Monthly Archives: March 2018

Computational Law & Blockchain Festival 2018

The first annual Computational Law & Blockchain Festival (#clbfest2018) is a three-day global event bringing together coders, designers, lawyers, policymakers, researchers, and students to co-create the future of law, legal practice, and policy. In the spirit of decentralization, the Festival will be hosted at independent, self-organized nodes in cities around the world.


16 March 2018 @ Näituse 13a-201, Tartu


10:15-11:45 TRACK LEARN
Electronic signature and enforceability of electronic contracts in civil law countries
Presentor: attorney Liisi Jürgen, NJORD Law Firm, lecturer of the IT Law Master´s programme


12:00-13:30 TRACK LEARN
Digital identities, e-residency and e-wallets – identity and digital footprint
Presentors: attorney Anne Veerpalu and attorney Liisi Jürgen, NJORD Law Firm, lecturers of the IT Law Master´s programme

13:30-15:00 TIME FOR A BREAK
(no lunch is offered by Legal Hackers)

15:00-15:45 TRACK LEARN
Decentralization and innovation ecology – what type of ecology is needed for legaltech to accelerate it innovation? Introducing many technologies which in themselves are not going to revolutionize everything.
Presentor: Michael Gallagher


Visualisation of law: An Automated Legal Content Capture and Visualisation Method (Automaatne meetod õigusteabe hankimiseks ja visualiseerimiseks)
Presentor: Ermo Täks, PhD (Computer Science, TTÜ)

17:30- 18:15 SESSION 3: INTRO TO SMART CONTRACTS (pre-recorded)
Presentor: Dr. Martin Ploom, who has worked for the last years for Man Investments, Credit Suisse and UBS in In-house Consulting / Project Management roles. He is an MBA, Dipl. Inf., Ms. Ec. and finished CFA Level III in 2010. He has been a crypto currencies enthusiast since Autumn 2012.

17 March 2018 @ Näituse 13a- 201, Tartu


10:15-11:45 TRACK LEARN
Virtual currencies: legal and tax issues
Presentor: attorney Priit Lätt, PWC Legal, lecturer of the IT Law Master´s programme

11:45-13:00 TIME FOR A BREAK
(no lunch is offered by Legal Hackers)


24h Hackaton – participants are welcomed to either listen to the next LEARN TRACK SESSION 3 or go to a separate location to work with their team
Hackaton location: J. Liivi 2 – 111, Institute of Computer Science, University of Tartu
Open from 1 pm on 17th March
Coffee break at 3 pm- 3.30 pm
Moderator: Stanislav Degtjarjov,

GLOBAL HACKATON registration available here:

LOCAL HACKATONS introduced at SESSION 2 and 1 pm on 17th March @ Näituse 13a, Tartu


SESSION 3: Blockchain Computing & Its Security Challenges

* Miao ZhiCheng, from, ex Skyper, ex. Twilion – “Blockchain computing vs. traditional computing – an overview”
* Dr. Marlon Dumas “Automating Business Processes With Smart Contracts”
* Agrello team : “Smart contracts technical standards”
* (recorded video) Dan Selman, from, “Accord Project – The Techno-Legal Standards”
* Risto Alas from Guardtime – “the DAO and the vulnerabilities discovered in Ethereum smart contracts”
* Taimo Peelo, “Ethereum Honeypots”
PANEL led by Miao ZhiCheng

16:15-16:45 TRACK LEARN
Tax issues at ICO and post-ICO
Presentor: attorney Elvira Tulvik, MAGNUSSON


Estonian intelligence chief invites hackers to work

The Estonian Foreign Intelligence Service (Välisluureamet) was previously known as the Estonian Information Board (Teabeamet).

This world is very fast and very good experts are required. Your homepage, which has become a little more informative recently, suggests that you are also looking for new people?
Of course we are looking. Do not we compete on the same market as other public authorities and the private sector? If we are talking about a big data or a better use of public sources in obtaining our information, then everyone with this competence is very much in demand.

At the end of the annual report (Estonian version), I found one challenge. These who can solve this could work for you?
Since we have a publication once a year, where we talk about our work openly, we also intended to use this publication to expand our recruiting field. If people reach to the last page of the document, then there may be some who can solve the puzzle and send the solution to us. I can not guarantee that the solution ensures a job, as other processes need to be followed. However, it definitely shows that the person has competence and analytical mind in cryptography.

You are giving interviews that would have been a big surprise many years ago. You reject the public myths about intelligence work. Your agency publishes puzzles to find potential employees. What is the future of your agency?
Yes, over the last few years, we have come out of the shadows and closer to the public. My clear view is that if you are not in the picture then you do not exist. However, if we want to recruit the best specialists, it is very difficult to find people for an institution that does not exist. Of course, we must at the same time be aware of security, but these risks can be handled. But in the future of intelligence, there are two keywords: co-operation and technology.

Crypto challenge:

Signal intelligence was able to capture an encrypted message: SDZROZDBITGNUMYNSF
However, the receiver was unable to decrypt the message and the message was transmitted again: YHDRCRLBUTIPUCMFGF

(a) What was content of the message
(b) What key was used to encrypt

The solutions can be sent to with topic “Nuputamisülesanne”

The crypto challenge seems just as a way to get attention. We are living in times where end-point exploitation is the tool to obtain intelligence. The capability to break ancient substitution cipher is unlikely to help.


Cyber Security master’s theses defense in Tallinn University of Technology (January 2018)

January 8th, 2018, Akadeemia Tee 15a, Room ICT-315.

Time: 10:00
Student: Silvia Väli
Title: Analysis of Electron-based applications to identify XSS flaws escalating to code execution in open-source applications
Supervisor: Olaf Manuel Maennel
Reviewer: Bernhards Blumbergs

Time: 10:40
Student: Juhan Kaalep
Title: The Status, Reasons And Perspective of Cyber Security of Estonian SME-s in the Context of the Cyber Essentials Scheme
Supervisor: Andro Kull
Reviewer: Tiia Sõmer

Time: 11:20
Student: Tiiu Mamers
Title: The Art and Science of Information Security Investments for Small Enterprises
Supervisor: Olaf Manuel Maennel
Reviewer: Andro Kull

ETV showed sensitive information on the screen

On Tuesday, “Ringview” had the episode in which the reporter Jüri Muttika traveled around the editorial office of ERR and asked ETV TV presenters to demonstrate their handwriting. An embarrassing error by the video editors allowed the frame to be broadcasted, which contained “Terevisiooni” file transfer protocol (FTP) username and password, hence allowing everyone to view the content on the servers.

The clip shows that the TV presenters tried to hide their notebooks and computer screens from the camera, which makes it especially embarrassing – basically everyone was able to watch broadcast materials.

The error in ERR was quickly recognized and now the password should be changed. The topic is also up in Facebook IT-man’s group, where the IT people write jokingly: “No such user and password do not really hide anything.”

Wouldn’t we expect the ETV internal FTP server to be firewalled from the external world?