Events


Saturday 10:00


The Tools of Open Science

Lessons learnt from the democratization of technologies - C361

An understanding of the role of technologies by everyone, especially through community-led and DIY tools and techniques (sometimes referred to as frugal innovation), in the co-production of knowledge is key to address local social and environmenta...

How to setup your own secure communication and collaboration platform?

With open source software. - C444

Data is only as secure as the location you store it allows it to be. Nowadays there are quite a few commercial and open source file hosting services, but how secure are these? Server side encryption? How well can you trust your server (or the plat...

Kolab is an open source communication and collaboration platform that enables users to share information, make appointments, manage todolists and a wealth of other functionality.
It also has a file storage application that integrates very nicely with other regular desktop file explorers and the functional components in the Kolab Groupware server.

In this workshop we’ll setup our own Kolab server and connect our groupware and webmail environment to a filesharing solution to enable maximum functionality and optimal security.

Saturday 11:00


The Tools of Open Science - Workshop

C361

In this workshop, Public Lab and Bentolab will invite you to a hands-on training !

With Public Lab, we will be engaged in making a DIY aerial-mapping camera rig from string and plastic bottles. This small piece of work is key to attach a camera...

Cryptech

Opening Up the Hardware Security Module (HSM) - C444

Certificate Authorities, Banks, Domain registrars, governments are just some of all organizations that needs high quality crypto keys, good protection of keys and secure use of keys. To meet these requirements, machines called a HSMs (Hardware Sec...

So how do you trust your HSM? The vendor will promise that their product works as intended and is secure. Government programs will validate HSMs and stamp seals of approvals. And yet, thanks to Snowden we now know that those seals and promises may not be the truth and worth your trust.

The Cryptech project was founded with the goal of developing an open reference design and platform for HSMs that anybody can assemble, test and validate until they can trust their HSM.

The talk will describe what the Cryptech project are designing, the challenges of designing high security hardware and software in an open project and what we do to solve the challenges. The talk will describe some of the functions we have today and are currently working on. There will be blinking LEDs and crypto boards.

Edward Snowden thinks that Cryptech is an awesome project, hopefully you will too!

The pitfalls of Bitcoin and the many potentials of blockchain technologies.

Lilla Hörsalen

The limitations of Bitcoin are partly technical, and partly due
to the political economy of Bitcoin within the wider context of
the current crisis in financial capitalism. However, blockchain
technologies are promoted as enabling a lot of new p...

The limitations of Bitcoin are partly technical, and partly due
to the political economy of Bitcoin within the wider context of
the current crisis in financial capitalism. However, blockchain
technologies are promoted as enabling a lot of new potential
solutions to current economic, social, and political problems.
These changes and solutions will be considered critically within
a framework of politics, ideology, sociology, economics -- and
even economic and financial history thrown in for good measure.

Patrice Riemens has been the Fellow of the Waag Society in
Amsterdam, is a promoter of Open Knowledge and Free Software, has
been involved as a "FLOSSopher" (a 'philosopher' of the
Free/Libre and Open Source Software movements). He is also a
member of the staff of Multitudes, and was a founding member of
the Dutch Hacker Movement ("Hippies From Hell").

https://en.wikipedia.org/wiki/Patrice_Riemens
http://p2pfoundation.net/Patrice_Riemens
http://hippies.waag.org/

Saturday 12:00


The Future of Medicine

Between open source medical technologies and self-synthetized hormones - C361

Medicine is changing at a rapid pace, but it’s facing regulatory compliance which act as a barrier to innovation and a necessary check to ensure quality medical care.

EchOpen is an open, collaborative and decentralized project and community wh...

On Fripost

Syndicated email service against established influence patterns of electronic communication - C444

The community deserves an update about Fripost, the free email association. Where does the ideas come from? What have we created in those five years? And what future challenges are we seeking?

In this talk I will present the Fripost association. Where does the ideas come from? What have we created in those five years? And what future challenges are we seeking?

It is custom that Internet services comes with services that the users never asked for: semantic analysis of private conversations, advertisement, espionage, and filtered limited content to name a few. As users of Internet services we have become aware of some of those privacy intrusive aspects, but we also suppose that there is more under the surface not yet reviled. That makes us uneven.

