diff --git a/README.md b/README.md
index 05094eb3665ac4fe53599f565586663765acd5aa..42d8394838d8712cbf1c909ba12f56bae0fdc9c9 100644
--- a/README.md
+++ b/README.md
@@ -84,6 +84,7 @@ SESSION_COOKIE_DOMAIN = None
 IS_API = True
 IS_FRONTEND = True
 EMAIL_BACKEND = 'django.core.mail.backends.console.EmailBackend'  # "send" emails as console output
+PLAINUI_CONFERENCE = '40ba6cda-1970-409f-81ef-efb87ef09d95' # change this to the id of your conference you want to display in frontend (matches the one from rc3_2020.json)
 
 DATABASES = {
     'default': {
@@ -98,7 +99,8 @@ DATABASES = {
 ```
 8. Lege die Datenbanktabellen an: `./manage.py migrate`
 9. Richte einen Admin-Nutzer (für die Anwendung) ein: `./manage.py createsuperuser`
-10. optional: Import von Demo-Daten: `./manage.py loaddata ./fixtures/36c3-and-dummy-rc3.json`
+10. optional: Import von Demo-Daten: `./manage.py loaddata ./core/fixtures/rc3_2020.json`
+11. optional: Für deinen Adminuser via [Admin-Seite](http://localhost:8000/c3admin/) einen `ConferenceMember` anlegen um den User für das Frontend freizuschalten
 
 ## Nutzung
 
diff --git a/src/core/fixtures/rc3_2020.json b/src/core/fixtures/rc3_2020.json
new file mode 100644
index 0000000000000000000000000000000000000000..ce0c6fd697669104eaf2b03718589dda90402135
--- /dev/null
+++ b/src/core/fixtures/rc3_2020.json
@@ -0,0 +1,1746 @@
+[
+    {
+        "fields": {
+            "additional_fields_schema": null,
+            "board_disabled": false,
+            "end": "2021-12-30T20:00:00Z",
+            "global_notification": "",
+            "is_public": true,
+            "name": "Remote Chaos Experience",
+            "registration_deadline": "2021-12-20T23:42:00Z",
+            "self_organized_sessions_assembly": null,
+            "send_pn_disabled": false,
+            "slug": "rc3",
+            "start": "2021-12-27T10:00:00Z",
+            "support_clusters": false,
+            "timezone": "Europe/Berlin"
+        },
+        "model": "core.conference",
+        "pk": "40ba6cda-1970-409f-81ef-efb87ef09d95"
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "CCC",
+            "slug": "CCC"
+        },
+        "model": "core.conferencetrack",
+        "pk": 1
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "Community",
+            "slug": "Community"
+        },
+        "model": "core.conferencetrack",
+        "pk": 2
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "Security",
+            "slug": "Security"
+        },
+        "model": "core.conferencetrack",
+        "pk": 3
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "Art & Culture",
+            "slug": "Art-Culture"
+        },
+        "model": "core.conferencetrack",
+        "pk": 4
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "Ethics, Society & Politics",
+            "slug": "Ethics-Society-Politics"
+        },
+        "model": "core.conferencetrack",
+        "pk": 5
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "Fireside Chat",
+            "slug": "Fireside-Chat"
+        },
+        "model": "core.conferencetrack",
+        "pk": 6
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "Hardware & Making",
+            "slug": "Hardware-Making"
+        },
+        "model": "core.conferencetrack",
+        "pk": 7
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "IT-Security",
+            "slug": "IT-Security"
+        },
+        "model": "core.conferencetrack",
+        "pk": 8
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "Science",
+            "slug": "Science"
+        },
+        "model": "core.conferencetrack",
+        "pk": 9
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "Other",
+            "slug": "other"
+        },
+        "model": "core.conferencetrack",
+        "pk": 10
+    },
+    {
+        "fields": {
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "is_public": true,
+            "name": "Music",
+            "slug": "Music"
+        },
+        "model": "core.conferencetrack",
+        "pk": 11
+    },
+    {
+        "fields": {
+            "assembly_link": "https://events.ccc.de/",
+            "assembly_location": "",
+            "is_virtual": true,
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "created": "2021-12-21T20:56:21.152Z",
+            "description": "",
+            "description_html": "",
+            "favorited_by": [],
+            "hierarchy": "regular",
+            "internal_comment": null,
+            "is_official": true,
+            "last_update_assembly": null,
+            "last_update_staff": null,
+            "name": "CCC",
+            "parent": null,
+            "public_contact": null,
+            "registration_data": null,
+            "registration_details": null,
+            "slug": "ccc",
+            "state_assembly": "confirmed",
+            "state_channel": "none",
+            "technical_user": null
+        },
+        "model": "core.assembly",
+        "pk": "5a035082-dd71-4b8f-8d6d-81464e6a727d"
+    },
+    {
+        "fields": {
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "backend_data": null,
+            "backend_link": null,
+            "backend_status": "new",
+            "blocked": false,
+            "capacity": 10000,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": null,
+            "description_html": null,
+            "director_data": null,
+            "is_public_fahrplan": true,
+            "name": "rC2",
+            "occupants": null,
+            "reserve_capacity": 20,
+            "room_type": "lecturehall",
+            "slug": "rc2"
+        },
+        "model": "core.room",
+        "pk": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a"
+    },
+    {
+        "fields": {
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "backend_data": null,
+            "backend_link": null,
+            "backend_status": "new",
+            "blocked": false,
+            "capacity": 10000,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": null,
+            "description_html": null,
+            "director_data": null,
+            "is_public_fahrplan": true,
+            "name": "rC1",
+            "occupants": null,
+            "reserve_capacity": 20,
+            "room_type": "lecturehall",
+            "slug": "rc1"
+        },
+        "model": "core.room",
+        "pk": "973ec154-a5b5-40ac-b4e8-b74137f647e8"
+    },
+    {
+        "fields": {
+            "conference_internal": false,
+            "link": "rc2",
+            "link_type": "media.ccc.de",
+            "name": "rc2",
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "send_token": "none"
+        },
+        "model": "core.roomlink",
+        "pk": 166
+    },
+    {
+        "fields": {
+            "conference_internal": false,
+            "link": "rc1",
+            "link_type": "media.ccc.de",
+            "name": "rc1",
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "send_token": "none"
+        },
+        "model": "core.roomlink",
+        "pk": 168
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Der netzpolitische Wetterbericht schaut zur\u00fcck und nach vorne: Was sind die aktuell relevantesten netzpolitischen Debatten und was erwartet uns im n\u00e4chsten Jahr? Welche Themen erhalten zu wenig Aufmerksamkeit und wo gab es Erfolge f\u00fcr die digitale Zivilgesellschaft?\r\n\r\n\n\n\r\nEine kleine Pandemie hielt in diesem Jahr die Politik, Medien und Gesellschaft in Atem. Auch wenn das alles \u00fcberlagerte, gab es leider noch viel mehr netzpolitische Debatten mehr, die etwas untergingen.\r\n\r\nDie Gro\u00dfe Koalition befindet sich auf der Zielgeraden und traditionell ist das ein Fest f\u00fcr mehr \u00dcberwachungsbefugnisse, auch auf europ\u00e4ischer Ebene durch die aktuelle deutsche Ratspr\u00e4sidentschaft. Verschl\u00fcsselung ist wichtig, soll aber trotzdem Hintert\u00fcren bekommen. IT-Sicherheit geht nur mit Staatstrojanern. Uploadfilter kommen, auch wenn das in der PR-Brosch\u00fcre anders versprochen wurde. \r\n\r\nDie EU-Kommission hat sich warm gelaufen, verschiedene Gesetzgebungsverfahren wie der Digital Servce Act oder die Dauerbrenner Verordnung gegen Terrorpropaganda und e-Evidence. \r\n",
+            "description_html": "<p>Der netzpolitische Wetterbericht schaut zur\u00fcck und nach vorne: Was sind die aktuell relevantesten netzpolitischen Debatten und was erwartet uns im n\u00e4chsten Jahr? Welche Themen erhalten zu wenig Aufmerksamkeit und wo gab es Erfolge f\u00fcr die digitale Zivilgesellschaft?</p>\n<p>Eine kleine Pandemie hielt in diesem Jahr die Politik, Medien und Gesellschaft in Atem. Auch wenn das alles \u00fcberlagerte, gab es leider noch viel mehr netzpolitische Debatten mehr, die etwas untergingen.</p>\n<p>Die Gro\u00dfe Koalition befindet sich auf der Zielgeraden und traditionell ist das ein Fest f\u00fcr mehr \u00dcberwachungsbefugnisse, auch auf europ\u00e4ischer Ebene durch die aktuelle deutsche Ratspr\u00e4sidentschaft. Verschl\u00fcsselung ist wichtig, soll aber trotzdem Hintert\u00fcren bekommen. IT-Sicherheit geht nur mit Staatstrojanern. Uploadfilter kommen, auch wenn das in der PR-Brosch\u00fcre anders versprochen wurde. </p>\n<p>Die EU-Kommission hat sich warm gelaufen, verschiedene Gesetzgebungsverfahren wie der Digital Servce Act oder die Dauerbrenner Verordnung gegen Terrorpropaganda und e-Evidence. </p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Der netzpolitische Wetterbericht 2020: ",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T18:00:00Z",
+            "schedule_start": "2021-12-28T17:00:00Z",
+            "slug": "rc3-11453-der_netzpolitische_wetterbericht_2020",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "03c67cc6-92e9-4f3c-9815-5d799b9a7f00"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Most synthesis goes from hardware description languages to FPGA bitstreams or ASIC designs, but what else can you do? In this talk I will demonstrate some more unconventional flows to inspire you about all the amazing experiments that are enabled by open source tools!\n\nAfter a short intro about the open source FPGA ecosystem, I will introduce a project by Dan Ravensloft and myself that synthesizes HDL to 74xx logic chips. Then I will cover a project of mine that synthesizes spreadsheets to HDL. And from there to 74xx logic???",
+            "description_html": "<p>Most synthesis goes from hardware description languages to FPGA bitstreams or ASIC designs, but what else can you do? In this talk I will demonstrate some more unconventional flows to inspire you about all the amazing experiments that are enabled by open source tools!</p>\n<p>After a short intro about the open source FPGA ecosystem, I will introduce a project by Dan Ravensloft and myself that synthesizes HDL to 74xx logic chips. Then I will cover a project of mine that synthesizes spreadsheets to HDL. And from there to 74xx logic???</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Unconventional HDL synthesis experiments",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-29T17:40:00Z",
+            "schedule_start": "2021-12-29T17:00:00Z",
+            "slug": "rc3-11384-unconventional_hdl_synthesis_experiments",
+            "track": 7
+        },
+        "model": "core.event",
+        "pk": "08dd87aa-0226-4461-9877-e8542dc64a33"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Willkommen zur ersten und hoffentlich einzigen Remote Chaos Experience!\n\n",
+            "description_html": "<p>Willkommen zur ersten und hoffentlich einzigen Remote Chaos Experience!</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "#rC3 Er\u00f6ffnung",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:30:00",
+            "schedule_end": "2021-12-27T11:50:00Z",
+            "schedule_start": "2021-12-27T11:20:00Z",
+            "slug": "rc3-11583-rc3_eroffnung",
+            "track": 2
+        },
+        "model": "core.event",
+        "pk": "090c24b4-34c9-432c-a848-41150439f8c9"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "When people develop carpal tunnel or various medical conditions, it can be difficult to use mainstream input mechanisms like keyboards, mice, and phone touchscreens. Ideally, accessible input mechanisms can be added to mainstream computers and phones. I will give two example demos. The first is using voice or eyelid blinks to control an ebook reader on a standard Android phone. The second is using speech recognition to interact with a Linux desktop, even to perform complicated tasks such as programming.\n\nWhen people develop carpal tunnel or various medical conditions, it can be difficult to use mainstream input mechanisms like keyboards, mice, and phone touchscreens. Such users might have to rely on speech recognition, eye tracking, head gestures, etc. Technology allows devices to understand these mechanisms as user input, and hence provide agency and a communication channel to the rest of the world.\r\n\r\nEvery person's case is a bit different. Sometimes, a fully custom system has to be designed, such as for Stephen Hawking. A team from Intel worked through many prototypes with him, saying: \"The design [hinged] on Stephen. We had to point a laser to study one individual.\" With custom hardware and custom software to detect muscle movements in his cheek, he still could only communicate a handful of words per minute.\r\n\r\nIn less severe situations, the goal is often to add accessible input mechanisms to mainstream computers and phones. Similarly, a blind person will adapt to using a normal smartphone, despite not being able to see the screen. It is not economical to design myriad variants of hardware to handle many different users who all have slightly different needs. Adapting mainstream devices allows a wide range of existing software to be used, from email clients to Google maps, without reinventing everything. \r\n\r\nIn my own case, I have a medical condition and cannot use my hands more than a certain threshold in a day. In order to keep reading books, I designed a speech recognition system and also an eyelid blink system to control an ebook reader app. As a computer programmer, I used to make heavy use of a keyboard to write code. With modern speech recognition, it is possible to design a spoken language that allows precise control over a computer. I will demo an open source voice coding system, and describe how it can be adapted to do any task on a desktop computer.",
+            "description_html": "<p>When people develop carpal tunnel or various medical conditions, it can be difficult to use mainstream input mechanisms like keyboards, mice, and phone touchscreens. Ideally, accessible input mechanisms can be added to mainstream computers and phones. I will give two example demos. The first is using voice or eyelid blinks to control an ebook reader on a standard Android phone. The second is using speech recognition to interact with a Linux desktop, even to perform complicated tasks such as programming.</p>\n<p>When people develop carpal tunnel or various medical conditions, it can be difficult to use mainstream input mechanisms like keyboards, mice, and phone touchscreens. Such users might have to rely on speech recognition, eye tracking, head gestures, etc. Technology allows devices to understand these mechanisms as user input, and hence provide agency and a communication channel to the rest of the world.</p>\n<p>Every person's case is a bit different. Sometimes, a fully custom system has to be designed, such as for Stephen Hawking. A team from Intel worked through many prototypes with him, saying: \"The design [hinged] on Stephen. We had to point a laser to study one individual.\" With custom hardware and custom software to detect muscle movements in his cheek, he still could only communicate a handful of words per minute.</p>\n<p>In less severe situations, the goal is often to add accessible input mechanisms to mainstream computers and phones. Similarly, a blind person will adapt to using a normal smartphone, despite not being able to see the screen. It is not economical to design myriad variants of hardware to handle many different users who all have slightly different needs. Adapting mainstream devices allows a wide range of existing software to be used, from email clients to Google maps, without reinventing everything. </p>\n<p>In my own case, I have a medical condition and cannot use my hands more than a certain threshold in a day. In order to keep reading books, I designed a speech recognition system and also an eyelid blink system to control an ebook reader app. As a computer programmer, I used to make heavy use of a keyboard to write code. With modern speech recognition, it is possible to design a spoken language that allows precise control over a computer. I will demo an open source voice coding system, and describe how it can be adapted to do any task on a desktop computer.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Accessible input for readers, coders, and hackers",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-27T18:40:00Z",
+            "schedule_start": "2021-12-27T18:00:00Z",
+            "slug": "rc3-11436-accessible_input_for_readers_coders_and_hackers",
+            "track": 7
+        },
+        "model": "core.event",
+        "pk": "092d83e0-5377-4aad-86c5-7619c53db897"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Lesung aus \"Die Unvollkommenen\", Vorstellung des aktuellen Buchprojekts \"PANTOPIA\" und lockere Q&A mit der deutschen SciFi-Bestsellerautorin.\n\n",
+            "description_html": "<p>Lesung aus \"Die Unvollkommenen\", Vorstellung des aktuellen Buchprojekts \"PANTOPIA\" und lockere Q&amp;A mit der deutschen SciFi-Bestsellerautorin.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Theresa Hannig \u2013 Fireside Chat",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-27T21:20:00Z",
+            "schedule_start": "2021-12-27T20:20:00Z",
+            "slug": "rc3-11581-theresa_hannig_fireside_chat",
+            "track": 6
+        },
+        "model": "core.event",
+        "pk": "0a3c687b-f62d-42f7-98b2-3b1163b9a73e"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "They stole our future. Let's take it back.\n\nHere at the end of the world, it's time to take stock. Is technology a force for good? Can it be? Was it ever? How did we end up with a world made up of \"five websites, each filled with screenshots of text from the other four\" (h/t Tom Eastman)? Should we worry that machine learning will take away our free will through A/B splitting and Big Five Personality Types? Where the fuck did all these Nazis come from? ",
+            "description_html": "<p>They stole our future. Let's take it back.</p>\n<p>Here at the end of the world, it's time to take stock. Is technology a force for good? Can it be? Was it ever? How did we end up with a world made up of \"five websites, each filled with screenshots of text from the other four\" (h/t Tom Eastman)? Should we worry that machine learning will take away our free will through A/B splitting and Big Five Personality Types? Where the fuck did all these Nazis come from? </p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "What the cyberoptimists got wrong - and what to do about it",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-27T18:40:00Z",
+            "schedule_start": "2021-12-27T18:00:00Z",
+            "slug": "rc3-11337-what_the_cyberoptimists_got_wrong_-_and_what_to_do_about_it",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "0d268ba5-3810-42fd-9d86-cfc0571a38d5"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Lesung aus N.S.A. und lockeres Gespr\u00e4ch mit dem deutschen SciFi-Autor.\n\nMitmachen unter: https://firesidechats.rc3.world/fire/HztHabArJE/join",
+            "description_html": "<p>Lesung aus N.S.A. und lockeres Gespr\u00e4ch mit dem deutschen SciFi-Autor.</p>\n<p>Mitmachen unter: https://firesidechats.rc3.world/fire/HztHabArJE/join</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Andreas Eschbach \u2013 Fireside Chat",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-29T21:40:00Z",
+            "schedule_start": "2021-12-29T20:40:00Z",
+            "slug": "rc3-11580-andreas_eschbach_fireside_chat",
+            "track": 6
+        },
+        "model": "core.event",
+        "pk": "159aa64d-4952-413d-82a7-cc949febca50"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "    [EN] The OPENCOIL exhibition explores the impact of micro-mobility services on urban space by using its decentralised infrastructure as an exhibition space, while also addressing the conditions and effects of this infrastructure.\r\n\r\n    [DE] Die Ausstellung OPENCOIL setzt sich mit den Auswirkungen von Mikro-Mobilit\u00e4tsdiensten auf den Stadtraum auseinander, indem sie ihre dezentrale Infrastruktur als Ausstellungsraum nutzt und gleichzeitig die Bedingungen und Auswirkungen dieser Infrastrukturen auch zum Thema macht.\n\n[EN] 11 artists were invited to present their work on a small Wifi controller with ~2MB offline memory.\r\n\r\nThese \"digital gallery spaces\" are attached to 11 randomly selected e-scooters. Thus the exhibition, unnoticed by the regular users of these scooters, drives through the city as a \"roaming speed show\".\r\n\r\nWhile capacity restrictions and the preferred avoidance of gatherings in closed spaces pose challenges on traditional galleries and museums, OPENCOIL aims to combine the independence of the online with the materiality of the offline (and vice versa). The infrastructure of \"micro-mobility services\" will be taken over - climate-neutral and decentralised.\r\n\r\nThe pavements of many cities around the world have been flooded in recent years by so-called 'dockless sharing vehicles'. With promises of eco-friendliness and electromobility, these risk capitalism activists have occupied the grey zone between private and public space on the streets of our cities. However, this unscrupulous conscientiousness of 'micro-mobility services' raises important questions about urban space, ownership, agency, production, ecology and very late capitalism.\r\n\r\nHow to deal with the occupation of public space? What tools and ways are there to reclaim it?\r\n\r\nOPENCOIL is not only meant to be a pandemic-proof way to show art in public offline space. OPENCOIL is also a creative (re)use of e-scooters, an attempt to approach them by artistic means. On show are works that deal with questions of the overlap between public and private space, the use of resources, as well as greenwashing, risk capitalism and vandalism.\r\n\r\nThe participating artists are:\r\n\r\nAram Bartholl\r\nConstant Dullaart\r\nDennis de Bel & Anton Jehle\r\nJODI\r\nJonas Lund\r\nMartin Howse\r\n!Mediengruppe Bitnik\r\nRosa Menkman\r\nSarah Grant\r\nSofya Aleynikova\r\nDanja Vasiliev\r\n\r\n\r\n[DE] 11 K\u00fcnstler*innen wurden eingeladen, ihre Arbeiten auf einem kleinen Wifi Controller mit ~2MB Offline-Speicher zu pr\u00e4sentieren.\r\n\r\nDiese \u201edigitalen Galerier\u00e4ume\u201c werden an 11 zuf\u00e4llig ausgew\u00e4hlten E-Scootern angebracht.\r\nSo f\u00e4hrt die Ausstellung, von den Nutzer*Innen der Roller unbemerkt, als \u201eroaming Speedshow\u201c durch die Stadt.\r\n\r\nW\u00e4hrend Kapazit\u00e4tsbeschr\u00e4nkungen und die bevorzugte Vermeidung von Zusammenk\u00fcnften in geschlossenen R\u00e4umen, traditionelle Galerien und Museen vor Herausforderungen stellen, zielt OPENCOIL darauf ab, die Ortsunabh\u00e4ngigkeit des Online mit der Materialit\u00e4t des Offline (und umgekehrt) zu verbinden. Die Infrastruktur der \u201eMikro-Mobiltit\u00e4tsdienste\u201c wird \u00fcbernommen \u2013 klimaneutral und dezentral.\r\n\r\nDie Gehwege vieler St\u00e4dte auf der ganzen Welt wurden in den letzten Jahren von sogenannten 'dockless sharing vehicles' regelrecht \u00fcberflutet. Mit Versprechungen von Umweltfreundlichkeit und Elektromobilit\u00e4t, besetzten diese Risikokapitalismus Aktivisten die Grauzone zwischen privatem und \u00f6ffentlichem Raum auf den Stra\u00dfen unserer St\u00e4dte. Diese gewissenlose Gewissenhaftigkeit der \"Mikro-Mobilit\u00e4tsdienste\" wirft jedoch wichtige Fragen zu st\u00e4dtischem Raum, Eigentum, Agentur, Produktion, \u00d6kologie und sehr sp\u00e4tem Kapitalismus auf.\r\n\r\nWie umgehen mit der Inbesitznahme \u00f6ffentlichen Raums?\r\nWelche Werkzeuge und Wege gibt es sich diesen zur\u00fcckzuerobern?\r\n\r\nOPENCOIL soll nicht nur ein Pandemie-tauglicher Weg sein, um Kunst im \u00f6ffentlichen Offline-Raum zu zeigen. OPENCOIL ist auch eine kreative (Um-)Nutzung von E-Scootern, ein Versuch, sich ihnen mit k\u00fcnstlerischen Mitteln zu n\u00e4hern.\r\nGezeigt werden Arbeiten, die sich mit Fragen der \u00dcberschneidung von \u00f6ffentlichem und privatem Raum, dem Umgang mit Ressourcen sowie mit Greenwashing, Risikokapitalismus und Vandalismus befassen.\r\n\r\nDie teilnehmenden K\u00fcnstler*innen sind:\r\n\r\nAram Bartholl\r\nConstant Dullaart\r\nDennis de Bel & Anton Jehle\r\nJODI\r\nJonas Lund\r\nMartin Howse\r\n!Mediengruppe Bitnik\r\nRosa Menkman\r\nSarah Grant\r\nSofya Aleynikova\r\nDanja Vasiliev",
