Event Guide Schedule

Total Page:16

File Type:pdf, Size:1020Kb

Event Guide Schedule EVENT GUIDE SCHEDULE Friday Oct 2 Time (UTC+2) Studio 1 - La Fabrika Institute of Cryptoanarchy Paper Hub 10:00 DOORS OPEN 12:00 - 12:45 Badge Clinic: Getting Started With HCPP Badges Michael Schloh von Bennewitz + Mario Havel Personal Sovereignty Workshop 13:00 - 13:45 13:30 Opening Speech Secure Your Computer Mario Havel Personal Sovereignty Workshop 14:00 - 14:45 Artificially intelligent - role of technology in From Open Source To Open Resource My Top 30 Sovereignty Apps politics and the creation of the state Viktor Tron (remote) Pavol Luptak Sara Polak Personal Sovereignty Workshop 15:00 - 15:45 Decentralised chat and commerce on the Trustless Technologies versus Intermediaries networking break Lightning Network Thomas Nägele (remote) Ketominer 16:00 - 16:45 networking break From Figure to Ground: How humans became Browse Privately Using Firefox technology’s tools Juraj Bednar (remote) Douglas Rushkoff (remote) Personal Sovereignty Workshop 17:00 - 17:45 Interpreting COVID-19 health data networking break Decentralize Yourself And Avoid Digital Tobias “DeFi” Kaiser & Olga Ukolova Totalitarian Control Travin Keith Personal Sovereignty Workshop 18:00 - 18:45 Sovereign Individual Kit. Part I. Introduction Anarchy Online: A World of Strong Privacy Set Up Your Own Censorship Resistant Olga Ukolova David Friedman (remote) Chatroom Andrea Piana Personal Sovereignty Workshop 19:00 - 19:45 On Privacy Enhancing Currencies & Supply Build Your Own Bleskomat Lightning ATM Auditability Charlie Hill ("chill") & Carlos Garcia Ortiz & Riccardo Spagni (remote) Tomas Stary 20:00 - 21:20 Libertas Personal Sovereignty Workshop Film Premiere SCHEDULE Saturday Oct 3 09:00 DOORS OPEN 10:00 - 10:45 How To Earn And Live Bitcoin Max Hillebrand Personal Sovereignty Workshop 11:00 - 11:45 How To Use Bitcoin Wallets Mario Havel Personal Sovereignty Workshop 12:00 - 12:45 How To Use A Decentralized Bitcoin Exchange Chris Beams Personal Sovereignty Workshop 13:00 - 13:45 Death of the Old Guard Slavery to Sovereignty: How to Exit the Matrix Using Hardware Wallets for Bitcoin Alexandra Moxin Amin Rafiee (remote) Alena Vranova Personal Sovereignty Workshop 14:00 - 14:45 Teaching old cats to bark CypherHopePunk – Exploring possible future Build Your Own Hardware Wallet Jan Urban realities with an interactive SciFi Moritz Wietersheim Frank Rieger & Christiane Huetter (remote) Personal Sovereignty Workshop Set Up Multisig Wallet for Bitcoin (2-of-3) Moritz Wietersheim Personal Sovereignty Workshop 15:00 - 15:45 Information equals power equals risk Abusing the mastercard protocol to hack networking break Pavla Holcová bitcoin into FIAT payment terminals Silur (remote) 16:00 - 16:45 networking break Eric S. Raymond (remote) Applied Bitcoin Privacy Max Hillebrand Personal Sovereignty Workshop 17:00 - 17:45 Paradigmatics - Exploring New Technological networking break Using Lightning network Freedoms to Crush Old Power Structures /rootzoll Alexander Bard Personal Sovereignty Workshop 18:00 - 18:45 Smart cities or smart villages? How Machines Operate Us Running Lightning Network Privately Mark Ballandies Julia Tourianski (remote) openoms & /rootzoll Personal Sovereignty Workshop 19:00 - 19:45 Black Market Logistics - Context, Threats, Fuck Gun Control-9mm. How the internet and Set Up Your Business To Accept Bitcoin Methods, Future a 3D-printer can empower you with deadly And Lightning Payments Smuggler capabilities. Ketominer JStark1809 (remote) Personal Sovereignty Workshop 20:00 - 20:45 Gold Coin Auction SCHEDULE Sunday Oct 4 10:00 DOORS OPEN 13:00 - 13:45 I - The Individual - Exist Civil disobedient in digital realm: the Hong Next-Generation Private Multisignature Max Hillebrand Kong way and its struggle