To address this unevenness, at FSCONS in 2010, we launched the idea of Fripost, a democratic email association. We can now celebrate five years of sustainable existence. Fripost does not only provide non privacy intrusive services for electronic communication to its members. Fripost's services are made free in a broad sense through common ownership and democratic structures. We create technology, but it is not all about technology. Fripost find popular adult education, societal influence, and technology to be of equal importance.

In the talk, a categorization of threats against privacy, integrity and freedom will be ...

Why Bitcoin is not Bitcoin

Presentation 1 - Lilla Hörsalen

We explore some common misconceptions and criticisms that are raised against Bitcoin, specifically pertaining to scarcity and scalability. While some criticism is warranted, it fails to take into consideration that Bitcoin is not just Bitcoin. It ...

We start out with a brief introduction to Bitcoin and the technology behind it. We present an overview of how Bitcoin has evolved, how it is used today, and how it is looking to evolve in the near future. We also explore some common misconceptions and criticisms that are raised against Bitcoin, specifically pertaining to scarcity and scalability. While some criticism is warranted, it fails to take into consideration that Bitcoin is not just Bitcoin. It exists in a closely interconnected network of several hundred technologies and communities that have sprung up in the wake of Bitcoin. Together they form what we call the cryptoeconomy space.

In the future we see this space evolving beyond money, eventually
encompassing all types of value creation and transfer, such as liking
someone on Facebook, transferring data to someone or getting recognition for being the first to invent a new technology. While it is impossible to predict which technologies will succeed, what is certain is that we are seeing a melting pot of technologies with 2014 investments surpassing that of Internet start-ups in 1995. Exciting years ahead!

Manuel Antonio Pettersen Lains has a master in nanotechno...

Saturday 12:45


Saturday 14:30


Cyberspace Is Not a Place

Stora Hörsalen

In the 1980 and 1990s some SF writers, and many libertarians and futurists, spun utopian visions of the freedoms that would be enabled by the Net. Countless programmers, including myself, saw meaning in their everyday work as the building of this ...

Saturday 15:15


Genetic Engineering: Your Next Hobby

C361

Synthetic biology is a young scientific field that predicates the application of basic engineering principles to living creatures for useful purposes. This implies the modification, control, design and prediction of biological entities or systems ...

The state of everyday cryptography

C444

After Snowden explained the world that even the crypto geeks had been to optimistic about the state of global surveillance a new interest in developing and promoting systems to provide encryption service for normal human beings awoke. There are se...

Society Unchained

Presentation 2 - Lilla Hörsalen

The opportunities presented by cryptocurrencies and decentralized consensus-networks are practically limitless. We see projects pioneering a vast number of use-cases, including decentralized alternatives to social media platforms, cloud storage, c...

The opportunities presented by cryptocurrencies and decentralized
consensus-networks are practically limitless. We see projects pioneering a vast number of use-cases, including decentralized alternatives to social media platforms, cloud storage, cloud computing, music streaming, gaming, voting platforms and more. In the future we envision strong communities emerging around these and new platforms.

New crypto-finance tools coupled with decision-making tools enable fair and transparent administration of large entities such as organizations, foundations and enterprises. Leveraging active communities with incentives like equity crowdfunding, we are looking at powerful and efficient ground-up activities on a scale previously impossible.

Furthermore, technologies that allow secure and private identity and
sensitive information management, lay the groundwork for competing
alternatives to traditional institutions of society. Various political
philosophies and organizational models, such as Basic Income rights, could be tested and tried against each other. The potential is here for a true voluntary world with a free market of ideologies and political solutions (Freedom of Assoc...

Saturday 16:15


Living Ashes - Synthetic Biology Workshop

C361

'Living Ashes' is a bioart project exploring the concepts of life and animation in the context of Synthetic Biology. This field is predicated on the notion of modifying and designing life using an engineering framework. Yet the concept of life its...

Let's Encrypt

A Free and Automated Certificate Authority - C444

Getting digital certificates that browsers will accept can be costly and time-consuming for Web site operators. That's a major reason many sites still don't use HTTPS security.

This November, a robotic certificate authority will start issuing p...

The Open Food Network

How open source can change the way we buy food - Lilla Hörsalen

The idea of the Open Food Network project is: what if instead of each community having to find, pay for, customize, a licensed solution, we could all mutualize our energies and money to build a platform that will
answer the needs of all our commu...