+            "description_html": "&lt;div class=\"codehilite\"&gt;<pre>&lt;span&gt;&lt;/span&gt;<code>&lt;span class=\"o\"&gt;[&lt;/span&gt;&lt;span class=\"n\"&gt;EN&lt;/span&gt;&lt;span class=\"o\"&gt;]&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;The&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;OPENCOIL&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;exhibition&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;explores&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;the&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;impact&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"k\"&gt;of&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;micro&lt;/span&gt;&lt;span class=\"o\"&gt;-&lt;/span&gt;&lt;span class=\"n\"&gt;mobility&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;services&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"k\"&gt;on&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;urban&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"nf\"&gt;space&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"k\"&gt;by&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"k\"&gt;using&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;its&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;decentralised&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;infrastructure&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"k\"&gt;as&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;an&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;exhibition&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"nf\"&gt;space&lt;/span&gt;&lt;span class=\"p\"&gt;,&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"k\"&gt;while&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;also&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;addressing&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;the&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;conditions&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"ow\"&gt;and&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;effects&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"k\"&gt;of&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;this&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;infrastructure&lt;/span&gt;&lt;span class=\"p\"&gt;.&lt;/span&gt;&lt;span class=\"w\"&gt;&lt;/span&gt;\n\n&lt;span class=\"o\"&gt;[&lt;/span&gt;&lt;span class=\"n\"&gt;DE&lt;/span&gt;&lt;span class=\"o\"&gt;]&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Die&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Ausstellung&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;OPENCOIL&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;setzt&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;sich&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;mit&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;den&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Auswirkungen&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;von&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Mikro&lt;/span&gt;&lt;span class=\"o\"&gt;-&lt;/span&gt;&lt;span class=\"n\"&gt;Mobilit\u00e4tsdiensten&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;auf&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;den&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Stadtraum&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;auseinander&lt;/span&gt;&lt;span class=\"p\"&gt;,&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;indem&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;sie&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;ihre&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;dezentrale&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Infrastruktur&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;als&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Ausstellungsraum&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;nutzt&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;und&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;gleichzeitig&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;die&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Bedingungen&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;und&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Auswirkungen&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;dieser&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Infrastrukturen&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;auch&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;zum&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;Thema&lt;/span&gt;&lt;span class=\"w\"&gt; &lt;/span&gt;&lt;span class=\"n\"&gt;macht&lt;/span&gt;&lt;span class=\"p\"&gt;.&lt;/span&gt;&lt;span class=\"w\"&gt;&lt;/span&gt;\n</code></pre>&lt;/div&gt;\n\n<p>[EN] 11 artists were invited to present their work on a small Wifi controller with ~2MB offline memory.</p>\n<p>These \"digital gallery spaces\" are attached to 11 randomly selected e-scooters. Thus the exhibition, unnoticed by the regular users of these scooters, drives through the city as a \"roaming speed show\".</p>\n<p>While capacity restrictions and the preferred avoidance of gatherings in closed spaces pose challenges on traditional galleries and museums, OPENCOIL aims to combine the independence of the online with the materiality of the offline (and vice versa). The infrastructure of \"micro-mobility services\" will be taken over - climate-neutral and decentralised.</p>\n<p>The pavements of many cities around the world have been flooded in recent years by so-called 'dockless sharing vehicles'. With promises of eco-friendliness and electromobility, these risk capitalism activists have occupied the grey zone between private and public space on the streets of our cities. However, this unscrupulous conscientiousness of 'micro-mobility services' raises important questions about urban space, ownership, agency, production, ecology and very late capitalism.</p>\n<p>How to deal with the occupation of public space? What tools and ways are there to reclaim it?</p>\n<p>OPENCOIL is not only meant to be a pandemic-proof way to show art in public offline space. OPENCOIL is also a creative (re)use of e-scooters, an attempt to approach them by artistic means. On show are works that deal with questions of the overlap between public and private space, the use of resources, as well as greenwashing, risk capitalism and vandalism.</p>\n<p>The participating artists are:</p>\n<p>Aram Bartholl\nConstant Dullaart\nDennis de Bel &amp; Anton Jehle\nJODI\nJonas Lund\nMartin Howse\n!Mediengruppe Bitnik\nRosa Menkman\nSarah Grant\nSofya Aleynikova\nDanja Vasiliev</p>\n<p>[DE] 11 K\u00fcnstler*innen wurden eingeladen, ihre Arbeiten auf einem kleinen Wifi Controller mit ~2MB Offline-Speicher zu pr\u00e4sentieren.</p>\n<p>Diese \u201edigitalen Galerier\u00e4ume\u201c werden an 11 zuf\u00e4llig ausgew\u00e4hlten E-Scootern angebracht.\nSo f\u00e4hrt die Ausstellung, von den Nutzer*Innen der Roller unbemerkt, als \u201eroaming Speedshow\u201c durch die Stadt.</p>\n<p>W\u00e4hrend Kapazit\u00e4tsbeschr\u00e4nkungen und die bevorzugte Vermeidung von Zusammenk\u00fcnften in geschlossenen R\u00e4umen, traditionelle Galerien und Museen vor Herausforderungen stellen, zielt OPENCOIL darauf ab, die Ortsunabh\u00e4ngigkeit des Online mit der Materialit\u00e4t des Offline (und umgekehrt) zu verbinden. Die Infrastruktur der \u201eMikro-Mobiltit\u00e4tsdienste\u201c wird \u00fcbernommen \u2013 klimaneutral und dezentral.</p>\n<p>Die Gehwege vieler St\u00e4dte auf der ganzen Welt wurden in den letzten Jahren von sogenannten 'dockless sharing vehicles' regelrecht \u00fcberflutet. Mit Versprechungen von Umweltfreundlichkeit und Elektromobilit\u00e4t, besetzten diese Risikokapitalismus Aktivisten die Grauzone zwischen privatem und \u00f6ffentlichem Raum auf den Stra\u00dfen unserer St\u00e4dte. Diese gewissenlose Gewissenhaftigkeit der \"Mikro-Mobilit\u00e4tsdienste\" wirft jedoch wichtige Fragen zu st\u00e4dtischem Raum, Eigentum, Agentur, Produktion, \u00d6kologie und sehr sp\u00e4tem Kapitalismus auf.</p>\n<p>Wie umgehen mit der Inbesitznahme \u00f6ffentlichen Raums?\nWelche Werkzeuge und Wege gibt es sich diesen zur\u00fcckzuerobern?</p>\n<p>OPENCOIL soll nicht nur ein Pandemie-tauglicher Weg sein, um Kunst im \u00f6ffentlichen Offline-Raum zu zeigen. OPENCOIL ist auch eine kreative (Um-)Nutzung von E-Scootern, ein Versuch, sich ihnen mit k\u00fcnstlerischen Mitteln zu n\u00e4hern.\nGezeigt werden Arbeiten, die sich mit Fragen der \u00dcberschneidung von \u00f6ffentlichem und privatem Raum, dem Umgang mit Ressourcen sowie mit Greenwashing, Risikokapitalismus und Vandalismus befassen.</p>\n<p>Die teilnehmenden K\u00fcnstler*innen sind:</p>\n<p>Aram Bartholl\nConstant Dullaart\nDennis de Bel &amp; Anton Jehle\nJODI\nJonas Lund\nMartin Howse\n!Mediengruppe Bitnik\nRosa Menkman\nSarah Grant\nSofya Aleynikova\nDanja Vasiliev</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "OPENCOIL \u2013 A Roaming Speedshow",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-29T21:40:00Z",
+            "schedule_start": "2021-12-29T20:40:00Z",
+            "slug": "rc3-11575-opencoil_a_roaming_speedshow",
+            "track": 4
+        },
+        "model": "core.event",
+        "pk": "19a6e064-8ef0-433c-8d0b-ca363297b467"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Bluetooth is still the best technology we have in a smartphone to implement exposure notifications. It is safe to use the Corona-Warn-App. Fight me! ;)\n\nWait, what, did Jiska just submit a talk claiming that Bluetooth is secure?! Is this just another 2020 plot twist?\r\n\r\nNo, it's not. Assuming that we need an app that enables exposure notifications based on distance measurements, Bluetooth is the best trade-off. Audio would be more accurate but requires permanent access to the microphone. GPS does not work indoors, Wi-Fi and LTE chips are less accessible through smartphone APIs, so we're left with Bluetooth. And Bluetooth LE Advertisements are actually a great choice for such a protocol, further reducing exploitability.\r\n\r\nAs someone who was involved in finding multiple Bluetooth security issues within chips and operating systems, Jiska should be more afraid of Bluetooth, you might think. However, attacking Bluetooth on an up-to-date smartphone with recent chips is very complex and requires physical proximity. Those using outdated smartphones face similar risks when browsing the Internet, without the physical proximity requirement.\r\n\r\nThere are other issues within the CWA, such as missing awareness of places like restaurants and public transport, and a health system that lacks fast test reports. We should care about real problems instead of claiming security issues that barely have an impact on average users.",
+            "description_html": "<p>Bluetooth is still the best technology we have in a smartphone to implement exposure notifications. It is safe to use the Corona-Warn-App. Fight me! ;)</p>\n<p>Wait, what, did Jiska just submit a talk claiming that Bluetooth is secure?! Is this just another 2020 plot twist?</p>\n<p>No, it's not. Assuming that we need an app that enables exposure notifications based on distance measurements, Bluetooth is the best trade-off. Audio would be more accurate but requires permanent access to the microphone. GPS does not work indoors, Wi-Fi and LTE chips are less accessible through smartphone APIs, so we're left with Bluetooth. And Bluetooth LE Advertisements are actually a great choice for such a protocol, further reducing exploitability.</p>\n<p>As someone who was involved in finding multiple Bluetooth security issues within chips and operating systems, Jiska should be more afraid of Bluetooth, you might think. However, attacking Bluetooth on an up-to-date smartphone with recent chips is very complex and requires physical proximity. Those using outdated smartphones face similar risks when browsing the Internet, without the physical proximity requirement.</p>\n<p>There are other issues within the CWA, such as missing awareness of places like restaurants and public transport, and a health system that lacks fast test reports. We should care about real problems instead of claiming security issues that barely have an impact on average users.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Exposure Notification Security",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-27T17:40:00Z",
+            "schedule_start": "2021-12-27T17:00:00Z",
+            "slug": "rc3-11378-exposure_notification_security",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "1f782473-6e96-4b75-a98e-4031bffea2c0"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "A firsthand look at efforts to improve diversity in software and hackerspace communities\n\nHacking, as a mode of technical and cultural production, is commonly celebrated for its extraordinary freedoms of creation and circulation. Yet surprisingly few women participate in it: rates of involvement by technologically skilled women are drastically lower in hacking communities than in industry and academia. Hacking Diversity investigates the activists engaged in free and open-source software to understand why, despite their efforts, they fail to achieve the diversity that their ideals support.\r\n\r\nChristina Dunbar-Hester shows that within this well-meaning volunteer world, beyond the sway of human resource departments and equal opportunity legislation, members of underrepresented groups face unique challenges. She brings together more than five years of firsthand research: attending software conferences and training events, working on message boards and listservs, and frequenting North American hackerspaces. She explores who participates in voluntaristic technology cultures, to what ends, and with what consequences. Digging deep into the fundamental assumptions underpinning STEM-oriented societies, Dunbar-Hester demonstrates that while the preferred solutions of tech enthusiasts\u2014their \u201chacks\u201d of projects and cultures\u2014can ameliorate some of the \u201cbugs\u201d within their own communities, these methods come up short for issues of unequal social and economic power. Distributing \u201cdiversity\u201d in technical production is not equal to generating justice.\r\n\r\nHacking Diversity reframes questions of diversity advocacy to consider what interventions might appropriately broaden inclusion and participation in the hacking world and beyond.",
+            "description_html": "<p>A firsthand look at efforts to improve diversity in software and hackerspace communities</p>\n<p>Hacking, as a mode of technical and cultural production, is commonly celebrated for its extraordinary freedoms of creation and circulation. Yet surprisingly few women participate in it: rates of involvement by technologically skilled women are drastically lower in hacking communities than in industry and academia. Hacking Diversity investigates the activists engaged in free and open-source software to understand why, despite their efforts, they fail to achieve the diversity that their ideals support.</p>\n<p>Christina Dunbar-Hester shows that within this well-meaning volunteer world, beyond the sway of human resource departments and equal opportunity legislation, members of underrepresented groups face unique challenges. She brings together more than five years of firsthand research: attending software conferences and training events, working on message boards and listservs, and frequenting North American hackerspaces. She explores who participates in voluntaristic technology cultures, to what ends, and with what consequences. Digging deep into the fundamental assumptions underpinning STEM-oriented societies, Dunbar-Hester demonstrates that while the preferred solutions of tech enthusiasts\u2014their \u201chacks\u201d of projects and cultures\u2014can ameliorate some of the \u201cbugs\u201d within their own communities, these methods come up short for issues of unequal social and economic power. Distributing \u201cdiversity\u201d in technical production is not equal to generating justice.</p>\n<p>Hacking Diversity reframes questions of diversity advocacy to consider what interventions might appropriately broaden inclusion and participation in the hacking world and beyond.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Hacking Diversity: The Politics of Inclusion in Open Technology Cultures",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-29T20:20:00Z",
+            "schedule_start": "2021-12-29T19:20:00Z",
+            "slug": "rc3-11569-hacking_diversity_the_politics_of_inclusion_in_open_technology_cultures",
+            "track": 4
+        },
+        "model": "core.event",
+        "pk": "1fc5ca1f-aeaa-4452-ae0f-143c0c443784"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Auch wenn CO2-Molek\u00fcle und Corona-Viren naturwissenschaftlich nicht vergleichbar sind, bilden sie eine seltsame Allianz -- sowohl ihre Ursachen, als auch ihre Konsequenzen betreffend. Die digitale Revolution erweist sich als DER Brandbeschleuniger s\u00e4mtlicher Krisen. Das dringend ben\u00f6tigte \u00dcberlebensprogramm w\u00e4re ohne pr\u00e4gnanten R\u00fcckbau geldbasierter Versorgungssysteme, De-Globalisierung sowie einer Zur\u00fcckdr\u00e4ngung der aktuellen Technologieabh\u00e4ngigkeit nicht zu haben. Suffizienz, Sesshaftigkeit, moderne Subsistenz und k\u00fcrzere Versorgungsketten w\u00fcrden dann zu wichtigen Gestaltungsoptionen.\n\n",
+            "description_html": "<p>Auch wenn CO2-Molek\u00fcle und Corona-Viren naturwissenschaftlich nicht vergleichbar sind, bilden sie eine seltsame Allianz -- sowohl ihre Ursachen, als auch ihre Konsequenzen betreffend. Die digitale Revolution erweist sich als DER Brandbeschleuniger s\u00e4mtlicher Krisen. Das dringend ben\u00f6tigte \u00dcberlebensprogramm w\u00e4re ohne pr\u00e4gnanten R\u00fcckbau geldbasierter Versorgungssysteme, De-Globalisierung sowie einer Zur\u00fcckdr\u00e4ngung der aktuellen Technologieabh\u00e4ngigkeit nicht zu haben. Suffizienz, Sesshaftigkeit, moderne Subsistenz und k\u00fcrzere Versorgungsketten w\u00fcrden dann zu wichtigen Gestaltungsoptionen.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Globalisierung, Digitalisierung und die Wachstumsfrage",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-29T11:40:00Z",
+            "schedule_start": "2021-12-29T11:00:00Z",
+            "slug": "rc3-11574-globalisierung_digitalisierung_und_die_wachstumsfrage",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "221560a2-7470-4e90-9190-99a2bef53238"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Live Conversation with Bruce Schneier. Audience questions can be submitted via chat and have a chance to be asked by moderator Frank Rieger.\n\nTopics:\r\n\u2022 Actual and perceived role of cryptography in our world\r\n\u2022 The recent latest chapter in the eternal CryptoWars\r\n\u2022 Core problems of IT-security and why nobody solves them\r\n\u2022 The digital sphere as a freefire battlefield for state and nonstate actors\r\n\u2022 Technological, legal and political leverages to prevent total surveillance",
+            "description_html": "<p>Live Conversation with Bruce Schneier. Audience questions can be submitted via chat and have a chance to be asked by moderator Frank Rieger.</p>\n<p>Topics:\n\u2022 Actual and perceived role of cryptography in our world\n\u2022 The recent latest chapter in the eternal CryptoWars\n\u2022 Core problems of IT-security and why nobody solves them\n\u2022 The digital sphere as a freefire battlefield for state and nonstate actors\n\u2022 Technological, legal and political leverages to prevent total surveillance</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Conversation with Bruce Schneier",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-27T15:00:00Z",
+            "schedule_start": "2021-12-27T14:00:00Z",
+            "slug": "rc3-11473-conversation_with_bruce_schneier",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "2605212d-979a-4bcf-b12f-f8db0f51efcf"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "During this event, we will discuss and propose basic safeguards that should be included in the DSA legislative package to make sure that fundamental rights of users, their empowerment and free choice are in the center of the upcoming legislation. \n\nThe Internet has seen better times. Meant to liberate users, being online has become synonymous with being locked into a few powerful platforms, being tracked across the web without options to dissent and being left at the mercy of algorithmic decision systems that curate our online lives. Fundamental principles like transparency, openness, and informational self-determination that used to be central to the early days of the Internet seem to have been undermined significantly in the past decades. \r\n\r\nIn the European Union, there is an opportunity to remedy this: the Digital Services Act is the  most significant reform of Europe\u2019s central platform legislation, and an unparalleled opportunity to formulate a bold, evidence based vision to address some of today\u2019s most pressing challenges. To preserve what works, to fix what is broken. The need for systemic regulation of large online platforms is justified and necessary. There is an enormous power imbalance between the large platforms and their users. In recent years, continuous scandals and increased media coverage have made it clear to the public that companies are exercising this power and making enormous profits without taking sufficient responsibility to safeguard people\u2019s fundamental rights.\r\n\r\nFurthermore, these platforms have failed to provide meaningful transparency, and the business models that are built on data harvesting without proper safeguards do not give users adequate control, either over their data or the information they receive and impart. We are not in a position to understand the extent to which our data are being used, nor are we able to determine the extent to which automated decision-making is leveraged in the curation or amplification of content. We cannot gauge the impact of these automated processes on our exposure to diverse content, and we cannot study or prevent the discriminatory treatment of underrepresented groups.\r\n\r\nThe DSA legislative package is a unique chance to create systemic regulation of gatekeeper platforms based on human rights standards, while making the rights of users the utmost priority. In this session, we will discuss how and by what means the EU can meet this mark.  \r\n",
+            "description_html": "<p>During this event, we will discuss and propose basic safeguards that should be included in the DSA legislative package to make sure that fundamental rights of users, their empowerment and free choice are in the center of the upcoming legislation. </p>\n<p>The Internet has seen better times. Meant to liberate users, being online has become synonymous with being locked into a few powerful platforms, being tracked across the web without options to dissent and being left at the mercy of algorithmic decision systems that curate our online lives. Fundamental principles like transparency, openness, and informational self-determination that used to be central to the early days of the Internet seem to have been undermined significantly in the past decades. </p>\n<p>In the European Union, there is an opportunity to remedy this: the Digital Services Act is the  most significant reform of Europe\u2019s central platform legislation, and an unparalleled opportunity to formulate a bold, evidence based vision to address some of today\u2019s most pressing challenges. To preserve what works, to fix what is broken. The need for systemic regulation of large online platforms is justified and necessary. There is an enormous power imbalance between the large platforms and their users. In recent years, continuous scandals and increased media coverage have made it clear to the public that companies are exercising this power and making enormous profits without taking sufficient responsibility to safeguard people\u2019s fundamental rights.</p>\n<p>Furthermore, these platforms have failed to provide meaningful transparency, and the business models that are built on data harvesting without proper safeguards do not give users adequate control, either over their data or the information they receive and impart. We are not in a position to understand the extent to which our data are being used, nor are we able to determine the extent to which automated decision-making is leveraged in the curation or amplification of content. We cannot gauge the impact of these automated processes on our exposure to diverse content, and we cannot study or prevent the discriminatory treatment of underrepresented groups.</p>\n<p>The DSA legislative package is a unique chance to create systemic regulation of gatekeeper platforms based on human rights standards, while making the rights of users the utmost priority. In this session, we will discuss how and by what means the EU can meet this mark.  </p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "The EU Digital Services Act package",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-29T15:00:00Z",
+            "schedule_start": "2021-12-29T14:00:00Z",
+            "slug": "rc3-11482-the_eu_digital_services_act_package",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "2c89cb0b-e377-4f1c-b8b5-c96bcef75dea"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "In den letzten Monaten der coronabedingten Kulturkrise hat sich aus der Initiative von unterschiedlichen Clubs, Clubverb\u00e4nden und durch den Support des CCC ein bundesweites Projekt entwickelt f\u00fcr die kulturelle Anerkenung der Clubkultur. \n\nDie #clubsAREculture- Kampagne startet Ende 2020 mit einem Panel auf dem rC3 mit Speaker:innen wie Berthold Seliger (Konzertagent, Autor), Pamela Schobe\u00df von der ClubCommission Berlin,  Tobias Rapp (Autor) und Judith van Waterkant (DJ, Artist).\r\n\r\nIst eine Cola light nun eine Cola oder nicht? Die Geister scheiden sich da vielleicht, allemal w\u00fcrde man beiden aber eine Existenz als koffeinhaltiges Erfrischungsgetr\u00e4nk zubilligen\u2026\r\n\r\nSo \u00e4hnlich ist das auch mit der Kultur: W\u00e4hrend Opern, Theater und Konzerth\u00e4user seit jeher als Teil der Kultur anerkannt sind, haben Musikclubs damit zu k\u00e4mpfen, selbstverst\u00e4ndlich als vollwertiger Teil der Kultur betrachtet zu werden.\r\n\r\nDarf man Hochkultur also nur genie\u00dfen, sich aber nicht vergn\u00fcgen? Ist Clubkultur dann Kultur light oder um es mit Merz` klar mittelst\u00e4ndischen Worten zu sagen: Lightkultur? Wo wird heute tats\u00e4chlich Kultur erlebt und wer bzw. was ist das genau? K\u00f6nnen wir in einer Welt der Digitalisierung und Globalisierung ernsthaft noch einen Kulturbegriff anwenden der Jahrhunderte alt ist und trotzdem die Kulturpolitik bestimmt?\r\n\r\nEs geht um Kulturgeschichte, technische Entwicklungen, Medien, Generationskonflitke, Mehrwertsteuersatz, Stadt- und Bebauungsplanung, Schallschutzauflagen, Baunutzungsverordnung (BauNVO), Schutz vor Verdr\u00e4ngung, Alltagskultur, Gemeinwohlbezug und Freir\u00e4ume.\r\n\r\n#clubsAREculture vereint Akteure, die sich f\u00fcr die Anerkennung der Clubkultur und Musikclubs einsetzen. Ziel wird eine Gesetzes\u00e4nderung sein, die den heutigen Realit\u00e4ten gerecht wird. Wir stellen unser Projekt, die Kampagne und die Petition vor.\r\n\r\nDeutschland versteht sich als Kulturnation; als das Land der Dichter und Denker, in dem Kultur einen hohen Stellenwert im gesellschaftlichen Leben einnimmt. Jedoch hat sich das Kulturverst\u00e4ndnis \u2013 also das Verst\u00e4ndnis von dem, was als k\u00fcnstlerisch wertige, sch\u00fctzenswerte und f\u00f6rderungsw\u00fcrdige Kultur angesehen wird \u2013 seit dem Ende des 19. Jahrhunderts nicht wesentlich ver\u00e4ndert und umfasst mehrheitlich das, was gemeinhin als Hochkultur geclustert wird.\r\n\r\nDie Bereiche Clubkultur und Livemusikspielst\u00e4tten finden hier keine Ber\u00fccksichtigung, obwohl sie sich in den vergangenen Jahrzehnten zu einem wichtigen Bestandteil der kulturellen Vielfalt in Deutschland entwickelt haben.\r\n\r\nDiese \u201eNicht-Anerkennung\u201c als sch\u00fctzenswert und f\u00f6rderungsw\u00fcrdig durch gro\u00dfe Teile der Kulturpolitik f\u00fchrt zu Herabstufungen der Clubkultur und von Livemusikspielst\u00e4tten in vielen Bereichen der Politik und Verwaltung. Diesen Missst\u00e4nden widmen wir unsere Arbeit.\r\n",
+            "description_html": "<p>In den letzten Monaten der coronabedingten Kulturkrise hat sich aus der Initiative von unterschiedlichen Clubs, Clubverb\u00e4nden und durch den Support des CCC ein bundesweites Projekt entwickelt f\u00fcr die kulturelle Anerkenung der Clubkultur. </p>\n<p>Die #clubsAREculture- Kampagne startet Ende 2020 mit einem Panel auf dem rC3 mit Speaker:innen wie Berthold Seliger (Konzertagent, Autor), Pamela Schobe\u00df von der ClubCommission Berlin,  Tobias Rapp (Autor) und Judith van Waterkant (DJ, Artist).</p>\n<p>Ist eine Cola light nun eine Cola oder nicht? Die Geister scheiden sich da vielleicht, allemal w\u00fcrde man beiden aber eine Existenz als koffeinhaltiges Erfrischungsgetr\u00e4nk zubilligen\u2026</p>\n<p>So \u00e4hnlich ist das auch mit der Kultur: W\u00e4hrend Opern, Theater und Konzerth\u00e4user seit jeher als Teil der Kultur anerkannt sind, haben Musikclubs damit zu k\u00e4mpfen, selbstverst\u00e4ndlich als vollwertiger Teil der Kultur betrachtet zu werden.</p>\n<p>Darf man Hochkultur also nur genie\u00dfen, sich aber nicht vergn\u00fcgen? Ist Clubkultur dann Kultur light oder um es mit Merz` klar mittelst\u00e4ndischen Worten zu sagen: Lightkultur? Wo wird heute tats\u00e4chlich Kultur erlebt und wer bzw. was ist das genau? K\u00f6nnen wir in einer Welt der Digitalisierung und Globalisierung ernsthaft noch einen Kulturbegriff anwenden der Jahrhunderte alt ist und trotzdem die Kulturpolitik bestimmt?</p>\n<p>Es geht um Kulturgeschichte, technische Entwicklungen, Medien, Generationskonflitke, Mehrwertsteuersatz, Stadt- und Bebauungsplanung, Schallschutzauflagen, Baunutzungsverordnung (BauNVO), Schutz vor Verdr\u00e4ngung, Alltagskultur, Gemeinwohlbezug und Freir\u00e4ume.</p>\n<h1>clubsAREculture vereint Akteure, die sich f\u00fcr die Anerkennung der Clubkultur und Musikclubs einsetzen. Ziel wird eine Gesetzes\u00e4nderung sein, die den heutigen Realit\u00e4ten gerecht wird. Wir stellen unser Projekt, die Kampagne und die Petition vor.</h1>\n<p>Deutschland versteht sich als Kulturnation; als das Land der Dichter und Denker, in dem Kultur einen hohen Stellenwert im gesellschaftlichen Leben einnimmt. Jedoch hat sich das Kulturverst\u00e4ndnis \u2013 also das Verst\u00e4ndnis von dem, was als k\u00fcnstlerisch wertige, sch\u00fctzenswerte und f\u00f6rderungsw\u00fcrdige Kultur angesehen wird \u2013 seit dem Ende des 19. Jahrhunderts nicht wesentlich ver\u00e4ndert und umfasst mehrheitlich das, was gemeinhin als Hochkultur geclustert wird.</p>\n<p>Die Bereiche Clubkultur und Livemusikspielst\u00e4tten finden hier keine Ber\u00fccksichtigung, obwohl sie sich in den vergangenen Jahrzehnten zu einem wichtigen Bestandteil der kulturellen Vielfalt in Deutschland entwickelt haben.</p>\n<p>Diese \u201eNicht-Anerkennung\u201c als sch\u00fctzenswert und f\u00f6rderungsw\u00fcrdig durch gro\u00dfe Teile der Kulturpolitik f\u00fchrt zu Herabstufungen der Clubkultur und von Livemusikspielst\u00e4tten in vielen Bereichen der Politik und Verwaltung. Diesen Missst\u00e4nden widmen wir unsere Arbeit.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "LightKultur in Deutschland",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-29T19:00:00Z",
