
Player FM - Internet Radio Done Right
26 subscribers
Checked 13h ago
הוסף לפני seven שנים
תוכן מסופק על ידי CCC media team. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי CCC media team או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Player FM - אפליקציית פודקאסט
התחל במצב לא מקוון עם האפליקציה Player FM !
התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות
H
Healthy Spaces


1 AI for the Planet: From Tech Labs to Real Life 37:58
37:58
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי37:58
Fighting climate change means juggling a thousand moving parts, from how we power our cities to how insects sustain our ecosystems. Artificial intelligence is uniquely equipped to take on that scale of challenge, analyzing massive data sets, predicting problems before they happen, and unlocking solutions humans alone could never achieve. In this episode, hosts Dominique Silva and guest co-host Rebecca Handfield (BrainBox AI) speak with Jean-Simon Venne, co-founder of BrainBox AI and leader of the BrainBox business at Trane Technologies, and Dr. David Rolnick, Assistant Professor at McGill University and co-founder of Climate Change AI. They share how AI can slash building emissions, extend equipment life, and open up new frontiers in biodiversity research. We also take a behind-the-scenes look at Trane Technologies’ new AI Lab in Montreal, where the next generation of HVAC innovation is being designed and created. With a focus on practical applications over theory, the lab is harnessing AI as a powerful ally in the fight against climate change, while keeping ethics, responsibility, and trust at the center of every breakthrough. About Healthy Spaces Healthy Spaces is a podcast by Trane Technologies where experts and disruptors explore how climate technology and innovation are transforming the spaces where we live, work, learn and play. This season, hosts Dominique Silva and Scott Tew bring a fresh batch of uplifting stories, featuring inspiring people who are overcoming challenges to drive positive change across multiple industries. We’ll discover how technology and AI can drive business growth, and help the planet breathe a little bit easier. Listen and subscribe to Healthy Spaces on your favorite podcast platforms. Links: A New Era for Smart Buildings with AI Controls and AI Agents - Press Release AI in the Built Environment, Sustainable Markets – White Paper Trane Technologies AI Lab - Website Digital Solutions: Using AI and Autonomous Control to Listen to Your Building - Blog How AI Can Help Dramatically Reduce Energy Demand and Emissions - Blog Trane Technologies Website Healthy Spaces YouTube Brainbox AI Website Climate Change AI Website Dominique Silva Profile Rebecca Handfield Profile Jean-Simon Venne Profile David Rolnick Profile…
Interaction Combinators: The Hidden Patterns of Computation? (gpn23)
Manage episode 489788877 series 2475293
תוכן מסופק על ידי CCC media team. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי CCC media team או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Whaa- hidden patterns in my computations?? Research on Interaction Nets and Interaction Combinators is often buried in a confusing mess of Greek letters and weird graphs, and most computer scientists and programming language developers are still not aware of them or their properties! In this talk we give a friendly introduction to Interaction Combinators, argue why they're one of the most minimal encodings of pure computation, and give examples of how you, too, could benefit from knowing about Interaction Nets! We all know elementary arithmetic and most of us know some programming languages. If you go to the core of both of them -- beyond math, assembly, Peano axioms, Turing machines, or the lambda calculus -- you have reached the core of pure computation itself. We argue that Interaction Combinators can be seen as a minimal encoding of pure computation. Interaction Combinators are a subset of Interaction Nets. Interaction Nets are a graph-like structure with properties such as "locality" or "strong confluence". These properties allow them to be reduced in a massively parallel way without affecting the total number of reductions. Going back to more traditional programming, using Interaction Combinators as the basis of programming languages allows programmers to write massively parallel code without having to rely on a confusing mess of mutexes and semaphores. We give a very accessible (and mostly visual) introduction to the world of Interaction Nets, without requiring much existing knowledge! Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://cfp.gulas.ch/gpn23/talk/RCV9D3/
…
continue reading
1974 פרקים
Manage episode 489788877 series 2475293
תוכן מסופק על ידי CCC media team. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי CCC media team או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Whaa- hidden patterns in my computations?? Research on Interaction Nets and Interaction Combinators is often buried in a confusing mess of Greek letters and weird graphs, and most computer scientists and programming language developers are still not aware of them or their properties! In this talk we give a friendly introduction to Interaction Combinators, argue why they're one of the most minimal encodings of pure computation, and give examples of how you, too, could benefit from knowing about Interaction Nets! We all know elementary arithmetic and most of us know some programming languages. If you go to the core of both of them -- beyond math, assembly, Peano axioms, Turing machines, or the lambda calculus -- you have reached the core of pure computation itself. We argue that Interaction Combinators can be seen as a minimal encoding of pure computation. Interaction Combinators are a subset of Interaction Nets. Interaction Nets are a graph-like structure with properties such as "locality" or "strong confluence". These properties allow them to be reduced in a massively parallel way without affecting the total number of reductions. Going back to more traditional programming, using Interaction Combinators as the basis of programming languages allows programmers to write massively parallel code without having to rely on a confusing mess of mutexes and semaphores. We give a very accessible (and mostly visual) introduction to the world of Interaction Nets, without requiring much existing knowledge! Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://cfp.gulas.ch/gpn23/talk/RCV9D3/
…
continue reading
1974 פרקים
All episodes
×Closing session of All Systems Go! 2025 Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/DR8ELH/

1 One Boot Config to Rule Them All: Bringing UAPI Boot Specification to Legacy BIOS (asg2025) 24:59
24:59
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי24:59
The UAPI Boot Loader Specification defines conventions that let multiple operating systems and bootloaders share boot config files. So far, only systemd-boot implements it - and it’s UEFI-only by design. As a result, hybrid UEFI/BIOS images require maintaining (and keeping in sync) two sets of bootloader configs: one for systemd-boot, and one for a legacy bootloader such as syslinux. I set out to fix that by building a BIOS bootloader that uses the UAPI Boot Loader Specification - allowing both UEFI and legacy boot to use a single shared set of config files. This talk is about why that matters, how I built it, and what comes next. In this talk, I’ll cover: - What the UAPI boot spec is - Why you'd want to use legacy boot instead of EFI/systemd-boot - *spoiler: you don't! but you might have to* - How I implemented UAPI boot support for legacy BIOS - What about UKIs? - A live demo of the bootloader in action - The current state of the project and what’s next https://uapi-group.org/specifications/specs/boot_loader_specification https://github.com/nkraetzschmar/bootloader Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/ANC879/…

1 OS as a Service at Meta Platforms (asg2025) 25:30
25:30
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי25:30
I overview how OS management is done at Meta. We run millions of Linux servers and we have to make sure that OS gets updated on all of them in a given period of time. To do that we developed several products: MetalOS (Image based version of CentOS), Antlir (image builder) and Rolling OS Update (a service that keeps a set of DNF repos in sync with upstream repos and uses them to update OS ) Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/VNCDRL/…

1 What's up with test.thing (asg2025) 25:20
25:20
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי25:20
`test.thing` is a VM runner which targets guests using an API defined by systemd. It started after a conversation at devconf about turning `mkosi qemu` into a library. A quick intro. ~~composefs is an approach to image-mode systems without the disk images. Files are stored in a de-duplicated content-addressed storage with integrity guaranteed through fs-verity. The last year has seen an acceleration of development on composefs-rs, a pure Rust implementation of the ideas behind composefs. Our goal is unification of the storage of bootable system images (via bootc), application Flatpaks, and traditional OCI container environments, bringing deduplication and integrity guarantees to all three. An overview.~~ Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/MLTTHW/…

1 Yocto's hidden gem: OTA and seamless updates with systemd-sysupdate (asg2025) 26:33
26:33
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי26:33
Updates are a critical piece of managing your fleet of devices. Nowadays, Yocto-based distributions can utilize layers for well-established update mechanisms. But, did you know that recent releases of Yocto already come with a simple update mechanism? Enter systemd-sysupdate: a mechanism capable of automatically discovering, downloading, and installing A/B-style updates. By combining it with tools like systemd-boot, we can turn it into a comprehensive alternative for common scenarios. In this talk, we will briefly introduce systemd-sysupdate, show how it can be integrated with your Yocto distribution, and share thoughts on how it can be improved further. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/MU7JM8/…

1 UKI, composefs and remote attestation for Bootable Containers (asg2025) 42:50
42:50
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי42:50
With Bootable Containers (bootc), we can place the operating system files inside a standard OCI container. This lets users modify the content of the operating system using familiar container tools and the Containerfile pattern. They can then share those container images using container registries and sign them using cosign. Using composefs and fs-verity, we can link a UKI to a complete read only filesystem tree, guaranteeing that every system file is verified on load. We integrate this in bootc by creating a reliable way to turn container images into composefs filesystem trees, and then including the UKI in the container image. We will share the progress on the integration of UKI and composefs in bootc and how we are going to enable remote attestation for those systems using trustee, notably for Confidential Computing use cases. https://github.com/containers/composefs-rs https://github.com/bootc-dev/bootc https://github.com/confidential-containers/trustee Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/TNKPQS/…

1 A terminal for operating clouds: administering S3NS with image-based NixOS (asg2025) 34:54
34:54
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי34:54
S3NS is a trusted cloud operator that self-hosts Google Cloud infrastructure in France, targeting the SecNumCloud certification, the most stringent Cloud certification framework. SecNumCloud includes strict legal and operational constraints. To manage these systems securely and reproducibly, we’ve built a family of dedicated administration terminals based on the image based philosophy. These terminals rely on NixOS semantics and draw from the ParticleOS ecosystem: systemd-repart, and dm-verity, ensuring atomic updates, full immutability of the Nix store, and verifiable integrity of the boot chain and runtime system (measured boot), while using remote attestations by TPM2 when connecting to production assets. We will present the purpose of these terminals and what needs they serve along with their high level characteristics: partition layouts, provisioning and connection flow to the production assets. This talk will show an application of many of the concepts that were presented in the NixOS ecosystem and in All Systems Go itself by the systemd community. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/TBDBDA/…

1 Introducing ue-rs, minimal and secure rewrite of update engine in Flatcar (asg2025) 24:20
24:20
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי24:20
Introduce ue-rs, a fresh project that aims to be a drop-in reimplementation of update engine, written in Rust. The goal of ue-rs is to have a minimal, secure and robust implementation of update engine, required by A/B update mechanism of Flatcar Container Linux. Just like the existing update engine, it downloads OS update payloads from a Nebraska server, parses its Omaha protocol, verifies signatures, etc. This project, however, is different from the original update engine in the following aspects. First, it aims to be minimal, by reducing heavyweight legacies in the update engine. Moreover, written in Rust, it brings a huge advantage for security, especially memory safety, in contrast to the original update engine, which is written mainly in C++ and bash. Finally, in addition to traditional OS update payloads, it supports systemd-sysext OEM, which is supported by Flatcar. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/JAC3DH/…

1 Leveraging bootable OCI images in Fedora CoreOS and RHEL CoreOS (asg2025) 25:51
25:51
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי25:51
In last year's ASG!, bootc and bootable containers were introduced. In this talk, we'll go over what changed since last year, and how Fedora CoreOS and RHEL CoreOS are leveraging bootable containers to reduce maintenance and increase sharing. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/87TFB7/…

1 Dirlock: a new tool to manage encrypted filesystems (asg2025) 26:27
26:27
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי26:27
In the Linux world there are several tools and technologies to encrypt data on a hard drive, most falling into one of two categories: block device encryption (like LUKS) or stacked filesystem encryption (like EncFs or gocryptfs). This presentation will introduce Dirlock, a new tool that belongs to a third category: native filesystem encryption, using the kernel's fscrypt API. Dirlock is currently being developed and its aim is to provide a flexible way to encrypt files, suitable for both user accounts and arbitrary directories, with full PAM integration, support for hardware-backed mechanisms such as FIDO2 or TPM and with a D-Bus API for easy management. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/AAWNQT/…

1 container-snap: Atomic Updates from OCI Images using Podman’s Btrfs Driver (asg2025) 22:46
22:46
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי22:46
Traditional package updates using tools like RPM or Zypper can introduce risks, such as incomplete updates or accidentally breaking the running system. To overcome these challenges, we developed **container-snap**, a prototype plugin designed to deliver atomic OS updates—updates that are fully applied or rolled back without compromising the system's state. container-snap leverages OCI images as the source for updates and integrates seamlessly with openSUSE’s [tukit](https://github.com/openSUSE/transactional-update) to enable transactional OS updates. By utilizing Podman’s btrfs storage driver, it creates btrfs subvolumes directly from OCI images, allowing systems to boot from the OCI image. This approach empowers users to construct their own OS images using familiar container image-building tools, like Docker or [Buildah](https://buildah.io/). In this session, we’ll dive into: - The architecture and technical implementation of container-snap - Challenges encountered during development and how we resolved them - Key lessons learned along the way - A live demo showcasing container-snap in action Come and join this session to learn more about how to boot from an OCI image without bricking your system! Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/YTCMSG/…

1 pidfd: What have we been up to? (asg2025) 39:28
39:28
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי39:28
File descriptors for processes on Linux have been available for quite some time now. Userspace has adapted them widely. Over the last two years or so we've extended the abilities of pidfds significantly. This talk will go over all the new features and deep dive into their implementation and usage. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/3BMJVH/…

1 Forget zbus, zlink is the future of IPC in Rust (asg2025) 38:14
38:14
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי38:14
Last year, Lennart Poettering of the systemd fame, [gave a presentation](https://media.ccc.de/v/all-systems-go-2024-276-varlink-now-) at this very same conference, where he introduced Varlink, a modern yet simple IPC mechanism. He presented a case for Varlink, rather than [D-Bus](https://en.wikipedia.org/wiki/D-Bus) to be the future of Inter-process communication on Linux. As someone who works on D-Bus, I took upon myself to prove him wrong, only to find out that I achieved exactly the opposite. It didn't take long before I got convinced of his vision. Since I was largely responsible for giving the world [an easy to use D-Bus Rust library](https://crates.io/crates/zbus), I thought it's only fitting that I do the same for Varlink. This talk will be the story of the creation of such a library, the challenges I faced, where Varlink fits the Rust idioms really well and where it does not and how all of this affected the development and the API. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/SYGBNH/…

1 CentOS Proposed Updates: Bridging the Gap between development and production (asg2025) 25:32
25:32
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי25:32
CentOS Stream is especially suited for production deployments. In these environments it's often common to develop improvements to distribution packages and want to contribute them upstream. Unfortunately, until very recently that required one to then maintain their own build and deployment pipeline for the packages, at least until the changes made their way into the distribution. CentOS Proposed Updates (CPU) SIG aims to bridge this gap - changes that have been submitted as merge requests can be built in this SIG, providing those who run Stream in production with access to needed updates while they make their way into CentOS Stream. We hope this will help increase collaboration between RHEL engineers, CentOS Stream contributors, and the rebuild community as well, especially those that have distributions derived from CentOS Stream directly (such as AlmaLinux with AlmaLinux OS Kitten), as everyone can focus on making improvements without reinventing their own build pipelines. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/9QUZNY/…

1 Privilege delegation for rootless containers, what choices do we have? (asg2025) 21:43
21:43
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי21:43
Going for minimal containers with restricted system calls and unprivileged users is the usual Kubernetes approach these days, and it works great for most web apps. However, the development of more complex infrastructure extensions frequently hinders application functionality. While looking for a solution to deploy virtiofsd in an unprivileged container for KubeVirt, we stumbled on seccomp notifiers. Seccomp notifiers are a kernel feature which monitors syscalls and get notifications to a userspace application when a syscall is executed. Alternative options involved either the use of a custom protocol using UNIX sockets or the deployment of virtiofs as a privileged component alongside the unprivileged VM. After our evaluation, the seccomp notifier turned out to be the simplest solution among all the choices. Unfortunately, the main constraint is the monitor's resilience after a restart, such as after a crash or an upgrade. This limitation forced us to back up to one of the less elegant approaches. But there is hope how this could be solved! The session will explain why seccomp notifiers are a lean solution to avoid extra userspace communication and synchronization, the current limitations and possible future solutions to overcome today’s challenges. Our experience will teach audiences several methods for dividing their privileged infrastructure. Utilizing virtiofsd as an actual example and a target application for KubeVirt integration and deployment. We will discuss the difficulties of using rootless containers in this session, as well as the design patterns, technologies, and tactics we thought about and ultimately chose to maintain or reject. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/SPGAXS/…
C
Chaos Computer Club - recent events feed (high quality)

GNOME has collected some very old code over the years. During the recent GNOME 49 release, we've made some drastic cleanups. Most visibly, we've dropped support for X11 and gained many dependencies on systemd. Let's explore some of the what and why for these changes! Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/FQE7QZ/…
C
Chaos Computer Club - recent events feed (high quality)

1 New Linux Kernel Coredump Infrastructure (asg2025) 41:04
41:04
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי41:04
Coredumping on Linux has long been a nightmare. Currently two modes are supported: (1) Dumping directly into a file somewhere on the filesystem. (2) Dumping into a pipe connected to a usermode helper process spawned as a child of the system_unbound_wq or kthreadd. For simplicity I'm mostly ignoring (1). There's probably still some users of (1) out there but processing coredumps in this way can be considered adventurous especially in the face of set*id binaries. The most common option should be (2) by now. It works by allowing userspace to put a string into /proc/sys/kernel/core_pattern like: |/usr/lib/systemd/systemd-coredump %P %u %g %s %t %c %h The "|" at the beginning indicates to the kernel that a pipe must be used. The path following the pipe indicator is a path to a binary that will be spawned as a usermode helper process. Any additional parameters pass information about the task that is generating the coredump to the binary that processes the coredump. In the example core_pattern shown above systemd-coredump is spawned as a usermode helper. There's various conceptual consequences of this (non-exhaustive list): - systemd-coredump is spawned with file descriptor number 0 (stdin) connected to the read-end of the pipe. All other file descriptors are closed. That specifically includes 1 (stdout) and 2 (stderr). This has already caused bugs because userspace assumed that this cannot happen (Whether or not this is a sane assumption is irrelevant.). - systemd-coredump will be spawned as a child of system_unbound_wq. So it is not a child of any userspace process and specifically not a child of PID 1. It cannot be waited upon and is in a weird hybrid upcall which are difficult for userspace to control correctly. - systemd-coredump is spawned with full kernel privileges. This necessitates all kinds of weird privilege dropping excercises in userspace to make this safe. - A new usermode helper has to be spawned for each crashing process. On recent kernels a new mode has been added making use of AF_UNIX sockets. This talk will talk about the new modes, how they can be used, what advantages they have in comparison to the other modes, and look at technical implementation details. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/MADB7R/…
C
Chaos Computer Club - recent events feed (high quality)

1 Slim device software with systemd targets and nspawn (asg2025) 24:23
24:23
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי24:23
It has been 10 years since Axis Communications had a presentation at the systemd conference. Back then, we have shown how we have increased our product quality, stability and boot times by porting our platform to systemd. 10 years later, we had different challenges to keep the resource usages and boot times under control. We have started from bottom up and sliced our software for this purpose. This work also got us inspired to create virtual versions of our hardware products that we cluster deploy using systemd's nspawn. We have hundreds of engineers working on a software platform that is the base for different product types. It is a different challenge to keep the resource usages of different software composition when so many independent engineers collaborate together. We have applied a different strategy to keep our products as slim and as optimized as possible using different systemd principles like targets, slices, resource prioritization. As a side effect of this work, we have started from ground up and started to virtualize our products using systemd-nspawn. The next step for us was to figure out how in best way to cluster deploy our virtual products so that we can increase the quality of our end to end systems. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/Z3NGWJ/…
C
Chaos Computer Club - recent events feed (high quality)

1 GNOME OS' prêt-à-booter image (asg2025) 26:05
26:05
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי26:05
GNOME OS is a distribution based around systemd-sysupdate. This year, we finally created a live installer image using the same /usr partition as the installed OS. The main innovation however is the ability to install without the need to reboot. The user can start working while the installation is happening. This live image is built using systemd-repart. And the installer itself also uses systemd-repart. But systemd-repart is not the complete solution and we had to solve some challenges. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/QRJVL3/…
C
Chaos Computer Club - recent events feed (high quality)

1 Shipping Flatpak applications with an image based system (asg2025) 27:58
27:58
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי27:58
Flatpak is the de-facto standard for distributing desktop applications across various Linux based systems. It also offers other advantages such as sandboxing. It is particularly useful for image based systems as it installs the applications into a separate location and doesn't try to modify the system. GNOME OS is GNOME's development, testing and QA operating system. It builds the latest and greatest in-development versions of the GNOME desktop and core applications. It is also Linux based system that tries to fully embrace the systemd ecosystem. The applications are however built into the system. While this might be great for testing the apps as they would be in most distros, we also want to build our Flatpak applications from the same build definitions and our users (or more correctly early adopters) prefer to use Flatpak for various reasons. In this talk we'll explore what other image based distributions do to provide Flatpak applications to their users, what users expect from "Flatpak applications" and the various proposals for implementing that in GNOME OS. We hope to be able to present our end result by the time of the conference. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/98W9EX/…
C
Chaos Computer Club - recent events feed (high quality)