Food distribution systems are not transparent: Where does the
food you buy in the supermarket come from? How many intermediates
have taken their margin on it? How much goes into the farmers
pocket? How have the products been grown? More and more
alternatives are offering alternative distribution systems to
both conscious consumers and committed farmers: CSA buying clubs,
food cooperatives, consumers and producers start to organize
themselves to invent a new - and sense-making - distribution
system. But it's hard to build and organize a community, and you
need tools to be able to buy as a group. The idea of the Open
Food Network project is: what if instead of each community having
to find, pay for, customize, a licensed solution, we could all
mutualize our energies and money to build a platform that will
answer the needs of all our communities, and make it easier for
the next communities to start in order to scale up the emergence
of this new distribution system?

Saturday 17:15


Peck as You Go - An Alternative Payment System

C361

Peck As You Go is a semi-fictional, experimental system designed to provide an alternative, de- centralized method of payment. It uses hacked micro-organisms living inside the human mouth as a form of electronically-controlled biological currency ...

Browsing the Web with Tor

C444

After an introduction about Tor and Tor Browser the workshop will proceed with a hands-on section about how to use Tor Browser for surfing the Web. It will cover downloading Tor Browser in the first place and making sure it works as expected.

Quid pro quo community organizing, how to organize a peer 2 peer classical music festival

Lilla Hörsalen

Nowadays, classical music is mostly a well hidden world where insiders know when and where to find the hidden gems. Until some years ago, most of the cultural sector (at least in the EU) was dominated by subsidized organizations, but since the fin...

This talk is about the experiences of the speaker in organizing classical music concerts together with like minded individuals, and companies that provide organizational (or material) sponsoring rather than financial.
A whole new type of intermediate organization is arising, more or less a marketplace where companies and individuals can exchange their talents and time for exposure and involvement in these concerts and festivals.

The take aways are:
- how to organize such marketplaces
- which types of events lend themselves for this approach
- what do you still need to take care of in "the old way"

Saturday 18:15


Our Access to Nature

Conversation between biohacking and shamanism - C361

Join this convivial meeting where we will examine the view on, and the relation to nature from the perspective of biohacking and shamanism. Do biohacking and shamanism share common values and philosophy on the access to nature? Is the biological e...

Saturday 19:15



Sunday 10:00


Interfacing with Sensors Freely

Preserving operational freedom by building your own networks - C361

The Internet of Things includes computing devices, smart and dumb sensors, along with technology managing the network. Industrial forces include logistics, healthcare, and consumer developments. In this session we define and dissect sensory trends...

In this quarter hour, we'll take a mixed theory and hands on approach at learning the ropes of Internet of Things telemetry and sensor networking. Instead of marching into IoT emerging technology blindly, we'll have a round understanding of technology and consider security measures.

Since we are both consumers and producers of technology, it's useful to understand trends and technical platforms of this fast paced industry. To this end we'll examine use cases, consider human needs, and carry out simple implementations using laboratory hardware.

The topics of this lecture are relevant to the later workshops of the day titled 'Building an IoT Empire.'

Independent journalism 2.0

Using citizen funding to fill in the blank spots in the media landscape - Lilla Hörsalen

The need for qualified foreign correspondence has never been greater
than today. Crises and catastrophes need to be covered and scrutinized,
not just when they occur, but before and after as well. At the same time
the Swedish news editors are facing their worst challenge in the modern
era. Foreign journalism has been cut down and the possibility of
providing qualified coverage is diminished ever day.

We are worried by this development. Worried for the news reports that
are never written. For the conflicts that are forgotten, and for the
people whose voices are not heard. In the long run, we are worried for
our perception of the world around us, and for our democracy.

We are a group of passionate publicists who have decided to
take matters into our own hands, and to create a crowd funded digital
platform for foreign correspondence. We invite members to interact with
an editorial staff that monitors our dynamic world, digs and scrutinizes
and picks up the unexpected voices from the four corners of the world.

Sunday 11:00


Customize your Ubuntu Desktop to make it awesome!

Making the desktop work for you - C361

This talk will go over the practical and unique ways to customize the Ubuntu Unity desktop. Ways to break away from the normal default desktop and add customizations. The talk will go over the ways to customize such as the applications available i...

