The Paper is a Lie: Practical Data Forensics for Scientific Data (eh23)

The Paper is a Lie: Practical Data Forensics for Scientific Data (eh23)

Author: CCC media team April 5, 2026 Duration: 1:00:08
Recent high-profile cases of scientific fraud have demonstrated that scientists are only human too and sometimes individual scientists falsify their data. Since science is the basis of decision- and policy-making, we all should be able to scrutinise scientific studies. Here, we provide practical guidance and concrete tools for forensically examining scientific data and identifying potential cases of data manipulation. These approaches will enable and empower audience members to independently perform forensic plausibility checks on scientific data, as well as provide a starting point for their further, independent study. Limitations and ethical considerations when performing such analyses will also be discussed. Science is the basis of decision- and policy-making, and it is generally a good idea to "trust the science." Recent high-profile cases of scientific fraud, however, have demonstrated that scientists are only human too, and sometimes, for various reasons, individual scientists falsify their research. Accordingly, we all should be able to scrutinise and independently assess scientific studies, spotting potential cases of manipulation. Perhaps surprisingly, this is often significantly easier to do for the layperson than one may suspect. In this talk, we'll focus on a core aspect of checking scientific studies: the raw data, and their forensic examination. To get started, we begin with a brief introduction to the structure of a typical scientific study and the process of modern scientific publishing. Afterwards, we will take a look at a number of recent high-profile cases of scientific fraud together in a hands-on manner. We will thereby establish practical guidance and concrete statistical tools for identifying potential cases of data manipulation which may warrant further examination. These approaches will enable and empower audience members to independently perform forensic plausibility checks on scientific data, as well as provide a starting point for their further, independent study of additionally provided resources. Since no tool or technique is perfect, we will also talk about the limitations of the presented approaches, as well as ethical considerations when performing such analyses. This talk is directed at everyone with an interest in scientific research and everyone who enjoys critically assessing datasets for plausibility. Prior knowledge in statistics, data science and data visualisation are certainly advantageous, but not required, as all necessary theoretical foundations will be introduced during the talk. This work is licensed under CC BY-NC 4.0. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc/4.0/ about this event: https://pretalx.eh23.easterhegg.eu/eh23/talk/XLDNUG/

Tune into the Chaos Computer Club-recent events feed for a direct line to the forefront of digital culture and critical technology discourse. Curated by the CCC media team, this podcast channels the raw, insightful atmosphere of Europe's most influential hacker association, bringing you recordings from their major gatherings and community events. Each episode is a deep dive into talks and presentations from the last two years, covering topics from cryptography and privacy rights to hardware hacking, societal impacts of surveillance, and open-source philosophy. You'll hear from researchers, activists, and engineers who are actively shaping our digital future, offering perspectives rarely found in mainstream tech conversations. This isn't a produced show with hosts; it's an archival audio stream of genuine conference sessions, complete with audience questions and the spontaneous energy of the live event. For anyone interested in the technical details and ethical debates at the heart of modern technology, this feed serves as an essential, unfiltered resource. Subscribe to this podcast to keep your finger on the pulse of the Chaos Computer Club's ongoing dialogue, where complex ideas are broken down and the tools for a more empowered digital life are openly discussed.
Author: Episodes: 100

Chaos Computer Club - recent events feed
Podcast Episodes
2025's Top Cyber Threats: A Closer Look (glt26) [not-audio_url] [/not-audio_url]

Duration: 51:34
None Get ready for an inside look at the top cyber threats of 2025. Our CTF-Team, LosFuzzys, will share our real-life experiences and insights on the vulnerabilities we've encountered last year. From the behind-the-scene…
KDE: 30 years of the Linux desktop (glt26) [not-audio_url] [/not-audio_url]

Duration: 45:47
None 2026 is the 30th anniversary of KDE. Thirty years is a remarkable milestone. This talk looks back at the history of the Linux desktop, with a special focus on KDE, revisiting our origins, examining the present, and…
Exploring Linux kernel in an 'Embedded' way (glt26) [not-audio_url] [/not-audio_url]

Duration: 42:37
None The Linux kernel source code is available publicly and can be downloaded by anyone. But the problem is - tens of thousands of files and millions of lines of code makes it hard for us to understand the Linux kernel b…
Lightning Talks (glt26) [not-audio_url] [/not-audio_url]

Duration: 46:11
None Kurzvorträge (max. 5 min) zu verschiedenen Themen. Quick talks (max. 5 min) about different topics. --- - Wenn Du einen Lightning Talk halten möchtest, dann melde Dich bitte via Email (lightning@linuxtage.at). - Um…
Raspberry Pi vs. Thin Client: Home Assistant optimal betreiben (glt26) [not-audio_url] [/not-audio_url]

Duration: 28:30
None Der Vortrag beleuchtet den praktischen Einsatz von Raspberry Pi und Thin Clients als Plattformen für Home Assistant. Anhand realer Beispiele wird gezeigt, wo der Raspberry Pi seine Stärken hat – und in welchen Szena…
Transitous - Free and Open Public transport routing (glt26) [not-audio_url] [/not-audio_url]

Duration: 24:33
None FOSS applications around public transport for the longest time were stuck with using proprietary and reverse engineered APIs from transport operators that could disappear at any point without notice, and which had a…