until digital Wallets totalitarianism Alekos Filini Johnson Yeung (remote) 14:00 - 14:45 The Nym Mixnet Testnet is Live: The Fight for Exploring trust assumptions Revitalizing Usenet Digital Privacy and Autonomy Dankrad Feist (remote) Jason Evans Harry Halpin 15:00 - 15:45 networking break Optionality, uncertainty and freedom Origin and history of parallel polis Juraj Bednár (remote) Martin Leskovjan 16:00 - 16:45 I, for one, welcome our new robot overlords networking break Dissociative Identity Svarny Petr Josef 17:00 - 17:45 Panel: The European crypto liberation Crypto Cruise Ship networking break meeting after Chad and Nadia (remote) Oskar Giese, Gideon Gallasch (remote), Frank Braun, Smuggler, Juraj Bednár (remote), Sodomak. Moderator: Pavol Luptak 18:00 - 18:45 Memetic warfare: dangerous memes & Human augmentation, AI, life-hacking… and El Caracol (The Snail) fallacies. our best methods for evading mistakes Documentary Film Frank Braun David Brin (remote) 19:00 - 19:45 Insanely Great: The Cypherpunk Totality Paul Rosenberg (remote) 20:00 Closing Speech Chad and The first Chad and Nadia became the world’s first Nadia seasteaders seasteaders when they began living in a floating home 13 nautical miles from the Elwartowski coast of Thailand in the open ocean. That is, until the Thai navy decided that their floating home was a threat to Thailand’s national sovereignty and threatened Chad and Nadia with a death sentence if caught. After escaping Thailand and moving to Panama they are moving forward with plans to build floating homes off of the Caribbean coast of Panama, in a country that actually understands the economic benefits of having a completely new industry. Chad and Nadia Elwartowski talk about their experience as the first seasteaders in Thailand. What is seasteading and how it goes hand in hand with cryptoanarchy? What is the next step forward for Crypto Cruise Ship talk 45min seasteading? Sea homes and a crypto cruise ship, a perfect incubator for the new digital future and everything related to testing decentralized systems. Return to schedule Smuggler Cryptoanarc Cryptoanarchist for 20 years. Privacy hist and extremist and crypto absolutist. cypherpunk Founder of anarplex.net, co-founder of TAZ0 and co-host of Cypherpunk Bitstream Podcast. Author: Second Realm - Book on Strategy, Dropgangs – future of darknet markets, Aristocracy of Action, The Treasure that is Privacy, The New Age of Intelligence. Operator of anonymous remailers, darknet hangouts and the longest running darknet IRC. Developer of privacy enhancing technologies. Covert communications specialist, security consultant. The client paid for your product, and now you have to deliver - across territories and borders filled with Black Market Logistics - hostile actors that want to suppress your business and steal the goods. We'll look at the process of logistics, the threats to fullfilment and methods both old-school and cutting edge. Digital Totality or not, Context, Threats, talk 45min the future looks bright for the independent international entrepreneur - we'll consider upcoming Methods, Future technologies and that could change the world for the better (a bit). #Detection, #Intelligence, #Tracking, #PostalSystem, #BulkLogistics, #Dropgangs, #UAVs, #Parasites & #ThrowIns. Return to schedule Paul Co-founder Paul Rosenberg is the author of the Rosenberg of Free-Man’s Perspective newsletter and the Cryptohippie co-founder of Cryptohippie. He is also the and author author of A Lodging of Wayfaring Men, of the Production Versus Plunder and The Breaking Freeman’s Dawn. He is a co-author of The New Age of Perspective Intelligence. newsletter We often think of a digital totality as a dark, oppressive thing, and for obvious reasons. The digital totality of the cypherpunks, however, had