+            "schedule_start": "2021-12-29T18:00:00Z",
+            "slug": "rc3-11515-lightkultur_in_deutschland",
+            "track": 4
+        },
+        "model": "core.event",
+        "pk": "3dca975a-0899-4f6f-b0eb-375d383d0bc6"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Ob sie von Biontec, Curevac oder Moderna kommen werden, schon jetzt haben sich wenige reiche L\u00e4nder den L\u00f6wenanteil der aussichtsreichsten Covid-19-Impfstoffe gesichert. Dabei ist Corona erst dann vorbei, wenn es f\u00fcr alle vorbei ist. \n\nDoch Europas Regierungen untergraben die globale Kooperation zur \u00dcberwindung der Gesundheitskrise und sichern das Recht auf Gewinne f\u00fcr die Pharmaindustrie ab. Wer sind die Gewinner, wer die Verlierer beim Wettlauf um den Impfstoff? Und was hat die Gates Stiftung damit zu tun?\r\n\r\n\u201eNiemand ist sicher vor COVID-19, bevor nicht alle davor sicher sind. Selbst wer das Virus in seinen eigenen nationalen Grenzen besiegt, bleibt Gefangener dieser Grenzen, solange es nicht \u00fcberall besiegt ist.\u201c V\u00f6llig zutreffend beschrieb Bundespr\u00e4sident Frank Walter Steinmeier bei der Er\u00f6ffnung des World Health Summit am 25. Oktober in Berlin das Wesen der Pandemie: Die Befreiung vom Virus bedarf eines globalen Handelns. Deutschland, Europa und alle anderen gro\u00dfen Industrienationen verhindern allerdings genau das. Eine kleine Gruppe reicher L\u00e4nder, die 13 Prozent der Weltbev\u00f6lkerung repr\u00e4sentieren, hat sich bereits mehr als die H\u00e4lfte der zuk\u00fcnftigen Versorgung mit f\u00fchrenden COVID-19-Impfstoffen gesichert, berichtet die Hilfsorganisation Oxfam. Konkret haben die reichen L\u00e4nder bereits mehr als f\u00fcnf Milliarden Dosen von Impfstoffen aus den Kandidatenl\u00e4ndern gekauft oder sind dabei, sie zu kaufen, bevor die klinischen Studien abgeschlossen sind. Weniger als 800 Millionen Dosen sind f\u00fcr die \u00e4rmsten L\u00e4nder der Welt vorgesehen, berichtet die Duke University in einer k\u00fcrzlich ver\u00f6ffentlichten Studie. Auch Deutschland hat solche Exklusivvertr\u00e4ge abgeschlossen.\r\n\r\n\r\nNimmt man die richtungsweisenden Entscheidungen seit Beginn der Pandemie genauer in den Blick, wird schnell deutlich, dass die Industrienationen an einer neoliberalen Politik festhalten, die das Recht auf Gewinn f\u00fcr Unternehmen gegen die Menschenrechte, konkret den gerechten und gleichen Zugang zu den Impfstoffen, absichert. Diese Ordnung wird mit aller Gewalt verteidigt und das ist durchaus w\u00f6rtlich zu verstehen: Betrachtet man das Ringen um die kommenden Impfstoffe, zeigt sich, wie die Krise gel\u00f6st werden soll \u2013 auf Kosten der Armen. Die Nebenwirkungen sind t\u00f6dlich und werden auch die wirtschaftliche, geographische und soziale Ungleichheit dramatisch vergr\u00f6\u00dfern. Es droht die Restaurierung der Zweiteilung der Welt in Nord und S\u00fcd, auch wenn deren \u00dcberwindung verbal immer wieder bekr\u00e4ftigt wird.\r\n",
+            "description_html": "<p>Ob sie von Biontec, Curevac oder Moderna kommen werden, schon jetzt haben sich wenige reiche L\u00e4nder den L\u00f6wenanteil der aussichtsreichsten Covid-19-Impfstoffe gesichert. Dabei ist Corona erst dann vorbei, wenn es f\u00fcr alle vorbei ist. </p>\n<p>Doch Europas Regierungen untergraben die globale Kooperation zur \u00dcberwindung der Gesundheitskrise und sichern das Recht auf Gewinne f\u00fcr die Pharmaindustrie ab. Wer sind die Gewinner, wer die Verlierer beim Wettlauf um den Impfstoff? Und was hat die Gates Stiftung damit zu tun?</p>\n<p>\u201eNiemand ist sicher vor COVID-19, bevor nicht alle davor sicher sind. Selbst wer das Virus in seinen eigenen nationalen Grenzen besiegt, bleibt Gefangener dieser Grenzen, solange es nicht \u00fcberall besiegt ist.\u201c V\u00f6llig zutreffend beschrieb Bundespr\u00e4sident Frank Walter Steinmeier bei der Er\u00f6ffnung des World Health Summit am 25. Oktober in Berlin das Wesen der Pandemie: Die Befreiung vom Virus bedarf eines globalen Handelns. Deutschland, Europa und alle anderen gro\u00dfen Industrienationen verhindern allerdings genau das. Eine kleine Gruppe reicher L\u00e4nder, die 13 Prozent der Weltbev\u00f6lkerung repr\u00e4sentieren, hat sich bereits mehr als die H\u00e4lfte der zuk\u00fcnftigen Versorgung mit f\u00fchrenden COVID-19-Impfstoffen gesichert, berichtet die Hilfsorganisation Oxfam. Konkret haben die reichen L\u00e4nder bereits mehr als f\u00fcnf Milliarden Dosen von Impfstoffen aus den Kandidatenl\u00e4ndern gekauft oder sind dabei, sie zu kaufen, bevor die klinischen Studien abgeschlossen sind. Weniger als 800 Millionen Dosen sind f\u00fcr die \u00e4rmsten L\u00e4nder der Welt vorgesehen, berichtet die Duke University in einer k\u00fcrzlich ver\u00f6ffentlichten Studie. Auch Deutschland hat solche Exklusivvertr\u00e4ge abgeschlossen.</p>\n<p>Nimmt man die richtungsweisenden Entscheidungen seit Beginn der Pandemie genauer in den Blick, wird schnell deutlich, dass die Industrienationen an einer neoliberalen Politik festhalten, die das Recht auf Gewinn f\u00fcr Unternehmen gegen die Menschenrechte, konkret den gerechten und gleichen Zugang zu den Impfstoffen, absichert. Diese Ordnung wird mit aller Gewalt verteidigt und das ist durchaus w\u00f6rtlich zu verstehen: Betrachtet man das Ringen um die kommenden Impfstoffe, zeigt sich, wie die Krise gel\u00f6st werden soll \u2013 auf Kosten der Armen. Die Nebenwirkungen sind t\u00f6dlich und werden auch die wirtschaftliche, geographische und soziale Ungleichheit dramatisch vergr\u00f6\u00dfern. Es droht die Restaurierung der Zweiteilung der Welt in Nord und S\u00fcd, auch wenn deren \u00dcberwindung verbal immer wieder bekr\u00e4ftigt wird.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Patente t\u00f6ten. ",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-29T13:40:00Z",
+            "schedule_start": "2021-12-29T13:00:00Z",
+            "slug": "rc3-11457-patente_toten",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "487a1dc6-ccf4-42ec-97f4-33dee5973ed7"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Everyone knows and loves the famous line from the cinematic masterpiece where the IT-Security specialist asks the CPU architect: \"Warum leaked hier Strom?\" (Why is power leaking here?).\n\nIn this talk, we want to answer that question. We demonstrate how we can attack modern processors purely in software, relying on techniques from classical power side-channel attacks. We explain how we abuse the unprivileged access to energy-monitoring features of modern Intel and AMD CPUs. With PLATYPUS, we show how to steal cryptographic keys from the operating system or trusted-execution environments, and how to break kernel address-space layout randomization within seconds. Finally, we discuss the mitigations that prevent our attacks.",
+            "description_html": "<p>Everyone knows and loves the famous line from the cinematic masterpiece where the IT-Security specialist asks the CPU architect: \"Warum leaked hier Strom?\" (Why is power leaking here?).</p>\n<p>In this talk, we want to answer that question. We demonstrate how we can attack modern processors purely in software, relying on techniques from classical power side-channel attacks. We explain how we abuse the unprivileged access to energy-monitoring features of modern Intel and AMD CPUs. With PLATYPUS, we show how to steal cryptographic keys from the operating system or trusted-execution environments, and how to break kernel address-space layout randomization within seconds. Finally, we discuss the mitigations that prevent our attacks.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Attacking CPUs with Power Side Channels from Software: Warum leaked hier Strom? (en)",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T19:20:00Z",
+            "schedule_start": "2021-12-28T18:20:00Z",
+            "slug": "rc3-11404-attacking_cpus_with_power_side_channels_from_software_warum_leaked_hier_strom_en",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "4c2cd189-b216-4246-88ab-8d1bb11cbe9e"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Lesung und lockeres Gespr\u00e4ch mit der vielfach ausgezeichneten deutschen Bestseller-Autorin.\n\nMitmachen unter: https://firesidechats.rc3.world/fire/6NWB2KXOcF/join",
+            "description_html": "<p>Lesung und lockeres Gespr\u00e4ch mit der vielfach ausgezeichneten deutschen Bestseller-Autorin.</p>\n<p>Mitmachen unter: https://firesidechats.rc3.world/fire/6NWB2KXOcF/join</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Zo\u00eb Beck \u2013 Fireside Chat",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-29T20:20:00Z",
+            "schedule_start": "2021-12-29T19:20:00Z",
+            "slug": "rc3-11578-zoe_beck_fireside_chat",
+            "track": 6
+        },
+        "model": "core.event",
+        "pk": "4fd7134e-e1e8-47f5-b362-864c2d830d5a"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "In this talk, I aim to report and show a collection of observations, physical, visual and other evidence of the last years incidents that strongly indicate a context of the US Central Intelligence Agency and/or potentially other entities of the US Government actions against Wikileaks and surrounding persons and organisations.\n\nWhile the area of technical surveillance, SIGINT/COMINT and related Organizations and Methods have been more or less well understood in the hacker scene, the tactics and methods experienced and discussed in this talk are of a different type: For the moment, I would call it \"initimidation surveillance\" as it lacks the aspect of \"covert\" type of actions.\r\n\r\nOn the last Chaos Communication Congress, I have analysed the technical aspects of the surveillance in and surrounding the ecuadorian embassy where Julian Assange stayed; this talk shows what happened to other people - friends of Assange, supporters of Wikileaks etc - not only in England, but also in other countries / other parts of the world. \r\n\r\nThe idea is to not only show the scope of activities but also to contribute to a better understanding of these tactics, that might be applied also in completely different political environments where governments act in extralegal ways against activities they dislike, although they that are not a crime or easily criminalized.",
+            "description_html": "<p>In this talk, I aim to report and show a collection of observations, physical, visual and other evidence of the last years incidents that strongly indicate a context of the US Central Intelligence Agency and/or potentially other entities of the US Government actions against Wikileaks and surrounding persons and organisations.</p>\n<p>While the area of technical surveillance, SIGINT/COMINT and related Organizations and Methods have been more or less well understood in the hacker scene, the tactics and methods experienced and discussed in this talk are of a different type: For the moment, I would call it \"initimidation surveillance\" as it lacks the aspect of \"covert\" type of actions.</p>\n<p>On the last Chaos Communication Congress, I have analysed the technical aspects of the surveillance in and surrounding the ecuadorian embassy where Julian Assange stayed; this talk shows what happened to other people - friends of Assange, supporters of Wikileaks etc - not only in England, but also in other countries / other parts of the world. </p>\n<p>The idea is to not only show the scope of activities but also to contribute to a better understanding of these tactics, that might be applied also in completely different political environments where governments act in extralegal ways against activities they dislike, although they that are not a crime or easily criminalized.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "CIA vs. Wikileaks",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-28T21:30:00Z",
+            "schedule_start": "2021-12-28T20:50:00Z",
+            "slug": "rc3-11512-cia_vs_wikileaks",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "52f30691-75bc-4759-94a5-ce2225c1e849"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Immer neue Hitzerekorde, D\u00fcrresommer und Naturkatastrophen f\u00fchren uns immer drastischer vor Augen, dass ein ungebremster Klimawandel dramatische Auswirkungen f\u00fcr die Menschheit haben wird.\n\nDer Weltklimarat empfiehlt dringend, die globale Erw\u00e4rmung nicht \u00fcber 1,5\u00b0C steigen zu lassen. Wollen wir das erreichen, m\u00fcssen wir bereits bis 2040 eine Energieversorgung realisieren, die v\u00f6llig ohne Erdgas, Erd\u00f6l und Kohle auskommt. Mit der aktuellen deutschen Energie- und Klimaschutzpolitik ist ein Einhalten des Pariser Klimaschutzabkommens unm\u00f6glich. Dieser Vortrag zeigt, mit welchen Konsequenzen wir beim Verfehlen der Klimaziele rechnen m\u00fcssen und wie wir diese jetzt noch vermeiden k\u00f6nnen.",
+            "description_html": "<p>Immer neue Hitzerekorde, D\u00fcrresommer und Naturkatastrophen f\u00fchren uns immer drastischer vor Augen, dass ein ungebremster Klimawandel dramatische Auswirkungen f\u00fcr die Menschheit haben wird.</p>\n<p>Der Weltklimarat empfiehlt dringend, die globale Erw\u00e4rmung nicht \u00fcber 1,5\u00b0C steigen zu lassen. Wollen wir das erreichen, m\u00fcssen wir bereits bis 2040 eine Energieversorgung realisieren, die v\u00f6llig ohne Erdgas, Erd\u00f6l und Kohle auskommt. Mit der aktuellen deutschen Energie- und Klimaschutzpolitik ist ein Einhalten des Pariser Klimaschutzabkommens unm\u00f6glich. Dieser Vortrag zeigt, mit welchen Konsequenzen wir beim Verfehlen der Klimaziele rechnen m\u00fcssen und wie wir diese jetzt noch vermeiden k\u00f6nnen.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Nach der Coronakrise ist mitten in der Klimakrise",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T13:40:00Z",
+            "schedule_start": "2021-12-28T12:40:00Z",
+            "slug": "rc3-11371-nach_der_coronakrise_ist_mitten_in_der_klimakrise",
+            "track": 9
+        },
+        "model": "core.event",
+        "pk": "56341a5c-6d90-49af-8930-46250e200fe0"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Dieser Vortrag beschreibt die Entwicklung von QAnon als Spiel mit Realit\u00e4t und \u00fcberlegt, weshalb dieser Verschw\u00f6rungsmythos sich derart schnell verbreiten konnte.\n\n\"Alternate Reality Games\" sind eine relativ junge interaktive Erz\u00e4hlform, die einige interessante Eigenschaften hat. ARGs sind medien\u00fcbergreifend, fesseln ihre Spielenden durch gemeinsames Recherchieren und Austauschen und benutzen dabei die je individuellen Leben der Spieler:innen als eigentliche Spielplattform. So k\u00f6nnen sie in kurzer Zeit sehr aktive und mitunter erstaunlich dauerhafte Gemeinschaften organisieren. \r\n\r\nSeit der Verbreitung von QAnon-Mythos und -Marke haben wiederholt Beobachter:innen darauf hingewiesen, dass es sich hierbei um eine Weiterentwicklung des Spielprinzips \"Larping\" zu einer Form handelt, die Parallelen zu Alternate Reality Games aufweist. Wenn auch nat\u00fcrlich nicht in G\u00e4nze erkl\u00e4ren, so kann diese Perspektive doch dabei helfen, die spezielle Attraktivit\u00e4t von QAnon besser zu verstehen. \r\n\r\nIm Vortrag versuche ich Qeschichte, Hinterqr\u00fcnde und einige Sqielaspekte zusammenzufassen und mit eindeutig zu vielen Screenshots zu illustrieren. Dabei wird es vor allem um die Entwicklung im Kontext der US-Politik gehen.",
+            "description_html": "<p>Dieser Vortrag beschreibt die Entwicklung von QAnon als Spiel mit Realit\u00e4t und \u00fcberlegt, weshalb dieser Verschw\u00f6rungsmythos sich derart schnell verbreiten konnte.</p>\n<p>\"Alternate Reality Games\" sind eine relativ junge interaktive Erz\u00e4hlform, die einige interessante Eigenschaften hat. ARGs sind medien\u00fcbergreifend, fesseln ihre Spielenden durch gemeinsames Recherchieren und Austauschen und benutzen dabei die je individuellen Leben der Spieler:innen als eigentliche Spielplattform. So k\u00f6nnen sie in kurzer Zeit sehr aktive und mitunter erstaunlich dauerhafte Gemeinschaften organisieren. </p>\n<p>Seit der Verbreitung von QAnon-Mythos und -Marke haben wiederholt Beobachter:innen darauf hingewiesen, dass es sich hierbei um eine Weiterentwicklung des Spielprinzips \"Larping\" zu einer Form handelt, die Parallelen zu Alternate Reality Games aufweist. Wenn auch nat\u00fcrlich nicht in G\u00e4nze erkl\u00e4ren, so kann diese Perspektive doch dabei helfen, die spezielle Attraktivit\u00e4t von QAnon besser zu verstehen. </p>\n<p>Im Vortrag versuche ich Qeschichte, Hinterqr\u00fcnde und einige Sqielaspekte zusammenzufassen und mit eindeutig zu vielen Screenshots zu illustrieren. Dabei wird es vor allem um die Entwicklung im Kontext der US-Politik gehen.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "This Is Not A Game (de)",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-29T15:00:00Z",
+            "schedule_start": "2021-12-29T14:00:00Z",
+            "slug": "rc3-11500-this_is_not_a_game_de",
+            "track": 4
+        },
+        "model": "core.event",
+        "pk": "58ceb0b8-be13-47e3-b44e-63762c0d955e"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Die globale Informationsoperation der 5-Eyes-Allianz & Verb\u00fcndeter mit FBI, Europol et. al., sowie den nationalen Innen- und Justizministerien gegen E2E-Verschl\u00fcsselung. Die Entwicklung dieser Operation zur Durchsetzung gemeinsamer Interessen von 2015 bis zur Resolution des EU-Ministerrats im Dezember 2020.\n\nDie Resolution des EU-Ministerrats zum \"Verschl\u00fcsselungsproblem\" ist das Ergebnis einer konzertierten Kampagne der Spionageallianz Five Eyes mit FBI, Europol & vielen weiteren Polizeibeh\u00f6rden gegen E2E-Verschl\u00fcsselung. 2015 machten sich die Geheimdienste in drei Kontinenten pl\u00f6tzlich gro\u00dfe Sorgen um die \u00dcberwachungsm\u00f6glichkeiten f\u00fcr die Strafverfolger. Die Folge war eine Serie von weltweiten Einzelkampagnen, die abwechselnd von Europol und FBI bzw. den Diensten der \u201eFive Eyes\u201c-Spionageallianz samt NATO-Staaten und den zust\u00e4ndigen Ministern in der \u00d6ffentlichkeit gefahren wurden. Jeder bedeutende Move dieser Kampagne folgte zeitversetzt den Terroranschl\u00e4gen salafistischer Klerikalfaschisten irgendwo in der sogenannten \"westlichen Welt\".. \r\n\r\nAm Anfang standen Nachschl\u00fcssel f\u00fcr iPhones von Terroristen, dann kam Geraune \u00fcber \"Going Dark\" von FBI & Europol. In Folge wurden \"Goldene Schl\u00fcssel\" gefordert, \"Hilfe, die Polizei wird blind\" geschrien, dann wurde die ETSI-\u00dcberwachungsschnittstelle f\u00fcr Facebook-Messenger, WhatsApp & Co standardisiert, Europol und FBI verlangten pl\u00f6tzlich keine Schl\u00fcssel mehr, sondern \"Vordert\u00fcren\". 2018 kamen dann die moderaten Vorschl\u00e4ge des GCHQ an die Betreiber von E2E-Plattformen aufs Tapet, doch bittsch\u00f6n einen ADK (Additional Decryption Key) zur E2E hinzuzuf\u00fcgen, auf dass den Strafverfolgern geholfen werde.       \r\n\r\nUnd genau diese \"L\u00f6sung\" wird jetzt angestrebt um der drohenden Datenarmut von Cops & Spooks zu begegnen. Deren Goldenes Zeitalter der \u00dcberwachung wird n\u00e4mlich mit dem Ende des Seuchenjahrs 2020 eingeleitet.",
+            "description_html": "<p>Die globale Informationsoperation der 5-Eyes-Allianz &amp; Verb\u00fcndeter mit FBI, Europol et. al., sowie den nationalen Innen- und Justizministerien gegen E2E-Verschl\u00fcsselung. Die Entwicklung dieser Operation zur Durchsetzung gemeinsamer Interessen von 2015 bis zur Resolution des EU-Ministerrats im Dezember 2020.</p>\n<p>Die Resolution des EU-Ministerrats zum \"Verschl\u00fcsselungsproblem\" ist das Ergebnis einer konzertierten Kampagne der Spionageallianz Five Eyes mit FBI, Europol &amp; vielen weiteren Polizeibeh\u00f6rden gegen E2E-Verschl\u00fcsselung. 2015 machten sich die Geheimdienste in drei Kontinenten pl\u00f6tzlich gro\u00dfe Sorgen um die \u00dcberwachungsm\u00f6glichkeiten f\u00fcr die Strafverfolger. Die Folge war eine Serie von weltweiten Einzelkampagnen, die abwechselnd von Europol und FBI bzw. den Diensten der \u201eFive Eyes\u201c-Spionageallianz samt NATO-Staaten und den zust\u00e4ndigen Ministern in der \u00d6ffentlichkeit gefahren wurden. Jeder bedeutende Move dieser Kampagne folgte zeitversetzt den Terroranschl\u00e4gen salafistischer Klerikalfaschisten irgendwo in der sogenannten \"westlichen Welt\".. </p>\n<p>Am Anfang standen Nachschl\u00fcssel f\u00fcr iPhones von Terroristen, dann kam Geraune \u00fcber \"Going Dark\" von FBI &amp; Europol. In Folge wurden \"Goldene Schl\u00fcssel\" gefordert, \"Hilfe, die Polizei wird blind\" geschrien, dann wurde die ETSI-\u00dcberwachungsschnittstelle f\u00fcr Facebook-Messenger, WhatsApp &amp; Co standardisiert, Europol und FBI verlangten pl\u00f6tzlich keine Schl\u00fcssel mehr, sondern \"Vordert\u00fcren\". 2018 kamen dann die moderaten Vorschl\u00e4ge des GCHQ an die Betreiber von E2E-Plattformen aufs Tapet, doch bittsch\u00f6n einen ADK (Additional Decryption Key) zur E2E hinzuzuf\u00fcgen, auf dass den Strafverfolgern geholfen werde.       </p>\n<p>Und genau diese \"L\u00f6sung\" wird jetzt angestrebt um der drohenden Datenarmut von Cops &amp; Spooks zu begegnen. Deren Goldenes Zeitalter der \u00dcberwachung wird n\u00e4mlich mit dem Ende des Seuchenjahrs 2020 eingeleitet.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Crypto Wars 2.0 (de)",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T19:20:00Z",
+            "schedule_start": "2021-12-28T18:20:00Z",
+            "slug": "rc3-11533-crypto_wars_2_0_de",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "5e4bba12-b53d-4a24-9193-9c9c760757ed"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Politicians, economists and even some natural scientists have tended to assume that tipping points in the Earth system \u2014 such as the loss of the Amazon rainforest or the West Antarctic ice sheet \u2014 are of low probability and little understood. Yet evidence is mounting that these events could be more likely than was thought, have high impacts and are interconnected across different biophysical systems, potentially committing the world to long-term irreversible changes.\r\n\r\nThis talk summarizes evidence on the threat of exceeding tipping points and explores the effects of such large-scale changes, how quickly they might unfold and whether we still have any control over them.\n\nThe Intergovernmental Panel on Climate Change (IPCC) introduced the idea of tipping points two decades ago. At that time, these \u2018large-scale discontinuities\u2019 in the climate system were considered likely only if global warming exceeded 5\u2009\u00b0C above pre-industrial levels. Information summarized in the two most recent IPCC Special Reports (published in 2018 and in September 2019) suggests that tipping points could be exceeded even between 1 and 2\u2009\u00b0C of warming (see \u2018Too close for comfort\u2019).\r\n\r\nIf current national pledges to reduce greenhouse-gas emissions are implemented \u2014 and that\u2019s a big \u2018if\u2019 \u2014 they are likely to result in at least 3\u2009\u00b0C of global warming. This is despite the goal of the 2015 Paris agreement to limit warming to well below 2\u2009\u00b0C. Some economists, assuming that climate tipping points are of very low probability (even if they would be catastrophic), have suggested that 3\u2009\u00b0C warming is optimal from a cost\u2013benefit perspective. However, if tipping points are looking more likely, then the \u2018optimal policy\u2019 recommendation of simple cost\u2013benefit climate-economy models aligns with those of the recent IPCC report. In other words, warming must be limited to 1.5\u2009\u00b0C. This requires an emergency response.\r\n\r\nIn our view, the clearest emergency would be if we were approaching a global cascade of tipping points that led to a new, less habitable, \u2018hothouse\u2019 climate state. Interactions could happen through ocean and atmospheric circulation or through feedbacks that increase greenhouse-gas levels and global temperature. Alternatively, strong cloud feedbacks could cause a global tipping point.\r\n\r\nThis talk will give an overview on how these different scenarios might play out, how likely they are, and what we need to do to avoid them.",
+            "description_html": "<p>Politicians, economists and even some natural scientists have tended to assume that tipping points in the Earth system \u2014 such as the loss of the Amazon rainforest or the West Antarctic ice sheet \u2014 are of low probability and little understood. Yet evidence is mounting that these events could be more likely than was thought, have high impacts and are interconnected across different biophysical systems, potentially committing the world to long-term irreversible changes.</p>\n<p>This talk summarizes evidence on the threat of exceeding tipping points and explores the effects of such large-scale changes, how quickly they might unfold and whether we still have any control over them.</p>\n<p>The Intergovernmental Panel on Climate Change (IPCC) introduced the idea of tipping points two decades ago. At that time, these \u2018large-scale discontinuities\u2019 in the climate system were considered likely only if global warming exceeded 5\u2009\u00b0C above pre-industrial levels. Information summarized in the two most recent IPCC Special Reports (published in 2018 and in September 2019) suggests that tipping points could be exceeded even between 1 and 2\u2009\u00b0C of warming (see \u2018Too close for comfort\u2019).</p>\n<p>If current national pledges to reduce greenhouse-gas emissions are implemented \u2014 and that\u2019s a big \u2018if\u2019 \u2014 they are likely to result in at least 3\u2009\u00b0C of global warming. This is despite the goal of the 2015 Paris agreement to limit warming to well below 2\u2009\u00b0C. Some economists, assuming that climate tipping points are of very low probability (even if they would be catastrophic), have suggested that 3\u2009\u00b0C warming is optimal from a cost\u2013benefit perspective. However, if tipping points are looking more likely, then the \u2018optimal policy\u2019 recommendation of simple cost\u2013benefit climate-economy models aligns with those of the recent IPCC report. In other words, warming must be limited to 1.5\u2009\u00b0C. This requires an emergency response.</p>\n<p>In our view, the clearest emergency would be if we were approaching a global cascade of tipping points that led to a new, less habitable, \u2018hothouse\u2019 climate state. Interactions could happen through ocean and atmospheric circulation or through feedbacks that increase greenhouse-gas levels and global temperature. Alternatively, strong cloud feedbacks could cause a global tipping point.</p>\n<p>This talk will give an overview on how these different scenarios might play out, how likely they are, and what we need to do to avoid them.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Climate Tipping Points",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-30T12:40:00Z",