1 Unprivileged Containers, with Transient User Namespaces and ID Mapping, but Without SETUID Binaries (asg2025) 41:53
41:53
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי41:53
Many traditional container engines make use of the "subuid" concept and the "newuidmap" tool to implement a concept of "unprivileged" user-namespace containers on Linux. This approach has many shortcomings in my PoV, from both a security and scalability standpoint. Recent systemd versions provide a more powerful, more secure, mor scalable alternative, via systemd-nsresourced, systemd-mountfsd and other components. In this talk I want to shed some light on the problems with the "old ways", and in particular focus on what the "new ways" bring to the table, and how to make use of them in container runtimes. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/E7FHPY/…
C
Chaos Computer Club - recent events feed (high quality)

oo7-daemon is the new D-Bus Secret Service provider that aims to fully replace gnome-keyring. In this followup (continuation of my 2024 talk) lightning talk, I will go through the progress made, the challenges faced and the status of systemd credentials integration. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/NFNFJS/…
C
Chaos Computer Club - recent events feed (high quality)

Marco will review the features available in the initramfs-tools ecosystem, the initrd generator used by Debian and Ubuntu, and how they can be implemented (or not) by adopting mkosi-initrd. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/E989ZX/…
C
Chaos Computer Club - recent events feed (high quality)

1 A new systemd container runtime?! (asg2025) 27:25
27:25
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי27:25
At Meta, we've been looking to revamp our internal container runtime (Twine). Instead of maintaining all the low level container runtime code ourselves, we'd much prefer having more of this managed by systemd. This talk will go over what we did to make systemd transient units a suitable environment for running system containers (pid namespace support, cgroup namespace support, namespace delegation, ...), and why we went this route instead of reusing systemd-nspawn. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/BBTJSF/…
C
Chaos Computer Club - recent events feed (high quality)

1 isd: interactive systemd (asg2025) 19:42
19:42
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי19:42
Simplify systemd management with `isd`! `isd` is a TUI offering fuzzy search for units, auto-refreshing previews, smart sudo handling, and a fully customizable interface for power-users and newcomers alike. If you ever became frustrated while typing: - `systemctl start --user unit-A.service` (manually starting a unit) - `systemctl status --user unit-A.service` (seeing that it failed) - `journalctl -xe --user -u unit-A.service` (checking the logs) - `systemctl edit --user unit-A.service` (updating the unit) - (repeat until problem is solved) `isd` could help. In this presentation, we will discuss the features that `isd` currently supports, the features that are planned for the future, and the experience of developing a TUI for `systemd` commands. I hope attendees will find the content engaging and practical. Audience participation is highly encouraged. I am especially eager to hear your thoughts, ideas, and feature requests. If you think a tool like `isd` might be unnecessary or redundant, I'd love to hear your perspective, too! Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/GCV3PM/…
C
Chaos Computer Club - recent events feed (high quality)

1 Verification of OS artifacts without stateful keyrings (asg2025) 21:40
21:40
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי21:40
Many OS artifacts today are still verified using proprietary, stateful keyring formats. With the "File Hierarchy for the Verification of OS Artifacts (VOA)" an attempt is made to rid the ecosystem of this limitation by implementing a generic lookup directory. With extensibility in mind, this unifying hierarchy currently provides integration for OpenPGP, with further integrations in planning. While working on improvements to the [ALPM](https://alpm.archlinux.page) ecosystem, the way packages and other OS artifacts are currently verified on Arch Linux has been evaluated. Noticing the extensive vendor lock-in to GnuPG and with today's widespread availability of [Stateless OpenPGP](https://wiki.archlinux.org/title/Stateless_OpenPGP) implementations in mind, a plan was hatched to create a more generic, stateless approach. A specification and implementation for the [UAPI group](https://uapi-group.org/) has been started to create a ["File Hierarchy for the Verification of OS Artifacts (VOA)"](https://github.com/uapi-group/specifications/pull/134). This approach is meant to be technology agnostic and allow further integrations, such as SSH and X.509. Follow along for an overview of what this specification is trying to improve upon and how today's tools could benefit from it in the future. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/7DDSVZ/…
C
Chaos Computer Club - recent events feed (high quality)

1 ParticleOS: Why is Lennart still not dogfooding systemd?! (asg2025) 37:46
37:46
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי37:46
More than six months have passed since Daan tried to ~~shame~~ gently peer pressure Lennart to actually use the stuff he builds, via a FOSDEM talk: https://fosdem.org/2025/schedule/event/fosdem-2025-4057-particleos-can-we-make-lennart-poettering-run-an-image-based-distribution-/ Did he succeed? Is dogfooding standard practice now in the systemd development process? Or do things like randomly breaking logging in GNOME (*cough*) still happen from time to time? Join us for this talk to find out, and to apply yet more peer pressure. We will also spend some time talking about more boring and mundane topics, such as giving an overview of the current status of ParticleOS, and how we build it as a ready-to-consume and secure-by-default signed and self-enrolling appliance on the SUSE Open Build Service. https://github.com/systemd/particleos https://build.opensuse.org/package/show/system:systemd/particleos-fedora https://build.opensuse.org/package/show/system:systemd/particleos-debian Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/QMYAMS/…
C
Chaos Computer Club - recent events feed (high quality)

1 A simpler and faster firewall with bpfilter (asg2025) 39:39
39:39
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי39:39
For many years, firewall solutions on Linux have grown and evolved, without any major change, until eBPF. While eBPF can allow very fast and efficient packet filtering, the learning curve doesn't make it easily accessible to non-developers. bpfilter aims to bridge the gap between existing tools (nftables, iptables) and modern technologies such as eBPF. By translating filtering rules into native code, bpfilter abstracts the complexity behind cutting-edge kernel technologies while maintaining backward compatibility with existing solutions. Let's discuss about bpfilter and see it in action! Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/JEVBTZ/…
C
Chaos Computer Club - recent events feed (high quality)

1 Sandboxing services with Landlock (asg2025) 25:01
25:01
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי25:01
Landlock is an unprivileged kernel feature that enables all Linux users to sandbox their processes. Complementary to seccomp, developers can leverage Landlock to restrict their programs in a fine-grained way. While Landlock can be used by end users through sandboxer tools, there is currently no well-integrated solution to define security policies tailored to system services. Although AppArmor and seccomp security policies can already be tied to a system unit, we aim to provide a more dynamic, standalone, and unprivileged option with Landlock. In this talk, we'll briefly explain what Landlock is and highlight its differences from other Linux security features (e.g., namespaces, seccomp, other LSMs). We'll then focus on the new configuration format we are designing for Landlock security policies, its characteristics, and how it could extend systemd units by taking into account runtime context (e.g., XDG variables). Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/FXWDCF/…
C
Chaos Computer Club - recent events feed (high quality)