a beautiful purpose: To escape the fears, manipulations and extortions of the present world order, and build a better realm apart from them. As time has gone on, and however erratically and imperfectly, cypherpunk technologies have developed, Insanely Great: The and there are far more people working on them than ever before. talk 45min Civilization is a battle between production and plunder, with our digital realm devoted to production and Cypherpunk Totality the old order’s devoted to plunder. But the battle between the two goes further than even that, and by the time this presentation is finished, you’ll see that there are massive evolutionary benefits to winning this race. Not one, but two digital totalities stand in front of us, one an Eden, the other an Abyss… and we are uniquely positioned to steer the future in one way or another. Return to schedule Frank Braun Cryptoanarc Cypherpunk, cryptoanarchist, co-host of hist and Cypherpunk Bitstream, co-founder of TAZ 0 cypherpunk in Berlin. He is interested in technologies that can lead to more personal freedoms in our lifetimes. We live in times of memetic warfare. Mechanisms like authority and popularity bias, which might have been useful in earlier times, have been amplified by social media to a degree which resembles a war zone. People split into different "communities" which often live in completely different realities (e.g., in regards to COVID-19), interacting with each other not via discourse but with memetic warfare. Memetic warfare: This presentations looks at the phenomenon of memetic warfare on the meta level and looks at some dangerous memes and fallacies in detail. Some meta questions: - What is memetic warfare? - What does dangerous memes & talk 45min it mean for society at large and ones personal life? - How to stay sane in an insane world? Some concrete fallacies. examples of memes in the "scene" we look at: - Everything has to be decentralized - The Internet will route around censorship - The market will fix it. - Bitcoin fixes this. - Just use a smart contract.
Recommended publications
  • Desktop Firearms: Emergent Small Arms Craft Production Technologies
    ARES Research Report No. 8 Desktop Firearms: Emergent Small Arms Craft Production Technologies G. Hays & Ivan T. March 2020 with N.R. Jenzen-Jones COPYRIGHT NOTICE Published in Australia by Armament Research Services (ARES). © Armament Research Services Pty. Ltd. Published in March 2020. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Armament Research Services, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organisation. Enquiries concerning reproduction outside the scope of the above should be sent to the Publications Manager, Armament Research Services: [email protected] ISBN 978-0-6485267-5-9 2 Credits Authors: G. Hays & Ivan T. with N.R. Jenzen-Jones Editor: N.R. Jenzen-Jones Technical reviewers: Jonathan Ferguson & Bruce Koffler Layout & Design: Justin Baird Bibliographic Information Hays, G. & Ivan T. with N.R. Jenzen-Jones. 2020. Desktop Firearms: Emergent Small Arms Craft production Technologies. Perth: Armament Research Services (ARES). DESKTOP FIREARMS About the Authors G. Hays G. Hays is a firearms researcher with a specific interest in improvised and craft-produced weapons. He has documented hundreds of different designs and examined methods of manufacture, design influences, and user types. He has produced original research for ARES and other organizations, mostly focusing on the design, development, and employment of improvised and craft-produced small arms and light weapons. Together with N.R. Jenzen-Jones he authored one of the foundational works on craft-produced weapons, Beyond State Control: Improvised and Craft-produced Small Arms and Light Weapons, published by the Small Arms Survey in 2018.