+            "schedule_start": "2021-12-30T11:40:00Z",
+            "slug": "rc3-11361-climate_tipping_points",
+            "track": 9
+        },
+        "model": "core.event",
+        "pk": "5f8b1e49-59ac-442e-8515-34ed300b1504"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "The Google/Apple Exposure Notifications protocol (GAEN) and COVID-19 contact tracings apps using it are probably among the most discussed tech topics of 2020. This talk gives a summary of how GAEN works and how it is used by COVID-19 tracing apps. It also aims to provide discussion points on how these apps could be improved to make them (more) useful in a pandemic.\n\nThe general concepts of the DP-3T protocol that forms the basis for GAEN has been discussed largely in media and is described even in the apps itself. I will explain the details of the GAEN protocol specifically as those are relevant to get better insights on privacy implications.\r\n\r\nI will further outline how the protocol is used in practice, i.e. how apps are using it, which role Apple and Google have. The focus of this will be on the German Corona-Warn-App and the Android operating system.\r\n\r\nIn the end, I will present some of the valid criticisms against the protocol (and its realization), recently causing politicians to ask for \"less privacy\". I will present some attempts on solutions to improve the operating system and apps to tackle some of the issues. And will tell you how getting root access to your Android phone can finally save lives.",
+            "description_html": "<p>The Google/Apple Exposure Notifications protocol (GAEN) and COVID-19 contact tracings apps using it are probably among the most discussed tech topics of 2020. This talk gives a summary of how GAEN works and how it is used by COVID-19 tracing apps. It also aims to provide discussion points on how these apps could be improved to make them (more) useful in a pandemic.</p>\n<p>The general concepts of the DP-3T protocol that forms the basis for GAEN has been discussed largely in media and is described even in the apps itself. I will explain the details of the GAEN protocol specifically as those are relevant to get better insights on privacy implications.</p>\n<p>I will further outline how the protocol is used in practice, i.e. how apps are using it, which role Apple and Google have. The focus of this will be on the German Corona-Warn-App and the Android operating system.</p>\n<p>In the end, I will present some of the valid criticisms against the protocol (and its realization), recently causing politicians to ask for \"less privacy\". I will present some attempts on solutions to improve the operating system and apps to tackle some of the issues. And will tell you how getting root access to your Android phone can finally save lives.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "COVID-19 Exposure Notifications",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-30T11:40:00Z",
+            "schedule_start": "2021-12-30T11:00:00Z",
+            "slug": "rc3-11517-covid-19_exposure_notifications",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "6278261f-57c2-402f-9872-4bbde449fd53"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "The depiction of Nazis in games tends to downplay their atrocities and facilitate the normalization of fascist aesthetics and ideologies. Even in a playful and lighthearted context, this normalization has consequences that can and should be avoided by everyone in gaming communities \u2013 including developers, content creators, and players.\n\nWorld War II might be just one of many historical settings in games, but the representation of Nazis makes it a particularly tricky one. Especially if developers are trying to sell an entertainment product and provide players with all the freedom they might wish for, they frequently decide not to depict the Holocaust, for example. Such a decision, however, contributes to an embellished picture of Nazi Germany, which is then offered to players \u2013 some of which are apparently craving Nazi content. Their ideology, weaponry, and aesthetics seem to appeal to certain players in a peculiar way, as can be seen in user-created content, profiles, and discussions. \r\nNo matter what the intention behind such behavior is, the abundance of Nazi representations in gaming communities has harmful consequences. By keeping the line between role-play and actual propagation of fascist ideologies blurry, gaming communities make themselves a rather uncomfortable place for all but the most privileged of players, while at the same time offering an excellent playground for actual fascists. Players, moderators, and developers regularly face backlash when advocating for more inclusive communities \u2013 at least whenever making a positive change would require dropping supposedly \u201cedgy\u201d behavior or content in an environment that has long been used to it. \r\nTackling these issues demands more awareness and responsibility from all involved parties, from the players to the developers and their marketing divisions. Luckily, we could recently witness various good practice examples of ways to oppose fascism in gaming. Such examples are still rare, they require effort and dedication, but they harbor promise of a better future for gaming \u2013 for everyone except literal Nazis.",
+            "description_html": "<p>The depiction of Nazis in games tends to downplay their atrocities and facilitate the normalization of fascist aesthetics and ideologies. Even in a playful and lighthearted context, this normalization has consequences that can and should be avoided by everyone in gaming communities \u2013 including developers, content creators, and players.</p>\n<p>World War II might be just one of many historical settings in games, but the representation of Nazis makes it a particularly tricky one. Especially if developers are trying to sell an entertainment product and provide players with all the freedom they might wish for, they frequently decide not to depict the Holocaust, for example. Such a decision, however, contributes to an embellished picture of Nazi Germany, which is then offered to players \u2013 some of which are apparently craving Nazi content. Their ideology, weaponry, and aesthetics seem to appeal to certain players in a peculiar way, as can be seen in user-created content, profiles, and discussions. \nNo matter what the intention behind such behavior is, the abundance of Nazi representations in gaming communities has harmful consequences. By keeping the line between role-play and actual propagation of fascist ideologies blurry, gaming communities make themselves a rather uncomfortable place for all but the most privileged of players, while at the same time offering an excellent playground for actual fascists. Players, moderators, and developers regularly face backlash when advocating for more inclusive communities \u2013 at least whenever making a positive change would require dropping supposedly \u201cedgy\u201d behavior or content in an environment that has long been used to it. \nTackling these issues demands more awareness and responsibility from all involved parties, from the players to the developers and their marketing divisions. Luckily, we could recently witness various good practice examples of ways to oppose fascism in gaming. Such examples are still rare, they require effort and dedication, but they harbor promise of a better future for gaming \u2013 for everyone except literal Nazis.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Nazis in Games",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-29T17:40:00Z",
+            "schedule_start": "2021-12-29T17:00:00Z",
+            "slug": "rc3-11600-nazis_in_games",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "65c722a1-c90b-4ad1-b8b3-55ba3ea89809"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Fireside Chat with Cory Doctorow. Make sure not to miss Cory's main talk \"What the cyberoptimists got wrong - and what to do about it\" one hour earlier, day 19:00h in rc1.\n\n",
+            "description_html": "<p>Fireside Chat with Cory Doctorow. Make sure not to miss Cory's main talk \"What the cyberoptimists got wrong - and what to do about it\" one hour earlier, day 19:00h in rc1.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Cory Doctorow \u2013 Fireside Chat",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-27T20:00:00Z",
+            "schedule_start": "2021-12-27T19:00:00Z",
+            "slug": "rc3-11582-cory_doctorow_fireside_chat",
+            "track": 6
+        },
+        "model": "core.event",
+        "pk": "6c74ea99-af50-4464-954f-b4fb025230f4"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "The Boys are back in Town: Dieses Jahr haben sich Tschirsich und Saatjohann zusammengetan und zeigen euch unter medizinischer Aufsicht von cbro den Zustand des deutschen vernetzten Gesundheitswesen.\n\nEs erwartet euch eine Reise in die unendeckten Welten der Praxis-Serverschr\u00e4nke, da wo seit Jahren schon Millionen Patientendaten darauf warten ins Internet freigelassen zu werden.\r\n\r\nHier, wo es keine verbindlichen technischen Richtlinien gibt, wo das Gesetz der IT-Sicherheits-Stra\u00dfe z\u00e4hlt: 'Sicher' ist, wenn nicht dr\u00fcber berichtet wird.\r\n\r\nAber auch da wo es strenge Normen und Regeln gibt, da wo die \u00d6ffentlichkeit hin schaut, passieren Dinge: Sicherheits-Protokolle werden mit der hei\u00dfen Nadel gestrickt, Daten werden an die ganze Welt gespendet, und eine Kontaktverfolgung m\u00f6chte in das \u00f6ffentliche Internet.\r\n",
+            "description_html": "<p>The Boys are back in Town: Dieses Jahr haben sich Tschirsich und Saatjohann zusammengetan und zeigen euch unter medizinischer Aufsicht von cbro den Zustand des deutschen vernetzten Gesundheitswesen.</p>\n<p>Es erwartet euch eine Reise in die unendeckten Welten der Praxis-Serverschr\u00e4nke, da wo seit Jahren schon Millionen Patientendaten darauf warten ins Internet freigelassen zu werden.</p>\n<p>Hier, wo es keine verbindlichen technischen Richtlinien gibt, wo das Gesetz der IT-Sicherheits-Stra\u00dfe z\u00e4hlt: 'Sicher' ist, wenn nicht dr\u00fcber berichtet wird.</p>\n<p>Aber auch da wo es strenge Normen und Regeln gibt, da wo die \u00d6ffentlichkeit hin schaut, passieren Dinge: Sicherheits-Protokolle werden mit der hei\u00dfen Nadel gestrickt, Daten werden an die ganze Welt gespendet, und eine Kontaktverfolgung m\u00f6chte in das \u00f6ffentliche Internet.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Tut mal kurz weh \u2013 Neues aus der Gesundheits-IT",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-29T19:00:00Z",
+            "schedule_start": "2021-12-29T18:00:00Z",
+            "slug": "rc3-11342-tut_mal_kurz_weh_neues_aus_der_gesundheits-it",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "6d4c6099-16e5-4d44-9b59-4c64f0216cf7"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "I'll speak about the liketohear framework providing an intuitive gui for self-adjusting the mobile openMHA hearing aid prototype. \r\n\r\nI want to give a brief introduction to the how-to of this DIY open source prototype, which is based on accessible hardware like Raspberry Pi. \r\nThe set-up is usable also by people who are not tech-savvy.\r\n\r\nExemplary reports of user feedback show the potential of self-adjusting of sound amplification. \r\n\r\nI give insights in the making off, the user's experiences in everyday listening situations and our visions for further developments. \r\n\n\nWe developed the liketohear framework with intuitve gui control via web app for adjustments of the open source mobile hearing aid prototype. Designed for personalized field research in daily life situations this prototype is deployed on available hardware (a.o. Raspberry Pi), foolproof, portable and running for a approx. 4 hours. Environmental sound is manipulated by change of volume and frequencies emphasis. Audio levels and adjustment parameters can be logged. \r\n\r\nWe tested the liketohear framework with 57 persons in daily life situations and evaluated the user data. \r\n\r\nOriginally the liketohear framework was created for the field research within the #CitizenScience project \"Hear How You Like To Hear\" of Fraunhofer IDMT Oldenburg (supported by BMBF). ",
+            "description_html": "<p>I'll speak about the liketohear framework providing an intuitive gui for self-adjusting the mobile openMHA hearing aid prototype. </p>\n<p>I want to give a brief introduction to the how-to of this DIY open source prototype, which is based on accessible hardware like Raspberry Pi. \nThe set-up is usable also by people who are not tech-savvy.</p>\n<p>Exemplary reports of user feedback show the potential of self-adjusting of sound amplification. </p>\n<p>I give insights in the making off, the user's experiences in everyday listening situations and our visions for further developments. </p>\n<p>We developed the liketohear framework with intuitve gui control via web app for adjustments of the open source mobile hearing aid prototype. Designed for personalized field research in daily life situations this prototype is deployed on available hardware (a.o. Raspberry Pi), foolproof, portable and running for a approx. 4 hours. Environmental sound is manipulated by change of volume and frequencies emphasis. Audio levels and adjustment parameters can be logged. </p>\n<p>We tested the liketohear framework with 57 persons in daily life situations and evaluated the user data. </p>\n<p>Originally the liketohear framework was created for the field research within the #CitizenScience project \"Hear How You Like To Hear\" of Fraunhofer IDMT Oldenburg (supported by BMBF). </p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "liketohear - Self-Adjustment of Open Source Mobile Hearing Aid Prototype",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-29T12:40:00Z",
+            "schedule_start": "2021-12-29T12:00:00Z",
+            "slug": "rc3-11388-liketohear_-_self-adjustment_of_open_source_mobile_hearing_aid_prototype",
+            "track": 7
+        },
+        "model": "core.event",
+        "pk": "72b208c4-229d-4ab1-bf30-f62bc871b17c"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Die USA hat im Vereinigten K\u00f6nigreich die Auslieferung von Julian Assange beantragt. Dazu fanden dieses Jahr zwei Prozessbl\u00f6cke statt, die ich beide in London als politischer Beobachter verfolgt habe. Davon werde ich berichten.\n\nIm Februar und im September wurde insgesamt gut f\u00fcnf Wochen lang \u00fcber die m\u00f6gliche Auslieferung von Julian Assange verhandelt. Inzwischen liegen gut 400 Seiten Abschlussstatements beider Parteien vor und f\u00fcr den 04.01.2021 hat die Richterin die Verk\u00fcndung einer Entscheidung angek\u00fcndigt. \r\n\r\nIm Vortrag m\u00f6chte ich einen Eindruck davon vermitteln, wie das Verfahren abgelaufen ist, welche Akteure vor Ort aufgetreten sind, welche Punkte diskutiert wurden und ob diese einer Auslieferung entgegenstehen k\u00f6nnten.\r\n",
+            "description_html": "<p>Die USA hat im Vereinigten K\u00f6nigreich die Auslieferung von Julian Assange beantragt. Dazu fanden dieses Jahr zwei Prozessbl\u00f6cke statt, die ich beide in London als politischer Beobachter verfolgt habe. Davon werde ich berichten.</p>\n<p>Im Februar und im September wurde insgesamt gut f\u00fcnf Wochen lang \u00fcber die m\u00f6gliche Auslieferung von Julian Assange verhandelt. Inzwischen liegen gut 400 Seiten Abschlussstatements beider Parteien vor und f\u00fcr den 04.01.2021 hat die Richterin die Verk\u00fcndung einer Entscheidung angek\u00fcndigt. </p>\n<p>Im Vortrag m\u00f6chte ich einen Eindruck davon vermitteln, wie das Verfahren abgelaufen ist, welche Akteure vor Ort aufgetreten sind, welche Punkte diskutiert wurden und ob diese einer Auslieferung entgegenstehen k\u00f6nnten.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Das Assange-Auslieferungsverfahren ",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T20:30:00Z",
+            "schedule_start": "2021-12-28T19:30:00Z",
+            "slug": "rc3-11486-das_assange-auslieferungsverfahren",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "78339cc8-3225-47d0-81d7-e5b5d15d15b6"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Photoresists are one of the essential ingredients for chip manufacturing and micro/nano engineering.\r\nWe will show how we\u2019re using them in a DIY Electron Beam Lithography set-up and how you\u2019re able to cook your own cheap resists and mix your own developers.\n\n<!DOCTYPE html>\r\n<html>\r\n<body>\r\n<h2>Resists? What&apos;s that?</h2>\r\n<ul>\r\n    <li>What are their applications</li>\r\n    <li>How does it work (types (positive/negative), chemistry, proximity effect, dosage etc)</li>\r\n</ul>\r\n\r\n<h2>EBL? What&apos;s that?</h2>\r\n<ul>\r\n    <li>How does it work</li>\r\n    <li>Pros &amp; cons:  comparison between EBL (slow) photolithography (fast)</li>\r\n    <li>Which resist can I use for EBL</li>\r\n</ul>\r\n\r\n<h2>DIY cooking of PMMA based resists</h2>\r\n<ul>\r\n    <li>Comparison of different solvents</li>\r\n</ul>\r\n\r\n<h2>Composition of different developers</h2>\r\n<ul>\r\n    <li>Comparison of different developers</li>\r\n</ul>\r\n\r\n<h2>Applications</h2>\r\n<ul>\r\n    <li>Usage as a mask</li>\r\n    <li>Usage as a structural dielectric material</li>\r\n    <li> ...(?)</li>\r\n</ul>\r\n<h2>The EBL exposure process</h2>\r\n<ul>\r\n    <li>simple SEM retrofitted with an EBL controller</li>\r\n    <li>The common file formats (GDSII &amp; OASIS)</li>\r\n    <li>Scan-Gen: how to generate the proper curves for the exposure</li>\r\n    <li>Hardware: off-the-shelf embedded modules like the RedPitaya</li>\r\n    <li>Generation of different filling curve styles, calibration, compensation of the proximity effect, correction of the SEMs intrinsic parameters, dosage!</li>\r\n    <li>Fiducial detection and alignment for multi-pass/multi-layer processes</li>\r\n</ul>\r\n<h2>Stuff comes together</h2>\r\n<ul>\r\n    <li>walk through the complete process along a simple example</li>\r\n</ul>\r\n\r\n<h2>More Examples</h2>\r\n\r\n<h2>Thanks & Credits</h2>\r\n\r\n<h2>Q & A</h2>\r\n\r\n</body>\r\n</html>\r\n",
+            "description_html": "<p>Photoresists are one of the essential ingredients for chip manufacturing and micro/nano engineering.\nWe will show how we\u2019re using them in a DIY Electron Beam Lithography set-up and how you\u2019re able to cook your own cheap resists and mix your own developers.</p>\n<p>Resists? What&apos;s that?</p>\n&lt;div class=\"codehilite\"&gt;<pre>&lt;span&gt;&lt;/span&gt;<code>&lt;span class=\"err\"&gt;What are their applications&lt;/span&gt;\n&lt;span class=\"err\"&gt;How does it work (types (positive/negative), chemistry, proximity effect, dosage etc)&lt;/span&gt;\n</code></pre>&lt;/div&gt;\n\n<p>EBL? What&apos;s that?</p>\n&lt;div class=\"codehilite\"&gt;<pre>&lt;span&gt;&lt;/span&gt;<code>&lt;span class=\"err\"&gt;How does it work&lt;/span&gt;\n&lt;span class=\"err\"&gt;Pros &amp;amp; cons:  comparison between EBL (slow) photolithography (fast)&lt;/span&gt;\n&lt;span class=\"err\"&gt;Which resist can I use for EBL&lt;/span&gt;\n</code></pre>&lt;/div&gt;\n\n<p>DIY cooking of PMMA based resists</p>\n&lt;div class=\"codehilite\"&gt;<pre>&lt;span&gt;&lt;/span&gt;<code>&lt;span class=\"err\"&gt;Comparison of different solvents&lt;/span&gt;\n</code></pre>&lt;/div&gt;\n\n<p>Composition of different developers</p>\n&lt;div class=\"codehilite\"&gt;<pre>&lt;span&gt;&lt;/span&gt;<code>&lt;span class=\"err\"&gt;Comparison of different developers&lt;/span&gt;\n</code></pre>&lt;/div&gt;\n\n<p>Applications</p>\n&lt;div class=\"codehilite\"&gt;<pre>&lt;span&gt;&lt;/span&gt;<code>&lt;span class=\"err\"&gt;Usage as a mask&lt;/span&gt;\n&lt;span class=\"err\"&gt;Usage as a structural dielectric material&lt;/span&gt;\n&lt;span class=\"err\"&gt; ...(?)&lt;/span&gt;\n</code></pre>&lt;/div&gt;\n\n<p>The EBL exposure process</p>\n&lt;div class=\"codehilite\"&gt;<pre>&lt;span&gt;&lt;/span&gt;<code>&lt;span class=\"err\"&gt;simple SEM retrofitted with an EBL controller&lt;/span&gt;\n&lt;span class=\"err\"&gt;The common file formats (GDSII &amp;amp; OASIS)&lt;/span&gt;\n&lt;span class=\"c\"&gt;Scan-Gen: how to generate the proper curves for the exposure&lt;/span&gt;\n&lt;span class=\"c\"&gt;Hardware: off-the-shelf embedded modules like the RedPitaya&lt;/span&gt;\n&lt;span class=\"err\"&gt;Generation of different filling curve styles, calibration, compensation of the proximity effect, correction of the SEMs intrinsic parameters, dosage!&lt;/span&gt;\n&lt;span class=\"err\"&gt;Fiducial detection and alignment for multi-pass/multi-layer processes&lt;/span&gt;\n</code></pre>&lt;/div&gt;\n\n<p>Stuff comes together</p>\n&lt;div class=\"codehilite\"&gt;<pre>&lt;span&gt;&lt;/span&gt;<code>&lt;span class=\"err\"&gt;walk through the complete process along a simple example&lt;/span&gt;\n</code></pre>&lt;/div&gt;\n\n<p>More Examples</p>\n<p>Thanks &amp; Credits</p>\n<p>Q &amp; A</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "I could not resist",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-30T13:40:00Z",
+            "schedule_start": "2021-12-30T13:00:00Z",
+            "slug": "rc3-11364-i_could_not_resist",
+            "track": 7
+        },
+        "model": "core.event",
+        "pk": "8f3ef0f5-4929-48b1-87b7-781245aae7ac"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "How secure is the interface between baseband chips and iOS?\r\nWhile this interface should protect against escalations from the baseband into operating system components, its implementation is\r\nfull of bugs. Fuzzing this interface is not only relevant to security, but also results in various funny effects, since the iPhone looses\r\ninformation about its identity and location, and eventually ends up in a state with a few thousand unread SMS that can no longer be deleted.\n\nThe baseband chip is the phone within a smartphone. While users might disable Bluetooth or not join untrusted Wi-Fis to increase security, mobile data and phone calls are always on. Some baseband features remain enabled even without an active data pass or SIM card installed.\r\nThus, baseband chips are a popular target for Remote Code Execution (RCE) attacks. Launched over-the-air, they do not leave any trace on intermediate servers.\r\n\r\nWith recently published tools, emulating and fuzzing baseband firmware has become accessible and gained a lot of attention by security researchers.\r\nYet, a critical part of an exploit chain remains escalating from the baseband chip into the operating system. An attacker with code execution in the baseband chip could modify network traffic and escalate with a Web browser exploit. However, wireless communication is already susceptible to manipulation without a baseband exploit due to missing user data integrity protection, as shown by the IMP4GT attacks on LTE.\r\nMoreover, network traffic manipulation still requires the attacker to wait until their target creates traffic in the context of a Web browser.\r\n\r\nMore stealthy attacks can be achieved via baseband activity that does not require any user interaction, such as retrieving information about nearby base stations. On an iPhone, the interface forwarding this information comes in two variants for Intel and Qualcomm baseband chips. Both interfaces interact with CommCenter, which is the phone component of the iPhone that parses and forwards phone calls, SMS, and more.\r\n\r\nThis talk demonstrates how to fuzz these interfaces as well as various challenges and solutions in fuzzing these. The baseband interface is such an integral part of iOS that fuzzing results are not limited to finding issues within CommCenter but also led to discovery of bugs in various daemons connecting to it. Some of these issues might also be triggered by a rouge base station, though, fuzzing the baseband interface locally results in higher performance and more control. \r\n\r\nFuzzing the baseband interface demonstrates fuzzing in a way that is easy to understand even for those who are not familiar with security research. The iPhone under test receives SMS so fast that it will not finish playingthe <i>Dimm</i> notification sound before the next SMS arrives, and, thus,\r\nthis actually sounds like <i>D-d-d-di-di-d-d-di-d-di-d-di-d-dimm!</i> The sound effect when the audio controller hangs up is also quite fun. Exposure notifications are no longer available due to the location change, since the iPhone uses baseband information to determine its region. And due to all the confusion about its identity, it regularly asks for activation.\r\n\r\nBesides security analysis, understanding the baseband interface means that it can also be controlled on jailbroken iPhones. Moreover, passive observations are possible on non-jailbroken devices with a baseband debug profile. This opens up these devices for new wireless research opportunities.",