1 Integrating systemd-sysext images in an update stack (asg2025) 26:19
26:19
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי26:19
systemd-sysext provides a nice way to enhance a distribution with a read-only root filesystem without the need to reboot. But there is additional tooling necessary to manage the sysext images: * install an image which is compatible with the installed OS version * update installed images to the newest compatible version * rollback images in case of an OS rollback * cleanup unneeded images In this presentation I will talk about which tooling systemd itself provides for this (importctl, updatectl, ...) and what the benefits and disadvantages of this tools are compared with real world use cases. In the end I created an own, generic and distribution independent tool for this using systemd tools in the backend. Using openSUSE MicroOS as example I will demonstrate how we solved the problems with it and how we integrated it in our update stack. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/8AA87L/…
C
Chaos Computer Club - recent events feed (high quality)

1 Look ma, no secrets! - bootstrapping cryptographic trust in my homelab using Nix, UKIs, TPMs and SPIFFE (asg2025) 27:35
27:35
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי27:35
All the big cloud providers provide your machines with a unique cryptographic identity that can be used to talk to their cloud services securely without having to manage or rotate any cryptographic secrets yourself. For example GCP has Service accounts and AWS has IAM roles. This ubiquity of cloud identity and the seamless integration with all the the services of these cloud providers is one of the reasons why they are so successful. SPIFFE (Secure Production Identity Framework For Everyone) tries to unify these concepts of workload identity in a vendor neutral framework. But how do we bootstrap our cryptographic identity securely when we are running things on our own hardware as opposed to on cloud? What is our bottom turtle? In this talk, I will show how I use Nix in combination with the swiss-army knife of tools provided by systemd (ukify, systemd-measure, systemd-repart, systemd-veritysetup-generator) to create reproducible images for which we can predict TPM measurements. Paired with a custom attestation plugin for SPIRE (the reference CA server for SPIFFE) that uses TPM remote attestation I can give each of my servers a unique identity encoded in a TLS certificate if and only if they were booted up with the software that I intended them to boot up with. This then allows me to have workloads talk to each other with mutual TLS without having to manage any keys or certificates myself. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/X3ZSXV/…
C
Chaos Computer Club - recent events feed (high quality)

1 Extending Fedora Atomic Desktops using systemd system extensions (asg2025) 25:54
25:54
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי25:54
On image based desktops distributions such as Fedora Atomic desktops and Universal Blue, users are expected to run their graphical applications using Flatpaks and their command line ones using containers. But that approach does not work well for some applications that require more privileges, direct access to devices or kernel interfaces. With systemd system extensions (sysexts), it is possible to extend an image based system on demand. Sysexts come with a lot of advantages: they can be created out of arbitrary content (not only packages), are quickly enabled or disabled and can be built and shared independently of the main distribution channels. We will demonstrate how the Atomic Desktops can take benefit of sysexts to provide extensions such as virtual machine management (libvirt), alternative container runtimes (moby-engine or docker), IDE (VS Code) or debugging (gdb). We will also look at important details when building sysexts, the current limits when deploying them (SELinux policy modules, service management, RPM database update), what is currently blocking us from using it for more complex cases (kernel modules) and what we would need to properly manage and update them. Supporting examples for this talk: https://github.com/travier/fedora-sysexts Work in progress sysexts manager that targets managing sysexts on Bootable Container systems: https://github.com/travier/sysexts-manager Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/DCVQLK/…
C
Chaos Computer Club - recent events feed (high quality)

1 Accessing shadow records via varlink (asg2025) 26:12
26:12
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי26:12
Provide a varlink service to access /etc/passwd and /etc/shadow so that no setuid and setgid binaries are necessary for this task. There are two independent "problems" which can be solved with the same idea: all files in /usr should be owned by root:root and no setuid binary should be needed. The first one is a requirement of image based updates of /usr to avoid UID/GID drift, the second one is a security feature wished by systemd developers and security teams. Currently most setuid binaries (or setgid binaries owned by group shadow) beside su and sudo only need this to read the shadow entry of the calling user. This task could be delegated to a systemd socket activated service which provides the user shadow entry for the calling user. In this talk I will present the why, the current implementation and feedback from security teams. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/RUTE9Y/…
C
Chaos Computer Club - recent events feed (high quality)

1 systemd-confext Two Years On: Versioned Overlays for /etc, Reloaded (asg2025) 25:45
25:45
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי25:45
systemd-confext is a lightweight overlay mechanism for /etc, allowing you to drop in a configuration extension ("confext") bundle and let systemd make it visible to your service as though it was already shipped with the base image. Building on the same extension magic as systemd-sysext, confext also introduces extra features tailored for the /etc use case, such as vpick-ing the newest version and the ability to pick up config revisions with a `systemctl reload`. This talk presents the changes to systemd-confext since [its debut at All Systems Go! 2023](https://cfp.all-systems-go.io/all-systems-go-2023/talk/XLQNDJ/), the lessons learned along the way to make it work, and how we leverage this capability at Microsoft already to deliver configuration payloads in production. Immutable Linux distributions offer stability and reproducibility, but at the cost of configuration changes needing time to build. A small configuration or system change can then require complete redeployment of the entire OS, adding friction to development work and impacting customers. This is not acceptable for certain Linux environments at Microsoft, where only seconds of planned downtime budget exist every year. systemd-confext is intended to be a signed, `dm-verity`-protected, live configuration update mechanism meant to address this issue. It provides a way to make quick additions in a secure and reliable way with minimum customer impact. Two years later, confext now supports host-level payloads to /etc and also works in the individual namespaces of services and portable units via `ExtensionImages=` and `ExtensionDirectories=` too. One of the recent significant additions is that systemd-confext has been integrated with `systemctl reload`, giving it the ability to pick up new configuration revisions during a reload, not just a restart. Combined with services that implement notify-reload, it is possible to simply drop a new versioned extension into the watched directory to trigger the reload flow and update the service config. We'll review how these features can be used and include a demo of a couple of use cases, including path-activated units to deploy config payloads in production at Microsoft. We'll also briefly discuss the namespace and mounting changes needed in the systemd codebase to make this integration work. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/GSRYLR/…
C
Chaos Computer Club - recent events feed (high quality)

1 How I optimized away 94% CPU from zbus (asg2025) 24:03
24:03
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי24:03
Haven’t you ever wanted to find ways to make your Rust code the most optimal in the world? I know how you feel. This is a talk, where I’d tell you how easy it is to profile your Rust software and how most often the solutions are trivial. This is a story of how I used a few readily-available Open Source tools to achieve huge optimizations in [zbus](https://crates.io/crates/zbus), a pure Rust D-Bus library. This was long journey but gains were worth the efforts. I will go through each single bottleneck found, how it was found and why it was a bottleneck and how it was optimized away. While attending this talk will by no means make you an expert in optimizations, it is my hope that by you will be able to relate to some of bottlenecks or solutions I will present (“hey”, I also do that in my code!”) and learn from my experience. Maybe afterwards, you can suggest an even better solution? Moreover, if you don’t already have any experience with profiling and optimizations, this talk should be a good introduction for that. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/TYRJUG/…
C
Chaos Computer Club - recent events feed (high quality)

