like to say farewell for now and see
  you again at the next event in 2020.\n\nWe will walk over what we believe
  has worked and what we believe should change the next event. This is an e
 xcellent opportunity to submit ideas for BornHack 2020 while the memories 
 are still fresh.
LOCATION:Speakers Tent
END:VEVENT
END:VCALENDAR