+            "description_html": "<p>How secure is the interface between baseband chips and iOS?\nWhile this interface should protect against escalations from the baseband into operating system components, its implementation is\nfull of bugs. Fuzzing this interface is not only relevant to security, but also results in various funny effects, since the iPhone looses\ninformation about its identity and location, and eventually ends up in a state with a few thousand unread SMS that can no longer be deleted.</p>\n<p>The baseband chip is the phone within a smartphone. While users might disable Bluetooth or not join untrusted Wi-Fis to increase security, mobile data and phone calls are always on. Some baseband features remain enabled even without an active data pass or SIM card installed.\nThus, baseband chips are a popular target for Remote Code Execution (RCE) attacks. Launched over-the-air, they do not leave any trace on intermediate servers.</p>\n<p>With recently published tools, emulating and fuzzing baseband firmware has become accessible and gained a lot of attention by security researchers.\nYet, a critical part of an exploit chain remains escalating from the baseband chip into the operating system. An attacker with code execution in the baseband chip could modify network traffic and escalate with a Web browser exploit. However, wireless communication is already susceptible to manipulation without a baseband exploit due to missing user data integrity protection, as shown by the IMP4GT attacks on LTE.\nMoreover, network traffic manipulation still requires the attacker to wait until their target creates traffic in the context of a Web browser.</p>\n<p>More stealthy attacks can be achieved via baseband activity that does not require any user interaction, such as retrieving information about nearby base stations. On an iPhone, the interface forwarding this information comes in two variants for Intel and Qualcomm baseband chips. Both interfaces interact with CommCenter, which is the phone component of the iPhone that parses and forwards phone calls, SMS, and more.</p>\n<p>This talk demonstrates how to fuzz these interfaces as well as various challenges and solutions in fuzzing these. The baseband interface is such an integral part of iOS that fuzzing results are not limited to finding issues within CommCenter but also led to discovery of bugs in various daemons connecting to it. Some of these issues might also be triggered by a rouge base station, though, fuzzing the baseband interface locally results in higher performance and more control. </p>\n<p>Fuzzing the baseband interface demonstrates fuzzing in a way that is easy to understand even for those who are not familiar with security research. The iPhone under test receives SMS so fast that it will not finish playingthe Dimm notification sound before the next SMS arrives, and, thus,\nthis actually sounds like D-d-d-di-di-d-d-di-d-di-d-di-d-dimm! The sound effect when the audio controller hangs up is also quite fun. Exposure notifications are no longer available due to the location change, since the iPhone uses baseband information to determine its region. And due to all the confusion about its identity, it regularly asks for activation.</p>\n<p>Besides security analysis, understanding the baseband interface means that it can also be controlled on jailbroken iPhones. Moreover, passive observations are possible on non-jailbroken devices with a baseband debug profile. This opens up these devices for new wireless research opportunities.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Fuzzing the phone in the iPhone",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T13:40:00Z",
+            "schedule_start": "2021-12-28T12:40:00Z",
+            "slug": "rc3-11358-fuzzing_the_phone_in_the_iphone",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "94ead6ee-f201-410c-b777-e2f77dd9d014"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "The German Corona-Warn-App was published on June 16, 2020 and has been downloaded more than 23 million times since then. Data privacy and security have been and are of most importance in this project \u2013 even when they are invisible to most users. In this session, Thomas Klingbeil, Solution Architect of the Corona-Warn-App, will shed some light on aspects such as plausible deniability and the risk calculation and show their influence on the overall architecture.\n\nWhen looking at an mobile app, many people forget about the backend. However, especially when designing this component of the overall system it is very important, that it is not possible to learning about users' behaviours and the situation they are in, by observing the data traffic. For the Corona-Warn-App this specifically applies to the test results and the sharing of diagnosis keys in case of a positive diagnosis. To protect users (i.e. to create plausible deniability), the Corona-Warn-App uses a playbook, which simulates a realistically looking communication between mobile app and backend, even if there is no need for communication at that point of time. In this session, Thomas Klingbeil will shed light on those and other mostly invisible aspects of the app (e.g. the risk calculation).",
+            "description_html": "<p>The German Corona-Warn-App was published on June 16, 2020 and has been downloaded more than 23 million times since then. Data privacy and security have been and are of most importance in this project \u2013 even when they are invisible to most users. In this session, Thomas Klingbeil, Solution Architect of the Corona-Warn-App, will shed some light on aspects such as plausible deniability and the risk calculation and show their influence on the overall architecture.</p>\n<p>When looking at an mobile app, many people forget about the backend. However, especially when designing this component of the overall system it is very important, that it is not possible to learning about users' behaviours and the situation they are in, by observing the data traffic. For the Corona-Warn-App this specifically applies to the test results and the sharing of diagnosis keys in case of a positive diagnosis. To protect users (i.e. to create plausible deniability), the Corona-Warn-App uses a playbook, which simulates a realistically looking communication between mobile app and backend, even if there is no need for communication at that point of time. In this session, Thomas Klingbeil will shed light on those and other mostly invisible aspects of the app (e.g. the risk calculation).</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Corona-Warn-App",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-30T12:40:00Z",
+            "schedule_start": "2021-12-30T12:00:00Z",
+            "slug": "rc3-11573-corona-warn-app",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "96ea1862-1f68-4969-a540-e661346629e7"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "\"Listen to the science\" is relatively easy when it comes to mitigating climate change, we need to stop burning fossil fuels. However, climate change is already here, in this talk I'll focus on what the science has to say on extreme weather and losses  and damages.\n\nFor a long time it has not been possible to make the  - arguably for the day to day life of most people crucial link \u2013 from anthropogenic climate change and global warming to individual weather and climate-related events with confidence but this has changed in recent years. Quantifying and establishing the link between individual weather events, that often lead to large damages, has been the focus of the emerging science of extreme event attribution. Even if a comprehensive inventory of the impacts of climate change today is impossible, event attribution allows us to understand better what climate change means.\r\n\r\nArguably even more importantly, disentangling predictable drivers of an extreme event like anthropogenic climate change, from natural variability and changes in vulnerability and exposure will allow a better understanding of where risks are coming from and in turn how they can be addressed. Extreme events open a window to address the problem of exposure and vulnerability. Scientific evidence of the importance of different drivers is essential to avoid playing blame games and allows instead for a well-informed debate about addressing risk.",
+            "description_html": "<p>\"Listen to the science\" is relatively easy when it comes to mitigating climate change, we need to stop burning fossil fuels. However, climate change is already here, in this talk I'll focus on what the science has to say on extreme weather and losses  and damages.</p>\n<p>For a long time it has not been possible to make the  - arguably for the day to day life of most people crucial link \u2013 from anthropogenic climate change and global warming to individual weather and climate-related events with confidence but this has changed in recent years. Quantifying and establishing the link between individual weather events, that often lead to large damages, has been the focus of the emerging science of extreme event attribution. Even if a comprehensive inventory of the impacts of climate change today is impossible, event attribution allows us to understand better what climate change means.</p>\n<p>Arguably even more importantly, disentangling predictable drivers of an extreme event like anthropogenic climate change, from natural variability and changes in vulnerability and exposure will allow a better understanding of where risks are coming from and in turn how they can be addressed. Extreme events open a window to address the problem of exposure and vulnerability. Scientific evidence of the importance of different drivers is essential to avoid playing blame games and allows instead for a well-informed debate about addressing risk.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Angry weather ?",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T15:00:00Z",
+            "schedule_start": "2021-12-28T14:00:00Z",
+            "slug": "rc3-11357-angry_weather",
+            "track": 9
+        },
+        "model": "core.event",
+        "pk": "a8b8ec8d-5065-401f-8bbf-6d84b5ec50f7"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "The Electronic Frontier Foundation\u2019s Kurt Opsahl with show you how to identify surveillance technologies that law enforcement may use at protests and other public gathering to spying on people exercising their fundamental rights. Learn how to spot the surveillance so you can advocate effectively for the policies necessary to protect your rights and bring transparency to the police surveillance.\n\nIf you attend a protest, demonstration or any mass gathering in a public space, the police are probably surveilling you. Whether it\u2019s sophisticated facial recognition, ubiquitous video recording, or the instant analysis of our biometric data, law enforcement agencies are following closely behind their counterparts in the military and intelligence services in acquiring privacy-invasive technologies, from automated license plate readers to body-worn cameras to drones and more.  In this talk, Kurt Opsahl with show you how to identify surveillance technologies in use:\r\n\t\u2022 Where to look for these devices\r\n\t\u2022 How these technologies look\r\n\t\u2022 How these technologies function\r\n\t\u2022 How they are used by police\r\n\t\u2022 What kind of data they collect\r\n\t\u2022 Where to learn more about them\r\nKnowledge is power. Knowing what technologies are in use can help you understand the threats to your privacy and security, as well as tools to advocate for limits on police use of surveillance that may chill people\u2019s rights to express themselves on public issues.  Just as analog surveillance historically has been used as a tool for oppression, policymakers and the public must understand the threat posed by emerging technologies to successfully defend human rights in the digital age. ",
+            "description_html": "<p>The Electronic Frontier Foundation\u2019s Kurt Opsahl with show you how to identify surveillance technologies that law enforcement may use at protests and other public gathering to spying on people exercising their fundamental rights. Learn how to spot the surveillance so you can advocate effectively for the policies necessary to protect your rights and bring transparency to the police surveillance.</p>\n<p>If you attend a protest, demonstration or any mass gathering in a public space, the police are probably surveilling you. Whether it\u2019s sophisticated facial recognition, ubiquitous video recording, or the instant analysis of our biometric data, law enforcement agencies are following closely behind their counterparts in the military and intelligence services in acquiring privacy-invasive technologies, from automated license plate readers to body-worn cameras to drones and more.  In this talk, Kurt Opsahl with show you how to identify surveillance technologies in use:\n    \u2022 Where to look for these devices\n    \u2022 How these technologies look\n    \u2022 How these technologies function\n    \u2022 How they are used by police\n    \u2022 What kind of data they collect\n    \u2022 Where to learn more about them\nKnowledge is power. Knowing what technologies are in use can help you understand the threats to your privacy and security, as well as tools to advocate for limits on police use of surveillance that may chill people\u2019s rights to express themselves on public issues.  Just as analog surveillance historically has been used as a tool for oppression, policymakers and the public must understand the threat posed by emerging technologies to successfully defend human rights in the digital age. </p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Spot the Surveillance",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-28T20:20:00Z",
+            "schedule_start": "2021-12-28T19:40:00Z",
+            "slug": "rc3-11406-spot_the_surveillance",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "ab2b7bae-f233-4fd0-8773-51af38d3833f"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "On November 13., Nintendo launched its newest retro console, the Nintendo Game and Watch - but by then it was already hacked!\r\n\r\n In contrast to the other Nintendo classic consoles (NES & SNES), Nintendo upped their game this time: A locked processor, AES-CTR encrypted flash & co. made it significantly harder to hack it, but in the end it was still hacked - one day before release.\r\n\r\nThis talk walks through the whole process of opening it up, exploiting the firmware up to bringing homebrew to a new console - in a fun, beginner friendly way.\n\nThe Nintendo Game & Watch was anticipated by a lot of retro-interested folks, and the clear expectation was: We wan't to get more games onto this device!\r\n\r\nBut Nintendo made the life of hackers harder: The CPU is locked, the external flash AES encrypted, and the USB-C connector does not have its data-lines connected.\r\n\r\nBut not so fast! In this talk we learn how to exploit the firmware, get code-execution via a NOP-slide, dump the ROMs & RAMs of the device and achieve what everyone has been asking for: DOOM running on the Nintendo Game & Watch.\r\n\r\nIf you are interested in the full flow from opening up a device, exploiting it, to writing custom drivers for homebrew, this is your talk! And all you need to follow along are a Game & Watch and about $4 of equipment!",
+            "description_html": "<p>On November 13., Nintendo launched its newest retro console, the Nintendo Game and Watch - but by then it was already hacked!</p>\n<p>In contrast to the other Nintendo classic consoles (NES &amp; SNES), Nintendo upped their game this time: A locked processor, AES-CTR encrypted flash &amp; co. made it significantly harder to hack it, but in the end it was still hacked - one day before release.</p>\n<p>This talk walks through the whole process of opening it up, exploiting the firmware up to bringing homebrew to a new console - in a fun, beginner friendly way.</p>\n<p>The Nintendo Game &amp; Watch was anticipated by a lot of retro-interested folks, and the clear expectation was: We wan't to get more games onto this device!</p>\n<p>But Nintendo made the life of hackers harder: The CPU is locked, the external flash AES encrypted, and the USB-C connector does not have its data-lines connected.</p>\n<p>But not so fast! In this talk we learn how to exploit the firmware, get code-execution via a NOP-slide, dump the ROMs &amp; RAMs of the device and achieve what everyone has been asking for: DOOM running on the Nintendo Game &amp; Watch.</p>\n<p>If you are interested in the full flow from opening up a device, exploiting it, to writing custom drivers for homebrew, this is your talk! And all you need to follow along are a Game &amp; Watch and about $4 of equipment!</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Hacking the Nintendo Game & Watch ",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-27T17:40:00Z",
+            "schedule_start": "2021-12-27T17:00:00Z",
+            "slug": "rc3-11527-hacking_the_nintendo_game_watch",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "b011ec21-f612-4e9c-a193-8b53ca229cd8"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "The role of the audience in stage performances is changing from passive spectators to contributors making the performance interactive by using different techniques. In this talk, we investigate the connection of audience physiological data to the experienced performance in three performance events with a total of 98 participants. We identified memorable performance moments by assessing, Electrodermal Activity (EDA) showing that the audience\u2019s responses match the choreographer\u2019s intention. Through Heart Rate Variability (HRV) features related to parasympathetic activity, we identified dramatic shifts that are connected to the choreographic development of the performance. Our results show how the audience's physiological responses are linked to the choreographic development of the performance. Based on the findings, we contribute a discussion of the registered physiological phenomena and implications of the audience\u2019s responses analysis to performance and choreography design in general. Furthermore, we walk through the dataset collected from the performance events. \n\nEach performance lives from the interplay between audience and artists. Even if performers follow a precise script, each rendition is different partly due to audience reactions. Performers often describe it as an invisible link between then and the spectators, involving the audience in co-creating art. \r\n\r\nThe stage design and described setup came out of a collaboration between the performing artists, designers and researchers in a semi-democratic process.\r\n\r\nBoth researchers and artists contributed to developing the concept during the iterative process to balance research and artistic interests. This process was mainly led by artists, especially the choreographer. Besides the predetermined story and design, the choreographer also created some improvisational sections where dancers could interact with stage elements affected by audience physiological response.\r\n\r\nThe main contributions of this talk are as follows:\r\n(1) We present the concept of \"bringing the audience on stage\" by mapping physiological signals from audience members to stage elements to amplify the connection between artists and the audience. We detail information about the design process, focusing on sensing heart rate and electrodermal activity (EDA), as well as how these signals are translated to the onstage elements through sonification and visualizations.\r\n(2) We describe an open integrated wearable system that consists of a wrist band, back-end processing, and output. Our proposed system enables the capturing and translating of physiological signals into stage design elements.\r\n(3) We realized our proposed concept as a proof-of-concept with the performance \"Boiling Mind\". The performance involved dancers, choreographers, researchers, visual and sound designers in the process. It was performed three times in front of an audience of 57, 37 and 45 people. In each performance, around 30 audience members wore the wearable wrist bands.\r\n\r\nThe hardware used for the performance piece as well as the data recorded will be open sourced and will be made avaialable to download.",
+            "description_html": "<p>The role of the audience in stage performances is changing from passive spectators to contributors making the performance interactive by using different techniques. In this talk, we investigate the connection of audience physiological data to the experienced performance in three performance events with a total of 98 participants. We identified memorable performance moments by assessing, Electrodermal Activity (EDA) showing that the audience\u2019s responses match the choreographer\u2019s intention. Through Heart Rate Variability (HRV) features related to parasympathetic activity, we identified dramatic shifts that are connected to the choreographic development of the performance. Our results show how the audience's physiological responses are linked to the choreographic development of the performance. Based on the findings, we contribute a discussion of the registered physiological phenomena and implications of the audience\u2019s responses analysis to performance and choreography design in general. Furthermore, we walk through the dataset collected from the performance events. </p>\n<p>Each performance lives from the interplay between audience and artists. Even if performers follow a precise script, each rendition is different partly due to audience reactions. Performers often describe it as an invisible link between then and the spectators, involving the audience in co-creating art. </p>\n<p>The stage design and described setup came out of a collaboration between the performing artists, designers and researchers in a semi-democratic process.</p>\n<p>Both researchers and artists contributed to developing the concept during the iterative process to balance research and artistic interests. This process was mainly led by artists, especially the choreographer. Besides the predetermined story and design, the choreographer also created some improvisational sections where dancers could interact with stage elements affected by audience physiological response.</p>\n<p>The main contributions of this talk are as follows:\n(1) We present the concept of \"bringing the audience on stage\" by mapping physiological signals from audience members to stage elements to amplify the connection between artists and the audience. We detail information about the design process, focusing on sensing heart rate and electrodermal activity (EDA), as well as how these signals are translated to the onstage elements through sonification and visualizations.\n(2) We describe an open integrated wearable system that consists of a wrist band, back-end processing, and output. Our proposed system enables the capturing and translating of physiological signals into stage design elements.\n(3) We realized our proposed concept as a proof-of-concept with the performance \"Boiling Mind\". The performance involved dancers, choreographers, researchers, visual and sound designers in the process. It was performed three times in front of an audience of 57, 37 and 45 people. In each performance, around 30 audience members wore the wearable wrist bands.</p>\n<p>The hardware used for the performance piece as well as the data recorded will be open sourced and will be made avaialable to download.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Boiling Mind",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-27T12:40:00Z",
+            "schedule_start": "2021-12-27T12:00:00Z",
+            "slug": "rc3-11560-boiling_mind",
+            "track": 4
+        },
+        "model": "core.event",
+        "pk": "b4cb2164-52b4-4f81-a3cc-8d6b60e7e99e"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "This conference is run by teams of volunteers. In this event, they will provide some insight into the challenges they faced while building the infrastructure, networks, running video streams, or organizing the world map.\n\n",
+            "description_html": "<p>This conference is run by teams of volunteers. In this event, they will provide some insight into the challenges they faced while building the infrastructure, networks, running video streams, or organizing the world map.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Infrastructure Review",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "02:00:00",
+            "schedule_end": "2021-12-30T19:00:00Z",
+            "schedule_start": "2021-12-30T17:00:00Z",
+            "slug": "rc3-11585-infrastructure_review",
+            "track": 2
+        },
+        "model": "core.event",
+        "pk": "b57bb53f-8ef2-4310-8b9e-6189a2afb403"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "State-of-the-art report on Qualcomm DIAG diagnostic protocol research, its modern implementation as it appears in Hexagon basebands, advanced harnessing and reverse-engineering on modern off-the-shelf smartphones.\n\nDiag is a proprietary diagnostics and control protocol implemented in omnipresent Qualcomm Hexagon-based cellular modems, such as those built-in Snapdragon SoCs, and named so after the DIAG task in the baseband's RTOS that handles it. Diag presents an interesting non-OTA attack surface via a locally exposed interface channels to both the application processor OS and the USB endpoints, and advanced capabilities for controlling the baseband. \r\n\r\nSince Diag was first reverse-engineered around 2010, a lot has changed: mobile basebands are becoming increasingly security-hardened and production-fused, Hexagon architecture is gaining some serious advantages in the competition, and the Diag protocol itself was changed and locked down. Meanwhile, local attack surface in basebands is gaining importance, and so does baseband security and vulnerability research. \r\n\r\nIn this talk I will present the state-of-the-art on Diag research, based on previously unpublished details about the inner workings of the Diag infrastracture that I reverse-engineered and harnessed for my research purposes, its modern use, and how we can exploit it to talk to the production-fused baseband chip on off-the-shelf modern phones such as Google Pixel, while understanding what exactly we are doing.",
+            "description_html": "<p>State-of-the-art report on Qualcomm DIAG diagnostic protocol research, its modern implementation as it appears in Hexagon basebands, advanced harnessing and reverse-engineering on modern off-the-shelf smartphones.</p>\n<p>Diag is a proprietary diagnostics and control protocol implemented in omnipresent Qualcomm Hexagon-based cellular modems, such as those built-in Snapdragon SoCs, and named so after the DIAG task in the baseband's RTOS that handles it. Diag presents an interesting non-OTA attack surface via a locally exposed interface channels to both the application processor OS and the USB endpoints, and advanced capabilities for controlling the baseband. </p>\n<p>Since Diag was first reverse-engineered around 2010, a lot has changed: mobile basebands are becoming increasingly security-hardened and production-fused, Hexagon architecture is gaining some serious advantages in the competition, and the Diag protocol itself was changed and locked down. Meanwhile, local attack surface in basebands is gaining importance, and so does baseband security and vulnerability research. </p>\n<p>In this talk I will present the state-of-the-art on Diag research, based on previously unpublished details about the inner workings of the Diag infrastracture that I reverse-engineered and harnessed for my research purposes, its modern use, and how we can exploit it to talk to the production-fused baseband chip on off-the-shelf modern phones such as Google Pixel, while understanding what exactly we are doing.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Advanced Hexagon Diag",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T15:00:00Z",
+            "schedule_start": "2021-12-28T14:00:00Z",