Let's have an open discussion with systemd developers who are at ASG and users in the audience. We will open with the developers saying what they plan to work on in the near future, and then allow questions / comments from the audience. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/PXZGEL/…
C
Chaos Computer Club - recent events feed (high quality)

1 Linux IPC: Lost between Threading and Networking (asg2025) 25:57
25:57
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי25:57
Communication is paramount in modern application development. This applies equally well to the process of writing applications and to the code itself. The complexity of the tasks ahead of us calls for a distributed and coordinated development effort, and this often manifests in our code: We design distributed, communicating systems to split complexity and responsibility among many people and teams, and at the same time meet the demand for ever faster systems. The last decade showed significantly increased popularity in API design, network protocols, and distributed computations. At the same time some of the most intriguing language research improves how multi-threaded applications synchronize and exchange information without sacrificing safety or performance. Between these two lies an almost forgotten world: Linux Inter-process communication (IPC) has lost ground to thread-communication and networking protocols. Let us look at how other operating systems have evolved their IPC layers, what new systems decide to go with, and why Linux IPC has not seen any major changes since the 90s. And finally, can we lift Linux IPC out of stagnation and catch up with everyone else? Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/8WW7YH/…
C
Chaos Computer Club - recent events feed (high quality)

1 systemd: state of the project (asg2025) 21:47
21:47
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי21:47
Same as every year, a lot has happened in the systemd project since last year's ASG. We released multiple versions, packed with new components and features. This talk will provide an overview of these changes, commenting on successes and challenges, and a sneak peak at what lies ahead. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/B8RVCJ/…
C
Chaos Computer Club - recent events feed (high quality)

1 Systing: tracing for the lazy (asg2025) 29:24
29:24
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי29:24
Systing helps you solve problems in minutes rather than days. Out of the box it gives you everything you could possibly need, combined with perfetto’s visualization you will never be confused again. This talk will introduce systing, a tracer that is built on modern BPF tooling, purpose built to debug large applications with complicated interactions. This will be little talk and mostly demo. Two decades of experience debugging kernel problems has been poured into this tool to make it as straightforward as possible. I will walk through the basic usage, and show a case study investigation to give a feel for the various features that set it apart from the lower level tools we all use and love. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/UHSCHF/…
C
Chaos Computer Club - recent events feed (high quality)

Running **BPF** programs today requires *CAP_BPF* capability, which is an all or nothing BPF capability. But BPF nowadays spans a large area, from simple monitoring to potentially invasive fields like network or tracing. BPF Tokens aims to add fine grained BPF capabilities to systemd units and containers, avoiding to give the whole *CAP_BPF* capability or even worse running the service as privileged user. References: https://lwn.net/Articles/947173/ https://github.com/systemd/systemd/pull/36134 Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/TEH3QN/…
C
Chaos Computer Club - recent events feed (high quality)

1 Why you should contribute to systemd! (asg2025) 23:28
23:28
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי23:28
I'll use these 20 minutes to explain why and why contributing to systemd is a great experience. We'll avoid beating dead horses by not discussing git forges and email, but instead focus on the development experience, from building systemd distribution packages from git main, running integration tests against those distribution packages, debugging failures, writing new tests, and installing the distribution packages on real hardware to debug issues. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/B8LJKD/…
C
Chaos Computer Club - recent events feed (high quality)

1 A Security Model for systemd (asg2025) 40:31
40:31
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי40:31
Linux lacks a coherent security model, and by extension we never defined one for the systemd project either. In this talk I'd like to start changing this, and begin defining some general security design guidelines that we so far mostly followed implicitly, and make them more explicit. After all, systemd to a large degree is involved in security subsystems, from SecureBoot, Measured Boot & TPM, to its service sandboxing, dm-verity/dm-crypt support, its FIDO2/PKCS#11 hookups, its many security boundaries, secure parameterization, Linux Security Module initialization and more. While this distributions & applications consuming systemd might follow different security models I think it's important to talk about a unified vision from the systemd upstream perspective, even if various downstreams then make modifications or only deploy a subset of it. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://cfp.all-systems-go.io/all-systems-go-2025/talk/FE98ZY/…
C
Chaos Computer Club - recent events feed (high quality)

Kurzer Talk, indem ich kurz vorstelle wie wir die Quellcode organisiert haben. https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://pretalx.0x90.space/quellcode-2/talk/QVGLUD/
C
Chaos Computer Club - recent events feed (high quality)

1 Siemens Systemtelefon hacken for fun and giggles (quellcode25) 17:18
17:18
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי17:18
Im Hackspace sind Systemtelefone von Siemens aufgetaucht. Wir hatten sehr viel Spass mit ihnen und ich will davon erzählen. Zusammen mit zwei anderen Mitgliedern aus dem Nerdberg haben wir uns das "Unify OpenStage 60" Telefon angeschaut, Root-Zugriff bekommen und schlussendlich ein paar nette Anwendungen darauf zum laufen bekommen. Das ganze war aber eher eine längere Reise - von dieser will ich euch erzählen. https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://pretalx.0x90.space/quellcode-2/talk/AVRDJR/…
C
Chaos Computer Club - recent events feed (high quality)

Lightning talk slot, to present some lightning talks. A slot for short talks about different topics, Can be in English or German. Ein Programm Punkt in dem kurze Vorträge über verschiedene Themen vorgetragen werden können. Die Vorträge können in Deutsch oder Englisch gehalten werden. https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://pretalx.0x90.space/quellcode-2/talk/RD9FHU/…
C
Chaos Computer Club - recent events feed (high quality)

1 Make your personal website, it's easy! (quellcode25) 12:52
12:52
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי12:52
Lighting Talk about how to make your own personal website and lose your fears and doubts about how to do it. In a world where social media platforms keeps degrading and closing, where more and more places of Internet get subjected to "Enshittification", to the loss of personalization and even censorship, there's this call to oppose this. A counterculture call, to return to "how Internet used to be at their origins": Original, personal and alive. "But, isn't quite hard making a website by oneself, that requires a lot of programming knowledge and money?" Not at all! In this lighting talk, we dispel such concepts, showing the way on how literally anyone can do their own personal sites, and even host them for free. https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://pretalx.0x90.space/quellcode-2/talk/3RU3MD/…
C
Chaos Computer Club - recent events feed (high quality)

1 Gegen die Angst - was will der intersektionale Anarchismus? (quellcode25) 1:17:18
1:17:18
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי1:17:18
Unsere Beziehungen sind von Herrschaftssystemen vergiftet - wir alle werden willkürlich nach Geschlecht, Ordnung, Herkunft, Leistung, und Fähigkeiten eingeteilt. Wie können wir diese Zwänge abschaffen, und einen Umgang auf Augenhöhe finden? https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://pretalx.0x90.space/quellcode-2/talk/ZLVBAL/…
C
Chaos Computer Club - recent events feed (high quality)