    [Show full text]
  • William A. Raven* I. Introduction
    ______________________________________________________________________________ ______________________________________________________________________________ PACKING PLASTIC: HOW A FEDERAL BAN ON 3D PRINTED FIREARMS MAY PROTECT THE PUBLIC WHILE RETAINING CONSTITUTIONALITY William A. Raven* I. Introduction “No online database will replace your daily newspaper, no CD-ROM can take the place of a competent teacher and no computer network will change the way the government works” exclaimed Clifford Stoll in a 1995 editorial belittling a newfangled device called the internet.1 Today, more than twenty years removed from Stoll’s ill-fated prophecy where the internet permeates seemingly every aspect of daily life, it is easy to scoff at the idea of the internet’s subjugation, labelling the oracle hailing from that seemingly primitive age of 1995 as ill-informed or even crazy.2 Another * J.D. Candidate, Suffolk University Law School, 2021; B.A. in English, College of the Holy Cross, 2017. William can be reached at [email protected]. 1 See Martin Snapp, How a Berkeley Eccentric Beat the Russians–and Then Made Useless, Wondrous Objects, CAL ALUMNI ASSOCIATION (Spring 2016), archived at https://perma.cc/SH75-JGVZ (introducing Clifford Stoll as a former astronomer turned computer systems manager who became disenchanted with the “false religion” of the internet); Clifford Stoll, Why The Web Won’t Be Nirvana, NEWSWEEK (Feb. 26, 1995), archived at https://perma.cc/WC5L-KFT5 (categorizing the internet as a fad that will not result in major changes to education, business, or recreation). 2 See Jamie Condliffe, The Average American Spends 24 Hours a Week Online, MIT TECHNOLOGY REVIEW (Jan. 23, 2018), archived at https://perma.cc/7UK6- HWLQ (showcasing the vast use of the internet in America); Chris Dunne, Amazon Has 1,029,528 New Sellers This Year (Plus Other Stats), FEEDBACKEXPRESS (Feb.
    [Show full text]
  • The Defender
    THE DEFENDER A publication of Virginia Citizens Defense League Defending Your Right To Defend Yourself Winter 2021 3D PRINTED FIREARMS: COME AND MAKE IT By Tim Griffin, Deterrence Dispensed Contributor Technology has a funny way of sneaking up on you. For instance, the iPhone in your hand has massively more computing power than those warehouse sized computers that first guided man to the moon. It took just 50 years to turn the most powerful supercomputers in the world into a handheld device. The same is true almost universally across the board when it comes to technology, and 3D printing is no different. The first 3D printers were unreliable, bulky, obscenely expensive, and mostly homemade. Once commercial printers began arriving on market, rumors of this exotic new tech began circulating in the mainstream, but the price tag reserved such equipment to the corporate manufacturing and prototyping world. Almost exponentially demand soared, and companies began producing more reliable, easier to use, and most importantly, cheaper printers. 3D printing wasn't just for large-scale operations anymore: 3D printing was making its way into homes across the globe. As 3D printing became more popular, the "maker community" began to find more and more uses for these nifty desktop object producers. Websites such as Thingiverse act like a "Youtube for files" where users can post their own creations for others to download. Thingiverse now hosts 1.9 million user uploaded files for anyone to download and print for free. Gun enthusiasts across the globe wondered, could this benefit us? Enter Cody Wilson and the now infamous Liberator pistol.
    [Show full text]
  • Bitcoin and the Trust Problem: Is Bitcoin Adoption Accelerated by the Abuse of Trust?
    THESIS Karo Zagorus 2020 8E06 CD72 ACE6 1F00 2 Art by Koridian Lionell 8E06 CD72 ACE6 1F00 3 Bitcoin and the Trust Problem: Is Bitcoin adoption accelerated by the abuse of trust? Examining how our trust is being breached and abused, how we are used for rent-seeking, how governments impoverish us through the use of Monetary Nationalism and examining whether Bitcoin is the solution to restore individual freedom and limit the reach of government. Art by Made X Forever Location Redacted Faculty of Arts Applied Social Sciences Department Karo Zagorus Dr. Miklos N. MA Student Associate Professor 2020 Released under CC BY 4.0 license 8E06 CD72 ACE6 1F00 4 Table of Contents DISCLAIMER ................................................................................................................................... 6 LETTER OF ACKNOWLEDGEMENT ............................................................................................ 7 FOREWORD ...................................................................................................................................... 9 I. INTRODUCTION TO THE DISSOLUTION OF TRUST ................................................ 11 A. THE UNBANKING OF TRUST ............................................................................................... 16 i. The Unbanking of America ............................................................................................ 20 B. THE ERA OF POST-TRUTH ................................................................................................. 22 C.
    [Show full text]