+            "slug": "rc3-11397-advanced_hexagon_diag",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "b6d707df-9f91-44d4-a53d-34a81f33dcd8"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Studying automotive systems is often expensive and inconvenient, which prevents many people from getting started. To make research and education in automotive systems more accessible, we developed RAMN, an inexpensive open-source testbed that simulates a CAN/CAN-FD network of four Electronic Control Units. In our presentation, we introduce the testbed and demonstrate its use by experimenting with a simple Cruise Control algorithm in C, starting from establishing differential equations all the way to testing it in a driving simulator - all that using only open-source tools. We then use the result as a reference to explain what, concretely, would have been different on actual ECU hardware and software, and why that matters for security.\r\n\n\n1) Introduction and motivations (~10 minutes)\r\n\r\nWe briefly introduce the basics of automotive systems (ECU networks, CAN/CAN-FD), the importance of education and research in automotive security, and our motivations for designing a new testbed.\r\n\r\n2) RAMN Introduction (~20 minutes)\r\n\r\nIn this section, we introduce our new platform. RAMN is an inexpensive CAN/CAN-FD network of four Electronic Control Units (ECU) that can be programmed to simulate an active automotive network in closed-loop with the open-source autonomous driving simulator CARLA. It has the size of a credit card, is powered over USB, and can be recognized as a standard USB-to-CAN adapter. It is contained within one PCB, using only two layers and hand-solderable components. We show several demonstrations, then give details about the hardware (made with KiCAD) and the software (based on STM32 HAL and freeRTOS). \r\n\r\n3) Experiments (~10 minutes)\r\n\r\nWe use Cruise Control as an example algorithm to experiment with, using RAMN and other open-source tools. We analyze the problem, evaluate differential equations using Scilab, establish different control strategies, implement them in C in one of the ECUs and verify the results by connecting RAMN to the driving simulator CARLA, while making measurements on the CAN bus using BUSMASTER.\r\n\r\n4) Automotive Grade (~10 minutes)\r\n\r\nWe use the results of the previous section as a reference to explain what, concretely, would have been different with real ECU hardware and software. We discuss what drives the design of automotive systems, introducing important standards such as ISO26262 and MISRA-C. We explain what alternatives are available to researchers when technologies are hidden behind NDAs or prohibitive costs - and how RAMN makes use of them.\r\n\r\n5) Automotive Security (~10 minutes)\r\n\r\nWe use the content of the sections above to discuss automotive security, using RAMN to show demonstrations of potential activities. ",
+            "description_html": "<p>Studying automotive systems is often expensive and inconvenient, which prevents many people from getting started. To make research and education in automotive systems more accessible, we developed RAMN, an inexpensive open-source testbed that simulates a CAN/CAN-FD network of four Electronic Control Units. In our presentation, we introduce the testbed and demonstrate its use by experimenting with a simple Cruise Control algorithm in C, starting from establishing differential equations all the way to testing it in a driving simulator - all that using only open-source tools. We then use the result as a reference to explain what, concretely, would have been different on actual ECU hardware and software, and why that matters for security.</p>\n<p>1) Introduction and motivations (~10 minutes)</p>\n<p>We briefly introduce the basics of automotive systems (ECU networks, CAN/CAN-FD), the importance of education and research in automotive security, and our motivations for designing a new testbed.</p>\n<p>2) RAMN Introduction (~20 minutes)</p>\n<p>In this section, we introduce our new platform. RAMN is an inexpensive CAN/CAN-FD network of four Electronic Control Units (ECU) that can be programmed to simulate an active automotive network in closed-loop with the open-source autonomous driving simulator CARLA. It has the size of a credit card, is powered over USB, and can be recognized as a standard USB-to-CAN adapter. It is contained within one PCB, using only two layers and hand-solderable components. We show several demonstrations, then give details about the hardware (made with KiCAD) and the software (based on STM32 HAL and freeRTOS). </p>\n<p>3) Experiments (~10 minutes)</p>\n<p>We use Cruise Control as an example algorithm to experiment with, using RAMN and other open-source tools. We analyze the problem, evaluate differential equations using Scilab, establish different control strategies, implement them in C in one of the ECUs and verify the results by connecting RAMN to the driving simulator CARLA, while making measurements on the CAN bus using BUSMASTER.</p>\n<p>4) Automotive Grade (~10 minutes)</p>\n<p>We use the results of the previous section as a reference to explain what, concretely, would have been different with real ECU hardware and software. We discuss what drives the design of automotive systems, introducing important standards such as ISO26262 and MISRA-C. We explain what alternatives are available to researchers when technologies are hidden behind NDAs or prohibitive costs - and how RAMN makes use of them.</p>\n<p>5) Automotive Security (~10 minutes)</p>\n<p>We use the content of the sections above to discuss automotive security, using RAMN to show demonstrations of potential activities. </p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "RAMN: Resistant Automotive Miniature Network",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T12:20:00Z",
+            "schedule_start": "2021-12-28T11:20:00Z",
+            "slug": "rc3-11443-ramn_resistant_automotive_miniature_network",
+            "track": 7
+        },
+        "model": "core.event",
+        "pk": "bd6036e7-ad6e-4352-8fb6-2e2227c153b8"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "The EU has been pushing for apps that support end-to-end encrypted messaging to contain an upload filter, which will scrutinise material for prohibited content before it's encrypted. This is the latest in a long line of attempts to maintain government access to data despite cryptography. In this talk, I will try to put them in context of the last two crypto wars and assess the costs their efforts have imposed on our economies. I'll finally ask what strategic direction democratic governments might take in the coming tussles with China.\n\n",
+            "description_html": "<p>The EU has been pushing for apps that support end-to-end encrypted messaging to contain an upload filter, which will scrutinise material for prohibited content before it's encrypted. This is the latest in a long line of attempts to maintain government access to data despite cryptography. In this talk, I will try to put them in context of the last two crypto wars and assess the costs their efforts have imposed on our economies. I'll finally ask what strategic direction democratic governments might take in the coming tussles with China.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "What Price the Upload Filter?",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T18:00:00Z",
+            "schedule_start": "2021-12-28T17:00:00Z",
+            "slug": "rc3-11577-what_price_the_upload_filter",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "bdf8e1ad-c200-46ad-8b91-1c58083952a7"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "After the first unsuccessful deployment of voting machines in Germany about ten years ago, elements of electronic voting have reached elections again. Although there is now still a paper-trail, more and more essential steps, such as counting the votes, are moved into electronic systems. This change in the ballot-counting procedure took place mostly unnoticed by the public. We are two very concerned election workers who present our first-hand experience in this talk. We show that the current digital procedure is conceptually and practically flawed in terms of security. First, we give an insight into the role of computers and their interaction with humans during ballot-counting. We show that the underlying system concepts contradict IT-security best-practices. Next, we present an in-depth analysis of one ballot-counting software, deployed for the Bavarian municipal elections (\"Kommunalwahlen\"). We discovered several severe security vulnerabilities that allow an almost unnoticeable manipulation of local voting results. Finally, we conclude that there is an immediate need for action to re-establish election security and transparency - not only for the government but for everyone of us.\n\nElections are a key element of every democracy. However, many democratic countries in the world have to face attacks on them, be it by the government or by foreign countries. Even if ballot counting has been finished, election results are often not accepted but questioned due to alleged manipulations. All these aspects pose major threats to democracy as they try to undermine the actual and publicly perceived integrity of elections.\r\n\r\nIn Germany, elections are usually considered quite secure. Elections are paper-based and the subsequent ballot-counting is open to the public. The infamous introduction of electronic voting machines about ten years ago was finally stopped by the German Federal Constitutional Court. Thus, everything is human-controlled, transparent, and secure \u2013 isn\u2019t it?\r\n\r\nUnfortunately, these claims are questionable since the silent introduction of electronic vote counting. The election system in Germany is quite complex, for example in the \"Kreistagswahlen\" (~district elections) workers have to count up to 70 individual votes per ballot, while respecting a special rule set. This process is very labor-intensive and sufficient election workers are often hard to come by. Due to this, electronic systems were introduced that provide support during vote counting. Election workers are no longer required to fill tally sheets, count votes, and sum them up on their own. Each ballot is simply entered into a software that performs all the magic and finally emits a result.\r\n\r\nThis year, we volunteered again as election workers, but our trust in electronically-assisted elections has been vastly impacted. As IT-security researchers, we consider it our responsibility to share and discuss our concerns. We performed a thorough analysis of the concept and the hard- and software of the electronic vote counting system. We discovered several flaws on a conceptual and practical level, that can severely diminish the integrity of the election and makes it prone to manipulations. To underline the impact of the system\u2019s vulnerabilities, we demonstrate an exemplary attack on an election.\r\n\r\nFinally, we propose different options on how to make elections secure again. We do not consider this an entirely technical case, as there are significant legal and societal circumstances that led to the deployment of this insecure system.",
+            "description_html": "<p>After the first unsuccessful deployment of voting machines in Germany about ten years ago, elements of electronic voting have reached elections again. Although there is now still a paper-trail, more and more essential steps, such as counting the votes, are moved into electronic systems. This change in the ballot-counting procedure took place mostly unnoticed by the public. We are two very concerned election workers who present our first-hand experience in this talk. We show that the current digital procedure is conceptually and practically flawed in terms of security. First, we give an insight into the role of computers and their interaction with humans during ballot-counting. We show that the underlying system concepts contradict IT-security best-practices. Next, we present an in-depth analysis of one ballot-counting software, deployed for the Bavarian municipal elections (\"Kommunalwahlen\"). We discovered several severe security vulnerabilities that allow an almost unnoticeable manipulation of local voting results. Finally, we conclude that there is an immediate need for action to re-establish election security and transparency - not only for the government but for everyone of us.</p>\n<p>Elections are a key element of every democracy. However, many democratic countries in the world have to face attacks on them, be it by the government or by foreign countries. Even if ballot counting has been finished, election results are often not accepted but questioned due to alleged manipulations. All these aspects pose major threats to democracy as they try to undermine the actual and publicly perceived integrity of elections.</p>\n<p>In Germany, elections are usually considered quite secure. Elections are paper-based and the subsequent ballot-counting is open to the public. The infamous introduction of electronic voting machines about ten years ago was finally stopped by the German Federal Constitutional Court. Thus, everything is human-controlled, transparent, and secure \u2013 isn\u2019t it?</p>\n<p>Unfortunately, these claims are questionable since the silent introduction of electronic vote counting. The election system in Germany is quite complex, for example in the \"Kreistagswahlen\" (~district elections) workers have to count up to 70 individual votes per ballot, while respecting a special rule set. This process is very labor-intensive and sufficient election workers are often hard to come by. Due to this, electronic systems were introduced that provide support during vote counting. Election workers are no longer required to fill tally sheets, count votes, and sum them up on their own. Each ballot is simply entered into a software that performs all the magic and finally emits a result.</p>\n<p>This year, we volunteered again as election workers, but our trust in electronically-assisted elections has been vastly impacted. As IT-security researchers, we consider it our responsibility to share and discuss our concerns. We performed a thorough analysis of the concept and the hard- and software of the electronic vote counting system. We discovered several flaws on a conceptual and practical level, that can severely diminish the integrity of the election and makes it prone to manipulations. To underline the impact of the system\u2019s vulnerabilities, we demonstrate an exemplary attack on an election.</p>\n<p>Finally, we propose different options on how to make elections secure again. We do not consider this an entirely technical case, as there are significant legal and societal circumstances that led to the deployment of this insecure system.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Hacking German Elections",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-27T20:00:00Z",
+            "schedule_start": "2021-12-27T19:00:00Z",
+            "slug": "rc3-11440-hacking_german_elections",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "c2c3752a-f3c0-4e3f-b619-15ad7749f156"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "SAR for us does not mean \u201cSearch and Rescue\", but \u201cSolidarity and Resistance\u201d. We will talk about the mission of the rescue vessel Louise Michel and why smashing borders won\u00b4t work without smashing the patriarchy - and the other way round. \r\n\n\nThis summer, a pink ship popped up on the central mediterranean sea and made headlines by rescuing hundreds out of maritime distress. We will talk about the power structures behind this situation and about the values of our mission as we understand doing sea rescue not as an humanitarian act but as field that might conquer powerful relations. \r\n\r\nBorders are imaginary lines with a pronounced vulnerability, otherwise they would not need so many (technical) measures to protect them. \r\nBut borders are more than 'only' borders of states/countries. Borders are also boundaries between humans, bodies, gender, ... or differently: they are supposed lines of distinction. Fighting these borders means we have to struggle them together and understand all of them as contested territories, contested bodies, contested spaces. \r\n\r\nBut what could that mean? And (how) do we reflect what we\u2019re doing and how we\u2019re acting? How aware are we ourselves about white supremacy and neo-colonialism in our work? How can we challenge our internalized sexism and racism while working in the field under constant pressure of opressing systems? \r\n",
+            "description_html": "<p>SAR for us does not mean \u201cSearch and Rescue\", but \u201cSolidarity and Resistance\u201d. We will talk about the mission of the rescue vessel Louise Michel and why smashing borders won\u00b4t work without smashing the patriarchy - and the other way round. </p>\n<p>This summer, a pink ship popped up on the central mediterranean sea and made headlines by rescuing hundreds out of maritime distress. We will talk about the power structures behind this situation and about the values of our mission as we understand doing sea rescue not as an humanitarian act but as field that might conquer powerful relations. </p>\n<p>Borders are imaginary lines with a pronounced vulnerability, otherwise they would not need so many (technical) measures to protect them. \nBut borders are more than 'only' borders of states/countries. Borders are also boundaries between humans, bodies, gender, ... or differently: they are supposed lines of distinction. Fighting these borders means we have to struggle them together and understand all of them as contested territories, contested bodies, contested spaces. </p>\n<p>But what could that mean? And (how) do we reflect what we\u2019re doing and how we\u2019re acting? How aware are we ourselves about white supremacy and neo-colonialism in our work? How can we challenge our internalized sexism and racism while working in the field under constant pressure of opressing systems? </p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "The Mission of the MV Louise Michel",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-27T12:40:00Z",
+            "schedule_start": "2021-12-27T12:00:00Z",
+            "slug": "rc3-11503-the_mission_of_the_mv_louise_michel",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "c7fd5bd1-3f68-48e9-adba-a8161c777a69"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Schwer was los in QualityLand, dem besten aller m\u00f6glichen L\u00e4nder. \n\nJeder Monat ist der hei\u00dfeste seit Beginn der Wetteraufzeichnung, ein Billion\u00e4r m\u00f6chte Pr\u00e4sident werden, und dann ist da noch die Sache mit dem Dritten Weltkrieg. Peter Arbeitsloser darf derweil endlich als Maschinentherapeut arbeiten und versucht, die Beziehungsprobleme von Haushaltsger\u00e4ten zu l\u00f6sen. Kiki Unbekannt schn\u00fcffelt in ihrer eigenen Vergangenheit herum und bekommt Stress mit einem ferngesteuerten Killer. Au\u00dferdem benehmen sich alle Drohnen in letzter Zeit ziemlich sonderbar... ",
+            "description_html": "<p>Schwer was los in QualityLand, dem besten aller m\u00f6glichen L\u00e4nder. </p>\n<p>Jeder Monat ist der hei\u00dfeste seit Beginn der Wetteraufzeichnung, ein Billion\u00e4r m\u00f6chte Pr\u00e4sident werden, und dann ist da noch die Sache mit dem Dritten Weltkrieg. Peter Arbeitsloser darf derweil endlich als Maschinentherapeut arbeiten und versucht, die Beziehungsprobleme von Haushaltsger\u00e4ten zu l\u00f6sen. Kiki Unbekannt schn\u00fcffelt in ihrer eigenen Vergangenheit herum und bekommt Stress mit einem ferngesteuerten Killer. Au\u00dferdem benehmen sich alle Drohnen in letzter Zeit ziemlich sonderbar... </p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Lesung: Qualityland 2.0",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:30:00",
+            "schedule_end": "2021-12-27T22:00:00Z",
+            "schedule_start": "2021-12-27T21:30:00Z",
+            "slug": "rc3-11595-lesung_qualityland_2_0",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "c9923806-0eeb-4576-a9d4-ee3f33a6b5d0"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "This talk presents an extensive security analysis of trusted-execution environment shielding runtimes, covering over two years of continuing research and leading to 7 CVE designations in industry-grade Intel SGX enclave SDKs. \n\nFor the first time, we develop a systematic way of reasoning about enclave shielding responsibilities categorized across 11 distinct classes across the ABI and API tiers. Our analysis revealed over 40 new interface sanitization vulnerabilities, and we developed innovative techniques to aid practically exploitation through among others CPU register poisoning, timer-based single-stepping, rogue CPU exception handlers, and side-channel-based cryptanalysis. We finally analyze tendencies across the landscape and find that developers continue to make the same mistakes, calling for improved vulnerability detection and mitigation techniques.\r\n\r\nThis talk overviews the security and state of practice of today's Trusted Execution Environment (TEE) shielding runtimes from both industry and research. Our systematic analysis uncovered over 40 re-occurring enclave interface sanitization vulnerabilities in 8 major open-source shielding frameworks for Intel SGX, RISC-V, and Sancus TEEs. The resulting vulnerability landscape enables attackers to poison victim programs through both low-level CPU state, including previously overlooked attack vectors through the x86 status flags and floating-point co-processor, as well as through higher-level programming constructs such as untrusted pointer arguments passed into the shared address\r\nspace.\r\n\r\nWe develop new and improved technique to practically exploit these vulnerabilities in several attack scenarios that leak full cryptographic keys from the enclave or enable arbitrary remote code reuse. Following extended responsible disclosure embargoes, our findings were assigned 7 designated CVE records and led to numerous security patches in the vulnerable open-source projects, including the Intel SGX-SDK, Microsoft's Open Enclave, Google's Asylo, and the Rust compiler. \r\n\r\nOur findings highlight that emerging TEE technologies, such as Intel SGX, are _not_ a silver-bullet solution and continue to be misunderstood in both industry and academia. While promising, we explain that TEEs require extra scrutiny from the enclave developer and we set out to identify common pitfalls and constructive recommendations for best practices for enclave interface sanitization. Throughout the talk, we overview shielding responsibilities and argue that proper enclave hygiene will be instrumental to the success of the emerging Intel SGX ecosystem. Additionally, we point to several subtle properties of the Intel x86 complex instruction set considerably increase the attack surface for enclave attackers and require the end developer to be aware of their respective shielding runtime or apply additional sanitizations at the application level itself.",
+            "description_html": "<p>This talk presents an extensive security analysis of trusted-execution environment shielding runtimes, covering over two years of continuing research and leading to 7 CVE designations in industry-grade Intel SGX enclave SDKs. </p>\n<p>For the first time, we develop a systematic way of reasoning about enclave shielding responsibilities categorized across 11 distinct classes across the ABI and API tiers. Our analysis revealed over 40 new interface sanitization vulnerabilities, and we developed innovative techniques to aid practically exploitation through among others CPU register poisoning, timer-based single-stepping, rogue CPU exception handlers, and side-channel-based cryptanalysis. We finally analyze tendencies across the landscape and find that developers continue to make the same mistakes, calling for improved vulnerability detection and mitigation techniques.</p>\n<p>This talk overviews the security and state of practice of today's Trusted Execution Environment (TEE) shielding runtimes from both industry and research. Our systematic analysis uncovered over 40 re-occurring enclave interface sanitization vulnerabilities in 8 major open-source shielding frameworks for Intel SGX, RISC-V, and Sancus TEEs. The resulting vulnerability landscape enables attackers to poison victim programs through both low-level CPU state, including previously overlooked attack vectors through the x86 status flags and floating-point co-processor, as well as through higher-level programming constructs such as untrusted pointer arguments passed into the shared address\nspace.</p>\n<p>We develop new and improved technique to practically exploit these vulnerabilities in several attack scenarios that leak full cryptographic keys from the enclave or enable arbitrary remote code reuse. Following extended responsible disclosure embargoes, our findings were assigned 7 designated CVE records and led to numerous security patches in the vulnerable open-source projects, including the Intel SGX-SDK, Microsoft's Open Enclave, Google's Asylo, and the Rust compiler. </p>\n<p>Our findings highlight that emerging TEE technologies, such as Intel SGX, are <em>not</em> a silver-bullet solution and continue to be misunderstood in both industry and academia. While promising, we explain that TEEs require extra scrutiny from the enclave developer and we set out to identify common pitfalls and constructive recommendations for best practices for enclave interface sanitization. Throughout the talk, we overview shielding responsibilities and argue that proper enclave hygiene will be instrumental to the success of the emerging Intel SGX ecosystem. Additionally, we point to several subtle properties of the Intel x86 complex instruction set considerably increase the attack surface for enclave attackers and require the end developer to be aware of their respective shielding runtime or apply additional sanitizations at the application level itself.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Ramming Enclave Gates: A Systematic Vulnerability Assessment of TEE Shielding Runtimes",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-29T12:40:00Z",
+            "schedule_start": "2021-12-29T12:00:00Z",
+            "slug": "rc3-11366-ramming_enclave_gates_a_systematic_vulnerability_assessment_of_tee_shielding_runtimes",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "cbed44db-2417-49f1-b401-2f133044bfbb"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "\n\n",
+            "description_html": "",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "Abschluss",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:30:00",
+            "schedule_end": "2021-12-30T19:40:00Z",
+            "schedule_start": "2021-12-30T19:10:00Z",
+            "slug": "rc3-11584-abschluss",
+            "track": 2
+        },
+        "model": "core.event",
+        "pk": "cfd3a3e4-69be-4f1e-8c0c-77a06e04731a"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Storing ice volumes of more than 65 meters sea-level equivalent, the ice sheets on Greenland and Antarctica are by far the largest potential source of future sea-level rise. Their long-term stability thus determines the fate of our coastal cities and cultural heritage sites. While massive in size, the ice sheets also belong to the most vulnerable parts of the Earth system: feedbacks between ice, atmosphere and ocean give rise to non-linearities in their response to progressing global warming. Once a critical temperature threshold is crossed, this could lead to self-sustained and potentially irreversible ice loss from drainage basins in Greenland and Antarctica. In this lecture, we will review the processes behind these dynamic instabilities, discuss the potential of crossing ice-sheet tipping points in the future, and explore the resulting impacts on sea-level rise and our global climate \u2013 not just for this century, but for the next millennia and beyond.\n\n",