1 Einführung in die numerische Strömungssimulation mit Free Open Source Software (quellcode25) 57:44
57:44
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי57:44
Einführung in die numerische Strömungssimulation mit Free Open Source Software - Grundgleichungen, Software, Beispielrechnungen Aus den Fingern gesogen, ohne Erwartungshaltung https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://pretalx.0x90.space/quellcode-2/talk/G3UJNG/
C
Chaos Computer Club - recent events feed (high quality)

1 Dein Smartphone, ein Werkzeug für die Wildnis (Meine liebsten Offline open-source Android Apps) (quellcode25) 47:31
47:31
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי47:31
Du findest dich plötzlich in der **Wildnis**, was tun? Na klar, als allererstes das Smartphone herausholen und Empfang prüfen. Verdammt, wo bin ich eigentlich? In diesen Talk stelle ich dir drei Tolle Apps vor, die dir in der Wildnis eine große Hilfe sein werden. Auch im Bastler*in Alltag können sie aber sehr nützlich sein. https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://pretalx.0x90.space/quellcode-2/talk/CMRSL9/…
C
Chaos Computer Club - recent events feed (high quality)

1 Liberating DJing from Mega Corps (quellcode25) 54:19
54:19
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי54:19
Introducing a fresh'n tiny DJing Software for Linux to battle the enshittification of DJing The art of DJing has been shifting and progressing over the last 2 decades by the introduction of digital djing. But since then it has been in the greedy hands of a couple of big players, namely Pioneer (now AlphaTheta). Cloud & subscription is now on the plate, with hefty price tags. Time to liberate the Art of DJing from those evil Mega Corps! Out of this struggle I've been hacking on a tiny DJing software over the last years and I want to present the current state and give a little introduction on how to play with it. Website: libredj.org Codeberg: codeberg.org/obsoleszenz/libredj Mastodon: nerdculture.de/@obsoleszenz https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://pretalx.0x90.space/quellcode-2/talk/T93YBS/…
C
Chaos Computer Club - recent events feed (high quality)

1 Kalman Filter und Sensor Fusion (realraum) 31:07
31:07
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי31:07
Ein kurzer Vortrag, der die Vor- und Nachteile einzelner Sensoren aufzeigt, was die Entwicklung der Sensor Fusion motivierte. Es wird ein Überblick geschaffen, wie man vom einfachen Complementary Filter zum Kalman Filter kommt und wie man diesen adaptiert um nichtlineare Zustände zu berechnen. Diese Erweiterung ist als Extended Kalman Filter bekannt, die in den meisten Anwendung der Navigation und Orientierungsbestimmungen von Flugzeugen zum Einsatz kommt. https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://c3voc.de…
C
Chaos Computer Club - recent events feed (high quality)

Closing Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://talks.datenspuren.de/ds25/talk/FUJERP/
C
Chaos Computer Club - recent events feed (high quality)

1 How to Construct a more Decentralized Internet? (DS2025) 31:54
31:54
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי31:54
This talk reports about Dresden Internet Exchange (DD-IX), how it was build, why it was necessary and lessons that we learned. The infrastructure of the Internet is becoming increasingly centralized by large Internet and content providers and Internet Exchanges. As a result, packets have to travel hundreds of kilometers, even if the sender and receiver are located in the same city. This causes increased latency and makes the Internet more susceptible to disruptions. With DD-IX, we want to do our part to counteract this development. DD-IX is run by an active community of students, network engineers, and volunteers. In this presentation, we will report on our journey and the insights we have gained along the way. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://talks.datenspuren.de/ds25/talk/QPRJ3B/…
C
Chaos Computer Club - recent events feed (high quality)

1 The End of the World as we know it? (DS2025) 46:24
46:24
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי46:24
Wie TechBros die Zukunft planen und weshalb wir diese Zukunft stoppen, um Planeten & Gesellschaft zu erhalten Moderne Technologie wie „KI“ werden uns durch eine Vielzahl an Versprechen schmackhaft gemacht: Die künstliche Intelligenz macht alles noch viel besser. Fortschritt, permanente Verbesserungen, die beste Zukunft aller Zeiten. Beim näheren Hinsehen sind diese Versprechen aber extrem unkonkret: Wohin wir durch die Nutzung dieser Technologien fortschreiten, für wen sich alles permanent verbessert und wie viele von uns an der als beste Zukunft beschriebenen Zustand teilhaben dürfen, wird nie erklärt. Wer diese Versprechen hingegen nicht begeistert umarmt gilt schnell als technikfeindliche:r Hinterwäldner:in. Dabei ist ein Hinterfragen der Versprechen enorm wichtig, denn hinter Technologien wie ChatGPT und Gotham stehen Firmen wie OpenAI und Palantir. Und hinter diesen und anderen Firmen Menschen mit Ideen und Ideologien. Und Milliarden auf den Konten. Sie haben, im Gegensatz zu uns, sehr genaue Vorstellungen davon, wohin es gehen soll und welche Teile der Menschheit an ihrer Zukunft teilhaben werden dürfen. Machtkonzentrationen, die theoretisch durch soziale Entwicklungen nicht mehr möglich sein sollten, haben sich in den letzten Jahrzehnten gebildet und wenige Einzelpersonen greifen mit ihren Entscheidungen die Schicksale und Entwicklungen von Milliarden Menschen ein. In ihrem Vortrag gehen HonkHase und Katika Kühnreich auf die grundlegenden Glaubenssysteme der nun oft Tech Bros genannten Milliardär:innen und auf die Auswirkung ihrer Technologien auf Gesellschaften ein, mit einem Schwerpunkt auf der Überwachungssoftwarefirma Palantir des Investors Peter Thiel. Die kybernetische und rassistische Vergangenheit trifft auf eine verdrogte Gegenwart sowie auf eine zerbröselnde Gesellschaft, die durch viel Propaganda und Gamifizierung der sogenannten Sozialen Medien vergessen hat, dass sie selbst eine Macht ist. Den TESCREAL genannten Zukunftsvisionen der Tech Elite werden die Grundlagen von fairen, selbstorganisierten Gesellschaften entgegengestellt. #TESCREAL #Transhumanismus #TechBros #SozialeBewegungen #Mitbestimmung Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://talks.datenspuren.de/ds25/talk/8H9TE9/…
C
Chaos Computer Club - recent events feed (high quality)