This talk will go over the practical and unique ways to customize the Ubuntu Unity desktop. This talk will talk about the new features of Ubuntu Unity related to their convergent platform as well as tough on the new package management system. This will then go over how to make the Ubuntu version's desktop unleash its full potential. From adding Ways to break away from the normal default desktop and add customizations. The talk will go over the ways to customize such as the applications available in the software center, to editing system files to create the perfect set up for each person. From adding community members customizations, to manually editing files that are not in the everyday user manual, this talk will say it all! This talk will include live demos as well so this will make it even more fun. All attendees are welcome to participate in the territorials and we can learn together.

Freedom of Information - The Pink Elephant on stage with Open Data

C444

Sweden has the oldest principle of access to public information, ranging all the way back to 1766. However with digitalization, the average citizen's amount of access to public information has not increased as much one could have expected. In a se...

Who controls the past?

Lilla Hörsalen

Who should make sure the heritage - objects, images and memories - are safeguarded for the future? Why? And how could it be done?

Sunday 12:00


birGit

a tool to rule git - C361

birGit is an git tool that allows you to easily use the power of the command line in together with git. This softwares main focus is to bring down (multiline) long git commands to simple commands.

This talk will introduce you to birGit.
How to:
* use birGit
* expand birGit
* send birGit patches to the main project.
* how birGit was made with opensource in mind.

Birgit:
* is git comands that with out birgit is to complex to use.
* has an amazing easy to expand file/folder code structure
* returns results with atomic rows.
* is written in bash.
* is your source of power

Data protection for websites made simple

What to keep in mind when we're building infrastructures - C444

We asked ourselves whether people who visit the websites of their municipalities have an obligation to report that they seek public information to a bunch of companies and external parties. We concluded that no, that doesn't make sense, and embark...

Dataskydd.NET is a Swedish organisation registered in 2015. Prior to official registration Dataskydd.NET has been the only Swedish language website posting continuous updates on the European data protection reform since autumn 2012. Dataskydd.NET works to promote data protection and privacy in law, as well as in technologies.

Since autumn 2014, Dataskydd.NET has a particular focus on municipal level involvement in data protection law and technologies. While the results of our original running through of municipal websites is anything but encouraging, there are some notable challenges:

- Even municipalities that are willing to make privacy-preserving investments are unable to get clear advise on what the law says, and how it is means to be applied, from government authorities.
- A non-zero number of municipalities have implemented proper privacy-protections against third-party disclosure of website visitor behaviour, in spite of poor advise from the government.
- There is a substantial lack of guidance for municipalities that want to take a step in the right direction, and a lot of commercial efforts to get municipalities to take steps in the wrong direction.

We will p...

Reliable Links

Lilla Hörsalen

The right to study and modify free software grants access to its source code. The right to verify a scientific result implies access to its background and previous results. It becomes a problem if access to these materials (e.g. in reference) is g...

Sunday 12:45


Sunday Lunch

Café

Sunday 14:00


Hackers in Parliaments

Stora Hörsalen

Explores how we can analyse our current systems, in order to find useful ways to hack broken databases or build new systems.

Sunday 15:15


Realm of Freedom?

Wikipedia and Wikipedians Relation to Capitalism - Lilla Hörsalen

The lecture builds on a forthcoming dissertation on the Swedish Language Version of Wikipedia based on 9 qualitative and semi-structured interviews with Swedish Wikipedians on their views of their practice, mode of production and capitalism. On th...

A lecture that presents a dissertation in Library and Information Science at Uppsala University, that will be publicly defended 2th of October 2015.
The conclusions and their visualisation will be stressed.

Your Dreams with the Digital Society - starting with Participatory Dialogues!

C444

What are your Dreams of a Digitalized Sweden and Nordic countries empowered by Free-, Open Source Software and Open Data?

Anyone using services from civil, public and private organisations are the experts of how those should be designed and cre...

Sunday 16:15


Building an IoT empire (Part 1)

Identifying and implementing IoT use cases with sensors and actuators - C361

Technical minds and creative electronic artists will appreciate (and hopefully extend) the ideas put forth in this explanatory IoT session. A cookie cutter approach is taken while assembling embedded hardware to build a web of things with sensors ...

This is the first of two timeslots. In this hour, we're introduced to the physical web and IoT concepts as well as the materials on hand.