+            "description_html": "<p>Storing ice volumes of more than 65 meters sea-level equivalent, the ice sheets on Greenland and Antarctica are by far the largest potential source of future sea-level rise. Their long-term stability thus determines the fate of our coastal cities and cultural heritage sites. While massive in size, the ice sheets also belong to the most vulnerable parts of the Earth system: feedbacks between ice, atmosphere and ocean give rise to non-linearities in their response to progressing global warming. Once a critical temperature threshold is crossed, this could lead to self-sustained and potentially irreversible ice loss from drainage basins in Greenland and Antarctica. In this lecture, we will review the processes behind these dynamic instabilities, discuss the potential of crossing ice-sheet tipping points in the future, and explore the resulting impacts on sea-level rise and our global climate \u2013 not just for this century, but for the next millennia and beyond.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "The big melt: Tipping points in Greenland and Antarctica",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-30T13:40:00Z",
+            "schedule_start": "2021-12-30T13:00:00Z",
+            "slug": "rc3-11484-the_big_melt_tipping_points_in_greenland_and_antarctica",
+            "track": 9
+        },
+        "model": "core.event",
+        "pk": "cfd52111-4833-4580-8818-969dbe185567"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Ransomware is a type of malware that encrypts the files of infected hosts and demands  payment,  often in a cryptocurrency such as Bitcoin. In this talk, we present a measurement framework that we used to perform a large-scale, two-year, end-to-end measurement of ransomware payments, victims and operators. \n\nBy combining an array of data sources, including ransomware binaries, seed ransom payments, victim telemetry from infections, and a large database of Bitcoin addresses annotated with their owners, we sketch the outlines of this burgeoning ecosystem and associated third-party infrastructure. In particular, we trace the financial transactions, from the moment victims acquire bitcoins, to when ransomware operators cash them out.\r\n\r\nWhile our study focuses on  ransomware, our methods are potentially applicable to other cybercriminal operations that have similarly adopted  Bitcoin as their payment  channel.",
+            "description_html": "<p>Ransomware is a type of malware that encrypts the files of infected hosts and demands  payment,  often in a cryptocurrency such as Bitcoin. In this talk, we present a measurement framework that we used to perform a large-scale, two-year, end-to-end measurement of ransomware payments, victims and operators. </p>\n<p>By combining an array of data sources, including ransomware binaries, seed ransom payments, victim telemetry from infections, and a large database of Bitcoin addresses annotated with their owners, we sketch the outlines of this burgeoning ecosystem and associated third-party infrastructure. In particular, we trace the financial transactions, from the moment victims acquire bitcoins, to when ransomware operators cash them out.</p>\n<p>While our study focuses on  ransomware, our methods are potentially applicable to other cybercriminal operations that have similarly adopted  Bitcoin as their payment  channel.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Tracking Ransomware End-to-end",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-27T13:40:00Z",
+            "schedule_start": "2021-12-27T13:00:00Z",
+            "slug": "rc3-11566-tracking_ransomware_end-to-end",
+            "track": 8
+        },
+        "model": "core.event",
+        "pk": "d175d882-b2ec-4dc3-90de-b5429df2607f"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Ich habe mich ein Jahr in meinem Podcast mit den Fragen digitaler Bildung auseinandersetzen m\u00fcssen. P\u00fcnktlich im M\u00e4rz dieses Jahres wurde das von der Theorie in die Praxis geholt.\n\nIch habe mich ein Jahr in meinem Podcast mit den Fragen digitaler Bildung auseinandersetzen m\u00fcssen. P\u00fcnktlich im M\u00e4rz dieses Jahres wurde das von der Theorie in die Praxis geholt. Wie sich theoretische und praktische \u00dcberlegungen bei der Bew\u00e4ltigung einer neuen, und nicht nur pandemischen, Schulrealit\u00e4t die Hand geben und welche M\u00f6glichkeitsr\u00e4ume sich hier er\u00f6ffnen sind die Themen dieses Vortrags.",
+            "description_html": "<p>Ich habe mich ein Jahr in meinem Podcast mit den Fragen digitaler Bildung auseinandersetzen m\u00fcssen. P\u00fcnktlich im M\u00e4rz dieses Jahres wurde das von der Theorie in die Praxis geholt.</p>\n<p>Ich habe mich ein Jahr in meinem Podcast mit den Fragen digitaler Bildung auseinandersetzen m\u00fcssen. P\u00fcnktlich im M\u00e4rz dieses Jahres wurde das von der Theorie in die Praxis geholt. Wie sich theoretische und praktische \u00dcberlegungen bei der Bew\u00e4ltigung einer neuen, und nicht nur pandemischen, Schulrealit\u00e4t die Hand geben und welche M\u00f6glichkeitsr\u00e4ume sich hier er\u00f6ffnen sind die Themen dieses Vortrags.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "R\u00fcckblick auf ein turbulentes Jahr digitale Schule",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-30T15:00:00Z",
+            "schedule_start": "2021-12-30T14:00:00Z",
+            "slug": "rc3-11343-ruckblick_auf_ein_turbulentes_jahr_digitale_schule",
+            "track": 5
+        },
+        "model": "core.event",
+        "pk": "d8ede9af-e375-448d-aab8-bc2d1f5f7ae3"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "This talk gives a brief introduction to natural radioactivity and shows how a detector can be built from simple photodiodes. The electronics are easy to solder for beginners and provide a hands-on opportunity for entering the exciting world of modern particle physics with a practical DIY and citizen science approach.\n\nNatural radioactivity surrounds us everywhere and is composed of different kinds of ionising radiation or subatomic particles. This talk presents a DIY particle detector based on low-cost silicon photodiodes and its relations to modern detectors like the ones developed at CERN. \r\n\r\nThe project is open hardware, easy to solder for beginners, and intended for citizen science & educational purposes. In contrast to simpler Geiger-M\u00fcller counters, this detector measures the energy of impinging particles and can distinguish in particular between alpha particles and electrons from beta decays. A cheap USB sound card or smartphone headset connection can be employed for recording the signals. Corresponding data analysis scripts written in python and related tools from particle physics research will be briefly discussed.\r\n\r\nAn introduction about terrestrial and cosmic sources of radioactivity will be given together with details on the interaction of ionising radiation in silicon. I will conclude with a discussion of interesting every-day objects that are worthwhile targets for investigation and show example measurements of characteristic alpha particle energy spectra - without using expensive vacuum equipment.",
+            "description_html": "<p>This talk gives a brief introduction to natural radioactivity and shows how a detector can be built from simple photodiodes. The electronics are easy to solder for beginners and provide a hands-on opportunity for entering the exciting world of modern particle physics with a practical DIY and citizen science approach.</p>\n<p>Natural radioactivity surrounds us everywhere and is composed of different kinds of ionising radiation or subatomic particles. This talk presents a DIY particle detector based on low-cost silicon photodiodes and its relations to modern detectors like the ones developed at CERN. </p>\n<p>The project is open hardware, easy to solder for beginners, and intended for citizen science &amp; educational purposes. In contrast to simpler Geiger-M\u00fcller counters, this detector measures the energy of impinging particles and can distinguish in particular between alpha particles and electrons from beta decays. A cheap USB sound card or smartphone headset connection can be employed for recording the signals. Corresponding data analysis scripts written in python and related tools from particle physics research will be briefly discussed.</p>\n<p>An introduction about terrestrial and cosmic sources of radioactivity will be given together with details on the interaction of ionising radiation in silicon. I will conclude with a discussion of interesting every-day objects that are worthwhile targets for investigation and show example measurements of characteristic alpha particle energy spectra - without using expensive vacuum equipment.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Measuring radioactivity using low-cost silicon sensors",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-29T13:40:00Z",
+            "schedule_start": "2021-12-29T13:00:00Z",
+            "slug": "rc3-11546-measuring_radioactivity_using_low-cost_silicon_sensors",
+            "track": 7
+        },
+        "model": "core.event",
+        "pk": "db11e86c-ecf8-40c0-b8d8-2f6798507146"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "This year saw a major invasion of scientific work into the center of public attention. Scientific results came hot of the press and into the news cycles. For many people, this sudden impact of scientific language, culture and drawing of conclusion clashed with their every day world view. In my talk, I want to prepare the audience for the next wave of scientific influx and help them to get a systemic understanding of academia. How do scientists work? What are the funding and career structures? How do we do science? And, most importantly, how do we do science better?\r\n\n\nWhen we talk about scientific results, we assume most of the time that everybody knows how the scientific system produced them. This assumption can be problematic. The communication of risk and uncertainty, for example, varies greatly between the scientific community and society. A misunderstanding of science, scientific language or scientific publishing can lead to very wrong ideas about how things work. \r\nIn this talk, I want to give a beginner friendly crash course on the scientific system. How does one get into science? Who pays for everything? What is scientific uncertainty? How does a scientific paper work? How can we address issues like bias and lack of diversity in science?\r\n\r\nI am an eager science communicator, who worked in the past in in molecular biology research and has since left active research to communicate science to the public. My goal is to share my view on the inner workings of science with more people to help them to become more science literate \u2013\u00a0and ultimately to be able to critically assess communication from researchers, institutions and PR companies. At the end of my talk, I want the audience to have a better understanding not only about the results of research but also the research process. We can only understand and interpret scientific results if we understand how they came to be. ",
+            "description_html": "<p>This year saw a major invasion of scientific work into the center of public attention. Scientific results came hot of the press and into the news cycles. For many people, this sudden impact of scientific language, culture and drawing of conclusion clashed with their every day world view. In my talk, I want to prepare the audience for the next wave of scientific influx and help them to get a systemic understanding of academia. How do scientists work? What are the funding and career structures? How do we do science? And, most importantly, how do we do science better?</p>\n<p>When we talk about scientific results, we assume most of the time that everybody knows how the scientific system produced them. This assumption can be problematic. The communication of risk and uncertainty, for example, varies greatly between the scientific community and society. A misunderstanding of science, scientific language or scientific publishing can lead to very wrong ideas about how things work. \nIn this talk, I want to give a beginner friendly crash course on the scientific system. How does one get into science? Who pays for everything? What is scientific uncertainty? How does a scientific paper work? How can we address issues like bias and lack of diversity in science?</p>\n<p>I am an eager science communicator, who worked in the past in in molecular biology research and has since left active research to communicate science to the public. My goal is to share my view on the inner workings of science with more people to help them to become more science literate \u2013\u00a0and ultimately to be able to critically assess communication from researchers, institutions and PR companies. At the end of my talk, I want the audience to have a better understanding not only about the results of research but also the research process. We can only understand and interpret scientific results if we understand how they came to be. </p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Scientific Literacy 101",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-28T12:20:00Z",
+            "schedule_start": "2021-12-28T11:20:00Z",
+            "slug": "rc3-11430-scientific_literacy_101",
+            "track": 9
+        },
+        "model": "core.event",
+        "pk": "e1cdee23-68c8-4d73-b02f-d9a64fa92d97"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Welcome to Careables!\r\nCare-receivers, healthcare professionals and makers join forces to co-create careables: tailor-made open solutions that tackle permanent or temporary disability. Careables is an open and inclusive approach to healthcare based on digital fabrication and collaborative making. Our international team will share results and best practises of 3 years of co-creation and building a digital platform and a community that makes and shares open source hardware for health.\r\n\n\nWe will show the latest developments that were designed and made in co-creation formats in the Netherlands, Brazil, Ghana, Italy, Nepal, Germany and the online world. Diy lightening canes, e-scooter hacks for wheelchair users, and writing aids: things that make the lives of people with disabilities easier; tools that break down barriers and allow communication, shared openly for building a world that is more accessible for diverse individuals together.\r\n\r\nPresented by: Sandra Mamitzsch, Isabelle Dechamps, Beatrice Barth, Paulien Melis and Enrico Bassi on behalf of the Careables community.",
+            "description_html": "<p>Welcome to Careables!\nCare-receivers, healthcare professionals and makers join forces to co-create careables: tailor-made open solutions that tackle permanent or temporary disability. Careables is an open and inclusive approach to healthcare based on digital fabrication and collaborative making. Our international team will share results and best practises of 3 years of co-creation and building a digital platform and a community that makes and shares open source hardware for health.</p>\n<p>We will show the latest developments that were designed and made in co-creation formats in the Netherlands, Brazil, Ghana, Italy, Nepal, Germany and the online world. Diy lightening canes, e-scooter hacks for wheelchair users, and writing aids: things that make the lives of people with disabilities easier; tools that break down barriers and allow communication, shared openly for building a world that is more accessible for diverse individuals together.</p>\n<p>Presented by: Sandra Mamitzsch, Isabelle Dechamps, Beatrice Barth, Paulien Melis and Enrico Bassi on behalf of the Careables community.</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Careables",
+            "owner": null,
+            "room": "32b5ad05-ab7d-44eb-a6e6-7ca616eed34a",
+            "schedule_duration": "00:40:00",
+            "schedule_end": "2021-12-29T11:40:00Z",
+            "schedule_start": "2021-12-29T11:00:00Z",
+            "slug": "rc3-11360-careables",
+            "track": 7
+        },
+        "model": "core.event",
+        "pk": "e67833ba-7220-4d14-8cf4-73d753b94467"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "CO2, Kohlenstoffdioxid, ist inzwischen im Bewusstsein aller angekommen. Ob als ppm Wert in der Erdatmosph\u00e4re und als Treibhausgas, oder durch die im Sommer vorgeschlagenen CO2 Ampeln. Aber: wie kann man denn die Konzentration eines unsichtbaren Gases in geriger Konzentration messen?\n\nDie \"CO2-Ampel\" hat seit August sprunghaft an Bekanntheit gewonnen, als die Konzentration von Kohlendioxid als potentieller Indikator f\u00fcr unzureichenden Austausch der Raumluft und damit f\u00fcr ein generell erh\u00f6htes Infektionsrisiko vorgeschlagen wurde.\r\nDie prominenteste Sensorfamilie arbeitet \u00fcber die Detektion der breitbandigen IR-Absorption des CO2-Molek\u00fcls, wir sehen uns IR- und Rama Spektroskopie an, wie einfache Sensoren funktionieren bis hoch zu hoch genauen industriellen Sensoren.\r\nEine weitere Detektionsmethode bieten Metalloxid Sensoren, die mit moderner MEMS-Technologie sehr kompakt gefertigt werden k\u00f6nnen und mit der Gr\u00f6\u00dfe eines Streichholzkopfes gut geeignet f\u00fcr wearable Devices sind. \r\nDabei unterscheiden sich Sensoren, die tats\u00e4chlich CO2 messen k\u00f6nnen von solchen, die fl\u00fcchtige organische Verbindungen (engl. volatile organic compounds, VOC) messen.\r\nEin VOC Sensor findet sich auch auf dem card10 badge, vom Camp 2019. In der neuesten Firmware sind neue Funktionalit\u00e4ten des Umweltsensors dazu gekommen, und kann dann zu Hause damit experimentieren!",
+            "description_html": "<p>CO2, Kohlenstoffdioxid, ist inzwischen im Bewusstsein aller angekommen. Ob als ppm Wert in der Erdatmosph\u00e4re und als Treibhausgas, oder durch die im Sommer vorgeschlagenen CO2 Ampeln. Aber: wie kann man denn die Konzentration eines unsichtbaren Gases in geriger Konzentration messen?</p>\n<p>Die \"CO2-Ampel\" hat seit August sprunghaft an Bekanntheit gewonnen, als die Konzentration von Kohlendioxid als potentieller Indikator f\u00fcr unzureichenden Austausch der Raumluft und damit f\u00fcr ein generell erh\u00f6htes Infektionsrisiko vorgeschlagen wurde.\nDie prominenteste Sensorfamilie arbeitet \u00fcber die Detektion der breitbandigen IR-Absorption des CO2-Molek\u00fcls, wir sehen uns IR- und Rama Spektroskopie an, wie einfache Sensoren funktionieren bis hoch zu hoch genauen industriellen Sensoren.\nEine weitere Detektionsmethode bieten Metalloxid Sensoren, die mit moderner MEMS-Technologie sehr kompakt gefertigt werden k\u00f6nnen und mit der Gr\u00f6\u00dfe eines Streichholzkopfes gut geeignet f\u00fcr wearable Devices sind. \nDabei unterscheiden sich Sensoren, die tats\u00e4chlich CO2 messen k\u00f6nnen von solchen, die fl\u00fcchtige organische Verbindungen (engl. volatile organic compounds, VOC) messen.\nEin VOC Sensor findet sich auch auf dem card10 badge, vom Camp 2019. In der neuesten Firmware sind neue Funktionalit\u00e4ten des Umweltsensors dazu gekommen, und kann dann zu Hause damit experimentieren!</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "de",
+            "name": "CO2 Messen - in R\u00e4umen und in der Atmosph\u00e4re",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-30T15:00:00Z",
+            "schedule_start": "2021-12-30T14:00:00Z",
+            "slug": "rc3-11550-co2_messen_-_in_raumen_und_in_der_atmosphare",
+            "track": 7
+        },
+        "model": "core.event",
+        "pk": "e78b5197-8dba-490a-a549-9e82dec025ae"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": "Surprise from The one and only Yes Men\n\n",
+            "description_html": "<p>Surprise from The one and only Yes Men</p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "The Yes Men from Tricksters in an age of dirty tricks",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "01:00:00",
+            "schedule_end": "2021-12-27T21:20:00Z",
+            "schedule_start": "2021-12-27T20:20:00Z",
+            "slug": "rc3-11568-the_yes_men_from_tricksters_in_an_age_of_dirty_tricks",
+            "track": 4
+        },
+        "model": "core.event",
+        "pk": "ea519362-d698-42d8-b098-5e84d661c306"
+    },
+    {
+        "fields": {
+            "additional_data": null,
+            "assembly": "5a035082-dd71-4b8f-8d6d-81464e6a727d",
+            "banner_image": "",
+            "banner_image_height": null,
+            "banner_image_width": null,
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "description": " In October 2020, Paolo Cirio collected 1000 public images of police officers in photos taken during protests in France and processed them with Facial Recognition software. \n\nCirio then created an online platform with a database of the resulting 4000 faces of police officers to crowdsource their identification by name. Cirio also printed the officers\u2019 headshots as street art posters and posted them throughout Paris to expose them in the public space. This provocation generated reactions by the French Interior Minister, police unions and families, major media outlets, and the communities of protesters in France. \r\n\r\nThe project Capture comments on the potential uses and misuses of Facial Recognition and Artificial Intelligence by questioning the asymmetry of power at play. The lack of privacy regulations of such technology eventually turns against the same authorities that urge the use of it. \r\n\r\nUltimately, as an activist, Cirio introduced a campaign to ban Facial Recognition technology in all of Europe by organizing a petition in collaboration with privacy organizations. ",
+            "description_html": "<p>In October 2020, Paolo Cirio collected 1000 public images of police officers in photos taken during protests in France and processed them with Facial Recognition software. </p>\n<p>Cirio then created an online platform with a database of the resulting 4000 faces of police officers to crowdsource their identification by name. Cirio also printed the officers\u2019 headshots as street art posters and posted them throughout Paris to expose them in the public space. This provocation generated reactions by the French Interior Minister, police unions and families, major media outlets, and the communities of protesters in France. </p>\n<p>The project Capture comments on the potential uses and misuses of Facial Recognition and Artificial Intelligence by questioning the asymmetry of power at play. The lack of privacy regulations of such technology eventually turns against the same authorities that urge the use of it. </p>\n<p>Ultimately, as an activist, Cirio introduced a campaign to ban Facial Recognition technology in all of Europe by organizing a petition in collaboration with privacy organizations. </p>",
+            "favorited_by": [],
+            "in_personal_calendar": [],
+            "is_public": true,
+            "kind": "official",
+            "language": "en",
+            "name": "Turning Facial Recognition Against the Police",
+            "owner": null,
+            "room": "973ec154-a5b5-40ac-b4e8-b74137f647e8",
+            "schedule_duration": "00:30:00",
+            "schedule_end": "2021-12-28T21:10:00Z",
+            "schedule_start": "2021-12-28T20:40:00Z",
+            "slug": "rc3-11576-turning_facial_recognition_against_the_police",
+            "track": 4
+        },
+        "model": "core.event",
+        "pk": "fb1548fe-5a09-422f-a1f3-426e1f7c7f62"
+    },
+    {
+        "fields": {
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "page_group": null,
+            "public_revision": 39,
+            "rendered_body": "<p>Willkommen in den R\u00e4umlichkeiten der rC3! Die reale Welt bietet dieses Jahr leider keinen geeigneten Ort zum Zusammenkommen, also haben wir unseren eigenen geschaffen.</p>\n<p>Der Login-Bereich der rC3 gliedert sich in drei gro\u00dfe Bereiche: 2D-Welt, Content-Plattform und diese Info-Seite.</p>\n<h3>World</h3>\n<p>Ihr sehnt Euch nach Menschen? In der <a class=\"internal\" href=\"/rc3/world\">2D-Welt</a> k\u00f6nnt Ihr Gleichgesinnte finden und mit ihnen Voice-/Video-chatten. Die meisten bei\u00dfen nicht (und die anderen nur, wenn Ihr sie darum bittet). Entdeckt zusammen die selbstgebauten Spaces der Assemblies und schaut Euch an, was Eure Freunde sich ausgedacht haben.</p>\n<p>Achtung: Aus technischen Gr\u00fcnden kann es passieren, dass Ihr nicht auf derselben Instanz der Lobby-Karte startet wie Eure Freunde. Wenn Ihr sichergehen wollt, verabredet Euch in einem Assembly-Space!</p>\n<h3>Plattform</h3>\n<p>Im Bereich Plattform findet Ihr eine gro\u00dfe Auswahl an Inhalten, mit denen Ihr die n\u00e4chsten Tage \u00fcber Raum und Zeit vergessen k\u00f6nnt.\nDie Kan\u00e4le <a class=\"internal\" href=\"/rc3/ccc\">rC1 und rC2</a> werden vom CCC-Content-Team bespielt, das \u00fcblicherweise das Hauptprogramm des Congress kuratiert. Weitere Kan\u00e4le werden liebevoll von einigen <a class=\"internal\" href=\"/rc3/assemblies\">Assemblies</a> gestaltet. Dazu gibt es ein gro\u00dfes Angebot von <a class=\"internal\" href=\"/rc3/assemblies/events\">Workshops und Sessions</a>.</p>\n<p>Hinweis: \u00dcber die <a class=\"internal\" href=\"/rc3/assemblies/all\">Assembly-Seiten</a> findet Ihr schnell zu deren 2D-Welt-Spaces.</p>\n<h3>Info</h3>\n<p>Auf dieser Seite sammeln wir f\u00fcr Euch die wichtigsten Informationen zur rC3.<br>\nEtwas fehlt oder ist unklar? Klopft doch mal beim <a class=\"external\" href=\"/rc3/dereferrer/https%3A//links.rc3.world/infodesk\">Infodesk</a> an! So erreichen uns die Hinweise am besten. Wir werden die Info-Sammlung w\u00e4hrend der rC3 laufend verbessern.</p>\n<hr>\n<h2>Helpful Teams</h2>\n<p>There are several Teams where you can ask questions, get help and talk in person to person or people. </p>\n<h3><a class=\"external\" href=\"/rc3/dereferrer/https%3A//links.rc3.world/infodesk\">Infodesk</a></h3>\n<p>At the Infodesk we answer your questions. We help you with orientation, things to do and finding stuff.</p>\n<p>Phone: 1111<br>\nMail: <a class=\"external\" href=\"mailto:infodesk@rc3.world\">mailto:infodesk@rc3.world</a><br>\nTwitter: <a class=\"external\" href=\"/rc3/dereferrer/https%3A//twitter.com/c3infodesk\">@c3infodesk</a><br>\nMastodon: <a class=\"external\" href=\"/rc3/dereferrer/https%3A//chaos.social/%40c3infodesk\">chaos.social/@c3infodesk</a><br>\nIRC: <a class=\"external\">#c3infodesk</a><br>\nLink:<a class=\"external\" href=\"/rc3/dereferrer/https%3A//links.rc3.world/infodesk\">Infodesk</a></p>\n<h3><a class=\"external\" href=\"/rc3/dereferrer/https%3A//engelsystem.de/rc3\">Heaven</a></h3>\n<p>The official task of the heaven is volunteer coordination. We can help out with any volunteering related questions and some other general stuff.</p>\n<p>Phone: 1023<br>\nMail: <a class=\"external\" href=\"mailto:ticket@c3heaven.de\">mailto:ticket@c3heaven.de</a> (preferred for tasks and requests)<br>\n<a class=\"external\" href=\"/rc3/dereferrer/https%3A//engelsystem.de/rc3/questions\">Ask the Heaven</a> (preferred for Engelsystem and Angel related questions)<br>\nJitsi: <a class=\"external\" href=\"/rc3/dereferrer/https%3A//jitsi.rc3.world/heaven_helpdesk\">heaven_helpdesk</a></p>\n<h3><a class=\"external\" href=\"/rc3/dereferrer/https%3A//help.ccc.de/awareness/index.html\">Awareness</a></h3>\n<p>If you experience or notice discriminatory behavior contact us at the Awareness Team. We help and mediate with discrimination, harassment and other forms of systemic and interpersonal problems.</p>\n<p>Phone: 113<br>\nMail <a class=\"external\" href=\"mailto:team@c3awareness.de\">mailto:team@c3awareness.de</a><br>\nTwitter: <a class=\"external\" href=\"/rc3/dereferrer/https%3A//twitter.com/c3awareness\">@c3awareness</a><br>\nLink: <a class=\"external\" href=\"/rc3/dereferrer/https%3A//help.ccc.de/awareness/index.html\">https://help.ccc.de/awareness/index.html</a><br>\nLink: <a class=\"internal\" href=\"/rc3/assembly/awareness-team/\">https://rc3.world/rc3/assembly/awareness-team/</a></p>\n<h3><a class=\"external\" href=\"/rc3/dereferrer/https%3A//help.ccc.de/c3auti/index.html\">c3Auti</a></h3>\n<p>We at c3Auti are the support team for all things autistic. From acute help during meltdowns to general question about autims we are there for you. We try to provide a sensory quiet environment in the <a class=\"internal\" href=\"/rc3/assembly/c3auti/\">tree of solitude</a>.