1 Freie Sachsen - Wie es der sächsischen Neonazi-Szene gelungen ist, sich neu zu organisieren (DS2025) 44:43
44:43
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי44:43
Alter Wein in neuen Schläuchen - wie es den Freien Sachsen gelungen ist, die Neonazi-Szene in Sachsen neu zu organisieren. Seit der Corona-Pandemie hat sich die sächsische Neonazi-Szene stark verändert. Die NPD verlor ihre zentrale Stellung spätestens mit ihrer Umbenennung in "Die Heimat", gleichzeitig blieb das Aktivitätsniveau der rechten Szene hoch. Durch die Corona-Proteste hat mit den "Freien Sachsen" ein neuer Akteur die Funktion als wichtigste Partei der sächsischen Neonazis übernommen - jedoch mit einigen skurrilen Eigenheiten wie der Forderung eines "Säxit". Wir zeigen in unserem Vortrag, wie es den "Freien Sachsen" gelungen ist, für das breite Spektrum der sächsischen radikalen Rechten - vom DDR-nostalgischen Russland-Fanatiker bis zur Elblandrevolte - die Funktion als zentrales Schanier einzunehmen. Dazu beleuchten wir, wer hinter den "Freien Sachsen" steckt, welche Strategien sie nutzen, und warum sie gefährlich und ernst zu nehmen sind. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://talks.datenspuren.de/ds25/talk/97DSUZ/…
C
Chaos Computer Club - recent events feed (high quality)

1 Wie man mit PostmarketOS Linux auf dem Handy benutzt (DS2025) 33:42
33:42
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי33:42
Kurze Einführung zu PostmarketOS & Q&A Seit Anfang des Jahres benutze ich mit PostmarketOS mainline Linux auf meinem Handy. Ich möchte euch in diesem Talk erzählen, wie das möglich ist, wie benutzbar das ist und was man alles damit machen kann. Am Ende gibt es ein Q&A und ich kann verschiedene Funktionen zeigen. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://talks.datenspuren.de/ds25/talk/CSQXWM/…
C
Chaos Computer Club - recent events feed (high quality)

1 Beginners Guide to IC Reverse Engineering – With a High Likelihood of Survival! (DS2025) 45:44
45:44
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי45:44
Peel back IC layers: decapping, delayering, imaging, and analysis for curious beginners. My curiosity often knows no bounds, especially when it comes to understanding how things work. That’s why I’ve often wondered how certain ICs function internally and how one can uncover their secrets. This curiosity led me to start exploring the world of chip reverse engineering, even without any prior experience. After several mishaps (and a few rather risky experiments), I finally achieved my first results and found myself falling ever deeper down the rabbit hole. While researching techniques, I discovered the Siliconpr0n community—a group of brilliant, friendly, and incredibly helpful fellow nerds who shared their knowledge and made the steep learning curve much more manageable. In this talk, I will show how to "safely" decap and delayer chips with minimal effort—often right at your kitchen table, or better, in a well-ventilated space such as a balcony. I will introduce the essential tools and techniques for beginners, demonstrate how to capture usable images, and explain simple methods for analyzing chip structures. The presentation will include practical examples from the Siliconpr0n community and provide insight into the current projects of others. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://talks.datenspuren.de/ds25/talk/CVYPHY/…
C
Chaos Computer Club - recent events feed (high quality)

Ein Vortrag über Matrix, warum Dezentralisierung für Kommunikationsinfrastruktur wichtig ist, und etwas Kapitalismuskritik. In diesem Vortrag möchte ich das Kommunikationsprotokoll Matrix vorstellen. Er ist vor allem für Neulinge gedacht, soll aber auch erfahrene Matrix-Nutzende nicht langweilen. Dazu werde ich nicht nur die gängigen Anwendungen vorstellen und auf potentielle Fallstricke hinweisen. Ich werde auch darauf eingehen, warum die konventionellen Instant-Messaging-Dienste da draußen alle schlecht sind. Ja, auch Signal. Spoiler: Dezentralisierung ist unsere einzige Rettung. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://talks.datenspuren.de/ds25/talk/HEKCGV/…
C
Chaos Computer Club - recent events feed (high quality)

1 Genode-based Atari-8-Bit IDE (DS2025) 42:44
42:44
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי42:44
A custom Genode-based Atari-8-Bit IDE on the MNT Reform laptop In his talk, Norman Feske presents three of his passions combined: the Genode operating-system framework, Atari home computers, and the MNT Reform open-hardware laptop. Following a brief intro of those interests, he will give a walk through his custom OS running on the MNT Reform specifically tailored for reviving the Atari 8-bit home-computer spirit. The guided tour will casually present several unique aspects of the Genode-based Sculpt OS while touching topics as diverse as microkernels, 6502 assembly, capability-based security, font rendering, and development workflows. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://talks.datenspuren.de/ds25/talk/8WQAGE/…
C
Chaos Computer Club - recent events feed (high quality)

1 Magical AI World? Resources & Labour & „AI“ and how it is changing societies (DS2025) 45:27
45:27
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי45:27
AI is a buzzwords: AI makes everything better, brings all solutions, will save us. But what is AI and where will it save us to? Artificial Intelligence became a buzzword and is currently stuck to nearly everything that can’t climb a tree fast enough. As if by magic all becomes easier, faster, and more effective when you apply “AI”. And much better, especially in comparison to a human doing the task. One small click for a human and “AI” is magically solving our tasks: our (home-)work, writing our emails and is bringing our rooms to the cosiest temperature. “AI” is the rescue if not the salvation and often we do not have to pay a penny for that! But what kind of picture is appearing if you take a look behind the curtain of the “AI Magic”? Because we are all old enough to know that every magic is based on tricks. And that first thing you ought to do is to check the gift horses teeth. This talk will lift the curtain of the “AI Magic”. By asking what is meant by the term “AI”, what differs “AI” from human intelligence? If it is the rescue – where is it rescuing us to? In what kind of society are we let by “AI” and its founders? And do we want to be there? This talk will tackle the root of the problem by digging out the ideological roots of AI by taking a look at three different aspects: resources, conditions of labour, and the shift of power happening through that technology. The origins of “AI” will be the topic of the first chapter. Because “AI” did not suddenly hatch, but was developed. Behind the development are theories, money, and and a concept of the human nature and society. And, in the case of “AI”: how to change it by using “AI”. Following this introduction, “AI”’s spell will be broken in the following steps: Regarding the planet’s dwindling resources, the working conditions of “AI”, and the societal implications and changes that are triggered by these technologies. Computer parts do not grow on trees, the production needs loads of resources – energy, commodities, and water. As well as heaps of human labour, mostly under gruesome conditions. In this part of the talk finiteness will be addressed, both of the human and the planets resources. Climate change will be broached as well as (the fragility) of global supply chains and dependencies. The next chapter will pick up the thread of working conditions connected to “AI”. Because not only in the procution of hardware, but in the training of the software are countless humans are involved, often working under brutal conditions. And there is a global trend showing: “The North” is making money while “the South” suffers. And because not all shiny stuff is gold this part will take a look on some “AI” that was not magic“AI” at all dirty tricks. The last part the implication on the society will be sketched. What happens when a technology that calculation processes are so opaque gain so much power? If people controlling these processes are not controlled by anyone? How does it change our lives, our labour, our social interactions with other humans, our political work? And how does a society controlled by tech moguls or Tech Bros will look like? The more power we shift to technologies like “AI” and their owners, the more we should ask ourselves what the owners of those technologies want and if we want to be part of that. Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/ about this event: https://talks.datenspuren.de/ds25/talk/8DBNXB/…
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.