Some computing use cases common to us all involve:

Health functions (temperature, blood pressure, heart rate)
Entertainment (storage and control of entertainment media)
Logistical transport (IVI, auto control, and public transportation)
Physical security (entry control and alarm systems)
Nighttime safety (Light and movement detection)
Malicious vendor detection (IoT transport filtering)

We'll examine our lives and how embedded computers should or should not manage sensors and actuators. While considering the interface to legacy telecommunications and cloud technology, we'll use specialized IoT platform hardware to construct a network of things. Our network will cover well defined use cases or a bring your own idea scenario, and we'll reflect on achievements in the second timeslot of Building an IoT empire (Part 2).

Participants will benefit from bringing their own (Linux, Windows, OSX, or other) computer, but everyone is welcome and can benefit by simply observing. The workshop wiki is located at:
...

LibreOffice Online

Open Source Productivity in the Cloud - Lilla Hörsalen

Libreoffice's cloud debut will mark a third way for browser-based collaborative editing. With document rendering unparalleled by competitors, the widest file support of any office suite, and the supreme flexibility offered by Open Source it's set ...

Sunday 17:15


Building an IoT empire (Part 2)

Identifying and implementing IoT use cases with sensors and actuators - C361

Technical minds and creative electronic artists will appreciate (and hopefully extend) the ideas put forth in this explanatory IoT session. A cookie cutter approach is taken while assembling embedded hardware to build a web of things with sensors ...

This is the second of two timeslots. In this hour we continue implementing the physical web and integrating our work into a broader IoT using Bluetooth Smart and Ethernet logic.

Some computing use cases common to us all involve:

Health functions (temperature, blood pressure, heart rate)
Entertainment (storage and control of entertainment media)
Logistical transport (IVI, auto control, and public transportation)
Physical security (entry control and alarm systems)
Nighttime safety (Light and movement detection)
Malicious vendor detection (IoT transport filtering)

We'll examine our lives and how embedded computers should or should not manage sensors and actuators. While considering the interface to legacy telecommunications and cloud technology, we'll use specialized IoT platform hardware to construct a network of things. Our network will cover well defined use cases or a bring your own idea scenario, and we'll conclude by reflecting on achievements and lessons learned.

Participants will benefit from bringing their own (Linux, Windows, OSX, or other) computer, but everyone is welcome and can benefit by simply observing. The workshop wiki is ...

Sunday 18:15


Cryptography workshop

incl. keysigning party - C361

Starting with a hands-on workshop to get started with cryptography, we'll end with a keysigning party to strengthen the OpenPGP and CAcert.org Webs of Trust by certifying each other's identi...

Welcome to the FSCONS hands-on cryptography workshop and key-signing party.

Hands-on workshop. In the workshop, we will explore the fundamentals of cryptography with GNU Privacy Guard (GnuPG or GPG). Together we will install the software on your computer; create, distribute, and sign cryptography keys; integrate cryptography with your emailing solution; and finally perform some secure electronic communication.

The workshop targets beginners, but our experience tells us that also experienced users benefit from those discussions that are raised.

OpenPGP Key-signing. We will keep the key-signing informal. As usual, the final decision about each certification is left to each signer's appreciation, but it's common to ask the signee for one (or more) government-issued ID(s). Participants are also encouraged to bring printouts of their key's fingerprint, for instance formatted using the gpg-key2ps tool which can be found in Debian's signing-party package. One can also mail their key to

Sunday 19:15


Cryptography workshop, Part 2

incl. keysigning party - C361

Starting with a hands-on workshop to get started with cryptography, we'll end with a keysigning party to strengthen the OpenPGP and CAcert.org Webs of Trust by certifying each other's identi...

Welcome to the FSCONS hands-on cryptography workshop and key-signing party.

Hands-on workshop. In the workshop, we will explore the fundamentals of cryptography with GNU Privacy Guard (GnuPG or GPG). Together we will install the software on your computer; create, distribute, and sign cryptography keys; integrate cryptography with your emailing solution; and finally perform some secure electronic communication.

The workshop targets beginners, but our experience tells us that also experienced users benefit from those discussions that are raised.

OpenPGP Key-signing. We will keep the key-signing informal. As usual, the final decision about each certification is left to each signer's appreciation, but it's common to ask the signee for one (or more) government-issued ID(s). Participants are also encouraged to bring printouts of their key's fingerprint, for instance formatted using the gpg-key2ps tool which can be found in Debian's signing-party package. One can also mail their key to