</p>\n<p>Phone: 1199 Emergencies<br>\nPhone: 2884 General<br>\nMail: mailto:support@c3auti.de<br>\nTwitter: <a class=\"external\" href=\"/rc3/dereferrer/https%3A//twitter.com/c3auti\">@c3auti</a><br>\nLink: <a class=\"external\" href=\"/rc3/dereferrer/https%3A//help.ccc.de/c3auti/index.html\">https://help.ccc.de/c3auti/index.html</a><br>\nJitsi: <a class=\"external\" href=\"/rc3/dereferrer/https%3A//jitsi.rc3.world/c3auti\">c3auti</a></p>\n<h3><a class=\"external\" href=\"/rc3/dereferrer/https%3A//c3ioc.de/\">Inclusion Operation Center</a></h3>\n<p>The Inclusion Operation Center supports you by improving site accessibilty and inclusivity.</p>\n<p>Mail: <a class=\"external\" href=\"mailto:kontakt@c3ioc.de\">mailto:kontakt@c3ioc.de</a><br>\nLink: <a class=\"external\" href=\"/rc3/dereferrer/https%3A//c3ioc.de/\">https://c3ioc.de/</a></p>\n<hr>\n<h2>Official and Unofficial Links</h2>\n<h4>Links with links</h4>\n<ul>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//howto.rc3.world/\">https://howto.rc3.world/</a></strong> - Styleguide - Assembly configuration - How to Play rc3.world</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//links.rc3.world/\">https://links.rc3.world/</a></strong> - Links - News &amp; Blogs - Infodesk</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//help.ccc.de\">https://help.ccc.de</a></strong> - Awareness - Autism - Inclusion - Help</li>\n</ul>\n<h4>Help</h4>\n<ul>\n<li><strong><a class=\"internal\" href=\"/rc3/report\">https://rc3.world/rc3/report</a></strong> - Abuse - Problems - Technical - Social</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//links.rc3.world/infodesk\">https://links.rc3.world/infodesk</a></strong> - Infodesk - FAQ - Help - Orientation</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//c3ioc.de/\">https://c3ioc.de/</a></strong> - Inclusion Operation Center - Accessibility</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//help.ccc.de/c3auti/index.html\">https://help.ccc.de/c3auti/index.html</a></strong> - c3Auti - Autism - Overstimulation</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//help.ccc.de/awareness/index.html\">https://help.ccc.de/awareness/index.html</a></strong> - Awareness - Discrimination - Mediation - Harassment</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//engelsystem.de/rc3\">https://engelsystem.de/rc3</a></strong> - Volunteering - Coordination </li>\n</ul>\n<h4>(in-)official Communication</h4>\n<ul>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//guru3.eventphone.de\">https://guru3.eventphone.de</a></strong> - Telephone during the Event</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//jitsi.rc3.world\">https://jitsi.rc3.world</a></strong> - Video Chat Rooms</li>\n<li><strong><a class=\"external\">irc://hackint.org/rc3</a></strong> - Internet Relay Chat</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//chaos.social\">https://chaos.social</a></strong> - Mastodon - Micro Blogging</li>\n</ul>\n<h4>Things and Stuff</h4>\n<ul>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//status.c3events.de/\">https://status.c3events.de/</a></strong> - infrastructure status - do things work right now?</li>\n<li><strong><a class=\"internal\" href=\"/rc3/public_fahrplan/\">https://rc3.world/rc3/public_fahrplan/</a></strong> - event schedule (public events only)</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//howto.rc3.world/play.en.html\">https://howto.rc3.world/play.en.html</a></strong> - World FAQ - Policy</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//howto.rc3.world/play.html\">https://howto.rc3.world/play.html</a></strong> - (deutsche Version) - World FAQ - Policy</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//visit.at.rc3.world\">https://visit.at.rc3.world</a></strong> - 2D World direct link</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/https%3A//ewt.eventphone.de/\">https://ewt.eventphone.de/</a></strong> - Place phone calls into the Eventphone network</li>\n<li><strong><a class=\"external\" href=\"/rc3/dereferrer/http%3A//newsshow.rc3.world/\">http://newsshow.rc3.world/</a></strong> - rC3 News - Events</li>\n</ul>\n<h4>Mail</h4>\n<ul>\n<li><strong><a class=\"external\" href=\"mailto:infodesk@rc3.world\">mailto:infodesk@rc3.world</a></strong> - Information - Questions</li>\n<li><strong><a class=\"external\" href=\"mailto:ticket@c3heaven.de\">mailto:ticket@c3heaven.de</a></strong> - Volunteering - Angels</li>\n<li><strong><a class=\"external\" href=\"mailto:rc3@c3assemblies.de\">mailto:rc3@c3assemblies.de</a></strong> - Assemblies</li>\n<li><strong><a class=\"external\" href=\"mailto:rc3-tickets@cccv.de\">mailto:rc3-tickets@cccv.de</a></strong> - Tickets</li>\n</ul>\n<h4>Emergency Numbers</h4>\n<ul>\n<li><strong><a class=\"internal\" href=\"tel:113\">tel:113</a></strong> - Awareness - Harassment - Discrimination</li>\n<li><strong><a class=\"internal\" href=\"tel:1199\">tel:1199</a></strong> - Autistic Emergencies - Meltdown </li>\n</ul>\n<h4>Information Numbers</h4>\n<ul>\n<li><strong><a class=\"internal\" href=\"tel:1111\">tel:1111</a></strong> - Infodesk</li>\n<li><strong><a class=\"internal\" href=\"tel:1023\">tel:1023</a></strong> - Heaven - Volunteering</li>\n<li><strong><a class=\"internal\" href=\"tel:2884\">tel:2884 AUTI</a></strong> - c3auti - General Autism</li>\n</ul>",
+            "search_content": "Infos\nWillkommen in den R\u00e4umlichkeiten der rC3! Die reale Welt bietet dieses Jahr leider keinen geeigneten Ort zum Zusammenkommen, also haben wir unseren eigenen geschaffen.\nDer Login-Bereich der rC3 gliedert sich in drei gro\u00dfe Bereiche: 2D-Welt, Content-Plattform und diese Info-Seite.\nWorld\nIhr sehnt Euch nach Menschen? In der 2D-Welt k\u00f6nnt Ihr Gleichgesinnte finden und mit ihnen Voice-/Video-chatten. Die meisten bei\u00dfen nicht (und die anderen nur, wenn Ihr sie darum bittet). Entdeckt zusammen die selbstgebauten Spaces der Assemblies und schaut Euch an, was Eure Freunde sich ausgedacht haben.\nAchtung: Aus technischen Gr\u00fcnden kann es passieren, dass Ihr nicht auf derselben Instanz der Lobby-Karte startet wie Eure Freunde. Wenn Ihr sichergehen wollt, verabredet Euch in einem Assembly-Space!\nPlattform\nIm Bereich Plattform findet Ihr eine gro\u00dfe Auswahl an Inhalten, mit denen Ihr die n\u00e4chsten Tage \u00fcber Raum und Zeit vergessen k\u00f6nnt.\nDie Kan\u00e4le rC1 und rC2 werden vom CCC-Content-Team bespielt, das \u00fcblicherweise das Hauptprogramm des Congress kuratiert. Weitere Kan\u00e4le werden liebevoll von einigen Assemblies gestaltet. Dazu gibt es ein gro\u00dfes Angebot von Workshops und Sessions.\nHinweis: \u00dcber die Assembly-Seiten findet Ihr schnell zu deren 2D-Welt-Spaces.\nInfo\nAuf dieser Seite sammeln wir f\u00fcr Euch die wichtigsten Informationen zur rC3.\nEtwas fehlt oder ist unklar? Klopft doch mal beim Infodesk an! So erreichen uns die Hinweise am besten. Wir werden die Info-Sammlung w\u00e4hrend der rC3 laufend verbessern.\n\nHelpful Teams\nThere are several Teams where you can ask questions, get help and talk in person to person or people. \nInfodesk\nAt the Infodesk we answer your questions. We help you with orientation, things to do and finding stuff.\nPhone: 1111\nMail: mailto:infodesk@rc3.world\nTwitter: @c3infodesk\nMastodon: chaos.social/@c3infodesk\nIRC: #c3infodesk\nLink:Infodesk\nHeaven\nThe official task of the heaven is volunteer coordination. We can help out with any volunteering related questions and some other general stuff.\nPhone: 1023\nMail: mailto:ticket@c3heaven.de (preferred for tasks and requests)\nAsk the Heaven (preferred for Engelsystem and Angel related questions)\nJitsi: heaven_helpdesk\nAwareness\nIf you experience or notice discriminatory behavior contact us at the Awareness Team. We help and mediate with discrimination, harassment and other forms of systemic and interpersonal problems.\nPhone: 113\nMail mailto:team@c3awareness.de\nTwitter: @c3awareness\nLink: https://help.ccc.de/awareness/index.html\nLink: https://rc3.world/rc3/assembly/awareness-team/\nc3Auti\nWe at c3Auti are the support team for all things autistic. From acute help during meltdowns to general question about autims we are there for you. We try to provide a sensory quiet environment in the tree of solitude.\nPhone: 1199 Emergencies\nPhone: 2884 General\nMail: mailto:support@c3auti.de\nTwitter: @c3auti\nLink: https://help.ccc.de/c3auti/index.html\nJitsi: c3auti\nInclusion Operation Center\nThe Inclusion Operation Center supports you by improving site accessibilty and inclusivity.\nMail: mailto:kontakt@c3ioc.de\nLink: https://c3ioc.de/\n\nOfficial and Unofficial Links\nLinks with links\n\nhttps://howto.rc3.world/ - Styleguide - Assembly configuration - How to Play rc3.world\nhttps://links.rc3.world/ - Links - News &amp; Blogs - Infodesk\nhttps://help.ccc.de - Awareness - Autism - Inclusion - Help\n\nHelp\n\nhttps://rc3.world/rc3/report - Abuse - Problems - Technical - Social\nhttps://links.rc3.world/infodesk - Infodesk - FAQ - Help - Orientation\nhttps://c3ioc.de/ - Inclusion Operation Center - Accessibility\nhttps://help.ccc.de/c3auti/index.html - c3Auti - Autism - Overstimulation\nhttps://help.ccc.de/awareness/index.html - Awareness - Discrimination - Mediation - Harassment\nhttps://engelsystem.de/rc3 - Volunteering - Coordination \n\n(in-)official Communication\n\nhttps://guru3.eventphone.de - Telephone during the Event\nhttps://jitsi.rc3.world - Video Chat Rooms\nirc://hackint.org/rc3 - Internet Relay Chat\nhttps://chaos.social - Mastodon - Micro Blogging\n\nThings and Stuff\n\nhttps://status.c3events.de/ - infrastructure status - do things work right now?\nhttps://rc3.world/rc3/public_fahrplan/ - event schedule (public events only)\nhttps://howto.rc3.world/play.en.html - World FAQ - Policy\nhttps://howto.rc3.world/play.html - (deutsche Version) - World FAQ - Policy\nhttps://visit.at.rc3.world - 2D World direct link\nhttps://ewt.eventphone.de/ - Place phone calls into the Eventphone network\nhttp://newsshow.rc3.world/ - rC3 News - Events\n\nMail\n\nmailto:infodesk@rc3.world - Information - Questions\nmailto:ticket@c3heaven.de - Volunteering - Angels\nmailto:rc3@c3assemblies.de - Assemblies\nmailto:rc3-tickets@cccv.de - Tickets\n\nEmergency Numbers\n\ntel:113 - Awareness - Harassment - Discrimination\ntel:1199 - Autistic Emergencies - Meltdown \n\nInformation Numbers\n\ntel:1111 - Infodesk\ntel:1023 - Heaven - Volunteering\ntel:2884 AUTI - c3auti - General Autism\n",
+            "search_vector": "'/@c3infodesk':298 '/awareness/index.html':389,524 '/c3auti/index.html':448,518 '/infodesk':506 '/play.en.html':577 '/play.html':583 '/rc3':531,548 '/rc3/assembly/awareness-team/':393 '/rc3/public_fahrplan/':569 '/rc3/report':499 '/video-chatten':68 '1023':328,639 '1111':289,636 '113':380,624 '1199':435,629 '2884':438,643 '2d':39,58,203,590 '2d-welt':38,57 '2d-welt-spaces':202 'abus':500 'access':515 'accessibilti':463 'achtung':99 'acut':407 'also':20 'anderen':75 'angebot':186 'angel':344,614 'answer':274 'ask':257,337 'assembl':88,129,179,195,480,617 'assembly-seiten':194 'assembly-spac':128 'auf':109,207 'aus':100 'ausgedacht':97 'auswahl':139 'auti':644 'autim':415 'autism':493,520,647 'autist':405,630 'awar':350,362,492,525,625 'behavior':357 'beim':227 'bei\u00dfen':71 'bereich':29,37,133 'bespielt':165 'besten':236 'bietet':11 'bittet':81 'blog':489,555 'c3auti':394,397,444,450,519,645 'c3awareness':385 'c3infodesk':294,300 'c3ioc.de':470,511 'call':597 'ccc':162 'ccc-content-team':161 'center':453,457,514 'chaos.social':297,552 'chaos.social/@c3infodesk':296 'chat':544,551 'communic':536 'configur':481 'congress':171 'contact':358 'content':42,163 'content-plattform':41 'coordin':312,533 'darum':80 'das':166,168 'dass':106 'dazu':181 'den':4 'denen':143 'der':6,26,30,56,87,112,244 'deren':201 'derselben':110 'des':170 'deutsch':584 'die':8,69,74,84,145,154,193,214,233,239 'dies':12,45 'dieser':208 'direct':592 'discrimin':369,526,627 'discriminatori':356 'doch':225 'drei':35 'eigenen':24 'ein':137,184 'einem':127 'einigen':178 'emerg':436,621,631 'engelsystem':342 'engelsystem.de':530 'engelsystem.de/rc3':529 'entdeckt':82 'environ':428 'erreichen':231 'es':104,183 'etwa':219 'euch':52,91,125,213 'eur':94,118 'event':541,570,573,605 'eventphon':600 'ewt.eventphone.de':594 'experi':353 'faq':508,579,587 'fehlt':220 'find':286 'finden':63 'findet':135,197 'form':373 'freund':95,119 'f\u00fcr':212 'geeigneten':16 'general':325,412,439,646 'geschaffen':25 'gestaltet':180 'get':259 'gibt':182 'gleichgesinnt':62 'gliedert':32 'gro\u00dfe':36,138,185 'gr\u00fcnden':102 'guru3.eventphone.de':537 'haben':21,98 'hackint.org':547 'hackint.org/rc3':546 'harass':370,528,626 'hauptprogramm':169 'heaven':303,309,339,348,640 'help':248,260,278,315,365,408,495,496,509 'help.ccc.de':388,447,491,517,523 'help.ccc.de/awareness/index.html':387,522 'help.ccc.de/c3auti/index.html':446,516 'helpdesk':349 'hinwei':191 'hinweis':234 'howto.rc3.world':478,576,582 'howto.rc3.world/play.en.html':575 'howto.rc3.world/play.html':581 'ihnen':66 'ihr':50,61,78,107,121,136,144,198 'im':132 'improv':461 'inclus':451,455,465,494,512 'info':1,47,206,241 'info-sammlung':240 'info-seit':46 'infodesk':228,269,272,302,490,507,637 'infodesk@rc3.world':292,608 'inform':609,633 'informationen':216 'infrastructur':560 'inhalten':141 'instanz':111 'internet':549 'interperson':377 'irc':299 'ist':222 'jahr':13 'jitsi':347,449 'jitsi.rc3.world':542 'kann':103 'kan\u00e4l':155,174 'kart':115 'keinen':15 'klopft':224 'kontakt@c3ioc.de':468 'kuratiert':172 'k\u00f6nnt':60,153 'laufend':246 'leider':14 'liebevol':176 'link':301,386,390,445,469,474,475,477,487,593 'links.rc3.world':486,505 'links.rc3.world/infodesk':504 'lobbi':114 'lobby-kart':113 'login':28 'login-bereich':27 'mail':290,329,381,440,466,606 'mailto':291,330,382,441,467,607,611,615,618 'mal':226 'mastodon':295,553 'mediat':367,527 'meisten':70 'meltdown':410,632 'menschen':54 'micro':554 'mit':65,142 'nach':53 'network':601 'news':488,604 'newsshow.rc3.world':602 'nicht':72,108 'notic':355 'number':622,634 'nur':76 'n\u00e4chsten':146 'oder':221 'offici':305,471,535 'oper':452,456,513 'orient':281,510 'ort':17 'overstimul':521 'passieren':105 'peopl':268 'person':264,266 'phone':288,327,379,434,437,596 'place':595 'plattform':43,131,134 'play':484 'polici':580,588 'prefer':332,340 'problem':378,501 'provid':424 'public':572 'question':258,276,321,346,413,610 'quiet':427 'raum':149 'rc1':156 'rc2':158 'rc3':7,31,218,245,603 'rc3-tickets@cccv.de':619 'rc3.world':392,485,498,568 'rc3.world/rc3/assembly/awareness-team/':391 'rc3.world/rc3/public_fahrplan/':567 'rc3.world/rc3/report':497 'rc3@c3assemblies.de':616 'real':9 'relat':320,345 'relay':550 'request':336 'right':565 'room':545 'r\u00e4umlichkeiten':5 'sammeln':210 'sammlung':242 'schaut':90 'schedul':571 'schnell':199 'sehnt':51 'seit':48,209 'seiten':196 'selbstgebauten':85 'sensori':426 'session':190 'sever':252 'sich':33,96 'sichergehen':122 'sie':79 'site':462 'social':503 'solitud':433 'space':86,130,205 'startet':116 'status':561 'status.c3events.de':559 'stuff':287,326,558 'styleguid':479 'support':400,458 'support@c3auti.de':442 'system':375 'tage':147 'talk':262 'task':306,334 'team':164,249,253,363,401 'team@c3awareness.de':383 'technic':502 'technischen':101 'tel':623,628,635,638,642 'telephon':538 'thing':282,404,556,563 'ticket':620 'ticket@c3heaven.de':331,612 'tree':431 'tri':422 'twitter':293,384,443 'un':232 'und':44,64,73,89,150,157,189 'unklar':223 'unoffici':473 'unseren':23 'us':359 'verabredet':124 'verbessern':247 'vergessen':152 'version':585 'video':543 'visit.at.rc3.world':589 'voic':67 'volunt':311,319,532,613,641 'vom':160 'von':177,187 'weiter':173 'welt':10,40,59,204 'wenn':77,120 'werden':159,175,238 'wichtigsten':215 'wie':117 'willkommen':2 'wir':22,211,237 'wollt':123 'work':564 'workshop':188 'world':49,578,586,591 'w\u00e4hrend':243 'zeit':151 'zu':200 'zum':18 'zur':217 'zusammen':83 'zusammenkommen':19 '\u00fcber':148,192 '\u00fcblicherweis':167",
+            "slug": "start",
+            "title": "Infos"
+        },
+        "model": "core.staticpage",
+        "pk": "07f5ccf7-d6bb-4e86-a9dd-e8c98febddc3"
+    },
+    {
+        "fields": {
+            "conference": "40ba6cda-1970-409f-81ef-efb87ef09d95",
+            "page_group": null,
+            "public_revision": 41,
+            "rendered_body": "<p>Wenn du wen zum Reden brauchst oder Unterst\u00fctzung m\u00f6chtest, kannst du auch das Awareness-Team kontaktieren: <a class=\"external\" href=\"mailto:team@c3awareness.de\">team@c3awareness.de</a> oder bei entsprechenden Anliegen c3Auti: <a class=\"external\" href=\"mailto:support@c3auti.de\">support@c3auti.de</a> DECT 1199 (akut) 2884 (allgemein) oder das Inclusion Operation Center: <a class=\"external\" href=\"mailto:kontakt@c3ioc.de\">kontakt@c3ioc.de</a></p>\n<p>If you need somebody to talk to or support you can also contact the Awareness Team: <a class=\"external\" href=\"mailto:team@c3awareness.de\">team@c3awareness.de</a> or c3Auti: <a class=\"external\" href=\"mailto:support@c3auti.de\">support@c3auti.de</a> DETC 1199 (urgent) 2884 (general), or the Inclusion Operation Center: <a class=\"external\" href=\"mailto:kontakt@c3ioc.de\">kontakt@c3ioc.de</a></p>",
+            "search_content": "Report Content\nWenn du wen zum Reden brauchst oder Unterst\u00fctzung m\u00f6chtest, kannst du auch das Awareness-Team kontaktieren: team@c3awareness.de oder bei entsprechenden Anliegen c3Auti: support@c3auti.de DECT 1199 (akut) 2884 (allgemein) oder das Inclusion Operation Center: kontakt@c3ioc.de\nIf you need somebody to talk to or support you can also contact the Awareness Team: team@c3awareness.de or c3Auti: support@c3auti.de DETC 1199 (urgent) 2884 (general), or the Inclusion Operation Center: kontakt@c3ioc.de",
+            "search_vector": "'1199':28,59 '2884':30,61 'akut':29 'allgemein':31 'also':49 'anliegen':24 'auch':14 'awar':17,52 'awareness-team':16 'bei':22 'brauchst':8 'c3auti':25,56 'center':36,67 'contact':50 'content':2 'das':15,33 'dect':27 'detc':58 'du':4,13 'entsprechenden':23 'general':62 'inclus':34,65 'kannst':12 'kontakt@c3ioc.de':37,68 'kontaktieren':19 'm\u00f6chtest':11 'need':40 'oder':9,21,32 'oper':35,66 'reden':7 'report':1 'somebodi':41 'support':46 'support@c3auti.de':26,57 'talk':43 'team':18,53 'team@c3awareness.de':20,54 'unterst\u00fctzung':10 'urgent':60 'wen':5 'wenn':3 'zum':6",
+            "slug": "report_content",
+            "title": "Report Content"
+        },
+        "model": "core.staticpage",
+        "pk": "4d4b23b9-b23f-4b9b-8708-4191582bd4bc"
+    },
+    {
+        "fields": {
+            "author": null,
+            "body": "Willkommen in den R\u00e4umlichkeiten der rC3! Die reale Welt bietet dieses Jahr leider keinen geeigneten Ort zum Zusammenkommen, also haben wir unseren eigenen geschaffen.\r\n\r\nDer Login-Bereich der rC3 gliedert sich in drei gro\u00dfe Bereiche: 2D-Welt, Content-Plattform und diese Info-Seite.\r\n\r\n### World\r\nIhr sehnt Euch nach Menschen? In der [2D-Welt](/rc3/world) k\u00f6nnt Ihr Gleichgesinnte finden und mit ihnen Voice-/Video-chatten. Die meisten bei\u00dfen nicht (und die anderen nur, wenn Ihr sie darum bittet). Entdeckt zusammen die selbstgebauten Spaces der Assemblies und schaut Euch an, was Eure Freunde sich ausgedacht haben.\r\n\r\nAchtung: Aus technischen Gr\u00fcnden kann es passieren, dass Ihr nicht auf derselben Instanz der Lobby-Karte startet wie Eure Freunde. Wenn Ihr sichergehen wollt, verabredet Euch in einem Assembly-Space!\r\n\r\n### Plattform\r\nIm Bereich Plattform findet Ihr eine gro\u00dfe Auswahl an Inhalten, mit denen Ihr die n\u00e4chsten Tage \u00fcber Raum und Zeit vergessen k\u00f6nnt.\r\nDie Kan\u00e4le [rC1 und rC2](/rc3/ccc) werden vom CCC-Content-Team bespielt, das \u00fcblicherweise das Hauptprogramm des Congress kuratiert. Weitere Kan\u00e4le werden liebevoll von einigen [Assemblies](/rc3/assemblies) gestaltet. Dazu gibt es ein gro\u00dfes Angebot von [Workshops und Sessions](/rc3/assemblies/events).\r\n\r\nHinweis: \u00dcber die [Assembly-Seiten](/rc3/assemblies/all) findet Ihr schnell zu deren 2D-Welt-Spaces.\r\n\r\n### Info\r\nAuf dieser Seite sammeln wir f\u00fcr Euch die wichtigsten Informationen zur rC3.  \r\nEtwas fehlt oder ist unklar? Klopft doch mal beim [Infodesk](https://links.rc3.world/infodesk) an! So erreichen uns die Hinweise am besten. Wir werden die Info-Sammlung w\u00e4hrend der rC3 laufend verbessern.\r\n\r\n---\r\n\r\n## Helpful Teams\r\nThere are several Teams where you can ask questions, get help and talk in person to person or people. \r\n\r\n### [Infodesk](https://links.rc3.world/infodesk)\r\nAt the Infodesk we answer your questions. We help you with orientation, things to do and finding stuff.\r\n\r\nPhone: 1111  \r\nMail: [mailto:infodesk@rc3.world](mailto:infodesk@rc3.world)  \r\nTwitter: [@c3infodesk](https://twitter.com/c3infodesk)  \r\nMastodon: [chaos.social/@c3infodesk](https://chaos.social/@c3infodesk)  \r\nIRC: [#c3infodesk](irc:hackint.org/c3infodesk)  \r\nLink:[Infodesk](https://links.rc3.world/infodesk)\r\n\r\n### [Heaven](https://engelsystem.de/rc3)\r\nThe official task of the heaven is volunteer coordination. We can help out with any volunteering related questions and some other general stuff.\r\n\r\nPhone: 1023  \r\nMail: [mailto:ticket@c3heaven.de](mailto:ticket@c3heaven.de) (preferred for tasks and requests)  \r\n[Ask the Heaven](https://engelsystem.de/rc3/questions) (preferred for Engelsystem and Angel related questions)  \r\nJitsi: [heaven_helpdesk](https://jitsi.rc3.world/heaven_helpdesk)\r\n\r\n\r\n### [Awareness](https://help.ccc.de/awareness/index.html)\r\nIf you experience or notice discriminatory behavior contact us at the Awareness Team. We help and mediate with discrimination, harassment and other forms of systemic and interpersonal problems.\r\n\r\nPhone: 113  \r\nMail [mailto:team@c3awareness.de](mailto:team@c3awareness.de)  \r\nTwitter: [@c3awareness](https://twitter.com/c3awareness)  \r\nLink: [https://help.ccc.de/awareness/index.html](https://help.ccc.de/awareness/index.html)  \r\nLink: [https://rc3.world/rc3/assembly/awareness-team/](/rc3/assembly/awareness-team/)\r\n\r\n\r\n### [c3Auti](https://help.ccc.de/c3auti/index.html)\r\nWe at c3Auti are the support team for all things autistic. From acute help during meltdowns to general question about autims we are there for you. We try to provide a sensory quiet environment in the [tree of solitude](/rc3/assembly/c3auti/).\r\n\r\nPhone: 1199 Emergencies  \r\nPhone: 2884 General  \r\nMail: mailto:support@c3auti.de  \r\nTwitter: [@c3auti](https://twitter.com/c3auti)  \r\nLink: [https://help.ccc.de/c3auti/index.html](https://help.ccc.de/c3auti/index.html)  \r\nJitsi: [c3auti](https://jitsi.rc3.world/c3auti)\r\n\r\n### [Inclusion Operation Center](https://c3ioc.de/)\r\nThe Inclusion Operation Center supports you by improving site accessibilty and inclusivity.\r\n\r\nMail: [mailto:kontakt@c3ioc.de](mailto:kontakt@c3ioc.de)  \r\nLink: [https://c3ioc.de/](https://c3ioc.de/)\r\n\r\n---\r\n\r\n## Official and Unofficial Links\r\n#### Links with links\r\n- **[https://howto.rc3.world/](https://howto.rc3.world/)** - Styleguide - Assembly configuration - How to Play rc3.world\r\n- **[https://links.rc3.world/](https://links.rc3.world/)** - Links - News & Blogs - Infodesk\r\n- **[https://help.ccc.de](https://help.ccc.de)** - Awareness - Autism - Inclusion - Help\r\n\r\n#### Help\r\n- **[https://rc3.world/rc3/report](/rc3/report)** - Abuse - Problems - Technical - Social\r\n- **[https://links.rc3.world/infodesk](https://links.rc3.world/infodesk)** - Infodesk - FAQ - Help - Orientation\r\n- **[https://c3ioc.de/](https://c3ioc.de/)** - Inclusion Operation Center - Accessibility\r\n- **[https://help.ccc.de/c3auti/index.html](https://help.ccc.de/c3auti/index.html)** - c3Auti - Autism - Overstimulation\r\n- **[https://help.ccc.de/awareness/index.html](https://help.ccc.de/awareness/index.html)** - Awareness - Discrimination - Mediation - Harassment\r\n- **[https://engelsystem.de/rc3](https://engelsystem.de/rc3)** - Volunteering - Coordination \r\n\r\n#### (in-)official Communication\r\n- **[https://guru3.eventphone.de](https://guru3.eventphone.de)** - Telephone during the Event\r\n- **[https://jitsi.rc3.world](https://jitsi.rc3.world)** - Video Chat Rooms\r\n- **[irc://hackint.org/rc3](irc://hackint.org/#rc3)** - Internet Relay Chat\r\n- **[https://chaos.social](https://chaos.social)** - Mastodon - Micro Blogging\r\n\r\n#### Things and Stuff\r\n- **[https://status.c3events.de/](https://status.c3events.de/)** - infrastructure status - do things work right now?\r\n- **[https://rc3.world/rc3/public_fahrplan/](/rc3/public_fahrplan/)** - event schedule (public events only)\r\n- **[https://howto.rc3.world/play.en.html](https://howto.rc3.world/play.en.html)** - World FAQ - Policy\r\n- **[https://howto.rc3.world/play.html](https://howto.rc3.world/play.html)** - (deutsche Version) - World FAQ - Policy\r\n- **[https://visit.at.rc3.world](https://visit.at.rc3.world)** - 2D World direct link\r\n- **[https://ewt.eventphone.de/](https://ewt.eventphone.de/)** - Place phone calls into the Eventphone network\r\n- **[http://newsshow.rc3.world/](http://newsshow.rc3.world/)** - rC3 News - Events\r\n\r\n#### Mail\r\n- **[mailto:infodesk@rc3.world](mailto:infodesk@rc3.world)** - Information - Questions\r\n- **[mailto:ticket@c3heaven.de](mailto:ticket@c3heaven.de)** - Volunteering - Angels\r\n- **[mailto:rc3@c3assemblies.de](mailto:rc3@c3assemblies.de)** - Assemblies\r\n- **[mailto:rc3-tickets@cccv.de](mailto:rc3-tickets@cccv.de)** - Tickets\r\n\r\n#### Emergency Numbers\r\n- **[tel:113](tel:113)** - Awareness - Harassment - Discrimination\r\n- **[tel:1199](tel:1199)** - Autistic Emergencies - Meltdown \r\n\r\n#### Information Numbers\r\n- **[tel:1111](tel:1111)** - Infodesk\r\n- **[tel:1023](tel:1023)** - Heaven - Volunteering\r\n- **[tel:2884 AUTI](tel:2884)** - c3auti - General Autism",
+            "is_draft": false,
+            "page": "07f5ccf7-d6bb-4e86-a9dd-e8c98febddc3",
+            "timestamp": "2021-12-29T13:55:20.306Z",
+            "title": "Infos"
+        },
+        "model": "core.staticpagerevision",
+        "pk": 39
+    },
+    {
+        "fields": {
+            "author": null,
+            "body": "Wenn du wen zum Reden brauchst oder Unterst\u00fctzung m\u00f6chtest, kannst du auch das Awareness-Team kontaktieren: [team@c3awareness.de](mailto:team@c3awareness.de) oder bei entsprechenden Anliegen c3Auti: [support@c3auti.de](mailto:support@c3auti.de) DECT 1199 (akut) 2884 (allgemein) oder das Inclusion Operation Center: [kontakt@c3ioc.de](mailto:kontakt@c3ioc.de)\r\n\r\nIf you need somebody to talk to or support you can also contact the Awareness Team: [team@c3awareness.de](mailto:team@c3awareness.de) or c3Auti: [support@c3auti.de](mailto:support@c3auti.de) DETC 1199 (urgent) 2884 (general), or the Inclusion Operation Center: [kontakt@c3ioc.de](mailto:kontakt@c3ioc.de)",
+            "is_draft": false,
+            "page": "4d4b23b9-b23f-4b9b-8708-4191582bd4bc",
+            "timestamp": "2021-12-29T16:45:11.789Z",
+            "title": "Report Content"
+        },
+        "model": "core.staticpagerevision",
+        "pk": 41
+    }
+]