BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//program.why2025.org//why2025//PRHKEQ
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-why2025-VZDSF3@program.why2025.org
DTSTART;TZID=CET:20250810T160000
DTEND;TZID=CET:20250810T165000
DESCRIPTION:Building entrance systems for prisons\, hospitals an tv studio'
 s should be secure. But is this really the case?\nAfter "Knock knock who's
  there 1.0" at MCH2022\, we will again look at some high-tech lockpicking\
 , this time at more sensitive locations. The responsible disclosure is a t
 ale of it's own! And why exactly is a 3-letter agency in the US interested
  in the disclosure?
DTSTAMP:20250731T184857Z
LOCATION:Delphinus
SUMMARY:Knock knock who's there 2.0\, the subtle art of (physical) port kno
 cking - Jeroen Hermans
URL:https://program.why2025.org/why2025/talk/VZDSF3/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-why2025-CXVW7V@program.why2025.org
DTSTART;TZID=CET:20250811T190000
DTEND;TZID=CET:20250811T195000
DESCRIPTION:During this talk we look at hardware and firmware reverse engin
 eering\, but also at corporate intimidation tactics and how to respond eth
 ically as a security researcher.\nLeveraging the hard-coded AES keys\, out
 dated software\, and lots and lots of custom code we found\, we were able 
 to install "custom code" on some phones and access global customer configu
 ration data by exploiting Yealink's global cloud provisioning service (RPS
 ).
DTSTAMP:20250731T184857Z
LOCATION:Cassiopeia
SUMMARY:Die Hardcoded: Unlocking Yealink's (weakest) secrets - Jeroen Herma
 ns\, Stefan Gloor
URL:https://program.why2025.org/why2025/talk/CXVW7V/
END:VEVENT
END:VCALENDAR
