Skip to content

27C3: We come in peace (Update)

July 31, 2010
tags: ,

Update du 11/10: Les billets pour tous les jours du congrès (27 au 30 décembre) coutent 70,-€ (membres 45,- €, élèves 25,-€) et sont dès maintenant disponibles en prévente: Voici un petit guide pour survivre la prévente. A partir du deuxième jour du congrès, il sera possible d’acheter les billets 1 jour sur place.

Le prochain Chaos Communication Congress, le plus important congrès hacker et netactiviste de l’Europe organisé par le CCC, aura lieu du 27 au 30 décembre sous le titre “We come in peace”. L’appel à projet vient d’être lancé et des propositions peuvent être envoyées jusqu’au 9 octobre.

We come in peace, said the conquerers of the New World.
We come in peace, says the government, when it comes to colonise, regulate, and militarise the new digital world.
We come in peace, say the nation-state sized companies that have set out to monetise the net and chain the users to their shiny new devices.
We come in peace, we say as hackers, geeks and nerds, when we set out towards the real world and try to change it, because it has intruded into our natural habitat, the cyberspace.

Les thématiques seront:


  • DPI (deep packet inspection) circumvention
  • using their technology against them
  • counter-forensics
  • device neutrality – who owns, controls and queries the phone in your pocket? How can we regain control?
  • new classes of security problems and exploits (or old classes used in new and exceptionally exciting ways)
  • self-inflicted surveillance
  • manufacturing plausible deniability


  • putting technological developments into a historical and political perspective
  • beyond Tor: next generation anonymity systems
  • open and distributed data mining
  • mobile phone hacking and network building
  • playing corporate and government games in your mom’s basement
  • new methods and paradigms for privacy and personal data sovereignty
  • enforcing net neutrality as we understand it
  • mimicking large scale communication infrastructure to deceive data mining, data retention, surveillance


  • who owns the past, who owns your data, who owns math, who owns genes, who owns the net?
  • new models and ideas for just and fair content enumeration
  • sci-fi to sci-fact: from drones to teleportation, opening portals to other dimensions and star systems
  • free software for implants
  • (ab)using electronics and computers in new areas: homes, cars, airplanes, stock exchanges, nuclear power plants, hadron colliders
  • beyond helvetica: using technology and infrastructure for art, peace, sex, joy and fun
  • DIY martian laser weapons and cow disruptors for lulz and profit
  • applied MacGyverism

Voici plus d’informations.

Flattr this

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: